diff options
author | Stefano Brivio <sbrivio@redhat.com> | 2023-10-09 23:04:47 +0200 |
---|---|---|
committer | Stefano Brivio <sbrivio@redhat.com> | 2023-11-07 09:52:55 +0100 |
commit | 3fb3f0f7a59498bdea1d199eecfdbae6c608f78f (patch) | |
tree | b26b4764ad4daf834412467a175c52b76d4a975f /contrib/selinux/passt.te | |
parent | f851084c96e0a932e51c15ad9551e2cd85362147 (diff) | |
download | passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.tar passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.tar.gz passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.tar.bz2 passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.tar.lz passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.tar.xz passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.tar.zst passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.zip |
selinux: Drop user_namespace class rules for Fedora 37
With current selinux-policy-37.22-1.fc37.noarch, and presumably any
future update for Fedora 37, the user_namespace class is not
available, so statements using it prevent the policy from being
loaded.
If a class is not defined in the base policy, any related permission
is assumed to be enabled, so we can safely drop those.
Link: https://bugzilla.redhat.com/show_bug.cgi?id=2237996
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Diffstat (limited to 'contrib/selinux/passt.te')
-rw-r--r-- | contrib/selinux/passt.te | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/contrib/selinux/passt.te b/contrib/selinux/passt.te index facc2d1..ea768d9 100644 --- a/contrib/selinux/passt.te +++ b/contrib/selinux/passt.te @@ -53,7 +53,6 @@ require { class capability { sys_tty_config setuid setgid }; class cap_userns { setpcap sys_admin sys_ptrace }; - class user_namespace create; } type passt_t; @@ -93,7 +92,6 @@ allow syslogd_t self:cap_userns sys_ptrace; allow passt_t self:process setcap; allow passt_t self:capability { sys_tty_config setpcap net_bind_service setuid setgid}; allow passt_t self:cap_userns { setpcap sys_admin sys_ptrace }; -allow passt_t self:user_namespace create; allow passt_t passwd_file_t:file read_file_perms; sssd_search_lib(passt_t) |