Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: selinux-tools | Distribution: openSUSE:Factory:zSystems |
Version: 3.5 | Vendor: openSUSE |
Release: 6.1 | Build date: Sun Dec 3 20:49:23 2023 |
Group: System/Base | Build host: s390zl26 |
Size: 367400 | Source RPM: libselinux-3.5-6.1.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://github.com/SELinuxProject/selinux/wiki/Releases | |
Summary: SELinux command-line utilities |
Security-enhanced Linux is a feature of the kernel and some utilities that implement mandatory access control policies, such as Type Enforcement, Role-based Access Control and Multi-Level Security. This subpackage contains utilities to inspect and administer the system's SELinux state.
SUSE-Public-Domain
* Sun Oct 01 2023 Georg Pfuetzenreuter <georg.pfuetzenreuter@suse.com> - Repair initrd libselinux check in selinux-ready * Tue Aug 08 2023 Dominique Leuenberger <dimstar@opensuse.org> - Do not BuildRequire swig and ruby-devel in the main build phase: those are only needed for the bindings. * Fri Aug 04 2023 Matej Cepl <mcepl@suse.com> - (bsc#1212618) Divide libselinux and libselinux-bindings again. libselinux itself is in Ring0 so it has to have absolutely minimal dependencies, so it is better to separate libselinux-bindings into a separate pacakge. * Tue Jul 04 2023 Johannes Segitz <jsegitz@suse.com> - Fix python packaging by setting the name to a fixed value * Fri Jun 23 2023 Matej Cepl <mcepl@suse.com> - Remove separate libselinux-bindings SPEC file (bsc#1212618). * Tue Jun 20 2023 Johannes Segitz <jsegitz@suse.com> - Add explicit BuildRequires for python3-pip and python3-wheel on 15.5, currently the macros don't do the right thing * Thu Jun 01 2023 Johannes Kastl <kastl@b1-systems.de> - allow building this with different python versions, to make this usable for the new sle15 macro (using python3.11) * Fri May 05 2023 Daniel Garcia <daniel.garcia@suse.com> - Add python-wheel build dependency to build correctly with latest python-pip version. * Thu May 04 2023 Frederic Crozat <fcrozat@suse.com> - Add _multibuild to define additional spec files as additional flavors. Eliminates the need for source package links in OBS. * Fri Mar 24 2023 Johannes Segitz <jsegitz@suse.com> - Add -ffat-lto-objects to CFLAGS to prevent rpmlint errors because of LTO * Thu Mar 23 2023 Martin Liška <mliska@suse.cz> - Enable LTO as it works fine now. * Fri Feb 24 2023 Johannes Segitz <jsegitz@suse.com> - Update to version 3.5: * check for truncations * avoid newline in avc message * bail out on path truncations * add getpidprevcon to gather the previous context before the last exec of a given process * Workaround for heap overhead of pcre * fix memory leaks on the audit2why module init * ignore invalid class name lookup - Drop restorecon_pin_file.patch, is upstream - Refreshed python3.8-compat.patch - Added additional developer key (Jason Zaman) * Thu Jul 07 2022 Johannes Segitz <jsegitz@suse.com> - Fixed initrd check in selinux-ready (bnc#1186127) * Tue May 31 2022 Johannes Segitz <jsegitz@suse.com> - Added restorecon_pin_file.patch. Fixes issus when running fixfiles/restorecon * Mon May 09 2022 Johannes Segitz <jsegitz@suse.com> - Update to version 3.4: * Use PCRE2 by default * Make selinux_log() and is_context_customizable() thread-safe * Prevent leakeing file descriptors * Correctly