Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package selinux-policy for openSUSE:Factory checked in at 2024-03-14 17:42:42 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/selinux-policy (Old) and /work/SRC/openSUSE:Factory/.selinux-policy.new.1905 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "selinux-policy" Thu Mar 14 17:42:42 2024 rev:58 rq:1157662 version:20240313 Changes: -------- --- /work/SRC/openSUSE:Factory/selinux-policy/selinux-policy.changes 2024-02-09 23:51:39.049517287 +0100 +++ /work/SRC/openSUSE:Factory/.selinux-policy.new.1905/selinux-policy.changes 2024-03-14 17:42:54.396641243 +0100 @@ -1,0 +2,29 @@ +Wed Mar 13 11:02:43 UTC 2024 - cathy...@suse.com + +- Update to version 20240313: + * Assign alts_exec_t to files_type + +------------------------------------------------------------------- +Fri Mar 08 09:05:08 UTC 2024 - cathy...@suse.com + +- Update to version 20240308: + * Support /bin/alts in the policy (bsc#1217530) + * Revert "Allow virtnetworkd_t to execute bin_t (bsc#1216903)" + +------------------------------------------------------------------- +Wed Mar 06 15:41:20 UTC 2024 - cathy...@suse.com + +- Update to version 20240306: + * Replace init domtrans rule for confined users to allow exec init + * Update dbus_role_template() to allow user service status + * Allow polkit status all systemd services + * Allow setroubleshootd create and use inherited io_uring + * Allow load_policy read and write generic ptys + +------------------------------------------------------------------- +Mon Mar 04 16:19:28 UTC 2024 - cathy...@suse.com + +- Update to version 20240304: + * Allow ssh-keygen to use the libica crypto module (bsc#1220373) + +------------------------------------------------------------------- Old: ---- selinux-policy-20240205.tar.xz New: ---- selinux-policy-20240313.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ selinux-policy.spec ++++++ --- /var/tmp/diff_new_pack.ZspeGM/_old 2024-03-14 17:42:55.312674828 +0100 +++ /var/tmp/diff_new_pack.ZspeGM/_new 2024-03-14 17:42:55.316674975 +0100 @@ -33,7 +33,7 @@ License: GPL-2.0-or-later Group: System/Management Name: selinux-policy -Version: 20240205 +Version: 20240313 Release: 0 Source0: %{name}-%{version}.tar.xz Source1: container.fc ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.ZspeGM/_old 2024-03-14 17:42:55.388677615 +0100 +++ /var/tmp/diff_new_pack.ZspeGM/_new 2024-03-14 17:42:55.392677762 +0100 @@ -1,7 +1,7 @@ <servicedata> <service name="tar_scm"> <param name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param> - <param name="changesrevision">e17843ad685ede6b0ba9a2571bf3199e56408f83</param></service><service name="tar_scm"> + <param name="changesrevision">45f14b8b76e738bbd167b44362388814a95c498e</param></service><service name="tar_scm"> <param name="url">https://github.com/containers/container-selinux.git</param> <param name="changesrevision">07b3034f6d9625ab84508a2f46515d8ff79b4204</param></service><service name="tar_scm"> <param name="url">https://gitlab.suse.de/jsegitz/selinux-policy.git</param> ++++++ modules-targeted-contrib.conf ++++++ --- /var/tmp/diff_new_pack.ZspeGM/_old 2024-03-14 17:42:55.636686708 +0100 +++ /var/tmp/diff_new_pack.ZspeGM/_new 2024-03-14 17:42:55.640686855 +0100 @@ -2762,3 +2762,10 @@ # coreos_installer = module +## Layer: contrib +## Module: libalternatives +## +## libalternatives +## +libalternatives = module + ++++++ selinux-policy-20240205.tar.xz -> selinux-policy-20240313.