Source: libselinux Version: 3.5-2 Severity: serious Tags: patch pending sid trixie Justification: library ABI skew on upgrade User: debian-...@lists.debian.org Usertags: time-t
NOTICE: these changes must not be uploaded to unstable yet! Dear maintainer, As part of the 64-bit time_t transition required to support 32-bit architectures in 2038 and beyond (https://wiki.debian.org/ReleaseGoals/64bit-time), we have identified libselinux as a source package shipping runtime libraries whose ABI either is affected by the change in size of time_t, or could not be analyzed via abi-compliance-checker (and therefore to be on the safe side we assume is affected). To ensure that inconsistent combinations of libraries with their reverse-dependencies are never installed together, it is necessary to have a library transition, which is most easily done by renaming the runtime library package. Since turning on 64-bit time_t is being handled centrally through a change to the default dpkg-buildflags (https://bugs.debian.org/1037136), it is important that libraries affected by this ABI change all be uploaded close together in time. Therefore I have prepared a 0-day NMU for libselinux which will initially be uploaded to experimental if possible, then to unstable after packages have cleared binary NEW. Please find the patch for this NMU attached. If you have any concerns about this patch, please reach out ASAP. Although this package will be uploaded to experimental immediately, there will be a period of several days before we begin uploads to unstable; so if information becomes available that your package should not be included in the transition, there is time for us to amend the planned uploads. -- System Information: Debian Release: trixie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 6.5.0-14-generic (SMP w/12 CPU threads; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system)
diff -Nru libselinux-3.5/debian/changelog libselinux-3.5/debian/changelog --- libselinux-3.5/debian/changelog 2024-01-24 20:23:37.000000000 +0000 +++ libselinux-3.5/debian/changelog 2024-02-05 08:22:28.000000000 +0000 @@ -1,3 +1,10 @@ +libselinux (3.5-2.1) experimental; urgency=medium + + * Non-maintainer upload. + * Rename libraries for 64-bit time_t transition. + + -- Steve Langasek <vor...@debian.org> Mon, 05 Feb 2024 08:22:28 +0000 + libselinux (3.5-2) unstable; urgency=medium [ Michael Biebl ] diff -Nru libselinux-3.5/debian/control libselinux-3.5/debian/control --- libselinux-3.5/debian/control 2024-01-24 20:23:37.000000000 +0000 +++ libselinux-3.5/debian/control 2024-02-05 08:22:28.000000000 +0000 @@ -35,7 +35,10 @@ provides utility programs to get and set process and file security contexts and to obtain security policy decisions. -Package: libselinux1 +Package: libselinux1t64 +Provides: ${t64:Provides} +Replaces: libselinux1 +Breaks: libselinux1 (<< ${source:Version}) Architecture: linux-any Multi-Arch: same Pre-Depends: ${misc:Pre-Depends} @@ -54,7 +57,7 @@ control policies, including those based on the concepts of Type Enforcement, Role-based Access Control, and Multi-level Security. . - libselinux1 provides an API for SELinux applications to get and set + libselinux1t64 provides an API for SELinux applications to get and set process and file security contexts and to obtain security policy decisions. Required for any applications that use the SELinux API. libselinux may use the shared libsepol to manipulate the binary @@ -63,7 +66,7 @@ Package: libselinux1-dev Architecture: linux-any -Depends: libselinux1 (= ${binary:Version}), +Depends: libselinux1t64 (= ${binary:Version}), libsepol-dev (>= 3.5), libpcre2-dev, ${misc:Depends} diff -Nru libselinux-3.5/debian/libselinux1.install libselinux-3.5/debian/libselinux1.install --- libselinux-3.5/debian/libselinux1.install 2024-01-24 20:23:37.000000000 +0000 +++ libselinux-3.5/debian/libselinux1.install 1970-01-01 00:00:00.000000000 +0000 @@ -1 +0,0 @@ -usr/lib/*/*.so.