| Summary: | [abrt] dosbox-0.74-1.fc14: Process /usr/bin/dosbox was killed by signal 11 (SIGSEGV) | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Otso Helenius <fedora> |
| Component: | dosbox | Assignee: | Andreas Bierfert <andreas.bierfert> |
| Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 15 | CC: | andreas.bierfert |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Unspecified | ||
| Whiteboard: | abrt_hash:7c1b1f72e50ea3bddaba2cbbeb6b2b42f2123dd5 | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2012-03-30 15:14:51 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
|
Description
Otso Helenius
2011-08-07 00:54:00 UTC
Additionally, selinux pops up with the following warning (execheap access):
Additional Information:
Source Context unconfined_u:unconfined_r:unconfined_execmem_t:s0-
s0:c0.c1023
Target Context unconfined_u:unconfined_r:unconfined_execmem_t:s0-
s0:c0.c1023
Target Objects Unknown [ process ]
Source dosbox
Source Path /usr/bin/dosbox
Port <Unknown>
Host pazuzu
Source RPM Packages dosbox-0.74-1.fc14
Target RPM Packages
Policy RPM selinux-policy-3.9.16-35.fc15
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name pazuzu
Platform Linux pazuzu 2.6.40-4.fc15.x86_64 #1 SMP Fri Jul
29 18:46:53 UTC 2011 x86_64 x86_64
Alert Count 3
First Seen Sun 07 Aug 2011 03:26:24 AM EEST
Last Seen Sun 07 Aug 2011 01:32:17 PM EEST
Local ID 780da697-be80-476d-aa6b-101a628187a8
Raw Audit Messages
type=AVC msg=audit(1312713137.700:153): avc: denied { execheap } for pid=8444 comm="dosbox" scontext=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 tclass=process
type=SYSCALL msg=audit(1312713137.700:153): arch=x86_64 syscall=mprotect success=no exit=EACCES a0=3d9e000 a1=803000 a2=7 a3=20100 items=0 ppid=2639 pid=8444 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 ses=1 comm=dosbox exe=/usr/bin/dosbox subj=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 key=(null)
Hash: dosbox,unconfined_execmem_t,unconfined_execmem_t,process,execheap
Backtrace analysis found this bug to be similar to bug #759161, closing as duplicate. This comment is automatically generated. *** This bug has been marked as a duplicate of bug 759161 *** |