Your message dated Sun, 09 Oct 2005 03:32:12 -0700 with message-id <[EMAIL PROTECTED]> and subject line Bug#332658: fixed in selinux-policy-default 1:1.26-5 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 7 Oct 2005 17:10:39 +0000 >From [EMAIL PROTECTED] Fri Oct 07 10:10:39 2005 Return-path: <[EMAIL PROTECTED]> Received: from wproxy.gmail.com [64.233.184.194] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1ENvjz-0003TI-00; Fri, 07 Oct 2005 10:10:39 -0700 Received: by wproxy.gmail.com with SMTP id i34so331202wra for <[EMAIL PROTECTED]>; Fri, 07 Oct 2005 10:10:08 -0700 (PDT) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:date:from:to:subject:message-id:mime-version:content-type:content-disposition:x-reportbug-version:x-debbugs-cc:user-agent; b=TiAU5vIKQ1ddBXs751mDSdwwGD4Vg8xhp0Tp9houEf+W5vWxbKQ0WaNs7NbYpO+GGehA55vvPUrjmxD3DaGbAatRjqJzgcWjZbg0PnWwj2+NEB3/jEFgN2+JSjPkaZPKwnsbiTLuMiI3YO6QZZIVHmhwH6IBWWobPjhkM8/SJ+Q= Received: by 10.54.83.11 with SMTP id g11mr2411761wrb; Fri, 07 Oct 2005 10:10:08 -0700 (PDT) Received: from localhost ( [203.156.13.28]) by mx.gmail.com with ESMTP id 27sm3108756wrl.2005.10.07.10.10.06; Fri, 07 Oct 2005 10:10:08 -0700 (PDT) Date: Sat, 8 Oct 2005 00:10:02 +0700 From: "David A. Patterson" <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: selinux-policy-default: Makefile fails to make compatible policy.VERSION Message-ID: <[EMAIL PROTECTED]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Reportbug-Version: 3.17 X-Debbugs-Cc: [EMAIL PROTECTED] User-Agent: Mutt/1.5.11 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02 Package: selinux-policy-default Version: 1:1.26-3 Severity: grave Justification: renders package unusable Kernel is the latest and greatest from Torvalds' archives, unpatched, pristine. No Debian kernel works. policyvers reports 15 (?) so pushed Makefile with POLICYCOMPAT = -c 15 and reran make and make install. Reboot fails with: security: policydb 20 does not match my range (15 -19) Am I missing a patch supplied on some other site than yours? You don't seem to be supplying 'em any more. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (700, 'unstable'), (650, 'testing'), (600, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/dash Kernel: Linux 2.6.13.3dc04 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages selinux-policy-default depends on: ii checkpolicy 1.27.4-1 SELinux policy compiler ii libpam-modules 0.79-3 Pluggable Authentication Modules f ii libselinux1 1.26-1 SELinux shared libraries ii m4 1.4.3-2 a macro processing language ii make 3.80-11 The GNU version of the "make" util ii policycoreutils 1.26-1 SELinux core policy utilities ii python 2.3.5-3 An interactive high-level object-o selinux-policy-default recommends no packages. -- no debconf information -- Regards, Dave -- --------------------------------------- Received: (at 332658-close) by bugs.debian.org; 9 Oct 2005 10:38:06 +0000 >From [EMAIL PROTECTED] Sun Oct 09 03:38:06 2005 Return-path: <[EMAIL PROTECTED]> Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian)) id 1EOYTU-0001AM-00; Sun, 09 Oct 2005 03:32:12 -0700 From: Russell Coker <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.56 $ Subject: Bug#332658: fixed in selinux-policy-default 1:1.26-5 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Sun, 09 Oct 2005 03:32:12 -0700 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-CrossAssassin-Score: 2 Source: selinux-policy-default Source-Version: 1:1.26-5 We believe that the bug you reported is fixed in the latest version of selinux-policy-default, which is due to be installed in the Debian FTP archive: selinux-policy-default_1.26-5.diff.gz to pool/main/s/selinux-policy-default/selinux-policy-default_1.26-5.diff.gz selinux-policy-default_1.26-5.dsc to pool/main/s/selinux-policy-default/selinux-policy-default_1.26-5.dsc selinux-policy-default_1.26-5_all.deb to pool/main/s/selinux-policy-default/selinux-policy-default_1.26-5_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Russell Coker <[EMAIL PROTECTED]> (supplier of updated selinux-policy-default package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sun, 09 Oct 2005 20:12:00 +1000 Source: selinux-policy-default Binary: selinux-policy-default Architecture: source all Version: 1:1.26-5 Distribution: unstable Urgency: low Maintainer: Russell Coker <[EMAIL PROTECTED]> Changed-By: Russell Coker <[EMAIL PROTECTED]> Description: selinux-policy-default - Policy config files and management for NSA Security Enhanced Linu Closes: 285651 330546 332658 Changes: selinux-policy-default (1:1.26-5) unstable; urgency=low . * Many minor changes. . * Made an old version of the policy be built for when your kernel is older than your checkpolicy program. Closes: #332658 . * Made fsadm.te not depend on modutil.te. Closes: #285651 . * Made games macros not depend on utempter.te. Closes: #330546 Files: 26e3c9866f7c4da97735a6d0bc644051 624 admin optional selinux-policy-default_1.26-5.dsc d1ddc55f713821ab6e799c9affabce1c 18257 admin optional selinux-policy-default_1.26-5.diff.gz 8b766289d44a14e54a2846c9846c6908 256320 admin optional selinux-policy-default_1.26-5_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDSO1UwrB5/PXHUlYRAuCYAJ40p2zpHx2/IvDMfd8lFDPV1wfOlQCeM6ex H9DRrLkw85QQcmlIf3aQiO0= =OYo2 -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]