[root@server1 ~]# sealert -l 613ca624-248d-48a2-a7d9-d28f5bbe2763
SELinux is preventing /usr/sbin/httpd from getattr access on the file .
***** Plugin catchall (100. confidence) suggests **************************
If you believe that httpd should be allowed getattr access on the
file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep httpd /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context system_u:ystem_r:httpd_t:s0
Target Context unconfined_u:bject_r:admin_home_t:s0
Target Objects [ file ]
Source httpd
Source Path /usr/sbin/httpd
Port <Unknown>
Host server1.example.com
Source RPM Packages httpd-2.4.6-14.el7.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.12.1-124.el7.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name server1.example.com
Platform Linux server1.example.com 3.10.0-84.el7.x86_64 #1
SMP Tue Feb 4 16:8:19 EST 2014 x86_64 x86_64
Alert Count 2
First Seen 2014-02-20 19:5:35 EST
Last Seen 2014-02-20 19:5:35 EST
Local ID 613ca624-248d-48a2-a7d9-d28f5bbe2763
Raw Audit Messages
type=AVC msg=audit(1392944135.482:29): avc: denied { getattr } for
pid=1609 comm="httpd" path="/var/www/html/file3" dev="vda1" ino=8980981
scontext=system_u:ystem_r:httpd_t:s0
tcontext=unconfined_u:bject_r:admin_home_t:s0 tclass=file
type=SYSCALL msg=audit(1392944135.482:29): arch=x86_64 syscall=lstat
success=no exit=EACCES a0=7f9fed0edea8 a1=7fff7bffc770 a2=7fff7bffc770
a3=0 items=0 ppid=1608 pid=1609 auid=4294967295 uid=48 gid=48 euid=48
suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) ses=4294967295
comm=httpd exe=/usr/sbin/httpd subj=system_u:ystem_r:httpd_t:s0 key=(null)
Hash:httpd,httpd_t,admin_home_t,file,getattr