File libselinux.changes of Package libselinux
516
1
-------------------------------------------------------------------
2
Fri Jan 4 14:18:42 UTC 2019 - jsegitz@suse.com
3
4
- Remove unneeded build requires for python3 (bsc#1120255)
5
6
-------------------------------------------------------------------
7
Wed Oct 17 11:48:30 UTC 2018 - jsegitz@suse.com
8
9
- Update to version 2.8 (bsc#1111732)
10
For changes please see
11
https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt
12
- ran spec-cleaner on spec files
13
14
-------------------------------------------------------------------
15
Mon May 14 22:45:54 UTC 2018 - mcepl@cepl.eu
16
17
- Update to version 2.7.
18
* %files needed to be heavily modified
19
* Based expressly on python3, not just python
20
For changes please see
21
https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt
22
23
-------------------------------------------------------------------
24
Fri Nov 24 09:09:02 UTC 2017 - jsegitz@suse.com
25
26
- Update to version 2.6. Notable changes:
27
* selinux_restorecon: fix realpath logic
28
* sefcontext_compile: invert semantics of "-r" flag
29
* sefcontext_compile: Add "-i" flag
30
* Introduce configurable backends
31
* Add function to find security.restorecon_last entries
32
* Add openrc_contexts functions
33
* Add support for pcre2
34
* Handle NULL pcre study data
35
* Add setfiles support to selinux_restorecon(3)
36
* Evaluate inodes in selinux_restorecon(3)
37
* Change the location of _selinux.so
38
* Explain how to free policy type from selinux_getpolicytype()
39
* Compare absolute pathname in matchpathcon -V
40
* Add selinux_snapperd_contexts_path()
41
* Modify audit2why analyze function to use loaded policy
42
* Avoid mounting /proc outside of selinux_init_load_policy()
43
* Fix location of selinuxfs mount point
44
* Only mount /proc if necessary
45
* procattr: return einval for <= 0 pid args
46
* procattr: return error on invalid pid_t input
47
- Dropped
48
* libselinux-2.2-ruby.patch
49
* libselinux-proc-mount-only-if-needed.patch
50
* python-selinux-swig-3.10.patch
51
52
-------------------------------------------------------------------
53
Wed Jul 5 10:30:57 UTC 2017 - schwab@suse.de
54
55
- readv-proto.patch: include <sys/uio.h> for readv prototype
56
57
-------------------------------------------------------------------
58
Sun Jul 24 19:33:42 UTC 2016 - crrodriguez@opensuse.org
59
60
- -devel static subpackage requires libpcre-devel and libsepol-devel
61
62
-------------------------------------------------------------------
63
Sun Jul 24 19:05:35 UTC 2016 - crrodriguez@opensuse.org
64
65
- Avoid mounting /proc outside of selinux_init_load_policy().
66
(Stephen Smalley) reverts upstream 5a8d8c4, 9df4988, fixes
67
among other things systemd seccomp sandboxing otherwise all
68
filters must allow mount(2)
69
(libselinux-proc-mount-only-if-needed.patch)
70
71
-------------------------------------------------------------------
72
Sun Jul 17 15:30:05 UTC 2016 - jengelh@inai.de
73
74
- Update RPM groups, trim description and combine filelist entries.
