[DSE-Dev] refpolicy_2.20140421-5_amd64.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Thu Aug 14 03:35:55 UTC 2014



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 03 Jul 2014 20:45:34 +1000
Source: refpolicy
Binary: selinux-policy-default selinux-policy-mls selinux-policy-src selinux-policy-dev selinux-policy-doc
Architecture: source all
Version: 2:2.20140421-5
Distribution: unstable
Urgency: medium
Maintainer: Debian SELinux maintainers <selinux-devel at lists.alioth.debian.org>
Changed-By: Russell Coker <russell at coker.com.au>
Description:
 selinux-policy-default - Strict and Targeted variants of the SELinux policy
 selinux-policy-dev - Headers from the SELinux reference policy for building modules
 selinux-policy-doc - Documentation for the SELinux reference policy
 selinux-policy-mls - MLS (Multi Level Security) variant of the SELinux policy
 selinux-policy-src - Source of the SELinux reference policy for customization
Changes:
 refpolicy (2:2.20140421-5) unstable; urgency=medium
 .
   * Allow system_cronjob_t to read apt_var_lib_t and ntp_conf_t.
   * Allow init_t to create /dev/log and netlink_audit_socket accesss
   * Allow init_t to manage systemd_passwd_var_run_t links
   * Allow freshclam_t to talk to http_cache_port_t
   * Allow system_cronjob_t to talk to init socket for restarting daemons under
     systemd
   * allow init_t setsched access for (tmpfiles) from systemd
   * Allow dpkg_t to transition to dpkg_script_t when running dpkg_var_lib_t
     (postinst etc scripts)
   * Allow init_t netlink_selinux_socket access for commands like "halt" in
     strict mode
   * Allow initrc_t to perform service operations on init_script_file_type
   * Label /opt/google/chrome/cron/google-chrome bin_t
   * Make Chrome/Chromium run in the correct domain
   * Add domain systemd_cgroups_t for kernel executing
     /lib/systemd/systemd-cgroups-agent
   * Allow dpkg_script_t to read the policy
   * Allow systemd_passwd_agent_t to write to /dev/kmsg and log to syslogd
   * Allow init_t to write to watchdog_device_t for systemd shutdown
   * Allow initrc_t to write net_conf_t for network boot scripts
   * Allow init_t to create var_auth_t directories for systemd
   * Allow initrc_t to read postfix config on Debian
   * Allow initrc_t to talk to init_t via unix sockets
   * Allow init_t to read udev_var_run_t files for systemd to read udev output
   * Allow init_t to read all pidfiles, for systemd
   * Allow postfix_postqueue_t to send sigchld to all userdomains
Checksums-Sha1:
 a28d25758d970bc33bfe8adaaa75e28d5174ac72 1758 refpolicy_2.20140421-5.dsc
 d1c604f9471bb78c66dfddb1de1ab3556b810d61 72524 refpolicy_2.20140421-5.debian.tar.xz
 912053eb911d53e18094c0b33838301a719c6c64 2801078 selinux-policy-default_2.20140421-5_all.deb
 d42ddd74b7d2b5f74840afe2cae8988d1ac686a7 2854038 selinux-policy-mls_2.20140421-5_all.deb
 ca59055ecf067ec6ab4977e6d955bf3b64676c86 1203016 selinux-policy-src_2.20140421-5_all.deb
 43a44f4641746dd50f276f2fb086608c113cb42a 436912 selinux-policy-dev_2.20140421-5_all.deb
 6b586e04d8528365710061c8c5dee025cd1b696e 413964 selinux-policy-doc_2.20140421-5_all.deb
Checksums-Sha256:
 56d1a7842ff2e59c5cbf378477d2559b1f0932db9d81540f0dad5dd37020e5c5 1758 refpolicy_2.20140421-5.dsc
 376487dc6f796be7b1f27046e90db551c2b501314210fe2c045b6aba021dae44 72524 refpolicy_2.20140421-5.debian.tar.xz
 e9a5c29c07240a67815cc58e75530fa2a4222d84c5355769c3d57f22a779f75e 2801078 selinux-policy-default_2.20140421-5_all.deb
 aa0336006dac6b7ddb46e6a0f4601ae17092a1985c9625b3971567d63b948166 2854038 selinux-policy-mls_2.20140421-5_all.deb
 bfa7c1d31ff73c15fbab2bffb4669d561250a53b7563b5cac1509719dd2deffe 1203016 selinux-policy-src_2.20140421-5_all.deb
 d8501b6b91a1605bfa011776a4f849e1919e69121e0574a7964c5791e4677849 436912 selinux-policy-dev_2.20140421-5_all.deb
 c1162096c79b3ae23085f060bad019cd16e347016ed46c3c72650c0963f65d3d 413964 selinux-policy-doc_2.20140421-5_all.deb
Files:
 35bd756bbcb78ab435338bdb2a2ab2a9 2801078 admin optional selinux-policy-default_2.20140421-5_all.deb
 0ff9c77b10415bf77cb1fa8ac84b3b54 2854038 admin extra selinux-policy-mls_2.20140421-5_all.deb
 13b190dad23bfba45bf7c8e169fc6350 1203016 admin optional selinux-policy-src_2.20140421-5_all.deb
 7d9f8ae2b8e0e17022595b83cf683906 436912 admin optional selinux-policy-dev_2.20140421-5_all.deb
 8d4c742a0d0d196c5b0a4090e60d282b 413964 doc optional selinux-policy-doc_2.20140421-5_all.deb
 d73caa7dd655eab753ae30bb69a3f643 1758 admin optional refpolicy_2.20140421-5.dsc
 4c54793831f7bd1751d54289f4a0eb12 72524 admin optional refpolicy_2.20140421-5.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iEYEARECAAYFAlO1NnkACgkQwrB5/PXHUlbQXQCdEjZ2uJALA+Rio6pYr2t9KltM
WjIAnAtAMiLWSLB+6wFe+yc2htYKwaKG
=dyLt
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.



More information about the SELinux-devel mailing list