commit:     a5a8129939bf361112055e25a0e55531bbbe20b9
Author:     Dave Sugar <dsugar100 <AT> gmail <DOT> com>
AuthorDate: Thu Aug 25 13:31:22 2022 +0000
Commit:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Sat Sep  3 19:07:50 2022 +0000
URL:        
https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=a5a81299

firewalld: create netfilter socket

node=localhost type=AVC msg=audit(1661396059.060:376): avc:  denied  { create } 
for  pid=1014 comm="firewalld" scontext=system_u:system_r:firewalld_t:s0 
tcontext=system_u:system_r:firewalld_t:s0 tclass=netlink_netfilter_socket 
permissive=1
node=localhost type=AVC msg=audit(1661396059.060:377): avc:  denied  { setopt } 
for  pid=1014 comm="firewalld" scontext=system_u:system_r:firewalld_t:s0 
tcontext=system_u:system_r:firewalld_t:s0 tclass=netlink_netfilter_socket 
permissive=1
node=localhost type=AVC msg=audit(1661396059.436:398): avc:  denied  { write } 
for  pid=1014 comm="firewalld" scontext=system_u:system_r:firewalld_t:s0 
tcontext=system_u:system_r:firewalld_t:s0 tclass=netlink_netfilter_socket 
permissive=1
node=localhost type=AVC msg=audit(1661396059.436:399): avc:  denied  { read } 
for  pid=1014 comm="firewalld" scontext=system_u:system_r:firewalld_t:s0 
tcontext=system_u:system_r:firewalld_t:s0 tclass=netlink_netfilter_socket 
permissive=1
node=localhost type=AVC msg=audit(1661396059.437:400): avc:  denied  { getopt } 
for  pid=1014 comm="firewalld" scontext=system_u:system_r:firewalld_t:s0 
tcontext=system_u:system_r:firewalld_t:s0 tclass=netlink_netfilter_socket 
permissive=1

Signed-off-by: Dave Sugar <dsugar100 <AT> gmail.com>
Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>

 policy/modules/services/firewalld.te | 1 +
 1 file changed, 1 insertion(+)

diff --git a/policy/modules/services/firewalld.te 
b/policy/modules/services/firewalld.te
index b51b7740..099dc32e 100644
--- a/policy/modules/services/firewalld.te
+++ b/policy/modules/services/firewalld.te
@@ -33,6 +33,7 @@ allow firewalld_t self:capability { dac_override net_admin };
 dontaudit firewalld_t self:capability sys_tty_config;
 allow firewalld_t self:fifo_file rw_fifo_file_perms;
 allow firewalld_t self:unix_stream_socket { accept listen };
+allow firewalld_t self:netlink_netfilter_socket create_socket_perms;
 allow firewalld_t self:udp_socket create_socket_perms;
 
 manage_dirs_pattern(firewalld_t, firewalld_etc_rw_t, firewalld_etc_rw_t)

Reply via email to