Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: polkit-devel | Distribution: openSUSE Leap 15.2 |
Version: 0.116 | Vendor: openSUSE |
Release: lp152.2.3.1 | Build date: Thu Jun 3 18:12:04 2021 |
Group: Development/Libraries/C and C++ | Build host: goat03 |
Size: 391209 | Source RPM: polkit-0.116-lp152.2.3.1.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: http://www.freedesktop.org/wiki/Software/polkit/ | |
Summary: Development files for PolicyKit |
Development files for PolicyKit Authorization Framework.
LGPL-2.1-or-later
* Thu May 27 2021 Marcus Meissner <meissner@suse.com> - CVE-2021-3560: fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync() (bsc#1186497) CVE-2021-3560.patch * Fri Nov 29 2019 Bjørn Lie <bjorn.lie@gmail.com> - Fix usage of libexecdir instead of prefix/lib where applicable. * Tue Oct 08 2019 Marcus Meissner <meissner@suse.com> - polkit-keyinit.patch: add pam_keyinit to the polkit configuration (bsc#1144053) * Wed May 29 2019 Bjørn Lie <bjorn.lie@gmail.com> - Update to version 0.116: + Leaking zombie child processes. + Possible resource leak found by static analyzer. + Output messages tuneup. + Sanity fixes. + pkttyagent tty echo disabled on SIGINT. + HACKING: add link to Code of Conduct. + polkitbackend: comment typos fix. + configure.ac: fix detection of systemd with cgroups v2. + CVE-2018-19788 High UIDs overflow fix. + CVE-2019-6133 Slowfork vulnerability fix. + Allow unset process-uid. + Port the JS authority to mozjs-60. + Use JS_EncodeStringToUTF8. + Updated translations. - Replace pkgconfig(mozjs-52) with pkgconfig(mozjs-60) BuildRequires following upstreams changes. - Drop patches fixed upstream: + polkit-fix-possible-resource-leak.patch + polkit-fix-leaking-zombie-child-processes.patch + polkit-CVE-2018-19788.patch - Refresh patches with quilt. * Fri May 10 2019 Dominique Leuenberger <dimstar@opensuse.org> - Use systemd_ordering instead of systemd_requires: strictly speaking, polkit does not require systemd to be present. Just that when we install on a system with systemd (e.g outside containers) we would want systemd to be present before installing polkit. Help also reduce a cycle without special hacks in systemd.spec. * Fri Apr 26 2019 mvetter@suse.com - bsc#1130588: Require shadow instead of old pwdutils - User proper Requires(pre)/Requires(post) for permissions and shadow * Thu Dec 20 2018 meissner@suse.com - polkit-CVE-2018-19788.patch: Fixed handling of UIDs over MAX_UINT (bsc#1118277 CVE-2018-19788) * Fri Aug 17 2018 bjorn.lie@gmail.com - Add polkit-fix-possible-resource-leak.patch: Fix possible resource leak found by static analyzer. - Add polkit-fix-leaking-zombie-child-processes.patch: polkitd: fix zombie not reaped when js spawned process timed out (fdo#106021). * Wed Jul 11 2018 meissner@suse.com - Update to version 0.115: - Fix CVE-2018-1116: Trusting client-supplied UID (bsc#1099031) - jsauthority: pass "%s" format string to remaining report function (obsoletes polkit-jsauthority-pass-format-string.patch) * Mon Apr 09 2018 bjorn.lie@gmail.com - Update to version 0.114: + Port to mozjs 52, the latest version of the firefox JavaScript engine. + Add gettext support for policy files. + Fixes for various memory leaks. + Updated translations. - Update keyring with Ray Strode <halfline@gmail.com> public key. - Drop with_systemd define and all conditionals and polkit-no-systemd.patch and ConsoleKit BuildRequires, we only support systemd now. - Drop upstream fixed polkit-itstools.patch. - Rebase pkexec.patch with quilt. - Add gcc-c++ and pkgconfig(mozjs-52) BuildRequires: New dependencies. - Drop conditional pkgconfig(mozjs-17.0) and pkgconfig(mozjs185): no longer supported. - Drop autoconf and automake BuildRequires: They are implicit via libtool BuildRequires. - Replace glib2-devel and gobject-introspection-devel with their pkgconfig counterparts: pkgconfig(gio-unix-2.0), pkgconfig(gmodule-2.0) and pkgconfig(gobject-introspection-1.0). - Add polkit-jsauthority-pass-format-string.patch: