-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 30 Jun 2012 19:19:57 +1000
Source: refpolicy
Binary: selinux-policy-default selinux-policy-mls selinux-policy-src 
selinux-policy-dev selinux-policy-doc
Architecture: source all
Version: 2:2.20110726-9
Distribution: unstable
Urgency: high
Maintainer: Debian SELinux maintainers <selinux-de...@lists.alioth.debian.org>
Changed-By: Russell Coker <russ...@coker.com.au>
Description: 
 selinux-policy-default - Strict and Targeted variants of the SELinux policy
 selinux-policy-dev - Headers from the SELinux reference policy for building 
modules
 selinux-policy-doc - Documentation for the SELinux reference policy
 selinux-policy-mls - MLS (Multi Level Security) variant of the SELinux policy
 selinux-policy-src - Source of the SELinux reference policy for customization
Closes: 678392 679277
Changes: 
 refpolicy (2:2.20110726-9) unstable; urgency=high
 .
   * Enable UBAC as roles aren't useful.  I recommend using only roles user_r
     and unconfined_r and using UBAC (constraining users from sharing files
     between identities) where you would previously have used roles.
   * Made cron jobs run in regular user domains such as unconfined_t and user_t
     Closes: #679277
   * Had the wrong timestamp on the last upload, corrected it for the record.
   * Allow ftpd to create sock_file objects under /var/run for proftpd
   * Change readahead policy to support memlockd.
   * Allow devicekit_power_t, devicekit_disk_t, kerneloops_t, and policykit_t
     to send dbus messages to users.
   * Grant systemd utilities access to selinuxfs so they can correctly label 
directories
     Closes: #678392
   * Assigned type consolekit_var_run_t to /var/run/console(/.*)? because it's
     created and managed by consolekit nowadays.
   * Created tunable allow_ssh_connect_reserved_ports to allow ssh client to
     connect to reserved ports.
   * Correctly label all perdition binaries, give perdition_t dac_override, and
     allow perdition_t to create it's own pid directories.
   * Label /etc/dansguardian as squid_etc_t
   * Allow devicekit_power_t to access acpi device and read udev tables and
     allow devicekit_disk_t to read udev tables.
   * Allow sshd_t to write to fifos inherited from systemd
   * High urgency because we really need to have working cron jobs!!!
   * Removed the postinst code to upgrade from pre-squeeze packages.
Checksums-Sha1: 
 5443578c79f62c55398d57b766ab7358652a202f 1702 refpolicy_2.20110726-9.dsc
 7eb68a563dd802a79007bbae38d3e8f20b2fd71f 204748 
refpolicy_2.20110726-9.debian.tar.gz
 b10d48e9235eefbbfe84e625f9fa1044bd7679f9 4296828 
selinux-policy-default_2.20110726-9_all.deb
 674e6454a2f7cff331df4c02570e12022be6a05e 4337300 
selinux-policy-mls_2.20110726-9_all.deb
 fd611e0e914fa7d04a4cfd7ab28e3994acc5847f 1058068 
selinux-policy-src_2.20110726-9_all.deb
 06d6d8cd93bd8447c43effe5625cca9675f6c572 888388 
selinux-policy-dev_2.20110726-9_all.deb
 c4a68338e95d3947d2fca271a2ff7d4a8d1011a0 518472 
selinux-policy-doc_2.20110726-9_all.deb
Checksums-Sha256: 
 adad55dc0c4c20acc52aa6db1819a23dbbc6c3bb8e67e7e0c02959c9e475b31f 1702 
refpolicy_2.20110726-9.dsc
 200dc23da2d462038a4955ac87ebf2235e95bcdb03c33c8dba1d4f45b870ad87 204748 
refpolicy_2.20110726-9.debian.tar.gz
 1f860b526e2fc9a538a743ccf82ddc9ed9106ebbe71571a281a67c8666773353 4296828 
selinux-policy-default_2.20110726-9_all.deb
 cc471ba95f275ce9f1315846ac7739ed13026022f69ca88eb2ad59fade0f3f3c 4337300 
selinux-policy-mls_2.20110726-9_all.deb
 6db1ad3d95992885d873f0a483f3268dce502bd0c1e625c4ca4951515ec2db5d 1058068 
selinux-policy-src_2.20110726-9_all.deb
 2bab22227d16b1b362e160a9b75bdf589b14d5b9553fa325bd6ae93721cb447a 888388 
selinux-policy-dev_2.20110726-9_all.deb
 eec7463f78f2370278e0e1945c1e5697a7a707ba419c9d63071ccda2f9911971 518472 
selinux-policy-doc_2.20110726-9_all.deb
Files: 
 b7464fa40795bb6182ebde0e697fff5a 1702 admin optional refpolicy_2.20110726-9.dsc
 a8035cf66083be25ea232697d6c32c6e 204748 admin optional 
refpolicy_2.20110726-9.debian.tar.gz
 768335906dfbd7c34b25f6484afb8875 4296828 admin optional 
selinux-policy-default_2.20110726-9_all.deb
 d56488b7c93aeccca7920241c94367fb 4337300 admin extra 
selinux-policy-mls_2.20110726-9_all.deb
 1a5675c480bac0e82ce74c9b3a7aa10b 1058068 admin optional 
selinux-policy-src_2.20110726-9_all.deb
 6f197d9bbbeb644505dc88f1d80f53ef 888388 admin optional 
selinux-policy-dev_2.20110726-9_all.deb
 f04820eb2d9fd8086e3ec018f8107a9a 518472 doc optional 
selinux-policy-doc_2.20110726-9_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAk/uzMIACgkQwrB5/PXHUlbu9QCfYCbJz91/XCy5a0IFH4Ju0FHG
1WEAn04znJL+N4RB+dqgsUFSNF0DG+Ts
=5DgB
-----END PGP SIGNATURE-----


Accepted:
refpolicy_2.20110726-9.debian.tar.gz
  to main/r/refpolicy/refpolicy_2.20110726-9.debian.tar.gz
refpolicy_2.20110726-9.dsc
  to main/r/refpolicy/refpolicy_2.20110726-9.dsc
selinux-policy-default_2.20110726-9_all.deb
  to main/r/refpolicy/selinux-policy-default_2.20110726-9_all.deb
selinux-policy-dev_2.20110726-9_all.deb
  to main/r/refpolicy/selinux-policy-dev_2.20110726-9_all.deb
selinux-policy-doc_2.20110726-9_all.deb
  to main/r/refpolicy/selinux-policy-doc_2.20110726-9_all.deb
selinux-policy-mls_2.20110726-9_all.deb
  to main/r/refpolicy/selinux-policy-mls_2.20110726-9_all.deb
selinux-policy-src_2.20110726-9_all.deb
  to main/r/refpolicy/selinux-policy-src_2.20110726-9_all.deb


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1skvj5-0005pp...@franck.debian.org

Reply via email to