Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package selinux-policy for openSUSE:Factory checked in at 2025-08-13 16:23:09 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/selinux-policy (Old) and /work/SRC/openSUSE:Factory/.selinux-policy.new.1085 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "selinux-policy" Wed Aug 13 16:23:09 2025 rev:122 rq:1299076 version:20250812 Changes: -------- --- /work/SRC/openSUSE:Factory/selinux-policy/selinux-policy.changes 2025-07-31 17:45:43.286959282 +0200 +++ /work/SRC/openSUSE:Factory/.selinux-policy.new.1085/selinux-policy.changes 2025-08-13 16:28:25.667198177 +0200 @@ -1,0 +2,95 @@ +Tue Aug 12 10:34:11 UTC 2025 - Cathy Hu <cathy...@suse.com> + +- Update to version 20250812 (bsc#1247772): + * Fix selinux-autorelabel-generator label after upstream changes + * Revert "Remove the mysql module sources" + * Revert "Allow rasdaemon write access to sysfs (bsc#1229587)" + * Reset postfix.fc to upstream, add alias instead + * Allow systemd-networkd to create leases directory + * Apply generator template to selinux-autorelabel generator + * Support virtqemud handle hotplug hostdev devices + * Allow virtstoraged create qemu /var/run files + * Allow unconfined_domain_type cap2_userns capabilities + * Label /usr/libexec/postfix/tlsproxy with postfix_smtp_exec_t + * Remove the mysql module sources + * dist/targeted/modules.conf: Enable kmscon module (bsc#1238137) + * Update kmscon policy module to kmscon version 9 (bsc#1238137) + * Allow login to getattr pidfs + * Allow systemd to map files under /sys + * systemd: drop duplicate init_nnp_daemon_domain lines + * Fix typo + * Allow logwatch stream connect to opensmtpd + * Allow geoclue read NetworkManager pid files + * Allow unconfined user a file transition for creating sudo log directory + * Allow virtqemud read/write inherited dri devices + * Allow xdm_t create user namespaces + * Update policy for login_userdomain + * Add ppd_base_profile to file transition to get tuned_rw_etc_t type + * Update policy for bootupd + * Allow logwatch work with opensmtpd + * Update dovecot policy for dovecot 2.4.1 + * Allow ras-mc-ctl write to sysfs files + +------------------------------------------------------------------- +Tue Aug 5 14:25:13 UTC 2025 - Cathy Hu <cathy...@suse.com> + +- Update embedded container-selinux version to commit: + * 10cc7ecacd631368e23691a77dbfe63ac6ca855f (version 2.240.0) + The 2.239.0 was tagged incorrectly by upstream, syncing again + with new tag + +------------------------------------------------------------------- +Mon Aug 04 08:26:43 UTC 2025 - Cathy Hu <cathy...@suse.com> + +- Update to version 20250804: + * Allow anaconda-generator get attributes of all filesystems + * Add the rhcd_rw_fifo_files() interface + * Allow systemd-coredump the sys_chroot capability + * Allow hostapd write to socket files in /tmp + * Recognize /var/home as an alternate path for /home + * Label /var/lib/lastlog with lastlog_t + * Allow virtqemud write to sysfs files + * Allow irqbalance search sssd lib directories + * Allow samba-dcerpcd send sigkills to passwd + * Allow systemd-oomd watch dbus pid sock files + * Allow some confined users read and map generic log files + * Allow login_userdomain watch the /run/log/journal directory + * Allow login_userdomain dbus chat with tuned-ppd + * Allow login_userdomain dbus chat with switcheroo-control + * Allow userdomain to connect to systemd-oomd over a unix socket + * Add insights_client_delete_lib_dirs() interface + * Allow virtqemud_t use its private tmpfs files (bsc#1242998) + * Allow virtqemud_t setattr to /dev/userfaultfd (bsc#1242998) + * Allow virtqemud_t read and write /dev/ptmx (bsc#1242998) + * Extend virtqemud_t tcp_socket permissions (bsc#1242998) + * Allow virtqemud_t to read and write generic pty (bsc#1242998) + * Allow systemd-importd create and unlink init pid socket + * Allow virtqemud handle virt_content_t chr files + * Allow svirt read virtqemud fifo files + * All sblim-sfcbd the dac_read_search capability + * Allow sblim domain read systemd session files + * Allow sblim-sfcbd execute dnsdomainname + * Confine nfs-server generator + * Allow systemd-timedated start/stop timemaster services + * Allow "hostapd_cli ping" run as a systemd service + * Allow power-profiles-daemon get attributes of filesystems with extended attributes + * Allow 'oomctl dump' to interact with