Your message dated Wed, 06 Feb 2008 22:17:04 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#437448: fixed in policycoreutils 2.0.27-1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: policycoreutils
Version: 1.32-3
Tags: patch
--- - 2007-08-12 12:11:25.486497520 -0400
+++ /tmp/se_dpkg8.gz.32231 2007-08-12 12:11:25.000000000 -0400
@@ -22,7 +22,7 @@
.\" USA.
.\"
.\"
-.TH SE_DPKG "8" "August 2007" "Security Enhanced Linux" NSA
+.TH SE_DPKG "8" "January 2005" "Security Enhanced Linux" NSA
.SH NAME
se_dpkg,se_apt-get,se_aptitude,se_dpkg-reconfigure,se_dselect,se_synaptic \-
run a Debian package system programs in the proper security context
.SH SYNOPSIS
@@ -46,14 +46,14 @@
.br
.SH DESCRIPTION
.PP
-These programs are all symbolic links to a simple wrapper script that uses
+These are all symbokic links to a sumple wrapper script that uses
.B run_init
to run actually run the corresponding program after setting up the
proper context.
.B run_init
acquires a new Psuedo terminal, forks a child process that binds to
-the psuedo terminal, forks the program
-.BR dpkg , apt\-get , aptitude , synaptic , dselect ", or " dpkg\-reconfigure )
+the psueado terminal, forks the program
+.BI (dpkg, apt\-get, aptitude, synaptic, dselect, or dpkg\-reconfigure)
that the user actually needs to run, and then sits around and connects
the physical terminal it was invoked upon with the psuedo terminal,
passing keyboard into to the child process, and passing the output of
--- - 2007-08-12 12:11:25.486497520 -0400
+++ /tmp/se_dpkg8.gz.32231 2007-08-12 12:11:25.000000000 -0400
@@ -22,7 +22,7 @@
.\" USA.
.\"
.\"
-.TH SE_DPKG "8" "August 2007" "Security Enhanced Linux" NSA
+.TH SE_DPKG "8" "January 2005" "Security Enhanced Linux" NSA
.SH NAME
se_dpkg,se_apt-get,se_aptitude,se_dpkg-reconfigure,se_dselect,se_synaptic \-
run a Debian package system programs in the proper security context
.SH SYNOPSIS
@@ -46,14 +46,14 @@
.br
.SH DESCRIPTION
.PP
-These programs are all symbolic links to a simple wrapper script that uses
+These are all symbokic links to a sumple wrapper script that uses
.B run_init
to run actually run the corresponding program after setting up the
proper context.
.B run_init
acquires a new Psuedo terminal, forks a child process that binds to
-the psuedo terminal, forks the program
-.BR dpkg , apt\-get , aptitude , synaptic , dselect ", or " dpkg\-reconfigure )
+the psueado terminal, forks the program
+.BI (dpkg, apt\-get, aptitude, synaptic, dselect, or dpkg\-reconfigure)
that the user actually needs to run, and then sits around and connects
the physical terminal it was invoked upon with the psuedo terminal,
passing keyboard into to the child process, and passing the output of
--- End Message ---
--- Begin Message ---
Source: policycoreutils
Source-Version: 2.0.27-1
We believe that the bug you reported is fixed in the latest version of
policycoreutils, which is due to be installed in the Debian FTP archive:
policycoreutils_2.0.27-1.diff.gz
to pool/main/p/policycoreutils/policycoreutils_2.0.27-1.diff.gz
policycoreutils_2.0.27-1.dsc
to pool/main/p/policycoreutils/policycoreutils_2.0.27-1.dsc
policycoreutils_2.0.27-1_amd64.deb
to pool/main/p/policycoreutils/policycoreutils_2.0.27-1_amd64.deb
policycoreutils_2.0.27.orig.tar.gz
to pool/main/p/policycoreutils/policycoreutils_2.0.27.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Manoj Srivastava <[EMAIL PROTECTED]> (supplier of updated policycoreutils
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 06 Feb 2008 15:31:30 -0600
Source: policycoreutils
Binary: policycoreutils
Architecture: source amd64
Version: 2.0.27-1
Distribution: unstable
Urgency: low
Maintainer: Manoj Srivastava <[EMAIL PROTECTED]>
Changed-By: Manoj Srivastava <[EMAIL PROTECTED]>
Description:
policycoreutils - SELinux core policy utilities
Closes: 405975 433883 437448 446847 458511
Changes:
policycoreutils (2.0.27-1) unstable; urgency=low
.
* New upstream release
* Improve semodule reporting of system errors from Stephen Smalley.
* Fix setfiles selabel option flag setting for 64-bit from Stephen
Smalley.
* Remove genhomedircon script (functionality is now provided
within libsemanage) from Todd Miller.
* Fix genhomedircon searching for USER from Todd Miller
* Install run_init with mode 0755 from Dan Walsh.
* Fix chcat from Dan Walsh.
* Fix fixfiles pattern expansion and error reporting from Dan Walsh.
* Optimize genhomedircon to compile regexes once from Dan Walsh.
* Fix semanage gettext call from Dan Walsh.
* Disable dontaudits via semodule -D
* Rebase setfiles to use new labeling interface.
* Fixed setsebool (falling through to error path on success).
Closes: Bug#433883
* Merged genhomedircon fixes from Dan Walsh.
* Merged setfiles -c usage fix from Dan Walsh.
* Merged restorecon fix from Yuichi Nakamura.
* Dropped -lsepol where no longer needed.
* Merge newrole support for alternate pam configs from Ted X Toth.
* Merged merging of restorecon into setfiles from Stephen Smalley.
* Merged genhomedircon fix to find conflicting directories correctly
from Dan Walsh.
* Fix the validation template for semanage from
system_u:object_r:%s_home_t to system_u:object_r:%s_home_t:s0, since
otherwie the context was always invalid. Reported by Russell Coker.
Closes: Bug#446847
* Alignment errors reported against policycoreutils were actually bugs
in the underlying libselinux, and have been fixed in the latest
versions. Closes: Bug#405975
* Fixed the wrong path in the example in the man page for audit2why.
Reported by Hans Spaans Closes: Bug#458511
* The new upstream versions also fixes problems in chcat, duplicating
the fix in the NMU (thanks) for bug#440474
* Fixed typos in se_dpkg man page, thanks to Justin Pryzby.
Closes: Bug#437448
Files:
81f686d352062be0a0b95957cae244a7 782 utils optional
policycoreutils_2.0.27-1.dsc
8012983792fca9f4fea6ce5e381ecafd 310115 utils optional
policycoreutils_2.0.27.orig.tar.gz
469cf0e297a002cea25cbe96954784d2 31940 utils optional
policycoreutils_2.0.27-1.diff.gz
593bde90df95a109fb928d9e997a801d 410678 utils optional
policycoreutils_2.0.27-1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHqi55Ibrau78kQkwRAtObAKDVle/AM5SQGhmWQq5swwxWem27zQCghcLS
AEH9gxwFq5/IhfOLB2g5RvI=
=LFqh
-----END PGP SIGNATURE-----
--- End Message ---