Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libselinux1 | Distribution: openSUSE Tumbleweed |
Version: 3.5 | Vendor: openSUSE |
Release: 1.2 | Build date: Sun Mar 19 16:52:13 2023 |
Group: System/Libraries | Build host: cloud120 |
Size: 202308 | Source RPM: libselinux-3.5-1.2.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: https://github.com/SELinuxProject/selinux/wiki/Releases | |
Summary: SELinux runtime library |
libselinux provides an interface to get and set process and file security contexts and to obtain security policy decisions. (Security-enhanced Linux is a feature of the kernel and some utilities that implement mandatory access control policies, such as Type Enforcement, Role-based Access Control and Multi-Level Security.)
SUSE-Public-Domain
* Fri Feb 24 2023 Johannes Segitz <jsegitz@suse.com> - Update to version 3.5: * check for truncations * avoid newline in avc message * bail out on path truncations * add getpidprevcon to gather the previous context before the last exec of a given process * Workaround for heap overhead of pcre * fix memory leaks on the audit2why module init * ignore invalid class name lookup - Drop restorecon_pin_file.patch, is upstream - Added additional developer key (Jason Zaman) * Thu Jul 07 2022 Johannes Segitz <jsegitz@suse.com> - Fixed initrd check in selinux-ready (bnc#1186127) * Tue May 31 2022 Johannes Segitz <jsegitz@suse.com> - Added restorecon_pin_file.patch. Fixes issus when running fixfiles/restorecon * Mon May 09 2022 Johannes Segitz <jsegitz@suse.com> - Update to version 3.4: * Use PCRE2 by default * Make selinux_log() and is_context_customizable() thread-safe * Prevent leakeing file descriptors * Correctly hash specfiles larger than 4G - Refreshed skip_cycles.patch * Tue Feb 15 2022 Johannes Segitz <jsegitz@suse.com> - Add Requires for exact libselinux1 version for selinux-tools - Simplyfied check for correct boot paramaters in selinux-ready (bsc#1195361) * Thu Nov 11 2021 Johannes Segitz <jsegitz@suse.com> - Update to version 3.3: * Lots of smaller issues fixed found by fuzzing * Sun Jul 18 2021 Callum Farmer <gmbr3@opensuse.org> - Add missing libselinux-utils Provides to selinux-tools so that %selinux_requires works * Mon Apr 26 2021 Johannes Segitz <jsegitz@suse.com> - Remove Recommends for selinux-autorelabel. It's better to have this in the policy package itself (bsc#1181837) * Wed Mar 17 2021 Dominique Leuenberger <dimstar@opensuse.org> - Switch to pcre2: + Replace pcre-devel BuildRequires with pkgconfig(libpcre2-8) + Pass USE_PCRE2=y to make. + Replace pkgconfig(libpcre) Requires in -devel static with pkgconfig(libpcre2-8). * Tue Mar 09 2021 Johannes Segitz <jsegitz@suse.com> - Update to version 3.2: * Use mmap()'ed kernel status page instead of netlink by default. See "KERNEL STATUS PAGE" section in avc_init(3) for more details. * New log callback levels for enforcing and policy load notices - SELINUX_POLICYLOAD, SELINUX_SETENFORCE * Changed userspace AVC setenforce and policy load messages to audit format. * Sat Feb 06 2021 Matej Cepl <mcepl@suse.com> - Add Recommends: selinux-autorelabel, which is very important for healthy use of the SELinux on the system (/.autorelabel mechanism) (bsc#1181837). * Thu Oct 29 2020 Ludwig Nussel <lnussel@suse.de> - install to /usr (boo#1029961) * Tue Jul 14 2020 Johannes Segitz <jsegitz@suse.com> - Update to version 3.1: * selinux/flask.h, selinux/av_permissions.h and sepol/policydb/flask.h were removed. All userspace object managers should have been updated to use the dynamic class/perm mapping support. Use string_to_security_class(3) and string_to_av_perm(3) to map the class and permission names to their policy values, or selinux_set_mapping(3) to create a mapping from class and permission index values used by the application to the policy values. * Removed restrictions in libsepol and checkpolicy that required all declared initial SIDs to be assigned a context. * Support for new policy capability genfs_seclabel_symlinks * selinuxfs is mounted with noexec and nosuid * `security_compute_user()` was deprecated * Thu Mar 26 2020 Johannes Segitz <jsegitz@suse.de> - Added skip_cycles.patch to skip directory cycles and not error out * Tue Mar 03 2020 Johannes Segitz <jsegitz@suse.de> - Update to version 3.0 * Ignore the stem when looking up all matches in file context * Save digest of all partial matches for directory * Use Python distutils to install SELinux python bindings * ensure that digest_len is not zero * fix string conversion of unknown perms * mark all exported function "extern" Dropped Use-Python-distutils-to-install-SELinux.patch, included upstream
/usr/lib/libselinux.so.1
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed May 10 02:08:37 2023