Package: policycoreutils
Version: 2.0.49-5
Severity: normal

=========== ROLES ===============
role system_r types ssh_exec_t;

The above policy is given as the output of audit2allow for the below
kernel message:

type=SELINUX_ERR msg=audit(1220928625.787:79): security_compute_sid:
invalid context unconfined_u:system_r:user_t:s0-s0:c0.c1023 for
scontext=unconfined_u:system_r:inetd_t:s0-s0:c0.c1023
tcontext=system_u:object_r:ssh_exec_t:s0 tclass=process

One possibility is to have the following, although it might be best to
just flag the error and let the sys-admin decide on their own way of
solving it (there are several possibilities that are equally valid):
role_transition system_r ssh_exec_t user_r;



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to