Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

selinux-tools-3.0-lp152.1.1 RPM for aarch64

From OpenSuSE Ports Leap 15.2 for aarch64

Name: selinux-tools Distribution: openSUSE Leap 15.2
Version: 3.0 Vendor: openSUSE
Release: lp152.1.1 Build date: Fri Mar 20 05:58:45 2020
Group: System/Base Build host: obs-arm-9
Size: 1156288 Source RPM: libselinux-3.0-lp152.1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://github.com/SELinuxProject/selinux/wiki/Releases
Summary: SELinux command-line utilities
Security-enhanced Linux is a feature of the kernel and some
utilities that implement mandatory access control policies, such as
Type Enforcement, Role-based Access Control and Multi-Level
Security.

This subpackage contains utilities to inspect and administer the
system's SELinux state.

Provides

Requires

License

SUSE-Public-Domain

Changelog

* Tue Mar 03 2020 Johannes Segitz <jsegitz@suse.de>
  - Update to version 3.0
    * Ignore the stem when looking up all matches in file context
    * Save digest of all partial matches for directory
    * Use Python distutils to install SELinux python bindings
    * ensure that digest_len is not zero
    * fix string conversion of unknown perms
    * mark all exported function "extern"
    Dropped Use-Python-distutils-to-install-SELinux.patch, included
    upstream
* Wed Nov 13 2019 Johannes Segitz <jsegitz@suse.de>
  - Added Use-Python-distutils-to-install-SELinux.patch to use
    Python's distutils instead of building and installing python
    bindings manually
* Mon Jun 03 2019 <jsegitz@suse.com>
  - In selinux-ready
    * Removed check for selinux-policy package as we don't ship one
      (bsc#1136845)
    * Add check that restorecond is installed and enabled
* Fri May 24 2019 <jsegitz@suse.com>
  - Set License: to correct value (bsc#1135710)
* Thu Apr 25 2019 Martin Liška <mliska@suse.cz>
  - Disable LTO (boo#1133244).
* Wed Mar 20 2019 jsegitz@suse.com
  - Update to version 2.9
    * Add security_reject_unknown(3) man page
    * Change matchpathcon usage to match with matchpathcon manpage
    * Do not define gettid() if glibc >= 2.30 is used
    * Fix RESOURCE_LEAK defects reported by coverity scan
    * Fix line wrapping in selabel_file.5
    * Do not dereference symlink with statfs in selinux_restorecon
    * Fix overly strict validation of file_contexts.bin
    * Fix selinux_restorecon() on non-SELinux hosts
    * Fix the whatis line for the selinux_boolean_sub.3 manpage
    * Fix printf format string specifier for uint64_t
    * Fix handling of unknown classes/perms
    * Set an appropriate errno in booleans.c
  - Dropped python3.patch, is now upstream
* Fri Jan 04 2019 jsegitz@suse.com
  - Remove unneeded build requires for python3 (bsc#1120255)
* Wed Oct 17 2018 jsegitz@suse.com
  - Update to version 2.8 (bsc#1111732)
    For changes please see
    https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt
  - ran spec-cleaner on spec files
* Mon May 14 2018 mcepl@cepl.eu
  - Update to version 2.7.
    * %files needed to be heavily modified
    * Based expressly on python3, not just python
    For changes please see
    https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt
* Fri Nov 24 2017 jsegitz@suse.com
  - Update to version 2.6. Notable changes:
    * selinux_restorecon: fix realpath logic
    * sefcontext_compile: invert semantics of "-r" flag
    * sefcontext_compile: Add "-i" flag
    * Introduce configurable backends
    * Add function to find security.restorecon_last entries
    * Add openrc_contexts functions
    * Add support for pcre2
    * Handle NULL pcre study data
    * Add setfiles support to selinux_restorecon(3)
    * Evaluate inodes in selinux_restorecon(3)
    * Change the location of _selinux.so
    * Explain how to free policy type from selinux_getpolicytype()
    * Compare absolute pathname in matchpathcon -V
    * Add selinux_snapperd_contexts_path()
    * Modify audit2why analyze function to use loaded policy
    * Avoid mounting /proc outside of selinux_init_load_policy()
    * Fix location of selinuxfs mount point
    * Only mount /proc if necessary
    * procattr: return einval for <= 0 pid args
