From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 95204138D18 for ; Wed, 15 Jul 2015 13:47:40 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 6FFACE07E2; Wed, 15 Jul 2015 13:47:38 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 1F299E07E2 for ; Wed, 15 Jul 2015 13:47:38 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 19E16340A66 for ; Wed, 15 Jul 2015 13:47:37 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 8EFA074C for ; Wed, 15 Jul 2015 13:47:30 +0000 (UTC) From: "Sven Vermeulen" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" Message-ID: <1436967893.770ab52d286978f77fc9ebc650cbf0a8f04663ce.swift@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/admin/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/admin/su.if X-VCS-Directories: policy/modules/admin/ X-VCS-Committer: swift X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: 770ab52d286978f77fc9ebc650cbf0a8f04663ce X-VCS-Branch: master Date: Wed, 15 Jul 2015 13:47:30 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: cf185ab9-002c-4ea1-972d-335897288090 X-Archives-Hash: e75bc3492338150afa878daf7d155ec2 commit: 770ab52d286978f77fc9ebc650cbf0a8f04663ce Author: Sven Vermeulen siphos be> AuthorDate: Wed Jul 15 13:44:53 2015 +0000 Commit: Sven Vermeulen gentoo org> CommitDate: Wed Jul 15 13:44:53 2015 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=770ab52d Fix avc_context_to_raw assertion in su domains (bug #554080) Although earlier investigations on the same matter [1] did not result in a good fix (it seemed that the permissions where needed for the wrong reasons, but would most likely require a fix in either the application that is SELinux-aware or in how the permissions are handled). It does not look like we will see a proper solution in the near future. [1] http://oss.tresys.com/pipermail/refpolicy/2014-April/007058.html So allow the permissions (without write / send/recv_msg) to allow su domains to go forward. X-Gentoo-Bug: 554080 X-Gentoo-Bug-URL: https://bugs.gentoo.org/show_bug.cgi?id=554080 policy/modules/admin/su.if | 2 ++ 1 file changed, 2 insertions(+) diff --git a/policy/modules/admin/su.if b/policy/modules/admin/su.if index aea8a4f..a069cb8 100644 --- a/policy/modules/admin/su.if +++ b/policy/modules/admin/su.if @@ -119,6 +119,8 @@ template(`su_restricted_domain_template', ` ') ifdef(`distro_gentoo',` + # Fix bug 554080 - Allow su to query SELinux subsystem (netlink_selinux_socket) + allow $1_su_t self:netlink_selinux_socket { create bind read }; selinux_get_fs_mount($1_su_t) ') ')