* diff -Nru libselinux-3.5/debian/libselinux1.symbols libselinux-3.5/debian/libselinux1.symbols --- libselinux-3.5/debian/libselinux1.symbols 2024-01-24 20:23:37.000000000 +0000 +++ libselinux-3.5/debian/libselinux1.symbols 1970-01-01 00:00:00.000000000 +0000 @@ -1,246 +0,0 @@ -libselinux.so.1 libselinux1 #MINVER# -* Build-Depends-Package: libselinux1-dev - LIBSELINUX_1.0@LIBSELINUX_1.0 3.1~ - LIBSELINUX_3.4@LIBSELINUX_3.4 3.4 - LIBSELINUX_3.5@LIBSELINUX_3.5 3.5 - avc_add_callback@LIBSELINUX_1.0 3.1~ - avc_audit@LIBSELINUX_1.0 3.1~ - avc_av_stats@LIBSELINUX_1.0 3.1~ - avc_cache_stats@LIBSELINUX_1.0 3.1~ - avc_cleanup@LIBSELINUX_1.0 3.1~ - avc_compute_create@LIBSELINUX_1.0 3.1~ - avc_compute_member@LIBSELINUX_1.0 3.1~ - avc_context_to_sid@LIBSELINUX_1.0 3.1~ - avc_context_to_sid_raw@LIBSELINUX_1.0 3.1~ - avc_destroy@LIBSELINUX_1.0 3.1~ - avc_get_initial_sid@LIBSELINUX_1.0 3.1~ - avc_has_perm@LIBSELINUX_1.0 3.1~ - avc_has_perm_noaudit@LIBSELINUX_1.0 3.1~ - avc_init@LIBSELINUX_1.0 3.1~ - avc_netlink_acquire_fd@LIBSELINUX_1.0 3.1~ - avc_netlink_check_nb@LIBSELINUX_1.0 3.1~ - avc_netlink_close@LIBSELINUX_1.0 3.1~ - avc_netlink_loop@LIBSELINUX_1.0 3.1~ - avc_netlink_open@LIBSELINUX_1.0 3.1~ - avc_netlink_release_fd@LIBSELINUX_1.0 3.1~ - avc_open@LIBSELINUX_1.0 3.1~ - avc_reset@LIBSELINUX_1.0 3.1~ - avc_sid_stats@LIBSELINUX_1.0 3.1~ - avc_sid_to_context@LIBSELINUX_1.0 3.1~ - avc_sid_to_context_raw@LIBSELINUX_1.0 3.1~ - checkPasswdAccess@LIBSELINUX_1.0 3.1~ - context_free@LIBSELINUX_1.0 3.1~ - context_new@LIBSELINUX_1.0 3.1~ - context_range_get@LIBSELINUX_1.0 3.1~ - context_range_set@LIBSELINUX_1.0 3.1~ - context_role_get@LIBSELINUX_1.0 3.1~ - context_role_set@LIBSELINUX_1.0 3.1~ - context_str@LIBSELINUX_1.0 3.1~ - context_type_get@LIBSELINUX_1.0 3.1~ - context_type_set@LIBSELINUX_1.0 3.1~ - context_user_get@LIBSELINUX_1.0 3.1~ - context_user_set@LIBSELINUX_1.0 3.1~ - fgetfilecon@LIBSELINUX_1.0 3.1~ - fini_selinuxmnt@LIBSELINUX_1.0 3.1~ - fgetfilecon_raw@LIBSELINUX_1.0 3.1~ - freecon@LIBSELINUX_1.0 3.1~ - freeconary@LIBSELINUX_1.0 3.1~ - fsetfilecon@LIBSELINUX_1.0 3.1~ - fsetfilecon_raw@LIBSELINUX_1.0 3.1~ - get_default_context@LIBSELINUX_1.0 3.1~ - get_default_context_with_level@LIBSELINUX_1.0 3.1~ - get_default_context_with_role@LIBSELINUX_1.0 3.1~ - get_default_context_with_rolelevel@LIBSELINUX_1.0 3.1~ - get_default_type@LIBSELINUX_1.0 3.1~ - get_ordered_context_list@LIBSELINUX_1.0 3.1~ - get_ordered_context_list_with_level@LIBSELINUX_1.0 3.1~ - getcon@LIBSELINUX_1.0 3.1~ - getcon_raw@LIBSELINUX_1.0 3.1~ - getexeccon@LIBSELINUX_1.0 3.1~ - getexeccon_raw@LIBSELINUX_1.0 3.1~ - getfilecon@LIBSELINUX_1.0 3.1~ - getfilecon_raw@LIBSELINUX_1.0 3.1~ - getfscreatecon@LIBSELINUX_1.0 3.1~ - getfscreatecon_raw@LIBSELINUX_1.0 3.1~ - getkeycreatecon@LIBSELINUX_1.0 3.1~ - getkeycreatecon_raw@LIBSELINUX_1.0 3.1~ - getpeercon@LIBSELINUX_1.0 3.1~ - getpeercon_raw@LIBSELINUX_1.0 3.1~ - getpidcon@LIBSELINUX_1.0 3.1~ - getpidcon_raw@LIBSELINUX_1.0 3.1~ - getpidprevcon@LIBSELINUX_3.5 3.5 - getpidprevcon_raw@LIBSELINUX_3.5 3.5 - getprevcon@LIBSELINUX_1.0 3.1~ - getprevcon_raw@LIBSELINUX_1.0 3.1~ - getseuser@LIBSELINUX_1.0 3.1~ - getseuserbyname@LIBSELINUX_1.0 3.1~ - getsockcreatecon@LIBSELINUX_1.0 3.1~ - getsockcreatecon_raw@LIBSELINUX_1.0 3.1~ - is_context_customizable@LIBSELINUX_1.0 3.1~ - is_selinux_enabled@LIBSELINUX_1.0 3.1~ - is_selinux_mls_enabled@LIBSELINUX_1.0 3.1~ - lgetfilecon@LIBSELINUX_1.0 3.1~ - lgetfilecon_raw@LIBSELINUX_1.0 3.1~ - lsetfilecon@LIBSELINUX_1.0 3.1~ - lsetfilecon_raw@LIBSELINUX_1.0 3.1~ - manual_user_enter_context@LIBSELINUX_1.0 3.1~ - matchmediacon@LIBSELINUX_1.0 3.1~ - matchpathcon@LIBSELINUX_1.0 3.1~ - matchpathcon_checkmatches@LIBSELINUX_1.0 3.1~ - matchpathcon_filespec_add@LIBSELINUX_1.0 3.1~ - matchpathcon_filespec_destroy@LIBSELINUX_1.0 3.1~ - matchpathcon_filespec_eval@LIBSELINUX_1.0 3.1~ - matchpathcon_fini@LIBSELINUX_1.0 3.1~ - matchpathcon_index@LIBSELINUX_1.0 3.1~ - matchpathcon_init@LIBSELINUX_1.0 3.1~ - matchpathcon_init_prefix@LIBSELINUX_1.0 3.1~ - mode_to_security_class@LIBSELINUX_1.0 3.1~ - print_access_vector@LIBSELINUX_1.0 3.1~ - query_user_context@LIBSELINUX_1.0 3.1~ - realpath_not_final@LIBSELINUX_1.0 3.1~ - rpm_execcon@LIBSELINUX_1.0 3.1~ - security_av_perm_to_string@LIBSELINUX_1.0 3.1~ - security_av_string@LIBSELINUX_1.0 3.1~ - security_canonicalize_context@LIBSELINUX_1.0 3.1~ - security_canonicalize_context_raw@LIBSELINUX_1.0 3.1~ - security_check_context@LIBSELINUX_1.0 3.1~ - security_check_context_raw@LIBSELINUX_1.0 3.1~ - security_class_to_string@LIBSELINUX_1.0 3.1~ - security_commit_booleans@LIBSELINUX_1.0 3.1~ - security_compute_av@LIBSELINUX_1.0 3.1~ - security_compute_av_flags@LIBSELINUX_1.0 3.1~ - security_compute_av_flags_raw@LIBSELINUX_1.0 3.1~ - security_compute_av_raw@LIBSELINUX_1.0 3.1~ - security_compute_create@LIBSELINUX_1.0 3.1~ - security_compute_create_name@LIBSELINUX_1.0 3.1~ - security_compute_create_name_raw@LIBSELINUX_1.0 3.1~ - security_compute_create_raw@LIBSELINUX_1.0 3.1~ - security_compute_member@LIBSELINUX_1.0 3.1~ - security_compute_member_raw@LIBSELINUX_1.0 3.1~ - security_compute_relabel@LIBSELINUX_1.0 3.1~ - security_compute_relabel_raw@LIBSELINUX_1.0 3.1~ - security_compute_user@LIBSELINUX_1.0 3.1~ - security_compute_user_raw@LIBSELINUX_1.0 3.1~ - security_deny_unknown@LIBSELINUX_1.0 3.1~ - security_disable@LIBSELINUX_1.0 3.1~ - security_get_boolean_active@LIBSELINUX_1.0 3.1~ - security_get_boolean_names@LIBSELINUX_1.0 3.1~ - security_get_boolean_pending@LIBSELINUX_1.0 3.1~ - security_get_checkreqprot@LIBSELINUX_1.0 3.1~ - security_get_initial_context@LIBSELINUX_1.0 3.1~ - security_get_initial_context_raw@LIBSELINUX_1.0 3.1~ - security_getenforce@LIBSELINUX_1.0 3.1~ - security_load_booleans@LIBSELINUX_1.0 3.1~ - security_load_policy@LIBSELINUX_1.0 3.1~ - security_policyvers@LIBSELINUX_1.0 3.1~ - security_reject_unknown@LIBSELINUX_1.0 3.1~ - security_set_boolean@LIBSELINUX_1.0 3.1~ - security_set_boolean_list@LIBSELINUX_1.0 3.1~ - security_setenforce@LIBSELINUX_1.0 3.1~ - security_validatetrans@LIBSELINUX_1.0 3.1~ - security_validatetrans_raw@LIBSELINUX_1.0 3.1~ - selabel_close@LIBSELINUX_1.0 3.1~ - selabel_cmp@LIBSELINUX_1.0 3.1~ - selabel_digest@LIBSELINUX_1.0 3.1~ - selabel_get_digests_all_partial_matches@LIBSELINUX_1.0 3.1~ - selabel_hash_all_partial_matches@LIBSELINUX_1.0 3.1~ - selabel_lookup@LIBSELINUX_1.0 3.1~ - selabel_lookup_best_match@LIBSELINUX_1.0 3.1~ - selabel_lookup_best_match_raw@LIBSELINUX_1.0 3.1~ - selabel_lookup_raw@LIBSELINUX_1.0 3.1~ - selabel_open@LIBSELINUX_1.0 3.1~ - selabel_partial_match@LIBSELINUX_1.0 3.1~ - selabel_stats@LIBSELINUX_1.0 3.1~ - selinux_binary_policy_path@LIBSELINUX_1.0 3.1~ - selinux_boolean_sub@LIBSELINUX_1.0 3.1~ - selinux_booleans_path@LIBSELINUX_1.0 3.1~ - selinux_booleans_subs_path@LIBSELINUX_1.0 3.1~ - selinux_check_access@LIBSELINUX_1.0 3.1~ - selinux_check_passwd_access@LIBSELINUX_1.0 3.1~ - selinux_check_securetty_context@LIBSELINUX_1.0 3.1~ - selinux_colors_path@LIBSELINUX_1.0 3.1~ - selinux_contexts_path@LIBSELINUX_1.0 3.1~ - selinux_current_policy_path@LIBSELINUX_1.0 3.1~ - selinux_customizable_types_path@LIBSELINUX_1.0 3.1~ - selinux_default_context_path@LIBSELINUX_1.0 3.1~ - selinux_default_type_path@LIBSELINUX_1.0 3.1~ - selinux_failsafe_context_path@LIBSELINUX_1.0 3.1~ - selinux_file_context_cmp@LIBSELINUX_1.0 3.1~ - selinux_file_context_homedir_path@LIBSELINUX_1.0 3.1~ - selinux_file_context_local_path@LIBSELINUX_1.0 3.1~ - selinux_file_context_path@LIBSELINUX_1.0 3.1~ - selinux_file_context_subs_dist_path@LIBSELINUX_1.0 3.1~ - selinux_file_context_subs_path@LIBSELINUX_1.0 3.1~ - selinux_file_context_verify@LIBSELINUX_1.0 3.1~ - selinux_flush_class_cache@LIBSELINUX_1.0 3.1~ - selinux_get_callback@LIBSELINUX_1.0 3.1~ - selinux_getenforcemode@LIBSELINUX_1.0 3.1~ - selinux_getpolicytype@LIBSELINUX_1.0 3.1~ - selinux_homedir_context_path@LIBSELINUX_1.0 3.1~ - selinux_init_load_policy@LIBSELINUX_1.0 3.1~ - selinux_lsetfilecon_default@LIBSELINUX_1.0 3.1~ - selinux_lxc_contexts_path@LIBSELINUX_1.0 3.1~ - selinux_media_context_path@LIBSELINUX_1.0 3.1~ - selinux_mkload_policy@LIBSELINUX_1.0 3.1~ - selinux_mnt@LIBSELINUX_1.0 3.1~ - selinux_netfilter_context_path@LIBSELINUX_1.0 3.1~ - selinux_openrc_contexts_path@LIBSELINUX_1.0 3.1~ - selinux_openssh_contexts_path@LIBSELINUX_1.0 3.1~ - selinux_path@LIBSELINUX_1.0 3.1~ - selinux_policy_root@LIBSELINUX_1.0 3.1~ - selinux_raw_context_to_color@LIBSELINUX_1.0 3.1~ - selinux_raw_to_trans_context@LIBSELINUX_1.0 3.1~ - selinux_removable_context_path@LIBSELINUX_1.0 3.1~ - selinux_reset_config@LIBSELINUX_1.0 3.1~ - selinux_restorecon@LIBSELINUX_1.0 3.1~ - selinux_restorecon_default_handle@LIBSELINUX_1.0 3.1~ - selinux_restorecon_get_skipped_errors@LIBSELINUX_3.4 3.4 - selinux_restorecon_parallel@LIBSELINUX_3.4 3.4 - selinux_restorecon_set_alt_rootpath@LIBSELINUX_1.0 3.1~ - selinux_restorecon_set_exclude_list@LIBSELINUX_1.0 3.1~ - selinux_restorecon_set_sehandle@LIBSELINUX_1.0 3.1~ - selinux_restorecon_xattr@LIBSELINUX_1.0 3.1~ - selinux_securetty_types_path@LIBSELINUX_1.0 3.1~ - selinux_sepgsql_context_path@LIBSELINUX_1.0 3.1~ - selinux_set_callback@LIBSELINUX_1.0 3.1~ - selinux_set_mapping@LIBSELINUX_1.0 3.1~ - selinux_set_policy_root@LIBSELINUX_1.0 3.1~ - selinux_snapperd_contexts_path@LIBSELINUX_1.0 3.1~ - selinux_status_close@LIBSELINUX_1.0 3.1~ - selinux_status_deny_unknown@LIBSELINUX_1.0 3.1~ - selinux_status_getenforce@LIBSELINUX_1.0 3.1~ - selinux_status_open@LIBSELINUX_1.0 3.1~ - selinux_status_policyload@LIBSELINUX_1.0 3.1~ - selinux_status_updated@LIBSELINUX_1.0 3.1~ - selinux_systemd_contexts_path@LIBSELINUX_1.0 3.1~ - selinux_trans_to_raw_context@LIBSELINUX_1.0 3.1~ - selinux_translations_path@LIBSELINUX_1.0 3.1~ - selinux_user_contexts_path@LIBSELINUX_1.0 3.1~ - selinux_users_path@LIBSELINUX_1.0 3.1~ - selinux_usersconf_path@LIBSELINUX_1.0 3.1~ - selinux_virtual_domain_context_path@LIBSELINUX_1.0 