forked from pool/selinux-policy
6fa6803f18
- Update to version 20200910. Refreshed * fix_authlogin.patch * fix_nagios.patch * fix_systemd.patch * fix_usermanage.patch - Delete suse_specific.patch, moved content into fix_selinuxutil.patch - Cleanup of booleans-* presets * Enabled user_rw_noexattrfile unconfined_chrome_sandbox_transition unconfined_mozilla_plugin_transition for the minimal policy * Disabled xserver_object_manager for the MLS policy * Disabled openvpn_enable_homedirs privoxy_connect_any selinuxuser_direct_dri_enabled selinuxuser_ping (aka user_ping) squid_connect_any telepathy_tcp_connect_generic_network_ports for the targeted policy Change your local config if you need them - Build HTML version of manpages for the -devel package OBS-URL: https://build.opensuse.org/request/show/833509 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=83
30 lines
1.3 KiB
Diff
30 lines
1.3 KiB
Diff
Index: fedora-policy/policy/modules/admin/usermanage.te
|
|
===================================================================
|
|
--- fedora-policy.orig/policy/modules/admin/usermanage.te
|
|
+++ fedora-policy/policy/modules/admin/usermanage.te
|
|
@@ -226,6 +226,7 @@ allow groupadd_t self:unix_dgram_socket
|
|
allow groupadd_t self:unix_stream_socket create_stream_socket_perms;
|
|
allow groupadd_t self:unix_dgram_socket sendto;
|
|
allow groupadd_t self:unix_stream_socket connectto;
|
|
+allow groupadd_t self:netlink_selinux_socket create_socket_perms;
|
|
|
|
fs_getattr_xattr_fs(groupadd_t)
|
|
fs_search_auto_mountpoints(groupadd_t)
|
|
@@ -530,6 +531,7 @@ allow useradd_t self:unix_dgram_socket c
|
|
allow useradd_t self:unix_stream_socket create_stream_socket_perms;
|
|
allow useradd_t self:unix_dgram_socket sendto;
|
|
allow useradd_t self:unix_stream_socket connectto;
|
|
+allow useradd_t self:netlink_selinux_socket create_socket_perms;
|
|
|
|
manage_dirs_pattern(useradd_t, useradd_var_run_t, useradd_var_run_t)
|
|
manage_files_pattern(useradd_t, useradd_var_run_t, useradd_var_run_t)
|
|
@@ -538,6 +540,8 @@ files_pid_filetrans(useradd_t, useradd_v
|
|
# for getting the number of groups
|
|
kernel_read_kernel_sysctls(useradd_t)
|
|
|
|
+selinux_compute_access_vector(useradd_t)
|
|
+
|
|
corecmd_exec_shell(useradd_t)
|
|
# Execute /usr/bin/{passwd,chfn,chsh} and /usr/sbin/{useradd,vipw}.
|
|
corecmd_exec_bin(useradd_t)
|