Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package selinux-policy for openSUSE:Factory checked in at 2025-07-17 17:17:46 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/selinux-policy (Old) and /work/SRC/openSUSE:Factory/.selinux-policy.new.8875 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "selinux-policy" Thu Jul 17 17:17:46 2025 rev:120 rq:1293635 version:20250716 Changes: -------- --- /work/SRC/openSUSE:Factory/selinux-policy/selinux-policy.changes 2025-07-09 17:26:03.605685190 +0200 +++ /work/SRC/openSUSE:Factory/.selinux-policy.new.8875/selinux-policy.changes 2025-07-17 17:18:23.438816883 +0200 @@ -1,0 +2,13 @@ +Wed Jul 16 08:17:57 UTC 2025 - Cathy Hu <cathy...@suse.com> + +- Update to version 20250716: + * Allow virtqemud_t use its private tmpfs files (bsc#1242998) + * Allow virtqemud_t setattr to /dev/userfaultfd (bsc#1242998) + * Allow virtqemud_t read and write /dev/ptmx (bsc#1242998) + * Extend virtqemud_t tcp_socket permissions (bsc#1242998) + * Mark configfs_t as mountpoint (bsc#1246080) + * healthchecker: add proper optional_policy() guards + * Allow virtqemud_t to read and write generic pty (bsc#1242998) + * Allow plymouthd_t read proc files of systemd_passwd_agent (bsc#1245470) + +------------------------------------------------------------------- Old: ---- selinux-policy-20250703.tar.xz New: ---- selinux-policy-20250716.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ selinux-policy.spec ++++++ --- /var/tmp/diff_new_pack.geQhUN/_old 2025-07-17 17:18:24.270851486 +0200 +++ /var/tmp/diff_new_pack.geQhUN/_new 2025-07-17 17:18:24.274851651 +0200 @@ -36,7 +36,7 @@ License: GPL-2.0-or-later Group: System/Management Name: selinux-policy -Version: 20250703 +Version: 20250716 Release: 0 Source0: %{name}-%{version}.tar.xz Source1: container.fc ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.geQhUN/_old 2025-07-17 17:18:24.342854479 +0200 +++ /var/tmp/diff_new_pack.geQhUN/_new 2025-07-17 17:18:24.346854646 +0200 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param> - <param name="changesrevision">e6cb43eff1dbcc1c2327f6dcb680984ad0a88465</param></service></servicedata> + <param name="changesrevision">68c4038281d54812db3c49ccc4a84b84172a82c1</param></service></servicedata> (No newline at EOF) ++++++ selinux-policy-20250703.tar.xz -> selinux-policy-20250716.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250703/policy/modules/contrib/health-checker.te new/selinux-policy-20250716/policy/modules/contrib/health-checker.te --- old/selinux-policy-20250703/policy/modules/contrib/health-checker.te 2025-07-03 11:26:04.000000000 +0200 +++ new/selinux-policy-20250716/policy/modules/contrib/health-checker.te 2025-07-16 10:15:50.000000000 +0200 @@ -59,17 +59,26 @@ dev_read_sysfs(health_checker_t) # permissions for health checker: rollback() -## to execute 'mount' -mount_exec(health_checker_t) -mount_manage_pid_files(health_checker_t) ## mount accessing block device information storage_getattr_fixed_disk_dev(health_checker_t) ## mount able to remount fs_remount_xattr_fs(health_checker_t) + +## to execute 'mount' +optional_policy(` + mount_exec(health_checker_t) + mount_manage_pid_files(health_checker_t) +') + ## for 'systemctl reboot' -dbus_connect_system_bus(health_checker_t) -dbus_system_bus_client(health_checker_t) -systemd_dbus_chat_logind(health_checker_t) +optional_policy(` + dbus_connect_system_bus(health_checker_t) + dbus_system_bus_client(health_checker_t) + optional_policy(` + systemd_dbus_chat_logind(health_checker_t) + ') +') + ## for 'btrfs subvolume set-default ${LAST_WORKING_BTRFS_ID} /.snapshots' optional_policy(` snapper_select_boot_snapshot(health_checker_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250703/policy/modules/contrib/plymouthd.te new/selinux-policy-20250716/policy/modules/contrib/plymouthd.te --- old/selinux-policy-20250703/policy/modules/contrib/plymouthd.te 2025-07-03 11:26:04.000000000 +0200 +++ new/selinux-policy-20250716/policy/modules/contrib/plymouthd.te 2025-07-16 10:15:50.000000000 +0200 @@ -100,6 +100,10 @@ term_use_unallocated_ttys(plymouthd_t) optional_policy(` + systemd_passwd_agent_read_proc_state(plymouthd_t) +') + +optional_policy(` gnome_read_config(plymouthd_t) ') diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250703/policy/modules/contrib/virt.te