aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJason Zaman <jason@perfinion.com>2017-05-07 11:39:18 +0800
committerJason Zaman <jason@perfinion.com>2017-05-08 01:40:29 +0800
commit83244b1264056d64fe3c979671a68ec3a80cd7dd (patch)
tree2f22c880859ebca235570dfc5bea81036c389dc3
parentmodutils: kmod_tmpfiles_conf_t create should be allowed even for openrc (diff)
downloadhardened-refpolicy-83244b12.tar.gz
hardened-refpolicy-83244b12.tar.bz2
hardened-refpolicy-83244b12.zip
chromium: allow cap_userns for the sandbox
https://patchwork.kernel.org/patch/8785151/
-rw-r--r--policy/modules/contrib/chromium.te7
1 files changed, 5 insertions, 2 deletions
diff --git a/policy/modules/contrib/chromium.te b/policy/modules/contrib/chromium.te
index cd1e1116b..a4fba97c0 100644
--- a/policy/modules/contrib/chromium.te
+++ b/policy/modules/contrib/chromium.te
@@ -89,10 +89,12 @@ xdg_cache_home_content(chromium_xdg_cache_t)
#
# execmem for load in plugins
-allow chromium_t self:process { execmem getsched setcap setrlimit setsched sigkill signal };
-allow chromium_t self:fifo_file rw_fifo_file_perms;;
+allow chromium_t self:process { execmem getsched getcap setcap setrlimit setsched sigkill signal };
+allow chromium_t self:fifo_file rw_fifo_file_perms;
allow chromium_t self:sem create_sem_perms;
allow chromium_t self:netlink_kobject_uevent_socket client_stream_socket_perms;
+# cap_userns sys_admin for the sandbox
+allow chromium_t self:cap_userns { sys_admin sys_chroot sys_ptrace };
allow chromium_t chromium_exec_t:file execute_no_trans;
@@ -135,6 +137,7 @@ domtrans_pattern(chromium_t, chromium_sandbox_exec_t, chromium_sandbox_t)
domtrans_pattern(chromium_t, chromium_naclhelper_exec_t, chromium_naclhelper_t)
kernel_list_proc(chromium_t)
+kernel_read_net_sysctls(chromium_t)
corecmd_exec_bin(chromium_t)
# Look for /etc/gentoo-release through a shell invocation running find