3.1~ - selinux_virtual_image_context_path@LIBSELINUX_1.0 3.1~ - selinux_x_context_path@LIBSELINUX_1.0 3.1~ - selinuxfs_exists@LIBSELINUX_1.0 3.1~ - set_matchpathcon_canoncon@LIBSELINUX_1.0 3.1~ - set_matchpathcon_flags@LIBSELINUX_1.0 3.1~ - set_matchpathcon_invalidcon@LIBSELINUX_1.0 3.1~ - set_matchpathcon_printf@LIBSELINUX_1.0 3.1~ - set_selinuxmnt@LIBSELINUX_1.0 3.1~ - setcon@LIBSELINUX_1.0 3.1~ - setcon_raw@LIBSELINUX_1.0 3.1~ - setexeccon@LIBSELINUX_1.0 3.1~ - setexeccon_raw@LIBSELINUX_1.0 3.1~ - setexecfilecon@LIBSELINUX_1.0 3.1~ - setfilecon@LIBSELINUX_1.0 3.1~ - setfilecon_raw@LIBSELINUX_1.0 3.1~ - setfscreatecon@LIBSELINUX_1.0 3.1~ - setfscreatecon_raw@LIBSELINUX_1.0 3.1~ - setkeycreatecon@LIBSELINUX_1.0 3.1~ - setkeycreatecon_raw@LIBSELINUX_1.0 3.1~ - setsockcreatecon@LIBSELINUX_1.0 3.1~ - setsockcreatecon_raw@LIBSELINUX_1.0 3.1~ - sidget@LIBSELINUX_1.0 3.1~ - sidput@LIBSELINUX_1.0 3.1~ - string_to_av_perm@LIBSELINUX_1.0 3.1~ - string_to_security_class@LIBSELINUX_1.0 3.1~ diff -Nru libselinux-3.5/debian/libselinux1.tmpfiles libselinux-3.5/debian/libselinux1.tmpfiles --- libselinux-3.5/debian/libselinux1.tmpfiles 2024-01-24 20:23:37.000000000 +0000 +++ libselinux-3.5/debian/libselinux1.tmpfiles 1970-01-01 00:00:00.000000000 +0000 @@ -1,4 +0,0 @@ -# See tmpfiles.d(5) for details - -# Type Path Mode UID GID Age Argument -d /run/setrans 0755 root root - - diff -Nru libselinux-3.5/debian/libselinux1t64.install libselinux-3.5/debian/libselinux1t64.install --- libselinux-3.5/debian/libselinux1t64.install 1970-01-01 00:00:00.000000000 +0000 +++ libselinux-3.5/debian/libselinux1t64.install 2024-01-24 20:23:37.000000000 +0000 @@ -0,0 +1 @@ +usr/lib/*/*.so.* diff -Nru libselinux-3.5/debian/libselinux1t64.lintian-overrides libselinux-3.5/debian/libselinux1t64.lintian-overrides --- libselinux-3.5/debian/libselinux1t64.lintian-overrides 1970-01-01 00:00:00.000000000 +0000 +++ libselinux-3.5/debian/libselinux1t64.lintian-overrides 2024-02-05 08:22:28.000000000 +0000 @@ -0,0 +1 @@ +libselinux1t64: package-name-doesnt-match-sonames libselinux1 diff -Nru libselinux-3.5/debian/libselinux1t64.symbols libselinux-3.5/debian/libselinux1t64.symbols --- libselinux-3.5/debian/libselinux1t64.symbols 1970-01-01 00:00:00.000000000 +0000 +++ libselinux-3.5/debian/libselinux1t64.symbols 2024-02-05 08:22:28.000000000 +0000 @@ -0,0 +1,246 @@ +libselinux.so.1 libselinux1t64 #MINVER# +* Build-Depends-Package: libselinux1-dev + LIBSELINUX_1.0@LIBSELINUX_1.0 3.1~ + LIBSELINUX_3.4@LIBSELINUX_3.4 3.4 + LIBSELINUX_3.5@LIBSELINUX_3.5 3.5 + avc_add_callback@LIBSELINUX_1.0 3.1~ + avc_audit@LIBSELINUX_1.0 3.1~ + avc_av_stats@LIBSELINUX_1.0 3.1~ + avc_cache_stats@LIBSELINUX_1.0 3.1~ + avc_cleanup@LIBSELINUX_1.0 3.1~ + avc_compute_create@LIBSELINUX_1.0 3.1~ + avc_compute_member@LIBSELINUX_1.0 3.1~ + avc_context_to_sid@LIBSELINUX_1.0 3.1~ + avc_context_to_sid_raw@LIBSELINUX_1.0 3.1~ + avc_destroy@LIBSELINUX_1.0 3.1~ + avc_get_initial_sid@LIBSELINUX_1.0 3.1~ + avc_has_perm@LIBSELINUX_1.0 3.1~ + avc_has_perm_noaudit@LIBSELINUX_1.0 3.1~ + avc_init@LIBSELINUX_1.0 3.1~ + avc_netlink_acquire_fd@LIBSELINUX_1.0 3.1~ + avc_netlink_check_nb@LIBSELINUX_1.0 3.1~ + avc_netlink_close@LIBSELINUX_1.0 3.1~ + avc_netlink_loop@LIBSELINUX_1.0 3.1~ + avc_netlink_open@LIBSELINUX_1.0 3.1~ + avc_netlink_release_fd@LIBSELINUX_1.0 3.1~ + avc_open@LIBSELINUX_1.0 3.1~ + avc_reset@LIBSELINUX_1.0 3.1~ + avc_sid_stats@LIBSELINUX_1.0 3.1~ + avc_sid_to_context@LIBSELINUX_1.0 