    * procattr: return error on invalid pid_t input
  - Dropped
    * libselinux-2.2-ruby.patch
    * libselinux-proc-mount-only-if-needed.patch
    * python-selinux-swig-3.10.patch
* Wed Jul 05 2017 schwab@suse.de
  - readv-proto.patch: include <sys/uio.h> for readv prototype
* Sun Jul 24 2016 crrodriguez@opensuse.org
  - -devel static subpackage requires libpcre-devel and libsepol-devel
* Sun Jul 24 2016 crrodriguez@opensuse.org
  - Avoid mounting /proc outside of selinux_init_load_policy().
    (Stephen Smalley) reverts upstream 5a8d8c4, 9df4988, fixes
    among other things systemd seccomp sandboxing otherwise all
    filters must allow mount(2)
    (libselinux-proc-mount-only-if-needed.patch)
* Sun Jul 17 2016 jengelh@inai.de
  - Update RPM groups, trim description and combine filelist entries.
* Thu Jul 14 2016 jsegitz@novell.com
  - Adjusted source link
* Tue Jul 05 2016 i@marguerite.su
  - add patch: python-selinux-swig-3.10.patch, fixed boo#985368
    * swig-3.10 in Factory use importlib instead of imp to find
      _selinux.so. imp searched the same directory as __init__.py
      is while importlib searchs only standard paths. so we have
      to move _selinux.so. fixed by upstream
  - update version 2.5
    * Add selinux_restorecon function
    * read_spec_entry: fail on non-ascii
    * Add man information about thread specific functions
    * Don't wrap rpm_execcon with DISABLE_RPM with SWIG
    * Correct line count for property and service context files
    * label_file: fix memory leaks and uninitialized jump
    * Replace selabel_digest hash function
    * Fix selabel_open(3) services if no digest requested
    * Add selabel_digest function
    * Flush the class/perm string mapping cache on policy reload
    * Fix restorecon when path has no context
    * Free memory when processing media and x specfiles
    * Fix mmap memory release for file labeling
    * Add policy context validation to sefcontext_compile
    * Do not treat an empty file_contexts(.local) as an error
    * Fail hard on invalid property_contexts entries
    * Fail hard on invalid file_contexts entries
    * Support context validation on file_contexts.bin
    * Add selabel_cmp interface and label_file backend
    * Support specifying file_contexts.bin file path
    * Support file_contexts.bin without file_contexts
    * Simplify procattr cache
    * Use /proc/thread-self when available
    * Add const to selinux_opt for label backends
    * Fix binary file labels for regexes with metachars
    * Fix file labels for regexes with metachars
    * Fix if file_contexts not '\n' terminated
    * Enhance file context support
    * Fix property processing and cleanup formatting
    * Add read_spec_entries function to replace sscanf
    * Support consistent mode size for bin files
    * Fix more bin file processing core dumps
    * add selinux_openssh_contexts_path()
    * setrans_client: minimize overhead when mcstransd is not present
    * Ensure selabel_lookup_best_match links NULL terminated
    * Fix core dumps with corrupt *.bin files
    * Add selabel partial and best match APIs
    * Use os.walk() instead of the deprecated os.path.walk()
    * Remove deprecated mudflap option
    * Mount procfs before checking /proc/filesystems
    * Fix -Wformat errors with gcc-5.0.0
    * label_file:  handle newlines in file names
    * Fix audit2why error handling if SELinux is disabled
    * pcre_study can return NULL without error
    * Only check SELinux enabled status once in selinux_check_access
  - changes in 2.4
    * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR
    * Fix bugs found by hardened gcc flags
    * Set the system to permissive if failing to disable SELinux because
      policy has already been loaded
    * Add db_exception and db_datatype support to label_db backend
    * Log an error on unknown classes and permissions
    * Add pcre version string to the compiled file_contexts format
    * Deprecate use of flask.h and av_permissions.h
    * Compiled file_context files and the original should have the same DAC
      permissions
* Thu Jul 30 2015 jsegitz@novell.com
  - fixed selinux-ready to work with initrd files created by dracut (bsc#940006)

