Additional info: libreport version: 2.0.17 kernel: 3.6.3-3.fc18.i686.PAE description: :SELinux is preventing chrome from 'mmap_zero' accesses on the memprotect . : :***** Plugin mmap_zero (53.1 confidence) suggests ************************** : :If you do not think chrome should need to mmap low memory in the kernel. :Then you may be under attack by a hacker, this is a very dangerous access. :Do :contact your security administrator and report this issue. : :***** Plugin catchall_boolean (42.6 confidence) suggests ******************* : :If you want to mmap_low_allowed :Then you must tell SELinux about this by enabling the 'mmap_low_allowed' boolean.You can read 'unconfined_selinux' man page for more details. :Do :setsebool -P mmap_low_allowed 1 : :***** Plugin catchall (5.76 confidence) suggests *************************** : :If you believe that chrome should be allowed mmap_zero access on the memprotect by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep chrome /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 : 023 :Target Context unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 : 023 :Target Objects [ memprotect ] :Source chrome :Source Path chrome :Port <Unknown> :Host (removed) :Source RPM Packages :Target RPM Packages :Policy RPM selinux-policy-3.11.1-46.fc18.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) 3.6.3-3.fc18.i686.PAE #1 SMP Tue : Oct 23 15:03:41 UTC 2012 i686 i686 :Alert Count 67 :First Seen 2012-10-28 02:15:07 YEKT :Last Seen 2012-10-28 02:15:08 YEKT :Local ID 4a243964-1d9e-433c-9ad1-d367a5d48d72 : :Raw Audit Messages :type=AVC msg=audit(1351368908.830:416): avc: denied { mmap_zero } for pid=2166 comm="chrome" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=memprotect : : :Hash: chrome,unconfined_t,unconfined_t,memprotect,mmap_zero : :audit2allow : :#============= unconfined_t ============== :#!!!! This avc can be allowed using the boolean 'mmap_low_allowed' : :allow unconfined_t self:memprotect mmap_zero; : :audit2allow -R : :#============= unconfined_t ============== :#!!!! This avc can be allowed using the boolean 'mmap_low_allowed' : :allow unconfined_t self:memprotect mmap_zero; :
Created attachment 634329 [details] File: type
Created attachment 634330 [details] File: hashmarkername
*** This bug has been marked as a duplicate of bug 859625 ***
*** Bug 964377 has been marked as a duplicate of this bug. ***