Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package selinux-policy for openSUSE:Factory checked in at 2025-01-21 21:09:50 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/selinux-policy (Old) and /work/SRC/openSUSE:Factory/.selinux-policy.new.5589 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "selinux-policy" Tue Jan 21 21:09:50 2025 rev:94 rq:1239232 version:20250121 Changes: -------- --- /work/SRC/openSUSE:Factory/selinux-policy/selinux-policy.changes 2025-01-12 11:09:25.434754205 +0100 +++ /work/SRC/openSUSE:Factory/.selinux-policy.new.5589/selinux-policy.changes 2025-01-21 21:10:09.470192365 +0100 @@ -1,0 +2,21 @@ +Tue Jan 21 09:33:04 UTC 2025 - cathy...@suse.com + +- Update to version 20250121: + * wtmpdbd systemd service uses NoNewPrivileges (bsc#1235660) + * Transition samba-dcerpcd pid file from smbd_var_run_t to winbind_var_run_t (bsc#1235801) + * /run/samba/samba-dcerpcd.pid needs fc type winbind_rpcd_var_run_t (bsc#1235801) + * Adjust rpcd_lsad, samba-bgqd, samba-dcerpcd to SUSE-specific part (bsc#1235801) + * Transition nmbd pid file from smbd_var_run_t to nmbd_var_run_t (bsc#1235801) + +------------------------------------------------------------------- +Mon Jan 20 08:43:53 UTC 2025 - cathy...@suse.com + +- Update to version 20250120: + * Allow database rotation for wtmpdbd_t + * Allow wtmpdbd to send messages notifications + * Introduce policy for wtmpdbd (bsc#1235660) + * Label xrdp scripts in /etc as bin_t (bsc#1233738) + * introduce unconfined_service_transition_to_unconfined_user boolean (bsc#1233738) + * Allow init to manage DOS files (bsc#1232527) + +------------------------------------------------------------------- Old: ---- selinux-policy-20250109.tar.xz New: ---- selinux-policy-20250121.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ selinux-policy.spec ++++++ --- /var/tmp/diff_new_pack.yGNBLR/_old 2025-01-21 21:10:10.078217463 +0100 +++ /var/tmp/diff_new_pack.yGNBLR/_new 2025-01-21 21:10:10.078217463 +0100 @@ -36,7 +36,7 @@ License: GPL-2.0-or-later Group: System/Management Name: selinux-policy -Version: 20250109 +Version: 20250121 Release: 0 Source0: %{name}-%{version}.tar.xz Source1: container.fc ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.yGNBLR/_old 2025-01-21 21:10:10.174221425 +0100 +++ /var/tmp/diff_new_pack.yGNBLR/_new 2025-01-21 21:10:10.182221756 +0100 @@ -1,7 +1,7 @@ <servicedata> <service name="tar_scm"> <param name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param> - <param name="changesrevision">e706802b7bfd75c30c10bbe66e23019e5514dc34</param></service><service name="tar_scm"> + <param name="changesrevision">0cb2a7bb54aadca23c8fb6c94099afd1bc58946a</param></service><service name="tar_scm"> <param name="url">https://github.com/containers/container-selinux.git</param> <param name="changesrevision">07b3034f6d9625ab84508a2f46515d8ff79b4204</param></service><service name="tar_scm"> <param name="url">https://gitlab.suse.de/jsegitz/selinux-policy.git</param> ++++++ selinux-policy-20250109.tar.xz -> selinux-policy-20250121.