Your message dated Wed, 13 Aug 2008 00:32:04 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#494234: fixed in refpolicy 2:0.0.20080702-6
has caused the Debian Bug report #494234,
regarding refpolicy: FTBFS: libsepol.expand_module: Error while indexing out
symbols
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)
--
494234: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494234
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: refpolicy
Version: 2:0.0.20080702-4
Severity: serious
User: [EMAIL PROTECTED]
Usertags: qa-ftbfs-20080807 qa-ftbfs
Justification: FTBFS on i386
Hi,
During a rebuild of all packages in sid, your package failed to build on
i386.
Relevant part:
> make[1]: Entering directory
> `/build/user-refpolicy_0.0.20080702-4-amd64-cD4KSC/refpolicy-0.0.20080702-4/debian/build-selinux-policy-default'
> m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16
> -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D
> self_contained_policy policy/flask/security_classes policy/flask/initial_sids
> policy/flask/access_vectors policy/support/file_patterns.spt
> policy/support/ipc_patterns.spt policy/support/loadable_module.spt
> policy/support/misc_macros.spt policy/support/misc_patterns.spt
> policy/support/mls_mcs_macros.spt policy/support/obj_perm_sets.spt policy/mls
> policy/mcs policy/policy_capabilities > tmp/pre_te_files.conf
> python -E support/genclassperms.py policy/flask/access_vectors
> policy/flask/security_classes > tmp/generated_definitions.conf
> echo "define(\`base_per_role_template',\`" >> tmp/generated_definitions.conf
> for i in application apt authlogin clock corecommands corenetwork cron
> devices dmesg domain dpkg files filesystem fstools getty hal hostname hotplug
> inetd init iptables kernel libraries locallogin logging logrotate mcs
> miscfiles mls modutils mount mta netlabel selinux selinuxutil setrans staff
> storage su sysadm sysnetwork terminal udev unprivuser userdomain usermanage;
> do echo
> "ifdef(\`""$i""_per_role_template',\`""$i""_per_role_template("'$*'")')" >>
> tmp/generated_definitions.conf ; done
> for i in application apt authlogin clock corecommands corenetwork cron
> devices dmesg domain dpkg files filesystem fstools getty hal hostname hotplug
> inetd init iptables kernel libraries locallogin logging logrotate mcs
> miscfiles mls modutils mount mta netlabel selinux selinuxutil setrans staff
> storage su sysadm sysnetwork terminal udev unprivuser userdomain usermanage;
> do echo "ifdef(\`""$i""_per_userdomain_template',\`" >>
> tmp/generated_definitions.conf ; echo "errprint(\`Warning:
> per_userdomain_templates have been renamed to per_role_templates
> (""$i""_per_userdomain_template)'__endline__)" >>
> tmp/generated_definitions.conf ; echo
> """$i""_per_userdomain_template("'$*'")')" >> tmp/generated_definitions.conf
> ; done
> echo "')" >> tmp/generated_definitions.conf
> test -f policy/booleans.conf && gawk -f support/set_bools_tuns.awk
> policy/booleans.conf >> tmp/generated_definitions.conf || true
> m4 policy/support/file_patterns.spt policy/support/ipc_patterns.spt
> policy/support/loadable_module.spt policy/support/misc_macros.spt
> policy/support/misc_patterns.spt policy/support/mls_mcs_macros.spt
> policy/support/obj_perm_sets.spt policy/modules/system/application.if
> policy/modules/admin/apt.if policy/modules/system/authlogin.if
> policy/modules/system/clock.if policy/modules/kernel/corecommands.if
> policy/modules/kernel/corenetwork.if policy/modules/services/cron.if
> policy/modules/kernel/devices.if policy/modules/admin/dmesg.if
> policy/modules/kernel/domain.if policy/modules/admin/dpkg.if
> policy/modules/kernel/files.if policy/modules/kernel/filesystem.if
> policy/modules/system/fstools.if policy/modules/system/getty.if
