Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

polkit-devel-121-150500.1.6 RPM for x86_64

From OpenSuSE Leap 15.5 for x86_64

Name: polkit-devel Distribution: SUSE Linux Enterprise 15
Version: 121 Vendor: SUSE LLC <https://www.suse.com/>
Release: 150500.1.6 Build date: Wed May 3 17:55:54 2023
Group: Development/Libraries/C and C++ Build host: goat06
Size: 418697 Source RPM: polkit-121-150500.1.6.src.rpm
Packager: https://www.suse.com/
Url: https://www.freedesktop.org/wiki/Software/polkit/
Summary: Development files for PolicyKit
Development files for PolicyKit Authorization Framework.

Provides

Requires

License

LGPL-2.1-or-later

Changelog

* Thu Sep 15 2022 meissner@suse.com
  - obsolete libpolkit0 also from baselibs.
* Tue Aug 09 2022 luc14n0@opensuse.org
  - Update to version 121:
    + Addition of duktape as a JS engine backend.
    + Other small fixes and improvements. For more details, visit:
      gitlab.freedesktop.org/polkit/polkit/-/blob/121/NEWS.md
    + Updated translations.
  - Drop merged-upstream patches:
    + CVE-2021-4034-pkexec-fix.patch;
    + 0001-CVE-2021-4115-GHSL-2021-077-fix.patch;
    + duktape-support.patch;
    + pkexec.patch.
  - Replace Intltool with Gettext as a build requirement following
    the migration from last release (0.120).
  - Add Meson as a build requirement while dropping Libtool and
    replace all Autotools macros with Meson ones. And pass the
    following options to Meson: session_tracking=libsystemd-login;
    systemdsystemunitdir=%{_unitdir}; os_type=suse;
    pam_module_dir=%{_pam_moduledir}; pam_prefix=%{_pam_vendordir};
    examples=true; tests=true; gtk_doc=true; man=true and
    js_engine=duktape.
  - Drop no longer needed Libtool as a build requirement, following
    Autotools replacement.
  - Add explicit pkgconfig module build requirements for glib-2.0 and
    gobject-2.0 that are searched by the build scripts. They were
    already being pulled by their siblings [pkgconfig(gio-2.0) and
    pkgconfig(gio-unix-2.0)].
  - Drop conditional macro, which was wrapping "BuildArch: noarch"
    for the doc subpackage, based on long gone EOLed (open)SUSE
    release (11.2).
  - Add missing 'Requires(post): permissions' for the pkexec
    subpackage.
  - Add python3-dbus-python and python3-python-dbusmock as build
    requirements in order to run test in the check section.
  - Add polkit-fix-pam-prefix.patch to use the value of pam_prefix
    Meson option, like it was designed to, rather than hard-coded
    path for pam configuration files.
  - Remove unneeded executable bit from 50-default.rules file.
* Mon Aug 08 2022 kukuk@suse.com
  - Use %_pam_vendordir
* Wed Aug 03 2022 meissner@suse.com
  - add split-provides for polkit:/usr/bin/pkexec. (bsc#1202070)
* Mon Jul 18 2022 meissner@suse.com
  - split out pkexec into seperate package to make system hardening
    easier (to avoid installing it jsc#PED-132 jsc#PED-148).
* Tue Feb 22 2022 meissner@suse.com
  - Fixed denial of service via file descriptor leak (bsc#1195542 CVE-2021-4115)
    0001-CVE-2021-4115-GHSL-2021-077-fix.patch
* Wed Jan 26 2022 fvogt@suse.com
  - Switch from mozjs to duktape:
    * Add duktape-support.patch
* Tue Jan 25 2022 meissner@suse.com
  - Fixed pkexec Local Privilege Escalation aka pwnkit (CVE-2021-4034 bsc#1194568)
    CVE-2021-4034-pkexec-fix.patch
* Mon Dec 06 2021 dmueller@suse.com
  - update to 0.120:
    * transition from Intltool to gettext
    * several tarball, meson and pipeline fixups
    * Portuguese translation
    * Romanian translation
    * meson build system added
    * CVE-2021-3560 mitigation
    * properties in text listener
    * typos fixups
    * Update Hungarian translation
  - drop CVE-2021-3560.patch  (upstream)
* Wed Oct 20 2021 meissner@suse.com
  - fork libpolkit0 package into libpolkit-agent-1-0 and libpolkit-gobject-1-0
    as mandated. bsc#1191781
* Sun Jul 18 2021 gmbr3@opensuse.org
  - Change to using systemd-sysusers
  - Remove unneeded shadow dependency, no longer required due to
    systemd-sysusers
  - Fix 50-default.rules file-parent-ownership-mismatch warning
  - Remove --with-pic, no effect with --disable-static
* Wed Jul 07 2021 Stefan Schubert <schubi@suse.com
  - Move /etc/polkit-1/rules.d/50-default.rules to
    /usr/share/polkit-1/rules.d/50-default.rules. The first location
    is only for admin changes.
* Thu May 27 2021 meissner@suse.com
  - CVE-2021-3560: fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync()
    (bsc#1186497)
    CVE-2021-3560.patch
* Thu Mar 11 2021 kukuk@suse.com
  - Move /etc/dbus-1/system.d to /usr/share/dbus-1/system.d, the
    first location is only for admin changes
  - Move pam configuration to /usr/etc/pam.d
* Tue Dec 29 2020 matthias.gerstner@suse.com
  - also set libprivdir during build, otherwhise systemd and D-Bus service files
    contain the wrong path and we'll get runtime errors.
* Fri Oct 23 2020 bjorn.lie@gmail.com
  - Update to version 0.118:
    + Updated dependency to mozjs78.
    + Tarball fixes.
  - Replace pkgconfig(mozjs-68) for pkgconfig(mozjs-78)
    BuildRequires following upstreams port.
* Fri Jul 31 2020 bjorn.lie@gmail.com
  - Update to version 0.117:
    + Activated Gitlab CI.
    + Updated dependency to mozjs68.
    + Memory management fixes.
    + Updated translations.
  - Replace pkgconfig(mozjs-60) for pkgconfig(mozjs-68)
    BuildRequires following upstreams port.
* Fri Nov 29 2019 bjorn.lie@gmail.com
  - Fix usage of libexecdir instead of prefix/lib where applicable.
