[DSE-Dev] refpolicy_2.20140421-7_amd64.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Sun Oct 12 23:19:08 UTC 2014



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 13 Oct 2014 09:41:44 +1100
Source: refpolicy
Binary: selinux-policy-default selinux-policy-mls selinux-policy-src selinux-policy-dev selinux-policy-doc
Architecture: source all
Version: 2:2.20140421-7
Distribution: unstable
Urgency: medium
Maintainer: Debian SELinux maintainers <selinux-devel at lists.alioth.debian.org>
Changed-By: Russell Coker <russell at coker.com.au>
Description:
 selinux-policy-default - Strict and Targeted variants of the SELinux policy
 selinux-policy-dev - Headers from the SELinux reference policy for building modules
 selinux-policy-doc - Documentation for the SELinux reference policy
 selinux-policy-mls - MLS (Multi Level Security) variant of the SELinux policy
 selinux-policy-src - Source of the SELinux reference policy for customization
Changes:
 refpolicy (2:2.20140421-7) unstable; urgency=medium
 .
   * Label /run/systemd/journal/dev-log and /run/systemd/journal/stdout as
     devlog_t
   * Allow bootloadter_t to load kernel modules and run apt-cache
   * Allow systemd_cgroups_t to read /proc/cmdline
   * Allow sshd net_admin capability
   * Allow systemd_logind_t to read kernel sysctls, list tmpfs, and mount on
     /var/auth, and systemd_unit_file_t:service stop.
   * Allow dpkg_script_t to restart systemd unit files of type init_var_run_t
   * Allow local_login_t and user_t to talk to systemd_logind via dbus
   * Allow user_ssh_agent_t to read/write it's own fifo files
   * Allow user_t to talk to gconfd_t via dbus
   * Allow gpg_agent_t to send sigchld to xdm_t, to be a system dbus client,
     to use nsswitch, and to read user xauth file
   * Allow $1_dbusd_t domains systemd_login_read_pid_files access
   * Remove gpg_helper_t, merge gpg_pinentry_t with the main gpg domain, and
     create user_gpg_t, staff_gpg_t, etc.
   * Allow userdomains to talk to kerneloops via dbus
   * Allow sysstat_t to search all mountpoints
   * Allow udev_t self:netlink_route_socket nlmsg_write for interface rename
   * Allow systemd_tmpfiles_t to read kernel sysctls for boot_id
   * Allow setfiles_t to read /dev/urandom
   * Label /var/run/blkid as etc_runtime_t
 .
   * TLDR: Make everything work with latest systemd and allow KDE login with
     latest X11 configuration.
Checksums-Sha1:
 1dadceb4f922aa3a897a6874e5a66838abe93809 1758 refpolicy_2.20140421-7.dsc
 ab940c7f1d4427b30cf39d2173952ca0ff29182b 78900 refpolicy_2.20140421-7.debian.tar.xz
 05ba67bd9029b6d9b2517ddaa7de22ee066dd117 2823320 selinux-policy-default_2.20140421-7_all.deb
 fd59dbb88c41715a78b50eb8d369be98c150afbe 2879542 selinux-policy-mls_2.20140421-7_all.deb
 dcf4298563a3cfd7e2d0ffd1a8a04525f9e7d1cb 1199600 selinux-policy-src_2.20140421-7_all.deb
 a25f4943980c8e59700e646f42ab9097b18a41bf 438878 selinux-policy-dev_2.20140421-7_all.deb
 3e884b802abe986caaf5008d62f95d8dd9c4ad49 415196 selinux-policy-doc_2.20140421-7_all.deb
Checksums-Sha256:
 264020fb6312a8a1a39bebcb2430cc22539eb90708aeb402e6447c0581f328f7 1758 refpolicy_2.20140421-7.dsc
 ba7e1b14d1d9524758cba1f540d6f10f1929c858b2d5788a9a4c6302c75044c6 78900 refpolicy_2.20140421-7.debian.tar.xz
 f84001ac58673957710bc0e6a64969647c88dec3591e4ee277dd43affc73ea49 2823320 selinux-policy-default_2.20140421-7_all.deb
 6d616911cec06a87c795d927753eea4a09139854df8746b01c64ba1eb1faeaf4 2879542 selinux-policy-mls_2.20140421-7_all.deb
 e3b31ccb77ac9ab1748e236055f8fc3615a8c7daadc76580c4dee87b75e59971 1199600 selinux-policy-src_2.20140421-7_all.deb
 173936f0782ade40418d4cb2a055dda97e84c7254eae1c1d50e1d09c4ea2e932 438878 selinux-policy-dev_2.20140421-7_all.deb
 4251b7111b7ef5fa2f52b3af21e1ca207ea20e7121a1be5001beb72fd11cc6c0 415196 selinux-policy-doc_2.20140421-7_all.deb
Files:
 d83614223aa3642f3d9d7a2f8371cf6e 1758 admin optional refpolicy_2.20140421-7.dsc
 9497a6e8233fbb09077a1c653b51d3a4 78900 admin optional refpolicy_2.20140421-7.debian.tar.xz
 e975badfeec9988f6780bdaf75797dc5 2823320 admin optional selinux-policy-default_2.20140421-7_all.deb
 f646b98de5b74d78f5e8d1c0603fd095 2879542 admin extra selinux-policy-mls_2.20140421-7_all.deb
 199d03a5be2122c600c8497cf97e1d4a 1199600 admin optional selinux-policy-src_2.20140421-7_all.deb
 90bfcbfc1279cc799f8db0283a032472 438878 admin optional selinux-policy-dev_2.20140421-7_all.deb
 d02246c37472737c3f2615691da46cf3 415196 doc optional selinux-policy-doc_2.20140421-7_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iEYEARECAAYFAlQ7BksACgkQwrB5/PXHUlY01ACgm7wR1kv7QlD+r9KcerDax1XM
2NgAnilZ1FMBQIvk/BF7EtJM6iGLnqRm
=Qwb2
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.



More information about the SELinux-devel mailing list