Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package container-selinux for openSUSE:Factory checked in at 2021-04-26 16:38:51 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/container-selinux (Old) and /work/SRC/openSUSE:Factory/.container-selinux.new.12324 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "container-selinux" Mon Apr 26 16:38:51 2021 rev:7 rq:887982 version:2.160.1 Changes: -------- --- /work/SRC/openSUSE:Factory/container-selinux/container-selinux.changes 2021-03-02 12:30:57.055602691 +0100 +++ /work/SRC/openSUSE:Factory/.container-selinux.new.12324/container-selinux.changes 2021-04-26 16:39:07.730028314 +0200 @@ -1,0 +2,6 @@ +Fri Apr 23 06:04:48 UTC 2021 - Johannes Segitz <jseg...@suse.com> + +- Fix container runtime binary labels (bsc#1185030). You need to + relable at least /usr/sbin if you're affected + +------------------------------------------------------------------- Old: ---- container-selinux-2.158.0.tar.gz New: ---- container-selinux-2.160.1.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ container-selinux.spec ++++++ --- /var/tmp/diff_new_pack.TvLKq3/_old 2021-04-26 16:39:08.134028957 +0200 +++ /var/tmp/diff_new_pack.TvLKq3/_new 2021-04-26 16:39:08.134028957 +0200 @@ -26,7 +26,7 @@ # Version of SELinux we were using %define selinux_policyver %(rpm -q selinux-policy --qf '%%{version}') Name: container-selinux -Version: 2.158.0 +Version: 2.160.1 Release: 0 Summary: SELinux policies for container runtimes License: GPL-2.0-only ++++++ container-selinux-2.158.0.tar.gz -> container-selinux-2.160.1.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/container-selinux-2.158.0/SECURITY.md new/container-selinux-2.160.1/SECURITY.md --- old/container-selinux-2.158.0/SECURITY.md 1970-01-01 01:00:00.000000000 +0100 +++ new/container-selinux-2.160.1/SECURITY.md 2021-04-22 16:52:57.000000000 +0200 @@ -0,0 +1,4 @@ +## Security and Disclosure Information Policy for the container-selinux Project + +The container-selinux Project follows the [Security and Disclosure Information Policy](https://github.com/containers/common/blob/master/SECURITY.md) for the Containers Projects. + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/container-selinux-2.158.0/container.fc new/container-selinux-2.160.1/container.fc --- old/container-selinux-2.158.0/container.fc 2021-02-11 22:35:06.000000000 +0100 +++ new/container-selinux-2.160.1/container.fc 2021-04-22 16:52:57.000000000 +0200 @@ -4,37 +4,32 @@ /usr/local/libexec/docker/.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) /usr/libexec/docker/docker.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) /usr/local/libexec/docker/docker.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/docker.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/local/bin/docker.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/containerd.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/local/bin/containerd.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/lxc-.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/lxd-.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/lxc -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/lxd -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/fuidshift -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/docker.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/local/s?bin/docker.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/containerd.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/local/s?bin/containerd.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/lxc-.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/lxd-.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/lxc -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/lxd -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/fuidshift -- gen_context(system_u:object_r:container_runtime_exec_t,s0) /usr/libexec/lxc/.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) /usr/libexec/lxd/.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) /usr/bin/podman -- gen_context(system_u:object_r:container_runtime_exec_t,s0) /usr/local/bin/podman -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/local/sbin/runc -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/local/bin/runc -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/runc -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/sbin/runc -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/local/bin/crun -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/crun -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/local/s?bin/runc -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/runc -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/local/s?bin/crun -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/crun -- gen_context(system_u:object_r:container_runtime_exec_t,s0) /usr/bin/container[^/]*plugin -- gen_context(system_u:object_r:container_runtime_exec_t,s0) /usr/bin/rhel-push-plugin -- gen_context(system_u:object_r:container_runtime_exec_t,s0) /usr/sbin/rhel-push-plugin -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/docker-latest -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/docker-current -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/docker-novolume-plugin -- gen_context(system_u:object_r:container_auth_exec_t,s0) -/usr/sbin/crio.