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/.copr/.gitignore new/selinux-policy-20240313/.copr/.gitignore --- old/selinux-policy-20240205/.copr/.gitignore 1970-01-01 01:00:00.000000000 +0100 +++ new/selinux-policy-20240313/.copr/.gitignore 2024-03-13 12:02:05.000000000 +0100 @@ -0,0 +1 @@ +*.src.rpm diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/.gitignore new/selinux-policy-20240313/.gitignore --- old/selinux-policy-20240205/.gitignore 1970-01-01 01:00:00.000000000 +0100 +++ new/selinux-policy-20240313/.gitignore 2024-03-13 12:02:05.000000000 +0100 @@ -0,0 +1,6 @@ +/base.conf +/base.fc +/policy/modules/kernel/corenetwork.te +/policy/modules/kernel/corenetwork.if +/*.pp +/tmp/ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/policy/modules/contrib/dbus.if new/selinux-policy-20240313/policy/modules/contrib/dbus.if --- old/selinux-policy-20240205/policy/modules/contrib/dbus.if 2024-02-05 16:48:02.010622949 +0100 +++ new/selinux-policy-20240313/policy/modules/contrib/dbus.if 2024-03-13 12:02:05.000000000 +0100 @@ -97,7 +97,7 @@ allow $3 $1_dbusd_t:process { noatsecure rlimitinh siginh }; allow $1_dbusd_t $3:dbus send_msg; allow $3 $1_dbusd_t:dbus send_msg; - allow $1_dbusd_t $3:system { start reload }; + allow $1_dbusd_t $3:system { reload start status }; allow $1_dbusd_t session_dbusd_tmp_t:service { start stop }; allow $3 session_dbusd_tmp_t:dir manage_dir_perms; allow $3 session_dbusd_tmp_t:file manage_file_perms; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/policy/modules/contrib/libalternatives.fc new/selinux-policy-20240313/policy/modules/contrib/libalternatives.fc --- old/selinux-policy-20240205/policy/modules/contrib/libalternatives.fc 1970-01-01 01:00:00.000000000 +0100 +++ new/selinux-policy-20240313/policy/modules/contrib/libalternatives.fc 2024-03-13 12:02:05.000000000 +0100 @@ -0,0 +1 @@ +/usr/bin/alts -- gen_context(system_u:object_r:alts_exec_t,s0) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/policy/modules/contrib/libalternatives.if new/selinux-policy-20240313/policy/modules/contrib/libalternatives.if --- old/selinux-policy-20240205/policy/modules/contrib/libalternatives.if 1970-01-01 01:00:00.000000000 +0100 +++ new/selinux-policy-20240313/policy/modules/contrib/libalternatives.if 2024-03-13 12:02:05.000000000 +0100 @@ -0,0 +1 @@ +## <summary>policy for alts</summary> diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/policy/modules/contrib/libalternatives.te new/selinux-policy-20240313/policy/modules/contrib/libalternatives.te --- old/selinux-policy-20240205/policy/modules/contrib/libalternatives.te 1970-01-01 01:00:00.000000000 +0100 +++ new/selinux-policy-20240313/policy/modules/contrib/libalternatives.te 2024-03-13 12:02:05.000000000 +0100 @@ -0,0 +1,6 @@ +policy_module(libalternatives, 0.0.1) + +# All processes should be able to execute libalternatives /bin/alts in the caller domain +type alts_exec_t; +files_type(alts_exec_t) +domain_can_exec(alts_exec_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/policy/modules/contrib/policykit.te new/selinux-policy-20240313/policy/modules/contrib/policykit.te --- old/selinux-policy-20240205/policy/modules/contrib/policykit.te 2024-02-05 16:48:02.023956465 +0100 +++ new/selinux-policy-20240313/policy/modules/contrib/policykit.te 2024-03-13 12:02:05.000000000 +0100 @@ -152,7 +152,7 @@ systemd_read_logind_sessions_files(policykit_t) systemd_login_list_pid_dirs(policykit_t) systemd_login_read_pid_files(policykit_t) - systemd_status_systemd_services(policykit_t) + systemd_status_all_unit_files(policykit_t) ') ######################################## diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/policy/modules/contrib/setroubleshoot.te