Bug 1500287
Summary: | Running /usr/sbin/ntpd -u ntp:ntp in container produces AVC denial | |||
---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Jan Pazdziora (Red Hat) <jpazdziora> | |
Component: | ntp | Assignee: | Miroslav Lichvar <mlichvar> | |
Status: | CLOSED UPSTREAM | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | |
Severity: | unspecified | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 26 | CC: | amurdaca, dwalsh, fkluknav, jchaloup, jlebon, jpazdziora, linville, lsm5, mlichvar, slaznick | |
Target Milestone: | --- | Keywords: | Reopened | |
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | If docs needed, set a value | ||
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1520447 (view as bug list) | Environment: | ||
Last Closed: | 2017-10-10 15:40:40 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1520447 |
Description
Jan Pazdziora (Red Hat)
2017-10-10 10:45:27 UTC
We are not allowing containers to requiest loading of kernel modules. If a kernel module needs to be loaded, then it needs to be done via the Administrator or by the packager. I wrote about This here. https://danwalsh.livejournal.com/77415.html I think this is loading a kernel module to use ipv6. The problem is a user could request the loading of any ancient network protocol which could have a vulnerability, and we don't want to allow this by default. Thanks. Could we have a boolean to be able to silence the denials? We have domain_kernel_load_modules to (I assume) allow them to pass but maybe we can silence them? Anyway, reopening and moving to ntp component. What does ntpd need net-pf-0 for? Based on https://medium.com/cri-o/cri-o-has-builtin-selinux-support-6ff45b707cf0, it's AF_UNSPEC -- could it be avoided altogether? This seems to be a bug in ntpd. It calls socket() on a sockaddr which was zeroed with memset(). Upstream bug report: http://bugs.ntp.org/show_bug.cgi?id=3437 Awesome. Miroslav, thanks a bunch for the quick turnaround. |