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/local/sbin/crio.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/crio.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/local/bin/crio.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/bin/ocid.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) -/usr/sbin/ocid.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/docker-latest -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/docker-current -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/docker-novolume-plugin -- gen_context(system_u:object_r:container_auth_exec_t,s0) +/usr/s?bin/crio.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/local/s?bin/crio.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) +/usr/s?bin/ocid.* -- gen_context(system_u:object_r:container_runtime_exec_t,s0) /usr/lib/docker/docker-novolume-plugin -- gen_context(system_u:object_r:container_auth_exec_t,s0) /usr/lib/docker/[^/]*plugin -- gen_context(system_u:object_r:container_runtime_exec_t,s0) /usr/local/lib/docker/[^/]*plugin -- gen_context(system_u:object_r:container_runtime_exec_t,s0) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/container-selinux-2.158.0/container.if new/container-selinux-2.160.1/container.if --- old/container-selinux-2.158.0/container.if 2021-02-11 22:35:06.000000000 +0100 +++ new/container-selinux-2.160.1/container.if 2021-04-22 16:52:57.000000000 +0200 @@ -493,6 +493,7 @@ type container_home_t; type kubernetes_file_t; type container_runtime_tmpfs_t; + type container_kvm_var_run_t; ') files_pid_filetrans($1, container_var_run_t, file, "container.pid") diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/container-selinux-2.158.0/container.te new/container-selinux-2.160.1/container.te --- old/container-selinux-2.158.0/container.te 2021-02-11 22:35:06.000000000 +0100 +++ new/container-selinux-2.160.1/container.te 2021-04-22 16:52:57.000000000 +0200 @@ -1,4 +1,4 @@ -policy_module(container, 2.158.0) +policy_module(container, 2.160.0) gen_require(` class passwd rootok; ') @@ -358,8 +358,10 @@ ') optional_policy(` - domain_stub_named_filetrans_domain() - container_filetrans_named_content(named_filetrans_domain) + gen_require(` + attribute named_filetrans_domain; + ') + container_filetrans_named_content(named_filetrans_domain) ') # @@ -584,7 +586,9 @@ ') optional_policy(` - unconfined_stub_role() + gen_require(` + role unconfined_r; + ') unconfined_domain(container_runtime_t) unconfined_run_to(container_runtime_t, container_runtime_exec_t) role_transition unconfined_r container_runtime_exec_t system_r; @@ -598,6 +602,9 @@ ') optional_policy(` + gen_require(` + type virtd_lxc_t; + ') virt_read_config(container_runtime_domain) virt_exec(container_runtime_domain) virt_stream_connect(container_runtime_domain) @@ -610,7 +617,6 @@ # virt_attach_sandbox_tun_iface(container_runtime_domain) allow container_runtime_domain container_domain:tun_socket relabelfrom; virt_sandbox_entrypoint(container_runtime_domain) - virt_stub_lxc() allow container_runtime_domain virtd_lxc_t:unix_stream_socket { rw_stream_socket_perms connectto }; ') @@ -642,6 +648,7 @@ ps_process_pattern(container_runtime_domain, spc_t) allow container_runtime_domain spc_t:socket_class_set { relabelto relabelfrom }; allow spc_t unlabeled_t:key manage_key_perms; +allow spc_t unlabeled_t:socket_class_set create_socket_perms; init_dbus_chat(spc_t) @@ -858,11 +865,13 @@ domain_dontaudit_link_all_domains_keyrings(container_domain) domain_dontaudit_search_all_domains_keyrings(container_domain) -virt_stub_svirt_sandbox_file() virt_sandbox_net_domain(container_t) logging_send_syslog_msg(container_t) +gen_require(` + type container_file_t; +') fs_noxattr_type(container_file_t) # fs_associate_cgroupfs(container_file_t) gen_require(` @@ -877,7 +886,9 @@ fs_unmount_cgroup(container_t) dev_read_rand(container_domain) +dev_write_rand(container_domain) dev_read_urand(container_domain) +dev_write_urand(container_domain) files_read_kernel_modules(container_domain) @@ -1021,8 +1032,8 @@ container_append_file(iptables_t) optional_policy(` - unconfined_stub_role() gen_require(` + role unconfined_r; type unconfined_service_t; type unconfined_service_exec_t; ')