Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package selinux-policy for openSUSE:Factory checked in at 2025-04-30 19:02:53 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/selinux-policy (Old) and /work/SRC/openSUSE:Factory/.selinux-policy.new.30101 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "selinux-policy" Wed Apr 30 19:02:53 2025 rev:111 rq:1273471 version:20250429 Changes: -------- --- /work/SRC/openSUSE:Factory/selinux-policy/selinux-policy.changes 2025-04-15 20:46:43.944220351 +0200 +++ /work/SRC/openSUSE:Factory/.selinux-policy.new.30101/selinux-policy.changes 2025-04-30 19:03:04.291047530 +0200 @@ -1,0 +2,8 @@ +Tue Apr 29 14:43:00 UTC 2025 - cathy...@suse.com + +- Update to version 20250429: + * Allow cluster_t use NoNewPrivileges systemd hardening (bsc#1241921) + * allows gssd_t to read nfs symlinks (bsc#1241042) + * Label tpm2-measure.log with systemd_pcrlock_var_lib_t (bsc#1240887) + +------------------------------------------------------------------- Old: ---- selinux-policy-20250411.tar.xz New: ---- selinux-policy-20250429.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ selinux-policy.spec ++++++ --- /var/tmp/diff_new_pack.CMrXUu/_old 2025-04-30 19:03:04.927074042 +0200 +++ /var/tmp/diff_new_pack.CMrXUu/_new 2025-04-30 19:03:04.931074209 +0200 @@ -36,7 +36,7 @@ License: GPL-2.0-or-later Group: System/Management Name: selinux-policy -Version: 20250411 +Version: 20250429 Release: 0 Source0: %{name}-%{version}.tar.xz Source1: container.fc ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.CMrXUu/_old 2025-04-30 19:03:04.995076876 +0200 +++ /var/tmp/diff_new_pack.CMrXUu/_new 2025-04-30 19:03:04.999077043 +0200 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param> - <param name="changesrevision">e366edc39ad8370b702f680d376476413a5bfd98</param></service></servicedata> + <param name="changesrevision">90afc2c19f698c8bc08697d6e3f9c4461c8beedd</param></service></servicedata> (No newline at EOF) ++++++ selinux-policy-20250411.tar.xz -> selinux-policy-20250429.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250411/policy/modules/contrib/rhcs.if new/selinux-policy-20250429/policy/modules/contrib/rhcs.if --- old/selinux-policy-20250411/policy/modules/contrib/rhcs.if 2025-04-11 18:14:24.000000000 +0200 +++ new/selinux-policy-20250429/policy/modules/contrib/rhcs.if 2025-04-29 16:42:34.000000000 +0200 @@ -24,6 +24,7 @@ type $1_t, cluster_domain; type $1_exec_t; init_daemon_domain($1_t, $1_exec_t) + init_nnp_daemon_domain($1_t) type $1_tmpfs_t, cluster_tmpfs; files_tmpfs_file($1_tmpfs_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250411/policy/modules/contrib/rpc.te new/selinux-policy-20250429/policy/modules/contrib/rpc.te --- old/selinux-policy-20250411/policy/modules/contrib/rpc.te 2025-04-11 18:14:24.000000000 +0200 +++ new/selinux-policy-20250429/policy/modules/contrib/rpc.te 2025-04-29 16:42:34.000000000 +0200 @@ -383,6 +383,7 @@ fs_rw_rpc_sockets(gssd_t) fs_read_rpc_files(gssd_t) fs_read_nfsd_files(gssd_t) +fs_read_nfsd_symlinks(gssd_t) fs_list_tmpfs(gssd_t) fs_watch_rpc_dirs(gssd_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250411/policy/modules/kernel/filesystem.if new/selinux-policy-20250429/policy/modules/kernel/filesystem.if --- old/selinux-policy-20250411/policy/modules/kernel/filesystem.if 2025-04-11 18:14:24.000000000 +0200 +++ new/selinux-policy-20250429/policy/modules/kernel/filesystem.if 2025-04-29 16:42:34.000000000 +0200 @@ -4862,6 +4862,24 @@ ####################################### ## <summary> +## read symlinks on an nfsd filesystem +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`fs_read_nfsd_symlinks',` + gen_require(` + type nfsd_fs_t; + ') + + read_lnk_files_pattern($1, nfsd_fs_t, nfsd_fs_t) +') + +####################################### +## <summary> ## Read and write NFS server files. ## </summary> ## <param name="domain"> diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250411/policy/modules/system/systemd.fc new/selinux-policy-20250429/policy/modules/system/systemd.fc --- old/selinux-policy-20250411/policy/modules/system/systemd.fc 2025-04-11 18:14:24.000000000 +0200 +++ new/selinux-policy-20250429/policy/modules/system/systemd.fc 2025-04-29 16:42:34.000000000 +0200 @@ -158,6 +158,7 @@ /run/systemd/zram-generator.conf -- gen_context(system_u:object_r:systemd_zram_generator_conf_t,s0) /run/log/bootchart.* -- gen_context(system_u:object_r:systemd_bootchart_var_run_t,s0) +/run/log/systemd/tpm2-measure.log -- gen_context(system_u:object_r:systemd_pcrlock_var_lib_t,s0) /run/systemd/units(/.*)? gen_context(system_u:object_r:systemd_unit_file_t,s0)