Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libsepol-devel | Distribution: SUSE Linux Enterprise 15 |
Version: 3.1 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: 150400.1.70 | Build date: Sat May 7 22:36:49 2022 |
Group: Development/Libraries/C and C++ | Build host: sheep54 |
Size: 122069 | Source RPM: libsepol-3.1-150400.1.70.src.rpm |
Packager: https://www.suse.com/ | |
Url: https://github.com/SELinuxProject/selinux/wiki/Releases | |
Summary: Development files for SELinux's binary policy manipulation library |
The libsepol-devel package contains the libraries and header files needed for developing applications that manipulate binary SELinux policies.
LGPL-2.1-or-later
* Tue Jul 14 2020 jsegitz@suse.com - Update to version 3.1 * Add support for new polcap genfs_seclabel_symlinks * Initialize the multiple_decls field of the cil db * Return error when identifier declared as both type and attribute * Write CIL default MLS rules on separate lines * Sort portcon rules consistently * Remove leftovers of cil_mem_error_handler * Drop remove_cil_mem_error_handler.patch, is included * Mon Apr 27 2020 mliska@suse.cz - Enable -fcommon in order to fix boo#1160874. * Tue Mar 03 2020 jsegitz@suse.de - Update to version 3.0 * cil: Allow validatetrans rules to be resolved * cil: Report disabling an optional block only at high verbose levels * cil: do not dereference perm_value_to_cil when it has not been allocated * cil: fix mlsconstrain segfault * Further improve binary policy optimization * Make an unknown permission an error in CIL * Remove cil_mem_error_handler() function pointer * Use LIBSEPOL_3.0 and fix sepol_policydb_optimize symbol mapping * Add a function to optimize kernel policy * Add ebitmap_for_each_set_bit macro Dropped fnocommon.patch as it's included upstream * Thu Jan 30 2020 jsegitz@suse.de - Add fnocommon.patch to prevent build failures on gcc10 and remove_cil_mem_error_handler.patch to prevent build failures due to leftovers from the removal of cil_mem_error_handler (bsc#1160874) * Thu Jun 20 2019 mliska@suse.cz - Disable LTO due to symbol versioning (boo#1138813). * Wed Mar 20 2019 jsegitz@suse.com - Update to version 2.9 * Add two new Xen initial SIDs * Check that initial sid indexes are within the valid range * Create policydb_sort_ocontexts() * Eliminate initial sid string definitions in module_to_cil.c * Rename kernel_to_common.c stack functions * add missing ibendport port validity check * destroy the copied va_list * do not call malloc with 0 byte * do not leak memory if list_prepend fails * do not use uninitialized value for low_value * fix endianity in ibpkey range checks * ibpkeys.c: fix printf format string specifiers for subnet_prefix * mark permissive types when loading a binary policy * Thu Nov 08 2018 jengelh@inai.de - Use more %make_install. * Thu Nov 08 2018 jsegitz@suse.com - Adjusted source urls (bsc#1115052) * Wed Oct 17 2018 jsegitz@suse.com - Update to version 2.8 (bsc#1111732) For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt * Wed May 16 2018 mcepl@suse.com - Rebase to 2.7 For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt * Fri Nov 24 2017 jsegitz@suse.com - Update to version 2.6. Notable changes: * Add support for converting extended permissions to CIL * Create user and role caches when building binary policy * Check for too many permissions in classes and commons in CIL * Fix xperm mapping between avrule and avtab * Produce more meaningful error messages for conflicting type rules in CIL * Change which attributes CIL keeps in the binary policy * Warn instead of fail if permission is not resolved * Ignore object_r when adding userrole mappings to policydb * Correctly detect unknown classes in sepol_string_to_security_class * Fix neverallowxperm checking on attributes * Only apply bounds checking to source types in rules * Fix CIL and not add an attribute as a type in the attr_type_map * Fix extended permissions neverallow checking * Fix CIL neverallow and bounds checking * Add support for portcon dccp protocol * Fri Jul 15 2016 jengelh@inai.de - Update RPM groups, trim description and combine filelist entries. * Thu Jul 14 2016 mpluskal@suse.com - Cleanup spec file with spec-cleaner - Make spec file a bit more easy - Ship new supbackage (-tools) * Thu Jul 14 2016 jsegitz@novell.com - Without bug number no submit to SLE 12 SP2 is possible, so to make sle-changelog-checker