jsauthority: pass "%s" format string to remaining report function, patch from upstream git, adding missed commit (bgo#105865). - Drop polkit-revert-session-magic.patch: Upstream systemd bug is since a long time fixed (gh#systemd#58) (boo#954139). * Thu Mar 01 2018 schwab@suse.de - pkexec.patch: pkexec: allow --version and --help even if not setuid * Wed Feb 28 2018 dimstar@opensuse.org - Modernize spec-file by calling spec-cleaner * Tue Aug 15 2017 dimstar@opensuse.org - Add polkit-itstools.patch: Add gettext support for .policy files. * Tue Jun 13 2017 lnussel@suse.de - Use gettext as fallback to get potential distro translations for polkit actions. Similar mechnism as used for desktop file translations. That way it's possible to use weblate to add additional translations that are not provided by upstream (polkit-gettext.patch). * Wed Jun 08 2016 fbui@suse.com - Use pkgconfig() instead of requiring systemd package names directly. * Tue Jun 07 2016 fbui@suse.com - systemd.pc is shipped by systemd main package (bsc#983167) Strangely polkit wants systemd.pc to detect that the target system is running systemd even if its configured to build systemd support... * Thu Nov 26 2015 meissner@suse.com - polkit-revert-session-magic.patch: revert a session detection change that could lead to sessions not being detected as active due to a systemd bug. bsc#954139 * Thu Aug 06 2015 antoine.belvire@laposte.net - Update to 0.113: * Fix CVE-2015-4625 * Fix CVE-2015-3256 * Fix CVE-2015-3255 * Fix CVE-2015-3218 * On systemd-213 and later, the “active” state is shared across all sessions of an user, instead of being tracked separately * pkexec: when not given a program to execute, runs the users’ shell by default - Remove polkit-no-kded-leak.patch (upstreamed) * Mon Jan 12 2015 tchvatal@suse.com - Try to fix kded leaking due to powerdevil exposing this issue in polkit: (bsc#912889) * polkit-no-kded-leak.patch * Tue Dec 09 2014 meissner@suse.com - Added gpg signature and keyring with David Zeuthen and Miloslav Trmac ids.
/usr/bin/pk-example-frobnicate /usr/include/polkit-1 /usr/include/polkit-1/polkit /usr/include/polkit-1/polkit/polkit.h /usr/include/polkit-1/polkit/polkitactiondescription.h /usr/include/polkit-1/polkit/polkitauthority.h /usr/include/polkit-1/polkit/polkitauthorityfeatures.h /usr/include/polkit-1/polkit/polkitauthorizationresult.h /usr/include/polkit-1/polkit/polkitcheckauthorizationflags.h /usr/include/polkit-1/polkit/polkitdetails.h /usr/include/polkit-1/polkit/polkitenumtypes.h /usr/include/polkit-1/polkit/polkiterror.h /usr/include/polkit-1/polkit/polkitidentity.h /usr/include/polkit-1/polkit/polkitimplicitauthorization.h /usr/include/polkit-1/polkit/polkitpermission.h /usr/include/polkit-1/polkit/polkitprivate.h /usr/include/polkit-1/polkit/polkitsubject.h /usr/include/polkit-1/polkit/polkitsystembusname.h /usr/include/polkit-1/polkit/polkittemporaryauthorization.h /usr/include/polkit-1/polkit/polkittypes.h /usr/include/polkit-1/polkit/polkitunixgroup.h /usr/include/polkit-1/polkit/polkitunixnetgroup.h /usr/include/polkit-1/polkit/polkitunixprocess.h /usr/include/polkit-1/polkit/polkitunixsession.h /usr/include/polkit-1/polkit/polkitunixuser.h /usr/include/polkit-1/polkitagent /usr/include/polkit-1/polkitagent/polkitagent.h /usr/include/polkit-1/polkitagent/polkitagentenumtypes.h /usr/include/polkit-1/polkitagent/polkitagentlistener.h /usr/include/polkit-1/polkitagent/polkitagentsession.h /usr/include/polkit-1/polkitagent/polkitagenttextlistener.h /usr/include/polkit-1/polkitagent/polkitagenttypes.h /usr/lib/libpolkit-agent-1.so /usr/lib/libpolkit-gobject-1.so /usr/lib/pkgconfig/polkit-agent-1.pc /usr/lib/pkgconfig/polkit-gobject-1.pc /usr/share/gettext/its/polkit.its /usr/share/gettext/its/polkit.loc /usr/share/gir-1.0/Polkit-1.0.gir /usr/share/gir-1.0/PolkitAgent-1.0.gir /usr/share/polkit-1/actions/org.freedesktop.policykit.examples.pkexec.policy
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 11:42:48 2024