* Tue Oct 08 2019 meissner@suse.com
  - polkit-keyinit.patch: add pam_keyinit to the polkit configuration (bsc#1144053)
* Wed May 29 2019 bjorn.lie@gmail.com
  - Update to version 0.116:
    + Leaking zombie child processes.
    + Possible resource leak found by static analyzer.
    + Output messages tuneup.
    + Sanity fixes.
    + pkttyagent tty echo disabled on SIGINT.
    + HACKING: add link to Code of Conduct.
    + polkitbackend: comment typos fix.
    + configure.ac: fix detection of systemd with cgroups v2.
    + CVE-2018-19788 High UIDs overflow fix.
    + CVE-2019-6133 Slowfork vulnerability fix.
    + Allow unset process-uid.
    + Port the JS authority to mozjs-60.
    + Use JS_EncodeStringToUTF8.
    + Updated translations.
  - Replace pkgconfig(mozjs-52) with pkgconfig(mozjs-60)
    BuildRequires following upstreams changes.
  - Drop patches fixed upstream:
    + polkit-fix-possible-resource-leak.patch
    + polkit-fix-leaking-zombie-child-processes.patch
    + polkit-CVE-2018-19788.patch
  - Refresh patches with quilt.
* Fri May 10 2019 dimstar@opensuse.org
  - Use systemd_ordering instead of systemd_requires: strictly
    speaking, polkit does not require systemd to be present. Just
    that when we install on a system with systemd (e.g outside
    containers) we would want systemd to be present before
    installing polkit. Help also reduce a cycle without special hacks
    in systemd.spec.
* Fri Apr 26 2019 mvetter@suse.com
  - bsc#1130588: Require shadow instead of old pwdutils
  - User proper Requires(pre)/Requires(post) for permissions and
    shadow
* Thu Dec 20 2018 meissner@suse.com
  - polkit-CVE-2018-19788.patch: Fixed handling of UIDs over MAX_UINT
    (bsc#1118277 CVE-2018-19788)
* Fri Aug 17 2018 bjorn.lie@gmail.com
  - Add polkit-fix-possible-resource-leak.patch: Fix possible
    resource leak found by static analyzer.
  - Add polkit-fix-leaking-zombie-child-processes.patch: polkitd: fix
    zombie not reaped when js spawned process timed out (fdo#106021).
* Wed Jul 11 2018 meissner@suse.com
  - Update to version 0.115:
    - Fix CVE-2018-1116: Trusting client-supplied UID (bsc#1099031)
    - jsauthority: pass "%s" format string to remaining report function
      (obsoletes polkit-jsauthority-pass-format-string.patch)
* Mon Apr 09 2018 bjorn.lie@gmail.com
  - Update to version 0.114:
    + Port to mozjs 52, the latest version of the firefox JavaScript
      engine.
    + Add gettext support for policy files.
    + Fixes for various memory leaks.
    + Updated translations.
  - Update keyring with Ray Strode <halfline@gmail.com> public key.
  - Drop with_systemd define and all conditionals and
    polkit-no-systemd.patch and ConsoleKit BuildRequires, we only
    support systemd now.
  - Drop upstream fixed polkit-itstools.patch.
  - Rebase pkexec.patch with quilt.
  - Add gcc-c++ and pkgconfig(mozjs-52) BuildRequires: New
    dependencies.
  - Drop conditional pkgconfig(mozjs-17.0) and pkgconfig(mozjs185):
    no longer supported.
  - Drop autoconf and automake BuildRequires: They are implicit via
    libtool BuildRequires.
  - Replace glib2-devel and gobject-introspection-devel with their
    pkgconfig counterparts: pkgconfig(gio-unix-2.0),
    pkgconfig(gmodule-2.0) and pkgconfig(gobject-introspection-1.0).
  - Add polkit-jsauthority-pass-format-string.patch: jsauthority:
    pass "%s" format string to remaining report function, patch from
    upstream git, adding missed commit (bgo#105865).
  - Drop polkit-revert-session-magic.patch: Upstream systemd bug is
    since a long time fixed (gh#systemd#58) (boo#954139).
* Thu Mar 01 2018 schwab@suse.de
  - pkexec.patch: pkexec: allow --version and --help even if not setuid
* Wed Feb 28 2018 dimstar@opensuse.org
  - Modernize spec-file by calling spec-cleaner
* Tue Aug 15 2017 dimstar@opensuse.org
  - Add polkit-itstools.patch: Add gettext support for .policy files.
* Tue Jun 13 2017 lnussel@suse.de
  - Use gettext as fallback to get potential distro translations for
    polkit actions. Similar mechnism as used for desktop file
    translations. That way it's possible to use weblate to add
    additional translations that are not provided by upstream
    (polkit-gettext.patch).
* Wed Jun 08 2016 fbui@suse.com
  - Use pkgconfig() instead of requiring systemd package names directly.
* Tue Jun 07 2016 fbui@suse.com
  - systemd.pc is shipped by systemd main package (bsc#983167)
    Strangely polkit wants systemd.pc to detect that the target system
    is running systemd even if its configured to build systemd support...
* Thu Nov 26 2015 meissner@suse.com
  - polkit-revert-session-magic.patch: revert a session detection change
    that could lead to sessions not being detected as active due to
    a systemd bug. bsc#954139
* Thu Aug 06 2015 antoine.belvire@laposte.net
  - Update to 0.113:
    * Fix CVE-2015-4625
    * Fix CVE-2015-3256
    * Fix CVE-2015-3255
    * Fix CVE-2015-3218
    * On systemd-213 and later, the “active” state is shared across
      all sessions of an user, instead of being tracked separately
    * pkexec: when not given a program to execute, runs the users’
      shell by default
  - Remove polkit-no-kded-leak.patch (upstreamed)
* Mon Jan 12 2015 tchvatal@suse.com
  - Try to fix kded leaking due to powerdevil exposing this issue in
    polkit: (bsc#912889)
    * polkit-no-kded-leak.patch
* Tue Dec 09 2014 meissner@suse.com
  - Added gpg signature and keyring with David Zeuthen and Miloslav Trmac
    ids.

