policycoreutils 2.1.13-2 source package in Ubuntu

Changelog

policycoreutils (2.1.13-2) unstable; urgency=low


  * Team upload.
  * debian/control:
    - Add gawk to the build-dependencies, this is needed for some manpages
      generation
    - Add python-audit to the Recommends
    - Bump Standards-Version to 3.9.4 (no further changes)

 -- Laurent Bigonville <email address hidden>  Sat, 25 May 2013 01:44:10 +0200

Upload details

Uploaded by:
Debian SELinux maintainers
Uploaded to:
Sid
Original maintainer:
Debian SELinux maintainers
Architectures:
linux-any
Section:
utils
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
policycoreutils_2.1.13-2.dsc 2.0 KiB a2565a20241692eb57cee8eece35a07f632d57aa8d9886922efd9ff693042503
policycoreutils_2.1.13.orig.tar.gz 1.1 MiB 34040f06f3111d9ee957576e4095841d35b9ca9141ee8d80aab036cbefb28584
policycoreutils_2.1.13-2.debian.tar.gz 692.7 KiB 1408db622fa7cb1addc28822f60ee8c4d1b4f7918239633c621e71087a42a57c

No changes file available.

Binary packages built by this source

policycoreutils: SELinux core policy utilities

 Security-enhanced Linux is a patch of the Linux® kernel and a number
 of utilities with enhanced security functionality designed to add
 mandatory access controls to Linux. The Security-enhanced Linux
 kernel contains new architectural components originally developed to
 improve the security of the Flask operating system. These
 architectural components provide general support for the enforcement
 of many kinds of mandatory access control policies, including those
 based on the concepts of Type Enforcement®, Role-based Access Control,
 and Multi-level Security.
 .
 This package contains the core policy utilities that are required
 for basic operation of an SELinux system. These utilities include
 load_policy to load policies, setfiles to label filesystems, newrole
 to switch roles, run_init to run /etc/init.d scripts in the proper
 context, and restorecond to restore contexts of files that often get the
 wrong context.
 .
 It also includes the mcstransd to map a maching readable sensitivity label to
 a human readable form. The sensitivity label is comprised of a sensitivity
 level (always s0 for MCS and anything from s0 to s15 for MLS) and a set of
 categories. A ranged sensitivity label will have a low level and a high level
 where the high level will dominate the low level. Categories are numbered
 from c0 to c1023. Names such as s0 and c1023 and not easily readable by
 humans, so mcstransd translated them to human readable labels such as
 SystemLow and SystemHigh.