The following was filed automatically by setroubleshoot: Summary: Your system may be seriously compromised! /bin/dbus-daemon attempted to mmap low kernel memory. Detailed Description: [SELinux is in permissive mode. This access was not denied.] SELinux has denied the dbus-daemon the ability to mmap low area of the kernel address space. The ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr. Preventing such mappings helps protect against exploiting null deref bugs in the kernel. All applications that need this access should have already had policy written for them. If a compromised application tries modify the kernel this AVC would be generated. This is a serious issue. Your system may very well be compromised. Allowing Access: Contact your security administrator and report this issue. Additional Information: Source Context system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 Target Context system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 Target Objects None [ memprotect ] Source dbus-daemon Source Path /bin/dbus-daemon Port <Unknown> Host (removed) Source RPM Packages dbus-1.2.16-5.fc12 Target RPM Packages Policy RPM selinux-policy-3.6.32-10.fc12 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name mmap_zero Host Name (removed) Platform Linux (removed) 2.6.31-0.204.rc9.fc12.x86_64 #1 SMP Sat Sep 5 20:45:55 EDT 2009 x86_64 x86_64 Alert Count 7 First Seen Tue 15 Sep 2009 09:18:34 PM EDT Last Seen Sun 04 Oct 2009 07:28:40 PM EDT Local ID 3508b0ed-b548-4367-9844-2426ae9538b2 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1254698920.441:9): avc: denied { mmap_zero } for pid=813 comm="dbus-daemon" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=memprotect node=(removed) type=SYSCALL msg=audit(1254698920.441:9): arch=c000003e syscall=125 success=no exit=-14 a0=7fffb4884fd4 a1=0 a2=7fffb335ce80 a3=7fff41dc1240 items=0 ppid=1 pid=813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/bin/dbus-daemon" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) audit2allow suggests: #============= system_dbusd_t ============== allow system_dbusd_t self:memprotect mmap_zero;
*** This bug has been marked as a duplicate of bug 525537 ***