SELinux Security Level Configuration
The SELinux policy being enforced is on FC6 release 2.6.23.8. The Memory Protection that SELinux is Enforcing has been modified to allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. The executable should be reported to Bugzilla. Allow unconfined executables to map a memory region as both executable and writable, this is dangerous and the executable should be reported to Bugzilla. These two security level configurations can not be modified by root and they are always checked. How do I report the executables to Bugzilla?
|