3.1~ + avc_sid_to_context_raw@LIBSELINUX_1.0 3.1~ + checkPasswdAccess@LIBSELINUX_1.0 3.1~ + context_free@LIBSELINUX_1.0 3.1~ + context_new@LIBSELINUX_1.0 3.1~ + context_range_get@LIBSELINUX_1.0 3.1~ + context_range_set@LIBSELINUX_1.0 3.1~ + context_role_get@LIBSELINUX_1.0 3.1~ + context_role_set@LIBSELINUX_1.0 3.1~ + context_str@LIBSELINUX_1.0 3.1~ + context_type_get@LIBSELINUX_1.0 3.1~ + context_type_set@LIBSELINUX_1.0 3.1~ + context_user_get@LIBSELINUX_1.0 3.1~ + context_user_set@LIBSELINUX_1.0 3.1~ + fgetfilecon@LIBSELINUX_1.0 3.1~ + fini_selinuxmnt@LIBSELINUX_1.0 3.1~ + fgetfilecon_raw@LIBSELINUX_1.0 3.1~ + freecon@LIBSELINUX_1.0 3.1~ + freeconary@LIBSELINUX_1.0 3.1~ + fsetfilecon@LIBSELINUX_1.0 3.1~ + fsetfilecon_raw@LIBSELINUX_1.0 3.1~ + get_default_context@LIBSELINUX_1.0 3.1~ + get_default_context_with_level@LIBSELINUX_1.0 3.1~ + get_default_context_with_role@LIBSELINUX_1.0 3.1~ + get_default_context_with_rolelevel@LIBSELINUX_1.0 3.1~ + get_default_type@LIBSELINUX_1.0 3.1~ + get_ordered_context_list@LIBSELINUX_1.0 3.1~ + get_ordered_context_list_with_level@LIBSELINUX_1.0 3.1~ + getcon@LIBSELINUX_1.0 3.1~ + getcon_raw@LIBSELINUX_1.0 3.1~ + getexeccon@LIBSELINUX_1.0 3.1~ + getexeccon_raw@LIBSELINUX_1.0 3.1~ + getfilecon@LIBSELINUX_1.0 3.1~ + getfilecon_raw@LIBSELINUX_1.0 3.1~ + getfscreatecon@LIBSELINUX_1.0 3.1~ + getfscreatecon_raw@LIBSELINUX_1.0 3.1~ + getkeycreatecon@LIBSELINUX_1.0 3.1~ + getkeycreatecon_raw@LIBSELINUX_1.0 3.1~ + getpeercon@LIBSELINUX_1.0 3.1~ + getpeercon_raw@LIBSELINUX_1.0 3.1~ + getpidcon@LIBSELINUX_1.0 3.1~ + getpidcon_raw@LIBSELINUX_1.0 3.1~ + getpidprevcon@LIBSELINUX_3.5 3.5 + getpidprevcon_raw@LIBSELINUX_3.5 3.5 + getprevcon@LIBSELINUX_1.0 3.1~ + getprevcon_raw@LIBSELINUX_1.0 3.1~ + getseuser@LIBSELINUX_1.0 3.1~ + getseuserbyname@LIBSELINUX_1.0 3.1~ + getsockcreatecon@LIBSELINUX_1.0 3.1~ + getsockcreatecon_raw@LIBSELINUX_1.0 3.1~ + is_context_customizable@LIBSELINUX_1.0 3.1~ + is_selinux_enabled@LIBSELINUX_1.0 3.1~ + is_selinux_mls_enabled@LIBSELINUX_1.0 3.1~ + lgetfilecon@LIBSELINUX_1.0 3.1~ + lgetfilecon_raw@LIBSELINUX_1.0 3.1~ + lsetfilecon@LIBSELINUX_1.0 3.1~ + lsetfilecon_raw@LIBSELINUX_1.0 3.1~ + manual_user_enter_context@LIBSELINUX_1.0 3.1~ + matchmediacon@LIBSELINUX_1.0 3.1~ + matchpathcon@LIBSELINUX_1.0 3.1~ + matchpathcon_checkmatches@LIBSELINUX_1.0 3.1~ + matchpathcon_filespec_add@LIBSELINUX_1.0 3.1~ + matchpathcon_filespec_destroy@LIBSELINUX_1.0 3.1~ + matchpathcon_filespec_eval@LIBSELINUX_1.0 3.1~ + matchpathcon_fini@LIBSELINUX_1.0 3.1~ + matchpathcon_index@LIBSELINUX_1.0 3.1~ + matchpathcon_init@LIBSELINUX_1.0 3.1~ + matchpathcon_init_prefix@LIBSELINUX_1.0 3.1~ + mode_to_security_class@LIBSELINUX_1.0 3.1~ + print_access_vector@LIBSELINUX_1.0 3.1~ + query_user_context@LIBSELINUX_1.0 3.1~ + realpath_not_final@LIBSELINUX_1.0 3.1~ + rpm_execcon@LIBSELINUX_1.0 3.1~ + security_av_perm_to_string@LIBSELINUX_1.0 3.1~ + security_av_string@LIBSELINUX_1.0 3.1~ + security_canonicalize_context@LIBSELINUX_1.0 3.1~ + security_canonicalize_context_raw@LIBSELINUX_1.0 3.1~ + security_check_context@LIBSELINUX_1.0 3.1~ + security_check_context_raw@LIBSELINUX_1.0 3.1~ + security_class_to_string@LIBSELINUX_1.0 3.1~ + security_commit_booleans@LIBSELINUX_1.0 3.1~ + security_compute_av@LIBSELINUX_1.0 3.1~ + security_compute_av_flags@LIBSELINUX_1.0 3.1~ + security_compute_av_flags_raw@LIBSELINUX_1.0 3.1~ + security_compute_av_raw@LIBSELINUX_1.0 3.1~ + security_compute_create@LIBSELINUX_1.0 