Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package selinux-policy for openSUSE:Factory 
checked in at 2025-01-09 15:05:05
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/selinux-policy (Old)
 and      /work/SRC/openSUSE:Factory/.selinux-policy.new.1881 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "selinux-policy"

Thu Jan  9 15:05:05 2025 rev:92 rq:1235571 version:20241220

Changes:
--------
--- /work/SRC/openSUSE:Factory/selinux-policy/selinux-policy.changes    
2024-12-17 19:23:22.401451164 +0100
+++ /work/SRC/openSUSE:Factory/.selinux-policy.new.1881/selinux-policy.changes  
2025-01-09 15:05:26.983342085 +0100
@@ -1,0 +2,156 @@
+Fri Dec 20 12:51:57 UTC 2024 - cathy...@suse.com
+
+- Update to version 20241220:
+  * Revert "Remove the fail2ban module sources"
+  * Revert "Remove the linuxptp module sources"
+  * Revert "Remove the amtu module sources"
+  * Allow auditctl signal auditd
+  * Dontaudit systemd-coredump the sys_resource capability
+  * Allow traceroute_t bind rawip sockets to unreserved ports
+  * Fix the cups_read_pid_files() interface to use read_files_pattern
+  * Allow virtqemud additional permissions for tmpfs_t blk devices
+  * Allow virtqemud rw access to svirt_image_t chr files
+  * Allow virtqemud rw and setattr access to fixed block devices
+  * Label /etc/mdevctl.d/scripts.d with bin_t
+  * Allow virtqemud open svirt_devpts_t char files
+  * Allow virtqemud relabelfrom virt_log_t files
+  * Allow svirt_tcg_t read virtqemud_t fifo_files
+  * Allow virtqemud rw and setattr access to sev devices
+  * Allow virtqemud directly read and write to a fixed disk
+  * Allow virtqemud_t relabel virt_var_lib_t files
+  * Allow virtqemud_t relabel virtqemud_var_run_t sock_files
+  * Add gnome_filetrans_gstreamer_admin_home_content() interface
+  * Label /dev/swradio, /dev/v4l-subdev, /dev/v4l-touch with v4l_device_t
+  * Make bootupd_t permissive
+  * Allow init_t nnp domain transition to locate_t
+  * allow gdm and iiosensorproxy talk to each other via D-bus
+  * Allow systemd-journald getattr nsfs files
+  * Allow sendmail to map mail server configuration files
+  * Allow procmail to read mail aliases
+  * Allow cifs.idmap helper to set attributes on kernel keys
+  * Allow irqbalance setpcap capability in the user namespace
+  * Allow sssd_selinux_manager_t the setcap process permission
+  * Allow systemd-sleep manage efivarfs files
+  * Allow systemd-related domains getattr nsfs files
+  * Allow svirt_t the sys_rawio capability
+  * Allow alsa watch generic device directories
+  * Move systemd-homed interfaces to seperate optional_policy block
+  * Update samba-bgqd policy
+  * Update virtlogd policy
+  * Allow svirt_t the sys_rawio capability
+  * Allow qemu-ga the dac_override and dac_read_search capabilities
+  * Allow bacula execute container in the container domain
+  * Allow httpd get attributes of dirsrv unit files
+  * Allow samba-bgqd read cups config files
+  * Add label rshim_var_run_t for /run/rshim.pid
+  * [5/5][sync from 'mysql-selinux'] Add mariadb-backup
+  * [4/5][sync from 'mysql-selinux'] Fix regex to also match 
'/var/lib/mysql/mysqlx.sock'
+  * [3/5][sync from 'mysql-selinux'] Allow mysqld_t to read and write to the 
'memory.pressure' file in cgroup2
+  * [2/5][sync from 'mysql-selinux'] 2nd attempt to fix rhbz#2186996 
rhbz#2221433 rhbz#2245705
+  * [1/5][sync from 'mysql-selinux'] Allow 'mysqld' to use '/usr/bin/hostname'
+  * Allow systemd-networkd read mount pid files
+  * Update policy for samba-bgqd
+  * Allow chronyd read networkmanager's pid files
+  * Allow staff user connect to generic tcp ports
+  * Allow gnome-remote-desktop dbus chat with policykit
+  * Allow tlp the setpgid process permission
+  * Update the bootupd policy
+  * Allow sysadm_t use the io_uring API
+  * Allow sysadm user dbus chat with virt-dbus
+  * Allow virtqemud_t read virsh_t files
+  * Allow virt_dbus_t connect to virtd_t over a unix stream socket
+  * Allow systemd-tpm2-generator read hardware state information
+  * Allow coreos-installer-generator execute generic programs
+  * Allow coreos-installer domain transition on udev execution
+  * Revert "Allow unconfined_t execute kmod in the kmod domain"
+  * Allow iio-sensor-proxy create and use unix dgram socket
+  * Allow virtstoraged read vm sysctls
+  * Support ssh connections via systemd-ssh-generator
+  * Label all semanage store files in /etc as semanage_store_t
+  * Add file transition for nvidia-modeset
+  * Allow dirsrv-snmp map dirsv_tmpfs_t files
+  * Label /usr/lib/node_modules_22/npm/bin with bin_t
+  * Add policy for /usr/libexec/samba/samba-bgqd
+  * Allow gnome-remote-desktop watch /etc directory
+  * Allow rpcd read network sysctls
+  * Allow journalctl connect to systemd-userdbd over a unix socket
+  * Allow some confined users send to lldpad over a unix dgram socket
+  * Allow lldpad send to unconfined_t over a unix dgram socket
+  * Allow lldpd connect to systemd-machined over a unix socket
+  * Confine the ktls service
+  * Allow dirsrv read network sysctls
+  * Label /run/sssd with sssd_var_run_t
+  * Label /etc/sysctl.d and /run/sysctl.d with system_conf_t
+  * Allow unconfined_t execute kmod in the kmod domain
+  * Allow confined users r/w to screen unix stream socket
+  * Label /root/.screenrc and /root/.tmux.conf with screen_home_t
+  * Allow virtqemud read virtd_t files
+  * Allow ping_t read network sysctls
+  * Allow systemd-homework connect to init over a unix socket
+  *  Fix systemd-homed blobs directory permissions
+  * Allow virtqemud read sgx_vepc devices
+  * Allow lldpad create and use netlink_generic_socket
+  * Allow systemd-homework write to init pid socket
+  * Allow init create /var/cache/systemd/home
+  * Confine the pcm service
+  * Allow login_userdomain read thumb tmp files
+  * Update power-profiles-daemon policy
+  * Fix the /etc/mdevctl\.d(/.*)? regexp
+  * Grant rhsmcertd chown capability & userdb access
+  * Allow iio-sensor-proxy the bpf capability
+  * Allow systemd-machined the kill user-namespace capability
+  * Remove the fail2ban module sources
+  * Remove the linuxptp module sources
+  * Remove legacy rules for slrnpull
+  * Remove the aiccu module sources
+  * Remove the bcfg2 module sources
+  * Remove the amtu module sources
+  * Remove the rhev module sources
+  * Remove all file context entries for /bin and /lib
+  * Allow ptp4l the sys_admin capability
+  * Confine power-profiles-daemon
+  * Label /var/cache/systemd/home with systemd_homed_cache_t
+  * Allow login_userdomain connect to systemd-homed over a unix socket
+  * Allow boothd connect to systemd-homed over a unix socket
+  * Allow systemd-homed get attributes of a tmpfs filesystem
+  * Allow abrt-dump-journal-core connect to systemd-homed over a unix socket
+  * Allow aide connect to systemd-homed over a unix socket
+  * Label /dev/hfi1_[0-9]+ devices
+  * Remove the openct module sources
+  * Remove the timidity module sources
+  * Enable the slrn module
+  * Remove i18n_input module sources
+  * Enable the distcc module
+  * Remove the ddcprobe module sources
+  * Remove the timedatex module sources
+  * Remove the djbdns module sources
+  * Confine iio-sensor-proxy
+  * Allow staff user nlmsg_write
+  * Update policy for xdm with confined users
+  * Allow virtnodedev watch mdevctl config dirs
+  * Allow ssh watch home config dirs
+  * Allow ssh map home configs files
+  * Allow ssh read network sysctls
+  * Allow chronyc sendto to chronyd-restricted
+  * Allow cups sys_ptrace capability in the user namespace
+  * Add policy for systemd-homed
+  * Remove fc entry for /usr/bin/pump
+  * Label /usr/bin/noping and /usr/bin/oping with ping_exec_t
+  * Allow accountsd read gnome-initial-setup tmp files
+  * Allow xdm write to gnome-initial-setup fifo files
+  * Allow rngd read and write generic usb devices
+  * Allow qatlib search the content of the kernel debugging filesystem
+  * Allow qatlib connect to systemd-machined over a unix socket
+  * mls/modules.conf - fix typo
+  * Use dist/targeted/modules.conf in build workflow
+  * Fix default and dist config files
+  * Allow unprivileged user watch /run/systemd
+  * CI: update to actions/checkout@v4
+  * Allow boothd connect to kernel over a unix socket
+  * Clean up and sync securetty_types
+  * Bring config files from dist-git into the source repo
+  * Confine gnome-remote-desktop
+  * Allow virtstoraged execute mount programs in the mount domain
+  * Make mdevctl_conf_t member of the file_type attribute
+
+-------------------------------------------------------------------

