|
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17 System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64 User : nobody ( 99) PHP Version : 5.2.17 Disable Function : NONE Directory : /proc/21585/root/usr/share/setroubleshoot/plugins/ |
Upload File : |
mò
¡8Hc @ sR d k Z e i d d d e ƒi Z d k Td k l Z d e f d „ ƒ YZ d S( Ns setroubleshoot-pluginss /usr/share/localet fallback( t *( s Plugint pluginc B sD t Z e d ƒ Z e d ƒ Z e d ƒ Z d Z d „ Z d „ Z RS( NsQ
SELinux is preventing $SOURCE from making the program stack executable.
s€
The $SOURCE application attempted to make its stack
executable. This is a potential security problem. This should
never ever be necessary. Stack memory is not executable on most
OSes these days and this will not change. Executable stack memory
is one of the biggest security problems. An execstack error might
in fact be most likely raised by malicious code. Applications are
sometimes coded incorrectly and request this permission. The
<a href="http://people.redhat.com/drepper/selinux-mem.html">SELinux Memory Protection Tests</a>
web page explains how to remove this requirement. If $SOURCE does not
work and you need it to work, you can configure SELinux
temporarily to allow this access until the application is fixed. Please file a <a
href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug
report</a> against this package.
sµ
Sometimes a library is accidentally marked with the execstack flag,
if you find a library with this flag you can clear it with the
execstack -c LIBRARY_PATH. Then retry your application. If the
app continues to not work, you can turn the flag back on with
execstack -s LIBRARY_PATH. Otherwise, if you trust $SOURCE to
run correctly, you can change the context of the executable to
unconfined_execmem_exec_t. "chcon -t unconfined_execmem_exec_t
'$SOURCE_PATH'"
You must also change the default file context files on the system in order to preserve them even on a full relabel. "semanage fcontext -a -t unconfined_execmem_exec_t '$SOURCE_PATH'"
s1 chcon -t unconfined_execmem_exec_t '$SOURCE_PATH'c C s t i | t ƒ d S( N( t Plugint __init__t selft __name__( R ( ( t4 /usr/share/setroubleshoot/plugins/allow_execstack.pyR = s c C s` | i d g ƒ oE | i d g ƒ o2 | i | t d ƒ | i | i | i | i ƒ Sn d Sd S( Nt unconfined_tt execstackt Memory( t avct matches_source_typest has_any_access_inR t reportt _t summaryt problem_descriptiont fix_descriptiont fix_cmdt None( R R ( ( R t analyze@ s
&( R t
__module__R R R R R R R ( ( ( R R s
( t gettextt translationt Truet lgettextR t setroubleshoot.utilt setroubleshoot.PluginR R ( R R R R ( ( R t ? s