forked from pool/selinux-policy
72477b3ac5
- Update to version 20210716 - Remove interfaces for container module before building the package (bsc#1188184) - Updated * fix_init.patch * fix_systemd_watch.patch to adapt to upstream changes - Use tabrmd SELinux modules from tpm2.0-abrmd instead of storing here - Update to version 20210419 - Dropped fix_gift.patch, module was removed - Updated wicked.te to removed dropped interface - Refreshed: * fix_cockpit.patch * fix_hadoop.patch * fix_init.patch * fix_logging.patch * fix_logrotate.patch * fix_networkmanager.patch * fix_nscd.patch * fix_rpm.patch * fix_selinuxutil.patch * fix_systemd.patch * fix_systemd_watch.patch * fix_thunderbird.patch * fix_unconfined.patch * fix_unconfineduser.patch * fix_unprivuser.patch OBS-URL: https://build.opensuse.org/request/show/909369 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=113
49 lines
2.2 KiB
Diff
49 lines
2.2 KiB
Diff
Index: fedora-policy-20210628/policy/modules/system/logging.fc
|
|
===================================================================
|
|
--- fedora-policy-20210628.orig/policy/modules/system/logging.fc
|
|
+++ fedora-policy-20210628/policy/modules/system/logging.fc
|
|
@@ -3,6 +3,8 @@
|
|
/etc/rsyslog.conf gen_context(system_u:object_r:syslog_conf_t,s0)
|
|
/etc/syslog.conf gen_context(system_u:object_r:syslog_conf_t,s0)
|
|
/etc/rsyslog.d(/.*)? gen_context(system_u:object_r:syslog_conf_t,s0)
|
|
+/var/run/rsyslog/additional-log-sockets.conf -- gen_context(system_u:object_r:syslog_conf_t,s0)
|
|
+/run/rsyslog/additional-log-sockets.conf -- gen_context(system_u:object_r:syslog_conf_t,s0)
|
|
/etc/audit(/.*)? gen_context(system_u:object_r:auditd_etc_t,mls_systemhigh)
|
|
/etc/rc\.d/init\.d/auditd -- gen_context(system_u:object_r:auditd_initrc_exec_t,s0)
|
|
/etc/rc\.d/init\.d/rsyslog -- gen_context(system_u:object_r:syslogd_initrc_exec_t,s0)
|
|
@@ -83,6 +85,7 @@ ifdef(`distro_redhat',`
|
|
/var/run/syslogd\.pid -- gen_context(system_u:object_r:syslogd_var_run_t,mls_systemhigh)
|
|
/var/run/syslog-ng.ctl -- gen_context(system_u:object_r:syslogd_var_run_t,s0)
|
|
/var/run/syslog-ng(/.*)? gen_context(system_u:object_r:syslogd_var_run_t,s0)
|
|
+/var/run/rsyslog(/.*)? gen_context(system_u:object_r:syslogd_var_run_t,s0)
|
|
/var/run/systemd/journal/syslog -s gen_context(system_u:object_r:devlog_t,mls_systemhigh)
|
|
|
|
/var/spool/audit(/.*)? gen_context(system_u:object_r:audit_spool_t,mls_systemhigh)
|
|
Index: fedora-policy-20210628/policy/modules/system/logging.if
|
|
===================================================================
|
|
--- fedora-policy-20210628.orig/policy/modules/system/logging.if
|
|
+++ fedora-policy-20210628/policy/modules/system/logging.if
|
|
@@ -1782,3 +1782,22 @@ interface(`logging_dgram_send',`
|
|
|
|
allow $1 syslogd_t:unix_dgram_socket sendto;
|
|
')
|
|
+
|
|
+########################################
|
|
+## <summary>
|
|
+## Accept a message to syslogd over a unix domain
|
|
+## datagram socket.
|
|
+## </summary>
|
|
+## <param name="domain">
|
|
+## <summary>
|
|
+## Domain allowed access.
|
|
+## </summary>
|
|
+## </param>
|
|
+#
|
|
+interface(`logging_dgram_accept',`
|
|
+ gen_require(`
|
|
+ type syslogd_t;
|
|
+ ')
|
|
+
|
|
+ allow $1 syslogd_t:unix_dgram_socket accept;
|
|
+')
|