policycoreutils 2.1.0-3ubuntu1.1 source package in Ubuntu

Changelog

policycoreutils (2.1.0-3ubuntu1.1) precise-proposed; urgency=low

  * Fix FTBFS in precise: (LP: #935368)
    - Define _GNU_SOURCE earlier in seunshare.c
    - Update to multiarch path of libsepol.a
  * debian/policycoreutils.postrm:
    - Remove the rc.d links on purge (LP: #1005398)
 -- Jason Conti <email address hidden>   Mon, 04 Jun 2012 12:09:07 -0400

Upload details

Uploaded by:
Jason Conti on 2012-06-04
Sponsored by:
Andrew Starr-Bochicchio
Uploaded to:
Precise
Original maintainer:
Ubuntu Developers
Architectures:
any
Section:
utils
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Precise updates on 2012-06-13 universe utils

Downloads

File Size SHA-256 Checksum
policycoreutils_2.1.0.orig.tar.gz 865.1 KiB 6199b07fd4280e455ea05933cee510b5e09ad3f60b0544382231fe05b787d3f3
policycoreutils_2.1.0-3ubuntu1.1.diff.gz 490.5 KiB 636c30d3d0e9a8871197fbdc4acb6b602e648a9d707359f237a94393bd48247c
policycoreutils_2.1.0-3ubuntu1.1.dsc 2.2 KiB ae514ae18bd167d3972928e6608bed52f8751e365e81c1aa79eefe33f18ec2dc

View changes file

Binary packages built by this source

policycoreutils: SELinux core policy utilities

 Security-enhanced Linux is a patch of the Linux┬« kernel and a number
 of utilities with enhanced security functionality designed to add
 mandatory access controls to Linux. The Security-enhanced Linux
 kernel contains new architectural components originally developed to
 improve the security of the Flask operating system. These
 architectural components provide general support for the enforcement
 of many kinds of mandatory access control policies, including those
 based on the concepts of Type Enforcement┬«, Role-based Access Control,
 and Multi-level Security.
 .
 This package contains the core policy utilities that are required
 for basic operation of an SELinux system. These utilities include
 load_policy to load policies, setfiles to label filesystems, newrole
 to switch roles, run_init to run /etc/init.d scripts in the proper
 context, and restorecond to restore contexts of files that often get the
 wrong context.
 .
 It also includes the mcstransd to map a maching readable sensitivity label to
 a human readable form. The sensitivity label is comprised of a sensitivity
 level (always s0 for MCS and anything from s0 to s15 for MLS) and a set of
 categories. A ranged sensitivity label will have a low level and a high level
 where the high level will dominate the low level. Categories are numbered
 from c0 to c1023. Names such as s0 and c1023 and not easily readable by
 humans, so mcstransd translated them to human readable labels such as
 SystemLow and SystemHigh.