Your message dated Sun, 23 Aug 2009 06:02:10 +0000
with message-id <[email protected]>
and subject line Bug#515566: fixed in refpolicy 2:0.2.20090730-2
has caused the Debian Bug report #515566,
regarding selinux-policy-default: selinux policy violation "Unknown" fo rs2ram 
(hald_t)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
515566: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=515566
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: selinux-policy-default
Version: 2:0.0.20080702-14
Severity: important
Tags: selinux

This basically makes SELinux unusable on laptops.
Many of the selinux issues that I'm seeing are related to hald.
Probably, if we fix the hal policy, half of the problems should vanish.


Summary:

SELinux is preventing s2ram (hald_t) "execute" to /dev/mem
(memory_device_t).

Detailed Description:

[SELinux is in permissive mode, the operation would have been denied but
was
permitted due to permissive mode.]

SELinux denied access requested by s2ram. It is not expected that this
access is
required by s2ram and this access may signal an intrusion attempt. It is
also
possible that the specific version or configuration of the application
is
causing it to require additional access.

Allowing Access:

Sometimes labeling problems can cause SELinux denials. You could try to
restore
the default system file context for /dev/mem,

restorecon -v '/dev/mem'

If this does not work, there is currently no automatic way to allow this
access.
Instead, you can generate a local policy module to allow this access -
see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can
disable
SELinux protection altogether. Disabling SELinux protection is not
recommended.
Please file a bug report
(http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Additional Information:

Source Context                unconfined_u:system_r:hald_t:s0
Target Context                system_u:object_r:memory_device_t:s0
Target Objects                /dev/mem [ chr_file ]
Source                        s2ram
Source Path                   /usr/sbin/s2ram
Port                          <Unknown>
Host                          champaran
Source RPM Packages           
Target RPM Packages           
Policy RPM                    <Unknown>
Selinux Enabled               True
Policy Type                   default
MLS Enabled                   True
Enforcing Mode                Permissive
Plugin Name                   catchall_file
Host Name                     champaran
Platform                      Linux champaran 2.6.28-custom #1 SMP Thu
Feb 12
                              19:09:05 IST 2009 i686
Alert Count                   1
First Seen                    Mon 16 Feb 2009 01:27:06 PM IST
Last Seen                     Mon 16 Feb 2009 01:27:06 PM IST
Local ID                      4e89d6aa-5273-4b26-a949-228d7135f253
Line Numbers                  

Raw Audit Messages            

node=champaran type=AVC msg=audit(1234771026.836:570): avc:  denied  {
execute } for  pid=4458 comm="s2ram" path="/dev/mem" dev=tmpfs ino=1225
scontext=unconfined_u:system_r:hald_t:s0
tcontext=system_u:object_r:memory_device_t:s0 tclass=chr_file

node=champaran type=SYSCALL msg=audit(1234771026.836:570): arch=40000003
syscall=192 success=yes exit=0 a0=0 a1=502 a2=7 a3=11 items=0 ppid=4374
pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0
fsgid=0 tty=(none) ses=4294967295 comm="s2ram" exe="/usr/sbin/s2ram"
subj=unconfined_u:system_r:hald_t:s0 key=(null)






-- System Information:
Debian Release: 5.0
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (101, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.28-custom (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages selinux-policy-default depends on:
ii  libpam-modules                1.0.1-5    Pluggable Authentication Modules f
ii  libselinux1                   2.0.65-5   SELinux shared libraries
ii  libsepol1                     2.0.30-2   Security Enhanced Linux policy lib
ii  policycoreutils               2.0.49-8   SELinux core policy utilities
ii  python                        2.5.2-3    An interactive high-level object-o

Versions of packages selinux-policy-default recommends:
ii  checkpolicy                   2.0.16-3   SELinux policy compiler
ii  setools                       3.3.5.ds-5 tools for Security Enhanced Linux 

Versions of packages selinux-policy-default suggests:
pn  logcheck                      <none>     (no description available)
pn  syslog-summary                <none>     (no description available)

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: refpolicy
Source-Version: 2:0.2.20090730-2

We believe that the bug you reported is fixed in the latest version of
refpolicy, which is due to be installed in the Debian FTP archive:

refpolicy_0.2.20090730-2.diff.gz
  to pool/main/r/refpolicy/refpolicy_0.2.20090730-2.diff.gz
refpolicy_0.2.20090730-2.dsc
  to pool/main/r/refpolicy/refpolicy_0.2.20090730-2.dsc
selinux-policy-default_0.2.20090730-2_all.deb
  to pool/main/r/refpolicy/selinux-policy-default_0.2.20090730-2_all.deb
selinux-policy-dev_0.2.20090730-2_all.deb
  to pool/main/r/refpolicy/selinux-policy-dev_0.2.20090730-2_all.deb
selinux-policy-doc_0.2.20090730-2_all.deb
  to pool/main/r/refpolicy/selinux-policy-doc_0.2.20090730-2_all.deb
selinux-policy-mls_0.2.20090730-2_all.deb
  to pool/main/r/refpolicy/selinux-policy-mls_0.2.20090730-2_all.deb
selinux-policy-src_0.2.20090730-2_all.deb
  to pool/main/r/refpolicy/selinux-policy-src_0.2.20090730-2_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Manoj Srivastava <[email protected]> (supplier of updated refpolicy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