> policy/modules/services/hal.if policy/modules/system/hostname.if
> policy/modules/system/hotplug.if policy/modules/services/inetd.if
> policy/modules/system/init.if policy/modules/system/iptables.if
> policy/modules/kernel/kernel.if policy/modules/system/libraries.if
> policy/modules/system/locallogin.if policy/modules/system/logging.if
> policy/modules/admin/logrotate.if policy/modules/kernel/mcs.if
> policy/modules/system/miscfiles.if policy/modules/kernel/mls.if
> policy/modules/system/modutils.if policy/modules/system/mount.if
> policy/modules/services/mta.if policy/modules/system/netlabel.if
> policy/modules/kernel/selinux.if policy/modules/system/selinuxutil.if
> policy/modules/system/setrans.if policy/modules/roles/staff.if
> policy/modules/kernel/storage.if policy/modules/admin/su.if
> policy/modules/roles/sysadm.if policy/modules/system/sysnetwork.if
> policy/modules/kernel/terminal.if policy/modules/system/udev.if
> policy/modules/roles/unprivuser.if policy/modules/system/userdomain.if
> policy/modules/admin/usermanage.if policy/modules/admin/acct.if
> policy/modules/services/aide.if policy/modules/admin/alsa.if
> policy/modules/admin/amanda.if policy/modules/services/apache.if
> policy/modules/services/apm.if policy/modules/services/arpwatch.if
> policy/modules/roles/auditadm.if policy/modules/services/automount.if
> policy/modules/services/avahi.if policy/modules/services/bind.if
> policy/modules/services/bluetooth.if policy/modules/admin/bootloader.if
> policy/modules/services/canna.if policy/modules/admin/certwatch.if
> policy/modules/services/comsat.if policy/modules/services/courier.if
> policy/modules/services/cpucontrol.if policy/modules/services/cups.if
> policy/modules/services/cvs.if policy/modules/services/cyrus.if
> policy/modules/services/dbskk.if policy/modules/services/dbus.if
> policy/modules/services/dhcp.if policy/modules/services/dictd.if
> policy/modules/services/distcc.if policy/modules/admin/dmidecode.if
> policy/modules/services/dovecot.if policy/modules/services/fetchmail.if
> policy/modules/services/finger.if policy/modules/services/ftp.if
> policy/modules/apps/gpg.if policy/modules/services/gpm.if
> policy/modules/services/howl.if policy/modules/services/inn.if
> policy/modules/system/ipsec.if policy/modules/services/irqbalance.if
> policy/modules/apps/java.if policy/modules/services/kerberos.if
> policy/modules/services/ktalk.if policy/modules/services/ldap.if
> policy/modules/apps/loadkeys.if policy/modules/admin/logwatch.if
> policy/modules/services/lpd.if policy/modules/system/lvm.if
> policy/modules/services/mailman.if policy/modules/services/mysql.if
> policy/modules/admin/netutils.if policy/modules/services/networkmanager.if
> policy/modules/services/nis.if policy/modules/services/nscd.if
> policy/modules/services/ntp.if policy/modules/services/openct.if
> policy/modules/services/openvpn.if policy/modules/system/pcmcia.if
> policy/modules/services/pcscd.if policy/modules/services/pegasus.if
> policy/modules/services/portmap.if policy/modules/services/postfix.if
> policy/modules/services/postgresql.if policy/modules/services/ppp.if
> policy/modules/admin/prelink.if policy/modules/services/prelude.if
> policy/modules/services/privoxy.if policy/modules/services/procmail.if
> policy/modules/admin/quota.if policy/modules/services/radius.if
> policy/modules/services/radvd.if policy/modules/system/raid.if
> policy/modules/services/rdisc.if policy/modules/services/remotelogin.if
> policy/modules/services/rlogin.if policy/modules/services/rpc.if
> policy/modules/services/rshd.if policy/modules/services/rsync.if
> policy/modules/services/samba.if policy/modules/services/sasl.if
> policy/modules/services/sendmail.if policy/modules/apps/slocate.if
