Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package selinux-policy for openSUSE:Factory 
checked in at 2025-02-22 19:04:23
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/selinux-policy (Old)
 and      /work/SRC/openSUSE:Factory/.selinux-policy.new.1873 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "selinux-policy"

Sat Feb 22 19:04:23 2025 rev:101 rq:1247652 version:20250221

Changes:
--------
--- /work/SRC/openSUSE:Factory/selinux-policy/selinux-policy.changes    
2025-02-19 15:59:03.617353244 +0100
+++ /work/SRC/openSUSE:Factory/.selinux-policy.new.1873/selinux-policy.changes  
2025-02-22 19:04:25.793484949 +0100
@@ -1,0 +2,8 @@
+Fri Feb 21 13:36:08 UTC 2025 - cathy...@suse.com
+
+- Update to version 20250221:
+  * Allow named_filetrans_domain filetrans raid/mdadm named content 
(bsc#1236807)
+  * Grant privoxy_t the sys_chroot capability (bsc#1237375)
+  * Allow init_t nnp_transition to tor_t (bsc#1237375)
+
+-------------------------------------------------------------------

Old:
----
  selinux-policy-20250218.tar.xz

New:
----
  selinux-policy-20250221.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ selinux-policy.spec ++++++
--- /var/tmp/diff_new_pack.ocuvyu/_old  2025-02-22 19:04:26.481513602 +0100
+++ /var/tmp/diff_new_pack.ocuvyu/_new  2025-02-22 19:04:26.485513768 +0100
@@ -36,7 +36,7 @@
 License:        GPL-2.0-or-later
 Group:          System/Management
 Name:           selinux-policy
-Version:        20250218
+Version:        20250221
 Release:        0
 Source0:        %{name}-%{version}.tar.xz
 Source1:        container.fc

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.ocuvyu/_old  2025-02-22 19:04:26.561516933 +0100
+++ /var/tmp/diff_new_pack.ocuvyu/_new  2025-02-22 19:04:26.565517099 +0100
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param>
-              <param 
name="changesrevision">70418ef1f7748991f0ad21870a0e4c64346bf127</param></service></servicedata>
+              <param 
name="changesrevision">30b33a66b3f7fb713a1a2923e52e0a58ecf9f613</param></service></servicedata>
 (No newline at EOF)
 


++++++ selinux-policy-20250218.tar.xz -> selinux-policy-20250221.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/selinux-policy-20250218/policy/modules/contrib/privoxy.te 
new/selinux-policy-20250221/policy/modules/contrib/privoxy.te
--- old/selinux-policy-20250218/policy/modules/contrib/privoxy.te       
2025-02-18 13:39:46.000000000 +0100
+++ new/selinux-policy-20250221/policy/modules/contrib/privoxy.te       
2025-02-21 14:32:20.000000000 +0100
@@ -34,7 +34,7 @@
 # Local Policy
 #
 
-allow privoxy_t self:capability { setgid setuid };
+allow privoxy_t self:capability { setgid setuid sys_chroot};
 dontaudit privoxy_t self:capability sys_tty_config;
 allow privoxy_t self:tcp_socket { accept listen };
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/selinux-policy-20250218/policy/modules/contrib/raid.if 
new/selinux-policy-20250221/policy/modules/contrib/raid.if
--- old/selinux-policy-20250218/policy/modules/contrib/raid.if  2025-02-18 
13:39:46.000000000 +0100
+++ new/selinux-policy-20250221/policy/modules/contrib/raid.if  2025-02-21 
14:32:20.000000000 +0100
@@ -203,11 +203,13 @@
 interface(`raid_filetrans_named_content',`
        gen_require(`
                type mdadm_conf_t;
+               type mdadm_var_run_t;
        ')
 
     files_etc_filetrans($1, mdadm_conf_t, file, "mdadm.conf")
     files_etc_filetrans($1, mdadm_conf_t, file, "mdadm.conf.anacbak")
     files_etc_filetrans($1, mdadm_conf_t, dir, "mdadm.conf.d")
+    files_pid_filetrans($1, mdadm_var_run_t, dir, "mdadm")
 ')
 
 ########################################
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/selinux-policy-20250218/policy/modules/contrib/tor.te 
new/selinux-policy-20250221/policy/modules/contrib/tor.te
--- old/selinux-policy-20250218/policy/modules/contrib/tor.te   2025-02-18 
13:39:46.000000000 +0100
+++ new/selinux-policy-20250221/policy/modules/contrib/tor.te   2025-02-21 
14:32:20.000000000 +0100
@@ -30,6 +30,7 @@
 type tor_t;
 type tor_exec_t;
 init_daemon_domain(tor_t, tor_exec_t)
+init_nnp_daemon_domain(tor_t)
 
 type tor_etc_t;
 files_config_file(tor_etc_t)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/selinux-policy-20250218/policy/modules/kernel/domain.te 
new/selinux-policy-20250221/policy/modules/kernel/domain.te
--- old/selinux-policy-20250218/policy/modules/kernel/domain.te 2025-02-18 
13:39:46.000000000 +0100
+++ new/selinux-policy-20250221/policy/modules/kernel/domain.te 2025-02-21 
14:32:20.000000000 +0100
@@ -359,6 +359,10 @@
 ')
 
 optional_policy(`
+    raid_filetrans_named_content(named_filetrans_domain)
+')
+
+optional_policy(`
        snapper_filetrans_named_content(named_filetrans_domain)
 ')
 

Reply via email to