Bug 744475

Summary: SELinux is preventing nacl_helper_boo from 'mmap_zero' accesses on the memprotect Unknown.
Product: [Fedora] Fedora Reporter: Ronald Pottol <ronaldpottol>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 16CC: dominick.grift, dwalsh, kpj104, mgrepl, roland
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:52cde72a423a2d84878b3361a0af73a4b679fd465979f11d4e9e1200150d5cf2
Fixed In Version: selinux-policy-3.10.0-40.fc16 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-10-19 04:31:39 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Ronald Pottol 2011-10-08 21:11:49 UTC
libreport version: 2.0.6
executable:     /usr/bin/python
hashmarkername: setroubleshoot
kernel:         3.1.0-0.rc8.git0.1.fc16.x86_64
reason:         SELinux is preventing nacl_helper_boo from 'mmap_zero' accesses on the memprotect Unknown.
time:           Sat Oct  8 13:50:12 2011

description:
:(note, first launch of Google Chrome Dev build)
:
:SELinux is preventing nacl_helper_boo from 'mmap_zero' accesses on the memprotect Unknown.
:
:*****  Plugin mmap_zero (50.5 confidence) suggests  **************************
:
:If you do not think nacl_helper_boo should need to mmap low memory in the kernel.
:Then you may be under attack by a hacker, this is a very dangerous access.
:Do
:contact your security administrator and report this issue.
:
:*****  Plugin catchall_boolean (40.5 confidence) suggests  *******************
:
:If you want to control the ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr.
:Then you must tell SELinux about this by enabling the 'mmap_low_allowed' boolean.
:Do
:setsebool -P mmap_low_allowed 1
:
:*****  Plugin catchall (5.5 confidence) suggests  ****************************
:
:If you believe that nacl_helper_boo should be allowed mmap_zero access on the Unknown memprotect by default.
:Then you should report this as a bug.
:You can generate a local policy module to allow this access.
:Do
:allow this access for now by executing:
:# grep nacl_helper_boo /var/log/audit/audit.log | audit2allow -M mypol
:# semodule -i mypol.pp
:
:*****  Plugin leaks (5.5 confidence) suggests  *******************************
:
:If you want to ignore nacl_helper_boo trying to mmap_zero access the Unknown memprotect, because you believe it should not need this access.
:Then you should report this as a bug.  
:You can generate a local policy module to dontaudit this access.
:Do
:# grep nacl_helper_boo /var/log/audit/audit.log | audit2allow -D -M mypol
:# semodule -i mypol.pp
:
:Additional Information:
:Source Context                unconfined_u:unconfined_r:unconfined_execmem_t:s0-
:                              s0:c0.c1023
:Target Context                unconfined_u:unconfined_r:unconfined_execmem_t:s0-
:                              s0:c0.c1023
:Target Objects                Unknown [ memprotect ]
:Source                        nacl_helper_boo
:Source Path                   nacl_helper_boo
:Port                          <Unknown>
:Host                          (removed)
:Source RPM Packages           
:Target RPM Packages           
:Policy RPM                    selinux-policy-3.10.0-32.fc16
:Selinux Enabled               True
:Policy Type                   targeted
:Enforcing Mode                Enforcing
:Host Name                     (removed)
:Platform                      Linux (removed) 3.1.0-0.rc8.git0.1.fc16.x86_64 #1
:                              SMP Tue Oct 4 03:16:40 UTC 2011 x86_64 x86_64
:Alert Count                   1
:First Seen                    Sat 08 Oct 2011 01:48:29 PM PDT
:Last Seen                     Sat 08 Oct 2011 01:48:29 PM PDT
:Local ID                      3f3001a7-61a4-4fc2-bf51-b2369345fded
:
:Raw Audit Messages
:type=AVC msg=audit(1318106909.547:89): avc:  denied  { mmap_zero } for  pid=13429 comm="nacl_helper_boo" scontext=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 tclass=memprotect
:
:
:type=SYSCALL msg=audit(1318106909.547:89): arch=x86_64 syscall=execve success=no exit=EACCES a0=7f3ef2b746f8 a1=7f3ef2baafe0 a2=7fff3629fec0 a3=7fff3629bd00 items=0 ppid=1 pid=13429 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=2 comm=nacl_helper_boo subj=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 key=(null)
:
:Hash: nacl_helper_boo,unconfined_execmem_t,unconfined_execmem_t,memprotect,mmap_zero
:
:audit2allow
:
:#============= unconfined_execmem_t ==============
:#!!!! This avc can be allowed using the boolean 'mmap_low_allowed'
:
:allow unconfined_execmem_t self:memprotect mmap_zero;
:
:audit2allow -R
:
:#============= unconfined_execmem_t ==============
:#!!!! This avc can be allowed using the boolean 'mmap_low_allowed'
:
:allow unconfined_execmem_t self:memprotect mmap_zero;
:

Comment 1 Roland McGrath 2011-10-08 22:50:15 UTC
See https://bugzilla.redhat.com/show_bug.cgi?id=743325#c2

Comment 2 Daniel Walsh 2011-10-11 18:08:45 UTC
I am going to turn on the chrome_sandbox transition by default and then dontaudit this access.

Ronald please turn on this boolean.

setsebool -P unconfined_chrome_sandbox_transition 1

Fixed in selinux-policy-3.10.0-40.fc16

Comment 3 Fedora Update System 2011-10-14 16:18:26 UTC
selinux-policy-3.10.0-40.fc16 has been submitted as an update for Fedora 16.
https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-40.fc16

Comment 4 Fedora Update System 2011-10-15 14:32:07 UTC
Package selinux-policy-3.10.0-40.fc16:
* should fix your issue,
* was pushed to the Fedora 16 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing selinux-policy-3.10.0-40.fc16'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/FEDORA-2011-14363
then log in and leave karma (feedback).

Comment 5 Fedora Update System 2011-10-19 04:31:39 UTC
selinux-policy-3.10.0-40.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 6 Kevin Johnson 2011-10-24 13:07:04 UTC
I'm still getting this --


[kevinj@raykj Downloads]$ rpm -qi selinux-policy
Name        : selinux-policy
Version     : 3.10.0
Release     : 40.fc16
Architecture: noarch
Install Date: Mon 24 Oct 2011 08:04:34 AM EDT
Group       : System Environment/Base
Size        : 9075242
License     : GPLv2+
Signature   : RSA/SHA256, Fri 14 Oct 2011 12:56:29 PM EDT, Key ID 067f00b6a82ba4b7
Source RPM  : selinux-policy-3.10.0-40.fc16.src.rpm
Build Date  : Fri 14 Oct 2011 09:53:39 AM EDT
Build Host  : x86-15.phx2.fedoraproject.org
Relocations : (not relocatable)
Packager    : Fedora Project
Vendor      : Fedora Project
URL         : http://oss.tresys.com/repos/refpolicy/
Summary     : SELinux policy configuration
Description :
SELinux Reference Policy - modular.
Based off of reference policy: Checked out revision  2.20091117

Oct 24 09:04:15 raykj setroubleshoot: SELinux is preventing nacl_helper_boo from mmap_zero access on the memprotect Unknown. For complete SELinux messages. run sealert -l 8e793337-cca3-4672-93f2-02620d44739a

Comment 7 Daniel Walsh 2011-10-24 15:41:59 UTC
Yes we are working with the google-chrome developers on this problem.