commit: 639bfc231cae05ce9ff11b367e25f934a59bf23e
Author: Dave Sugar <dsugar100 <AT> gmail <DOT> com>
AuthorDate: Thu Aug 25 13:28:00 2022 +0000
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Sat Sep 3 19:07:50 2022 +0000
URL:
https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=639bfc23
firewalld: read to read fips_enabled sysctl
node=localhost type=AVC msg=audit(1661396058.360:317): avc: denied { search }
for pid=1014 comm="firewalld" name="crypto" dev="proc" ino=10510
scontext=system_u:system_r:firewalld_t:s0
tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=1
node=localhost type=AVC msg=audit(1661396058.360:317): avc: denied { read }
for pid=1014 comm="firewalld" name="fips_enabled" dev="proc" ino=10511
scontext=system_u:system_r:firewalld_t:s0
tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file permissive=1
node=localhost type=AVC msg=audit(1661396058.360:317): avc: denied { open }
for pid=1014 comm="firewalld" path="/proc/sys/crypto/fips_enabled" dev="proc"
ino=10511 scontext=system_u:system_r:firewalld_t:s0
tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file permissive=1
node=localhost type=AVC msg=audit(1661396058.361:318): avc: denied { getattr
} for pid=1014 comm="firewalld" path="/proc/sys/crypto/fips_enabled"
dev="proc" ino=10511 scontext=system_u:system_r:firewalld_t:s0
tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file permissive=1
node=localhost type=AVC msg=audit(1661396058.664:340): avc: denied { search }
for pid=1014 comm="firewalld" name="crypto" dev="proc" ino=10510
scontext=system_u:system_r:firewalld_t:s0
tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=1
Signed-off-by: Dave Sugar <dsugar100 <AT> gmail.com>
Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>
policy/modules/services/firewalld.te | 1 +
1 file changed, 1 insertion(+)
diff --git a/policy/modules/services/firewalld.te
b/policy/modules/services/firewalld.te
index cb37c98b..b51b7740 100644
--- a/policy/modules/services/firewalld.te
+++ b/policy/modules/services/firewalld.te
@@ -53,6 +53,7 @@ manage_dirs_pattern(firewalld_t, firewalld_runtime_t,
firewalld_runtime_t)
manage_files_pattern(firewalld_t, firewalld_runtime_t, firewalld_runtime_t)
files_runtime_filetrans(firewalld_t, firewalld_runtime_t, { dir file })
+kernel_read_crypto_sysctls(firewalld_t)
kernel_read_network_state(firewalld_t)
kernel_read_system_state(firewalld_t)
kernel_rw_net_sysctls(firewalld_t)