audit warnings under armel with file_mmap operation on /etc/passwd and /etc/group

Bug #364290 reported by Loïc Minier
254
Affects Status Importance Assigned to Milestone
apparmor (Ubuntu)
Confirmed
High
Kees Cook

Bug Description

Binary package hint: cups

Hi,

on a freshly installed armel iMX51 Babbage board, I get these warnings in dmesg which seem specific to armel/imx51:
[42949555.850000] type=1503 audit(1240258198.065:14): operation="file_mmap" requested_mask="::mr" denied_mask="::m" fsuid=7 name="/etc/passwd" pid=3174 profile="/usr/sbin/cupsd"
[42949555.850000] type=1503 audit(1240258198.065:15): operation="file_mmap" requested_mask="mr::" denied_mask="m::" fsuid=0 name="/etc/group" pid=2635 profile="/usr/sbin/cupsd"
[42949555.850000] type=1503 audit(1240258198.065:16): operation="file_mmap" requested_mask="mr::" denied_mask="m::" fsuid=0 name="/etc/group" pid=2635 profile="/usr/sbin/cupsd"
[42949555.860000] type=1503 audit(1240258198.075:17): operation="file_mmap" requested_mask="mr::" denied_mask="m::" fsuid=0 name="/etc/group" pid=2635 profile="/usr/sbin/cupsd"
[42949555.860000] type=1503 audit(1240258198.075:18): operation="file_mmap" requested_mask="mr::" denied_mask="m::" fsuid=0 name="/etc/group" pid=2635 profile="/usr/sbin/cupsd"
[42949559.100000] type=1503 audit(1240258201.315:19): operation="file_mmap" requested_mask="mr::" denied_mask="m::" fsuid=0 name="/etc/group" pid=2635 profile="/usr/sbin/cupsd"

perhaps a kernel config is missing or something?

Bye

ProblemType: Bug
Architecture: armel
DistroRelease: Ubuntu 9.04
Lpstat: Error: command ['lpstat', '-v'] failed with exit code 1: lpstat: No destinations added.
Lspci:
 Error: command ['lspci', '-vvnn'] failed with exit code 1: pcilib: Cannot open /proc/bus/pci
 lspci: Cannot find any working access method.
Package: cups 1.3.9-17ubuntu1
Papersize: a4
ProcCmdLine: root=UUID=e1f65003-2e6a-4f5d-80fa-cfb84fa10a09 ro quiet
ProcEnviron:
 LANG=fr_FR.UTF-8
 SHELL=/bin/bash
ProcVersionSignature: Ubuntu 2.6.28-11.42-imx51
SourcePackage: cups

Revision history for this message
Loïc Minier (lool) wrote :
Revision history for this message
Kees Cook (kees) wrote :

This is still under investigation, but is essentially the same issue seen on i386 when klibc had an executable stack, causing the READ_IMPLIES_EXEC process personality flag to get set. It is not yet clear what the origin of this flag on ARM is, since the architecture is new enough not to flag it, and the ELF doesn't show an executable GNU_STACK header.

Changed in cups (Ubuntu):
status: New → Triaged
security vulnerability: no → yes
Changed in cups (Ubuntu):
importance: Undecided → High
status: Triaged → Confirmed
Kees Cook (kees)
affects: cups (Ubuntu) → apparmor (Ubuntu)
Changed in apparmor (Ubuntu):
assignee: nobody → Kees Cook (kees)
Loïc Minier (lool)
tags: added: arm
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.