75
76
-------------------------------------------------------------------
77
Thu Jul 14 07:58:49 UTC 2016 - jsegitz@novell.com
78
79
- Adjusted source link
80
81
-------------------------------------------------------------------
82
Tue Jul 5 16:42:03 UTC 2016 - i@marguerite.su
83
84
- add patch: python-selinux-swig-3.10.patch, fixed boo#985368
85
* swig-3.10 in Factory use importlib instead of imp to find
86
_selinux.so. imp searched the same directory as __init__.py
87
is while importlib searchs only standard paths. so we have
88
to move _selinux.so. fixed by upstream
89
- update version 2.5
90
* Add selinux_restorecon function
91
* read_spec_entry: fail on non-ascii
92
* Add man information about thread specific functions
93
* Don't wrap rpm_execcon with DISABLE_RPM with SWIG
94
* Correct line count for property and service context files
95
* label_file: fix memory leaks and uninitialized jump
96
* Replace selabel_digest hash function
97
* Fix selabel_open(3) services if no digest requested
98
* Add selabel_digest function
99
* Flush the class/perm string mapping cache on policy reload
100
* Fix restorecon when path has no context
101
* Free memory when processing media and x specfiles
102
* Fix mmap memory release for file labeling
103
* Add policy context validation to sefcontext_compile
104
* Do not treat an empty file_contexts(.local) as an error
105
* Fail hard on invalid property_contexts entries
106
* Fail hard on invalid file_contexts entries
107
* Support context validation on file_contexts.bin
108
* Add selabel_cmp interface and label_file backend
109
* Support specifying file_contexts.bin file path
110
* Support file_contexts.bin without file_contexts
111
* Simplify procattr cache
112
* Use /proc/thread-self when available
113
* Add const to selinux_opt for label backends
114
* Fix binary file labels for regexes with metachars
115
* Fix file labels for regexes with metachars
116
* Fix if file_contexts not '\n' terminated
117
* Enhance file context support
118
* Fix property processing and cleanup formatting
119
* Add read_spec_entries function to replace sscanf
120
* Support consistent mode size for bin files
121
* Fix more bin file processing core dumps
122
* add selinux_openssh_contexts_path()
123
* setrans_client: minimize overhead when mcstransd is not present
124
* Ensure selabel_lookup_best_match links NULL terminated
125
* Fix core dumps with corrupt *.bin files
126
* Add selabel partial and best match APIs
127
* Use os.walk() instead of the deprecated os.path.walk()
128
* Remove deprecated mudflap option
129
* Mount procfs before checking /proc/filesystems
130
* Fix -Wformat errors with gcc-5.0.0
131
* label_file: handle newlines in file names
132
* Fix audit2why error handling if SELinux is disabled
133
* pcre_study can return NULL without error
134
* Only check SELinux enabled status once in selinux_check_access
135
- changes in 2.4
136
* Remove assumption that SHLIBDIR is ../../ relative to LIBDIR
137
* Fix bugs found by hardened gcc flags
138
* Set the system to permissive if failing to disable SELinux because
139
policy has already been loaded
140
* Add db_exception and db_datatype support to label_db backend
141
* Log an error on unknown classes and permissions
142
* Add pcre version string to the compiled file_contexts format
143
* Deprecate use of flask.h and av_permissions.h
144
* Compiled file_context files and the original should have the same DAC
145
permissions
146
147
-------------------------------------------------------------------
148
Thu Jul 30 12:00:27 UTC 2015 - jsegitz@novell.com
149
150
- fixed selinux-ready to work with initrd files created by dracut (bsc#940006)
151
152
-------------------------------------------------------------------
153
Mon Sep 8 08:25:11 UTC 2014 - jsegitz@suse.com
154
155
- updated selinux-ready script to handle initrd files compressed with xz
156
157
-------------------------------------------------------------------
158
Sun May 18 00:15:17 UTC 2014 - crrodriguez@opensuse.org
159
160
- Update to version 2.3
161
* Get rid of security_context_t and fix const declarations.
162
* Refactor rpm_execcon() into a new setexecfilecon() from Guillem Jover.
163
164
-------------------------------------------------------------------
165
Thu Oct 31 13:43:41 UTC 2013 - p.drouand@gmail.com
166
167
- Update to version 2.2
168
* Fix avc_has_perm() returns -1 even when SELinux is in permissive mode.
169
* Support overriding Makefile RANLIB
170
* Update pkgconfig definition
171
* Mount sysfs before trying to mount selinuxfs.