Format: 1.8
Date: Sat, 22 Aug 2009 19:47:20 -0500
Source: refpolicy
Binary: selinux-policy-default selinux-policy-mls selinux-policy-src 
selinux-policy-dev selinux-policy-doc
Architecture: source all
Version: 2:0.2.20090730-2
Distribution: unstable
Urgency: low
Maintainer: Russell Coker <[email protected]>
Changed-By: Manoj Srivastava <[email protected]>
Description: 
 selinux-policy-default - Strict and Targeted variants of the SELinux policy
 selinux-policy-dev - Headers from the SELinux reference policy for building 
modules
 selinux-policy-doc - Documentation for the SELinux reference policy
 selinux-policy-mls - MLS (Multi Level Security) variant of the SELinux policy
 selinux-policy-src - Source of the SELinux reference policy for customization
Closes: 515566
Changes: 
 refpolicy (2:0.2.20090730-2) unstable; urgency=low
 .
   * Bug fix: "selinux policy violation &quot;Unknown&quot; fo rs2ram
     (hald_t)", thanks to Ritesh Raj Sarraf. This has been fixed for a
     while, but I only just tested it.                (Closes: #515566).
   * Re-enable building in parallel. The current statge should be
     friendlier to jobserver mode, disabling which causewd all the issues
     with the previous  state.
Checksums-Sha1: 
 b0a592e2b98924bb010e544a25a79d2a712210e1 1489 refpolicy_0.2.20090730-2.dsc
 77f6f259ad95d0477a227fdcaa860547c9d03e51 91649 refpolicy_0.2.20090730-2.diff.gz
 63ba33682f8d2e4ee4a2223aacbfdca9fe63f0f8 3969958 
selinux-policy-default_0.2.20090730-2_all.deb
 6c66a36cca7e0c38297dd1f9fa2b9c93d38a7447 3971558 
selinux-policy-mls_0.2.20090730-2_all.deb
 1ac111703c76666e4dddb2dd8975e5fcf0ae64bc 870694 
selinux-policy-src_0.2.20090730-2_all.deb
 4b47c4c90ad6e8957c11fef063021687ff989f6c 707802 
selinux-policy-dev_0.2.20090730-2_all.deb
 f494bf6fa0326d9440b7c15707cf9e7eb350b327 479512 
selinux-policy-doc_0.2.20090730-2_all.deb
Checksums-Sha256: 
 a33cb0c66e8012d21a527b0138f10843fb7471de8e726316ecb683543f0f8d0d 1489 
refpolicy_0.2.20090730-2.dsc
 ae3442c09e2e087af9b442e3485035f25f8dc1e3ffb88bca0d2920076d3a7655 91649 
refpolicy_0.2.20090730-2.diff.gz
 1adcba1aa6ea86b861c1791574e308ddc30622c42516f20818a0c371df412af8 3969958 
selinux-policy-default_0.2.20090730-2_all.deb
 f226cd0a932eb826be234c1ccfb98e7006c902dc55746a33df0cc264466bd794 3971558 
selinux-policy-mls_0.2.20090730-2_all.deb
 dcd06d640e3e9a0e1a04fb20aa7066f8f70c82d25d28d99f6ac345fc58055592 870694 
selinux-policy-src_0.2.20090730-2_all.deb
 e8f7f60fecb5e57928555ad54e70e44d41b2525f9d7b8695761ffc788e1de81e 707802 
selinux-policy-dev_0.2.20090730-2_all.deb
 1ba9697fa643bc36dbfca12f0c41600118feedd3bba2dade12cfee57fba0168d 479512 
selinux-policy-doc_0.2.20090730-2_all.deb
Files: 
 50801664df6ab71f5b38a72b7373568e 1489 admin standard 
refpolicy_0.2.20090730-2.dsc
 eb8d941e4258b1104b554c66ee2d7e76 91649 admin standard 
refpolicy_0.2.20090730-2.diff.gz
 138e22973704fb8f7b11a9c1b3cf3927 3969958 admin standard 
selinux-policy-default_0.2.20090730-2_all.deb
 98fcb2777e37d8c50afca084930dde92 3971558 admin extra 
selinux-policy-mls_0.2.20090730-2_all.deb
 326c4ac4bd6531a6d6b0ab36eeab5de0 870694 admin optional 
selinux-policy-src_0.2.20090730-2_all.deb
 513eba46808af06f92004871ba85dc44 707802 admin optional 
selinux-policy-dev_0.2.20090730-2_all.deb
 7a0b9ae5af57111c70677d504b2a7bcd 479512 doc optional 
selinux-policy-doc_0.2.20090730-2_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.13-svn0 (GNU/Linux)

iEYEAREDAAYFAkqQw9kACgkQIbrau78kQkzBFACfcpVSO6OcD9ag6JH8sbdkam4P
4acAnRXtRwQDNi4zIMIxFG8yC9pzuM1R
=IlMB
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to