Please merge refpolicy 2:0.2.20100524-1(universe) from unstable(main)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
refpolicy (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Debian Changes:
refpolicy (2:0.2.20100524-1) unstable; urgency=low
* New Upstream release. This version has had a good deal of testing for
server use but almost no testing for desktop use. The usual "Unstable"
disclaimers apply.
* Disable UBAC - see http://
* Allow mount_t to read sysfs_t.
* Allow lvm_t to create semaphores.
* Allow mount_t and setfiles_t to read/write device_t chr_file.
* Allow udev to read sym-links in it's config directory.
* Allow vbetool_t to read inotify directories.
* Allow gpm_t self signull and signal access.
-- Russell Coker <email address hidden> Tue, 29 Jun 2010 10:42:00 +1000
refpolicy (2:0.2.20091117-3) unstable; urgency=low
* label Google Chrome as unconfined_
* Change the apache_
httpd_
can therefore use it in it's .fc file without making a .fc dependency.
* Allow setrans_t to read proc_t files.
* Allow pppd to load modules.
* Allow watchdog_t to read/write /dev/watchdog
* Allow rpcd_t getcap and setcap access.
* Allow insmod_t to mount a rpc_pipefs_t filesystem.
* Correctly label kdm.log.* pm-log aptitude*
* Allow consolekit_t to access pam console data.
* Correctly label consolekit scripts
* Allow mount_t to set the scheduling for kernel threads.
-- Russell Coker <email address hidden> Tue, 18 May 2010 19:06:24 +1000
This bug was fixed in the package refpolicy - 2:0.2.20100524- 1ubuntu1
--------------- 20100524- 1ubuntu1) maverick; urgency=low
refpolicy (2:0.2.
* Merge from debian unstable. Remaining changes: LP: #602199
- debian/control: drop "selinux" conflict (Debian bug 576598).
refpolicy (2:0.2.20100524-1) unstable; urgency=low
* New Upstream release. This version has had a good deal of testing for
server use but almost no testing for desktop use. The usual "Unstable"
disclaimers apply.
* Disable UBAC - see http:// etbe.coker. com.au/ 2010/05/ 26/ubac- selinux- debian/
* Allow mount_t to read sysfs_t.
* Allow lvm_t to create semaphores.
* Allow mount_t and setfiles_t to read/write device_t chr_file.
* Allow udev to read sym-links in it's config directory.
* Allow vbetool_t to read inotify directories.
* Allow gpm_t self signull and signal access.
refpolicy (2:0.2.20091117-3) unstable; urgency=low
* label Google Chrome as unconfined_ execmem_ exec_t content_ template( ) macro to not define the type $1_script_ exec_t, now the caller must unconditionally define it and
* Change the apache_
httpd_
can therefore use it in it's .fc file without making a .fc dependency.
* Allow setrans_t to read proc_t files.
* Allow pppd to load modules.
* Allow watchdog_t to read/write /dev/watchdog
* Allow rpcd_t getcap and setcap access.
* Allow insmod_t to mount a rpc_pipefs_t filesystem.
* Correctly label kdm.log.* pm-*log* aptitude*
* Allow consolekit_t to access pam console data.
* Correctly label consolekit scripts
* Allow mount_t to set the scheduling for kernel threads.
-- Bhavani Shankar <email address hidden> Tue, 06 Jul 2010 14:26:53 +0530