Gentoo Archives: gentoo-commits

From: Jason Zaman <perfinion@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/
Date: Sat, 09 Apr 2022 19:28:55
Message-Id: 1649532510.fdaca38de2e7dfa2356925c3e195891ddbb035ad.perfinion@gentoo
1 commit: fdaca38de2e7dfa2356925c3e195891ddbb035ad
2 Author: Kenton Groombridge <me <AT> concord <DOT> sh>
3 AuthorDate: Thu Mar 31 19:16:26 2022 +0000
4 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
5 CommitDate: Sat Apr 9 19:28:30 2022 +0000
6 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=fdaca38d
7
8 container: add missing capabilities
9
10 Signed-off-by: Kenton Groombridge <me <AT> concord.sh>
11 Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>
12
13 policy/modules/services/container.te | 4 ++--
14 1 file changed, 2 insertions(+), 2 deletions(-)
15
16 diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te
17 index fa4145e3..a243eb4a 100644
18 --- a/policy/modules/services/container.te
19 +++ b/policy/modules/services/container.te
20 @@ -163,7 +163,7 @@ corenet_port(container_port_t)
21 #
22
23 allow container_domain self:capability { dac_override kill setgid setuid sys_boot sys_chroot };
24 -allow container_domain self:cap_userns { chown dac_override fowner setgid setuid };
25 +allow container_domain self:cap_userns { chown dac_override dac_read_search fowner kill setgid setuid };
26 allow container_domain self:process { execstack execmem getattr getsched getsession setsched setcap setpgid signal_perms };
27 allow container_domain self:fifo_file manage_fifo_file_perms;
28 allow container_domain self:sem create_sem_perms;
29 @@ -302,7 +302,7 @@ optional_policy(`
30 #
31
32 allow container_net_domain self:capability { net_admin net_raw };
33 -allow container_net_domain self:cap_userns { net_admin net_raw };
34 +allow container_net_domain self:cap_userns { net_admin net_bind_service net_raw };
35 allow container_net_domain self:tcp_socket create_stream_socket_perms;
36 allow container_net_domain self:udp_socket create_socket_perms;
37 allow container_net_domain self:tun_socket create_socket_perms;