Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: selinux-tools | Distribution: openSUSE Tumbleweed |
Version: 3.7 | Vendor: openSUSE |
Release: 3.1 | Build date: Thu Nov 7 09:24:33 2024 |
Group: System/Base | Build host: reproducible |
Size: 268935 | Source RPM: libselinux-3.7-3.1.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: https://github.com/SELinuxProject/selinux/wiki/Releases | |
Summary: SELinux command-line utilities |
Security-enhanced Linux is a feature of the kernel and some utilities that implement mandatory access control policies, such as Type Enforcement, Role-based Access Control and Multi-Level Security. This subpackage contains utilities to inspect and administer the system's SELinux state.
SUSE-Public-Domain
* Thu Nov 07 2024 Cathy Hu <cathy.hu@suse.com> - Drop check_runlevel from selinux-ready script and remove restorecond from check_packages as we don't require it to be selinux-ready. * Thu Jul 11 2024 Cathy Hu <cathy.hu@suse.com> - Fix segfault caused by upstream changes in selabel_open(): libselinux-set-free-d-data-to-NULL.patch Can be removed once it is upstream. * Mon Jul 01 2024 Cathy Hu <cathy.hu@suse.com> - Update to version 3.7 https://github.com/SELinuxProject/selinux/releases/tag/3.7 * User-visible changes * libselinux/utils/selabel_digest: drop unsupported option -d * libselinux/utils: improve compute_av output * libselinux: fail selabel_open(3) on invalid option * Improved man pages * Improvements * libselinux, libsepol: Add CFLAGS and LDFLAGS to Makefile checks * libselinux: enable usage with pedantic UB sanitizers * libselinux: support huge passwd/group entries * Bugfixes: * libselinux/utils/selabel_digest: avoid buffer overflow * libselinux: avoid pointer dereference before check * libselinux/utils/selabel_digest: pass BASEONLY only for file backend * libselinux: free empty scandir(3) result * libselinux: free data on selabel open failure * libselinux: use reentrant strtok_r(3) * Tue Dec 19 2023 Cathy Hu <cathy.hu@suse.com> - Update to version 3.6 https://github.com/SELinuxProject/selinux/releases/tag/3.6 * libselinux: performance optimization for duplicate detection * Introduce getpolicyload - a helper binary to print the number of policy reloads on the running system * Add notself support for neverallow rules * Improve man pages * man pages: Remove the Russian translations * Add notself and other support to CIL * Add support for deny rules * Translations updated from https://translate.fedoraproject.org/projects/selinux/ * Bug fixes - Remove keys from keyring since they expired: - E853C1848B0185CF42864DF363A8AD4B982C4373 Petr Lautrbach <plautrba@redhat.com> - 63191CE94183098689CAB8DB7EF137EC935B0EAF Jason Zaman <jasonzaman@gmail.com> - Add key to keyring: - B8682847764DF60DF52D992CBC3905F235179CF1 Petr Lautrbach <lautrbach@redhat.com> * Sun Oct 01 2023 Georg Pfuetzenreuter <georg.pfuetzenreuter@suse.com> - Repair initrd libselinux check in selinux-ready * Tue Aug 08 2023 Dominique Leuenberger <dimstar@opensuse.org> - Do not BuildRequire swig and ruby-devel in the main build phase: those are only needed for the bindings. * Fri Aug 04 2023 Matej Cepl <mcepl@suse.com> - (bsc#1212618) Divide libselinux and libselinux-bindings again. libselinux itself is in Ring0 so it has to have absolutely minimal dependencies, so it is better to separate libselinux-bindings into a separate pacakge. * Tue Jul 04 2023 Johannes Segitz <jsegitz@suse.com> - Fix python packaging by setting the name to a fixed value * Fri Jun 23 2023 Matej Cepl <mcepl@suse.com> - Remove separate libselinux-bindings SPEC file (bsc#1212618). * Tue Jun 20 2023 Johannes Segitz <jsegitz@suse.com> - Add explicit BuildRequires for python3-pip and python3-wheel on 15.5, currently the macros don't do the right thing * Thu Jun 01 2023 Johannes Kastl <kastl@b1-systems.de> - allow building this with different python versions, to make this usable for the new sle15 macro (using python3.11) * Fri May 05 2023 Daniel Garcia <daniel.garcia@suse.com> - Add python-wheel build dependency to build correctly with latest python-pip version. * Thu May 04 2023 Frederic Crozat <fcrozat@suse.com> - Add _multibuild to define additional spec files as additional flavors. Eliminates the need for source package links in OBS. * Fri Mar 24 2023 Johannes Segitz <jsegitz@suse.com> - Add -ffat-lto-objects to CFLAGS to prevent rpmlint errors because of LTO * Thu Mar 23 2023 Martin Liška <mliska@suse.cz> - Enable LTO as it works fine now. * Fri Feb 24 2023 Johannes Segitz <jsegitz@suse.com> - Update to version 3.5: * check for truncations * avoid newline in