3.1~ + security_compute_create_name@LIBSELINUX_1.0 3.1~ + security_compute_create_name_raw@LIBSELINUX_1.0 3.1~ + security_compute_create_raw@LIBSELINUX_1.0 3.1~ + security_compute_member@LIBSELINUX_1.0 3.1~ + security_compute_member_raw@LIBSELINUX_1.0 3.1~ + security_compute_relabel@LIBSELINUX_1.0 3.1~ + security_compute_relabel_raw@LIBSELINUX_1.0 3.1~ + security_compute_user@LIBSELINUX_1.0 3.1~ + security_compute_user_raw@LIBSELINUX_1.0 3.1~ + security_deny_unknown@LIBSELINUX_1.0 3.1~ + security_disable@LIBSELINUX_1.0 3.1~ + security_get_boolean_active@LIBSELINUX_1.0 3.1~ + security_get_boolean_names@LIBSELINUX_1.0 3.1~ + security_get_boolean_pending@LIBSELINUX_1.0 3.1~ + security_get_checkreqprot@LIBSELINUX_1.0 3.1~ + security_get_initial_context@LIBSELINUX_1.0 3.1~ + security_get_initial_context_raw@LIBSELINUX_1.0 3.1~ + security_getenforce@LIBSELINUX_1.0 3.1~ + security_load_booleans@LIBSELINUX_1.0 3.1~ + security_load_policy@LIBSELINUX_1.0 3.1~ + security_policyvers@LIBSELINUX_1.0 3.1~ + security_reject_unknown@LIBSELINUX_1.0 3.1~ + security_set_boolean@LIBSELINUX_1.0 3.1~ + security_set_boolean_list@LIBSELINUX_1.0 3.1~ + security_setenforce@LIBSELINUX_1.0 3.1~ + security_validatetrans@LIBSELINUX_1.0 3.1~ + security_validatetrans_raw@LIBSELINUX_1.0 3.1~ + selabel_close@LIBSELINUX_1.0 3.1~ + selabel_cmp@LIBSELINUX_1.0 3.1~ + selabel_digest@LIBSELINUX_1.0 3.1~ + selabel_get_digests_all_partial_matches@LIBSELINUX_1.0 3.1~ + selabel_hash_all_partial_matches@LIBSELINUX_1.0 3.1~ + selabel_lookup@LIBSELINUX_1.0 3.1~ + selabel_lookup_best_match@LIBSELINUX_1.0 3.1~ + selabel_lookup_best_match_raw@LIBSELINUX_1.0 3.1~ + selabel_lookup_raw@LIBSELINUX_1.0 3.1~ + selabel_open@LIBSELINUX_1.0 3.1~ + selabel_partial_match@LIBSELINUX_1.0 3.1~ + selabel_stats@LIBSELINUX_1.0 3.1~ + selinux_binary_policy_path@LIBSELINUX_1.0 3.1~ + selinux_boolean_sub@LIBSELINUX_1.0 3.1~ + selinux_booleans_path@LIBSELINUX_1.0 3.1~ + selinux_booleans_subs_path@LIBSELINUX_1.0 3.1~ + selinux_check_access@LIBSELINUX_1.0 3.1~ + selinux_check_passwd_access@LIBSELINUX_1.0 3.1~ + selinux_check_securetty_context@LIBSELINUX_1.0 3.1~ + selinux_colors_path@LIBSELINUX_1.0 3.1~ + selinux_contexts_path@LIBSELINUX_1.0 3.1~ + selinux_current_policy_path@LIBSELINUX_1.0 3.1~ + selinux_customizable_types_path@LIBSELINUX_1.0 3.1~ + selinux_default_context_path@LIBSELINUX_1.0 3.1~ + selinux_default_type_path@LIBSELINUX_1.0 3.1~ + selinux_failsafe_context_path@LIBSELINUX_1.0 3.1~ + selinux_file_context_cmp@LIBSELINUX_1.0 3.1~ + selinux_file_context_homedir_path@LIBSELINUX_1.0 3.1~ + selinux_file_context_local_path@LIBSELINUX_1.0 3.1~ + selinux_file_context_path@LIBSELINUX_1.0 3.1~ + selinux_file_context_subs_dist_path@LIBSELINUX_1.0 3.1~ + selinux_file_context_subs_path@LIBSELINUX_1.0 3.1~ + selinux_file_context_verify@LIBSELINUX_1.0 3.1~ + selinux_flush_class_cache@LIBSELINUX_1.0 3.1~ + selinux_get_callback@LIBSELINUX_1.0 3.1~ + selinux_getenforcemode@LIBSELINUX_1.0 3.1~ + selinux_getpolicytype@LIBSELINUX_1.0 3.1~ + selinux_homedir_context_path@LIBSELINUX_1.0 3.1~ + selinux_init_load_policy@LIBSELINUX_1.0 3.1~ + selinux_lsetfilecon_default@LIBSELINUX_1.0 3.1~ + selinux_lxc_contexts_path@LIBSELINUX_1.0 3.1~ + selinux_media_context_path@LIBSELINUX_1.0 3.1~ + selinux_mkload_policy@LIBSELINUX_1.0 3.1~ + selinux_mnt@LIBSELINUX_1.0 3.1~ + selinux_netfilter_context_path@LIBSELINUX_1.0 3.1~ + selinux_openrc_contexts_path@LIBSELINUX_1.0 3.1~ + selinux_openssh_contexts_path@LIBSELINUX_1.0 