-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 3.0 (quilt) Source: refpolicy Binary: selinux-policy-default, selinux-policy-mls, selinux-policy-src, selinux-policy-dev, selinux-policy-doc Architecture: all Version: 2:2.20140421-7 Maintainer: Debian SELinux maintainers <[email protected]> Uploaders: Russell Coker <[email protected]> Homepage: http://oss.tresys.com/projects/refpolicy/wiki/DownloadRelease Standards-Version: 3.9.5 Vcs-Browser: http://anonscm.debian.org/gitweb/?p=selinux/refpolicy.git;a=summary Vcs-Git: git://anonscm.debian.org/selinux/refpolicy.git Build-Depends: debhelper (>= 9) Build-Depends-Indep: policycoreutils (>= 2.2.1), checkpolicy (>= 2.2), python, m4, bzip2, gawk, libsepol1 (>= 2.2) Package-List: selinux-policy-default deb admin optional arch=all selinux-policy-dev deb admin optional arch=all selinux-policy-doc deb doc optional arch=all selinux-policy-mls deb admin extra arch=all selinux-policy-src deb admin optional arch=all Checksums-Sha1: c1134b778e0a62b5692a8284454bfc91fd72914e 684349 refpolicy_2.20140421.orig.tar.bz2 ab940c7f1d4427b30cf39d2173952ca0ff29182b 78900 refpolicy_2.20140421-7.debian.tar.xz Checksums-Sha256: 258ff813c84139175db63958ac8bff2bcce32982bb0d902e06aaaf17dd644367 684349 refpolicy_2.20140421.orig.tar.bz2 ba7e1b14d1d9524758cba1f540d6f10f1929c858b2d5788a9a4c6302c75044c6 78900 refpolicy_2.20140421-7.debian.tar.xz Files: a43b25c3a748659cddbf2df89920ee6d 684349 refpolicy_2.20140421.orig.tar.bz2 9497a6e8233fbb09077a1c653b51d3a4 78900 refpolicy_2.20140421-7.debian.tar.xz -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iEYEARECAAYFAlQ7BkYACgkQwrB5/PXHUlYLuACg4D1bxkOTgZXfP1xv3IyQjcKD c6cAoJhfxKwLBplnSYthgKcUA7S2Nn0m =1dn1 -----END PGP SIGNATURE----- Changes: refpolicy (2:2.20140421-7) unstable; urgency=medium * Label /run/systemd/journal/dev-log and /run/systemd/journal/stdout as devlog_t * Allow bootloadter_t to load kernel modules and run apt-cache * Allow systemd_cgroups_t to read /proc/cmdline * Allow sshd net_admin capability * Allow systemd_logind_t to read kernel sysctls, list tmpfs, and mount on /var/auth, and systemd_unit_file_t:service stop. * Allow dpkg_script_t to restart systemd unit files of type init_var_run_t * Allow local_login_t and user_t to talk to systemd_logind via dbus * Allow user_ssh_agent_t to read/write it's own fifo files * Allow user_t to talk to gconfd_t via dbus * Allow gpg_agent_t to send sigchld to xdm_t, to be a system dbus client, to use nsswitch, and to read user xauth file * Allow $1_dbusd_t domains systemd_login_read_pid_files access * Remove gpg_helper_t, merge gpg_pinentry_t with the main gpg domain, and create user_gpg_t, staff_gpg_t, etc. * Allow userdomains to talk to kerneloops via dbus * Allow sysstat_t to search all mountpoints * Allow udev_t self:netlink_route_socket nlmsg_write for interface rename * Allow systemd_tmpfiles_t to read kernel sysctls for boot_id * Allow setfiles_t to read /dev/urandom * Label /var/run/blkid as etc_runtime_t * TLDR: Make everything work with latest systemd and allow KDE login with latest X11 configuration. -- Russell Coker <[email protected]> Mon, 13 Oct 2014 09:41:44 +1100