CGI permissions for targeted policy

Ben bench at silentmedia.com
Tue Apr 5 04:01:23 UTC 2005


Yes exactly; the tmp file is being created by php and then the CGI 
program reads the file.

On Apr 1, 2005, at 10:57 AM, Daniel J Walsh wrote:

> Ben wrote:
>
>> I have been having some problems with a CGI program, and audit2allow 
>> shows I should add these permissions:
>>
>> allow httpd_sys_script_t devpts_t:chr_file { read write };
>> allow httpd_sys_script_t httpd_tmp_t:file getattr;
>> allow httpd_sys_script_t httpd_tmp_t:file read;
>>
>> I'm pretty green at SELinux, so I'm not too sure what these allow. I 
>> suspect that the last rule lets httpd_sys_script_t programs read 
>> files of type httpd_tmp_t, and the second rule lets them stat() those 
>> files. What does the first rule mean, exactly? The CGI program I'm 
>> trying to run creates a random filename, and I expect this is related 
>> to that, but there ends my speculation.
>>
> The first error is the httpd script trying to access a terminal.   The 
> other errors are httpd trying to read the tmp file.   Is the tmp file
> created by a builtin function (php)?  And the a cgi script runs to 
> read it?
>
> Dan
>
>> -- 
>> fedora-selinux-list mailing list
>> fedora-selinux-list at redhat.com
>> http://www.redhat.com/mailman/listinfo/fedora-selinux-list
>
>
>
> -- 
>
>
> --
> fedora-selinux-list mailing list
> fedora-selinux-list at redhat.com
> http://www.redhat.com/mailman/listinfo/fedora-selinux-list




More information about the fedora-selinux-list mailing list