Files

/usr/sbin/avcstat
/usr/sbin/getenforce
/usr/sbin/getsebool
/usr/sbin/matchpathcon
/usr/sbin/sefcontext_compile
/usr/sbin/selabel_digest
/usr/sbin/selabel_lookup
/usr/sbin/selabel_lookup_best_match
/usr/sbin/selabel_partial_match
/usr/sbin/selinux-ready
/usr/sbin/selinux_check_access
/usr/sbin/selinuxconlist
/usr/sbin/selinuxdefcon
/usr/sbin/selinuxenabled
/usr/sbin/selinuxexeccon
/usr/sbin/setenforce
/usr/sbin/togglesebool
/usr/share/man/man5/customizable_types.5.gz
/usr/share/man/man5/default_contexts.5.gz
/usr/share/man/man5/default_type.5.gz
/usr/share/man/man5/failsafe_context.5.gz
/usr/share/man/man5/file_contexts.5.gz
/usr/share/man/man5/file_contexts.homedirs.5.gz
/usr/share/man/man5/file_contexts.local.5.gz
/usr/share/man/man5/file_contexts.subs.5.gz
/usr/share/man/man5/file_contexts.subs_dist.5.gz
/usr/share/man/man5/media.5.gz
/usr/share/man/man5/removable_context.5.gz
/usr/share/man/man5/secolor.conf.5.gz
/usr/share/man/man5/securetty_types.5.gz
/usr/share/man/man5/selabel_db.5.gz
/usr/share/man/man5/selabel_file.5.gz
/usr/share/man/man5/selabel_media.5.gz
/usr/share/man/man5/selabel_x.5.gz
/usr/share/man/man5/sepgsql_contexts.5.gz
/usr/share/man/man5/service_seusers.5.gz
/usr/share/man/man5/seusers.5.gz
/usr/share/man/man5/user_contexts.5.gz
/usr/share/man/man5/virtual_domain_context.5.gz
/usr/share/man/man5/virtual_image_context.5.gz
/usr/share/man/man5/x_contexts.5.gz
/usr/share/man/man8/avcstat.8.gz
/usr/share/man/man8/booleans.8.gz
/usr/share/man/man8/getenforce.8.gz
/usr/share/man/man8/getsebool.8.gz
/usr/share/man/man8/matchpathcon.8.gz
/usr/share/man/man8/sefcontext_compile.8.gz
/usr/share/man/man8/selinux.8.gz
/usr/share/man/man8/selinuxenabled.8.gz
/usr/share/man/man8/selinuxexeccon.8.gz
/usr/share/man/man8/setenforce.8.gz
/usr/share/man/man8/togglesebool.8.gz
/usr/share/man/ru/man5/customizable_types.5.gz
/usr/share/man/ru/man5/default_contexts.5.gz
/usr/share/man/ru/man5/default_type.5.gz
/usr/share/man/ru/man5/failsafe_context.5.gz
/usr/share/man/ru/man5/file_contexts.5.gz
/usr/share/man/ru/man5/file_contexts.homedirs.5.gz
/usr/share/man/ru/man5/file_contexts.local.5.gz
/usr/share/man/ru/man5/file_contexts.subs.5.gz
/usr/share/man/ru/man5/file_contexts.subs_dist.5.gz
/usr/share/man/ru/man5/media.5.gz
/usr/share/man/ru/man5/removable_context.5.gz
/usr/share/man/ru/man5/secolor.conf.5.gz
/usr/share/man/ru/man5/securetty_types.5.gz
/usr/share/man/ru/man5/selabel_db.5.gz
/usr/share/man/ru/man5/selabel_file.5.gz
/usr/share/man/ru/man5/selabel_media.5.gz
/usr/share/man/ru/man5/selabel_x.5.gz
/usr/share/man/ru/man5/sepgsql_contexts.5.gz
/usr/share/man/ru/man5/service_seusers.5.gz
/usr/share/man/ru/man5/seusers.5.gz
/usr/share/man/ru/man5/user_contexts.5.gz
/usr/share/man/ru/man5/virtual_domain_context.5.gz
/usr/share/man/ru/man5/virtual_image_context.5.gz
/usr/share/man/ru/man5/x_contexts.5.gz
/usr/share/man/ru/man8/avcstat.8.gz
/usr/share/man/ru/man8/booleans.8.gz
/usr/share/man/ru/man8/getenforce.8.gz
/usr/share/man/ru/man8/getsebool.8.gz
/usr/share/man/ru/man8/matchpathcon.8.gz
/usr/share/man/ru/man8/sefcontext_compile.8.gz
/usr/share/man/ru/man8/selinux.8.gz
/usr/share/man/ru/man8/selinuxenabled.8.gz
/usr/share/man/ru/man8/selinuxexeccon.8.gz
/usr/share/man/ru/man8/setenforce.8.gz
/usr/share/man/ru/man8/togglesebool.8.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 11:45:28 2024