> policy/modules/services/smartmon.if policy/modules/services/snmp.if
> policy/modules/services/spamassassin.if policy/modules/services/squid.if
> policy/modules/services/ssh.if policy/modules/services/stunnel.if
> policy/modules/admin/sudo.if policy/modules/services/sysstat.if
> policy/modules/services/tcpd.if policy/modules/services/telnet.if
> policy/modules/services/tftp.if policy/modules/admin/tmpreaper.if
> policy/modules/admin/tzdata.if policy/modules/system/unconfined.if
> policy/modules/services/uucp.if policy/modules/admin/vbetool.if
> policy/modules/admin/vpn.if policy/modules/apps/webalizer.if
> policy/modules/services/xfs.if policy/modules/services/xserver.if
> policy/modules/services/zebra.if policy/modules/admin/amtu.if
> policy/modules/admin/anaconda.if policy/modules/admin/consoletype.if
> policy/modules/admin/firstboot.if policy/modules/admin/kudzu.if
> policy/modules/admin/readahead.if policy/modules/admin/rpm.if
> policy/modules/roles/secadm.if policy/modules/admin/updfstab.if
> policy/modules/admin/backup.if policy/modules/admin/brctl.if
> policy/modules/admin/ddcprobe.if policy/modules/admin/kismet.if
> policy/modules/admin/mrtg.if policy/modules/admin/portage.if
> policy/modules/admin/sxid.if policy/modules/admin/tripwire.if
> policy/modules/admin/usbmodules.if policy/modules/apps/ada.if
> policy/modules/apps/authbind.if policy/modules/apps/awstats.if
> policy/modules/apps/calamaris.if policy/modules/apps/cdrecord.if
> policy/modules/apps/ethereal.if policy/modules/apps/evolution.if
> policy/modules/apps/games.if policy/modules/apps/gift.if
> policy/modules/apps/gnome.if policy/modules/apps/irc.if
> policy/modules/apps/lockdev.if policy/modules/apps/mono.if
> policy/modules/apps/mozilla.if policy/modules/apps/mplayer.if
> policy/modules/apps/podsleuth.if policy/modules/apps/qemu.if
> policy/modules/apps/rssh.if policy/modules/apps/screen.if
> policy/modules/apps/thunderbird.if policy/modules/apps/tvtime.if
> policy/modules/apps/uml.if policy/modules/apps/userhelper.if
> policy/modules/apps/usernetctl.if policy/modules/apps/vmware.if
> policy/modules/apps/wine.if policy/modules/apps/wireshark.if
> policy/modules/apps/yam.if policy/modules/services/afs.if
> policy/modules/services/amavis.if policy/modules/services/apcupsd.if
> policy/modules/services/asterisk.if policy/modules/services/audioentropy.if
> policy/modules/services/bitlbee.if policy/modules/services/ccs.if
> policy/modules/services/cipe.if policy/modules/services/clamav.if
> policy/modules/services/clockspeed.if policy/modules/services/consolekit.if
> policy/modules/services/dante.if policy/modules/services/dcc.if
> policy/modules/services/ddclient.if policy/modules/services/djbdns.if
> policy/modules/services/dnsmasq.if policy/modules/services/exim.if
> policy/modules/services/fail2ban.if policy/modules/services/gatekeeper.if
> policy/modules/services/i18n_input.if policy/modules/services/imaze.if
> policy/modules/services/ircd.if policy/modules/services/jabber.if
> policy/modules/services/kerneloops.if policy/modules/services/monop.if
> policy/modules/services/munin.if policy/modules/services/nagios.if
> policy/modules/services/nessus.if policy/modules/services/nsd.if
> policy/modules/services/ntop.if policy/modules/services/nx.if
> policy/modules/services/oav.if policy/modules/services/oddjob.if
> policy/modules/services/openca.if policy/modules/services/perdition.if
> policy/modules/services/portslave.if
> policy/modules/services/postfixpolicyd.if policy/modules/services/postgrey.if
> policy/modules/services/publicfile.if policy/modules/services/pxe.if
> policy/modules/services/pyzor.if policy/modules/services/qmail.if
> policy/modules/services/razor.if policy/modules/services/resmgr.if
> policy/modules/services/rhgb.if policy/modules/services/ricci.if
