From: Tom Gundersen <teg@xxxxxxx> As described in [0], this likely did not have the intended effect, so simply remove it. The change in behavior is that up until this patch it would be possible for any non-system user to potentially gain access to selinux' dbus interface. Now this is extended to also allow any system user. As the comment indicates, PolicyKit is used to enforce access, so this should be perfectly harmless. [0]: <https://www.spinics.net/lists/linux-bluetooth/msg75267.html> Signed-off-by: Tom Gundersen <teg@xxxxxxx> CC: David Herrmann <dh.herrmann@xxxxxxxxx> --- This patch is from PR 113 - https://github.com/SELinuxProject/selinux/pull/113 dbus/org.selinux.conf | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/dbus/org.selinux.conf b/dbus/org.selinux.conf index a3509781..1ae079d2 100644 --- a/dbus/org.selinux.conf +++ b/dbus/org.selinux.conf @@ -12,12 +12,8 @@ <!-- Allow anyone to invoke methods on the interfaces, authorization is performed by PolicyKit --> - <policy at_console="true"> - <allow send_destination="org.selinux"/> - </policy> <policy context="default"> - <allow send_destination="org.selinux" - send_interface="org.freedesktop.DBus.Introspectable"/> + <allow send_destination="org.selinux"/> </policy> </busconfig> -- 2.19.1