forked from pool/selinux-policy
72477b3ac5
- Update to version 20210716 - Remove interfaces for container module before building the package (bsc#1188184) - Updated * fix_init.patch * fix_systemd_watch.patch to adapt to upstream changes - Use tabrmd SELinux modules from tpm2.0-abrmd instead of storing here - Update to version 20210419 - Dropped fix_gift.patch, module was removed - Updated wicked.te to removed dropped interface - Refreshed: * fix_cockpit.patch * fix_hadoop.patch * fix_init.patch * fix_logging.patch * fix_logrotate.patch * fix_networkmanager.patch * fix_nscd.patch * fix_rpm.patch * fix_selinuxutil.patch * fix_systemd.patch * fix_systemd_watch.patch * fix_thunderbird.patch * fix_unconfined.patch * fix_unconfineduser.patch * fix_unprivuser.patch OBS-URL: https://build.opensuse.org/request/show/909369 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=113
58 lines
1.5 KiB
Diff
58 lines
1.5 KiB
Diff
Index: fedora-policy-20210628/policy/modules/roles/unconfineduser.te
|
|
===================================================================
|
|
--- fedora-policy-20210628.orig/policy/modules/roles/unconfineduser.te
|
|
+++ fedora-policy-20210628/policy/modules/roles/unconfineduser.te
|
|
@@ -126,6 +126,11 @@ tunable_policy(`unconfined_dyntrans_all'
|
|
domain_dyntrans(unconfined_t)
|
|
')
|
|
|
|
+# FIXME this is probably caused by some wierd PAM interaction
|
|
+corecmd_entrypoint_all_executables(unconfined_t)
|
|
+# FIXME sddm JITs some code, requiring execmod on user_tmp_t. Check how to disable this behaviour in sddm/qtdeclarative
|
|
+files_execmod_tmp(unconfined_t)
|
|
+
|
|
optional_policy(`
|
|
gen_require(`
|
|
type unconfined_t;
|
|
@@ -212,6 +217,10 @@ optional_policy(`
|
|
')
|
|
|
|
optional_policy(`
|
|
+ cron_system_spool_entrypoint(unconfined_t)
|
|
+')
|
|
+
|
|
+optional_policy(`
|
|
chrome_role_notrans(unconfined_r, unconfined_t)
|
|
|
|
tunable_policy(`unconfined_chrome_sandbox_transition',`
|
|
@@ -246,6 +255,18 @@ optional_policy(`
|
|
dbus_stub(unconfined_t)
|
|
|
|
optional_policy(`
|
|
+ accountsd_dbus_chat(unconfined_dbusd_t)
|
|
+ ')
|
|
+
|
|
+ optional_policy(`
|
|
+ networkmanager_dbus_chat(unconfined_dbusd_t)
|
|
+ ')
|
|
+
|
|
+ optional_policy(`
|
|
+ systemd_dbus_chat_logind(unconfined_dbusd_t)
|
|
+ ')
|
|
+
|
|
+ optional_policy(`
|
|
bluetooth_dbus_chat(unconfined_t)
|
|
')
|
|
|
|
@@ -309,6 +330,10 @@ optional_policy(`
|
|
')
|
|
|
|
optional_policy(`
|
|
+ libs_run_ldconfig(unconfined_t, unconfined_r)
|
|
+')
|
|
+
|
|
+optional_policy(`
|
|
firstboot_run(unconfined_t, unconfined_r)
|
|
')
|
|
|