1 |
commit: 639bfc231cae05ce9ff11b367e25f934a59bf23e |
2 |
Author: Dave Sugar <dsugar100 <AT> gmail <DOT> com> |
3 |
AuthorDate: Thu Aug 25 13:28:00 2022 +0000 |
4 |
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> |
5 |
CommitDate: Sat Sep 3 19:07:50 2022 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=639bfc23 |
7 |
|
8 |
firewalld: read to read fips_enabled sysctl |
9 |
|
10 |
node=localhost type=AVC msg=audit(1661396058.360:317): avc: denied { search } for pid=1014 comm="firewalld" name="crypto" dev="proc" ino=10510 scontext=system_u:system_r:firewalld_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=1 |
11 |
node=localhost type=AVC msg=audit(1661396058.360:317): avc: denied { read } for pid=1014 comm="firewalld" name="fips_enabled" dev="proc" ino=10511 scontext=system_u:system_r:firewalld_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file permissive=1 |
12 |
node=localhost type=AVC msg=audit(1661396058.360:317): avc: denied { open } for pid=1014 comm="firewalld" path="/proc/sys/crypto/fips_enabled" dev="proc" ino=10511 scontext=system_u:system_r:firewalld_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file permissive=1 |
13 |
node=localhost type=AVC msg=audit(1661396058.361:318): avc: denied { getattr } for pid=1014 comm="firewalld" path="/proc/sys/crypto/fips_enabled" dev="proc" ino=10511 scontext=system_u:system_r:firewalld_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file permissive=1 |
14 |
node=localhost type=AVC msg=audit(1661396058.664:340): avc: denied { search } for pid=1014 comm="firewalld" name="crypto" dev="proc" ino=10510 scontext=system_u:system_r:firewalld_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=1 |
15 |
|
16 |
Signed-off-by: Dave Sugar <dsugar100 <AT> gmail.com> |
17 |
Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org> |
18 |
|
19 |
policy/modules/services/firewalld.te | 1 + |
20 |
1 file changed, 1 insertion(+) |
21 |
|
22 |
diff --git a/policy/modules/services/firewalld.te b/policy/modules/services/firewalld.te |
23 |
index cb37c98b..b51b7740 100644 |
24 |
--- a/policy/modules/services/firewalld.te |
25 |
+++ b/policy/modules/services/firewalld.te |
26 |
@@ -53,6 +53,7 @@ manage_dirs_pattern(firewalld_t, firewalld_runtime_t, firewalld_runtime_t) |
27 |
manage_files_pattern(firewalld_t, firewalld_runtime_t, firewalld_runtime_t) |
28 |
files_runtime_filetrans(firewalld_t, firewalld_runtime_t, { dir file }) |
29 |
|
30 |
+kernel_read_crypto_sysctls(firewalld_t) |
31 |
kernel_read_network_state(firewalld_t) |
32 |
kernel_read_system_state(firewalld_t) |
33 |
kernel_rw_net_sysctls(firewalld_t) |