Skip to content

Conversation

yixiangzhike
Copy link
Contributor

Selinux-policy has allowed init_t nnp domain transition to gssproxy_t in the commit 95d5f5e.
Now it is ok to enable NoNewPrivileges for gssproxy.service.

…pen socket"

Selinux-policy has allowed init_t nnp domain transition to gssproxy_t in the commit 95d5f5e.
Now it is ok to enable NoNewPrivileges for gssproxy.service.

Signed-off-by: yixiangzhike <yixiangzhike007@163.com>
@simo5
Copy link
Contributor

simo5 commented Feb 25, 2025

Selinux-policy has allowed init_t nnp domain transition to gssproxy_t in the commit 95d5f5e. Now it is ok to enable NoNewPrivileges for gssproxy.service.

What OS has done this?
Or is it across the board?

@yixiangzhike
Copy link
Contributor Author

Selinux-policy has allowed init_t nnp domain transition to gssproxy_t in the commit 95d5f5e. Now it is ok to enable NoNewPrivileges for gssproxy.service.

What OS has done this? Or is it across the board?

The OS is openEuler. It's upstream selinux-policy is https://github.com/fedora-selinux/selinux-policy. Others can backport the patch 95d5f5e to enable NoNewPrivileges also.

@simo5
Copy link
Contributor

simo5 commented Mar 6, 2025

Coll, @jrisc confirmed that Fedora is also compatible with this change, so I am going to merge it in.

@simo5 simo5 merged commit b8e3364 into gssapi:main Mar 6, 2025
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants