Blame SOURCES/fapolicyd-rules.patch

714ab2
diff -up ./init/fapolicyd.rules.fix ./init/fapolicyd.rules
714ab2
--- ./init/fapolicyd.rules.fix	2020-02-11 20:53:48.151150561 +0100
714ab2
+++ ./init/fapolicyd.rules	2020-02-11 20:55:02.451575384 +0100
714ab2
@@ -39,6 +39,10 @@ allow exe=/usr/bin/python2.7 : ftype=app
714ab2
 deny_audit perm=any all : ftype=text/x-python
714ab2
 #deny_audit perm=any all : ftype=application/octet-stream path=*.pyc
714ab2
 
714ab2
+# Allow shell script but block all other languages
714ab2
+allow perm=execute all : ftype=text/x-shellscript
714ab2
+allow perm=any all : ftype=text/plain
714ab2
+
714ab2
 #
714ab2
 # In this next optional languages section, choose either to
714ab2
 # block (default) or allow by commenting or uncommenting the
714ab2
@@ -66,10 +70,6 @@ deny_audit perm=any exe=/usr/bin/ruby :
714ab2
 #allow perm=open all : ftype=text/x-ruby trust=1
714ab2
 #deny_audit perm=any all : ftype=text/x-ruby
714ab2
 
714ab2
-# Allow shell script but block all other languages
714ab2
-allow perm=execute all : ftype=text/x-shellscript trust=1
714ab2
-allow perm=execute all : ftype=text/plain trust=1
714ab2
-
714ab2
 # This is a workaround for kernel thinking this is being executed. We
714ab2
 # catch actual execution in rule 3.
714ab2
 allow perm=execute all : path=/usr/lib64/ld-2.30.so trust=1