Bug 2255248

Summary: SELinux is preventing chrome from using the 'execheap' accesses on a process.
Product: [Fedora] Fedora Reporter: Alex. H. F. <alex.go4more>
Component: selinux-policyAssignee: Zdenek Pytela <zpytela>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 38CC: alex.go4more, dwalsh, lvrabec, mmalik, nknazeko, omosnacek, pkoncity, vmojzis, zpytela
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:cd19c2bf87c5a4f706181323404192bb7b6d8430cd9d3a16567484db9d2acbb1;VARIANT_ID=workstation;
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-12-19 17:14:44 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
File: description
none
File: os_info none

Description Alex. H. F. 2023-12-19 15:02:41 UTC
Description of problem:
When starting "Chrome-App" Instagram in own window.
SELinux is preventing chrome from using the 'execheap' accesses on a process.

*****  Plugin allow_execheap (53.1 confidence) suggests   ********************

Sie nicht glauben, dass chrome auf Heap-Speicher verweisen sollte, der sowohl beschreibbar als auch ausführbar ist.
Then sie müssen einen Fehlerbereicht einreichen. Dies ist ein möglicherweise gewährlicher Zugriff.
Do
setzen Sie sich mit Ihrem Sicherheitsadministrator in Verbindung und melden Sie dieses Problem.

*****  Plugin catchall_boolean (42.6 confidence) suggests   ******************

Sie folgendes tun möchten: allow unconfined executables to make their heap memory executable.  Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla
Then sie müssen SELinux darüber benachrichtigen, indem Sie die \tboolesche Variable »selinuxuser_execheap« aktivieren.

Do
setsebool -P selinuxuser_execheap 1

*****  Plugin catchall (5.76 confidence) suggests   **************************

Wenn Sie denken, dass es chrome standardmäßig erlaubt sein sollte, execheap Zugriff auf unconfined_t Prozesse zu erhalten.
Then sie sollten dies als Fehler melden.
Um diesen Zugriff zu erlauben, können Sie ein lokales Richtlinien-Modul erstellen.
Do
zugriff jetzt erlauben, indem Sie die nachfolgenden Befehle ausführen:
# ausearch -c 'chrome' --raw | audit2allow -M my-chrome
# semodule -X 300 -i my-chrome.pp

Additional Information:
Source Context                unconfined_u:unconfined_r:unconfined_t:s0-
                              s0:c0.c1023
Target Context                unconfined_u:unconfined_r:unconfined_t:s0-
                              s0:c0.c1023
Target Objects                Unbekannt [ process ]
Source                        chrome
Source Path                   chrome
Port                          <Unbekannt>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-38.30-1.fc38.noarch
Local Policy RPM              selinux-policy-targeted-38.30-1.fc38.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 6.6.6-100.fc38.x86_64 #1 SMP
                              PREEMPT_DYNAMIC Mon Dec 11 17:27:04 UTC 2023
                              x86_64
Alert Count                   102
First Seen                    2023-12-19 15:58:36 CET
Last Seen                     2023-12-19 15:58:37 CET
Local ID                      e03c74af-0885-4faa-becb-c04e68e14111

Raw Audit Messages
type=AVC msg=audit(1702997917.434:348): avc:  denied  { execheap } for  pid=4926 comm="ThreadPoolForeg" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process permissive=0


Hash: chrome,unconfined_t,unconfined_t,process,execheap

Version-Release number of selected component:
selinux-policy-targeted-38.30-1.fc38.noarch

Additional info:
reporter:       libreport-2.17.11
reason:         SELinux is preventing chrome from using the 'execheap' accesses on a process.
kernel:         6.6.6-100.fc38.x86_64
package:        selinux-policy-targeted-38.30-1.fc38.noarch
hashmarkername: setroubleshoot
comment:        When starting "Chrome-App" Instagram in own window.
type:           libreport
component:      selinux-policy
component:      selinux-policy

Comment 1 Alex. H. F. 2023-12-19 15:02:44 UTC
Created attachment 2005021 [details]
File: description

Comment 2 Alex. H. F. 2023-12-19 15:02:45 UTC
Created attachment 2005022 [details]
File: os_info

Comment 3 Zdenek Pytela 2023-12-19 17:14:44 UTC

*** This bug has been marked as a duplicate of bug 2254434 ***