Bug 1698927

Summary: [abrt] qt5-qtwebengine: __spawnix(): QtWebEngineProcess killed by SIGSYS
Product: [Fedora] Fedora Reporter: lonelywoolf
Component: qt5-qtwebengineAssignee: Rex Dieter <rdieter>
Status: CLOSED CANTFIX QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 30CC: kde-sig, kevin, rdieter
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
URL: https://retrace.fedoraproject.org/faf/reports/bthash/fa8ee9d77ea4b8ce3be09ea4c555feaeff41633a
Whiteboard: abrt_hash:5119e864707a8ceda770abf232f07c5618ddf03e;
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-04-11 13:25:34 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
File: backtrace
none
File: cgroup
none
File: core_backtrace
none
File: cpuinfo
none
File: dso_list
none
File: environ
none
File: limits
none
File: maps
none
File: open_fds
none
File: proc_pid_status none

Description lonelywoolf 2019-04-11 12:45:09 UTC
Version-Release number of selected component:
qt5-qtwebengine-5.12.2-2.fc30

Additional info:
reporter:       libreport-2.10.0
backtrace_rating: 3
cmdline:        /usr/lib64/qt5/libexec/QtWebEngineProcess --type=ppapi --enable-features=AllowContentInitiatedDataUrlNavigations --disable-features=MojoVideoCapture,SurfaceSynchronization,UseVideoCaptureApiForDevToolsSnapshots --ppapi-flash-args --lang=ru --webengine-schemes=qrc:sLV --service-request-channel-token=4389782650117311413
crash_function: __spawnix
executable:     /usr/lib64/qt5/libexec/QtWebEngineProcess
journald_cursor: s=223bb3e9eb3047c2b54c1afb3ca130ff;i=1a66;b=69eb3bc34a3f4d688aa3f641710f7196;m=3f44f39f;t=5864049e1334a;x=657db33c756c71ef
kernel:         5.1.0-0.rc4.git0.1.fc31.x86_64
mountinfo:      
rootdir:        /proc/3140/fdinfo
runlevel:       N 5
type:           CCpp
uid:            1000

Comment 1 lonelywoolf 2019-04-11 12:45:13 UTC
Created attachment 1554541 [details]
File: backtrace

Comment 2 lonelywoolf 2019-04-11 12:45:15 UTC
Created attachment 1554542 [details]
File: cgroup

Comment 3 lonelywoolf 2019-04-11 12:45:17 UTC
Created attachment 1554543 [details]
File: core_backtrace

Comment 4 lonelywoolf 2019-04-11 12:45:18 UTC
Created attachment 1554544 [details]
File: cpuinfo

Comment 5 lonelywoolf 2019-04-11 12:45:20 UTC
Created attachment 1554545 [details]
File: dso_list

Comment 6 lonelywoolf 2019-04-11 12:45:21 UTC
Created attachment 1554546 [details]
File: environ

Comment 7 lonelywoolf 2019-04-11 12:45:22 UTC
Created attachment 1554547 [details]
File: limits

Comment 8 lonelywoolf 2019-04-11 12:45:25 UTC
Created attachment 1554548 [details]
File: maps

Comment 9 lonelywoolf 2019-04-11 12:45:27 UTC
Created attachment 1554549 [details]
File: open_fds

Comment 10 lonelywoolf 2019-04-11 12:45:28 UTC
Created attachment 1554550 [details]
File: proc_pid_status

Comment 11 Kevin Kofler 2019-04-11 13:25:34 UTC
This is a crash in the Pepper Flash plugin, so there is nothing we can do about it.

Judging from the backtrace, it looks like it attempts to run /bin/sh, which looks very much like an exploit attempt that is being successfully blocked by the sandbox. Please make sure that you are running the latest security update of Pepper Flash from Adobe/Google (though I have no idea what issue is being exploited and whether Adobe already fixed it), or uninstall Pepper Flash if you do not need it.