Accepted refpolicy 2:0.2.20100524-5 (source all)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Sat, 08 Jan 2011 14:13:43 +1100
Source: refpolicy
Binary: selinux-policy-default selinux-policy-mls selinux-policy-src selinux-policy-dev selinux-policy-doc
Architecture: source all
Version: 2:0.2.20100524-5
Distribution: unstable
Urgency: low
Maintainer: Russell Coker <russell@coker.com.au>
Changed-By: Russell Coker <russell@coker.com.au>
Description:
selinux-policy-default - Strict and Targeted variants of the SELinux policy
selinux-policy-dev - Headers from the SELinux reference policy for building modules
selinux-policy-doc - Documentation for the SELinux reference policy
selinux-policy-mls - MLS (Multi Level Security) variant of the SELinux policy
selinux-policy-src - Source of the SELinux reference policy for customization
Closes: 540143 559860 587596 592038 601686 608291
Changes:
refpolicy (2:0.2.20100524-5) unstable; urgency=low
.
* Label /usr/bin/tcsh as shell_exec_t
* Domain trans from unconfined_t to depmod_t
* Don't include /usr/lib/dovecot/deliver in dovecot.fc/te as it's in lda.pp
* Don't include /usr/sbin/spamass-milter and /var/spool/postfix/spamass in
spamassassin.fc as they are in milter.fc
* Label /var/run/spamass as spamass_milter_data_t
* Allow lvm_t rw access to unconfined_t semaphores.
* Added in_unconfined_r() interface and made postfix user domains use it
so they can be in the role unconfined_r. Ugly but no better solution at
this time
Closes: #592038 #599053
* Include Chromium policy in mozilla.pp
* Allow sshd getcap and setcap access
* Correctly label ~/.xsession-errors
* Allow spamc_t to be in system_r and allow it access to netlink_route_socket
* Allow lda_t to talk to the Courier Authdaemon - for courier maildrop
* Allow fetchmail_t to read usr_t for certificates and to create /tmp files
* Allow cron jobs to write to crond_tmp_t
* Label courier socket files as courier_var_run_t
* Run /usr/sbin/authdaemond as courier_authdaemon_t
* Allow dkim_milter_t to read proc_t files and create /tmp files
* Allow dovecot domains to search dovecot_etc_t dirs
* Allow dovecot_auth_t to talk to mysqld via TCP and read /etc/mysql/my.cnf
* Label /etc/network/run as etc_t
* Label X as spamass_milter_var_run_t
* Remove unconfined_exec_t label from /usr/bin/qemu
Closes: #601686
* Label /usr/lib/apache2/mpm-*/apache2 as httpd_exec_t
Closes: #608291
* Allow nagios.pp to be installed without apache.pp
Closes: #587596
* Removed amavis.pp because it doesn't work and it's functionality is covered
by clamav.pp
Closes: #559860
* Allow mono_t to be in role unconfined_r
Closes: #540143
Checksums-Sha1:
14079cd9b96387f4ba2cb7c8f51dee133ce36dbf 1514 refpolicy_0.2.20100524-5.dsc
4615f8487fa548165d59a2400389ebf06d9573cb 109910 refpolicy_0.2.20100524-5.diff.gz
a3feb2555bfd66bd971bb410e042afb2d51c2819 4159556 selinux-policy-default_0.2.20100524-5_all.deb
eb8d7ef1aba61b4d2d078e2ec763e1d34e945ad5 4195170 selinux-policy-mls_0.2.20100524-5_all.deb
fe7b0ca2c4d8e7361f72afe2920db71673f42f71 991898 selinux-policy-src_0.2.20100524-5_all.deb
c52c70e7e6ba13c369a703c3f5eb745feec3755b 819560 selinux-policy-dev_0.2.20100524-5_all.deb
6dda96f6b043a34eed813fd015e77a9b50589924 574852 selinux-policy-doc_0.2.20100524-5_all.deb
Checksums-Sha256:
77f7ff03e4c47e4114f5218cdf0bdd741abefdfd0a467cd04a68bd0293165aa1 1514 refpolicy_0.2.20100524-5.dsc
74d42e59683992ae82ae3f8a8f8c6b087e94c21c0860a71dc4f2a236cc7b4e86 109910 refpolicy_0.2.20100524-5.diff.gz
8fbc6c0b1ff96c720d1043a622edacbfe16dbe77fed974c2ae317cb6b73b3111 4159556 selinux-policy-default_0.2.20100524-5_all.deb
d61e1327d8df05094220f280d263c4e8e230e791bc05b779d8f3d2dc92ae5cfe 4195170 selinux-policy-mls_0.2.20100524-5_all.deb
ddb76dc3b730ec4ea72eaff7f2df4bba6f0c15fad9dc34e9695922385dbfce61 991898 selinux-policy-src_0.2.20100524-5_all.deb
906436438aba394da1bd58f9af11ef09b22d382ca98f52885a9d366bf2a121b9 819560 selinux-policy-dev_0.2.20100524-5_all.deb
e0600bc1f0f244aec529d9bd22befad080b2abb6e88d39a9539fb2004293cac2 574852 selinux-policy-doc_0.2.20100524-5_all.deb
Files:
7ae1d854b4235cd3dcd3c50494a230f2 1514 admin optional refpolicy_0.2.20100524-5.dsc
3bde8c2206db03cf843a4e4998e4d302 109910 admin optional refpolicy_0.2.20100524-5.diff.gz
4e927d53f6f30059e74b77173c4f0e9d 4159556 admin optional selinux-policy-default_0.2.20100524-5_all.deb
dc0e97eacdb75462f99090ff75760d3d 4195170 admin extra selinux-policy-mls_0.2.20100524-5_all.deb
b46803f30f2f7e8ee42b754f389c7a1a 991898 admin optional selinux-policy-src_0.2.20100524-5_all.deb
c300f0ca0bba44bec4ec0c10caa680c8 819560 admin optional selinux-policy-dev_0.2.20100524-5_all.deb
7a6c2b0cc67ec449314c28993781f9d5 574852 doc optional selinux-policy-doc_0.2.20100524-5_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk0n15IACgkQwrB5/PXHUlbjAACgq/6uRWcUAKiBeGneHxGjg/RB
V/sAn14fIo44yAFx2B7c6/1oUaeVkQm1
=xa7I
-----END PGP SIGNATURE-----
Accepted:
refpolicy_0.2.20100524-5.diff.gz
to main/r/refpolicy/refpolicy_0.2.20100524-5.diff.gz
refpolicy_0.2.20100524-5.dsc
to main/r/refpolicy/refpolicy_0.2.20100524-5.dsc
selinux-policy-default_0.2.20100524-5_all.deb
to main/r/refpolicy/selinux-policy-default_0.2.20100524-5_all.deb
selinux-policy-dev_0.2.20100524-5_all.deb
to main/r/refpolicy/selinux-policy-dev_0.2.20100524-5_all.deb
selinux-policy-doc_0.2.20100524-5_all.deb
to main/r/refpolicy/selinux-policy-doc_0.2.20100524-5_all.deb
selinux-policy-mls_0.2.20100524-5_all.deb
to main/r/refpolicy/selinux-policy-mls_0.2.20100524-5_all.deb
selinux-policy-src_0.2.20100524-5_all.deb
to main/r/refpolicy/selinux-policy-src_0.2.20100524-5_all.deb
Reply to: