Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: polkit-devel | Distribution: SUSE Linux Enterprise 15 |
Version: 121 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: 150500.1.6 | Build date: Wed May 3 17:55:54 2023 |
Group: Development/Libraries/C and C++ | Build host: goat06 |
Size: 418697 | Source RPM: polkit-121-150500.1.6.src.rpm |
Packager: https://www.suse.com/ | |
Url: https://www.freedesktop.org/wiki/Software/polkit/ | |
Summary: Development files for PolicyKit |
Development files for PolicyKit Authorization Framework.
LGPL-2.1-or-later
* Thu Sep 15 2022 meissner@suse.com - obsolete libpolkit0 also from baselibs. * Tue Aug 09 2022 luc14n0@opensuse.org - Update to version 121: + Addition of duktape as a JS engine backend. + Other small fixes and improvements. For more details, visit: gitlab.freedesktop.org/polkit/polkit/-/blob/121/NEWS.md + Updated translations. - Drop merged-upstream patches: + CVE-2021-4034-pkexec-fix.patch; + 0001-CVE-2021-4115-GHSL-2021-077-fix.patch; + duktape-support.patch; + pkexec.patch. - Replace Intltool with Gettext as a build requirement following the migration from last release (0.120). - Add Meson as a build requirement while dropping Libtool and replace all Autotools macros with Meson ones. And pass the following options to Meson: session_tracking=libsystemd-login; systemdsystemunitdir=%{_unitdir}; os_type=suse; pam_module_dir=%{_pam_moduledir}; pam_prefix=%{_pam_vendordir}; examples=true; tests=true; gtk_doc=true; man=true and js_engine=duktape. - Drop no longer needed Libtool as a build requirement, following Autotools replacement. - Add explicit pkgconfig module build requirements for glib-2.0 and gobject-2.0 that are searched by the build scripts. They were already being pulled by their siblings [pkgconfig(gio-2.0) and pkgconfig(gio-unix-2.0)]. - Drop conditional macro, which was wrapping "BuildArch: noarch" for the doc subpackage, based on long gone EOLed (open)SUSE release (11.2). - Add missing 'Requires(post): permissions' for the pkexec subpackage. - Add python3-dbus-python and python3-python-dbusmock as build requirements in order to run test in the check section. - Add polkit-fix-pam-prefix.patch to use the value of pam_prefix Meson option, like it was designed to, rather than hard-coded path for pam configuration files. - Remove unneeded executable bit from 50-default.rules file. * Mon Aug 08 2022 kukuk@suse.com - Use %_pam_vendordir * Wed Aug 03 2022 meissner@suse.com - add split-provides for polkit:/usr/bin/pkexec. (bsc#1202070) * Mon Jul 18 2022 meissner@suse.com - split out pkexec into seperate package to make system hardening easier (to avoid installing it jsc#PED-132 jsc#PED-148). * Tue Feb 22 2022 meissner@suse.com - Fixed denial of service via file descriptor leak (bsc#1195542 CVE-2021-4115) 0001-CVE-2021-4115-GHSL-2021-077-fix.patch * Wed Jan 26 2022 fvogt@suse.com - Switch from mozjs to duktape: * Add duktape-support.patch * Tue Jan 25 2022 meissner@suse.com - Fixed pkexec Local Privilege Escalation aka pwnkit (CVE-2021-4034 bsc#1194568) CVE-2021-4034-pkexec-fix.patch * Mon Dec 06 2021 dmueller@suse.com - update to 0.120: * transition from Intltool to gettext * several tarball, meson and pipeline fixups * Portuguese translation * Romanian translation * meson build system added * CVE-2021-3560 mitigation * properties in text listener * typos fixups * Update Hungarian translation - drop CVE-2021-3560.patch (upstream) * Wed Oct 20 2021 meissner@suse.com - fork libpolkit0 package into libpolkit-agent-1-0 and libpolkit-gobject-1-0 as mandated. bsc#1191781 * Sun Jul 18 2021 gmbr3@opensuse.org - Change to using systemd-sysusers - Remove unneeded shadow dependency, no longer required due to systemd-sysusers - Fix 50-default.rules file-parent-ownership-mismatch warning - Remove --with-pic, no effect with --disable-static * Wed Jul 07 2021 Stefan Schubert <schubi@suse.com - Move /etc/polkit-1/rules.d/50-default.rules to /usr/share/polkit-1/rules.d/50-default.rules. The first location is only for admin changes. * Thu May 27 2021 meissner@suse.com - CVE-2021-3560: fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync() (bsc#1186497) CVE-2021-3560.patch * Thu Mar 11 2021 kukuk@suse.com - Move /etc/dbus-1/system.d to /usr/share/dbus-1/system.d, the first location is only for admin changes - Move pam configuration to /usr/etc/pam.d * Tue Dec 29 2020 matthias.gerstner@suse.com - also set libprivdir during build, otherwhise systemd and D-Bus service files contain the wrong path and we'll get runtime errors. * Fri Oct 23 2020 bjorn.lie@gmail.com - Update to version 0.118: + Updated dependency to mozjs78. + Tarball fixes. - Replace pkgconfig(mozjs-68) for pkgconfig(mozjs-78) BuildRequires following upstreams port. * Fri Jul 31 2020 bjorn.lie@gmail.com - Update to version 0.117: + Activated Gitlab CI. + Updated dependency to mozjs68. + Memory management fixes. + Updated translations. - Replace pkgconfig(mozjs-60) for pkgconfig(mozjs-68) BuildRequires following upstreams port. * Fri Nov 29 2019 bjorn.lie@gmail.com - Fix usage of libexecdir instead of prefix/lib where applicable. * Tue Oct 08 2019 meissner@suse.com - polkit-keyinit.patch: add pam_keyinit to the polkit configuration (bsc#1144053) * Wed May 29 2019 bjorn.lie@gmail.com - Update to version 0.116: + Leaking zombie child processes. + Possible resource leak found by static analyzer. + Output messages tuneup. + Sanity fixes. + pkttyagent tty echo disabled on SIGINT. + HACKING: add link to Code of Conduct. + polkitbackend: comment typos fix. + configure.ac: fix detection of systemd with cgroups v2. + CVE-2018-19788 High UIDs overflow fix. + CVE-2019-6133 Slowfork vulnerability fix. + Allow unset process-uid. + Port the JS authority to mozjs-60. + Use JS_EncodeStringToUTF8. + Updated translations. - Replace pkgconfig(mozjs-52) with pkgconfig(mozjs-60) BuildRequires following upstreams changes. - Drop patches fixed upstream: + polkit-fix-possible-resource-leak.patch + polkit-fix-leaking-zombie-child-processes.patch + polkit-CVE-2018-19788.patch - Refresh patches with quilt. * Fri May 10 2019 dimstar@opensuse.org - Use systemd_ordering instead of systemd_requires: strictly speaking, polkit does not require systemd to be present. Just that when we install on a system with systemd (e.g outside containers) we would want systemd to be present before installing polkit. Help also reduce a cycle without special hacks in systemd.spec. * Fri Apr 26 2019 mvetter@suse.com - bsc#1130588: Require shadow instead of old pwdutils - User proper Requires(pre)/Requires(post) for permissions and shadow * Thu Dec 20 2018 meissner@suse.com - polkit-CVE-2018-19788.patch: Fixed handling of UIDs over MAX_UINT (bsc#1118277 CVE-2018-19788) * Fri Aug 17 2018 bjorn.lie@gmail.com - Add polkit-fix-possible-resource-leak.patch: Fix possible resource leak found by static analyzer. - Add polkit-fix-leaking-zombie-child-processes.patch: polkitd: fix zombie not reaped when js spawned process timed out (fdo#106021). * Wed Jul 11 2018 meissner@suse.com - Update to version 0.115: - Fix CVE-2018-1116: Trusting client-supplied UID (bsc#1099031) - jsauthority: pass "%s" format string to remaining report function (obsoletes polkit-jsauthority-pass-format-string.patch) * Mon Apr 09 2018 bjorn.lie@gmail.com - Update to version 0.114: + Port to mozjs 52, the latest version of the firefox JavaScript engine. + Add gettext support for policy files. + Fixes for various memory leaks. + Updated translations. - Update keyring with Ray Strode <halfline@gmail.com> public key. - Drop with_systemd define and all conditionals and polkit-no-systemd.patch and ConsoleKit BuildRequires, we only support systemd now. - Drop upstream fixed polkit-itstools.patch. - Rebase pkexec.patch with quilt. - Add gcc-c++ and pkgconfig(mozjs-52) BuildRequires: New dependencies. - Drop conditional pkgconfig(mozjs-17.0) and pkgconfig(mozjs185): no longer supported. - Drop autoconf and automake BuildRequires: They are implicit via libtool BuildRequires. - Replace glib2-devel and gobject-introspection-devel with their pkgconfig counterparts: pkgconfig(gio-unix-2.0), pkgconfig(gmodule-2.0) and