1 |
commit: 48dc4ab330d1d22ff816d728919604a284cbcee9 |
2 |
Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> |
3 |
AuthorDate: Wed Sep 25 18:27:34 2013 +0000 |
4 |
Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org> |
5 |
CommitDate: Fri Sep 27 13:23:27 2013 +0000 |
6 |
URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=48dc4ab3 |
7 |
|
8 |
Allow ping to get/set capabilities |
9 |
|
10 |
When ping is installed with capabilities instead of being marked setuid, |
11 |
then the ping_t domain needs to be allowed to getcap/setcap. |
12 |
|
13 |
Reported-by: Luis Ressel <aranea <AT> aixah.de> |
14 |
Signed-off-by: Sven Vermeulen <sven.vermeulen <AT> siphos.be> |
15 |
|
16 |
--- |
17 |
policy/modules/admin/netutils.te | 2 ++ |
18 |
1 file changed, 2 insertions(+) |
19 |
|
20 |
diff --git a/policy/modules/admin/netutils.te b/policy/modules/admin/netutils.te |
21 |
index 59933cd..f443186 100644 |
22 |
--- a/policy/modules/admin/netutils.te |
23 |
+++ b/policy/modules/admin/netutils.te |
24 |
@@ -106,6 +106,8 @@ optional_policy(` |
25 |
# |
26 |
|
27 |
allow ping_t self:capability { setuid net_raw }; |
28 |
+# When ping is installed with capabilities instead of setuid |
29 |
+allow ping_t self:process { getcap setcap }; |
30 |
dontaudit ping_t self:capability sys_tty_config; |
31 |
allow ping_t self:tcp_socket create_socket_perms; |
32 |
allow ping_t self:rawip_socket { create ioctl read write bind getopt setopt }; |