Bug 753147

Summary: SELinux is preventing /sbin/ldconfig from 'read' accesses on the directory /var/www/html/reset.
Product: [Fedora] Fedora Reporter: Peque <msdeleonpeque>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED INSUFFICIENT_DATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 16CC: dominick.grift, dwalsh, mgrepl
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:d1c5a87256484aa4753c629b707223d1ada3357cb99a1aded860453d75e55585
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-11-11 21:35:12 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Peque 2011-11-11 12:59:59 UTC
libreport version: 2.0.6
executable:     /usr/bin/python
hashmarkername: setroubleshoot
kernel:         3.1.0-7.fc16.x86_64
reason:         SELinux is preventing /sbin/ldconfig from 'read' accesses on the directory /var/www/html/reset.
time:           Fri Nov 11 13:59:25 2011

description:
:SELinux is preventing /sbin/ldconfig from 'read' accesses on the directory /var/www/html/reset.
:
:*****  Plugin catchall (50.5 confidence) suggests  ***************************
:
:If you believe that ldconfig should be allowed read access on the reset directory by default.
:Then you should report this as a bug.
:You can generate a local policy module to allow this access.
:Do
:allow this access for now by executing:
:# grep ldconfig /var/log/audit/audit.log | audit2allow -M mypol
:# semodule -i mypol.pp
:
:*****  Plugin leaks (50.5 confidence) suggests  ******************************
:
:If you want to ignore ldconfig trying to read access the reset directory, because you believe it should not need this access.
:Then you should report this as a bug.  
:You can generate a local policy module to dontaudit this access.
:Do
:# grep /sbin/ldconfig /var/log/audit/audit.log | audit2allow -D -M mypol
:# semodule -i mypol.pp
:
:Additional Information:
:Source Context                unconfined_u:system_r:ldconfig_t:s0-s0:c0.c1023
:Target Context                unconfined_u:object_r:httpd_sys_content_t:s0
:Target Objects                /var/www/html/reset [ dir ]
:Source                        ldconfig
:Source Path                   /sbin/ldconfig
:Port                          <Unknown>
:Host                          (removed)
:Source RPM Packages           glibc-2.14.90-14
:Target RPM Packages           
:Policy RPM                    selinux-policy-3.10.0-55.fc16
:Selinux Enabled               True
:Policy Type                   targeted
:Enforcing Mode                Enforcing
:Host Name                     (removed)
:Platform                      Linux (removed) 3.1.0-7.fc16.x86_64 #1 SMP
:                              Tue Nov 1 21:10:48 UTC 2011 x86_64 x86_64
:Alert Count                   1
:First Seen                    Fri 11 Nov 2011 01:55:46 PM CET
:Last Seen                     Fri 11 Nov 2011 01:55:46 PM CET
:Local ID                      c22f17b3-f33e-459e-b5f6-6ab1c414ab09
:
:Raw Audit Messages
:type=AVC msg=audit(1321016146.308:137): avc:  denied  { read } for  pid=2621 comm="ldconfig" path="/var/www/html/reset" dev=dm-0 ino=266377 scontext=unconfined_u:system_r:ldconfig_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:httpd_sys_content_t:s0 tclass=dir
:
:
:type=AVC msg=audit(1321016146.308:137): avc:  denied  { read } for  pid=2621 comm="ldconfig" path="/var/www/html/reset" dev=dm-0 ino=266377 scontext=unconfined_u:system_r:ldconfig_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:httpd_sys_content_t:s0 tclass=dir
:
:
:type=SYSCALL msg=audit(1321016146.308:137): arch=x86_64 syscall=execve success=yes exit=0 a0=3db3438 a1=2e9c2b0 a2=7fff9fddeb38 a3=7f5a56b8f9d0 items=0 ppid=2570 pid=2621 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=2 comm=ldconfig exe=/sbin/ldconfig subj=unconfined_u:system_r:ldconfig_t:s0-s0:c0.c1023 key=(null)
:
:Hash: ldconfig,ldconfig_t,httpd_sys_content_t,dir,read
:
:audit2allow
:
:#============= ldconfig_t ==============
:allow ldconfig_t httpd_sys_content_t:dir read;
:
:audit2allow -R
:
:#============= ldconfig_t ==============
:allow ldconfig_t httpd_sys_content_t:dir read;
:

Comment 1 Daniel Walsh 2011-11-11 14:37:19 UTC
This is a leaked file descriptor.  What were you doing when this happened?

Comment 2 Peque 2011-11-11 16:20:24 UTC
(shrug)

I'm sorry... :-)

Comment 3 Daniel Walsh 2011-11-11 21:35:12 UTC
No problem, you can safely ignore it, but if it happens again, please note when it happens, so we could figure out which application is leaking.

Thanks.