3.1~ + selinux_path@LIBSELINUX_1.0 3.1~ + selinux_policy_root@LIBSELINUX_1.0 3.1~ + selinux_raw_context_to_color@LIBSELINUX_1.0 3.1~ + selinux_raw_to_trans_context@LIBSELINUX_1.0 3.1~ + selinux_removable_context_path@LIBSELINUX_1.0 3.1~ + selinux_reset_config@LIBSELINUX_1.0 3.1~ + selinux_restorecon@LIBSELINUX_1.0 3.1~ + selinux_restorecon_default_handle@LIBSELINUX_1.0 3.1~ + selinux_restorecon_get_skipped_errors@LIBSELINUX_3.4 3.4 + selinux_restorecon_parallel@LIBSELINUX_3.4 3.4 + selinux_restorecon_set_alt_rootpath@LIBSELINUX_1.0 3.1~ + selinux_restorecon_set_exclude_list@LIBSELINUX_1.0 3.1~ + selinux_restorecon_set_sehandle@LIBSELINUX_1.0 3.1~ + selinux_restorecon_xattr@LIBSELINUX_1.0 3.1~ + selinux_securetty_types_path@LIBSELINUX_1.0 3.1~ + selinux_sepgsql_context_path@LIBSELINUX_1.0 3.1~ + selinux_set_callback@LIBSELINUX_1.0 3.1~ + selinux_set_mapping@LIBSELINUX_1.0 3.1~ + selinux_set_policy_root@LIBSELINUX_1.0 3.1~ + selinux_snapperd_contexts_path@LIBSELINUX_1.0 3.1~ + selinux_status_close@LIBSELINUX_1.0 3.1~ + selinux_status_deny_unknown@LIBSELINUX_1.0 3.1~ + selinux_status_getenforce@LIBSELINUX_1.0 3.1~ + selinux_status_open@LIBSELINUX_1.0 3.1~ + selinux_status_policyload@LIBSELINUX_1.0 3.1~ + selinux_status_updated@LIBSELINUX_1.0 3.1~ + selinux_systemd_contexts_path@LIBSELINUX_1.0 3.1~ + selinux_trans_to_raw_context@LIBSELINUX_1.0 3.1~ + selinux_translations_path@LIBSELINUX_1.0 3.1~ + selinux_user_contexts_path@LIBSELINUX_1.0 3.1~ + selinux_users_path@LIBSELINUX_1.0 3.1~ + selinux_usersconf_path@LIBSELINUX_1.0 3.1~ + selinux_virtual_domain_context_path@LIBSELINUX_1.0 3.1~ + selinux_virtual_image_context_path@LIBSELINUX_1.0 3.1~ + selinux_x_context_path@LIBSELINUX_1.0 3.1~ + selinuxfs_exists@LIBSELINUX_1.0 3.1~ + set_matchpathcon_canoncon@LIBSELINUX_1.0 3.1~ + set_matchpathcon_flags@LIBSELINUX_1.0 3.1~ + set_matchpathcon_invalidcon@LIBSELINUX_1.0 3.1~ + set_matchpathcon_printf@LIBSELINUX_1.0 3.1~ + set_selinuxmnt@LIBSELINUX_1.0 3.1~ + setcon@LIBSELINUX_1.0 3.1~ + setcon_raw@LIBSELINUX_1.0 3.1~ + setexeccon@LIBSELINUX_1.0 3.1~ + setexeccon_raw@LIBSELINUX_1.0 3.1~ + setexecfilecon@LIBSELINUX_1.0 3.1~ + setfilecon@LIBSELINUX_1.0 3.1~ + setfilecon_raw@LIBSELINUX_1.0 3.1~ + setfscreatecon@LIBSELINUX_1.0 3.1~ + setfscreatecon_raw@LIBSELINUX_1.0 3.1~ + setkeycreatecon@LIBSELINUX_1.0 3.1~ + setkeycreatecon_raw@LIBSELINUX_1.0 3.1~ + setsockcreatecon@LIBSELINUX_1.0 3.1~ + setsockcreatecon_raw@LIBSELINUX_1.0 3.1~ + sidget@LIBSELINUX_1.0 3.1~ + sidput@LIBSELINUX_1.0 3.1~ + string_to_av_perm@LIBSELINUX_1.0 3.1~ + string_to_security_class@LIBSELINUX_1.0 3.1~ diff -Nru libselinux-3.5/debian/libselinux1t64.tmpfiles libselinux-3.5/debian/libselinux1t64.tmpfiles --- libselinux-3.5/debian/libselinux1t64.tmpfiles 1970-01-01 00:00:00.000000000 +0000 +++ libselinux-3.5/debian/libselinux1t64.tmpfiles 2024-01-24 20:23:37.000000000 +0000 @@ -0,0 +1,4 @@ +# See tmpfiles.d(5) for details + +# Type Path Mode UID GID Age Argument +d /run/setrans 0755 root root - - diff -Nru libselinux-3.5/debian/rules libselinux-3.5/debian/rules --- libselinux-3.5/debian/rules 2024-01-24 20:23:37.000000000 +0000 +++ libselinux-3.5/debian/rules 2024-02-05 08:22:28.000000000 +0000 @@ -95,5 +95,5 @@ dh_gencontrol -- -VBuilt-Using="$(BUILT_USING)" override_dh_makeshlibs: - dh_makeshlibs -plibselinux1 --add-udeb="libselinux1-udeb" -V + dh_makeshlibs -plibselinux1t64 --add-udeb="libselinux1-udeb" -V dh_makeshlibs --remaining-packages