fix(rich): validate service name of rich rule
Resolves: RHEL-14850
This commit is contained in:
parent
6135aca0e5
commit
09e9b4b7ca
@ -0,0 +1,71 @@
|
|||||||
|
From 22b100b8ac9aeeacae851e2b9f11e4dc1741cd85 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Thomas Haller <thaller@redhat.com>
|
||||||
|
Date: Tue, 12 Dec 2023 14:58:07 +0100
|
||||||
|
Subject: [PATCH 07/22] v2.1.0: fix(rich): validate service name of rich rule
|
||||||
|
|
||||||
|
Previously, validation of valid service names was not done.
|
||||||
|
That meant:
|
||||||
|
|
||||||
|
$ firewall-cmd --add-rich-rule='rule priority="-100" family="ipv4" source address="10.0.0.10" service name="listen" accept' --permanent
|
||||||
|
success
|
||||||
|
$ firewall-cmd --reload
|
||||||
|
Error: INVALID_SERVICE: listen
|
||||||
|
|
||||||
|
which left firewalld in a bad state.
|
||||||
|
|
||||||
|
Now:
|
||||||
|
|
||||||
|
$ firewall-cmd --add-rich-rule='rule priority="-100" family="ipv4" source address="10.0.0.10" service name="listen" accept' --permanent
|
||||||
|
Error: INVALID_SERVICE: Zone 'public': 'listen' not among existing services
|
||||||
|
|
||||||
|
https://issues.redhat.com/browse/RHEL-5790
|
||||||
|
(cherry picked from commit fbcdddd3e38c31a7b8325bf02764b84344c216b0)
|
||||||
|
---
|
||||||
|
src/firewall/core/io/policy.py | 8 ++++++++
|
||||||
|
src/tests/features/rich_rules.at | 7 ++++++-
|
||||||
|
2 files changed, 14 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/src/firewall/core/io/policy.py b/src/firewall/core/io/policy.py
|
||||||
|
index 7d383abb0a2d..f9a1114d7969 100644
|
||||||
|
--- a/src/firewall/core/io/policy.py
|
||||||
|
+++ b/src/firewall/core/io/policy.py
|
||||||
|
@@ -471,6 +471,14 @@ def common_check_config(obj, config, item, all_config, all_io_objects):
|
||||||
|
log.debug1("{} (unsupported)".format(ex))
|
||||||
|
else:
|
||||||
|
raise ex
|
||||||
|
+ elif isinstance(obj_rich.element, rich.Rich_Service):
|
||||||
|
+ if obj_rich.element.name not in all_io_objects["services"]:
|
||||||
|
+ raise FirewallError(
|
||||||
|
+ errors.INVALID_SERVICE,
|
||||||
|
+ "{} '{}': '{}' not among existing services".format(
|
||||||
|
+ obj_type, obj.name, obj_rich.element.name
|
||||||
|
+ ),
|
||||||
|
+ )
|
||||||
|
|
||||||
|
def common_writer(obj, handler):
|
||||||
|
# short
|
||||||
|
diff --git a/src/tests/features/rich_rules.at b/src/tests/features/rich_rules.at
|
||||||
|
index aadc76da57b4..f7d1a1d0abf4 100644
|
||||||
|
--- a/src/tests/features/rich_rules.at
|
||||||
|
+++ b/src/tests/features/rich_rules.at
|
||||||
|
@@ -46,6 +46,10 @@ FWD_CHECK([--permanent --policy foobar --add-rich-rule='rule family=ipv4 priorit
|
||||||
|
FWD_CHECK([--permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0 source address=10.10.10.13 drop'], 0, ignore)
|
||||||
|
FWD_CHECK([--permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept'], 0, ignore)
|
||||||
|
FWD_CHECK([--permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=1 source address=10.10.10.15 accept'], 0, ignore)
|
||||||
|
+
|
||||||
|
+dnl Invalid service name is rejected.
