42 lines
1.4 KiB
Diff
42 lines
1.4 KiB
Diff
|
From 07e2bf732f54f936cccc4e0c7b468d77f97e911a Mon Sep 17 00:00:00 2001
|
||
|
From: Florence Blanc-Renaud <flo@redhat.com>
|
||
|
Date: Mon, 30 Aug 2021 18:40:24 +0200
|
||
|
Subject: [PATCH] selinux policy: allow custodia to access /proc/cpuinfo
|
||
|
|
||
|
On aarch64, custodia creates AVC when accessing /proc/cpuinfo.
|
||
|
|
||
|
According to gcrypt manual
|
||
|
(https://gnupg.org/documentation/manuals/gcrypt/Configuration.html),
|
||
|
/proc/cpuinfo is used on ARM architecture to read the hardware
|
||
|
capabilities of the CPU. This explains why the issue happens only
|
||
|
on aarch64.
|
||
|
|
||
|
audit2allow suggests to add the following:
|
||
|
allow ipa_custodia_t proc_t:file { getattr open read };
|
||
|
|
||
|
but this policy would be too broad. Instead, the patch is using
|
||
|
the interface kernel_read_system_state.
|
||
|
|
||
|
Fixes: https://pagure.io/freeipa/issue/8972
|
||
|
Signed-off-by: Florence Blanc-Renaud <flo@redhat.com>
|
||
|
Reviewed-By: Christian Heimes <cheimes@redhat.com>
|
||
|
---
|
||
|
selinux/ipa.te | 1 +
|
||
|
1 file changed, 1 insertion(+)
|
||
|
|
||
|
diff --git a/selinux/ipa.te b/selinux/ipa.te
|
||
|
index 68e10941951ac391fda7854d1403558c069dad46..7492fca04d4f0d031ecd83871078247d73cc87e0 100644
|
||
|
--- a/selinux/ipa.te
|
||
|
+++ b/selinux/ipa.te
|
||
|
@@ -364,6 +364,7 @@ files_tmp_filetrans(ipa_custodia_t, ipa_custodia_tmp_t, { dir file })
|
||
|
|
||
|
kernel_dgram_send(ipa_custodia_t)
|
||
|
kernel_read_network_state(ipa_custodia_t)
|
||
|
+kernel_read_system_state(ipa_custodia_t)
|
||
|
|
||
|
auth_read_passwd(ipa_custodia_t)
|
||
|
|
||
|
--
|
||
|
2.31.1
|
||
|
|