Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package selinux-policy for openSUSE:Factory 
checked in at 2024-06-18 22:51:01
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/selinux-policy (Old)
 and      /work/SRC/openSUSE:Factory/.selinux-policy.new.19518 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "selinux-policy"

Tue Jun 18 22:51:01 2024 rev:62 rq:1181332 version:20240617

Changes:
--------
--- /work/SRC/openSUSE:Factory/selinux-policy/selinux-policy.changes    
2024-06-14 18:57:11.968953030 +0200
+++ /work/SRC/openSUSE:Factory/.selinux-policy.new.19518/selinux-policy.changes 
2024-06-18 22:51:48.506667509 +0200
@@ -1,0 +2,7 @@
+Mon Jun 17 14:36:01 UTC 2024 - cathy...@suse.com
+
+- Update to version 20240617:
+  * Allow gnome control center to set autologin (bsc#1222978)
+  * Dontaudit xdm_t to getattr on root_t (bsc#1223145)
+
+-------------------------------------------------------------------

Old:
----
  selinux-policy-20240613.tar.xz

New:
----
  selinux-policy-20240617.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ selinux-policy.spec ++++++
--- /var/tmp/diff_new_pack.b4Q6TJ/_old  2024-06-18 22:51:49.562706445 +0200
+++ /var/tmp/diff_new_pack.b4Q6TJ/_new  2024-06-18 22:51:49.562706445 +0200
@@ -33,7 +33,7 @@
 License:        GPL-2.0-or-later
 Group:          System/Management
 Name:           selinux-policy
-Version:        20240613
+Version:        20240617
 Release:        0
 Source0:        %{name}-%{version}.tar.xz
 Source1:        container.fc

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.b4Q6TJ/_old  2024-06-18 22:51:49.666710279 +0200
+++ /var/tmp/diff_new_pack.b4Q6TJ/_new  2024-06-18 22:51:49.674710574 +0200
@@ -1,7 +1,7 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param>
-              <param 
name="changesrevision">2cc0ac20c300647eefb1dc0a3c0856277c16af0d</param></service><service
 name="tar_scm">
+              <param 
name="changesrevision">1de27a0d8c5938ce63f0a9f6add5f6e4ffa00565</param></service><service
 name="tar_scm">
                 <param 
name="url">https://github.com/containers/container-selinux.git</param>
               <param 
name="changesrevision">07b3034f6d9625ab84508a2f46515d8ff79b4204</param></service><service
 name="tar_scm">
                 <param 
name="url">https://gitlab.suse.de/jsegitz/selinux-policy.git</param>


++++++ selinux-policy-20240613.tar.xz -> selinux-policy-20240617.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/selinux-policy-20240613/policy/modules/contrib/accountsd.te 
new/selinux-policy-20240617/policy/modules/contrib/accountsd.te
--- old/selinux-policy-20240613/policy/modules/contrib/accountsd.te     
2024-06-13 10:10:05.000000000 +0200
+++ new/selinux-policy-20240617/policy/modules/contrib/accountsd.te     
2024-06-17 16:35:25.000000000 +0200
@@ -107,3 +107,11 @@
        xserver_manage_xdm_etc_files(accountsd_t)
        xserver_watch_xdm_etc_dirs(accountsd_t)
 ')
+
+# Handle /etc/sysconfig/displaymanager together with GDM (xdm_t) (bsc#1222978)
+optional_policy(`
+       # Label all files created by accountsd_t under /run called 
"displaymanager.new" as xdm_etc_t
+       xserver_var_run_etc_filetrans_named_content(accountsd_t, 
"displaymanager.new")
+       # Write /etc/sysconfig/displaymanager
+       xserver_etc_filetrans_named_content(accountsd_t, "displaymanager")
+')
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/selinux-policy-20240613/policy/modules/kernel/files.if 
new/selinux-policy-20240617/policy/modules/kernel/files.if
--- old/selinux-policy-20240613/policy/modules/kernel/files.if  2024-06-13 
10:10:05.000000000 +0200
+++ new/selinux-policy-20240617/policy/modules/kernel/files.if  2024-06-17 
16:35:25.000000000 +0200
@@ -2910,6 +2910,25 @@
 