> policy/modules/services/roundup.if policy/modules/services/rpcbind.if
> policy/modules/services/rwho.if policy/modules/services/setroubleshoot.if
> policy/modules/services/slrnpull.if policy/modules/services/snort.if
> policy/modules/services/soundserver.if policy/modules/services/speedtouch.if
> policy/modules/services/timidity.if policy/modules/services/tor.if
> policy/modules/services/transproxy.if policy/modules/services/ucspitcp.if
> policy/modules/services/uptime.if policy/modules/services/uwimap.if
> policy/modules/services/virt.if policy/modules/services/watchdog.if
> policy/modules/services/xprint.if policy/modules/services/zabbix.if
> policy/modules/system/daemontools.if policy/modules/system/iscsi.if
> policy/modules/system/pythonsupport.if policy/modules/system/xen.if
> support/iferror.m4 >> tmp/all_interfaces.conf.tmp
> sed -e s/dollarsstar/\$\*/g tmp/all_interfaces.conf.tmp >>
> tmp/all_interfaces.conf
> echo "" > tmp/rolemap.conf
> m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16
> -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D
> self_contained_policy -D self_contained_policy policy/rolemap | gawk
> '/^[[:blank:]]*[A-Za-z]/{ print "gen_require(type " $3 "; role " $1
> ";)\nbase_per_role_template(" $2 "," $3 "," $1 ")" }' >> tmp/rolemap.conf
> m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16
> -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D
> self_contained_policy -s policy/support/file_patterns.spt
> policy/support/ipc_patterns.spt policy/support/loadable_module.spt
> policy/support/misc_macros.spt policy/support/misc_patterns.spt
> policy/support/mls_mcs_macros.spt policy/support/obj_perm_sets.spt
> tmp/generated_definitions.conf tmp/all_interfaces.conf
> policy/modules/system/application.te policy/modules/admin/apt.te
> policy/modules/system/authlogin.te policy/modules/system/clock.te
> policy/modules/kernel/corecommands.te policy/modules/kernel/corenetwork.te
> policy/modules/services/cron.te policy/modules/kernel/devices.te
> policy/modules/admin/dmesg.te policy/modules/kernel/domain.te
> policy/modules/admin/dpkg.te policy/modules/kernel/files.te
> policy/modules/kernel/filesystem.te policy/modules/system/fstools.te
> policy/modules/system/getty.te policy/modules/services/hal.te
> policy/modules/system/hostname.te policy/modules/system/hotplug.te
> policy/modules/services/inetd.te policy/modules/system/init.te
> policy/modules/system/iptables.te policy/modules/kernel/kernel.te
> policy/modules/system/libraries.te policy/modules/system/locallogin.te
> policy/modules/system/logging.te policy/modules/admin/logrotate.te
> policy/modules/kernel/mcs.te policy/modules/system/miscfiles.te
> policy/modules/kernel/mls.te policy/modules/system/modutils.te
> policy/modules/system/mount.te policy/modules/services/mta.te
> policy/modules/system/netlabel.te policy/modules/kernel/selinux.te
> policy/modules/system/selinuxutil.te policy/modules/system/setrans.te
> policy/modules/roles/staff.te policy/modules/kernel/storage.te
> policy/modules/admin/su.te policy/modules/roles/sysadm.te
> policy/modules/system/sysnetwork.te policy/modules/kernel/terminal.te
> policy/modules/system/udev.te policy/modules/roles/unprivuser.te
> policy/modules/system/userdomain.te policy/modules/admin/usermanage.te
> tmp/rolemap.conf > tmp/all_te_files.conf
> policy/modules/system/authlogin.te:208: Warning: r_file_perms is deprecated
> please use read_file_perms instead.
> policy/modules/admin/dpkg.te:179: Warning: r_dir_perms is deprecated please
> use list_dir_perms instead.
> policy/modules/admin/dpkg.te:180: Warning: r_file_perms is deprecated please
> use read_file_perms instead.
> policy/modules/system/init.te:396: Warning: r_file_perms is deprecated please
> use read_file_perms instead.
