Sync from SUSE:SLFO:Main selinux-policy revision 42bfa15ee3174106c28906880b125467

This commit is contained in:
2025-07-19 09:57:12 +02:00
parent bc2e6a3577
commit a03204bbc9
6 changed files with 75 additions and 6 deletions

View File

@@ -1,4 +1,4 @@
<servicedata>
<service name="tar_scm">
<param name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param>
<param name="changesrevision">1805634d61369054e3a36424c5772993fc0163d1</param></service></servicedata>
<param name="changesrevision">68c4038281d54812db3c49ccc4a84b84172a82c1</param></service></servicedata>

View File

@@ -1,7 +1,8 @@
policy_module(container, 2.237.0)
policy_module(container, 2.238.0)
gen_require(`
class passwd rootok;
type system_conf_t;
')
########################################
@@ -1626,3 +1627,7 @@ tunable_policy(`deny_ptrace',`',`
allow container_domain self:process ptrace;
allow spc_t self:process ptrace;
')
# netavark needs to write to /run/sysctl.d and needs the right label for systemd to read it.
# https://issues.redhat.com/browse/RHEL-91380
files_pid_filetrans(container_runtime_t, system_conf_t, dir, "sysctl.d")

Binary file not shown.

BIN
selinux-policy-20250627+git62.68c403828.tar.xz (Stored with Git LFS) Normal file

Binary file not shown.

View File

@@ -1,3 +1,67 @@
-------------------------------------------------------------------
Wed Jul 16 08:24:24 UTC 2025 - Cathy Hu <cathy.hu@suse.com>
- Update to version 20250627+git62.68c403828:
* Allow virtqemud_t use its private tmpfs files (bsc#1242998)
* Allow virtqemud_t setattr to /dev/userfaultfd (bsc#1242998)
* Allow virtqemud_t read and write /dev/ptmx (bsc#1242998)
* Extend virtqemud_t tcp_socket permissions (bsc#1242998)
* Mark configfs_t as mountpoint (bsc#1246080)
* healthchecker: add proper optional_policy() guards
* Allow virtqemud_t to read and write generic pty (bsc#1242998)
* Drop SUSE-specific /usr/etc = /etc equivalency
* Allow irqbalance execute shell if irqbalance_run_unconfined is on
* Allow openvswitch ioctl vduse devices
* Label /dev/vduse/control and /dev/vduse/NAME devices
* Allow virtstoraged the sys_rawio capability
* Allow virtqemud read insights-core state files
* Allow virtnodedev create mdevctl config dirs
* Allow virtqemud additional permissions on scsi generic chr files
* Allow local login execute gnome keyring daemon
* Allow plymouthd_t read proc files of systemd_passwd_agent (bsc#1245470)
* Allow virtqemud send a generic signal to passt
* Allow svirt-tcg read init state
* Allow irqbalance execute shell if irqbalance_run_unconfined is on
* Label /run/opendkim with dkim_milter_data_t
* Allow sa-update status systemd services
* Introduce new cluster_service_transition_to_unconfined_user boolean (bsc#1244495)
* Allow updpwd logging send audit messages
* Temporary dontaudit iio-sensor-proxy sys_admin.
* Allow iio-sensor-proxy sendto to journald over a unix datagram socket
* Revert "Allow iio-sensor-proxy sendto to journald over a unix datagram socket"
* virt: allow QEMU use of the qgs daemon for attestation
* qgs: add contrib module for TDX "qgs" daemon
* kernel: add interfaces for using SGX enclaves
* Define file equivalency for /usr/etc
* Allow mongod to receive pressure stall information
* Dontaudit systemd_generator read sssd public files
* Allow plymouthd read/write input event devices
* Label 99-nvme-nbft-connect.sh with NetworkManager_dispatcher_nvme_script_t
* Allow systemd-user-runtime-dir sendto to syslogd
* Remove pcp module
* Update irqbalance policy for using unconfined scripts
* Allow utempter use terminal multiplexor
* Allow virtqemud execute ovs-vsctl with a domain transition
* Update the files_search_mnt() interface
* Allow nmbd read network sysctls
* Allow iio-sensor-proxy sendto to journald over a unix datagram socket
* Allow logrotate stop all systemd services
* systemd: rework systemd_manage_random_seed
* Allow tuned-ppd connect to sssd over a unix stream socket
* Drop config for /run/random-seed
* Update file location for systemd random-seed file
* Allow tomcat execute cracklib-check with a domain transition
* Allow sssd watch lib dirs
* Confine systemd-hibernate-resume
* Allow login_userdomain create /run/tlog directory with user_tmp_t
* Allow login_pgm read filesystem sysctls
* Allow gconfd connect to system dbus
* Allow NetworkManager manage NetworkManager_etc_rw_t symlinks
- Syncing with upstream rawhide selinux-policy up to:
* 23514206ea45e1d1d2f8a4c08288065c813fcc91
- Update embedded container-selinux version to commit:
* 36e8f213b7ac8a1843e5e37b37eb8ef7bdc2af9c (version 2.238.0)
-------------------------------------------------------------------
Fri Jun 27 08:40:10 UTC 2025 - cathy.hu@suse.com

View File

@@ -36,7 +36,7 @@ Summary: SELinux policy configuration
License: GPL-2.0-or-later
Group: System/Management
Name: selinux-policy
Version: 20250627+git0.1805634d
Version: 20250627+git62.68c403828
Release: 0
Source0: %{name}-%{version}.tar.xz
Source1: container.fc