From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 49AB3138A2F for ; Tue, 19 Aug 2014 20:07:34 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 62A5EE07F1; Tue, 19 Aug 2014 20:07:33 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id D2669E0806 for ; Tue, 19 Aug 2014 20:07:32 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id DA504340177 for ; Tue, 19 Aug 2014 20:07:31 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 883D33946 for ; Tue, 19 Aug 2014 20:07:30 +0000 (UTC) From: "Sven Vermeulen" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" Message-ID: <1408478796.ed4c234f64e2e952f796563b8a7bb4a23b3210cc.swift@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/admin/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/admin/netutils.te X-VCS-Directories: policy/modules/admin/ X-VCS-Committer: swift X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: ed4c234f64e2e952f796563b8a7bb4a23b3210cc X-VCS-Branch: master Date: Tue, 19 Aug 2014 20:07:30 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: e8eb9bac-72e7-4448-b35e-bd91912b11a2 X-Archives-Hash: 2b655c423fa1be032eb409e2cd78854f commit: ed4c234f64e2e952f796563b8a7bb4a23b3210cc Author: Luis Ressel aixah de> AuthorDate: Thu Jun 26 21:22:07 2014 +0000 Commit: Sven Vermeulen gentoo org> CommitDate: Tue Aug 19 20:06:36 2014 +0000 URL: http://sources.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=ed4c234f Grant ping_t getattr on rawip_socket If the (sadly nearly undocumented) Linux kernel feature which allows specific user groups to send ICMP echos without CAP_NET_RAW (configurable with the sysctl net.ipv4.ping_group_range, available since 3.0) is used, ping needs the getattr permission of the rawip_socket class in order to work. --- policy/modules/admin/netutils.te | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/policy/modules/admin/netutils.te b/policy/modules/admin/netutils.te index 7aa7384..570bf2c 100644 --- a/policy/modules/admin/netutils.te +++ b/policy/modules/admin/netutils.te @@ -110,7 +110,7 @@ allow ping_t self:capability { setuid net_raw }; allow ping_t self:process { getcap setcap }; dontaudit ping_t self:capability sys_tty_config; allow ping_t self:tcp_socket create_socket_perms; -allow ping_t self:rawip_socket { create ioctl read write bind getopt setopt }; +allow ping_t self:rawip_socket { create ioctl read write bind getopt setopt getattr }; allow ping_t self:packet_socket { create ioctl read write bind getopt setopt }; allow ping_t self:netlink_route_socket create_netlink_socket_perms;