Bug 2255248 - SELinux is preventing chrome from using the 'execheap' accesses on a process.
Summary: SELinux is preventing chrome from using the 'execheap' accesses on a process.
Keywords:
Status: CLOSED DUPLICATE of bug 2254434
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 38
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Zdenek Pytela
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:cd19c2bf87c5a4f706181323404...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-12-19 15:02 UTC by Alex. H. F.
Modified: 2023-12-19 17:14 UTC (History)
9 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2023-12-19 17:14:44 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: description (2.96 KB, text/plain)
2023-12-19 15:02 UTC, Alex. H. F.
no flags Details
File: os_info (734 bytes, text/plain)
2023-12-19 15:02 UTC, Alex. H. F.
no flags Details

Description Alex. H. F. 2023-12-19 15:02:41 UTC
Description of problem:
When starting "Chrome-App" Instagram in own window.
SELinux is preventing chrome from using the 'execheap' accesses on a process.

*****  Plugin allow_execheap (53.1 confidence) suggests   ********************

Sie nicht glauben, dass chrome auf Heap-Speicher verweisen sollte, der sowohl beschreibbar als auch ausführbar ist.
Then sie müssen einen Fehlerbereicht einreichen. Dies ist ein möglicherweise gewährlicher Zugriff.
Do
setzen Sie sich mit Ihrem Sicherheitsadministrator in Verbindung und melden Sie dieses Problem.

*****  Plugin catchall_boolean (42.6 confidence) suggests   ******************

Sie folgendes tun möchten: allow unconfined executables to make their heap memory executable.  Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla
Then sie müssen SELinux darüber benachrichtigen, indem Sie die \tboolesche Variable »selinuxuser_execheap« aktivieren.

Do
setsebool -P selinuxuser_execheap 1

*****  Plugin catchall (5.76 confidence) suggests   **************************

Wenn Sie denken, dass es chrome standardmäßig erlaubt sein sollte, execheap Zugriff auf unconfined_t Prozesse zu erhalten.
Then sie sollten dies als Fehler melden.
Um diesen Zugriff zu erlauben, können Sie ein lokales Richtlinien-Modul erstellen.
Do
zugriff jetzt erlauben, indem Sie die nachfolgenden Befehle ausführen:
# ausearch -c 'chrome' --raw | audit2allow -M my-chrome
# semodule -X 300 -i my-chrome.pp

Additional Information:
Source Context                unconfined_u:unconfined_r:unconfined_t:s0-
                              s0:c0.c1023
Target Context                unconfined_u:unconfined_r:unconfined_t:s0-
                              s0:c0.c1023
Target Objects                Unbekannt [ process ]
Source                        chrome
Source Path                   chrome
Port                          <Unbekannt>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-38.30-1.fc38.noarch
Local Policy RPM              selinux-policy-targeted-38.30-1.fc38.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 6.6.6-100.fc38.x86_64 #1 SMP
                              PREEMPT_DYNAMIC Mon Dec 11 17:27:04 UTC 2023
                              x86_64
Alert Count                   102
First Seen                    2023-12-19 15:58:36 CET
Last Seen                     2023-12-19 15:58:37 CET
Local ID                      e03c74af-0885-4faa-becb-c04e68e14111

Raw Audit Messages
type=AVC msg=audit(1702997917.434:348): avc:  denied  { execheap } for  pid=4926 comm="ThreadPoolForeg" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process permissive=0


Hash: chrome,unconfined_t,unconfined_t,process,execheap

Version-Release number of selected component:
selinux-policy-targeted-38.30-1.fc38.noarch

Additional info:
reporter:       libreport-2.17.11
reason:         SELinux is preventing chrome from using the 'execheap' accesses on a process.
kernel:         6.6.6-100.fc38.x86_64
package:        selinux-policy-targeted-38.30-1.fc38.noarch
hashmarkername: setroubleshoot
comment:        When starting "Chrome-App" Instagram in own window.
type:           libreport
component:      selinux-policy
component:      selinux-policy

Comment 1 Alex. H. F. 2023-12-19 15:02:44 UTC
Created attachment 2005021 [details]
File: description

Comment 2 Alex. H. F. 2023-12-19 15:02:45 UTC
Created attachment 2005022 [details]
File: os_info

Comment 3 Zdenek Pytela 2023-12-19 17:14:44 UTC

*** This bug has been marked as a duplicate of bug 2254434 ***


Note You need to log in before you can comment on or make changes to this bug.