1
0
selinux-policy/xdm_entrypoint_pam.patch
Johannes Segitz 1fd70ac29b Accepting request 781805 from home:jsegitz:branches:security:SELinux
- Update to version 20200219
  Refreshed fix_hadoop.patch
  Updated 
  * fix_dbus.patch
  * fix_hadoop.patch
  * fix_nscd.patch
  * fix_xserver.patch
  Renamed postfix_paths.patch to fix_postfix.patch
  Added
  * fix_init.patch
  * fix_locallogin.patch
  * fix_policykit.patch
  * fix_iptables.patch
  * fix_irqbalance.patch
  * fix_ntp.patch
  * fix_fwupd.patch
  * fix_firewalld.patch
  * fix_logrotate.patch
  * fix_selinuxutil.patch
  * fix_corecommand.patch
  * fix_snapper.patch
  * fix_systemd.patch
  * fix_unconfined.patch
  * fix_unconfineduser.patch
  * fix_chronyd.patch
  * fix_networkmanager.patch
  * xdm_entrypoint_pam.patch
- Removed modules minimum_temp_fixes and targeted_temp_fixes
  from the corresponding policies
- Reduced default module list of minimum policy by removing

OBS-URL: https://build.opensuse.org/request/show/781805
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=74
2020-03-05 10:13:59 +00:00

44 lines
1.2 KiB
Diff

Index: fedora-policy/policy/modules/roles/unconfineduser.te
===================================================================
--- fedora-policy.orig/policy/modules/roles/unconfineduser.te
+++ fedora-policy/policy/modules/roles/unconfineduser.te
@@ -126,6 +126,10 @@ optional_policy(`
')
optional_policy(`
+ xdm_entrypoint(unconfined_t)
+ ')
+
+ optional_policy(`
abrt_dbus_chat(unconfined_t)
abrt_run_helper(unconfined_t, unconfined_r)
')
Index: fedora-policy/policy/modules/services/xserver.if
===================================================================
--- fedora-policy.orig/policy/modules/services/xserver.if
+++ fedora-policy/policy/modules/services/xserver.if
@@ -507,6 +507,23 @@ interface(`xserver_domtrans_xdm',`
domtrans_pattern($1, xdm_exec_t, xdm_t)
')
+########################################
+## <summary>
+## Allow any xdm_exec_t to be an entrypoint of this domain
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <rolecap/>
+#
+interface(`xdm_entrypoint',`
+ gen_require(`
+ type xdm_exec_t;
+ ')
+ allow $1 xdm_exec_t:file entrypoint;
+')
########################################
## <summary>