172
* Fix man pages
173
* Support overriding PATH and LIBBASE in Makefile
174
* Fix LDFLAGS usage
175
* Avoid shadowing stat in load_mmap
176
* Support building on older PCRE libraries
177
* Fix handling of temporary file in sefcontext_compile
178
* Fix procattr cache
179
* Define python constants for getenforce result
180
* Fix label substitution handling of /
181
* Add selinux_current_policy_path from
182
* Change get_context_list to only return good matches
183
* Support udev-197 and higher
184
* Add support for local substitutions
185
* Change setfilecon to not return ENOSUP if context is already correct
186
* Python wrapper leak fixes
187
* Export SELINUX_TRANS_DIR definition in selinux.h
188
* Add selinux_systemd_contexts_path
189
* Add selinux_set_policy_root
190
* Add man page for sefcontext_compile
191
- Remove libselinux-rhat.patch; merged on upstream
192
- Adapt libselinux-ruby.patch to upstream changes
193
- Use fdupes to symlink duplicate manpages
194
195
-------------------------------------------------------------------
196
Thu Jun 27 14:42:01 UTC 2013 - vcizek@suse.com
197
198
- change the source url to the official 2.1.13 release tarball
199
200
-------------------------------------------------------------------
201
Wed May 22 23:50:58 UTC 2013 - jengelh@inai.de
202
203
- Reuse implicit dependencies injected by pkgconfig
204
205
-------------------------------------------------------------------
206
Thu Apr 4 19:16:35 UTC 2013 - vcizek@suse.com
207
208
- fixed source url in libselinux-bindings.spec
209
- removed old tarball
210
211
-------------------------------------------------------------------
212
Wed Apr 3 10:17:21 UTC 2013 - vcizek@suse.com
213
214
- fix source url
215
- document changes in libselinux-rhat.patch from previous submission:
216
(most code of the removed code was integrated upstream)
217
* Add matchpathcon -P /etc/selinux/mls support by allowing users
218
to set alternate root
219
* Add new constant SETRANS_DIR which points to the directory
220
where mstransd can find the socket and libvirt can write its
221
translations files
222
223
-------------------------------------------------------------------
224
Fri Mar 29 15:12:50 UTC 2013 - vcizek@suse.com
225
226
-update to 2.1.13
227
* audit2why: make sure path is nul terminated
228
* utils: new file context regex compiler
229
* label_file: use precompiled filecontext when possible
230
* do not leak mmapfd
231
* sefcontontext_compile: Add error handling to help debug problems in libsemanage.
232
* man: make selinux.8 mention service man pages
233
* audit2why: Fix segfault if finish() called twice
234
* audit2why: do not leak on multiple init() calls
235
* mode_to_security_class: interface to translate a mode_t in to a security class
236
* audit2why: Cleanup audit2why analysys function
237
* man: Fix program synopsis and function prototypes in man pages
238
* man: Fix man pages formatting
239
* man: Fix typo in man page
240
* man: Add references and man page links to _raw function variants
241
* Use ENOTSUP instead of EOPNOTSUPP for getfilecon functions
242
* man: context_new(3): fix the return value description
243
* selinux_status_open: handle error from sysconf
244
* selinux_status_open: do not leak statusfd on exec
245
* Fix errors found by coverity
246
* Change boooleans.subs to booleans.subs_dist.
247
* optimize set*con functions
248
* pkg-config do not specifc ruby version
249
* unmap file contexts on selabel_close()
250
* do not leak file contexts with mmap'd backend
251
* sefcontext_compile: do not leak fd on error
252
* matchmediacon: do not leak fd
253
* src/label_android_property: do not leak fd on error
254
255
-------------------------------------------------------------------
256
Wed Jan 30 11:44:45 UTC 2013 - vcizek@suse.com
257
258
- update to 2.1.12
259
- added the recent libselinux-rhat.patch
260
* Add support for lxc_contexts_path
261
* utils: add service to getdefaultcon
262
* libsemanage: do not set soname needlessly
263
* libsemanage: remove PYTHONLIBDIR and ruby equivalent
264
* boolean name equivalency
265
* getsebool: support boolean name substitution
266
* Add man page for new selinux_boolean_sub function.
267
* expose selinux_boolean_sub
268
* matchpathcon: add -m option to force file type check
269
* utils: avcstat: clear sa_mask set
270
* seusers: Check for strchr failure
271
* booleans: initialize pointer to silence coveriety
272
* stop messages when SELinux disabled
273
* Ensure that we only close the selinux netlink socket once.
