c4556003bf
- Update to version 20230125. Refreshed: * distro_suse_to_distro_redhat.patch * fix_dnsmasq.patch * fix_init.patch * fix_ipsec.patch * fix_kernel_sysctl.patch * fix_logging.patch * fix_rpm.patch * fix_selinuxutil.patch * fix_systemd_watch.patch * fix_userdomain.patch - More flexible lib(exec) matching in fix_fwupd.patch - Removed sys_admin for systemd_gpt_generator_t in fix_systemd.patch - Dropped fix_container.patch, is now upstream - Added fix_entropyd.patch * Added new interface entropyd_semaphore_filetrans to properly transfer semaphore created during early boot. That doesn't work yet, so work around with next item * Allow reading tempfs files - Added fix_kernel.patch. Added modutils_execute_kmod_tmpfs_files interace to allow kmod_tmpfs_t files to be executed. Necessary for firewalld - Added fix_rtkit.patch to fix labeling of binary - Modified fix_ntp.patch: * Proper labeling for start-ntpd * Fixed label rules for chroot path * Temporarily allow dac_override for ntpd_t (bsc#1207577) * Add interface ntp_manage_pid_files to allow management of pid files - Updated fix_networkmanager.patch to allow managing ntp pid files OBS-URL: https://build.opensuse.org/request/show/1061575 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=171
21 lines
1.2 KiB
Diff
21 lines
1.2 KiB
Diff
Index: fedora-policy-20230116/policy/modules/system/ipsec.te
|
|
===================================================================
|
|
--- fedora-policy-20230116.orig/policy/modules/system/ipsec.te
|
|
+++ fedora-policy-20230116/policy/modules/system/ipsec.te
|
|
@@ -88,6 +88,7 @@ allow ipsec_t self:tcp_socket create_str
|
|
allow ipsec_t self:udp_socket create_socket_perms;
|
|
allow ipsec_t self:packet_socket create_socket_perms;
|
|
allow ipsec_t self:key_socket create_socket_perms;
|
|
+allow ipsec_t self:alg_socket create_socket_perms;
|
|
allow ipsec_t self:fifo_file read_fifo_file_perms;
|
|
allow ipsec_t self:netlink_xfrm_socket { create_netlink_socket_perms nlmsg_write };
|
|
allow ipsec_t self:netlink_selinux_socket create_socket_perms;
|
|
@@ -270,6 +271,7 @@ allow ipsec_mgmt_t self:unix_stream_sock
|
|
allow ipsec_mgmt_t self:tcp_socket create_stream_socket_perms;
|
|
allow ipsec_mgmt_t self:udp_socket create_socket_perms;
|
|
allow ipsec_mgmt_t self:key_socket create_socket_perms;
|
|
+allow ipsec_mgmt_t self:alg_socket create_socket_perms;
|
|
allow ipsec_mgmt_t self:fifo_file rw_fifo_file_perms;
|
|
allow ipsec_mgmt_t self:netlink_xfrm_socket { create_netlink_socket_perms nlmsg_read };
|
|
allow ipsec_mgmt_t self:netlink_route_socket { create_netlink_socket_perms };
|