commit: 80a9de80df53b7ad4160b0fcb38a6b38a580f575 Author: Yi Zhao <yi.zhao <AT> windriver <DOT> com> AuthorDate: Mon Oct 18 06:56:45 2021 +0000 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> CommitDate: Thu Nov 11 21:26:50 2021 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=80a9de80
rngd: fixes for rngd * allow rngd_t to read certificates * allow rngd_t to getsched/setsched Fixes: avc: denied { search } for pid=332 comm="rngd" name="ssl" dev="vda" ino=588 scontext=system_u:system_r:rngd_t tcontext=system_u:object_r:cert_t tclass=dir permissive=1 avc: denied { read } for pid=332 comm="rngd" name="openssl.cnf" dev="vda" ino=849 scontext=system_u:system_r:rngd_t tcontext=system_u:object_r:cert_t tclass=file permissive=1 avc: denied { open } for pid=332 comm="rngd" path="/etc/ssl/openssl.cnf" dev="vda" ino=849 scontext=system_u:system_r:rngd_t tcontext=system_u:object_r:cert_t tclass=file permissive=1 avc: denied { getattr } for pid=332 comm="rngd" path="/etc/ssl/openssl.cnf" dev="vda" ino=849 scontext=system_u:system_r:rngd_t tcontext=system_u:object_r:cert_t tclass=file permissive=1 avc: denied { getsched } for pid=370 comm="rngd" scontext=system_u:system_r:rngd_t tcontext=system_u:system_r:rngd_t tclass=process permissive=1 avc: denied { setsched } for pid=370 comm="rngd" scontext=system_u:system_r:rngd_t tcontext=system_u:system_r:rngd_t tclass=process permissive=1 Signed-off-by: Yi Zhao <yi.zhao <AT> windriver.com> Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org> policy/modules/services/rngd.te | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/policy/modules/services/rngd.te b/policy/modules/services/rngd.te index 29dff428..177199e8 100644 --- a/policy/modules/services/rngd.te +++ b/policy/modules/services/rngd.te @@ -21,7 +21,7 @@ files_runtime_file(rngd_runtime_t) # allow rngd_t self:capability { ipc_lock sys_admin }; -allow rngd_t self:process signal; +allow rngd_t self:process { setsched getsched signal }; allow rngd_t self:fifo_file rw_fifo_file_perms; allow rngd_t self:unix_stream_socket { accept listen }; @@ -41,3 +41,4 @@ files_read_etc_files(rngd_t) logging_send_syslog_msg(rngd_t) miscfiles_read_localization(rngd_t) +miscfiles_read_generic_certs(rngd_t)