Detailed Description
SELinux denied access requested by /usr/bin/Xorg. It is not expected that
this access is required by /usr/bin/Xorg and this access may signal an
intrusion attempt. It is also possible that the specific version or
configuration of the application is causing it to require additional access.
Please file a http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against this
package.
Allowing Access
Sometimes labeling problems can cause SELinux denials. You could try to
restore the default system file context for <Unknown>, restorecon -v
<Unknown>. There is currently no automatic way to allow this access.
Instead, you can generate a local policy module to allow this access - see http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385 - or you can
disable SELinux protection entirely for the application. Disabling SELinux
protection is not recommended. Please file a http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against this package.
Changing the "xdm_disable_trans" boolean to true will disable SELinux
protection this application: "setsebool -P xdm_disable_trans=1."
The following command will allow this access:
setsebool -P xdm_disable_trans=1
Additional Information
Source Context system_u:system_rdm_t:SystemLow-SystemHigh
Target Context system_u:system_rdm_t:SystemLow-SystemHigh
Target Objects None [ memprotect ]
Affected RPM Packages xorg-x11-server-Xorg-1.1.1-48.26.el5 [application]
Policy RPM selinux-policy-2.4.6-104.el5
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name plugins.disable_trans
Host Name station4.example.com
Platform Linux station4.example.com 2.6.18-92.1.6.el5 #1
SMP Fri Jun 20 02:36:16 EDT 2008 i686 i686
Alert Count 15
Line Numbers