 ########################################
 ## <summary>
+##     Do not audit attempts to getattr files in
+##     the root directory.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain to not audit.
+##     </summary>
+## </param>
+#
+interface(`files_dontaudit_getattr_root_files',`
+       gen_require(`
+               type root_t;
+       ')
+
+       dontaudit $1 root_t:file { getattr };
+')
+
+########################################
+## <summary>
 ##     Do not audit attempts to read files in
 ##     the root directory.
 ## </summary>
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/selinux-policy-20240613/policy/modules/services/xserver.fc 
new/selinux-policy-20240617/policy/modules/services/xserver.fc
--- old/selinux-policy-20240613/policy/modules/services/xserver.fc      
2024-06-13 10:10:05.000000000 +0200
+++ new/selinux-policy-20240617/policy/modules/services/xserver.fc      
2024-06-17 16:35:25.000000000 +0200
@@ -54,6 +54,7 @@
 
 /etc/X11/xorg\.conf\.d(/.*)?   gen_context(system_u:object_r:xserver_etc_t,s0)
 /etc/[mg]dm(/.*)?                      
gen_context(system_u:object_r:xdm_etc_t,s0)
+/etc/sysconfig/displaymanager  --      
gen_context(system_u:object_r:xdm_etc_t,s0)
 /etc/[mg]dm/Init(/.*)?         
gen_context(system_u:object_r:xdm_unconfined_exec_t,s0)
 /etc/[mg]dm/PostLogin(/.*)?    
gen_context(system_u:object_r:xdm_unconfined_exec_t,s0)
 /etc/[mg]dm/PostSession(/.*)?          
gen_context(system_u:object_r:xdm_unconfined_exec_t,s0)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/selinux-policy-20240613/policy/modules/services/xserver.if 
new/selinux-policy-20240617/policy/modules/services/xserver.if
--- old/selinux-policy-20240613/policy/modules/services/xserver.if      
2024-06-13 10:10:05.000000000 +0200
+++ new/selinux-policy-20240617/policy/modules/services/xserver.if      
2024-06-17 16:35:25.000000000 +0200
@@ -2510,3 +2510,56 @@
 
        files_pid_filetrans($1, xdm_var_run_t, dir, "gdm")
 ')
+
+######################################
+## <summary>
+##     Transition to xdm named content in /run
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <param name="filename">
+##     <summary>
+##     Only transition for files with this name.
+##     </summary>
+## </param>
+#
+interface(`xserver_var_run_etc_filetrans_named_content',`
+       gen_require(`
+               type var_run_t;
+               type xdm_var_run_t;
+               type xdm_etc_t;
+       ')
+
+       filetrans_pattern($1, var_run_t, xdm_var_run_t, dir)
+       manage_dirs_pattern($1, xdm_var_run_t, xdm_var_run_t)
+       filetrans_pattern($1, xdm_var_run_t, xdm_etc_t, file, $2)
+')
+
+######################################
+## <summary>
+##     Transition to xdm named content in /etc
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <param name="filename">
+##     <summary>
+##     Only transition for files with this name.
+##     </summary>
+## </param>
+#
+interface(`xserver_etc_filetrans_named_content',`
+       gen_require(`
+               type etc_t;
+               type xdm_etc_t;
+       ')
+
+       manage_dirs_pattern($1, etc_t, etc_t)
+       filetrans_pattern($1, etc_t, xdm_etc_t, file, $2)
+       relabel_files_pattern($1, xdm_etc_t, xdm_etc_t)
+')
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/selinux-policy-20240613/policy/modules/services/xserver.te 
new/selinux-policy-20240617/policy/modules/services/xserver.te
--- old/selinux-policy-20240613/policy/modules/services/xserver.te      
2024-06-13 10:10:05.000000000 +0200
+++ new/selinux-policy-20240617/policy/modules/services/xserver.te      
2024-06-17 16:35:25.000000000 +0200
@@ -659,6 +659,7 @@
 # Poweroff wants to create the /poweroff file when run from xdm
 files_create_boot_flag(xdm_t)
 files_dontaudit_getattr_boot_dirs(xdm_t)
+files_dontaudit_getattr_root_files(xdm_t)
 files_dontaudit_write_usr_files(xdm_t)
 files_dontaudit_access_check_etc(xdm_t)
 files_dontaudit_getattr_all_dirs(xdm_t)
@@ -1866,3 +1867,11 @@
 ',`
        dev_dontaudit_rw_dri(dridomain)
 ')
+
+# Handle /etc/sysconfig/displaymanager together with accountsservice 
(accountsd_t) (bsc#1222978)
+optional_policy(`
+       # Label all files created by xdm_t under /run called 
"displaymanager.new" as xdm_etc_t
+       xserver_var_run_etc_filetrans_named_content(xdm_t, "displaymanager.new")
+       # Write /etc/sysconfig/displaymanager
+       xserver_etc_filetrans_named_content(xdm_t, "displaymanager")
+')

Reply via email to