Bug 2222698 - SELinux is preventing check from 'mmap_zero' accesses on the memprotect labeled spc_t.
Summary: SELinux is preventing check from 'mmap_zero' accesses on the memprotect label...
Keywords:
Status: CLOSED EOL
Alias: None
Product: Fedora
Classification: Fedora
Component: container-selinux
Version: 38
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:5c7c89f548c9328cf9181267c10...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-07-13 13:47 UTC by Jan Vlug
Modified: 2024-05-28 13:29 UTC (History)
9 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2024-05-28 13:29:37 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: os_info (734 bytes, text/plain)
2023-07-13 13:47 UTC, Jan Vlug
no flags Details
File: description (2.31 KB, text/plain)
2023-07-13 13:47 UTC, Jan Vlug
no flags Details

Description Jan Vlug 2023-07-13 13:47:16 UTC
Description of problem:
SELinux is preventing check from 'mmap_zero' accesses on the memprotect labeled spc_t.

*****  Plugin mmap_zero (53.1 confidence) suggests   *************************

If you do not think check should need to mmap low memory in the kernel.
Then you may be under attack by a hacker, this is a very dangerous access.
Do
contact your security administrator and report this issue.

*****  Plugin catchall_boolean (42.6 confidence) suggests   ******************

If you want to allow mmap to low allowed
Then you must tell SELinux about this by enabling the 'mmap_low_allowed' boolean.

Do
setsebool -P mmap_low_allowed 1

*****  Plugin catchall (5.76 confidence) suggests   **************************

If you believe that check should be allowed mmap_zero access on memprotect labeled spc_t by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'check' --raw | audit2allow -M my-check
# semodule -X 300 -i my-check.pp

Additional Information:
Source Context                system_u:system_r:spc_t:s0
Target Context                system_u:system_r:spc_t:s0
Target Objects                Unknown [ memprotect ]
Source                        check
Source Path                   check
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-38.20-1.fc38.noarch
Local Policy RPM              container-selinux-2.219.0-1.fc38.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 6.3.12-200.fc38.x86_64 #1 SMP
                              PREEMPT_DYNAMIC Thu Jul 6 04:05:18 UTC 2023 x86_64
Alert Count                   45
First Seen                    2023-07-13 10:37:01 CEST
Last Seen                     2023-07-13 10:37:02 CEST
Local ID                      c3888152-0a49-459f-a1a5-dcdc53efcc4e

Raw Audit Messages
type=AVC msg=audit(1689237422.574:677): avc:  denied  { mmap_zero } for  pid=19187 comm="check" scontext=system_u:system_r:spc_t:s0 tcontext=system_u:system_r:spc_t:s0 tclass=memprotect permissive=0


Hash: check,spc_t,spc_t,memprotect,mmap_zero

Version-Release number of selected component:
selinux-policy-targeted-38.20-1.fc38.noarch

Additional info:
reporter:       libreport-2.17.11
kernel:         6.3.12-200.fc38.x86_64
package:        selinux-policy-targeted-38.20-1.fc38.noarch
hashmarkername: setroubleshoot
reason:         SELinux is preventing check from 'mmap_zero' accesses on the memprotect labeled spc_t.
type:           libreport
component:      container-selinux
component:      container-selinux



Potential duplicate: bug 2169154

Comment 1 Jan Vlug 2023-07-13 13:47:18 UTC
Created attachment 1975603 [details]
File: os_info

Comment 2 Jan Vlug 2023-07-13 13:47:20 UTC
Created attachment 1975604 [details]
File: description

Comment 3 Jan Vlug 2023-08-08 06:12:22 UTC
Probably: Using Microsoft 2FA authenticator app to set up a VPN via NetworkManager.


kernel:         6.4.7-200.fc38.x86_64
package:        selinux-policy-targeted-38.20-1.fc38.noarch
hashmarkername: setroubleshoot
reason:         SELinux is preventing check from 'mmap_zero' accesses on the memprotect labeled spc_t.
type:           libreport
comment:        Probably: Using Microsoft 2FA authenticator app to set up a VPN via NetworkManager.

Comment 4 Arnis K 2023-09-17 20:25:42 UTC
I have the same issue. I noticed that this is triggered only at boot, but 'check' can not be found anywhere on the system.

Tried:


which check
systemctl status check
ps aux | grep check

Nothing.

I'm running Kinoite 38.

Comment 5 Aoife Moloney 2024-05-28 13:29:37 UTC
Fedora Linux 38 entered end-of-life (EOL) status on 2024-05-21.

Fedora Linux 38 is no longer maintained, which means that it
will not receive any further security or bug fix updates. As a result we
are closing this bug.

If you can reproduce this bug against a currently maintained version of Fedora Linux
please feel free to reopen this bug against that version. Note that the version
field may be hidden. Click the "Show advanced fields" button if you do not see
the version field.

If you are unable to reopen this bug, please file a new report against an
active release.

Thank you for reporting this bug and we are sorry it could not be fixed.


Note You need to log in before you can comment on or make changes to this bug.