Bug 1047947 - execmem/execstack AVCs with new kernels
Summary: execmem/execstack AVCs with new kernels
Keywords:
Status: CLOSED DUPLICATE of bug 1045699
Alias: None
Product: Fedora
Classification: Fedora
Component: krb5
Version: rawhide
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Nalin Dahyabhai
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-01-02 16:45 UTC by Tom London
Modified: 2014-01-02 18:25 UTC (History)
15 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-01-02 18:25:24 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)
AVC spew from journal (23.10 KB, text/plain)
2014-01-02 16:45 UTC, Tom London
no flags Details

Description Tom London 2014-01-02 16:45:11 UTC
Created attachment 844619 [details]
AVC spew from journal

Description of problem:
Recent Rawhide kernels are producing AVCs for key system components for execmem/execstack. Has there been a change in how the kernel is handling this.... ?

Attaching spew from journal.

For example:


#============= abrt_t ==============
allow abrt_t self:process { execstack execmem };

#============= auditd_t ==============
allow auditd_t self:process { execstack execmem };

#============= cupsd_t ==============
allow cupsd_t self:process { execstack execmem };

#============= devicekit_power_t ==============
allow devicekit_power_t self:process { execstack execmem };

#============= rpcbind_t ==============
allow rpcbind_t self:process { execstack execmem };

#============= sshd_t ==============
allow sshd_t self:process { execstack execmem };

#============= telepathy_msn_t ==============
allow telepathy_msn_t self:process { execstack execmem };

Version-Release number of selected component (if applicable):


How reproducible:
Every boot

Steps to Reproduce:
1. boot
2.
3.

Actual results:


Expected results:


Additional info:

Comment 1 Daniel Walsh 2014-01-02 16:58:56 UTC
Not sure if this is a kernel issue or a glibc/gcc issue.  Lots of domains in Rawhide now need execmem and execstack to be allowed to run.

Comment 2 Daniel Walsh 2014-01-02 17:26:59 UTC
Could be caused by kerberos libraries?

# find /usr/lib64 -name libk5\* -exec execstack {} \;
X /usr/lib64/libk5crypto.so.3
X /usr/lib64/libk5crypto.so.3.1
X /usr/lib64/libk5crypto.so

Comment 3 Carlos O'Donell 2014-01-02 18:20:51 UTC
On the glibc side we haven't purposely changed anything that should impact execmem/execstack.

Comment 4 Nalin Dahyabhai 2014-01-02 18:24:09 UTC
krb5-1.12-6.fc21 added a buildrequires on the relevant arches which enabled use of assembly to get AES-NI support.  I'm untagging it now.

Comment 5 Nalin Dahyabhai 2014-01-02 18:25:24 UTC

*** This bug has been marked as a duplicate of bug 1045699 ***


Note You need to log in before you can comment on or make changes to this bug.