hash specfiles larger than 4G - Refreshed skip_cycles.patch * Tue Feb 15 2022 Johannes Segitz <jsegitz@suse.com> - Add Requires for exact libselinux1 version for selinux-tools - Simplyfied check for correct boot paramaters in selinux-ready (bsc#1195361) * Thu Nov 11 2021 Johannes Segitz <jsegitz@suse.com> - Update to version 3.3: * Lots of smaller issues fixed found by fuzzing * Sun Jul 18 2021 Callum Farmer <gmbr3@opensuse.org> - Add missing libselinux-utils Provides to selinux-tools so that %selinux_requires works * Mon Apr 26 2021 Johannes Segitz <jsegitz@suse.com> - Remove Recommends for selinux-autorelabel. It's better to have this in the policy package itself (bsc#1181837) * Wed Mar 17 2021 Dominique Leuenberger <dimstar@opensuse.org> - Switch to pcre2: + Replace pcre-devel BuildRequires with pkgconfig(libpcre2-8) + Pass USE_PCRE2=y to make. + Replace pkgconfig(libpcre) Requires in -devel static with pkgconfig(libpcre2-8). * Tue Mar 09 2021 Johannes Segitz <jsegitz@suse.com> - Update to version 3.2: * Use mmap()'ed kernel status page instead of netlink by default. See "KERNEL STATUS PAGE" section in avc_init(3) for more details. * New log callback levels for enforcing and policy load notices - SELINUX_POLICYLOAD, SELINUX_SETENFORCE * Changed userspace AVC setenforce and policy load messages to audit format. * Sat Feb 06 2021 Matej Cepl <mcepl@suse.com> - Add Recommends: selinux-autorelabel, which is very important for healthy use of the SELinux on the system (/.autorelabel mechanism) (bsc#1181837). * Thu Oct 29 2020 Ludwig Nussel <lnussel@suse.de> - install to /usr (boo#1029961) * Tue Jul 14 2020 Johannes Segitz <jsegitz@suse.com> - Update to version 3.1: * selinux/flask.h, selinux/av_permissions.h and sepol/policydb/flask.h were removed. All userspace object managers should have been updated to use the dynamic class/perm mapping support. Use string_to_security_class(3) and string_to_av_perm(3) to map the class and permission names to their policy values, or selinux_set_mapping(3) to create a mapping from class and permission index values used by the application to the policy values. * Removed restrictions in libsepol and checkpolicy that required all declared initial SIDs to be assigned a context. * Support for new policy capability genfs_seclabel_symlinks * selinuxfs is mounted with noexec and nosuid * `security_compute_user()` was deprecated * Refreshed python3.8-compat.patch * Thu Mar 26 2020 Johannes Segitz <jsegitz@suse.de> - Added skip_cycles.patch to skip directory cycles and not error out * Tue Mar 03 2020 Johannes Segitz <jsegitz@suse.de> - Update to version 3.0 * Ignore the stem when looking up all matches in file context * Save digest of all partial matches for directory * Use Python distutils to install SELinux python bindings * ensure that digest_len is not zero * fix string conversion of unknown perms * mark all exported function "extern" Dropped Use-Python-distutils-to-install-SELinux.patch, included upstream
