Name: | libselinux |
Version: | 2.5 |
Release: | 6.el7 |
Architecture: | i686 |
Group: | System Environment/Libraries |
Size: | 211182 |
License: | Public Domain |
RPM: |
libselinux-2.5-6.el7.i686.rpm
|
Source RPM: |
libselinux-2.5-6.el7.src.rpm
|
Build Date: | Fri Nov 04 2016 |
Build Host: | x86-ol7-builder-01.us.oracle.com |
Vendor: | Oracle America |
URL: | https://github.com/SELinuxProject/selinux/wiki |
Summary: | SELinux library and simple utilities |
Description: | Security-enhanced Linux is a feature of the Linux® kernel and a number
of utilities with enhanced security functionality designed to add
mandatory access controls to Linux. The Security-enhanced Linux
kernel contains new architectural components originally developed to
improve the security of the Flask operating system. These
architectural components provide general support for the enforcement
of many kinds of mandatory access control policies, including those
based on the concepts of Type Enforcement®, Role-based Access
Control, and Multi-level Security.
libselinux provides an API for SELinux applications to get and set
process and file security contexts and to obtain security policy
decisions. Required for any applications that use the SELinux API. |
-
Fri Aug 26 2016 Petr Lautrbach <plautrba@redhat.com> 2.5-6
- Handle NULL pcre study data
-
Wed Aug 10 2016 Petr Lautrbach <plautrba@redhat.com> 2.5-5
- Fix in tree compilation of utils that depend on libsepol
-
Mon Jun 27 2016 Petr Lautrbach <plautrba@redhat.com> - 2.5-4
- Clarify is_selinux_mls_enabled() description
- Explain how to free policy type from selinux_getpolicytype()
- Compare absolute pathname in matchpathcon -V
- Add selinux_snapperd_contexts_path()
- Modify audit2why analyze function to use loaded policy
- Sort object files for deterministic linking order
- Respect CC and PKG_CONFIG environment variable
- Avoid mounting /proc outside of selinux_init_load_policy()
- Fix multiple spelling errors
-
Wed Apr 27 2016 Petr Lautrbach <plautrba@redhat.com> - 2.5-3
- Fix setexecfilecon() to work better in a chroot (#1329931)
- Fix typo in sefcontext_compile.8 (#1320062)
-
Mon Apr 11 2016 Petr Lautrbach <plautrba@redhat.com> - 2.5-2
- Fix location of selinuxfs mount point (#1321086)
- Only mount /proc if necessary
- procattr: return einval for <= 0 pid args
- procattr: return error on invalid pid_t inpu
-
Tue Feb 23 2016 Petr Lautrbach <plautrba@redhat.com> 2.5-1
- Update to upstream release 2016-02-23
-
Fri Feb 14 2014 Dan Walsh <dwalsh@redhat.com> - 2.2.2-6
- Add additional go bindings for get*con calls
- Add go bindings test command
- Modify man pages of set*con calls to mention that they are thread specific
Resolves:#1053122
-
Fri Jan 31 2014 Dan Walsh <dwalsh@redhat.com> - 2.2.2-5
- Move selinux.go to /usr/lib64/golang/src/pkg/github.com/selinux/selinux.go
- Add Int_to_mcs function to generate MCS labels from integers.
-
Fri Jan 31 2014 Miroslav Grepl <mgrepl@redhat.com> - 2.2.2-4
- Fix libselinux.spec file
- Move selinux.go to /usr/lib64/golang/src/pkg/github.com/selinux/selinux.go
- Add Int_to_mcs function to generate MCS labels from integers.
-
Tue Jan 28 2014 Daniel Mach <dmach@redhat.com> - 2.2.2-3
- Mass rebuild 2014-01-24