1
0
selinux-policy/fix_unconfineduser.patch
Johannes Segitz 72477b3ac5 Accepting request 909369 from home:jsegitz:branches:security:SELinux
- Update to version 20210716
- Remove interfaces for container module before building the package
  (bsc#1188184)
- Updated
  * fix_init.patch
  * fix_systemd_watch.patch
  to adapt to upstream changes

- Use tabrmd SELinux modules from tpm2.0-abrmd instead of storing
  here

- Update to version 20210419
- Dropped fix_gift.patch, module was removed
- Updated wicked.te to removed dropped interface
- Refreshed:
  * fix_cockpit.patch
  * fix_hadoop.patch
  * fix_init.patch
  * fix_logging.patch
  * fix_logrotate.patch
  * fix_networkmanager.patch
  * fix_nscd.patch
  * fix_rpm.patch
  * fix_selinuxutil.patch
  * fix_systemd.patch
  * fix_systemd_watch.patch
  * fix_thunderbird.patch
  * fix_unconfined.patch
  * fix_unconfineduser.patch
  * fix_unprivuser.patch

OBS-URL: https://build.opensuse.org/request/show/909369
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=113
2021-07-30 09:07:13 +00:00

58 lines
1.5 KiB
Diff

Index: fedora-policy-20210628/policy/modules/roles/unconfineduser.te
===================================================================
--- fedora-policy-20210628.orig/policy/modules/roles/unconfineduser.te
+++ fedora-policy-20210628/policy/modules/roles/unconfineduser.te
@@ -126,6 +126,11 @@ tunable_policy(`unconfined_dyntrans_all'
domain_dyntrans(unconfined_t)
')
+# FIXME this is probably caused by some wierd PAM interaction
+corecmd_entrypoint_all_executables(unconfined_t)
+# FIXME sddm JITs some code, requiring execmod on user_tmp_t. Check how to disable this behaviour in sddm/qtdeclarative
+files_execmod_tmp(unconfined_t)
+
optional_policy(`
gen_require(`
type unconfined_t;
@@ -212,6 +217,10 @@ optional_policy(`
')
optional_policy(`
+ cron_system_spool_entrypoint(unconfined_t)
+')
+
+optional_policy(`
chrome_role_notrans(unconfined_r, unconfined_t)
tunable_policy(`unconfined_chrome_sandbox_transition',`
@@ -246,6 +255,18 @@ optional_policy(`
dbus_stub(unconfined_t)
optional_policy(`
+ accountsd_dbus_chat(unconfined_dbusd_t)
+ ')
+
+ optional_policy(`
+ networkmanager_dbus_chat(unconfined_dbusd_t)
+ ')
+
+ optional_policy(`
+ systemd_dbus_chat_logind(unconfined_dbusd_t)
+ ')
+
+ optional_policy(`
bluetooth_dbus_chat(unconfined_t)
')
@@ -309,6 +330,10 @@ optional_policy(`
')
optional_policy(`
+ libs_run_ldconfig(unconfined_t, unconfined_r)
+')
+
+optional_policy(`
firstboot_run(unconfined_t, unconfined_r)
')