forked from pool/selinux-policy
b66c2b8ce6
- Update to version 20221019. Refreshed: * distro_suse_to_distro_redhat.patch * fix_apache.patch * fix_chronyd.patch * fix_cron.patch * fix_init.patch * fix_kernel_sysctl.patch * fix_networkmanager.patch * fix_rpm.patch * fix_sysnetwork.patch * fix_systemd.patch * fix_systemd_watch.patch * fix_unconfined.patch * fix_unconfineduser.patch * fix_unprivuser.patch * fix_xserver.patch - Dropped fix_cockpit.patch as this is now packaged with cockpit itself - Remove the ipa module, freeip ships their own module - Added fix_alsa.patch to allow reading of config files in home directories - Extended fix_networkmanager.patch and fix_postfix.patch to account for SUSE systems - Added dontaudit_interface_kmod_tmpfs.patch to prevent AVCs when startproc queries the running processes - Updated fix_snapper.patch to allow snapper to talk to rpm via dbus OBS-URL: https://build.opensuse.org/request/show/1035580 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=155
110 lines
4.2 KiB
Diff
110 lines
4.2 KiB
Diff
Index: fedora-policy-20221019/policy/modules/contrib/networkmanager.te
|
|
===================================================================
|
|
--- fedora-policy-20221019.orig/policy/modules/contrib/networkmanager.te
|
|
+++ fedora-policy-20221019/policy/modules/contrib/networkmanager.te
|
|
@@ -275,6 +275,9 @@ userdom_read_home_certs(NetworkManager_t
|
|
userdom_read_user_home_content_files(NetworkManager_t)
|
|
userdom_dgram_send(NetworkManager_t)
|
|
|
|
+hostname_exec(NetworkManager_t)
|
|
+networkmanager_systemctl(NetworkManager_t)
|
|
+
|
|
tunable_policy(`use_nfs_home_dirs',`
|
|
fs_read_nfs_files(NetworkManager_t)
|
|
')
|
|
@@ -284,6 +287,10 @@ tunable_policy(`use_samba_home_dirs',`
|
|
')
|
|
|
|
optional_policy(`
|
|
+ nis_systemctl_ypbind(NetworkManager_t)
|
|
+')
|
|
+
|
|
+optional_policy(`
|
|
avahi_domtrans(NetworkManager_t)
|
|
avahi_kill(NetworkManager_t)
|
|
avahi_signal(NetworkManager_t)
|
|
@@ -292,6 +299,14 @@ optional_policy(`
|
|
')
|
|
|
|
optional_policy(`
|
|
+ packagekit_dbus_chat(NetworkManager_t)
|
|
+')
|
|
+
|
|
+optional_policy(`
|
|
+ networkmanager_dbus_chat(NetworkManager_t)
|
|
+')
|
|
+
|
|
+optional_policy(`
|
|
bind_domtrans(NetworkManager_t)
|
|
bind_manage_cache(NetworkManager_t)
|
|
bind_kill(NetworkManager_t)
|
|
@@ -419,6 +434,8 @@ optional_policy(`
|
|
nscd_kill(NetworkManager_t)
|
|
nscd_initrc_domtrans(NetworkManager_t)
|
|
nscd_systemctl(NetworkManager_t)
|
|
+ nscd_socket_use(NetworkManager_dispatcher_tlp_t)
|
|
+ nscd_socket_use(NetworkManager_dispatcher_custom_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
@@ -606,6 +623,7 @@ files_manage_etc_files(NetworkManager_di
|
|
|
|
init_status(NetworkManager_dispatcher_cloud_t)
|
|
init_status(NetworkManager_dispatcher_ddclient_t)
|
|
+init_status(NetworkManager_dispatcher_custom_t)
|
|
init_append_stream_sockets(networkmanager_dispatcher_plugin)
|
|
init_ioctl_stream_sockets(networkmanager_dispatcher_plugin)
|
|
init_stream_connect(networkmanager_dispatcher_plugin)
|
|
@@ -621,6 +639,10 @@ optional_policy(`
|
|
')
|
|
|
|
optional_policy(`
|
|
+ nscd_shm_use(NetworkManager_dispatcher_chronyc_t)
|
|
+')
|
|
+
|
|
+optional_policy(`
|
|
cloudform_init_domtrans(NetworkManager_dispatcher_cloud_t)
|
|
')
|
|
|
|
Index: fedora-policy-20221019/policy/modules/contrib/networkmanager.if
|
|
===================================================================
|
|
--- fedora-policy-20221019.orig/policy/modules/contrib/networkmanager.if
|
|
+++ fedora-policy-20221019/policy/modules/contrib/networkmanager.if
|
|
@@ -132,6 +132,24 @@ interface(`networkmanager_initrc_domtran
|
|
init_labeled_script_domtrans($1, NetworkManager_initrc_exec_t)
|
|
')
|
|
|
|
+#######################################
|
|
+## <summary>
|
|
+## Allow reading of NetworkManager link files
|
|
+## </summary>
|
|
+## <param name="domain">
|
|
+## <summary>
|
|
+## Domain allowed to read the links
|
|
+## </summary>
|
|
+## </param>
|
|
+#
|
|
+interface(`networkmanager_initrc_read_lnk_files',`
|
|
+ gen_require(`
|
|
+ type NetworkManager_initrc_exec_t;
|
|
+ ')
|
|
+
|
|
+ read_lnk_files_pattern($1, NetworkManager_initrc_exec_t, NetworkManager_initrc_exec_t)
|
|
+')
|
|
+
|
|
########################################
|
|
## <summary>
|
|
## Execute NetworkManager server in the NetworkManager domain.
|
|
Index: fedora-policy-20221019/policy/modules/contrib/networkmanager.fc
|
|
===================================================================
|
|
--- fedora-policy-20221019.orig/policy/modules/contrib/networkmanager.fc
|
|
+++ fedora-policy-20221019/policy/modules/contrib/networkmanager.fc
|
|
@@ -24,6 +24,7 @@
|
|
/usr/lib/NetworkManager/dispatcher\.d/04-iscsi -- gen_context(system_u:object_r:NetworkManager_dispatcher_iscsid_script_t,s0)
|
|
/usr/lib/NetworkManager/dispatcher\.d/10-sendmail -- gen_context(system_u:object_r:NetworkManager_dispatcher_sendmail_script_t,s0)
|
|
/usr/lib/NetworkManager/dispatcher\.d/11-dhclient -- gen_context(system_u:object_r:NetworkManager_dispatcher_dhclient_script_t,s0)
|
|
+/usr/lib/NetworkManager/dispatcher\.d/20-chrony -- gen_context(system_u:object_r:NetworkManager_dispatcher_chronyc_script_t,s0)
|
|
/usr/lib/NetworkManager/dispatcher\.d/20-chrony-dhcp -- gen_context(system_u:object_r:NetworkManager_dispatcher_chronyc_script_t,s0)
|
|
/usr/lib/NetworkManager/dispatcher\.d/20-chrony-onoffline -- gen_context(system_u:object_r:NetworkManager_dispatcher_chronyc_script_t,s0)
|
|
/usr/lib/NetworkManager/dispatcher\.d/30-winbind -- gen_context(system_u:object_r:NetworkManager_dispatcher_winbind_script_t,s0)
|