Version-Release number of selected component: qt5-qtwebengine-5.12.2-2.fc30 Additional info: reporter: libreport-2.10.0 backtrace_rating: 3 cmdline: /usr/lib64/qt5/libexec/QtWebEngineProcess --type=ppapi --enable-features=AllowContentInitiatedDataUrlNavigations --disable-features=MojoVideoCapture,SurfaceSynchronization,UseVideoCaptureApiForDevToolsSnapshots --ppapi-flash-args --lang=ru --webengine-schemes=qrc:sLV --service-request-channel-token=4389782650117311413 crash_function: __spawnix executable: /usr/lib64/qt5/libexec/QtWebEngineProcess journald_cursor: s=223bb3e9eb3047c2b54c1afb3ca130ff;i=1a66;b=69eb3bc34a3f4d688aa3f641710f7196;m=3f44f39f;t=5864049e1334a;x=657db33c756c71ef kernel: 5.1.0-0.rc4.git0.1.fc31.x86_64 mountinfo: rootdir: /proc/3140/fdinfo runlevel: N 5 type: CCpp uid: 1000
Created attachment 1554541 [details] File: backtrace
Created attachment 1554542 [details] File: cgroup
Created attachment 1554543 [details] File: core_backtrace
Created attachment 1554544 [details] File: cpuinfo
Created attachment 1554545 [details] File: dso_list
Created attachment 1554546 [details] File: environ
Created attachment 1554547 [details] File: limits
Created attachment 1554548 [details] File: maps
Created attachment 1554549 [details] File: open_fds
Created attachment 1554550 [details] File: proc_pid_status
This is a crash in the Pepper Flash plugin, so there is nothing we can do about it. Judging from the backtrace, it looks like it attempts to run /bin/sh, which looks very much like an exploit attempt that is being successfully blocked by the sandbox. Please make sure that you are running the latest security update of Pepper Flash from Adobe/Google (though I have no idea what issue is being exploited and whether Adobe already fixed it), or uninstall Pepper Flash if you do not need it.