[DSE-Dev] refpolicy_2.20151208-1_amd64.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Wed Aug 3 01:19:04 UTC 2016



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 03 Aug 2016 10:42:57 +1000
Source: refpolicy
Binary: selinux-policy-default selinux-policy-mls selinux-policy-src selinux-policy-dev selinux-policy-doc
Architecture: source all
Version: 2:2.20151208-1
Distribution: unstable
Urgency: medium
Maintainer: Debian SELinux maintainers <selinux-devel at lists.alioth.debian.org>
Changed-By: Russell Coker <russell at coker.com.au>
Description:
 selinux-policy-default - Strict and Targeted variants of the SELinux policy
 selinux-policy-dev - Headers from the SELinux reference policy for building modules
 selinux-policy-doc - Documentation for the SELinux reference policy
 selinux-policy-mls - MLS (Multi Level Security) variant of the SELinux policy
 selinux-policy-src - Source of the SELinux reference policy for customization
Changes:
 refpolicy (2:2.20151208-1) unstable; urgency=medium
 .
   * Rebase to new upstream
   * Move locallogin, sysadm, udev, and modutils to base
   * Add /lib/systemd to file_contexts.subs_dist and remove duplicate fcontexts
   * Allow unconfined_t to manage all init units
   * Allow dmesg_t and sysadm_t to read /dev/kmsg
   * Label /usr/lib/selinux/hll/pp as bin_t
   * Allow udev_t to create /var/run/network with type net_conf_t
   * Allow auditctl_t to getcap
   * Allow auditd_t setattr on /var/log/audit
   * Allow semanage_t to search policy_src_t dirs for /usr/lib/selinux/hll
   * Label /lib/systemd/libsystemd-shared-.*.so as lib_t
   * Allow systemd_tmpfiles_t and systemd_cgroups_t to read /proc/1/environ
     and /proc/cmdline, and have capability net_admin
   * Allow systemd_tmpfiles_t to create and relabel var_t directories
   * Allow systemd_cgroups_t to send unix dgrams to init.
   * Label /var/run/alsa as alsa_var_lock_t and use type trans for alsa_t to
     create it
   * Allow syslogd_t to create syslogd_var_run_t dirs for
     /run/systemd/journal/streams/
   * Allow alsa_t to manage directories and lnk_files of type alsa_var_lock_t
     for directories under /run/alsa
 .
   * This policy works well for a VM but is known to not work on bare metal.
     I'll upload a new version that fixes this soon.
Checksums-Sha1:
 8efee66f3dd41ca0d92eb64aaba464e9254a7081 2431 refpolicy_2.20151208-1.dsc
 dd9b288f64cd691f7910cdf419befb24ce323654 698182 refpolicy_2.20151208.orig.tar.bz2
 5cfe6ef0d85768435a934b7f7568a1ecfa65fe27 91664 refpolicy_2.20151208-1.debian.tar.xz
 d200a09e0af0cb089e75249c89f24d9b78006c96 2944566 selinux-policy-default_2.20151208-1_all.deb
 ec25529bd97f73781473ee9db4297b59111bfd0e 452788 selinux-policy-dev_2.20151208-1_all.deb
 ffa6b4e45dc796f8cb202041532e130ece002b26 433120 selinux-policy-doc_2.20151208-1_all.deb
 5bb4dee24e56fbc9a6b252f5f087cc2fd5a7e354 2984058 selinux-policy-mls_2.20151208-1_all.deb
 e54685f0ebbf04ad9adae60cd8edac8c31324e50 1213928 selinux-policy-src_2.20151208-1_all.deb
Checksums-Sha256:
 da3d22bf8b34c44d2ad121f4b695c6ac4d6a683329dd30f02213989d67458716 2431 refpolicy_2.20151208-1.dsc
 2dd2f45a7132137afe8302805c3b7839739759b9ab73dd1815c01afe34ac99de 698182 refpolicy_2.20151208.orig.tar.bz2
 28a68d9318efb42620b3a2d83d1bc3183a29566bab4ca3b5010b8778c6cfe948 91664 refpolicy_2.20151208-1.debian.tar.xz
 c857b6f31d511f1d258d5e75eab848709be8cb4f3a466ae3206f78253cfabad4 2944566 selinux-policy-default_2.20151208-1_all.deb
 cb7030a422750163b6fb44e7c523f35e6ca88f53021bc2f5729a9eef1cf70e55 452788 selinux-policy-dev_2.20151208-1_all.deb
 f3f0e288f77759435e046b54e080ce98436493380e5a59fe9b3be50e3ef0975f 433120 selinux-policy-doc_2.20151208-1_all.deb
 84678b179499dcdfd4b4fcbd7cc0cba60370310cf94811ebeeed963734c06d67 2984058 selinux-policy-mls_2.20151208-1_all.deb
 c0b1d285021155c33c508d95a5da2d24620a7609a5133f1afd97cacc0142c18e 1213928 selinux-policy-src_2.20151208-1_all.deb
Files:
 01e17776d686cb6ce4055baf49a29b8a 2431 admin optional refpolicy_2.20151208-1.dsc
 7b1ca12e9ea0254508391559cb8f2c41 698182 admin optional refpolicy_2.20151208.orig.tar.bz2
 6862c2ab7db4cb06f8336f7861c796cb 91664 admin optional refpolicy_2.20151208-1.debian.tar.xz
 c9ec741fddb0fd8b8da00e44b3054e1e 2944566 admin optional selinux-policy-default_2.20151208-1_all.deb
 b54e6823443da9b55e338506f7f948a4 452788 admin optional selinux-policy-dev_2.20151208-1_all.deb
 4d60d5237b978b67db92f395d4e336e6 433120 doc optional selinux-policy-doc_2.20151208-1_all.deb
 edff651848064f364f5070b30a9f9e2f 2984058 admin extra selinux-policy-mls_2.20151208-1_all.deb
 448a242b71873af19400222b5f599197 1213928 admin optional selinux-policy-src_2.20151208-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=PZrH
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.



More information about the SELinux-devel mailing list