systemd-oomd + * Basic functionality for systemd-oomd + * Basic enablement for systemd-oomd + * Allow samba-bgqd send to smbd over a unix datagram socket + * Update kernel_secretmem_use() + * Add the file/watch_mountns permission + * Update systemd-generators policy + * Allow plymouthd_t read proc files of systemd_passwd_agent (bsc#1245470) + * Allow insights-client file transition for files in /var/tmp + * Allow tuned-ppd manage tuned log files + * Allow systemd-coredump mount on tmpfs filesystems + * Update sssd_dontaudit_read_public_files() + * Allow zram-generator raw read fixed disk device + * Add fs_write_cgroup_dirs() and fs_setattr_cgroup_dirs() interfaces +- Syncing with upstream rawhide selinux-policy up to: + * 1de2b642cba24f493578d4c944ea8db5535e8956 +- Update embedded container-selinux version to commit: + * 9693071320e1f931ff825ea376926f816380873d (version 2.239.0) + +------------------------------------------------------------------- Old: ---- selinux-policy-20250730.tar.xz New: ---- selinux-policy-20250812.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ selinux-policy.spec ++++++ --- /var/tmp/diff_new_pack.LQwMQi/_old 2025-08-13 16:28:32.315474807 +0200 +++ /var/tmp/diff_new_pack.LQwMQi/_new 2025-08-13 16:28:32.315474807 +0200 @@ -1,7 +1,7 @@ # # spec file for package selinux-policy # -# Copyright (c) 2025 SUSE LLC +# Copyright (c) 2025 SUSE LLC and contributors # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -36,7 +36,7 @@ License: GPL-2.0-or-later Group: System/Management Name: selinux-policy -Version: 20250730 +Version: 20250812 Release: 0 Source0: %{name}-%{version}.tar.xz Source1: container.fc ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.LQwMQi/_old 2025-08-13 16:28:32.383477637 +0200 +++ /var/tmp/diff_new_pack.LQwMQi/_new 2025-08-13 16:28:32.387477803 +0200 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param> - <param name="changesrevision">15675827ab60cadbfa09c9c74505ad34032ffe33</param></service></servicedata> + <param name="changesrevision">23289c57c31a08f3e9ba3e0ea8cc5c735e50c08d</param></service></servicedata> (No newline at EOF) ++++++ container.te ++++++ --- /var/tmp/diff_new_pack.LQwMQi/_old 2025-08-13 16:28:32.435479801 +0200 +++ /var/tmp/diff_new_pack.LQwMQi/_new 2025-08-13 16:28:32.439479967 +0200 @@ -1,4 +1,4 @@ -policy_module(container, 2.238.0) +policy_module(container, 2.240.0) gen_require(` class passwd rootok; @@ -61,6 +61,13 @@ gen_tunable(container_manage_cgroup, false) ## <desc> +## <p> +## Allow containers to manipulate SELinux labels +## </p> +## </desc> +gen_tunable(container_modify_selinux_labels, false) + +## <desc> ## <p> ## Determine whether container can ## use ceph file system @@ -458,6 +465,7 @@ container_append_file(iptables_t) allow iptables_t container_runtime_domain:fifo_file rw_fifo_file_perms; allow iptables_t container_file_type:dir list_dir_perms; + dontaudit iptables_t self:cap_userns dac_override; ') optional_policy(` @@ -577,6 +585,10 @@ userdom_connectto_stream(container_runtime_domain) allow container_domain init_t:socket_class_set { accept ioctl read getattr lock write append getopt }; +tunable_policy(`container_modify_selinux_labels',` + allow container_domain self:process { setexec setfscreate}; +') + tunable_policy(`virt_use_nfs',` fs_manage_nfs_dirs(container_runtime_domain) fs_manage_nfs_files(container_runtime_domain) @@ -708,6 +720,14 @@ ') optional_policy(` + require { + type hsa_device_t; + } + + allow container_domain hsa_device_t:chr_file rw_chr_file_perms; +') + +optional_policy(` gen_require(` role unconfined_r; ') @@ -928,7 +948,7 @@ allow container_domain self:packet_socket create_socket_perms; allow container_domain self:passwd rootok; allow container_domain self:peer recv; -allow container_domain self:process { execmem execstack fork getattr getcap getpgid getsched getsession setcap setpgid setrlimit setsched sigchld sigkill signal signull sigstop setexec setfscreate}; +allow container_domain self:process { execmem execstack fork getattr getcap getpgid getsched getsession setcap setpgid setrlimit setsched sigchld sigkill signal signull sigstop}; allow container_domain self:sem create_sem_perms; allow container_domain self:shm create_shm_perms; allow container_domain self:socket create_socket_perms; ++++++ selinux-policy-20250730.tar.xz -> selinux-policy-20250812.tar.xz ++++++ ++++ 1655 lines of diff (skipped)