1
0
selinux-policy/fix_networkmanager.patch
Johannes Segitz a7283c99d6 Accepting request 984855 from home:jsegitz:branches:security:SELinux
- Update to version 20220624. Refreshed:
  * fix_init.patch
  * fix_kernel_sysctl.patch
  * fix_logging.patch
  * fix_networkmanager.patch
  * fix_unprivuser.patch
  Dropped fix_hadoop.patch, not necessary anymore
* Updated fix_locallogin.patch to allow accesses for nss-systemd 
  (bsc#1199630)

OBS-URL: https://build.opensuse.org/request/show/984855
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=132
2022-06-24 09:40:15 +00:00

59 lines
1.9 KiB
Diff

Index: fedora-policy-20220624/policy/modules/contrib/networkmanager.te
===================================================================
--- fedora-policy-20220624.orig/policy/modules/contrib/networkmanager.te
+++ fedora-policy-20220624/policy/modules/contrib/networkmanager.te
@@ -276,6 +276,9 @@ userdom_read_home_certs(NetworkManager_t
userdom_read_user_home_content_files(NetworkManager_t)
userdom_dgram_send(NetworkManager_t)
+hostname_exec(NetworkManager_t)
+networkmanager_systemctl(NetworkManager_t)
+
tunable_policy(`use_nfs_home_dirs',`
fs_read_nfs_files(NetworkManager_t)
')
@@ -293,6 +296,14 @@ optional_policy(`
')
optional_policy(`
+ packagekit_dbus_chat(NetworkManager_t)
+')
+
+optional_policy(`
+ networkmanager_dbus_chat(NetworkManager_t)
+')
+
+optional_policy(`
bind_domtrans(NetworkManager_t)
bind_manage_cache(NetworkManager_t)
bind_kill(NetworkManager_t)
Index: fedora-policy-20220624/policy/modules/contrib/networkmanager.if
===================================================================
--- fedora-policy-20220624.orig/policy/modules/contrib/networkmanager.if
+++ fedora-policy-20220624/policy/modules/contrib/networkmanager.if
@@ -132,6 +132,24 @@ interface(`networkmanager_initrc_domtran
init_labeled_script_domtrans($1, NetworkManager_initrc_exec_t)
')
+#######################################
+## <summary>
+## Allow reading of NetworkManager link files
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed to read the links
+## </summary>
+## </param>
+#
+interface(`networkmanager_initrc_read_lnk_files',`
+ gen_require(`
+ type NetworkManager_initrc_exec_t;
+ ')
+
+ read_lnk_files_pattern($1, NetworkManager_initrc_exec_t, NetworkManager_initrc_exec_t)
+')
+
########################################
## <summary>
## Execute NetworkManager server in the NetworkManager domain.