[DSE-Dev] refpolicy_2.20161023.1-3_amd64.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Wed Dec 21 07:49:20 UTC 2016



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 21 Dec 2016 18:35:33 +1100
Source: refpolicy
Binary: selinux-policy-default selinux-policy-mls selinux-policy-src selinux-policy-dev selinux-policy-doc
Architecture: source all
Version: 2:2.20161023.1-3
Distribution: unstable
Urgency: medium
Maintainer: Debian SELinux maintainers <selinux-devel at lists.alioth.debian.org>
Changed-By: Russell Coker <russell at coker.com.au>
Description:
 selinux-policy-default - Strict and Targeted variants of the SELinux policy
 selinux-policy-dev - Headers from the SELinux reference policy for building modules
 selinux-policy-doc - Documentation for the SELinux reference policy
 selinux-policy-mls - MLS (Multi Level Security) variant of the SELinux policy
 selinux-policy-src - Source of the SELinux reference policy for customization
Changes:
 refpolicy (2:2.20161023.1-3) unstable; urgency=medium
 .
   * Allow ntpd_t to create sockets.
   * Allow systemd_hostnamed_t and systemd_logind_t to talk to NetworkManager_t
     via dbus.
   * Allow systemd_backlight_t to send syslog messages, read sysfs, read etc_t
     files, read init state, read udev_var_run_t files (udev data).
   * Allow systemd_machined_t to send messages to init_t and initrc_t via dbus,
     connect to the system dbus, read etc_t files, and start and stop init_var_run_t services and init_t system
   * Allow systemd_logind_t to talk to devicekit_power_t and unconfined_t over
     dbus
   * Allow systemd_tmpfiles_t to read proc_net_t
   * Use /sbin/ldconfig instead of /sbin/ldconfig.real
   * Give devicekit_disk_t wake_alarm capability
   * Write policy for systemd_coredump_t
   * Allow systemd_logind_t to read xdm_t files for XDM state and talk to xdm
     via dbus.
   * Change /lib/systemd/systemd-cryptsetup to
     /usr/lib/systemd/systemd-cryptsetup so file_contexts.subs_dist doesn't
     cause the wrong name to match. Allow lvm_t to load modules for
     systemd-cryptsetup
   * Allow mon_local_test_t to stat gpmctl_t socket. Generally allow the local
     tests to access most things that can't do any harm.
   * Allow systemd_passwd_agent_t to use getty_t fds and read init state.
   * Allow unconfined domains to start and stop etc_t units
Checksums-Sha1:
 ebd1ab07a017a45f084b51013d7d5c77ac168fed 2459 refpolicy_2.20161023.1-3.dsc
 b66dcd7adf6b5b37607ddb83317703994a4c9ca9 91092 refpolicy_2.20161023.1-3.debian.tar.xz
 c21b72b160012eacb7039efa2ff3a12e7c2f7a3d 6807 refpolicy_2.20161023.1-3_amd64.buildinfo
 17a4c0cab2accb26299258a684433c959c28b3f8 3012274 selinux-policy-default_2.20161023.1-3_all.deb
 7be3b6a42e08085a52c14e61f19c0eca8ba22d87 463038 selinux-policy-dev_2.20161023.1-3_all.deb
 14898bb963b4c0d18d8ee7c446c310630546d134 443968 selinux-policy-doc_2.20161023.1-3_all.deb
 ed2c76dfb4f66addf9b12f191eb5d39a4fc77bf6 3049396 selinux-policy-mls_2.20161023.1-3_all.deb
 cfff194d9c136f9d4212550fab71c757febff310 1254840 selinux-policy-src_2.20161023.1-3_all.deb
Checksums-Sha256:
 80f100fcc4ff1470269cc7541dd463a2392733e326fee030d3af09781464566e 2459 refpolicy_2.20161023.1-3.dsc
 2fff57d5edfe04114be55cc190d4c01b38ac12dd4168c8c9e3495b6d537b1a32 91092 refpolicy_2.20161023.1-3.debian.tar.xz
 05dd6d87dd198eb0eeba3f95ffce444174ebfc7ebfcb7c83e54900c05c4cade3 6807 refpolicy_2.20161023.1-3_amd64.buildinfo
 3b835cf465addfc194dc182ae9a42161cb23db99e62af15e638c1750ffdcbc6d 3012274 selinux-policy-default_2.20161023.1-3_all.deb
 8459e392c1763ecb4a48ff4f097fb84fa41db82ebf13783063a7c2fe01ca726b 463038 selinux-policy-dev_2.20161023.1-3_all.deb
 ef850518057cfc0572a01abc689d3643d1b1f9c3dea13a3b0b7975515df1d91c 443968 selinux-policy-doc_2.20161023.1-3_all.deb
 03d93dd0f38767916fdf752d0c9ef5aba5ad474502a94b9fb5749e11043a2bd8 3049396 selinux-policy-mls_2.20161023.1-3_all.deb
 8aaf51eb801c3704f5725cac1877ae3d88d8b77b211affcd537d0fe118389f48 1254840 selinux-policy-src_2.20161023.1-3_all.deb
Files:
 7f123722a6ae6da71405bc68190c40fc 2459 admin optional refpolicy_2.20161023.1-3.dsc
 708cdea682dde0f796c2c4482e6c9e35 91092 admin optional refpolicy_2.20161023.1-3.debian.tar.xz
 2a2d66228771ecca60c3e3506bcd669b 6807 admin optional refpolicy_2.20161023.1-3_amd64.buildinfo
 715f23150c2597037f062e17306744da 3012274 admin optional selinux-policy-default_2.20161023.1-3_all.deb
 2b670b96b9cccd80a0c95cc4f729d411 463038 admin optional selinux-policy-dev_2.20161023.1-3_all.deb
 e0523324fb62615ca056f80af2e9755a 443968 doc optional selinux-policy-doc_2.20161023.1-3_all.deb
 51bd2b34003786ef16a1a212e5b5ffb5 3049396 admin extra selinux-policy-mls_2.20161023.1-3_all.deb
 118d459e71a1517d4c72bb00048c09c4 1254840 admin optional selinux-policy-src_2.20161023.1-3_all.deb

-----BEGIN PGP SIGNATURE-----
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=MVMm
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.



More information about the SELinux-devel mailing list