/usr/sbin/avcstat /usr/sbin/compute_av /usr/sbin/compute_create /usr/sbin/compute_member /usr/sbin/compute_relabel /usr/sbin/getenforce /usr/sbin/getfilecon /usr/sbin/getpidcon /usr/sbin/getpidprevcon /usr/sbin/getsebool /usr/sbin/getseuser /usr/sbin/matchpathcon /usr/sbin/policyvers /usr/sbin/sefcontext_compile /usr/sbin/selabel_digest /usr/sbin/selabel_get_digests_all_partial_matches /usr/sbin/selabel_lookup /usr/sbin/selabel_lookup_best_match /usr/sbin/selabel_partial_match /usr/sbin/selinux-ready /usr/sbin/selinux_check_access /usr/sbin/selinux_check_securetty_context /usr/sbin/selinuxconlist /usr/sbin/selinuxdefcon /usr/sbin/selinuxenabled /usr/sbin/selinuxexeccon /usr/sbin/setenforce /usr/sbin/setfilecon /usr/sbin/togglesebool /usr/sbin/validatetrans /usr/share/man/man5/customizable_types.5.gz /usr/share/man/man5/default_contexts.5.gz /usr/share/man/man5/default_type.5.gz /usr/share/man/man5/failsafe_context.5.gz /usr/share/man/man5/file_contexts.5.gz /usr/share/man/man5/file_contexts.homedirs.5.gz /usr/share/man/man5/file_contexts.local.5.gz /usr/share/man/man5/file_contexts.subs.5.gz /usr/share/man/man5/file_contexts.subs_dist.5.gz /usr/share/man/man5/media.5.gz /usr/share/man/man5/removable_context.5.gz /usr/share/man/man5/secolor.conf.5.gz /usr/share/man/man5/securetty_types.5.gz /usr/share/man/man5/selabel_db.5.gz /usr/share/man/man5/selabel_file.5.gz /usr/share/man/man5/selabel_media.5.gz /usr/share/man/man5/selabel_x.5.gz /usr/share/man/man5/sepgsql_contexts.5.gz /usr/share/man/man5/service_seusers.5.gz /usr/share/man/man5/seusers.5.gz /usr/share/man/man5/user_contexts.5.gz /usr/share/man/man5/virtual_domain_context.5.gz /usr/share/man/man5/virtual_image_context.5.gz /usr/share/man/man5/x_contexts.5.gz /usr/share/man/man8/avcstat.8.gz /usr/share/man/man8/booleans.8.gz /usr/share/man/man8/getenforce.8.gz /usr/share/man/man8/getsebool.8.gz /usr/share/man/man8/matchpathcon.8.gz /usr/share/man/man8/sefcontext_compile.8.gz /usr/share/man/man8/selinux.8.gz /usr/share/man/man8/selinuxenabled.8.gz /usr/share/man/man8/selinuxexeccon.8.gz /usr/share/man/man8/setenforce.8.gz /usr/share/man/man8/togglesebool.8.gz /usr/share/man/ru/man5/customizable_types.5.gz /usr/share/man/ru/man5/default_contexts.5.gz /usr/share/man/ru/man5/default_type.5.gz /usr/share/man/ru/man5/failsafe_context.5.gz /usr/share/man/ru/man5/file_contexts.5.gz /usr/share/man/ru/man5/file_contexts.homedirs.5.gz /usr/share/man/ru/man5/file_contexts.local.5.gz /usr/share/man/ru/man5/file_contexts.subs.5.gz /usr/share/man/ru/man5/file_contexts.subs_dist.5.gz /usr/share/man/ru/man5/media.5.gz /usr/share/man/ru/man5/removable_context.5.gz /usr/share/man/ru/man5/secolor.conf.5.gz /usr/share/man/ru/man5/securetty_types.5.gz /usr/share/man/ru/man5/selabel_db.5.gz /usr/share/man/ru/man5/selabel_file.5.gz /usr/share/man/ru/man5/selabel_media.5.gz /usr/share/man/ru/man5/selabel_x.5.gz /usr/share/man/ru/man5/sepgsql_contexts.5.gz /usr/share/man/ru/man5/service_seusers.5.gz /usr/share/man/ru/man5/seusers.5.gz /usr/share/man/ru/man5/user_contexts.5.gz /usr/share/man/ru/man5/virtual_domain_context.5.gz /usr/share/man/ru/man5/virtual_image_context.5.gz /usr/share/man/ru/man5/x_contexts.5.gz /usr/share/man/ru/man8/avcstat.8.gz /usr/share/man/ru/man8/booleans.8.gz /usr/share/man/ru/man8/getenforce.8.gz /usr/share/man/ru/man8/getsebool.8.gz /usr/share/man/ru/man8/matchpathcon.8.gz /usr/share/man/ru/man8/sefcontext_compile.8.gz /usr/share/man/ru/man8/selinux.8.gz /usr/share/man/ru/man8/selinuxenabled.8.gz /usr/share/man/ru/man8/selinuxexeccon.8.gz /usr/share/man/ru/man8/setenforce.8.gz /usr/share/man/ru/man8/togglesebool.8.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Mar 9 12:50:11 2024