274
* improve the file_contexts.5 manual page
275
* Fortify source now requires all code to be compiled with -O flag
276
* asprintf return code must be checked
277
* avc_netlink_recieve handle EINTR
278
* audit2why: silence -Wmissing-prototypes warning
279
* libsemanage: remove build warning when build swig c files
280
* matchpathcon: bad handling of symlinks in /
281
* seusers: remove unused lineno
282
* seusers: getseuser: gracefully handle NULL service
283
* New Android property labeling backend
284
* label_android_property whitespace cleanups
285
* additional makefile support for rubywrap
286
* Remove jump over variable declaration
287
* Fix old style function definitions
288
* Fix const-correctness
289
* Remove unused flush_class_cache method
290
* Add prototype decl for destructor
291
* Add more printf format annotations
292
* Add printf format attribute annotation to die() method
293
* Fix const-ness of parameters & make usage() methods static
294
* Enable many more gcc warnings for libselinux/src/ builds
295
* utils: Enable many more gcc warnings for libselinux/utils builds
296
* Change annotation on include/selinux/avc.h to avoid upsetting SWIG
297
* Ensure there is a prototype for 'matchpathcon_lib_destructor'
298
* Update Makefiles to handle /usrmove
299
* utils: Stop separating out matchpathcon as something special
300
* pkg-config to figure out where ruby include files are located
301
* build with either ruby 1.9 or ruby 1.8
302
* assert if avc_init() not called
303
* take security_deny_unknown into account
304
* security_compute_create_name(3)
305
* Do not link against python library, this is considered
306
* bad practice in debian
307
* Hide unnecessarily-exported library destructors
308
309
-------------------------------------------------------------------
310
Mon Jan 7 22:34:03 UTC 2013 - jengelh@inai.de
311
312
- Remove obsolete defines/sections
313
314
-------------------------------------------------------------------
315
Tue Dec 11 16:15:52 UTC 2012 - vcizek@suse.com
316
317
- update selinux-ready script
318
* use -L when stat()ing /etc/selinux/config
319
* make sure that SELINUX isn't disabled in /etc/selinux/config
320
* look for either of /sys/fs/selinux and /selinux directory
321
* use systemctl to check for restorecond
322
* don't look for booleans file (deprecated)
323
324
-------------------------------------------------------------------
325
Tue Nov 27 12:38:29 UTC 2012 - vcizek@suse.com
326
327
- update selinux-ready script
328
329
-------------------------------------------------------------------
330
Wed Jul 25 11:15:02 UTC 2012 - meissner@suse.com
331
332
- updated to 2.1.9 again (see below)
333
334
-------------------------------------------------------------------
335
Wed Jun 13 08:56:36 UTC 2012 - coolo@suse.com
336
337
- go back even more - everything else requires the full SELinux stack
338
(too late for 12.2)
339
340
-------------------------------------------------------------------
341
Mon Jun 11 09:06:55 UTC 2012 - factory-maintainer@kulow.org
342
343
- revert back to 2.0.98 for 12.2
344
345
-------------------------------------------------------------------
346
Fri Jun 1 18:34:04 CEST 2012 - mls@suse.de
347
348
- update to libselinux-2.1.9
349
* better man pages
350
* selinux_status interfaces
351
* simple interface for access checks
352
* multiple bug fixes
353
354
-------------------------------------------------------------------
355
Wed Oct 5 15:09:25 UTC 2011 - uli@suse.com
356
357
- cross-build fix: use %__cc macro
358
359
-------------------------------------------------------------------
360
Mon Jun 28 06:38:35 UTC 2010 - jengelh@medozas.de
361
362
- use %_smp_mflags
363
364
-------------------------------------------------------------------
365
Mon May 3 10:30:40 UTC 2010 - prusnak@suse.cz
366
367
- don't package /var/run/setrans in libselinux1 package
368
- Feature#303793
369
- the directory will be created in initscript of mcstrans package
370
371
-------------------------------------------------------------------
372
Sat Apr 24 09:53:28 UTC 2010 - coolo@novell.com
373
374
- buildrequire pkg-config to fix provides
375
376
-------------------------------------------------------------------
377
Fri Apr 9 07:27:27 UTC 2010 - thomas@novell.com
378
379
- selinux-ready: added function to check for restorecond in
380
runlevel 3/5
381
382
-------------------------------------------------------------------
383
Thu Apr 8 06:37:34 UTC 2010 - thomas@novell.com
384
385
- selinux-ready: added functions for checking PAM config and
386
policy boolean init_upstart
387
388
-------------------------------------------------------------------
389
Wed Apr 7 13:26:59 UTC 2010 - thomas@novell.com
390
391
