***** Plugin mmap_zero (53.1 confidence) suggests
**************************
If you do not think /usr/bin/skype should need to mmap low memory in
the kernel.
Then you may be under attack by a hacker, this is a very dangerous
access.
Do
contact your security administrator and report this issue.
***** Plugin catchall_boolean (42.6 confidence) suggests
*******************
If you want to control the ability to mmap a low area of the address
space, as configured by /proc/sys/kernel/mmap_min_addr.
Then you must tell SELinux about this by enabling the
'mmap_low_allowed' boolean.
Do
setsebool -P mmap_low_allowed 1
***** Plugin catchall (5.76 confidence) suggests
***************************
If you believe that skype should be allowed mmap_zero access on the
Unknown memprotect by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep threaded-ml /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context unconfined_u:unconfined_r:unconfined_execmem_t:s0-
s0:c0.c1023
Target Context unconfined_u:unconfined_r:unconfined_execmem_t:s0-
s0:c0.c1023
Target Objects Unknown [ memprotect ]
Source threaded-ml
Source Path /usr/bin/skype
Port <Unknown>
Host
anjaz.intelvision.sc
Source RPM Packages skype-2.2.0.35-fc10
Target RPM Packages
Policy RPM selinux-policy-3.9.16-35.fc15
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name
anjaz.intelvision.sc
Platform Linux
anjaz.intelvision.sc 2.6.38.8-35.fc15.x86_64
#1 SMP Wed Jul 6 13:58:54 UTC 2011 x86_64 x86_64
Alert Count 125
First Seen Tue 09 Aug 2011 03:49:24 PM SCT
Last Seen Tue 09 Aug 2011 03:49:27 PM SCT
Local ID 943f7e9f-e074-437d-9ad1-cf76ac9f7615
Raw Audit Messages
type=AVC msg=audit(1312890567.697:245): avc: denied { mmap_zero }
for pid=4405 comm="skype"
scontext=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023
tcontext=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023
tclass=memprotect
type=SYSCALL msg=audit(1312890567.697:245): arch=i386
syscall=lgetxattr per=400000 success=no exit=EACCES a0=0 a1=1000
a2=3 a3=22 items=0 ppid=1769 pid=4405 auid=500 uid=500 gid=500
euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none)
ses=1 comm=skype exe=/usr/bin/skype
subj=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023
key=(null)
Hash:
threaded-ml,unconfined_execmem_t,unconfined_execmem_t,memprotect,mmap_zero
audit2allow
#============= unconfined_execmem_t ==============
#!!!! This avc can be allowed using the boolean 'mmap_low_allowed'
allow unconfined_execmem_t self:memprotect mmap_zero;
audit2allow -R
#============= unconfined_execmem_t ==============
#!!!! This avc can be allowed using the boolean 'mmap_low_allowed'
allow unconfined_execmem_t self:memprotect mmap_zero;