Bug 1254565 - SELinux is preventing Google Chrome from using the setcap access on a process
Summary: SELinux is preventing Google Chrome from using the setcap access on a process
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: selinux-policy
Version: 7.1
Hardware: All
OS: Linux
Target Milestone: rc
: ---
Assignee: Lukas Vrabec
QA Contact: Milos Malik
Keywords: ZStream
Depends On: 1251996
TreeView+ depends on / blocked
Reported: 2015-08-18 12:03 UTC by Jan Kurik
Modified: 2015-09-02 14:16 UTC (History)
9 users (show)

Due to SELinux preventing /opt/google/chrome-beta/chrome from using the setcap access on a process, the Google Chrome process previously terminated unexpectedly and the sandbox initialization failed. This update adds the chrome_sandbox_t SELinux policy, and Google Chrome no longer crashes in the described scenario.
Clone Of: 1251996
Last Closed: 2015-09-02 08:46:04 UTC

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2015:1701 normal SHIPPED_LIVE selinux-policy bug fix update 2015-09-02 12:45:49 UTC

Description Jan Kurik 2015-08-18 12:03:49 UTC
This bug has been copied from bug #1251996 and has been proposed
to be backported to 7.1 z-stream (EUS).

Comment 4 Lukas Vrabec 2015-08-18 12:18:50 UTC
commit 29679ccc9b2bce7a16cb895c4eae3d8c0bc54931
Author: Lukas Vrabec <lvrabec@redhat.com>
Date:   Tue Aug 18 09:57:50 2015 +0200

    Allow chrome setcap to itself.
    Resolves: #1254565

Comment 8 errata-xmlrpc 2015-09-02 08:46:04 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.


Note You need to log in before you can comment on or make changes to this bug.