|
||||||
|
+FWD_CHECK([--permanent --policy foobar --add-rich-rule='rule priority="-100" family="ipv4" source address="10.0.0.10" service name="bogusservice" accept'], 101, ignore, ignore)
|
||||||
|
+
|
||||||
|
FWD_RELOAD
|
||||||
|
NFT_LIST_RULES([inet], [filter_IN_policy_foobar_pre], 0, [dnl
|
||||||
|
table inet firewalld {
|
||||||
|
@@ -319,4 +323,5 @@ IP6TABLES_LIST_RULES([filter], [IN_foobar_post], 0, [dnl
|
||||||
|
ACCEPT 0 -- ::/0 ::/0
|
||||||
|
])
|
||||||
|
|
||||||
|
-FWD_END_TEST([-e '/ERROR: INVALID_ZONE:/d'])
|
||||||
|
+FWD_END_TEST([-e '/ERROR: INVALID_ZONE:/d' dnl
|
||||||
|
+ -e "/ERROR: INVALID_SERVICE: Policy 'foobar': 'bogusservice' not among existing services/d"])
|
||||||
|
--
|
||||||
|
2.43.5
|
||||||
|
|
@ -1,7 +1,7 @@
|
|||||||
Summary: A firewall daemon with D-Bus interface providing a dynamic firewall
|
Summary: A firewall daemon with D-Bus interface providing a dynamic firewall
|
||||||
Name: firewalld
|
Name: firewalld
|
||||||
Version: 1.3.4
|
Version: 1.3.4
|
||||||
Release: 3%{?dist}
|
Release: 4%{?dist}
|
||||||
URL: http://www.firewalld.org
|
URL: http://www.firewalld.org
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Source0: https://github.com/firewalld/firewalld/releases/download/v%{version}/firewalld-%{version}.tar.bz2
|
Source0: https://github.com/firewalld/firewalld/releases/download/v%{version}/firewalld-%{version}.tar.bz2
|
||||||
@ -11,6 +11,7 @@ Patch3: 0003-v1.4.0-feat-direct-avoid-iptables-flush-if-using-nft.patch
|
|||||||
Patch4: 0004-v1.4.0-test-direct-avoid-iptables-flush-if-using-nft.patch
|
Patch4: 0004-v1.4.0-test-direct-avoid-iptables-flush-if-using-nft.patch
|
||||||
Patch5: 0005-v2.0.0-feat-service-add-OpenTelemetry-OTLP-service.patch
|
Patch5: 0005-v2.0.0-feat-service-add-OpenTelemetry-OTLP-service.patch
|
||||||
Patch6: 0006-v2.1.0-feat-icmp-add-ICMPv6-Multicast-Listener-Disco.patch
|
Patch6: 0006-v2.1.0-feat-icmp-add-ICMPv6-Multicast-Listener-Disco.patch
|
||||||
|
Patch7: 0007-v2.1.0-fix-rich-validate-service-name-of-rich-rule.patch
|
||||||
BuildArch: noarch
|
BuildArch: noarch
|
||||||
BuildRequires: autoconf
|
BuildRequires: autoconf
|
||||||
BuildRequires: automake
|
BuildRequires: automake
|
||||||
@ -234,6 +235,9 @@ rm -rf %{buildroot}%{_datadir}/firewalld/testsuite
|
|||||||
%{_mandir}/man1/firewall-config*.1*
|
%{_mandir}/man1/firewall-config*.1*
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Jul 01 2024 Eric Garver <egarver@redhat.com> - 1.3.4-4
|
||||||
|
- fix(rich): validate service name of rich rule
|
||||||
|
|
||||||
* Mon Jul 01 2024 Eric Garver <egarver@redhat.com> - 1.3.4-3
|
* Mon Jul 01 2024 Eric Garver <egarver@redhat.com> - 1.3.4-3
|
||||||
- feat(icmp): add ICMPv6 Multicast Listener Discovery (MLD) types
|
- feat(icmp): add ICMPv6 Multicast Listener Discovery (MLD) types
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user