new/selinux-policy-20250716/policy/modules/contrib/virt.te --- old/selinux-policy-20250703/policy/modules/contrib/virt.te 2025-07-03 11:26:04.000000000 +0200 +++ new/selinux-policy-20250716/policy/modules/contrib/virt.te 2025-07-16 10:15:50.000000000 +0200 @@ -403,6 +403,9 @@ type virtqemud_tmp_t; files_tmp_file(virtqemud_tmp_t) +type virtqemud_tmpfs_t; +files_tmpfs_file(virtqemud_tmpfs_t) + type virtqemud_var_run_t, virt_driver_var_run; files_pid_file(virtqemud_var_run_t) @@ -2176,7 +2179,7 @@ allow virtqemud_t self:cap_userns kill; allow virtqemud_t self:netlink_audit_socket { nlmsg_relay read write }; allow virtqemud_t self:process { getpgid setcap setexec setrlimit setsched setsockcreate }; -allow virtqemud_t self:tcp_socket create_socket_perms; +allow virtqemud_t self:tcp_socket create_stream_socket_perms; allow virtqemud_t self:tun_socket { create relabelfrom relabelto }; allow virtqemud_t self:udp_socket { connect create_socket_perms }; @@ -2232,6 +2235,9 @@ manage_sock_files_pattern(virtqemud_t, virtqemud_tmp_t, virtqemud_tmp_t) files_tmp_filetrans(virtqemud_t, virtqemud_tmp_t, { file dir sock_file}) +manage_files_pattern(virtqemud_t, virtqemud_tmpfs_t, virtqemud_tmpfs_t) +fs_tmpfs_filetrans(virtqemud_t, virtqemud_tmpfs_t, file) + manage_dirs_pattern(virtqemud_t, qemu_var_run_t, qemu_var_run_t) manage_files_pattern(virtqemud_t, qemu_var_run_t, qemu_var_run_t) manage_sock_files_pattern(virtqemud_t, qemu_var_run_t, qemu_var_run_t) @@ -2296,6 +2302,7 @@ dev_setattr_input_dev(virtqemud_t) dev_setattr_sev(virtqemud_t) dev_setattr_urand(virtqemud_t) +dev_setattr_userfaultfd(virtqemud_t) dev_unmount_fs(virtqemud_t) files_mounton_non_security(virtqemud_t) @@ -2341,6 +2348,9 @@ sysnet_exec_ifconfig(virtqemud_t) sysnet_manage_config(virtqemud_t) +term_use_generic_ptys(virtqemud_t) +term_use_ptmx(virtqemud_t) + tunable_policy(`virtqemud_use_execmem',` allow virtqemud_t self:process { execmem execstack }; ') diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250703/policy/modules/kernel/devices.if new/selinux-policy-20250716/policy/modules/kernel/devices.if --- old/selinux-policy-20250703/policy/modules/kernel/devices.if 2025-07-03 11:26:04.000000000 +0200 +++ new/selinux-policy-20250716/policy/modules/kernel/devices.if 2025-07-16 10:15:50.000000000 +0200 @@ -5886,6 +5886,24 @@ read_lnk_files_pattern($1, usbfs_t, usbfs_t) ') +######################################## +## <summary> +## Setattr userfaultfd device. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`dev_setattr_userfaultfd',` + gen_require(` + type device_t, userfaultfd_device_t; + ') + + setattr_chr_files_pattern($1, device_t, userfaultfd_device_t) +') + ###################################### ## <summary> ## Read and write userio device. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250703/policy/modules/kernel/filesystem.te new/selinux-policy-20250716/policy/modules/kernel/filesystem.te --- old/selinux-policy-20250703/policy/modules/kernel/filesystem.te 2025-07-03 11:26:04.000000000 +0200 +++ new/selinux-policy-20250716/policy/modules/kernel/filesystem.te 2025-07-16 10:15:50.000000000 +0200 @@ -113,6 +113,7 @@ type configfs_t; fs_type(configfs_t) +files_mountpoint(configfs_t) genfscon configfs / gen_context(system_u:object_r:configfs_t,s0) type cpusetfs_t; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250703/policy/modules/system/systemd.if new/selinux-policy-20250716/policy/modules/system/systemd.if --- old/selinux-policy-20250703/policy/modules/system/systemd.if 2025-07-03 11:26:04.000000000 +0200 +++ new/selinux-policy-20250716/policy/modules/system/systemd.if 2025-07-16 10:15:50.000000000 +0200 @@ -1261,6 +1261,24 @@ ######################################## ## <summary> +## Read the process state (/proc/pid) of systemd_passwd_agent_t. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`systemd_passwd_agent_read_proc_state',` + gen_require(` + type systemd_passwd_agent_t; + ') + + ps_process_pattern($1, systemd_passwd_agent_t) +') + +######################################## +## <summary> ## Send generic signals to systemd_passwd_agent processes. ## </summary> ## <param name="domain">