Bug 717100

Summary: SELinux is preventing /opt/google/chrome/chrome from loading /opt/google/chrome/chrome which requires text relocation.
Product: [Fedora] Fedora Reporter: Neil Calkin <calkin>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED WONTFIX QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 12CC: agander, ananta_u, arshadmomin, dominick.grift, dwalsh, eloign, gmmolen, guido.taggart, jmksbabydog2, john.harrison, mgrepl, mikey, zach.pritchard
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard: setroubleshoot_trace_hash:99048f0efa2c7148eb211ac778c3f7ec0e3e9435b59b0e20db5fa66b925b60ae
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-06-28 08:54:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Neil Calkin 2011-06-28 02:09:58 UTC
Summary:

SELinux is preventing /opt/google/chrome/chrome from loading
/opt/google/chrome/chrome which requires text relocation.

Detailed Description:

The chrome application attempted to load /opt/google/chrome/chrome which
requires text relocation. This is a potential security problem. Most libraries
do not need this permission. Libraries are sometimes coded incorrectly and
request this permission. The SELinux Memory Protection Tests
(http://people.redhat.com/drepper/selinux-mem.html) web page explains how to
remove this requirement. You can configure SELinux temporarily to allow
/opt/google/chrome/chrome to use relocation as a workaround, until the library
is fixed. Please file a bug report.

Allowing Access:

If you trust /opt/google/chrome/chrome to run correctly, you can change the file
context to textrel_shlib_t. "chcon -t textrel_shlib_t
'/opt/google/chrome/chrome'" You must also change the default file context files
on the system in order to preserve them even on a full relabel. "semanage
fcontext -a -t textrel_shlib_t '/opt/google/chrome/chrome'"

Fix Command:

chcon -t textrel_shlib_t '/opt/google/chrome/chrome'

Additional Information:

Source Context                unconfined_u:unconfined_r:unconfined_execmem_t:s0-
                              s0:c0.c1023
Target Context                system_u:object_r:execmem_exec_t:s0
Target Objects                /opt/google/chrome/chrome [ file ]
Source                        chrome
Source Path                   /opt/google/chrome/chrome
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           google-chrome-unstable-14.0.803.0-90483
Target RPM Packages           google-chrome-unstable-14.0.803.0-90483
Policy RPM                    selinux-policy-3.6.32-127.fc12
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Plugin Name                   allow_execmod
Host Name                     (removed)
Platform                      Linux paul 2.6.32.26-175.fc12.x86_64 #1 SMP Wed
                              Dec 1 21:39:34 UTC 2010 x86_64 x86_64
Alert Count                   1
First Seen                    Mon 27 Jun 2011 10:08:03 PM EDT
Last Seen                     Mon 27 Jun 2011 10:08:03 PM EDT
Local ID                      d7a9a7cc-a553-469a-bd3a-bbae6868f843
Line Numbers                  

Raw Audit Messages            

node=paul type=AVC msg=audit(1309226883.173:239): avc:  denied  { execmod } for  pid=25090 comm="chrome" path="/opt/google/chrome/chrome" dev=dm-3 ino=41 scontext=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 tcontext=system_u:object_r:execmem_exec_t:s0 tclass=file

node=paul type=SYSCALL msg=audit(1309226883.173:239): arch=c000003e syscall=10 success=no exit=-13 a0=7f4b8c87a000 a1=368e000 a2=5 a3=7f4b8cd8d2c8 items=0 ppid=1 pid=25090 auid=501 uid=501 gid=501 euid=501 suid=501 fsuid=501 egid=501 sgid=501 fsgid=501 tty=(none) ses=1 comm="chrome" exe="/opt/google/chrome/chrome" subj=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  allow_execmod,chrome,unconfined_execmem_t,execmem_exec_t,file,execmod
audit2allow suggests:

#============= unconfined_execmem_t ==============
#!!!! This avc can be allowed using the boolean 'allow_execmod'

allow unconfined_execmem_t execmem_exec_t:file execmod;

Comment 1 Miroslav Grepl 2011-06-28 08:54:56 UTC
F12 is no longer supported. Please update to newer Fedora release.