1
0
selinux-policy/fix_systemd.patch
Johannes Segitz 08dba4d639 Accepting request 988934 from home:jsegitz:branches:security:SELinux
- Update fix_systemd.patch to add cap sys_admin and kernel_dgram_send for
  systemd_gpt_generator_t (bsc#1200911)

OBS-URL: https://build.opensuse.org/request/show/988934
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=135
2022-07-13 08:54:50 +00:00

45 lines
1.3 KiB
Diff

Index: fedora-policy-20220624/policy/modules/system/systemd.te
===================================================================
--- fedora-policy-20220624.orig/policy/modules/system/systemd.te
+++ fedora-policy-20220624/policy/modules/system/systemd.te
@@ -355,6 +355,10 @@ userdom_manage_user_tmp_chr_files(system
xserver_dbus_chat(systemd_logind_t)
optional_policy(`
+ packagekit_dbus_chat(systemd_logind_t)
+')
+
+optional_policy(`
apache_read_tmp_files(systemd_logind_t)
')
@@ -882,6 +886,10 @@ optional_policy(`
udev_read_pid_files(systemd_hostnamed_t)
')
+optional_policy(`
+ nscd_unconfined(systemd_hostnamed_t)
+')
+
#######################################
#
# rfkill policy
@@ -1105,7 +1113,7 @@ systemd_read_efivarfs(systemd_hwdb_t)
# systemd_gpt_generator domain
#
-allow systemd_gpt_generator_t self:capability sys_rawio;
+allow systemd_gpt_generator_t self:capability { sys_rawio sys_admin};
allow systemd_gpt_generator_t self:netlink_kobject_uevent_socket create_socket_perms;
dev_read_sysfs(systemd_gpt_generator_t)
@@ -1127,6 +1135,8 @@ systemd_unit_file_filetrans(systemd_gpt_
systemd_create_unit_file_dirs(systemd_gpt_generator_t)
systemd_create_unit_file_lnk(systemd_gpt_generator_t)
+kernel_dgram_send(systemd_gpt_generator_t)
+
optional_policy(`
udev_read_pid_files(systemd_gpt_generator_t)
')