Bug ID | 1205580 |
---|---|
Summary | SELinux denied access to firewalld in YaST network configuration |
Classification | openSUSE |
Product | openSUSE Tumbleweed |
Version | Current |
Hardware | Other |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Basesystem |
Assignee | screening-team-bugs@suse.de |
Reporter | felix.niederwanger@suse.com |
QA Contact | qa-bugs@suse.de |
Found By | --- |
Blocker | --- |
Configuring the Network via YaST (using wicked) results on a Tumbleweed system
with SELinux enabled results in the following access denial:
> time->Sun Nov 20 09:59:05 2022
> type=PROCTITLE msg=audit(1668938345.928:166): proctitle=2F7573722F62696E2F707974686F6E33002F7573722F7362696E2F6669726577616C6C64002D2D6E6F666F726B002D2D6E6F706964
> type=PATH msg=audit(1668938345.928:166): item=0 name="/etc/sysconfig/network/" inode=1290 dev=00:26 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:etc_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
> type=CWD msg=audit(1668938345.928:166): cwd="/"
> type=SYSCALL msg=audit(1668938345.928:166): arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f154a905fe0 a2=a00c2 a3=180 items=1 ppid=1 pid=759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="firewalld" exe="/usr/bin/python3.10" subj=system_u:system_r:firewalld_t:s0 key=(null)
> type=AVC msg=audit(1668938345.928:166): avc: denied { write } for pid=759 comm="firewalld" name="network" dev="overlay" ino=1290 scontext=system_u:system_r:firewalld_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir permissive=0
Looks like that the firewalld context is missing some rules to properly work.