Additional info: libreport version: 2.0.18 kernel: 3.6.9-2.fc17.i686 description: :SELinux is preventing Chrome_ChildIOT from 'write' accesses on the file /run/media/aldrian/Application/Chrome-extension/YMailBold/icon.png. : :***** Plugin catchall (100. confidence) suggests *************************** : :If you believe that Chrome_ChildIOT should be allowed write access on the icon.png file by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep Chrome_ChildIOT /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c : 0.c1023 :Target Context system_u:object_r:fusefs_t:s0 :Target Objects /run/media/aldrian/Application/Chrome- : extension/YMailBold/icon.png [ file ] :Source Chrome_ChildIOT :Source Path Chrome_ChildIOT :Port <Unknown> :Host (removed) :Source RPM Packages :Target RPM Packages :Policy RPM selinux-policy-3.10.0-161.fc17.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) 3.6.9-2.fc17.i686 #1 SMP Tue Dec 4 : 14:22:00 UTC 2012 i686 i686 :Alert Count 2 :First Seen 2012-12-12 16:25:38 SGT :Last Seen 2012-12-12 16:26:14 SGT :Local ID 77d7dc29-27da-4d93-92bb-75076518c722 : :Raw Audit Messages :type=AVC msg=audit(1355300774.145:149): avc: denied { write } for pid=7037 comm="Chrome_ChildIOT" path="/run/media/aldrian/Application/Chrome-extension/YMailBold/icon.png" dev="sda5" ino=142521 scontext=unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fusefs_t:s0 tclass=file : : :Hash: Chrome_ChildIOT,chrome_sandbox_t,fusefs_t,file,write : :audit2allow : :#============= chrome_sandbox_t ============== :allow chrome_sandbox_t fusefs_t:file write; : :audit2allow -R : :#============= chrome_sandbox_t ============== :allow chrome_sandbox_t fusefs_t:file write; :
Created attachment 662111 [details] File: type
Created attachment 662112 [details] File: hashmarkername
Looks like a leak. Probably can be ignored.
Aldrian, what is this some kind of usb stick with chrome content on it?
*** Bug 886398 has been marked as a duplicate of this bug. ***
The content it tried to access is in another drive, a Windows partition, which is mounted in the /run/media/aldrian The Chrome itself is in the Linux partition.
Did anything actually break? IE did everything seem to work properly?
I was using this webapp pixlr.com/editor/ and I can't save any file to that location. The app works fine in Windows Chrome. Hmm, actually after further testing, in fact, it can't save to local drive as well, the page just went plain white after trying to save.
The thing we are trying to prevent with this confinement is the chrome sandbox being able to write to the homedir. You need to turn off the confinement using setsebool -P unconfined_chrome_sandbox_transition 1