From 3fb3f0f7a59498bdea1d199eecfdbae6c608f78f Mon Sep 17 00:00:00 2001 From: Stefano Brivio Date: Mon, 9 Oct 2023 23:04:47 +0200 Subject: [PATCH] selinux: Drop user_namespace class rules for Fedora 37 With current selinux-policy-37.22-1.fc37.noarch, and presumably any future update for Fedora 37, the user_namespace class is not available, so statements using it prevent the policy from being loaded. If a class is not defined in the base policy, any related permission is assumed to be enabled, so we can safely drop those. Link: https://bugzilla.redhat.com/show_bug.cgi?id=2237996 Signed-off-by: Stefano Brivio --- contrib/selinux/passt.te | 2 -- contrib/selinux/pasta.te | 2 -- 2 files changed, 4 deletions(-) diff --git a/contrib/selinux/passt.te b/contrib/selinux/passt.te index facc2d1..ea768d9 100644 --- a/contrib/selinux/passt.te +++ b/contrib/selinux/passt.te @@ -53,7 +53,6 @@ require { class capability { sys_tty_config setuid setgid }; class cap_userns { setpcap sys_admin sys_ptrace }; - class user_namespace create; } type passt_t; @@ -93,7 +92,6 @@ allow syslogd_t self:cap_userns sys_ptrace; allow passt_t self:process setcap; allow passt_t self:capability { sys_tty_config setpcap net_bind_service setuid setgid}; allow passt_t self:cap_userns { setpcap sys_admin sys_ptrace }; -allow passt_t self:user_namespace create; allow passt_t passwd_file_t:file read_file_perms; sssd_search_lib(passt_t) diff --git a/contrib/selinux/pasta.te b/contrib/selinux/pasta.te index ed70c5f..29c3d2a 100644 --- a/contrib/selinux/pasta.te +++ b/contrib/selinux/pasta.te @@ -88,7 +88,6 @@ require { class capability { sys_tty_config setuid setgid }; class cap_userns { setpcap sys_admin sys_ptrace net_bind_service net_admin }; - class user_namespace create; } type pasta_t; @@ -113,7 +112,6 @@ init_daemon_domain(pasta_t, pasta_exec_t) allow pasta_t self:capability { setpcap net_bind_service sys_tty_config dac_read_search net_admin sys_resource setuid setgid }; allow pasta_t self:cap_userns { setpcap sys_admin sys_ptrace net_admin net_bind_service }; -allow pasta_t self:user_namespace create; allow pasta_t passwd_file_t:file read_file_perms; sssd_search_lib(pasta_t)