Bug 749111
| Summary: | SELinux is preventing nacl_helper_boo from 'mmap_zero' accesses on the memprotect Unknown. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Ali Rohman <alirohman> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 15 | CC: | akashangle, alirohman, b, david.m.beer, dominick.grift, dwalsh, edosurina, eric_laura_d, gimaldi, hhlouzao, hugosleao, ipilcher, jamescape777, linuxnow, luigi.weismann, mgrepl, nstandif, scott, shnurapet, silentdi, tadp, witte2008, zman0900 |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | setroubleshoot_trace_hash:8aabffb8ec08e8a4c12220c8a7ea38df1f9b0f0527f2d2f1937eed0127174129 | ||
| Fixed In Version: | selinux-policy-3.9.16-48.fc15 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-12-04 02:37:44 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
I am just backporting fixes for this from F16. Fixed in selinux-policy-3.9.16-45.fc15 (In reply to comment #1) > Fixed in selinux-policy-3.9.16-45.fc15 Seems to work. Thank you I am running Fedora 16 RC2 and I got the same error. I accidentally clicked delete instead of details, so I can't post a full log until in happens again. I can tell you that I am running selinux-policy-3.10.0-46.fc16, so if this was fixed in 3.9.16-45, it may have regressed. I am running chrome 15.0.874.106 beta if that matters. You are talking about F15 a F16 release together. Try to update to the latest F16 policy which is available from koji for now http://koji.fedoraproject.org/koji/buildinfo?buildID=271792 I installed 3.10.0-53 and it seems fine. I even tested nacl a bit with naclbox.com and had no problems or selinux errors. after i upgrade my F15 to F16 everything look good, but chrome still have take a little bit time to open. Then i update chrome to version 16 automatically from my repository update, then everything fixed. i just sending this comment from chrome browser now :) I have the same bug. And when I open "agenda" or "documents", Chrome all Google services crash. Kaan which selinux-policy do you have installed? Sorry for the late response. I made an upgrade to Fedora 16. Now, everything works fine. Thank you. selinux-policy-3.9.16-48.fc15 has been submitted as an update for Fedora 15. https://admin.fedoraproject.org/updates/selinux-policy-3.9.16-48.fc15 Package selinux-policy-3.9.16-48.fc15: * should fix your issue, * was pushed to the Fedora 15 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.9.16-48.fc15' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2011-16023/selinux-policy-3.9.16-48.fc15 then log in and leave karma (feedback). selinux-policy-3.9.16-48.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report. |
SELinux is preventing nacl_helper_boo from 'mmap_zero' accesses on the memprotect Unknown. ***** Plugin mmap_zero (83.8 confidence) suggests ************************** If you do not think nacl_helper_boo should need to mmap low memory in the kernel. Then you may be under attack by a hacker, this is a very dangerous access. Do contact your security administrator and report this issue. ***** Plugin leaks (8.83 confidence) suggests ****************************** If you want to ignore nacl_helper_boo trying to mmap_zero access the Unknown memprotect, because you believe it should not need this access. Then you should report this as a bug. You can generate a local policy module to dontaudit this access. Do # grep nacl_helper_boo /var/log/audit/audit.log | audit2allow -D -M mypol # semodule -i mypol.pp ***** Plugin catchall (8.83 confidence) suggests *************************** If you believe that nacl_helper_boo should be allowed mmap_zero access on the Unknown memprotect by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep nacl_helper_boo /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c 0.c1023 Target Context unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c 0.c1023 Target Objects Unknown [ memprotect ] Source nacl_helper_boo Source Path nacl_helper_boo Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.9.16-44.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.40.7-0.fc15.x86_64 #1 SMP Mon Oct 17 18:23:57 UTC 2011 x86_64 x86_64 Alert Count 3 First Seen Wed 26 Oct 2011 01:45:04 PM WIT Last Seen Wed 26 Oct 2011 02:20:50 PM WIT Local ID 81f5d452-9984-40a7-8f09-e31d2569c5c9 Raw Audit Messages type=AVC msg=audit(1319613650.399:297): avc: denied { mmap_zero } for pid=16663 comm="nacl_helper_boo" scontext=unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c0.c1023 tclass=memprotect type=SYSCALL msg=audit(1319613650.399:297): arch=x86_64 syscall=execve success=no exit=EACCES a0=7f7df70bd928 a1=7f7df70d2ee0 a2=7fff57d5d180 a3=7fff57d58fc0 items=0 ppid=1 pid=16663 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm=nacl_helper_boo subj=unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c0.c1023 key=(null) Hash: nacl_helper_boo,chrome_sandbox_t,chrome_sandbox_t,memprotect,mmap_zero audit2allow #============= chrome_sandbox_t ============== allow chrome_sandbox_t self:memprotect mmap_zero; audit2allow -R #============= chrome_sandbox_t ============== allow chrome_sandbox_t self:memprotect mmap_zero;