happy: bsc#988977 * Thu Jul 14 2016 jsegitz@novell.com - Adjusted source link * Tue Jul 05 2016 i@marguerite.su - update version 2.5 * Fix unused variable annotations * Fix uninitialized variable in CIL * Validate extended avrules and permissionxs in CIL * Add support in CIL for neverallowx * Fully expand neverallowxperm rules * Add support for unordered classes to CIL * Add neverallow support for ioctl extended permissions * Improve CIL block and macro call recursion detection * Fix CIL uninitialized false positive in cil_binary * Provide error in CIL if classperms are empty * Add userattribute{set} functionality to CIL * fix CIL blockinherit copying segfault and add macro restrictions * fix CIL NULL pointer dereference when copying classpermission/set * Add CIL support for ioctl whitelists * Fix memory leak when destroying avtab * Replace sscanf in module_to_cil * Improve CIL resolution error messages * Fix policydb_read for policy versions < 24 * Added CIL bounds checking and refactored CIL Neverallow checking * Refactored libsepol Neverallow and bounds (hierarchy) checking * Treat types like an attribute in the attr_type_map * Add new ebitmap function named ebitmap_match_any() * switch operations to extended perms * Write auditadm_r and secadm_r roles to base module when writing CIL * Fix module to CIL to only associate declared roleattributes with in-scope types * Don't allow categories/sensitivities inside blocks in CIL * Replace fmemopen() with internal function in libsepol * Verify users prior to evaluating users in cil * Binary modules do not support ioctl rules * Add support for ioctl command whitelisting * Don't use symbol versioning for static object files * Add sepol_module_policydb_to_cil(), sepol_module_package_to_cil(), and sepol_ppfile_to_module_package() * Move secilc out of libsepol * fix building Xen policy with devicetreecon, and add devicetreecon CIL documentation * bool_copy_callback set state on creation * Add device tree ocontext nodes to Xen policy * Widen Xen IOMEM context entries * Fix error path in mls_semantic_level_expand() * Update to latest CIL, includes new name resolution and fixes ordering issues with blockinherit statements, and bug fixes - changes in 2.4 * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR * Fix bugs found by hardened gcc flags * Build CIL into libsepol. libsepol can be built without CIL by setting the DISABLE_CIL flag to 'y' * Add an API function to set target_platform * Report all neverallow violations * Improve check_assertions performance * Allow libsepol C++ static library on device
/usr/include/sepol /usr/include/sepol/boolean_record.h /usr/include/sepol/booleans.h /usr/include/sepol/cil /usr/include/sepol/cil/cil.h /usr/include/sepol/context.h /usr/include/sepol/context_record.h /usr/include/sepol/debug.h /usr/include/sepol/errcodes.h /usr/include/sepol/handle.h /usr/include/sepol/ibendport_record.h /usr/include/sepol/ibendports.h /usr/include/sepol/ibpkey_record.h /usr/include/sepol/ibpkeys.h /usr/include/sepol/iface_record.h /usr/include/sepol/interfaces.h /usr/include/sepol/kernel_to_cil.h /usr/include/sepol/kernel_to_conf.h /usr/include/sepol/module.h /usr/include/sepol/module_to_cil.h /usr/include/sepol/node_record.h /usr/include/sepol/nodes.h /usr/include/sepol/policydb /usr/include/sepol/policydb.h /usr/include/sepol/policydb/avrule_block.h /usr/include/sepol/policydb/avtab.h /usr/include/sepol/policydb/conditional.h /usr/include/sepol/policydb/constraint.h /usr/include/sepol/policydb/context.h /usr/include/sepol/policydb/ebitmap.h /usr/include/sepol/policydb/expand.h /usr/include/sepol/policydb/flask_types.h /usr/include/sepol/policydb/hashtab.h /usr/include/sepol/policydb/hierarchy.h /usr/include/sepol/policydb/link.h /usr/include/sepol/policydb/mls_types.h /usr/include/sepol/policydb/module.h /usr/include/sepol/policydb/polcaps.h /usr/include/sepol/policydb/policydb.h /usr/include/sepol/policydb/services.h /usr/include/sepol/policydb/sidtab.h /usr/include/sepol/policydb/symtab.h /usr/include/sepol/policydb/util.h /usr/include/sepol/port_record.h /usr/include/sepol/ports.h /usr/include/sepol/roles.h /usr/include/sepol/sepol.h /usr/include/sepol/user_record.h /usr/include/sepol/users.h /usr/lib64/libsepol.so /usr/lib64/pkgconfig/libsepol.pc /usr/share/man/man3/sepol_check_context.3.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 18:11:13 2024