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250109/dist/minimum/booleans.conf new/selinux-policy-20250121/dist/minimum/booleans.conf --- old/selinux-policy-20250109/dist/minimum/booleans.conf 2025-01-09 17:58:38.000000000 +0100 +++ new/selinux-policy-20250121/dist/minimum/booleans.conf 2025-01-21 10:32:40.000000000 +0100 @@ -246,3 +246,6 @@ # Allow mount to mount any file/dir # allow_mount_anyfile = true + +# Allows unconfined_service_t to transition to unconfined_t +unconfined_service_transition_to_unconfined_user = false diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250109/dist/targeted/booleans.conf new/selinux-policy-20250121/dist/targeted/booleans.conf --- old/selinux-policy-20250109/dist/targeted/booleans.conf 2025-01-09 17:58:38.000000000 +0100 +++ new/selinux-policy-20250121/dist/targeted/booleans.conf 2025-01-21 10:32:40.000000000 +0100 @@ -57,3 +57,4 @@ xguest_exec_content = false xserver_execmem = false zebra_write_config = false +unconfined_service_transition_to_unconfined_user = false diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250109/policy/modules/contrib/samba.fc new/selinux-policy-20250121/policy/modules/contrib/samba.fc --- old/selinux-policy-20250109/policy/modules/contrib/samba.fc 2025-01-09 17:58:38.000000000 +0100 +++ new/selinux-policy-20250121/policy/modules/contrib/samba.fc 2025-01-21 10:32:40.000000000 +0100 @@ -18,9 +18,9 @@ /usr/lib/systemd/system/nmb.* -- gen_context(system_u:object_r:samba_unit_file_t,s0) /usr/lib/systemd/system/winbind.* -- gen_context(system_u:object_r:samba_unit_file_t,s0) -/usr/libexec/samba/rpcd_lsad -- gen_context(system_u:object_r:winbind_rpcd_exec_t,s0) -/usr/libexec/samba/samba-bgqd -- gen_context(system_u:object_r:samba_bgqd_exec_t,s0) -/usr/libexec/samba/samba-dcerpcd -- gen_context(system_u:object_r:winbind_rpcd_exec_t,s0) +/usr/lib/samba/rpcd_lsad -- gen_context(system_u:object_r:winbind_rpcd_exec_t,s0) +/usr/lib/samba/samba-bgqd -- gen_context(system_u:object_r:samba_bgqd_exec_t,s0) +/usr/lib/samba/samba-dcerpcd -- gen_context(system_u:object_r:winbind_rpcd_exec_t,s0) /usr/bin/net -- gen_context(system_u:object_r:samba_net_exec_t,s0) /usr/bin/ntlm_auth -- gen_context(system_u:object_r:winbind_helper_exec_t,s0) @@ -66,6 +66,8 @@ /run/samba/smbd\.pid -- gen_context(system_u:object_r:smbd_var_run_t,s0) /run/samba/unexpected\.tdb -- gen_context(system_u:object_r:nmbd_var_run_t,s0) +/run/samba/samba-dcerpcd.pid -- gen_context(system_u:object_r:winbind_rpcd_var_run_t,s0) + /run/samba/winbindd(/.*)? gen_context(system_u:object_r:winbind_var_run_t,s0) /run/winbindd(/.*)? gen_context(system_u:object_r:winbind_var_run_t,s0) /run/samba-bgqd.pid -- gen_context(system_u:object_r:samba_bgqd_var_run_t,s0) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250109/policy/modules/contrib/samba.te new/selinux-policy-20250121/policy/modules/contrib/samba.te --- old/selinux-policy-20250109/policy/modules/contrib/samba.te 2025-01-09 17:58:38.000000000 +0100 +++ new/selinux-policy-20250121/policy/modules/contrib/samba.te 2025-01-21 10:32:40.000000000 +0100 @@ -731,7 +731,7 @@ manage_files_pattern(nmbd_t, nmbd_var_run_t, nmbd_var_run_t) manage_sock_files_pattern(nmbd_t, nmbd_var_run_t, nmbd_var_run_t) files_pid_filetrans(nmbd_t, nmbd_var_run_t, { dir file sock_file }) -filetrans_pattern(nmbd_t, smbd_var_run_t, nmbd_var_run_t, dir) +filetrans_pattern(nmbd_t, smbd_var_run_t, nmbd_var_run_t, { file dir }) read_files_pattern(nmbd_t, samba_etc_t, samba_etc_t) read_lnk_files_pattern(nmbd_t, samba_etc_t, samba_etc_t) @@ -1272,6 +1272,7 @@ manage_files_pattern(winbind_rpcd_t, winbind_rpcd_var_run_t, winbind_rpcd_var_run_t) files_pid_filetrans(winbind_rpcd_t, winbind_rpcd_var_run_t, { dir file }) +filetrans_pattern(winbind_rpcd_t, smbd_var_run_t, winbind_rpcd_var_run_t, file) manage_files_pattern(winbind_rpcd_t, winbind_rpcd_tmp_t, winbind_rpcd_tmp_t) files_tmp_filetrans(winbind_rpcd_t, winbind_rpcd_tmp_t, file) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250109/policy/modules/kernel/corecommands.fc new/selinux-policy-20250121/policy/modules/kernel/corecommands.fc --- old/selinux-policy-20250109/policy/modules/kernel/corecommands.fc 2025-01-09 17:58:38.000000000 +0100 +++ new/selinux-policy-20250121/policy/modules/kernel/corecommands.fc 2025-01-21 10:32:40.000000000 +0100 @@ -122,6 +122,9 @@ /etc/X11/xdm/Xsetup_0 -- gen_context(system_u:object_r:bin_t,s0) /etc/X11/xinit(/.*)? gen_context(system_u:object_r:bin_t,s0) +/etc/xrdp/startwm.sh -- gen_context(system_u:object_r:bin_t,s0) +/etc/xrdp/reconnectwm.sh -- gen_context(system_u:object_r:bin_t,s0) + /etc/xen/qemu-ifup -- gen_context(system_u:object_r:bin_t,s0) /etc/xen/scripts(/.*)? gen_context(system_u:object_r:bin_t,s0) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250109/policy/modules/services/ssh.te new/selinux-policy-20250121/policy/modules/services/ssh.te --- old/selinux-policy-20250109/policy/modules/services/ssh.te 2025-01-09 17:58:38.000000000 +0100 +++ new/selinux-policy-20250121/policy/modules/services/ssh.te 2025-01-21 10:32:40.000000000 +0100 @@ -504,6 +504,10 @@ ') optional_policy(` + auth_use_wtmpdbd_varlink_sockets(sshd_t) +') + +optional_policy(` tunable_policy(`ssh_use_tcpd',` tcpd_wrapped_domain(sshd_t,sshd_exec_t) tcpd_rw_tcp_sockets(sshd_net_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250109/policy/modules/system/authlogin.fc new/selinux-policy-20250121/policy/modules/system/authlogin.fc --- old/selinux-policy-20250109/policy/modules/system/authlogin.fc 2025-01-09 17:58:38.000000000 +0100 +++ new/selinux-policy-20250121/policy/modules/system/authlogin.fc 2025-01-21 10:32:40.000000000 +0100 @@ -71,6 +71,8 @@ /var/lib/wtmpdb(/.*)? gen_context(system_u:object_r:wtmpdb_t,s0) /var/lib/wtmpdb/wtmp.db-journal -- gen_context(system_u:object_r:wtmpdb_journal_t,s0) +/run/wtmpdb(/.*)? gen_context(system_u:object_r:wtmpdbd_var_run_t,s0) +/usr/libexec/wtmpdbd -- gen_context(system_u:object_r:wtmpdbd_exec_t,s0) /var/lib/rsa(/.*)? gen_context(system_u:object_r:var_auth_t,s0) /var/rsa(/.*)? gen_context(system_u:object_r:var_auth_t,s0) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250109/policy/modules/system/authlogin.if new/selinux-policy-20250121/policy/modules/system/authlogin.if --- old/selinux-policy-20250109/policy/modules/system/authlogin.if 2025-01-09 17:58:38.000000000 +0100 +++ new/selinux-policy-20250121/policy/modules/system/authlogin.if 2025-01-21 10:32:40.000000000 +0100 @@ -2067,6 +2067,26 @@ ######################################## ## <summary> +## Use wtmpdbd varlink sockets. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`auth_use_wtmpdbd_varlink_sockets',` + gen_require(` + type wtmpdbd_var_run_t; + type wtmpdbd_t; + ') + + allow $1 wtmpdbd_var_run_t:sock_file write; + allow $1 wtmpdbd_t:unix_stream_socket connectto; +') + +######################################## +## <summary> ## Read access to the authlogin module. ## </summary> ## <desc> diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250109/policy/modules/system/authlogin.te new/selinux-policy-20250121/policy/modules/system/authlogin.te --- old/selinux-policy-20250109/policy/modules/system/authlogin.te 2025-01-09 17:58:38.000000000 +0100 +++ new/selinux-policy-20250121/policy/modules/system/authlogin.te 2025-01-21 10:32:40.000000000 +0100 @@ -119,6 +119,14 @@ type wtmpdb_journal_t; logging_log_file(wtmpdb_journal_t) +type wtmpdbd_t; +type wtmpdbd_exec_t; +init_daemon_domain(wtmpdbd_t, wtmpdbd_exec_t) +init_nnp_daemon_domain(wtmpdbd_t) + +type wtmpdbd_var_run_t; +files_pid_file(wtmpdbd_var_run_t) + ######################################## # # Check password local policy @@ -724,3 +732,19 @@ ssh_agent_exec(login_pgm) ssh_read_user_home_files(login_pgm) ') + +####################################### +# +# wtmpdb Program local policy +# + +allow wtmpdbd_t self:unix_dgram_socket { create write getopt setopt }; +allow wtmpdbd_t wtmpdbd_var_run_t:dir getattr; +allow wtmpdbd_t wtmpdb_t:file manage_file_perms; + +kernel_dgram_send(wtmpdbd_t) + +auth_rw_wtmpdb_login_records(wtmpdbd_t) +logging_dgram_send(wtmpdbd_t) +logging_read_syslog_pid(wtmpdbd_t) +logging_write_syslog_pid_socket(wtmpdbd_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250109/policy/modules/system/init.te new/selinux-policy-20250121/policy/modules/system/init.te --- old/selinux-policy-20250109/policy/modules/system/init.te 2025-01-09 17:58:38.000000000 +0100 +++ new/selinux-policy-20250121/policy/modules/system/init.te 2025-01-21 10:32:40.000000000 +0100 @@ -698,6 +698,7 @@ fs_manage_cgroup_files(init_t) fs_manage_bpf_dirs(init_t) fs_manage_bpf_files(init_t) +fs_manage_dos_files(init_t) fs_manage_hugetlbfs_dirs(init_t) fs_manage_tmpfs_dirs(init_t) fs_relabel_tmpfs_blk_file(init_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250109/policy/modules/system/unconfined.te new/selinux-policy-20250121/policy/modules/system/unconfined.te --- old/selinux-policy-20250109/policy/modules/system/unconfined.te 2025-01-09 17:58:38.000000000 +0100 +++ new/selinux-policy-20250121/policy/modules/system/unconfined.te 2025-01-21 10:32:40.000000000 +0100 @@ -11,6 +11,13 @@ # attribute unconfined_services; +## <desc> +## <p> +## allow unconfined_service_t transition to the unconfined user domain +## </p> +## </desc> +gen_tunable(unconfined_service_transition_to_unconfined_user, false) + type unconfined_service_t; domain_type(unconfined_service_t) role system_r types unconfined_service_t; @@ -57,3 +64,9 @@ optional_policy(` gpg_manage_admin_home_content(unconfined_service_t) ') + +optional_policy(` + tunable_policy(`unconfined_service_transition_to_unconfined_user',` + unconfined_domtrans(unconfined_service_t) + ') +')