> policy/modules/system/locallogin.te:118: Warning: r_file_perms is deprecated
> please use read_file_perms instead.
> policy/modules/system/logging.te:47: Warning: r_file_perms is deprecated
> please use read_file_perms instead.
> policy/modules/system/mount.te:98: Warning: r_file_perms is deprecated please
> use read_file_perms instead.
> policy/modules/system/selinuxutil.te:529: Warning: r_dir_perms is deprecated
> please use list_dir_perms instead.
> policy/modules/system/selinuxutil.te:529: Warning: r_file_perms is deprecated
> please use read_file_perms instead.
> policy/modules/system/selinuxutil.te:529: Warning: r_file_perms is deprecated
> please use read_file_perms instead.
> policy/modules/roles/staff.te:11: Warning: r_file_perms is deprecated please
> use read_file_perms instead.
> policy/modules/roles/staff.te:11: Warning: r_file_perms is deprecated please
> use read_file_perms instead.
> policy/modules/roles/staff.te:11: Warning: r_dir_perms is deprecated please
> use list_dir_perms instead.
> policy/modules/roles/staff.te:11: Warning: r_file_perms is deprecated please
> use read_file_perms instead.
> policy/modules/roles/staff.te:11: Warning: r_file_perms is deprecated please
> use read_file_perms instead.
> policy/modules/roles/sysadm.te:18: Warning: r_file_perms is deprecated please
> use read_file_perms instead.
> policy/modules/roles/sysadm.te:18: Warning: r_file_perms is deprecated please
> use read_file_perms instead.
> policy/modules/roles/sysadm.te:18: Warning: r_dir_perms is deprecated please
> use list_dir_perms instead.
> policy/modules/roles/sysadm.te:18: Warning: r_file_perms is deprecated please
> use read_file_perms instead.
> policy/modules/roles/sysadm.te:18: Warning: r_file_perms is deprecated please
> use read_file_perms instead.
> policy/modules/system/udev.te:62: Warning: r_dir_perms is deprecated please
> use list_dir_perms instead.
> policy/modules/system/udev.te:114: Warning: r_file_perms is deprecated please
> use read_file_perms instead.
> policy/modules/roles/unprivuser.te:14: Warning: r_file_perms is deprecated
> please use read_file_perms instead.
> policy/modules/roles/unprivuser.te:14: Warning: r_file_perms is deprecated
> please use read_file_perms instead.
> policy/modules/roles/unprivuser.te:14: Warning: r_dir_perms is deprecated
> please use list_dir_perms instead.
> policy/modules/roles/unprivuser.te:14: Warning: r_file_perms is deprecated
> please use read_file_perms instead.
> policy/modules/roles/unprivuser.te:14: Warning: r_file_perms is deprecated
> please use read_file_perms instead.
> m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16
> -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D
> self_contained_policy policy/support/file_patterns.spt
> policy/support/ipc_patterns.spt policy/support/loadable_module.spt
> policy/support/misc_macros.spt policy/support/misc_patterns.spt
> policy/support/mls_mcs_macros.spt policy/support/obj_perm_sets.spt
> policy/users policy/constraints > tmp/post_te_files.conf
> sed -r -f support/get_type_attr_decl.sed tmp/all_te_files.conf | LC_ALL=C
> sort > tmp/all_attrs_types.conf
> cat tmp/post_te_files.conf > tmp/all_post.conf
> egrep '^sid ' tmp/all_te_files.conf >> tmp/all_post.conf || true
> egrep '^fs_use_(xattr|task|trans)' tmp/all_te_files.conf >> tmp/all_post.conf
> || true
> egrep ^genfscon tmp/all_te_files.conf >> tmp/all_post.conf || true
> egrep ^portcon tmp/all_te_files.conf >> tmp/all_post.conf || true
> egrep ^netifcon tmp/all_te_files.conf >> tmp/all_post.conf || true
> egrep ^nodecon tmp/all_te_files.conf >> tmp/all_post.conf || true
