Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libselinux-devel-static-3.5-slfo.1.1.9 RPM for aarch64

From OpenSuSE Leap 16.0 for aarch64

Name: libselinux-devel-static Distribution: SUSE Linux Framework One
Version: 3.5 Vendor: SUSE LLC <https://www.suse.com/>
Release: slfo.1.1.9 Build date: Fri Aug 23 16:42:15 2024
Group: Development/Libraries/C and C++ Build host: h04-armsrv1
Size: 1331256 Source RPM: libselinux-3.5-slfo.1.1.9.src.rpm
Packager: https://www.suse.com/
Url: https://github.com/SELinuxProject/selinux/wiki/Releases
Summary: Static archives for the SELinux runtime
libselinux provides an interface to get and set process and file
security contexts and to obtain security policy decisions.

This package contains the static development files, which are
necessary to develop your own software using libselinux.

Provides

Requires

License

SUSE-Public-Domain

Changelog

* Thu May 04 2023 fcrozat@suse.com
  - Add _multibuild to define additional spec files as additional
    flavors.
    Eliminates the need for source package links in OBS.
* Fri Mar 24 2023 jsegitz@suse.com
  - Add -ffat-lto-objects to CFLAGS to prevent rpmlint errors because
    of LTO
* Thu Mar 23 2023 mliska@suse.cz
  - Enable LTO as it works fine now.
* Fri Feb 24 2023 jsegitz@suse.com
  - Update to version 3.5:
    * check for truncations
    * avoid newline in avc message
    * bail out on path truncations
    * add getpidprevcon to gather the previous context before the last
      exec of a given process
    * Workaround for heap overhead of pcre
    * fix memory leaks on the audit2why module init
    * ignore invalid class name lookup
  - Drop restorecon_pin_file.patch, is upstream
  - Added additional developer key (Jason Zaman)
* Thu Jul 07 2022 jsegitz@suse.com
  - Fixed initrd check in selinux-ready (bnc#1186127)
* Tue May 31 2022 jsegitz@suse.com
  - Added restorecon_pin_file.patch. Fixes issus when running
    fixfiles/restorecon
* Mon May 09 2022 jsegitz@suse.com
  - Update to version 3.4:
    * Use PCRE2 by default
    * Make selinux_log() and is_context_customizable() thread-safe
    * Prevent leakeing file descriptors
    * Correctly hash specfiles larger than 4G
  - Refreshed skip_cycles.patch
* Tue Feb 15 2022 jsegitz@suse.com
  - Add Requires for exact libselinux1 version for selinux-tools
  - Simplyfied check for correct boot paramaters in selinux-ready
    (bsc#1195361)
* Thu Nov 11 2021 jsegitz@suse.com
  - Update to version 3.3:
    * Lots of smaller issues fixed found by fuzzing
* Sun Jul 18 2021 gmbr3@opensuse.org
  - Add missing libselinux-utils Provides to selinux-tools so that
    %selinux_requires works
* Mon Apr 26 2021 jsegitz@suse.com
  - Remove Recommends for selinux-autorelabel. It's better to have this
    in the policy package itself (bsc#1181837)
* Wed Mar 17 2021 dimstar@opensuse.org
  - Switch to pcre2:
    + Replace pcre-devel BuildRequires with pkgconfig(libpcre2-8)
    + Pass USE_PCRE2=y to make.
    + Replace pkgconfig(libpcre) Requires in -devel static with
      pkgconfig(libpcre2-8).
* Tue Mar 09 2021 jsegitz@suse.com
  - Update to version 3.2:
    * Use mmap()'ed kernel status page instead of netlink by default.
      See "KERNEL STATUS PAGE" section in avc_init(3) for more details.
    * New log callback levels for enforcing and policy load notices -
      SELINUX_POLICYLOAD, SELINUX_SETENFORCE
    * Changed userspace AVC setenforce and policy load messages to audit
      format.
* Sat Feb 06 2021 mcepl@suse.com
  - Add Recommends: selinux-autorelabel, which is very important
    for healthy use of the SELinux on the system (/.autorelabel
    mechanism) (bsc#1181837).
* Thu Oct 29 2020 lnussel@suse.de
  - install to /usr (boo#1029961)
* Tue Jul 14 2020 jsegitz@suse.com
  - Update to version 3.1:
