Bug 717100 - SELinux is preventing /opt/google/chrome/chrome from loading /opt/google/chrome/chrome which requires text relocation.
Summary: SELinux is preventing /opt/google/chrome/chrome from loading /opt/google/chro...
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: x86_64
OS: Linux
unspecified
medium
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:99048f0efa2...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-06-28 02:09 UTC by Neil Calkin
Modified: 2012-04-21 17:06 UTC (History)
13 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-06-28 08:54:56 UTC
Type: ---


Attachments (Terms of Use)

Description Neil Calkin 2011-06-28 02:09:58 UTC
Summary:

SELinux is preventing /opt/google/chrome/chrome from loading
/opt/google/chrome/chrome which requires text relocation.

Detailed Description:

The chrome application attempted to load /opt/google/chrome/chrome which
requires text relocation. This is a potential security problem. Most libraries
do not need this permission. Libraries are sometimes coded incorrectly and
request this permission. The SELinux Memory Protection Tests
(http://people.redhat.com/drepper/selinux-mem.html) web page explains how to
remove this requirement. You can configure SELinux temporarily to allow
/opt/google/chrome/chrome to use relocation as a workaround, until the library
is fixed. Please file a bug report.

Allowing Access:

If you trust /opt/google/chrome/chrome to run correctly, you can change the file
context to textrel_shlib_t. "chcon -t textrel_shlib_t
'/opt/google/chrome/chrome'" You must also change the default file context files
on the system in order to preserve them even on a full relabel. "semanage
fcontext -a -t textrel_shlib_t '/opt/google/chrome/chrome'"

Fix Command:

chcon -t textrel_shlib_t '/opt/google/chrome/chrome'

Additional Information:

Source Context                unconfined_u:unconfined_r:unconfined_execmem_t:s0-
                              s0:c0.c1023
Target Context                system_u:object_r:execmem_exec_t:s0
Target Objects                /opt/google/chrome/chrome [ file ]
Source                        chrome
Source Path                   /opt/google/chrome/chrome
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           google-chrome-unstable-14.0.803.0-90483
Target RPM Packages           google-chrome-unstable-14.0.803.0-90483
Policy RPM                    selinux-policy-3.6.32-127.fc12
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Plugin Name                   allow_execmod
Host Name                     (removed)
Platform                      Linux paul 2.6.32.26-175.fc12.x86_64 #1 SMP Wed
                              Dec 1 21:39:34 UTC 2010 x86_64 x86_64
Alert Count                   1
First Seen                    Mon 27 Jun 2011 10:08:03 PM EDT
Last Seen                     Mon 27 Jun 2011 10:08:03 PM EDT
Local ID                      d7a9a7cc-a553-469a-bd3a-bbae6868f843
Line Numbers                  

Raw Audit Messages            

node=paul type=AVC msg=audit(1309226883.173:239): avc:  denied  { execmod } for  pid=25090 comm="chrome" path="/opt/google/chrome/chrome" dev=dm-3 ino=41 scontext=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 tcontext=system_u:object_r:execmem_exec_t:s0 tclass=file

node=paul type=SYSCALL msg=audit(1309226883.173:239): arch=c000003e syscall=10 success=no exit=-13 a0=7f4b8c87a000 a1=368e000 a2=5 a3=7f4b8cd8d2c8 items=0 ppid=1 pid=25090 auid=501 uid=501 gid=501 euid=501 suid=501 fsuid=501 egid=501 sgid=501 fsgid=501 tty=(none) ses=1 comm="chrome" exe="/opt/google/chrome/chrome" subj=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  allow_execmod,chrome,unconfined_execmem_t,execmem_exec_t,file,execmod
audit2allow suggests:

#============= unconfined_execmem_t ==============
#!!!! This avc can be allowed using the boolean 'allow_execmod'

allow unconfined_execmem_t execmem_exec_t:file execmod;

Comment 1 Miroslav Grepl 2011-06-28 08:54:56 UTC
F12 is no longer supported. Please update to newer Fedora release.


Note You need to log in before you can comment on or make changes to this bug.