Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libsepol-devel | Distribution: SUSE Linux Framework One |
Version: 3.5 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: slfo.1.1.8 | Build date: Fri Aug 23 16:41:14 2024 |
Group: Development/Libraries/C and C++ | Build host: ibs-power9-17 |
Size: 122685 | Source RPM: libsepol-3.5-slfo.1.1.8.src.rpm |
Packager: https://www.suse.com/ | |
Url: https://github.com/SELinuxProject/selinux/wiki/Releases | |
Summary: Development files for SELinux's binary policy manipulation library |
The libsepol-devel package contains the libraries and header files needed for developing applications that manipulate binary SELinux policies.
LGPL-2.1-or-later
* Fri Feb 24 2023 jsegitz@suse.com - Update to version 3.5 * Stricter policy validation * do not write empty class definitions to allow simpler round-trip tests * reject attributes in type av rules for kernel policies - Added additional developer key (Jason Zaman) * Mon May 09 2022 jsegitz@suse.com - Update to version 3.4 * Add 'ioctl_skip_cloexec' policy capability * Add sepol_av_perm_to_string * Add policy utilities * Support IPv4/IPv6 address embedding * Hardened/added many validations * Add support for file types in writing out policy.conf * Allow optional file type in genfscon rules * Thu Nov 11 2021 jsegitz@suse.com - Update to version 3.3 * Dropped CVE-2021-36085.patch, CVE-2021-36086.patch, CVE-2021-36087.patch are all included * Lot of smaller fixes identified by fuzzing * Wed Jul 21 2021 jsegitz@suse.com - Fix heap-based buffer over-read in ebitmap_match_any (CVE-2021-36087, 1187928. Added CVE-2021-36087.patch * Mon Jul 05 2021 jsegitz@suse.com - Fix use-after-free in __cil_verify_classperms (CVE-2021-36085, 1187965). Added CVE-2021-36085.patch - Fix use-after-free in cil_reset_classpermission (CVE-2021-36086, 1187964). Added CVE-2021-36086.patch * Tue Mar 09 2021 jsegitz@suse.com - Update to version 3.2 * more space-efficient form of storing filename transitions in the binary policy and reduced the size of the binary policy * dropped old and deprecated symbols and functions. Version was bumped to libsepol.so.2 * Thu Oct 29 2020 lnussel@suse.de - install to /usr (boo#1029961) * Tue Jul 14 2020 jsegitz@suse.com - Update to version 3.1 * Add support for new polcap genfs_seclabel_symlinks * Initialize the multiple_decls field of the cil db * Return error when identifier declared as both type and attribute * Write CIL default MLS rules on separate lines * Sort portcon rules consistently * Remove leftovers of cil_mem_error_handler * Drop remove_cil_mem_error_handler.patch, is included * Mon Apr 27 2020 mliska@suse.cz - Enable -fcommon in order to fix boo#1160874. * Tue Mar 03 2020 jsegitz@suse.de - Update to version 3.0 * cil: Allow validatetrans rules to be resolved * cil: Report disabling an optional block only at high verbose levels * cil: do not dereference perm_value_to_cil when it has not been allocated * cil: fix mlsconstrain segfault * Further improve binary policy optimization * Make an unknown permission an error in CIL * Remove cil_mem_error_handler() function pointer * Use LIBSEPOL_3.0 and fix sepol_policydb_optimize symbol mapping * Add a function to optimize kernel policy * Add ebitmap_for_each_set_bit macro Dropped fnocommon.patch as it's included upstream * Thu Jan 30 2020 jsegitz@suse.de - Add fnocommon.patch to prevent build failures on gcc10 and remove_cil_mem_error_handler.patch to prevent build failures due to leftovers from the removal of cil_mem_error_handler (bsc#1160874) * Thu Jun 20 2019 mliska@suse.cz - Disable LTO due to symbol versioning (boo#1138813). * Wed Mar 20 2019 jsegitz@suse.com - Update to version 2.9 * Add two new Xen initial SIDs * Check that initial sid indexes are within the valid range * Create policydb_sort_ocontexts() * Eliminate initial sid string definitions in module_to_cil.c * Rename kernel_to_common.c stack functions * add missing ibendport port validity check * destroy the copied va_list * do not call malloc with 0 byte * do not leak memory if list_prepend fails * do not use uninitialized value for low_value * fix endianity in ibpkey range checks * ibpkeys.c: fix printf format string specifiers for subnet_prefix * mark permissive types when loading a binary policy * Thu Nov 08 2018 jengelh@inai.de - Use more %make_install. * Thu Nov 08 2018 jsegitz@suse.com - Adjusted source urls (bsc#1115052) * Wed Oct 17 2018 jsegitz@suse.com - Update to version 2.8 (bsc#1111732) For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt * Wed May 16 2018 mcepl@suse.com - Rebase to 2.7 For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt * Fri Nov 24 2017 jsegitz@suse.com - Update to version 2.6. Notable changes: * Add support for converting extended permissions to CIL * Create user and role caches when building binary policy * Check for too many permissions in classes and commons in CIL * Fix xperm mapping between avrule and avtab * Produce more meaningful error messages for conflicting type rules in CIL * Change which attributes CIL keeps in the binary policy * Warn instead of fail if permission is not resolved * Ignore object_r when adding userrole mappings to policydb * Correctly detect unknown classes in sepol_string_to_security_class * Fix neverallowxperm checking on attributes * Only apply bounds checking to source types in rules * Fix CIL and not add an attribute as a type in the attr_type_map * Fix extended permissions neverallow checking * Fix CIL neverallow and bounds checking * Add support for portcon dccp protocol * Fri Jul 15 2016 jengelh@inai.de - Update RPM groups, trim description and combine filelist entries. * Thu Jul 14 2016 mpluskal@suse.com - Cleanup spec file with spec-cleaner - Make spec file a bit more easy - Ship new supbackage (-tools) * Thu Jul 14 2016 jsegitz@novell.com - Without bug number no submit to SLE 12 SP2 is possible, so to make sle-changelog-checker happy: bsc#988977 * Thu Jul 14 2016 jsegitz@novell.com - Adjusted source link * Tue Jul 05 2016 i@marguerite.su - update version 2.5 * Fix unused variable annotations * Fix uninitialized variable in CIL * Validate extended avrules and permissionxs in CIL * Add support in CIL for neverallowx * Fully expand neverallowxperm rules * Add support for unordered classes to CIL * Add neverallow support for ioctl extended permissions * Improve CIL block and macro call recursion detection * Fix CIL uninitialized false positive in cil_binary * Provide error in CIL if classperms are empty * Add userattribute{set} functionality to CIL * fix CIL blockinherit copying segfault and add macro restrictions * fix CIL NULL pointer dereference when copying classpermission/set * Add CIL support for ioctl whitelists * Fix memory leak when destroying avtab * Replace sscanf in module_to_cil * Improve CIL resolution error messages * Fix policydb_read for policy versions < 24 * Added CIL bounds checking and refactored CIL Neverallow checking * Refactored libsepol Neverallow and bounds (hierarchy) checking * Treat types like an attribute in the attr_type_map * Add new ebitmap function named ebitmap_match_any() * switch operations to extended perms * Write auditadm_r and secadm_r roles to base module when writing CIL * Fix module to CIL to only associate declared roleattributes with in-scope types * Don't allow categories/sensitivities inside blocks in CIL * Replace fmemopen() with internal function in libsepol * Verify users prior to evaluating users in cil * Binary modules do not support ioctl rules * Add support for ioctl command whitelisting * Don't use symbol versioning for static object files * Add sepol_module_policydb_to_cil(), sepol_module_package_to_cil(), and sepol_ppfile_to_module_package() * Move secilc out of libsepol * fix building Xen policy with devicetreecon, and add devicetreecon CIL documentation * bool_copy_callback set state on creation * Add device tree ocontext nodes to Xen policy * Widen Xen IOMEM context entries * Fix error path in mls_semantic_level_expand() * Update to latest CIL, includes new name resolution and fixes ordering issues with blockinherit statements, and bug fixes - changes in 2.4 * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR * Fix bugs found by hardened gcc flags * Build CIL into libsepol. libsepol can be built without CIL by setting the DISABLE_CIL flag to 'y' * Add an API function to set target_platform * Report all neverallow violations * Improve check_assertions performance * Allow libsepol C++ static library on device * Fri May 16 2014 vcizek@suse.com - update to 2.3 * Improve error message for name-based transition conflicts. * Revert libsepol: filename_trans: use some better sorting to compare and merge. * Report source file and line information for neverallow failures. * Fix valgrind errors in constraint_expr_eval_reason from Richard Haines. * Add sepol_validate_transition_reason_buffer function from Richard Haines. - dropped libsepol-2.1.4-role_fix_callback.patch (upstream) * Thu Oct 31 2013 p.drouand@gmail.com - Update to version 2.2 * Allow constraint denial cause to be determined - Add kernel policy version 29. - Add modular policy version 17. - Add sepol_compute_av_reason_buffer(), sepol_string_to_security _class(), sepol_string_to_av_perm(). * Support overriding Makefile RANLIB * Fix man pages - Remove libsepol-rhat.patch; merged on upstream * Thu Jun 27 2013 vcizek@suse.com - change the source url to the official 2.1.9 release tarball * Sat Jun 22 2013 crrodriguez@opensuse.org - Build with LFS_CFLAGS for 32 bit archs * Fri Apr 05 2013 vcizek@suse.com - remove a debugging artifact in spec * Thu Apr 04 2013 vcizek@suse.com - fixed source url * Wed Feb 13 2013 vcizek@suse.com - update to 2.1.9 * filename_trans: use some better sorting to compare and merge * coverity fixes * implement default type policy syntax * Fix memory leak issues found by Klocwork - added libsepol-rhat.patch * Mon Jan 07 2013 jengelh@inai.de - Remove obsolete defines/sections * Mon Dec 10 2012 p.drouand@gmail.com - Update to 2.1.8 version: * fix neverallow checking on attributes * Move context_copy() after switch block in ocontext_copy_*(). * check for missing initial SID labeling statement. * Add always_check_network policy capability * role_fix_callback skips out-of-scope roles during expansion. * Thu Oct 25 2012 vcizek@suse.com - skip roles which are out of scope when expanding attributes - needed for building selinux-policy * Wed Jul 25 2012 meissner@suse.com - updated to 2.1.4 - lots of updates * Wed Oct 05 2011 uli@suse.com - cross-build fix: use %__cc macro * Mon Jun 28 2010 jengelh@medozas.de - use %_smp_mflags * Sat Apr 24 2010 coolo@novell.com - buildrequire pkg-config to fix provides * Thu Feb 25 2010 prusnak@suse.cz - updated to 2.0.41 * changes too numerous to list * Sun Dec 13 2009 jengelh@medozas.de - add baselibs.conf as a source * Wed Nov 11 2009 crrodriguez@opensuse.org - libsepol-devel Requires glibc-devel * Fri Jun 19 2009 prusnak@suse.cz - put static library in libsepol-devel-static * Wed May 27 2009 prusnak@suse.cz - updated to 2.0.36 * fix alias field in module format, caused by boundary format change from Caleb Case * fix boolean state smashing from Joshua Brindle * Mon Dec 01 2008 prusnak@suse.cz - updated to 2.0.34 * add bounds support * fix invalid aliases bug * Wed Oct 22 2008 mrueckert@suse.de - fix debug_packages_requires define * Tue Sep 23 2008 prusnak@suse.cz - require only version, not release [bnc#429053] * Fri Aug 22 2008 prusnak@suse.cz - added baselibs.conf file * Fri Aug 01 2008 ro@suse.de - fix requires for debuginfo package * Tue Jul 15 2008 prusnak@suse.cz - initial version 2.0.32 * based on Fedora package by Dan Walsh <dwalsh@redhat.com>
/usr/include/sepol /usr/include/sepol/boolean_record.h /usr/include/sepol/booleans.h /usr/include/sepol/cil /usr/include/sepol/cil/cil.h /usr/include/sepol/context.h /usr/include/sepol/context_record.h /usr/include/sepol/debug.h /usr/include/sepol/errcodes.h /usr/include/sepol/handle.h /usr/include/sepol/ibendport_record.h /usr/include/sepol/ibendports.h /usr/include/sepol/ibpkey_record.h /usr/include/sepol/ibpkeys.h /usr/include/sepol/iface_record.h /usr/include/sepol/interfaces.h /usr/include/sepol/kernel_to_cil.h /usr/include/sepol/kernel_to_conf.h /usr/include/sepol/module.h /usr/include/sepol/module_to_cil.h /usr/include/sepol/node_record.h /usr/include/sepol/nodes.h /usr/include/sepol/policydb /usr/include/sepol/policydb.h /usr/include/sepol/policydb/avrule_block.h /usr/include/sepol/policydb/avtab.h /usr/include/sepol/policydb/conditional.h /usr/include/sepol/policydb/constraint.h /usr/include/sepol/policydb/context.h /usr/include/sepol/policydb/ebitmap.h /usr/include/sepol/policydb/expand.h /usr/include/sepol/policydb/flask_types.h /usr/include/sepol/policydb/hashtab.h /usr/include/sepol/policydb/hierarchy.h /usr/include/sepol/policydb/link.h /usr/include/sepol/policydb/mls_types.h /usr/include/sepol/policydb/module.h /usr/include/sepol/policydb/polcaps.h /usr/include/sepol/policydb/policydb.h /usr/include/sepol/policydb/services.h /usr/include/sepol/policydb/sidtab.h /usr/include/sepol/policydb/symtab.h /usr/include/sepol/policydb/util.h /usr/include/sepol/port_record.h /usr/include/sepol/ports.h /usr/include/sepol/sepol.h /usr/include/sepol/user_record.h /usr/include/sepol/users.h /usr/lib64/libsepol.so /usr/lib64/pkgconfig/libsepol.pc /usr/share/man/man3/sepol_check_context.3.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Fri Nov 8 23:52:26 2024