Bug 665665 - SELinux is preventing /opt/teamviewer/teamviewer/6/wine/bin/wine-preloader from 'mmap_zero' accesses on the memprotect Unknown.
Summary: SELinux is preventing /opt/teamviewer/teamviewer/6/wine/bin/wine-preloader fr...
Keywords:
Status: CLOSED DUPLICATE of bug 882623
Alias: None
Product: Fedora
Classification: Fedora
Component: wine
Version: 19
Hardware: All
OS: Linux
low
medium
Target Milestone: ---
Assignee: Andreas Bierfert
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:7774f653e3d...
: 878709 952211 1027510 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-12-25 19:48 UTC by Heiko Adams
Modified: 2013-11-07 11:40 UTC (History)
22 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2013-06-07 15:09:55 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Heiko Adams 2010-12-25 19:48:57 UTC
SELinux is preventing /opt/teamviewer/teamviewer/6/wine/bin/wine-preloader from 'mmap_zero' accesses on the memprotect Unknown.

*****  Plugin mmap_zero (53.1 confidence) suggests  **************************

If you do not think /opt/teamviewer/teamviewer/6/wine/bin/wine-preloader should need to mmap low memory in the kernel.
Then you may be under attack by a hacker, this is a very dangerous access.
Do
contact your security administrator and report this issue.

*****  Plugin catchall_boolean (42.6 confidence) suggests  *******************

If you want to control the ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr.
Then you must tell SELinux about this by enabling the 'mmap_low_allowed' boolean.
Do
setsebool -P mmap_low_allowed 1

*****  Plugin catchall (5.76 confidence) suggests  ***************************

If you believe that wine-preloader should be allowed mmap_zero access on the Unknown memprotect by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep /opt/teamviewer/teamviewer/6/wine/bin/wine-preloader /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                unconfined_u:unconfined_r:unconfined_t:s0
Target Context                unconfined_u:unconfined_r:unconfined_t:s0
Target Objects                Unknown [ memprotect ]
Source                        wine-preloader
Source Path                   /opt/teamviewer/teamviewer/6/wine/bin/wine-
                              preloader
Port                          <Unbekannt>
Host                          (removed)
Source RPM Packages           teamviewer6-6.0.9224-1
Target RPM Packages           
Policy RPM                    selinux-policy-3.9.7-18.fc14
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 2.6.35.10-72.fc14.i686 #1 SMP
                              Mon Dec 20 22:05:49 UTC 2010 i686 i686
Alert Count                   5
First Seen                    Sa 25 Dez 2010 20:39:15 CET
Last Seen                     Sa 25 Dez 2010 20:39:15 CET
Local ID                      c299c792-a72a-4b0b-9ef0-b76376ac2d42

Raw Audit Messages
type=AVC msg=audit(1293305955.694:465): avc:  denied  { mmap_zero } for  pid=11658 comm="wine-preloader" scontext=unconfined_u:unconfined_r:unconfined_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=memprotect

wine-preloader,unconfined_t,unconfined_t,memprotect,mmap_zero
type=SYSCALL msg=audit(1293305955.694:465): arch=i386 syscall=mmap success=no exit=EACCES a0=bf862b80 a1=0 a2=bf862b80 a3=fffff000 items=0 ppid=11656 pid=11658 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm=wine-preloader exe=/opt/teamviewer/teamviewer/6/wine/bin/wine-preloader subj=unconfined_u:unconfined_r:unconfined_t:s0 key=(null)
wine-preloader,unconfined_t,unconfined_t,memprotect,mmap_zero

#============= unconfined_t ==============
#!!!! This avc can be allowed using the boolean 'mmap_low_allowed'

allow unconfined_t self:memprotect mmap_zero;

Comment 1 Daniel Walsh 2010-12-28 12:16:15 UTC
If you want to run wine apps that need mmap_zero, you need to turn on the boolean
As described in the alert.

#setsebool -P mmap_low_allowed 1

Comment 2 Daniel Walsh 2012-11-21 10:52:58 UTC
*** Bug 878709 has been marked as a duplicate of this bug. ***

Comment 3 Miroslav Grepl 2013-04-16 08:40:26 UTC
*** Bug 952211 has been marked as a duplicate of this bug. ***

Comment 4 Karel Volný 2013-06-05 12:29:01 UTC
(In reply to Daniel Walsh from comment #1)
> If you want to run wine apps that need mmap_zero, you need to turn on the
> boolean
> As described in the alert.
> 
> #setsebool -P mmap_low_allowed 1

sorry to bother your circles but I don't agree that apps in their default configuration can throw errors on users and you blame users for those errors

if you believe wine should not be allowed to do this and refuse to change the default policy then wine has to be fixed not to try something nasty - probably it doesn't need it 'cause the application I've used (Finale Notepad) runs fine despite the denial

but if you want to "increase" security by learning people to disable selinux altogether not to be bothered by bugs the devels refuse to deal with, you're on the best path to it ...

Comment 5 Karel Volný 2013-06-05 12:33:31 UTC
SELinux is preventing /usr/bin/wine-preloader from mmap_zero access on the memprotect .

*****  Plugin mmap_zero (53.1 confidence) suggests  **************************

If you do not think /usr/bin/wine-preloader should need to mmap low memory in the kernel.
Then you may be under attack by a hacker, this is a very dangerous access.
Do
contact your security administrator and report this issue.

*****  Plugin catchall_boolean (42.6 confidence) suggests  *******************

If you want to control the ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr.
Then you must tell SELinux about this by enabling the 'mmap_low_allowed' boolean.
You can read 'unconfined_selinux' man page for more details.
Do
setsebool -P mmap_low_allowed 1

*****  Plugin catchall (5.76 confidence) suggests  ***************************

If you believe that wine-preloader should be allowed mmap_zero access on the  memprotect by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep wine-preloader /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1
                              023
Target Context                unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1
                              023
Target Objects                 [ memprotect ]
Source                        wine-preloader
Source Path                   /usr/bin/wine-preloader
Port                          <Neznámé>
Host                          (removed)
Source RPM Packages           wine-core-1.5.29-1.fc19.i686
Target RPM Packages           
Policy RPM                    selinux-policy-3.12.1-47.fc19.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux kvolny.usersys.redhat.com
                              3.9.4-300.fc19.x86_64 #1 SMP Fri May 24 22:17:06
                              UTC 2013 x86_64 x86_64
Alert Count                   4
First Seen                    2013-06-05 14:10:46 CEST
Last Seen                     2013-06-05 14:11:26 CEST
Local ID                      188ae4c0-2a30-4c5e-8637-4a1fff3cc419

Raw Audit Messages
type=AVC msg=audit(1370434286.178:233): avc:  denied  { mmap_zero } for  pid=4522 comm="wine-preloader" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=memprotect


type=SYSCALL msg=audit(1370434286.178:233): arch=i386 syscall=chmod success=no exit=EACCES a0=ffc8f350 a1=ffc8f350 a2=0 a3=ffc8f540 items=0 ppid=1 pid=4522 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 ses=1 tty=(none) comm=wine-preloader exe=/usr/bin/wine-preloader subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)

Hash: wine-preloader,unconfined_t,unconfined_t,memprotect,mmap_zero

Comment 6 Eric Paris 2013-06-07 15:09:55 UTC
application is the wine preloader

*** This bug has been marked as a duplicate of bug 882623 ***

Comment 7 Miroslav Grepl 2013-11-07 11:40:08 UTC
*** Bug 1027510 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.