Old:
----
  selinux-policy-20241216.tar.xz

New:
----
  selinux-policy-20241220.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ selinux-policy.spec ++++++
--- /var/tmp/diff_new_pack.ETQlVl/_old  2025-01-09 15:05:27.723372858 +0100
+++ /var/tmp/diff_new_pack.ETQlVl/_new  2025-01-09 15:05:27.727373025 +0100
@@ -36,7 +36,7 @@
 License:        GPL-2.0-or-later
 Group:          System/Management
 Name:           selinux-policy
-Version:        20241216
+Version:        20241220
 Release:        0
 Source0:        %{name}-%{version}.tar.xz
 Source1:        container.fc

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.ETQlVl/_old  2025-01-09 15:05:27.787375519 +0100
+++ /var/tmp/diff_new_pack.ETQlVl/_new  2025-01-09 15:05:27.791375686 +0100
@@ -1,7 +1,7 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param>
-              <param 
name="changesrevision">bfd9b33da2f744e90adf070d92a2459bc7df97ab</param></service><service
 name="tar_scm">
+              <param 
name="changesrevision">33c703587e800be11fca3101b7caf2d4a5c77117</param></service><service
 name="tar_scm">
                 <param 
name="url">https://github.com/containers/container-selinux.git</param>
               <param 
name="changesrevision">07b3034f6d9625ab84508a2f46515d8ff79b4204</param></service><service
 name="tar_scm">
                 <param 
name="url">https://gitlab.suse.de/jsegitz/selinux-policy.git</param>


++++++ selinux-policy-20241216.tar.xz -> selinux-policy-20241220.tar.xz ++++++
++++ 2259 lines of diff (skipped)

Reply via email to