forked from pool/selinux-policy
b66c2b8ce6
- Update to version 20221019. Refreshed: * distro_suse_to_distro_redhat.patch * fix_apache.patch * fix_chronyd.patch * fix_cron.patch * fix_init.patch * fix_kernel_sysctl.patch * fix_networkmanager.patch * fix_rpm.patch * fix_sysnetwork.patch * fix_systemd.patch * fix_systemd_watch.patch * fix_unconfined.patch * fix_unconfineduser.patch * fix_unprivuser.patch * fix_xserver.patch - Dropped fix_cockpit.patch as this is now packaged with cockpit itself - Remove the ipa module, freeip ships their own module - Added fix_alsa.patch to allow reading of config files in home directories - Extended fix_networkmanager.patch and fix_postfix.patch to account for SUSE systems - Added dontaudit_interface_kmod_tmpfs.patch to prevent AVCs when startproc queries the running processes - Updated fix_snapper.patch to allow snapper to talk to rpm via dbus OBS-URL: https://build.opensuse.org/request/show/1035580 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=155
45 lines
1.3 KiB
Diff
45 lines
1.3 KiB
Diff
Index: fedora-policy-20221019/policy/modules/system/systemd.te
|
|
===================================================================
|
|
--- fedora-policy-20221019.orig/policy/modules/system/systemd.te
|
|
+++ fedora-policy-20221019/policy/modules/system/systemd.te
|
|
@@ -381,6 +381,10 @@ userdom_manage_user_tmp_chr_files(system
|
|
xserver_dbus_chat(systemd_logind_t)
|
|
|
|
optional_policy(`
|
|
+ packagekit_dbus_chat(systemd_logind_t)
|
|
+')
|
|
+
|
|
+optional_policy(`
|
|
apache_read_tmp_files(systemd_logind_t)
|
|
')
|
|
|
|
@@ -863,6 +867,10 @@ optional_policy(`
|
|
dbus_system_bus_client(systemd_localed_t)
|
|
')
|
|
|
|
+optional_policy(`
|
|
+ nscd_unconfined(systemd_hostnamed_t)
|
|
+')
|
|
+
|
|
#######################################
|
|
#
|
|
# Hostnamed policy
|
|
@@ -1158,7 +1166,7 @@ systemd_read_efivarfs(systemd_hwdb_t)
|
|
# systemd_gpt_generator domain
|
|
#
|
|
|
|
-allow systemd_gpt_generator_t self:capability sys_rawio;
|
|
+allow systemd_gpt_generator_t self:capability { sys_rawio sys_admin};
|
|
allow systemd_gpt_generator_t self:netlink_kobject_uevent_socket create_socket_perms;
|
|
|
|
dev_read_sysfs(systemd_gpt_generator_t)
|
|
@@ -1185,6 +1193,8 @@ systemd_unit_file_filetrans(systemd_gpt_
|
|
systemd_create_unit_file_dirs(systemd_gpt_generator_t)
|
|
systemd_create_unit_file_lnk(systemd_gpt_generator_t)
|
|
|
|
+kernel_dgram_send(systemd_gpt_generator_t)
|
|
+
|
|
optional_policy(`
|
|
udev_read_pid_files(systemd_gpt_generator_t)
|
|
')
|