From f0c980b36c3c79735f0140563f8096e3806cf033 Mon Sep 17 00:00:00 2001 From: Kenton Groombridge Date: Thu, 31 Mar 2022 15:16:26 -0400 Subject: [PATCH] container: add missing capabilities Signed-off-by: Kenton Groombridge --- policy/modules/services/container.te | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te index fa4145e3d..a243eb4a5 100644 --- a/policy/modules/services/container.te +++ b/policy/modules/services/container.te @@ -163,7 +163,7 @@ corenet_port(container_port_t) # allow container_domain self:capability { dac_override kill setgid setuid sys_boot sys_chroot }; -allow container_domain self:cap_userns { chown dac_override fowner setgid setuid }; +allow container_domain self:cap_userns { chown dac_override dac_read_search fowner kill setgid setuid }; allow container_domain self:process { execstack execmem getattr getsched getsession setsched setcap setpgid signal_perms }; allow container_domain self:fifo_file manage_fifo_file_perms; allow container_domain self:sem create_sem_perms; @@ -302,7 +302,7 @@ optional_policy(` # allow container_net_domain self:capability { net_admin net_raw }; -allow container_net_domain self:cap_userns { net_admin net_raw }; +allow container_net_domain self:cap_userns { net_admin net_bind_service net_raw }; allow container_net_domain self:tcp_socket create_stream_socket_perms; allow container_net_domain self:udp_socket create_socket_perms; allow container_net_domain self:tun_socket create_socket_perms;