[ubuntu/maverick] refpolicy 2:0.2.20100524-1ubuntu1 (Accepted)

Bhavani Shankar bhavi at ubuntu.com
Wed Jul 7 10:35:25 BST 2010


refpolicy (2:0.2.20100524-1ubuntu1) maverick; urgency=low

  * Merge from debian unstable.  Remaining changes: LP: #602199
    - debian/control: drop "selinux" conflict (Debian bug 576598).

refpolicy (2:0.2.20100524-1) unstable; urgency=low

  * New Upstream release.  This version has had a good deal of testing for
    server use but almost no testing for desktop use.  The usual "Unstable"
    disclaimers apply.

  * Disable UBAC - see http://etbe.coker.com.au/2010/05/26/ubac-selinux-debian/
  * Allow mount_t to read sysfs_t.
  * Allow lvm_t to create semaphores.
  * Allow mount_t and setfiles_t to read/write device_t chr_file.
  * Allow udev to read sym-links in it's config directory.
  * Allow vbetool_t to read inotify directories.
  * Allow gpm_t self signull and signal access.

refpolicy (2:0.2.20091117-3) unstable; urgency=low

  * label Google Chrome as unconfined_execmem_exec_t
  * Change the apache_content_template() macro to not define the type
    httpd_$1_script_exec_t, now the caller must unconditionally define it and
    can therefore use it in it's .fc file without making a .fc dependency.
  * Allow setrans_t to read proc_t files.
  * Allow pppd to load modules.
  * Allow watchdog_t to read/write /dev/watchdog
  * Allow rpcd_t getcap and setcap access.
  * Allow insmod_t to mount a rpc_pipefs_t filesystem.
  * Correctly label kdm.log.* pm-*log* aptitude*
  * Allow consolekit_t to access pam console data.
  * Correctly label consolekit scripts
  * Allow mount_t to set the scheduling for kernel threads.

Date: Tue, 06 Jul 2010 14:26:53 +0530
Changed-By: Bhavani Shankar <bhavi at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Daniel Holbach <daniel.holbach at ubuntu.com>
https://launchpad.net/ubuntu/maverick/+source/refpolicy/2:0.2.20100524-1ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 06 Jul 2010 14:26:53 +0530
Source: refpolicy
Binary: selinux-policy-default selinux-policy-mls selinux-policy-src selinux-policy-dev selinux-policy-doc
Architecture: source
Version: 2:0.2.20100524-1ubuntu1
Distribution: maverick
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Bhavani Shankar <bhavi at ubuntu.com>
Description: 
 selinux-policy-default - Strict and Targeted variants of the SELinux policy
 selinux-policy-dev - Headers from the SELinux reference policy for building modules
 selinux-policy-doc - Documentation for the SELinux reference policy
 selinux-policy-mls - MLS (Multi Level Security) variant of the SELinux policy
 selinux-policy-src - Source of the SELinux reference policy for customization
Launchpad-Bugs-Fixed: 602199
Changes: 
 refpolicy (2:0.2.20100524-1ubuntu1) maverick; urgency=low
 .
   * Merge from debian unstable.  Remaining changes: LP: #602199
     - debian/control: drop "selinux" conflict (Debian bug 576598).
 .
 refpolicy (2:0.2.20100524-1) unstable; urgency=low
 .
   * New Upstream release.  This version has had a good deal of testing for
     server use but almost no testing for desktop use.  The usual "Unstable"
     disclaimers apply.
 .
   * Disable UBAC - see http://etbe.coker.com.au/2010/05/26/ubac-selinux-debian/
   * Allow mount_t to read sysfs_t.
   * Allow lvm_t to create semaphores.
   * Allow mount_t and setfiles_t to read/write device_t chr_file.
   * Allow udev to read sym-links in it's config directory.
   * Allow vbetool_t to read inotify directories.
   * Allow gpm_t self signull and signal access.
 .
 refpolicy (2:0.2.20091117-3) unstable; urgency=low
 .
   * label Google Chrome as unconfined_execmem_exec_t
   * Change the apache_content_template() macro to not define the type
     httpd_$1_script_exec_t, now the caller must unconditionally define it and
     can therefore use it in it's .fc file without making a .fc dependency.
   * Allow setrans_t to read proc_t files.
   * Allow pppd to load modules.
   * Allow watchdog_t to read/write /dev/watchdog
   * Allow rpcd_t getcap and setcap access.
   * Allow insmod_t to mount a rpc_pipefs_t filesystem.
   * Correctly label kdm.log.* pm-*log* aptitude*
   * Allow consolekit_t to access pam console data.
   * Correctly label consolekit scripts
   * Allow mount_t to set the scheduling for kernel threads.
Checksums-Sha1: 
 abcc5d1629c0734318bd991661dd69c0c36d1da3 1621 refpolicy_0.2.20100524-1ubuntu1.dsc
 fbb7aaf78eb543e35225e1624702aadf3dd3c376 781561 refpolicy_0.2.20100524.orig.tar.gz
 7806f5fc67a69e02a92091d31270ceca58c0358d 101471 refpolicy_0.2.20100524-1ubuntu1.diff.gz
Checksums-Sha256: 
 c5bdf930eff36d31017dff66358a550d29996cbb7a001469998519a58650c9b7 1621 refpolicy_0.2.20100524-1ubuntu1.dsc
 de52e2dd7431e04b9061a246431b6f6aeac2b91af5553b2cef22c8cf853f1700 781561 refpolicy_0.2.20100524.orig.tar.gz
 f93c317645793868bff72db89503529be4130808ea7e42fc27e5e58dcc46ba5b 101471 refpolicy_0.2.20100524-1ubuntu1.diff.gz
Files: 
 4e5df42dc3ba7ab5914d27f590a448dd 1621 admin optional refpolicy_0.2.20100524-1ubuntu1.dsc
 bc26268d634b06ffefbd87aff1aeb0b9 781561 admin optional refpolicy_0.2.20100524.orig.tar.gz
 a4b9f1412fe4bf05349bea6f69151131 101471 admin optional refpolicy_0.2.20100524-1ubuntu1.diff.gz
Original-Maintainer: Russell Coker <russell at coker.com.au>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkw0SRgACgkQRjrlnQWd1esXrwCfWQ0ZN6JkecZTbP6GiXMnekGp
MUwAn0zp2ipAeFTW/ogLqM5g2ry5ptPQ
=AXvU
-----END PGP SIGNATURE-----


More information about the Maverick-changes mailing list