> sed -r -f support/comment_move_decl.sed tmp/all_te_files.conf >
> tmp/only_te_rules.conf
> m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16
> -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D
> self_contained_policy policy/support/file_patterns.spt
> policy/support/ipc_patterns.spt policy/support/loadable_module.spt
> policy/support/misc_macros.spt policy/support/misc_patterns.spt
> policy/support/mls_mcs_macros.spt policy/support/obj_perm_sets.spt
> tmp/generated_definitions.conf policy/global_booleans policy/global_tunables
> > tmp/global_bools.conf
> Creating default base module base.conf
> cat tmp/pre_te_files.conf tmp/all_attrs_types.conf tmp/global_bools.conf
> tmp/only_te_rules.conf tmp/all_post.conf > base.conf
> Compiling default base module
> /usr/bin/checkmodule -M -U deny base.conf -o tmp/base.mod
> libsepol.expand_module: Error while indexing out symbols
> /usr/bin/checkmodule: expand module failed
> /usr/bin/checkmodule: loading policy configuration from base.conf
> make[1]: *** [tmp/base.mod] Error 1
The full build log is available from:
http://people.debian.org/~lucas/logs/2008/08/07
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
About the archive rebuild: The rebuild was done on about 50 AMD64 nodes
of the Grid'5000 platform, using a clean chroot containing a sid i386
environment. Internet was not accessible from the build systems.
--
| Lucas Nussbaum
| [EMAIL PROTECTED] http://www.lucas-nussbaum.net/ |
| jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F |
--- End Message ---
--- Begin Message ---
Source: refpolicy
Source-Version: 2:0.0.20080702-6
We believe that the bug you reported is fixed in the latest version of
refpolicy, which is due to be installed in the Debian FTP archive:
refpolicy_0.0.20080702-6.diff.gz
to pool/main/r/refpolicy/refpolicy_0.0.20080702-6.diff.gz
refpolicy_0.0.20080702-6.dsc
to pool/main/r/refpolicy/refpolicy_0.0.20080702-6.dsc
selinux-policy-default_0.0.20080702-6_all.deb
to pool/main/r/refpolicy/selinux-policy-default_0.0.20080702-6_all.deb
selinux-policy-dev_0.0.20080702-6_all.deb
to pool/main/r/refpolicy/selinux-policy-dev_0.0.20080702-6_all.deb
selinux-policy-doc_0.0.20080702-6_all.deb
to pool/main/r/refpolicy/selinux-policy-doc_0.0.20080702-6_all.deb
selinux-policy-mls_0.0.20080702-6_all.deb
to pool/main/r/refpolicy/selinux-policy-mls_0.0.20080702-6_all.deb
selinux-policy-src_0.0.20080702-6_all.deb
to pool/main/r/refpolicy/selinux-policy-src_0.0.20080702-6_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Russell Coker <[EMAIL PROTECTED]> (supplier of updated refpolicy package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Wed, 13 Aug 2008 08:20:08 +1000
Source: refpolicy
Binary: selinux-policy-default selinux-policy-mls selinux-policy-src
selinux-policy-dev selinux-policy-doc
Architecture: source all
Version: 2:0.0.20080702-6
Distribution: unstable
Urgency: low
Maintainer: Russell Coker <[EMAIL PROTECTED]>
Changed-By: Russell Coker <[EMAIL PROTECTED]>
Description:
selinux-policy-default - Strict and Targeted variants of the SELinux policy
selinux-policy-dev - Headers from the SELinux reference policy for building
modules
selinux-policy-doc - Documentation for the SELinux reference policy
selinux-policy-mls - MLS (Multi Level Security) variant of the SELinux policy
selinux-policy-src - Source of the SELinux reference policy for customization
Closes: 494234
Changes:
refpolicy (2:0.0.20080702-6) unstable; urgency=low
.
* Made it build-depend on policycoreutils 2.0.49 and checkpolicy 2.0.16.
Closes: #494234
* Made xserver.pp be loaded whenevedr xbase-clients is installed so that
/tmp/.ICE-unix gets the right context.
* Policy updates, allowed rsyslogd to work correctly
Allow gpg to read/write user files under /tmp
Set the context of /var/run/portmap_mapping and /var/cache/ldconfig
Allow users to read symlinks under /var/lib (for python)
Make udev_t transition when running initrc_exec_t.
Changed the type of /var/init/rw to var_run_t
Changed r_dir_perms to list_dir_perms and r_file_perms to read_file_perms
to avoid warnings.
Changed read_file_perms to read_lnk_file_perms for lnk_file class.
Set the contexts for /var/run/hotkey-setup, /var/run/motd, /var/run/kdm/*,
and /var/lib/gdm/*
Dontaudit logrotate_t trying to write initrc_var_run_t.
Checksums-Sha1:
4d069d3281d09e6d29146d94539fe080d221ad85 1489 refpolicy_0.0.20080702-6.dsc
90ce27b4886ab6c96802564b0ea65a8b54b9f205 68195 refpolicy_0.0.20080702-6.diff.gz
9aec17984ae701c412d88c414d892f13d97db24d 1998226
selinux-policy-default_0.0.20080702-6_all.deb
8e289a9a8927ede68c530bf2ebf9ee2c4609d026 2034048
selinux-policy-mls_0.0.20080702-6_all.deb
80843de7047a1ecbd0d5cc9962186f989de05e7e 795808
selinux-policy-src_0.0.20080702-6_all.deb
571d90eae5f5cb1ce19e560384f1d8c9da57367d 700446
selinux-policy-dev_0.0.20080702-6_all.deb
769f07c1a2a5f95b7463d63960ee6fb887590f7c 420418
selinux-policy-doc_0.0.20080702-6_all.deb
Checksums-Sha256:
f7c8a0257c37fd4c3fb0117a74f88e1b40461ce64a7641c7960802c370d19b15 1489
refpolicy_0.0.20080702-6.dsc
ae6e943d4025a005b80c933e609d9bd552afe074be8afb1b519c0b48173bcbad 68195
refpolicy_0.0.20080702-6.diff.gz
9d09da3fce84f79b32f98a0f6ef437fa61eed32d08970d1ae8d93790b66da40f 1998226
selinux-policy-default_0.0.20080702-6_all.deb
e14944fc74740b98016ec9f20afaf9970fe265d2e613c53de70c239b48056cf6 2034048
selinux-policy-mls_0.0.20080702-6_all.deb
8790e31f7e22f0ec177f66fc6eaa023f4c1c3dd6daa0d4944883a4a47d6a94b7 795808
selinux-policy-src_0.0.20080702-6_all.deb
e7d915fceb789c7b9ac788e88a538c0cca3120843d8c62b639b01f91b8ba232d 700446
selinux-policy-dev_0.0.20080702-6_all.deb
b12616b4d6d5be9f9609827846a30ebfb3dcc1b0ca714c360c0f87e8e0fe98a0 420418
selinux-policy-doc_0.0.20080702-6_all.deb
Files:
80814c61bc9794a779a8664ae8df9f45 1489 admin standard
refpolicy_0.0.20080702-6.dsc
67be8f9f5ab41bd4a05e835f674004d2 68195 admin standard
refpolicy_0.0.20080702-6.diff.gz
f97109320b4edf9cb590fae71b3ca50e 1998226 admin standard
selinux-policy-default_0.0.20080702-6_all.deb
0e3724435b47889ef00340e9a17fdfcf 2034048 admin extra
selinux-policy-mls_0.0.20080702-6_all.deb
3e35feb8709db106b0678bff9cf0eb10 795808 admin optional
selinux-policy-src_0.0.20080702-6_all.deb
0aa8a16cd80bc91c2d1f226a217e5f70 700446 admin optional
selinux-policy-dev_0.0.20080702-6_all.deb
fad60f0a331cbc407b6aa426df1ba716 420418 doc optional
selinux-policy-doc_0.0.20080702-6_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFIoieFwrB5/PXHUlYRAt7SAKDApsp/Tj+eIZwbinHIzGNPR+U4rgCbBN4+
55na7cerIHCYtGu83Z9wmVU=
=YYu7
-----END PGP SIGNATURE-----
--- End Message ---