    * selinux/flask.h, selinux/av_permissions.h and sepol/policydb/flask.h were
      removed. All userspace object managers should have been updated to use the
      dynamic class/perm mapping support.
      Use string_to_security_class(3) and string_to_av_perm(3) to map the class
      and permission names to their policy values, or selinux_set_mapping(3) to
      create a mapping from class and permission index values used by the
      application to the policy values.
    * Removed restrictions in libsepol and checkpolicy that required all declared
      initial SIDs to be assigned a context.
    * Support for new policy capability genfs_seclabel_symlinks
    * selinuxfs is mounted with noexec and nosuid
    * `security_compute_user()` was deprecated
* Thu Mar 26 2020 jsegitz@suse.de
  - Added skip_cycles.patch to skip directory cycles and not error
    out
* Tue Mar 03 2020 jsegitz@suse.de
  - Update to version 3.0
    * Ignore the stem when looking up all matches in file context
    * Save digest of all partial matches for directory
    * Use Python distutils to install SELinux python bindings
    * ensure that digest_len is not zero
    * fix string conversion of unknown perms
    * mark all exported function "extern"
    Dropped Use-Python-distutils-to-install-SELinux.patch, included
    upstream
* Wed Nov 13 2019 jsegitz@suse.de
  - Added Use-Python-distutils-to-install-SELinux.patch to use
    Python's distutils instead of building and installing python
    bindings manually
* Mon Jun 03 2019 jsegitz@suse.com
  - In selinux-ready
    * Removed check for selinux-policy package as we don't ship one
      (bsc#1136845)
    * Add check that restorecond is installed and enabled
* Fri May 24 2019 jsegitz@suse.com
  - Set License: to correct value (bsc#1135710)
* Thu Apr 25 2019 mliska@suse.cz
  - Disable LTO (boo#1133244).
* Wed Mar 20 2019 jsegitz@suse.com
  - Update to version 2.9
    * Add security_reject_unknown(3) man page
    * Change matchpathcon usage to match with matchpathcon manpage
    * Do not define gettid() if glibc >= 2.30 is used
    * Fix RESOURCE_LEAK defects reported by coverity scan
    * Fix line wrapping in selabel_file.5
    * Do not dereference symlink with statfs in selinux_restorecon
    * Fix overly strict validation of file_contexts.bin
    * Fix selinux_restorecon() on non-SELinux hosts
    * Fix the whatis line for the selinux_boolean_sub.3 manpage
    * Fix printf format string specifier for uint64_t
    * Fix handling of unknown classes/perms
    * Set an appropriate errno in booleans.c
  - Dropped python3.patch, is now upstream
* Fri Jan 04 2019 jsegitz@suse.com
  - Remove unneeded build requires for python3 (bsc#1120255)
* Wed Oct 17 2018 jsegitz@suse.com
  - Update to version 2.8 (bsc#1111732)
    For changes please see
    https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt
  - ran spec-cleaner on spec files
* Mon May 14 2018 mcepl@cepl.eu
  - Update to version 2.7.
    * %files needed to be heavily modified
    * Based expressly on python3, not just python
    For changes please see
    https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt
* Fri Nov 24 2017 jsegitz@suse.com
  - Update to version 2.6. Notable changes:
    * selinux_restorecon: fix realpath logic
    * sefcontext_compile: invert semantics of "-r" flag
    * sefcontext_compile: Add "-i" flag
    * Introduce configurable backends
    * Add function to find security.restorecon_last entries
    * Add openrc_contexts functions
    * Add support for pcre2
    * Handle NULL pcre study data
    * Add setfiles support to selinux_restorecon(3)
    * Evaluate inodes in selinux_restorecon(3)
    * Change the location of _selinux.so
    * Explain how to free policy type from selinux_getpolicytype()
    * Compare absolute pathname in matchpathcon -V
    * Add selinux_snapperd_contexts_path()