Files

/usr/bin/pk-example-frobnicate
/usr/include/polkit-1
/usr/include/polkit-1/polkit
/usr/include/polkit-1/polkit/polkit.h
/usr/include/polkit-1/polkit/polkitactiondescription.h
/usr/include/polkit-1/polkit/polkitauthority.h
/usr/include/polkit-1/polkit/polkitauthorityfeatures.h
/usr/include/polkit-1/polkit/polkitauthorizationresult.h
/usr/include/polkit-1/polkit/polkitcheckauthorizationflags.h
/usr/include/polkit-1/polkit/polkitdetails.h
/usr/include/polkit-1/polkit/polkitenumtypes.h
/usr/include/polkit-1/polkit/polkiterror.h
/usr/include/polkit-1/polkit/polkitidentity.h
/usr/include/polkit-1/polkit/polkitimplicitauthorization.h
/usr/include/polkit-1/polkit/polkitpermission.h
/usr/include/polkit-1/polkit/polkitprivate.h
/usr/include/polkit-1/polkit/polkitsubject.h
/usr/include/polkit-1/polkit/polkitsystembusname.h
/usr/include/polkit-1/polkit/polkittemporaryauthorization.h
/usr/include/polkit-1/polkit/polkittypes.h
/usr/include/polkit-1/polkit/polkitunixgroup.h
/usr/include/polkit-1/polkit/polkitunixnetgroup.h
/usr/include/polkit-1/polkit/polkitunixprocess.h
/usr/include/polkit-1/polkit/polkitunixsession.h
/usr/include/polkit-1/polkit/polkitunixuser.h
/usr/include/polkit-1/polkitagent
/usr/include/polkit-1/polkitagent/polkitagent.h
/usr/include/polkit-1/polkitagent/polkitagentenumtypes.h
/usr/include/polkit-1/polkitagent/polkitagentlistener.h
/usr/include/polkit-1/polkitagent/polkitagentsession.h
/usr/include/polkit-1/polkitagent/polkitagenttextlistener.h
/usr/include/polkit-1/polkitagent/polkitagenttypes.h
/usr/lib64/libpolkit-agent-1.so
/usr/lib64/libpolkit-gobject-1.so
/usr/lib64/pkgconfig/polkit-agent-1.pc
/usr/lib64/pkgconfig/polkit-gobject-1.pc
/usr/share/gettext/its/polkit.its
/usr/share/gettext/its/polkit.loc
/usr/share/gir-1.0/Polkit-1.0.gir
/usr/share/gir-1.0/PolkitAgent-1.0.gir
/usr/share/polkit-1/actions/org.freedesktop.policykit.examples.pkexec.policy


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 18:11:13 2024