From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id C72E91582EF for ; Sat, 08 Mar 2025 23:55:50 +0000 (UTC) Received: from lists.gentoo.org (bobolink.gentoo.org [140.211.166.189]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) (Authenticated sender: relay-lists.gentoo.org@gentoo.org) by smtp.gentoo.org (Postfix) with ESMTPSA id B485C343066 for ; Sat, 08 Mar 2025 23:55:50 +0000 (UTC) Received: from bobolink.gentoo.org (localhost [127.0.0.1]) by bobolink.gentoo.org (Postfix) with ESMTP id 1F30211047D; Sat, 08 Mar 2025 23:55:09 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by bobolink.gentoo.org (Postfix) with ESMTPS id 15E8A11047D for ; Sat, 08 Mar 2025 23:55:09 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id C71F0335D6A for ; Sat, 08 Mar 2025 23:55:08 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 3A27528B9 for ; Sat, 08 Mar 2025 23:55:05 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1741476403.5ccf5a015d8e38faabc6ca2816a0f1d4e0e72486.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/services/chronyd.te X-VCS-Directories: policy/modules/services/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 5ccf5a015d8e38faabc6ca2816a0f1d4e0e72486 X-VCS-Branch: master Date: Sat, 08 Mar 2025 23:55:05 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: d17744c6-e49b-4e45-b0af-4dbd7824f537 X-Archives-Hash: b9e5bf467a9bc2926c6adb0540128d26 commit: 5ccf5a015d8e38faabc6ca2816a0f1d4e0e72486 Author: Clayton Casciato 21sw us> AuthorDate: Thu Feb 27 22:53:30 2025 +0000 Commit: Jason Zaman gentoo org> CommitDate: Sat Mar 8 23:26:43 2025 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=5ccf5a01 chronyd: fix dac_read_search denials avc: denied { dac_read_search } comm=chronyd capability=dac_read_search scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:system_r:chronyd_t:s0 tclass=capability -- Fedora chronyd_t https://github.com/fedora-selinux/selinux-policy/blob/281599ec3a5f0cc0d423b98bb76c71c1a5d76870/policy/modules/contrib/chronyd.te#L55 chronyc_t https://github.com/fedora-selinux/selinux-policy/blob/281599ec3a5f0cc0d423b98bb76c71c1a5d76870/policy/modules/contrib/chronyd.te#L257 -- Reference: https://danwalsh.livejournal.com/77140.html Signed-off-by: Clayton Casciato 21sw.us> Signed-off-by: Jason Zaman gentoo.org> policy/modules/services/chronyd.te | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/policy/modules/services/chronyd.te b/policy/modules/services/chronyd.te index 9e6ba5bf1..3d4007a57 100644 --- a/policy/modules/services/chronyd.te +++ b/policy/modules/services/chronyd.te @@ -54,7 +54,7 @@ logging_log_file(chronyd_var_log_t) # chronyd local policy # -allow chronyd_t self:capability { chown dac_override ipc_lock setgid setuid sys_resource sys_time }; +allow chronyd_t self:capability { chown dac_override dac_read_search ipc_lock setgid setuid sys_resource sys_time }; allow chronyd_t self:process { getcap setcap setrlimit signal }; allow chronyd_t self:shm create_shm_perms; allow chronyd_t self:fifo_file rw_fifo_file_perms; @@ -134,7 +134,7 @@ optional_policy(` # chronyc local policy # -allow chronyc_t self:capability { dac_override }; +allow chronyc_t self:capability { dac_override dac_read_search }; allow chronyc_t self:process { signal }; allow chronyc_t self:udp_socket create_socket_perms; allow chronyc_t self:netlink_route_socket create_netlink_socket_perms;