pkgconfig(gobject-introspection-1.0). - Add polkit-jsauthority-pass-format-string.patch: jsauthority: pass "%s" format string to remaining report function, patch from upstream git, adding missed commit (bgo#105865). - Drop polkit-revert-session-magic.patch: Upstream systemd bug is since a long time fixed (gh#systemd#58) (boo#954139). * Thu Mar 01 2018 schwab@suse.de - pkexec.patch: pkexec: allow --version and --help even if not setuid * Wed Feb 28 2018 dimstar@opensuse.org - Modernize spec-file by calling spec-cleaner * Tue Aug 15 2017 dimstar@opensuse.org - Add polkit-itstools.patch: Add gettext support for .policy files. * Tue Jun 13 2017 lnussel@suse.de - Use gettext as fallback to get potential distro translations for polkit actions. Similar mechnism as used for desktop file translations. That way it's possible to use weblate to add additional translations that are not provided by upstream (polkit-gettext.patch). * Wed Jun 08 2016 fbui@suse.com - Use pkgconfig() instead of requiring systemd package names directly. * Tue Jun 07 2016 fbui@suse.com - systemd.pc is shipped by systemd main package (bsc#983167) Strangely polkit wants systemd.pc to detect that the target system is running systemd even if its configured to build systemd support... * Thu Nov 26 2015 meissner@suse.com - polkit-revert-session-magic.patch: revert a session detection change that could lead to sessions not being detected as active due to a systemd bug. bsc#954139 * Thu Aug 06 2015 antoine.belvire@laposte.net - Update to 0.113: * Fix CVE-2015-4625 * Fix CVE-2015-3256 * Fix CVE-2015-3255 * Fix CVE-2015-3218 * On systemd-213 and later, the “active” state is shared across all sessions of an user, instead of being tracked separately * pkexec: when not given a program to execute, runs the users’ shell by default - Remove polkit-no-kded-leak.patch (upstreamed) * Mon Jan 12 2015 tchvatal@suse.com - Try to fix kded leaking due to powerdevil exposing this issue in polkit: (bsc#912889) * polkit-no-kded-leak.patch * Tue Dec 09 2014 meissner@suse.com - Added gpg signature and keyring with David Zeuthen and Miloslav Trmac ids.
/usr/bin/pk-example-frobnicate /usr/include/polkit-1 /usr/include/polkit-1/polkit /usr/include/polkit-1/polkit/polkit.h /usr/include/polkit-1/polkit/polkitactiondescription.h /usr/include/polkit-1/polkit/polkitauthority.h /usr/include/polkit-1/polkit/polkitauthorityfeatures.h /usr/include/polkit-1/polkit/polkitauthorizationresult.h /usr/include/polkit-1/polkit/polkitcheckauthorizationflags.h /usr/include/polkit-1/polkit/polkitdetails.h /usr/include/polkit-1/polkit/polkitenumtypes.h /usr/include/polkit-1/polkit/polkiterror.h /usr/include/polkit-1/polkit/polkitidentity.h /usr/include/polkit-1/polkit/polkitimplicitauthorization.h /usr/include/polkit-1/polkit/polkitpermission.h /usr/include/polkit-1/polkit/polkitprivate.h /usr/include/polkit-1/polkit/polkitsubject.h /usr/include/polkit-1/polkit/polkitsystembusname.h /usr/include/polkit-1/polkit/polkittemporaryauthorization.h /usr/include/polkit-1/polkit/polkittypes.h /usr/include/polkit-1/polkit/polkitunixgroup.h /usr/include/polkit-1/polkit/polkitunixnetgroup.h /usr/include/polkit-1/polkit/polkitunixprocess.h /usr/include/polkit-1/polkit/polkitunixsession.h /usr/include/polkit-1/polkit/polkitunixuser.h /usr/include/polkit-1/polkitagent /usr/include/polkit-1/polkitagent/polkitagent.h /usr/include/polkit-1/polkitagent/polkitagentenumtypes.h /usr/include/polkit-1/polkitagent/polkitagentlistener.h /usr/include/polkit-1/polkitagent/polkitagentsession.h /usr/include/polkit-1/polkitagent/polkitagenttextlistener.h /usr/include/polkit-1/polkitagent/polkitagenttypes.h /usr/lib64/libpolkit-agent-1.so /usr/lib64/libpolkit-gobject-1.so /usr/lib64/pkgconfig/polkit-agent-1.pc /usr/lib64/pkgconfig/polkit-gobject-1.pc /usr/share/gettext/its/polkit.its /usr/share/gettext/its/polkit.loc /usr/share/gir-1.0/Polkit-1.0.gir /usr/share/gir-1.0/PolkitAgent-1.0.gir /usr/share/polkit-1/actions/org.freedesktop.policykit.examples.pkexec.policy
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 18:11:13 2024