From 7fc76cf77b007a3f79b7369ce578d11270aef9c2 Mon Sep 17 00:00:00 2001 From: Yi Zhao Date: Mon, 4 Mar 2024 15:18:22 +0800 Subject: refpolicy: upgrade 20231002+git -> 20240226+git ChangeLog: https://github.com/SELinuxProject/refpolicy/blob/main/Changelog Notable Changes: Many systemd updates up to v255 RPM and dnf fixes Tighten private key handling for Apache Many container and kubernetes improvements Add support for Cilium Update object class definitions up to io_uring:cmd Add additional rules to cloud-init based on sysadm_t * Update to latest git rev. * Refresh patches. * Add a patch to fix reboot timeout error. Signed-off-by: Yi Zhao Signed-off-by: Joe MacDonald --- ...les-system-init-all-init_t-to-read-any-le.patch | 40 ++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 recipes-security/refpolicy/refpolicy/0051-policy-modules-system-init-all-init_t-to-read-any-le.patch (limited to 'recipes-security/refpolicy/refpolicy/0051-policy-modules-system-init-all-init_t-to-read-any-le.patch') diff --git a/recipes-security/refpolicy/refpolicy/0051-policy-modules-system-init-all-init_t-to-read-any-le.patch b/recipes-security/refpolicy/refpolicy/0051-policy-modules-system-init-all-init_t-to-read-any-le.patch new file mode 100644 index 0000000..687e1c9 --- /dev/null +++ b/recipes-security/refpolicy/refpolicy/0051-policy-modules-system-init-all-init_t-to-read-any-le.patch @@ -0,0 +1,40 @@ +From 980d9d3f3c3e1e3517971715c351ec7b747105d0 Mon Sep 17 00:00:00 2001 +From: Wenzong Fan +Date: Wed, 3 Feb 2016 04:16:06 -0500 +Subject: [PATCH] policy/modules/system/init: all init_t to read any level + sockets + +Fixes: + avc: denied { listen } for pid=1 comm="systemd" \ + path="/run/systemd/journal/stdout" \ + scontext=system_u:system_r:init_t:s0-s15:c0.c1023 \ + tcontext=system_u:system_r:syslogd_t:s15:c0.c1023 \ + tclass=unix_stream_socket permissive=1 + + systemd[1]: Failded to listen on Journal Socket + +Upstream-Status: Inappropriate [embedded specific] + +Signed-off-by: Wenzong Fan +Signed-off-by: Yi Zhao +--- + policy/modules/system/init.te | 3 +++ + 1 file changed, 3 insertions(+) + +diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te +index 458906ac5..c2380d8b4 100644 +--- a/policy/modules/system/init.te ++++ b/policy/modules/system/init.te +@@ -243,6 +243,9 @@ mls_key_write_all_levels(init_t) + mls_file_downgrade(init_t) + mls_file_upgrade(init_t) + ++# MLS trusted for reading from sockets at any level ++mls_socket_read_all_levels(init_t) ++ + # the following one is needed for libselinux:is_selinux_enabled() + # otherwise the call fails and sysvinit tries to load the policy + # again when using the initramfs +-- +2.25.1 + -- cgit v1.2.3-54-g00ecf