avc message * bail out on path truncations * add getpidprevcon to gather the previous context before the last exec of a given process * Workaround for heap overhead of pcre * fix memory leaks on the audit2why module init * ignore invalid class name lookup - Drop restorecon_pin_file.patch, is upstream - Refreshed python3.8-compat.patch - Added additional developer key (Jason Zaman) * Thu Jul 07 2022 Johannes Segitz <jsegitz@suse.com> - Fixed initrd check in selinux-ready (bnc#1186127) * Tue May 31 2022 Johannes Segitz <jsegitz@suse.com> - Added restorecon_pin_file.patch. Fixes issus when running fixfiles/restorecon * Mon May 09 2022 Johannes Segitz <jsegitz@suse.com> - Update to version 3.4: * Use PCRE2 by default * Make selinux_log() and is_context_customizable() thread-safe * Prevent leakeing file descriptors * Correctly hash specfiles larger than 4G - Refreshed skip_cycles.patch * Tue Feb 15 2022 Johannes Segitz <jsegitz@suse.com> - Add Requires for exact libselinux1 version for selinux-tools - Simplyfied check for correct boot paramaters in selinux-ready (bsc#1195361) * Thu Nov 11 2021 Johannes Segitz <jsegitz@suse.com> - Update to version 3.3: * Lots of smaller issues fixed found by fuzzing * Sun Jul 18 2021 Callum Farmer <gmbr3@opensuse.org> - Add missing libselinux-utils Provides to selinux-tools so that %selinux_requires works * Mon Apr 26 2021 Johannes Segitz <jsegitz@suse.com> - Remove Recommends for selinux-autorelabel. It's better to have this in the policy package itself (bsc#1181837) * Wed Mar 17 2021 Dominique Leuenberger <dimstar@opensuse.org> - Switch to pcre2: + Replace pcre-devel BuildRequires with pkgconfig(libpcre2-8) + Pass USE_PCRE2=y to make. + Replace pkgconfig(libpcre) Requires in -devel static with pkgconfig(libpcre2-8). * Tue Mar 09 2021 Johannes Segitz <jsegitz@suse.com> - Update to version 3.2: * Use mmap()'ed kernel status page instead of netlink by default. See "KERNEL STATUS PAGE" section in avc_init(3) for more details. * New log callback levels for enforcing and policy load notices - SELINUX_POLICYLOAD, SELINUX_SETENFORCE * Changed userspace AVC setenforce and policy load messages to audit format. * Sat Feb 06 2021 Matej Cepl <mcepl@suse.com> - Add Recommends: selinux-autorelabel, which is very important for healthy use of the SELinux on the system (/.autorelabel mechanism) (bsc#1181837).
/usr/sbin/avcstat /usr/sbin/compute_av /usr/sbin/compute_create /usr/sbin/compute_member /usr/sbin/compute_relabel /usr/sbin/getenforce /usr/sbin/getfilecon /usr/sbin/getpidcon /usr/sbin/getpidprevcon /usr/sbin/getpolicyload /usr/sbin/getsebool /usr/sbin/getseuser /usr/sbin/matchpathcon /usr/sbin/policyvers /usr/sbin/sefcontext_compile /usr/sbin/selabel_digest /usr/sbin/selabel_get_digests_all_partial_matches /usr/sbin/selabel_lookup /usr/sbin/selabel_lookup_best_match /usr/sbin/selabel_partial_match /usr/sbin/selinux-ready /usr/sbin/selinux_check_access /usr/sbin/selinux_check_securetty_context /usr/sbin/selinuxconlist /usr/sbin/selinuxdefcon /usr/sbin/selinuxenabled /usr/sbin/selinuxexeccon /usr/sbin/setenforce /usr/sbin/setfilecon /usr/sbin/togglesebool /usr/sbin/validatetrans /usr/share/man/man5/customizable_types.5.gz /usr/share/man/man5/default_contexts.5.gz /usr/share/man/man5/default_type.5.gz /usr/share/man/man5/failsafe_context.5.gz /usr/share/man/man5/file_contexts.5.gz /usr/share/man/man5/file_contexts.homedirs.5.gz /usr/share/man/man5/file_contexts.local.5.gz /usr/share/man/man5/file_contexts.subs.5.gz /usr/share/man/man5/file_contexts.subs_dist.5.gz /usr/share/man/man5/media.5.gz /usr/share/man/man5/removable_context.5.gz /usr/share/man/man5/secolor.conf.5.gz /usr/share/man/man5/securetty_types.5.gz /usr/share/man/man5/selabel_db.5.gz /usr/share/man/man5/selabel_file.5.gz /usr/share/man/man5/selabel_media.5.gz /usr/share/man/man5/selabel_x.5.gz /usr/share/man/man5/sepgsql_contexts.5.gz /usr/share/man/man5/service_seusers.5.gz /usr/share/man/man5/seusers.5.gz /usr/share/man/man5/user_contexts.5.gz /usr/share/man/man5/virtual_domain_context.5.gz /usr/share/man/man5/virtual_image_context.5.gz /usr/share/man/man5/x_contexts.5.gz /usr/share/man/man8/avcstat.8.gz /usr/share/man/man8/booleans.8.gz /usr/share/man/man8/getenforce.8.gz /usr/share/man/man8/getsebool.8.gz /usr/share/man/man8/matchpathcon.8.gz /usr/share/man/man8/sefcontext_compile.8.gz /usr/share/man/man8/selinux.8.gz /usr/share/man/man8/selinuxenabled.8.gz /usr/share/man/man8/selinuxexeccon.8.gz /usr/share/man/man8/setenforce.8.gz /usr/share/man/man8/togglesebool.8.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Nov 16 01:18:36 2024