Bug 728746
Summary: | [abrt] dosbox-0.74-1.fc14: Process /usr/bin/dosbox was killed by signal 11 (SIGSEGV) | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Otso Helenius <fedora> |
Component: | dosbox | Assignee: | Andreas Bierfert <andreas.bierfert> |
Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 15 | CC: | andreas.bierfert |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Unspecified | ||
Whiteboard: | abrt_hash:7c1b1f72e50ea3bddaba2cbbeb6b2b42f2123dd5 | ||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-03-30 15:14:51 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Otso Helenius
2011-08-07 00:54:00 UTC
Additionally, selinux pops up with the following warning (execheap access): Additional Information: Source Context unconfined_u:unconfined_r:unconfined_execmem_t:s0- s0:c0.c1023 Target Context unconfined_u:unconfined_r:unconfined_execmem_t:s0- s0:c0.c1023 Target Objects Unknown [ process ] Source dosbox Source Path /usr/bin/dosbox Port <Unknown> Host pazuzu Source RPM Packages dosbox-0.74-1.fc14 Target RPM Packages Policy RPM selinux-policy-3.9.16-35.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name pazuzu Platform Linux pazuzu 2.6.40-4.fc15.x86_64 #1 SMP Fri Jul 29 18:46:53 UTC 2011 x86_64 x86_64 Alert Count 3 First Seen Sun 07 Aug 2011 03:26:24 AM EEST Last Seen Sun 07 Aug 2011 01:32:17 PM EEST Local ID 780da697-be80-476d-aa6b-101a628187a8 Raw Audit Messages type=AVC msg=audit(1312713137.700:153): avc: denied { execheap } for pid=8444 comm="dosbox" scontext=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1312713137.700:153): arch=x86_64 syscall=mprotect success=no exit=EACCES a0=3d9e000 a1=803000 a2=7 a3=20100 items=0 ppid=2639 pid=8444 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 ses=1 comm=dosbox exe=/usr/bin/dosbox subj=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 key=(null) Hash: dosbox,unconfined_execmem_t,unconfined_execmem_t,process,execheap Backtrace analysis found this bug to be similar to bug #759161, closing as duplicate. This comment is automatically generated. *** This bug has been marked as a duplicate of bug 759161 *** |