Your message dated Wed, 06 Feb 2008 22:17:04 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#437448: fixed in policycoreutils 2.0.27-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: policycoreutils
Version: 1.32-3
Tags: patch

--- -   2007-08-12 12:11:25.486497520 -0400
+++ /tmp/se_dpkg8.gz.32231      2007-08-12 12:11:25.000000000 -0400
@@ -22,7 +22,7 @@
 .\" USA.
 .\"
 .\"
-.TH SE_DPKG "8" "August 2007" "Security Enhanced Linux" NSA
+.TH SE_DPKG "8" "January 2005" "Security Enhanced Linux" NSA
 .SH NAME
 se_dpkg,se_apt-get,se_aptitude,se_dpkg-reconfigure,se_dselect,se_synaptic \- 
run a Debian package system programs in the proper security context
 .SH SYNOPSIS
@@ -46,14 +46,14 @@
 .br
 .SH DESCRIPTION
 .PP
-These programs are all symbolic links to a simple wrapper script that uses
+These are all symbokic links to a sumple wrapper script that uses
 .B run_init 
 to run actually run the corresponding program after setting up the
 proper context. 
 .B run_init
 acquires a new Psuedo terminal, forks a child process that binds to
-the psuedo terminal, forks the program
-.BR dpkg , apt\-get , aptitude , synaptic , dselect ", or " dpkg\-reconfigure )
+the psueado terminal, forks the program
+.BI (dpkg, apt\-get, aptitude, synaptic, dselect, or dpkg\-reconfigure)
 that the user actually needs to run, and then sits around and connects
 the physical terminal it was invoked upon with the psuedo terminal,
 passing keyboard into to the child process, and passing the output of
--- -   2007-08-12 12:11:25.486497520 -0400
+++ /tmp/se_dpkg8.gz.32231      2007-08-12 12:11:25.000000000 -0400
@@ -22,7 +22,7 @@
 .\" USA.
 .\"
 .\"
-.TH SE_DPKG "8" "August 2007" "Security Enhanced Linux" NSA
+.TH SE_DPKG "8" "January 2005" "Security Enhanced Linux" NSA
 .SH NAME
 se_dpkg,se_apt-get,se_aptitude,se_dpkg-reconfigure,se_dselect,se_synaptic \- 
run a Debian package system programs in the proper security context
 .SH SYNOPSIS
@@ -46,14 +46,14 @@
 .br
 .SH DESCRIPTION
 .PP
-These programs are all symbolic links to a simple wrapper script that uses
+These are all symbokic links to a sumple wrapper script that uses
 .B run_init 
 to run actually run the corresponding program after setting up the
 proper context. 
 .B run_init
 acquires a new Psuedo terminal, forks a child process that binds to
-the psuedo terminal, forks the program
-.BR dpkg , apt\-get , aptitude , synaptic , dselect ", or " dpkg\-reconfigure )
+the psueado terminal, forks the program
+.BI (dpkg, apt\-get, aptitude, synaptic, dselect, or dpkg\-reconfigure)
 that the user actually needs to run, and then sits around and connects
 the physical terminal it was invoked upon with the psuedo terminal,
 passing keyboard into to the child process, and passing the output of

--- End Message ---
--- Begin Message ---
Source: policycoreutils
Source-Version: 2.0.27-1

We believe that the bug you reported is fixed in the latest version of
policycoreutils, which is due to be installed in the Debian FTP archive:

policycoreutils_2.0.27-1.diff.gz
  to pool/main/p/policycoreutils/policycoreutils_2.0.27-1.diff.gz
policycoreutils_2.0.27-1.dsc
  to pool/main/p/policycoreutils/policycoreutils_2.0.27-1.dsc
policycoreutils_2.0.27-1_amd64.deb
  to pool/main/p/policycoreutils/policycoreutils_2.0.27-1_amd64.deb
policycoreutils_2.0.27.orig.tar.gz
  to pool/main/p/policycoreutils/policycoreutils_2.0.27.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Manoj Srivastava <[EMAIL PROTECTED]> (supplier of updated policycoreutils 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 06 Feb 2008 15:31:30 -0600
Source: policycoreutils
Binary: policycoreutils
Architecture: source amd64
Version: 2.0.27-1
Distribution: unstable
Urgency: low
Maintainer: Manoj Srivastava <[EMAIL PROTECTED]>
Changed-By: Manoj Srivastava <[EMAIL PROTECTED]>
Description: 
 policycoreutils - SELinux core policy utilities
Closes: 405975 433883 437448 446847 458511
Changes: 
 policycoreutils (2.0.27-1) unstable; urgency=low
 .
   * New upstream release
     * Improve semodule reporting of system errors from Stephen Smalley.
     * Fix setfiles selabel option flag setting for 64-bit from Stephen
       Smalley.
     * Remove genhomedircon script (functionality is now provided
       within libsemanage) from Todd Miller.
     * Fix genhomedircon searching for USER from Todd Miller
     * Install run_init with mode 0755 from Dan Walsh.
     * Fix chcat from Dan Walsh.
     * Fix fixfiles pattern expansion and error reporting from Dan Walsh.
     * Optimize genhomedircon to compile regexes once from Dan Walsh.
     * Fix semanage gettext call from Dan Walsh.
     * Disable dontaudits via semodule -D
     * Rebase setfiles to use new labeling interface.
     * Fixed setsebool (falling through to error path on success).
                                                        Closes: Bug#433883
     * Merged genhomedircon fixes from Dan Walsh.
     * Merged setfiles -c usage fix from Dan Walsh.
     * Merged restorecon fix from Yuichi Nakamura.
     * Dropped -lsepol where no longer needed.
     * Merge newrole support for alternate pam configs from Ted X Toth.
     * Merged merging of restorecon into setfiles from Stephen Smalley.
     * Merged genhomedircon fix to find conflicting directories correctly
       from Dan Walsh.
   * Fix the validation template for semanage from
     system_u:object_r:%s_home_t to system_u:object_r:%s_home_t:s0, since
     otherwie the context was always invalid.  Reported by Russell Coker.
                                                         Closes: Bug#446847
   * Alignment errors reported against policycoreutils were actually bugs
     in the underlying libselinux, and have been fixed in the latest
     versions.                                           Closes: Bug#405975
   * Fixed the wrong path in the example in the man page for audit2why.
     Reported by Hans Spaans                             Closes: Bug#458511
   * The new upstream versions also fixes problems in chcat, duplicating
     the fix in the NMU (thanks) for bug#440474
   * Fixed typos in se_dpkg man page, thanks to Justin Pryzby.
                                                         Closes: Bug#437448
Files: 
 81f686d352062be0a0b95957cae244a7 782 utils optional 
policycoreutils_2.0.27-1.dsc
 8012983792fca9f4fea6ce5e381ecafd 310115 utils optional 
policycoreutils_2.0.27.orig.tar.gz
 469cf0e297a002cea25cbe96954784d2 31940 utils optional 
policycoreutils_2.0.27-1.diff.gz
 593bde90df95a109fb928d9e997a801d 410678 utils optional 
policycoreutils_2.0.27-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHqi55Ibrau78kQkwRAtObAKDVle/AM5SQGhmWQq5swwxWem27zQCghcLS
AEH9gxwFq5/IhfOLB2g5RvI=
=LFqh
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to