Bug 753147 - SELinux is preventing /sbin/ldconfig from 'read' accesses on the directory /var/www/html/reset.
Summary: SELinux is preventing /sbin/ldconfig from 'read' accesses on the directory /v...
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 16
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:d1c5a87256484aa4753c629b707...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-11-11 12:59 UTC by Peque
Modified: 2011-11-11 21:35 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-11-11 21:35:12 UTC
Type: ---


Attachments (Terms of Use)

Description Peque 2011-11-11 12:59:59 UTC
libreport version: 2.0.6
executable:     /usr/bin/python
hashmarkername: setroubleshoot
kernel:         3.1.0-7.fc16.x86_64
reason:         SELinux is preventing /sbin/ldconfig from 'read' accesses on the directory /var/www/html/reset.
time:           Fri Nov 11 13:59:25 2011

description:
:SELinux is preventing /sbin/ldconfig from 'read' accesses on the directory /var/www/html/reset.
:
:*****  Plugin catchall (50.5 confidence) suggests  ***************************
:
:If you believe that ldconfig should be allowed read access on the reset directory by default.
:Then you should report this as a bug.
:You can generate a local policy module to allow this access.
:Do
:allow this access for now by executing:
:# grep ldconfig /var/log/audit/audit.log | audit2allow -M mypol
:# semodule -i mypol.pp
:
:*****  Plugin leaks (50.5 confidence) suggests  ******************************
:
:If you want to ignore ldconfig trying to read access the reset directory, because you believe it should not need this access.
:Then you should report this as a bug.  
:You can generate a local policy module to dontaudit this access.
:Do
:# grep /sbin/ldconfig /var/log/audit/audit.log | audit2allow -D -M mypol
:# semodule -i mypol.pp
:
:Additional Information:
:Source Context                unconfined_u:system_r:ldconfig_t:s0-s0:c0.c1023
:Target Context                unconfined_u:object_r:httpd_sys_content_t:s0
:Target Objects                /var/www/html/reset [ dir ]
:Source                        ldconfig
:Source Path                   /sbin/ldconfig
:Port                          <Unknown>
:Host                          (removed)
:Source RPM Packages           glibc-2.14.90-14
:Target RPM Packages           
:Policy RPM                    selinux-policy-3.10.0-55.fc16
:Selinux Enabled               True
:Policy Type                   targeted
:Enforcing Mode                Enforcing
:Host Name                     (removed)
:Platform                      Linux (removed) 3.1.0-7.fc16.x86_64 #1 SMP
:                              Tue Nov 1 21:10:48 UTC 2011 x86_64 x86_64
:Alert Count                   1
:First Seen                    Fri 11 Nov 2011 01:55:46 PM CET
:Last Seen                     Fri 11 Nov 2011 01:55:46 PM CET
:Local ID                      c22f17b3-f33e-459e-b5f6-6ab1c414ab09
:
:Raw Audit Messages
:type=AVC msg=audit(1321016146.308:137): avc:  denied  { read } for  pid=2621 comm="ldconfig" path="/var/www/html/reset" dev=dm-0 ino=266377 scontext=unconfined_u:system_r:ldconfig_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:httpd_sys_content_t:s0 tclass=dir
:
:
:type=AVC msg=audit(1321016146.308:137): avc:  denied  { read } for  pid=2621 comm="ldconfig" path="/var/www/html/reset" dev=dm-0 ino=266377 scontext=unconfined_u:system_r:ldconfig_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:httpd_sys_content_t:s0 tclass=dir
:
:
:type=SYSCALL msg=audit(1321016146.308:137): arch=x86_64 syscall=execve success=yes exit=0 a0=3db3438 a1=2e9c2b0 a2=7fff9fddeb38 a3=7f5a56b8f9d0 items=0 ppid=2570 pid=2621 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=2 comm=ldconfig exe=/sbin/ldconfig subj=unconfined_u:system_r:ldconfig_t:s0-s0:c0.c1023 key=(null)
:
:Hash: ldconfig,ldconfig_t,httpd_sys_content_t,dir,read
:
:audit2allow
:
:#============= ldconfig_t ==============
:allow ldconfig_t httpd_sys_content_t:dir read;
:
:audit2allow -R
:
:#============= ldconfig_t ==============
:allow ldconfig_t httpd_sys_content_t:dir read;
:

Comment 1 Daniel Walsh 2011-11-11 14:37:19 UTC
This is a leaked file descriptor.  What were you doing when this happened?

Comment 2 Peque 2011-11-11 16:20:24 UTC
(shrug)

I'm sorry... :-)

Comment 3 Daniel Walsh 2011-11-11 21:35:12 UTC
No problem, you can safely ignore it, but if it happens again, please note when it happens, so we could figure out which application is leaking.

Thanks.


Note You need to log in before you can comment on or make changes to this bug.