Activity log for bug #245984

Date Who What changed Old value New value Message
2008-07-06 10:10:32 Rehan Khan bug added bug
2008-07-06 10:13:45 Rehan Khan smart: status New Confirmed
2008-07-06 10:13:45 Rehan Khan smart: importance Undecided Critical
2008-07-06 10:14:40 Rehan Khan description Storing the rpm %pre and %post scripts in /tmp causes issues with systems secured by selinux. For example on Fedora useradd and groupadd are specifically constrained from running scripts in /tmp (selinux-targetted policy) so any rpm script which wants to add a user or group will *silently* fail. The only way to see the failure is in setroubleshooter. Is there a better way/place to process rpm's? If this is an rpm problem how can smart handle this? Storing the rpm %pre and %post scripts in /tmp causes issues with systems secured by selinux. For example on Fedora useradd and groupadd are specifically constrained from being run from scripts in /tmp (selinux- targeted policy) so any rpm script which wants to add a user or group will *silently* fail. The only way to see the failure is in setroubleshooter. Is there a better way/place to process rpm's? If this is an rpm problem how can smart handle this?
2008-07-20 02:45:23 netmask smart: status Confirmed Triaged
2008-07-20 02:45:23 netmask smart: importance Critical Medium
2008-07-20 02:45:23 netmask smart: assignee netmask