    * Modify audit2why analyze function to use loaded policy
    * Avoid mounting /proc outside of selinux_init_load_policy()
    * Fix location of selinuxfs mount point
    * Only mount /proc if necessary
    * procattr: return einval for <= 0 pid args
    * procattr: return error on invalid pid_t input
  - Dropped
    * libselinux-2.2-ruby.patch
    * libselinux-proc-mount-only-if-needed.patch
    * python-selinux-swig-3.10.patch
* Wed Jul 05 2017 schwab@suse.de
  - readv-proto.patch: include <sys/uio.h> for readv prototype
* Sun Jul 24 2016 crrodriguez@opensuse.org
  - -devel static subpackage requires libpcre-devel and libsepol-devel
* Sun Jul 24 2016 crrodriguez@opensuse.org
  - Avoid mounting /proc outside of selinux_init_load_policy().
    (Stephen Smalley) reverts upstream 5a8d8c4, 9df4988, fixes
    among other things systemd seccomp sandboxing otherwise all
    filters must allow mount(2)
    (libselinux-proc-mount-only-if-needed.patch)
* Sun Jul 17 2016 jengelh@inai.de
  - Update RPM groups, trim description and combine filelist entries.
* Thu Jul 14 2016 jsegitz@novell.com
  - Adjusted source link
* Tue Jul 05 2016 i@marguerite.su
  - add patch: python-selinux-swig-3.10.patch, fixed boo#985368
    * swig-3.10 in Factory use importlib instead of imp to find
      _selinux.so. imp searched the same directory as __init__.py
      is while importlib searchs only standard paths. so we have
      to move _selinux.so. fixed by upstream
  - update version 2.5
    * Add selinux_restorecon function
    * read_spec_entry: fail on non-ascii
    * Add man information about thread specific functions
    * Don't wrap rpm_execcon with DISABLE_RPM with SWIG
    * Correct line count for property and service context files
    * label_file: fix memory leaks and uninitialized jump
    * Replace selabel_digest hash function
    * Fix selabel_open(3) services if no digest requested
    * Add selabel_digest function
    * Flush the class/perm string mapping cache on policy reload
    * Fix restorecon when path has no context
    * Free memory when processing media and x specfiles
    * Fix mmap memory release for file labeling
    * Add policy context validation to sefcontext_compile
    * Do not treat an empty file_contexts(.local) as an error
    * Fail hard on invalid property_contexts entries
    * Fail hard on invalid file_contexts entries
    * Support context validation on file_contexts.bin
    * Add selabel_cmp interface and label_file backend
    * Support specifying file_contexts.bin file path
    * Support file_contexts.bin without file_contexts
    * Simplify procattr cache
    * Use /proc/thread-self when available
    * Add const to selinux_opt for label backends
    * Fix binary file labels for regexes with metachars
    * Fix file labels for regexes with metachars
    * Fix if file_contexts not '\n' terminated
    * Enhance file context support
    * Fix property processing and cleanup formatting
    * Add read_spec_entries function to replace sscanf
    * Support consistent mode size for bin files
    * Fix more bin file processing core dumps
    * add selinux_openssh_contexts_path()
    * setrans_client: minimize overhead when mcstransd is not present
    * Ensure selabel_lookup_best_match links NULL terminated
    * Fix core dumps with corrupt *.bin files
    * Add selabel partial and best match APIs
    * Use os.walk() instead of the deprecated os.path.walk()
    * Remove deprecated mudflap option
    * Mount procfs before checking /proc/filesystems
    * Fix -Wformat errors with gcc-5.0.0
    * label_file:  handle newlines in file names
    * Fix audit2why error handling if SELinux is disabled
    * pcre_study can return NULL without error
    * Only check SELinux enabled status once in selinux_check_access
  - changes in 2.4
    * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR
    * Fix bugs found by hardened gcc flags
    * Set the system to permissive if failing to disable SELinux because
      policy has already been loaded
    * Add db_exception and db_datatype support to label_db backend
    * Log an error on unknown classes and permissions
    * Add pcre version string to the compiled file_contexts format
    * Deprecate use of flask.h and av_permissions.h
    * Compiled file_context files and the original should have the same DAC
      permissions
* Thu Jul 30 2015 jsegitz@novell.com
  - fixed selinux-ready to work with initrd files created by dracut (bsc#940006)
* Mon Sep 08 2014 jsegitz@suse.com
  - updated selinux-ready script to handle initrd files compressed with xz
* Sun May 18 2014 crrodriguez@opensuse.org
  - Update to version 2.3
    * Get rid of security_context_t and fix const declarations.
    * Refactor rpm_execcon() into a new setexecfilecon() from Guillem Jover.
* Thu Oct 31 2013 p.drouand@gmail.com
  - Update to version 2.2
    * Fix avc_has_perm() returns -1 even when SELinux is in permissive mode.
    * Support overriding Makefile RANLIB
    * Update pkgconfig definition
    * Mount sysfs before trying to mount selinuxfs.
    * Fix man pages
    * Support overriding PATH  and LIBBASE in Makefile
    * Fix LDFLAGS usage
    * Avoid shadowing stat in load_mmap
    * Support building on older PCRE libraries
    * Fix handling of temporary file in sefcontext_compile
    * Fix procattr cache
    * Define python constants for getenforce result
    * Fix label substitution handling of /
    * Add selinux_current_policy_path from
    * Change get_context_list to only return good matches
    * Support udev-197 and higher
    * Add support for local substitutions
    * Change setfilecon to not return ENOSUP if context is already correct
    * Python wrapper leak fixes
    * Export SELINUX_TRANS_DIR definition in selinux.h
    * Add selinux_systemd_contexts_path
    * Add selinux_set_policy_root
    * Add man page for sefcontext_compile
  - Remove libselinux-rhat.patch; merged on upstream
  - Adapt libselinux-ruby.patch to upstream changes
  - Use fdupes to symlink duplicate manpages
* Thu Jun 27 2013 vcizek@suse.com
  - change the source url to the official 2.1.13 release tarball
* Wed May 22 2013 jengelh@inai.de
  - Reuse implicit dependencies injected by pkgconfig
* Thu Apr 04 2013 vcizek@suse.com
  - fixed source url in libselinux-bindings.spec
  - removed old tarball
* Wed Apr 03 2013 vcizek@suse.com
  - fix source url
  - document changes in libselinux-rhat.patch from previous submission:
    (most code of the removed code was integrated upstream)
    * Add matchpathcon -P /etc/selinux/mls support by allowing users
      to set alternate root
    * Add new constant SETRANS_DIR which points to the directory
      where mstransd can find the socket and libvirt can write its
      translations files
* Fri Mar 29 2013 vcizek@suse.com
  -update to 2.1.13
    * audit2why: make sure path is nul terminated
    * utils: new file context regex compiler
    * label_file: use precompiled filecontext when possible
    * do not leak mmapfd
    * sefcontontext_compile: Add error handling to help debug problems in libsemanage.
    * man: make selinux.8 mention service man pages
    * audit2why: Fix segfault if finish() called twice
    * audit2why: do not leak on multiple init() calls
    * mode_to_security_class: interface to translate a mode_t in to a security class
    * audit2why: Cleanup audit2why analysys function
    * man: Fix program synopsis and function prototypes in man pages
    * man: Fix man pages formatting
    * man: Fix typo in man page
    * man: Add references and man page links to _raw function variants
    * Use ENOTSUP instead of EOPNOTSUPP for getfilecon functions
