Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libsepol1-2.8-lp151.1.12 RPM for ppc64le

From OpenSuSE Ports Leap 15.1 for ppc64le

Name: libsepol1 Distribution: openSUSE Leap 15.1
Version: 2.8 Vendor: openSUSE
Release: lp151.1.12 Build date: Wed Apr 10 18:32:05 2019
Group: System/Libraries Build host: obs-power8-06
Size: 987840 Source RPM: libsepol-2.8-lp151.1.12.src.rpm
Summary: SELinux binary policy manipulation library
libsepol provides an API for the manipulation of SELinux binary
policies. It is used by checkpolicy (the policy compiler) and similar
tools, as well as by programs like load_policy that need to perform
specific transformations on binary policies such as customizing
policy boolean settings.

(Security-enhanced Linux is a feature of the kernel and some
utilities that implement mandatory access control policies, such as
Type Enforcement, Role-based Access Control and Multi-Level






* Thu Nov 08 2018 Jan Engelhardt <>
  - Use more %make_install.
* Thu Nov 08 2018
  - Adjusted source urls (bsc#1115052)
* Wed Oct 17 2018
  - Update to version 2.8 (bsc#1111732)
* Wed May 16 2018
  - Rebase to 2.7
* Fri Nov 24 2017
  - Update to version 2.6. Notable changes:
    * Add support for converting extended permissions to CIL
    * Create user and role caches when building binary policy
    * Check for too many permissions in classes and commons in CIL
    * Fix xperm mapping between avrule and avtab
    * Produce more meaningful error messages for conflicting type rules in CIL
    * Change which attributes CIL keeps in the binary policy
    * Warn instead of fail if permission is not resolved
    * Ignore object_r when adding userrole mappings to policydb
    * Correctly detect unknown classes in sepol_string_to_security_class
    * Fix neverallowxperm checking on attributes
    * Only apply bounds checking to source types in rules
    * Fix CIL and not add an attribute as a type in the attr_type_map
    * Fix extended permissions neverallow checking
    * Fix CIL neverallow and bounds checking
    * Add support for portcon dccp protocol
* Fri Jul 15 2016
  - Update RPM groups, trim description and combine filelist entries.
* Thu Jul 14 2016
  - Cleanup spec file with spec-cleaner
  - Make spec file a bit more easy
  - Ship new supbackage (-tools)
* Thu Jul 14 2016
  - Without bug number no submit to SLE 12 SP2 is possible, so to make
    sle-changelog-checker happy: bsc#988977
* Thu Jul 14 2016
  - Adjusted source link
* Tue Jul 05 2016
  - update version 2.5
    * Fix unused variable annotations
    * Fix uninitialized variable in CIL
    * Validate extended avrules and permissionxs in CIL
    * Add support in CIL for neverallowx
    * Fully expand neverallowxperm rules
    * Add support for unordered classes to CIL
    * Add neverallow support for ioctl extended permissions
    * Improve CIL block and macro call recursion detection
    * Fix CIL uninitialized false positive in cil_binary
    * Provide error in CIL if classperms are empty
    * Add userattribute{set} functionality to CIL
    * fix CIL blockinherit copying segfault and add macro restrictions
    * fix CIL NULL pointer dereference when copying classpermission/set
    * Add CIL support for ioctl whitelists
    * Fix memory leak when destroying avtab
    * Replace sscanf in module_to_cil
    * Improve CIL resolution error messages
    * Fix policydb_read for policy versions < 24
    * Added CIL bounds checking and refactored CIL Neverallow checking
    * Refactored libsepol Neverallow and bounds (hierarchy) checking
    * Treat types like an attribute in the attr_type_map
    * Add new ebitmap function named ebitmap_match_any()
    * switch operations to extended perms
    * Write auditadm_r and secadm_r roles to base module when writing CIL
    * Fix module to CIL to only associate declared roleattributes with in-scope types
    * Don't allow categories/sensitivities inside blocks in CIL
    * Replace fmemopen() with internal function in libsepol
    * Verify users prior to evaluating users in cil
    * Binary modules do not support ioctl rules
    * Add support for ioctl command whitelisting
    * Don't use symbol versioning for static object files
    * Add sepol_module_policydb_to_cil(), sepol_module_package_to_cil(),
      and sepol_ppfile_to_module_package()
    * Move secilc out of libsepol
    * fix building Xen policy with devicetreecon, and add devicetreecon
      CIL documentation
    * bool_copy_callback set state on creation
    * Add device tree ocontext nodes to Xen policy
    * Widen Xen IOMEM context entries
    * Fix error path in mls_semantic_level_expand()
    * Update to latest CIL, includes new name resolution and fixes ordering
      issues with blockinherit statements, and bug fixes
  - changes in 2.4
    * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR
    * Fix bugs found by hardened gcc flags
    * Build CIL into libsepol. libsepol can be built without CIL by setting the
      DISABLE_CIL flag to 'y'
    * Add an API function to set target_platform
    * Report all neverallow violations
    * Improve check_assertions performance
    * Allow libsepol C++ static library on device



Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Nov 9 12:10:50 2021