Your message dated Sun, 09 Oct 2005 03:32:12 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#332658: fixed in selinux-policy-default 1:1.26-5
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 7 Oct 2005 17:10:39 +0000
>From [EMAIL PROTECTED] Fri Oct 07 10:10:39 2005
Return-path: <[EMAIL PROTECTED]>
Received: from wproxy.gmail.com [64.233.184.194]
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1ENvjz-0003TI-00; Fri, 07 Oct 2005 10:10:39 -0700
Received: by wproxy.gmail.com with SMTP id i34so331202wra
for <[EMAIL PROTECTED]>; Fri, 07 Oct 2005 10:10:08 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
s=beta; d=gmail.com;
h=received:date:from:to:subject:message-id:mime-version:content-type:content-disposition:x-reportbug-version:x-debbugs-cc:user-agent;
b=TiAU5vIKQ1ddBXs751mDSdwwGD4Vg8xhp0Tp9houEf+W5vWxbKQ0WaNs7NbYpO+GGehA55vvPUrjmxD3DaGbAatRjqJzgcWjZbg0PnWwj2+NEB3/jEFgN2+JSjPkaZPKwnsbiTLuMiI3YO6QZZIVHmhwH6IBWWobPjhkM8/SJ+Q=
Received: by 10.54.83.11 with SMTP id g11mr2411761wrb;
Fri, 07 Oct 2005 10:10:08 -0700 (PDT)
Received: from localhost ( [203.156.13.28])
by mx.gmail.com with ESMTP id 27sm3108756wrl.2005.10.07.10.10.06;
Fri, 07 Oct 2005 10:10:08 -0700 (PDT)
Date: Sat, 8 Oct 2005 00:10:02 +0700
From: "David A. Patterson" <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: selinux-policy-default: Makefile fails to make compatible
policy.VERSION
Message-ID: <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Reportbug-Version: 3.17
X-Debbugs-Cc: [EMAIL PROTECTED]
User-Agent: Mutt/1.5.11
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02
Package: selinux-policy-default
Version: 1:1.26-3
Severity: grave
Justification: renders package unusable
Kernel is the latest and greatest from Torvalds' archives, unpatched,
pristine. No Debian kernel works. policyvers reports 15 (?) so
pushed Makefile with POLICYCOMPAT = -c 15
and reran make and make install. Reboot fails with:
security: policydb 20 does not match my range (15 -19)
Am I missing a patch supplied on some other site than yours? You
don't seem to be supplying 'em any more.
-- System Information:
Debian Release: testing/unstable
APT prefers unstable
APT policy: (700, 'unstable'), (650, 'testing'), (600, 'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/dash
Kernel: Linux 2.6.13.3dc04
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
Versions of packages selinux-policy-default depends on:
ii checkpolicy 1.27.4-1 SELinux policy compiler
ii libpam-modules 0.79-3 Pluggable Authentication Modules f
ii libselinux1 1.26-1 SELinux shared libraries
ii m4 1.4.3-2 a macro processing language
ii make 3.80-11 The GNU version of the "make" util
ii policycoreutils 1.26-1 SELinux core policy utilities
ii python 2.3.5-3 An interactive high-level object-o
selinux-policy-default recommends no packages.
-- no debconf information
--
Regards, Dave
--
---------------------------------------
Received: (at 332658-close) by bugs.debian.org; 9 Oct 2005 10:38:06 +0000
>From [EMAIL PROTECTED] Sun Oct 09 03:38:06 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1EOYTU-0001AM-00; Sun, 09 Oct 2005 03:32:12 -0700
From: Russell Coker <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#332658: fixed in selinux-policy-default 1:1.26-5
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sun, 09 Oct 2005 03:32:12 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2
Source: selinux-policy-default
Source-Version: 1:1.26-5
We believe that the bug you reported is fixed in the latest version of
selinux-policy-default, which is due to be installed in the Debian FTP archive:
selinux-policy-default_1.26-5.diff.gz
to pool/main/s/selinux-policy-default/selinux-policy-default_1.26-5.diff.gz
selinux-policy-default_1.26-5.dsc
to pool/main/s/selinux-policy-default/selinux-policy-default_1.26-5.dsc
selinux-policy-default_1.26-5_all.deb
to pool/main/s/selinux-policy-default/selinux-policy-default_1.26-5_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Russell Coker <[EMAIL PROTECTED]> (supplier of updated selinux-policy-default
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 09 Oct 2005 20:12:00 +1000
Source: selinux-policy-default
Binary: selinux-policy-default
Architecture: source all
Version: 1:1.26-5
Distribution: unstable
Urgency: low
Maintainer: Russell Coker <[EMAIL PROTECTED]>
Changed-By: Russell Coker <[EMAIL PROTECTED]>
Description:
selinux-policy-default - Policy config files and management for NSA Security
Enhanced Linu
Closes: 285651 330546 332658
Changes:
selinux-policy-default (1:1.26-5) unstable; urgency=low
.
* Many minor changes.
.
* Made an old version of the policy be built for when your kernel is older
than your checkpolicy program.
Closes: #332658
.
* Made fsadm.te not depend on modutil.te.
Closes: #285651
.
* Made games macros not depend on utempter.te.
Closes: #330546
Files:
26e3c9866f7c4da97735a6d0bc644051 624 admin optional
selinux-policy-default_1.26-5.dsc
d1ddc55f713821ab6e799c9affabce1c 18257 admin optional
selinux-policy-default_1.26-5.diff.gz
8b766289d44a14e54a2846c9846c6908 256320 admin optional
selinux-policy-default_1.26-5_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFDSO1UwrB5/PXHUlYRAuCYAJ40p2zpHx2/IvDMfd8lFDPV1wfOlQCeM6ex
H9DRrLkw85QQcmlIf3aQiO0=
=OYo2
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]