    * man: context_new(3): fix the return value description
    * selinux_status_open: handle error from sysconf
    * selinux_status_open: do not leak statusfd on exec
    * Fix errors found by coverity
    * Change boooleans.subs to booleans.subs_dist.
    * optimize set*con functions
    * pkg-config do not specifc ruby version
    * unmap file contexts on selabel_close()
    * do not leak file contexts with mmap'd backend
    * sefcontext_compile: do not leak fd on error
    * matchmediacon: do not leak fd
    * src/label_android_property: do not leak fd on error
* Wed Jan 30 2013 vcizek@suse.com
  - update to 2.1.12
    - added the recent libselinux-rhat.patch
    * Add support for lxc_contexts_path
    * utils: add service to getdefaultcon
    * libsemanage: do not set soname needlessly
    * libsemanage: remove PYTHONLIBDIR and ruby equivalent
    * boolean name equivalency
    * getsebool: support boolean name substitution
    * Add man page for new selinux_boolean_sub function.
    * expose selinux_boolean_sub
    * matchpathcon: add -m option to force file type check
    * utils: avcstat: clear sa_mask set
    * seusers: Check for strchr failure
    * booleans: initialize pointer to silence coveriety
    * stop messages when SELinux disabled
    * Ensure that we only close the selinux netlink socket once.
    * improve the file_contexts.5 manual page
    * Fortify source now requires all code to be compiled with -O flag
    * asprintf return code must be checked
    * avc_netlink_recieve handle EINTR
    * audit2why: silence -Wmissing-prototypes warning
    * libsemanage: remove build warning when build swig c files
    * matchpathcon: bad handling of symlinks in /
    * seusers: remove unused lineno
    * seusers: getseuser: gracefully handle NULL service
    * New Android property labeling backend
    * label_android_property whitespace cleanups
    * additional makefile support for rubywrap
    * Remove jump over variable declaration
    * Fix old style function definitions
    * Fix const-correctness
    * Remove unused flush_class_cache method
    * Add prototype decl for destructor
    * Add more printf format annotations
    * Add printf format attribute annotation to die() method
    * Fix const-ness of parameters & make usage() methods static
    * Enable many more gcc warnings for libselinux/src/ builds
    * utils: Enable many more gcc warnings for libselinux/utils builds
    * Change annotation on include/selinux/avc.h to avoid upsetting SWIG
    * Ensure there is a prototype for 'matchpathcon_lib_destructor'
    * Update Makefiles to handle /usrmove
    * utils: Stop separating out matchpathcon as something special
    * pkg-config to figure out where ruby include files are located
    * build with either ruby 1.9 or ruby 1.8
    * assert if avc_init() not called
    * take security_deny_unknown into account
    * security_compute_create_name(3)
    * Do not link against python library, this is considered
    * bad practice in debian
    * Hide unnecessarily-exported library destructors
* Mon Jan 07 2013 jengelh@inai.de
  - Remove obsolete defines/sections
* Tue Dec 11 2012 vcizek@suse.com
  - update selinux-ready script
    * use -L when stat()ing /etc/selinux/config
    * make sure that SELINUX isn't disabled in /etc/selinux/config
    * look for either of /sys/fs/selinux and /selinux directory
    * use systemctl to check for restorecond
    * don't look for booleans file (deprecated)
* Tue Nov 27 2012 vcizek@suse.com
  - update selinux-ready script
* Wed Jul 25 2012 meissner@suse.com
  - updated to 2.1.9 again (see below)
* Wed Jun 13 2012 coolo@suse.com
  - go back even more - everything else requires the full SELinux stack
    (too late for 12.2)
* Mon Jun 11 2012 factory-maintainer@kulow.org
  - revert back to 2.0.98 for 12.2
