forked from pool/selinux-policy
Hu
fade960df6
* Use new kanidm interfaces * Initial module for kanidm * Update bootupd policy * Allow rhsmcertd read/write access to /dev/papr-sysparm * Label /dev/papr-sysparm and /dev/papr-vpd * Allow abrt-dump-journal-core connect to winbindd * Allow systemd-hostnamed shut down nscd * Allow systemd-pstore send a message to syslogd over a unix domain * Allow postfix_domain map postfix_etc_t files * Allow microcode create /sys/devices/system/cpu/microcode/reload * Allow rhsmcertd read, write, and map ica tmpfs files * Support SGX devices * Allow initrc_t transition to passwd_t * Update fstab and cryptsetup generators policy * Allow xdm_t read and write the dma device * Update stalld policy for bpf usage * Allow systemd_gpt_generator to getattr on DOS directories * Make cgroup_memory_pressure_t a part of the file_type attribute * Allow ssh_t to change role to system_r * Update policy for coreos generators * Allow init_t nnp domain transition to firewalld_t * Label /run/modprobe.d with modules_conf_t * Allow virtnodedevd run udev with a domain transition * Allow virtnodedev_t create and use virtnodedev_lock_t * Allow virtstoraged manage files with virt_content_t type * Allow virtqemud unmount a filesystem with extended attributes * Allow svirt_t connect to unconfined_t over a unix domain socket * Update afterburn file transition policy * Allow systemd_generator read attributes of all filesystems * Allow fstab-generator read and write cryptsetup-generator unit file * Allow cryptsetup-generator read and write fstab-generator unit file * Allow systemd_generator map files in /etc * Allow systemd_generator read init's process state * Allow coreos-installer-generator read sssd public files * Allow coreos-installer-generator work with partitions * Label /etc/mdadm.conf.d with mdadm_conf_t * Confine coreos generators * Label /run/metadata with afterburn_runtime_t * Allow afterburn list ssh home directory * Label samba certificates with samba_cert_t * Label /run/coreos-installer-reboot with coreos_installer_var_run_t * Allow virtqemud read virt-dbus process state * Allow staff user dbus chat with virt-dbus * Allow staff use watch /run/systemd * Allow systemd_generator to write kmsg * Allow virtqemud connect to sanlock over a unix stream socket * Allow virtqemud relabel virt_var_run_t directories * Allow svirt_tcg_t read vm sysctls * Allow virtnodedevd connect to systemd-userdbd over a unix socket * Allow svirt read virtqemud fifo files * Allow svirt attach_queue to a virtqemud tun_socket * Allow virtqemud run ssh client with a transition * Allow virt_dbus_t connect to virtqemud_t over a unix stream socket * Update keyutils policy * Allow sshd_keygen_t connect to userdbd over a unix stream socket * Allow postfix-smtpd read mysql config files * Allow locate stream connect to systemd-userdbd * Allow the staff user use wireshark * Allow updatedb connect to userdbd over a unix stream socket * Allow gpg_t set attributes of public-keys.d * Allow gpg_t get attributes of login_userdomain stream * Allow systemd_getty_generator_t read /proc/1/environ * Allow systemd_getty_generator_t to read and write to tty_device_t * Drop publicfile module * Remove permissive domain for systemd_nsresourced_t * Change fs_dontaudit_write_cgroup_files() to apply to cgroup_t * Label /usr/bin/samba-gpupdate with samba_gpupdate_exec_t * Allow to create and delete socket files created by rhsm.service * Allow virtnetworkd exec shell when virt_hooks_unconfined is on * Allow unconfined_service_t transition to passwd_t * Support /var is empty * Allow abrt-dump-journal read all non_security socket files * Allow timemaster write to sysfs files * Dontaudit domain write cgroup files * Label /usr/lib/node_modules/npm/bin with bin_t * Allow ip the setexec permission * Allow systemd-networkd write files in /var/lib/systemd/network * Fix typo in systemd_nsresourced_prog_run_bpf() OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=248
55 lines
2.3 KiB
Plaintext
55 lines
2.3 KiB
Plaintext
allow_auditadm_exec_content auditadm_exec_content
|
|
allow_console_login login_console_enabled
|
|
allow_cvs_read_shadow cvs_read_shadow
|
|
allow_daemons_dump_core daemons_dump_core
|
|
allow_daemons_use_tcp_wrapper daemons_use_tcp_wrapper
|
|
allow_daemons_use_tty daemons_use_tty
|
|
allow_domain_fd_use domain_fd_use
|
|
allow_execheap selinuxuser_execheap
|
|
allow_execmod selinuxuser_execmod
|
|
allow_execstack selinuxuser_execstack
|
|
allow_ftpd_anon_write ftpd_anon_write
|
|
allow_ftpd_full_access ftpd_full_access
|
|
allow_ftpd_use_cifs ftpd_use_cifs
|
|
allow_ftpd_use_nfs ftpd_use_nfs
|
|
allow_gssd_read_tmp gssd_read_tmp
|
|
allow_guest_exec_content guest_exec_content
|
|
allow_httpd_anon_write httpd_anon_write
|
|
allow_httpd_mod_auth_ntlm_winbind httpd_mod_auth_ntlm_winbind
|
|
allow_httpd_mod_auth_pam httpd_mod_auth_pam
|
|
allow_httpd_sys_script_anon_write httpd_sys_script_anon_write
|
|
allow_kerberos kerberos_enabled
|
|
allow_mplayer_execstack mplayer_execstack
|
|
allow_mount_anyfile mount_anyfile
|
|
allow_nfsd_anon_write nfsd_anon_write
|
|
allow_polyinstantiation polyinstantiation_enabled
|
|
allow_postfix_local_write_mail_spool postfix_local_write_mail_spool
|
|
allow_rsync_anon_write rsync_anon_write
|
|
allow_saslauthd_read_shadow saslauthd_read_shadow
|
|
allow_secadm_exec_content secadm_exec_content
|
|
allow_smbd_anon_write smbd_anon_write
|
|
allow_ssh_keysign ssh_keysign
|
|
allow_staff_exec_content staff_exec_content
|
|
allow_sysadm_exec_content sysadm_exec_content
|
|
allow_user_exec_content user_exec_content
|
|
allow_user_mysql_connect selinuxuser_mysql_connect_enabled
|
|
allow_user_postgresql_connect selinuxuser_postgresql_connect_enabled
|
|
allow_write_xshm xserver_clients_write_xshm
|
|
allow_xguest_exec_content xguest_exec_content
|
|
allow_xserver_execmem xserver_execmem
|
|
allow_ypbind nis_enabled
|
|
allow_zebra_write_config zebra_write_config
|
|
user_direct_dri selinuxuser_direct_dri_enabled
|
|
user_ping selinuxuser_ping
|
|
user_share_music selinuxuser_share_music
|
|
user_tcp_server selinuxuser_tcp_server
|
|
sepgsql_enable_pitr_implementation postgresql_can_rsync
|
|
sepgsql_enable_users_ddl postgresql_selinux_users_ddl
|
|
sepgsql_transmit_client_label postgresql_selinux_transmit_client_label
|
|
sepgsql_unconfined_dbadm postgresql_selinux_unconfined_dbadm
|
|
clamd_use_jit antivirus_use_jit
|
|
amavis_use_jit antivirus_use_jit
|
|
logwatch_can_sendmail logwatch_can_network_connect_mail
|
|
puppet_manage_all_files puppetagent_manage_all_files
|
|
virt_sandbox_use_nfs virt_use_nfs
|