new/selinux-policy-20240313/policy/modules/contrib/setroubleshoot.te --- old/selinux-policy-20240205/policy/modules/contrib/setroubleshoot.te 2024-02-05 16:48:02.027289844 +0100 +++ new/selinux-policy-20240313/policy/modules/contrib/setroubleshoot.te 2024-03-13 12:02:05.000000000 +0100 @@ -90,7 +90,7 @@ manage_sock_files_pattern(setroubleshootd_t, setroubleshoot_var_run_t, setroubleshoot_var_run_t) files_pid_filetrans(setroubleshootd_t, setroubleshoot_var_run_t, { file sock_file dir }) - +kernel_io_uring_use(setroubleshootd_t) kernel_read_kernel_sysctls(setroubleshootd_t) kernel_read_system_state(setroubleshootd_t) kernel_read_net_sysctls(setroubleshootd_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/policy/modules/contrib/virt.te new/selinux-policy-20240313/policy/modules/contrib/virt.te --- old/selinux-policy-20240205/policy/modules/contrib/virt.te 2024-02-05 16:48:02.030623222 +0100 +++ new/selinux-policy-20240313/policy/modules/contrib/virt.te 2024-03-13 12:02:05.000000000 +0100 @@ -1886,8 +1886,6 @@ corenet_rw_tun_tap_dev(virtnetworkd_t) -corecmd_exec_bin(virtnetworkd_t) - dev_rw_sysfs(virtnetworkd_t) sysnet_domtrans_ifconfig(virtnetworkd_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/policy/modules/kernel/domain.if new/selinux-policy-20240313/policy/modules/kernel/domain.if --- old/selinux-policy-20240205/policy/modules/kernel/domain.if 2024-02-05 16:48:02.033956601 +0100 +++ new/selinux-policy-20240313/policy/modules/kernel/domain.if 2024-03-13 12:02:05.000000000 +0100 @@ -1925,3 +1925,21 @@ allow $1 domain:perf_event rw_inherited_perf_event_perms; ') + +######################################## +## <summary> +## Allow all domains to execute type without domain transition +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`domain_can_exec',` + gen_require(` + attribute domain; + ') + + can_exec(domain, $1) +') diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/policy/modules/services/ssh.te new/selinux-policy-20240313/policy/modules/services/ssh.te --- old/selinux-policy-20240205/policy/modules/services/ssh.te 2024-02-05 16:48:02.037289981 +0100 +++ new/selinux-policy-20240313/policy/modules/services/ssh.te 2024-03-13 12:02:05.000000000 +0100 @@ -391,6 +391,7 @@ optional_policy(` ica_rw_map_tmpfs_files(sshd_t) + ica_rw_map_tmpfs_files(ssh_keygen_t) ') optional_policy(` @@ -639,6 +640,7 @@ allow sshd_net_t self:process setrlimit; dev_rw_crypto(sshd_net_t) +dev_rw_crypto(ssh_keygen_t) init_ioctl_stream_sockets(sshd_net_t) init_rw_tcp_sockets(sshd_net_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/policy/modules/system/selinuxutil.te new/selinux-policy-20240313/policy/modules/system/selinuxutil.te --- old/selinux-policy-20240205/policy/modules/system/selinuxutil.te 2024-02-05 16:48:02.037289981 +0100 +++ new/selinux-policy-20240313/policy/modules/system/selinuxutil.te 2024-03-13 12:02:05.000000000 +0100 @@ -208,6 +208,7 @@ selinux_set_all_booleans(load_policy_t) term_use_console(load_policy_t) +term_use_generic_ptys(load_policy_t) term_list_ptys(load_policy_t) term_write_unallocated_ttys(load_policy_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20240205/policy/modules/system/userdomain.if new/selinux-policy-20240313/policy/modules/system/userdomain.if --- old/selinux-policy-20240205/policy/modules/system/userdomain.if 2024-02-05 16:48:02.037289981 +0100 +++ new/selinux-policy-20240313/policy/modules/system/userdomain.if 2024-03-13 12:02:05.000000000 +0100 @@ -1520,7 +1520,7 @@ corenet_tcp_bind_xserver_port($1_t) corenet_tcp_bind_generic_node($1_usertype) - init_domtrans($1_t) + init_exec($1_t) init_rw_stream_sockets($1_t) storage_rw_fuse($1_t)