|
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17 System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64 User : nobody ( 99) PHP Version : 5.2.17 Disable Function : NONE Directory : /proc/21573/task/21573/root/usr/share/setroubleshoot/plugins/ |
Upload File : |
mò
¡8Hc @ sR d k Z e i d d d e ƒi Z d k Td k l Z d e f d „ ƒ YZ d S( Ns setroubleshoot-pluginss /usr/share/localet fallback( t *( s Plugint pluginc B sD t Z e d ƒ Z e d ƒ Z e d ƒ Z d Z d „ Z d „ Z RS( NsI
SELinux prevented $SOURCE from reading from the urandom device.
sB
SELinux prevented $SOURCE from reading from the urandom device.
This access should be allowed for individual applications, but there
are situations where all applications require the access (for example,
when ProPolice/SSP stack smashing protection is used). Allowing this
access may allow malicious applications to drain the kernel entropy
pool. This can compromising the ability of some software that is
dependent on high quality random number (e.g., ssh-keygen) to operate
effectively. The risk of this type of attack is relatively low.
sh
Changing the "$BOOLEAN" boolean to true will allow this access:
"setsebool -P $BOOLEAN=1."
s setsebool -P $BOOLEAN=1c C s t i | t ƒ d S( N( t Plugint __init__t selft __name__( R ( ( t/ /usr/share/setroubleshoot/plugins/global_ssp.pyR 1 s c C si | i d g ƒ oR | i | i ƒ o? | i d g ƒ o, | i | d | i | i | i
| i ƒ Sn d S( Nt urandom_device_tt chr_file( t avct matches_target_typest all_accesses_are_int r_file_permst
has_tclass_inR t reportt Nonet summaryt problem_descriptiont fix_descriptiont fix_cmd( R R
( ( R t analyze4 s
9( R t
__module__t _R R R R R R ( ( ( R R s ( t gettextt translationt Truet lgettextR t setroubleshoot.utilt setroubleshoot.PluginR R ( R R R R ( ( R t ? s