- selinux-ready: fixed init ramfs checking
392
393
-------------------------------------------------------------------
394
Wed Apr 7 12:59:41 UTC 2010 - thomas@novell.com
395
396
- added new selinux-ready script
397
398
-------------------------------------------------------------------
399
Thu Feb 25 14:57:16 UTC 2010 - prusnak@suse.cz
400
401
- updated to 2.0.91
402
* changes too numerous to list
403
404
-------------------------------------------------------------------
405
Sat Dec 12 16:43:54 CET 2009 - jengelh@medozas.de
406
407
- add baselibs.conf as a source
408
409
-------------------------------------------------------------------
410
Fri Jul 24 17:09:50 CEST 2009 - thomas@novell.com
411
412
- updated selinux-ready script
413
414
-------------------------------------------------------------------
415
Wed Jul 22 15:17:25 CEST 2009 - prusnak@suse.cz
416
417
- change libsepol-devel to libsepol-devel-static in dependencies
418
of python bindings
419
420
-------------------------------------------------------------------
421
Wed Jul 1 12:26:48 CEST 2009 - prusnak@suse.cz
422
423
- put libsepol-devel back to Requires of libselinux-devel
424
425
-------------------------------------------------------------------
426
Mon Jun 29 21:24:16 CEST 2009 - prusnak@suse.cz
427
428
- added selinux-ready tool to selinux-tools package
429
430
-------------------------------------------------------------------
431
Tue Jun 9 20:17:54 CEST 2009 - crrodriguez@suse.de
432
433
- remove static libraries
434
- libselinux-devel does not require libsepol-devel
435
436
-------------------------------------------------------------------
437
Wed May 27 14:06:14 CEST 2009 - prusnak@suse.cz
438
439
- updated to 2.0.80
440
* deny_unknown wrapper function from KaiGai Kohei
441
* security_compute_av_flags API from KaiGai Kohei
442
* Netlink socket management and callbacks from KaiGai Kohei
443
* Netlink socket handoff patch from Adam Jackson
444
* AVC caching of compute_create results by Eric Paris
445
* fix incorrect conversion in discover_class code
446
447
-------------------------------------------------------------------
448
Fri Apr 17 17:12:06 CEST 2009 - prusnak@suse.cz
449
450
- fixed memory leak (memleak.patch)
451
452
-------------------------------------------------------------------
453
Wed Jan 14 14:04:30 CET 2009 - prusnak@suse.cz
454
455
- updated to 2.0.77
456
* add new function getseuser which will take username and service
457
and return seuser and level; ipa will populate file in future
458
* change selinuxdefcon to return just the context by default
459
* fix segfault if seusers file does not work
460
* strip trailing / for matchpathcon
461
* fix restorecon python code
462
463
-------------------------------------------------------------------
464
Mon Dec 1 11:32:50 CET 2008 - prusnak@suse.cz
465
466
- updated to 2.0.76
467
* allow shell-style wildcarding in X names
468
* add Restorecon/Install python functions
469
* correct message types in AVC log messages
470
* make matchpathcon -V pass mode
471
* add man page for selinux_file_context_cmp
472
* update flask headers from refpolicy trunk
473
474
-------------------------------------------------------------------
475
Wed Oct 22 16:28:59 CEST 2008 - mrueckert@suse.de
476
477
- fix debug_packages_requires define
478
479
-------------------------------------------------------------------
480
Tue Sep 23 12:51:10 CEST 2008 - prusnak@suse.cz
481
482
- require only version, not release [bnc#429053]
483
484
-------------------------------------------------------------------
485
Tue Sep 2 12:09:22 CEST 2008 - prusnak@suse.cz
486
487
- updated to 2.0.71
488
* Add group support to seusers using %groupname syntax from Dan Walsh.
489
* Mark setrans socket close-on-exec from Stephen Smalley.
490
* Only apply nodups checking to base file contexts from Stephen Smalley.
491
* Merge ruby bindings from Dan Walsh.
492
493
-------------------------------------------------------------------
494
Mon Sep 1 07:35:00 CEST 2008 - aj@suse.de
495
496
- Fix build of debuginfo.
497
498
-------------------------------------------------------------------
499
Fri Aug 22 14:45:29 CEST 2008 - prusnak@suse.cz
500
501
- added baselibs.conf file
502
- split bindings into separate subpackage (libselinux-bindings)
503
- split tools into separate subpackage (selinux-tools)
504
505
-------------------------------------------------------------------
506
Fri Aug 1 17:32:20 CEST 2008 - ro@suse.de
507
508
- fix requires for debuginfo package
509
510
-------------------------------------------------------------------
511
Tue Jul 15 16:26:31 CEST 2008 - prusnak@suse.cz
512
513
- initial version 2.0.67
514
* based on Fedora package by Dan Walsh <dwalsh@redhat.com>
515
516