* Fri Jun 01 2012 mls@suse.de
  - update to libselinux-2.1.9
    * better man pages
    * selinux_status interfaces
    * simple interface for access checks
    * multiple bug fixes
* Wed Oct 05 2011 uli@suse.com
  - cross-build fix: use %__cc macro
* Mon Jun 28 2010 jengelh@medozas.de
  - use %_smp_mflags
* Mon May 03 2010 prusnak@suse.cz
  - don't package /var/run/setrans in libselinux1 package
    - Feature#303793
    - the directory will be created in initscript of mcstrans package
* Sat Apr 24 2010 coolo@novell.com
  - buildrequire pkg-config to fix provides
* Fri Apr 09 2010 thomas@novell.com
  - selinux-ready: added function to check for restorecond in
      runlevel 3/5
* Thu Apr 08 2010 thomas@novell.com
  - selinux-ready: added functions for checking PAM config and
      policy boolean init_upstart
* Wed Apr 07 2010 thomas@novell.com
  - selinux-ready: fixed init ramfs checking
* Wed Apr 07 2010 thomas@novell.com
  - added new selinux-ready script
* Thu Feb 25 2010 prusnak@suse.cz
  - updated to 2.0.91
    * changes too numerous to list
* Sat Dec 12 2009 jengelh@medozas.de
  - add baselibs.conf as a source
* Fri Jul 24 2009 thomas@novell.com
  - updated selinux-ready script
* Wed Jul 22 2009 prusnak@suse.cz
  - change libsepol-devel to libsepol-devel-static in dependencies
    of python bindings
* Wed Jul 01 2009 prusnak@suse.cz
  - put libsepol-devel back to Requires of libselinux-devel
* Mon Jun 29 2009 prusnak@suse.cz
  - added selinux-ready tool to selinux-tools package
* Tue Jun 09 2009 crrodriguez@suse.de
  - remove static libraries
  - libselinux-devel does not require libsepol-devel
* Wed May 27 2009 prusnak@suse.cz
  - updated to 2.0.80
    * deny_unknown wrapper function from KaiGai Kohei
    * security_compute_av_flags API from KaiGai Kohei
    * Netlink socket management and callbacks from KaiGai Kohei
    * Netlink socket handoff patch from Adam Jackson
    * AVC caching of compute_create results by Eric Paris
    * fix incorrect conversion in discover_class code
* Fri Apr 17 2009 prusnak@suse.cz
  - fixed memory leak (memleak.patch)
* Wed Jan 14 2009 prusnak@suse.cz
  - updated to 2.0.77
    * add new function getseuser which will take username and service
      and return seuser and level; ipa will populate file in future
    * change selinuxdefcon to return just the context by default
    * fix segfault if seusers file does not work
    * strip trailing / for matchpathcon
    * fix restorecon python code
* Mon Dec 01 2008 prusnak@suse.cz
  - updated to 2.0.76
    * allow shell-style wildcarding in X names
    * add Restorecon/Install python functions
    * correct message types in AVC log messages
    * make matchpathcon -V pass mode
    * add man page for selinux_file_context_cmp
    * update flask headers from refpolicy trunk
* Wed Oct 22 2008 mrueckert@suse.de
  - fix debug_packages_requires define
* Tue Sep 23 2008 prusnak@suse.cz
  - require only version, not release [bnc#429053]
* Tue Sep 02 2008 prusnak@suse.cz
  - updated to 2.0.71
    * Add group support to seusers using %groupname syntax from Dan Walsh.
    * Mark setrans socket close-on-exec from Stephen Smalley.
    * Only apply nodups checking to base file contexts from Stephen Smalley.
    * Merge ruby bindings from Dan Walsh.
* Mon Sep 01 2008 aj@suse.de
  - Fix build of debuginfo.
* Fri Aug 22 2008 prusnak@suse.cz
  - added baselibs.conf file
  - split bindings into separate subpackage (libselinux-bindings)
  - split tools into separate subpackage (selinux-tools)
* Fri Aug 01 2008 ro@suse.de
  - fix requires for debuginfo package
* Tue Jul 15 2008 prusnak@suse.cz
  - initial version 2.0.67
    * based on Fedora package by Dan Walsh <dwalsh@redhat.com>

Files

/usr/lib64/libselinux.a


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Nov 9 00:25:40 2024