Package: selinux-policy-default
Version: 1:1.26-2
Severity: normal

,----[ Error report ]
| /usr/bin/checkpolicy:  loading policy configuration from policy.conf
| assertion on line 488848 violated by allow kernel_t etc_t:file { write create 
setattr append unlink link rename };
| assertion on line 488847 violated by allow kernel_t etc_t:lnk_file { create 
setattr unlink link rename };
| assertion on line 488846 violated by allow kernel_t etc_t:dir { create 
setattr unlink link rename reparent rmdir };
| 3 assertion violations occured
| The assertions are:
| neverallow {domain -auth_write -etc_writer -unrestricted } etc_t:dir ~{ read 
getattr lock search ioctl add_name remove_name write };
| neverallow {domain -auth_write -etc_writer -unrestricted } etc_t:lnk_file ~{ 
read getattr lock ioctl };
| neverallow {domain -auth_write -etc_writer -unrestricted } etc_t:file ~{ 
execute_no_trans { read getattr lock execute ioctl } };
`----

        We need to add etc_writer to kernel_t unconditionally --
 checkpolicy versions now seem to check assertions with conditionals
 differently from before.

        manoj

diff -uBbwr usr/share/selinux/policy/default/domains/misc/kernel.te 
usr/share/selinux/policy/current
/domains/misc/kernel.te
--- usr/share/selinux/policy/default/domains/misc/kernel.te     2005-09-25 
07:23:41.000000000 -0500
+++ usr/share/selinux/policy/current/domains/misc/kernel.te     2005-10-03 
13:41:45.000000000 -0500
@@ -11,7 +11,7 @@
 # kernel_t is the domain of kernel threads.
 # It is also the target type when checking permissions in the system class.
 # 
-type kernel_t, domain, privmodule, privlog, sysctl_kernel_writer, mlsprocread, 
mlsprocwrite, privsy
smod ifdef(`nfs_export_all_rw',`,etc_writer'), privrangetrans ;
+type kernel_t, domain, privmodule, privlog, sysctl_kernel_writer, mlsprocread, 
mlsprocwrite, privsy
smod, etc_writer, privrangetrans ;
 role system_r types kernel_t;
 general_domain_access(kernel_t)
 general_proc_read_access(kernel_t)

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13-mh1-skas3-v9-pre7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages selinux-policy-default depends on:
ii  checkpolicy                   1.27.4-1   SELinux policy compiler
ii  libpam-modules                0.79-2     Pluggable Authentication Modules f
ii  libselinux1                   1.26-1     SELinux shared libraries
ii  m4                            1.4.3-2    a macro processing language
ii  make                          3.80-11    The GNU version of the "make" util
ii  policycoreutils               1.26-1     SELinux core policy utilities
ii  python                        2.3.5-3    An interactive high-level object-o

selinux-policy-default recommends no packages.

-- no debconf information

-- 
Where humor is concerned there are no standards -- no one can say what
is good or bad, although you can be sure that everyone will. -- John
Kenneth Galbraith
Manoj Srivastava   <[EMAIL PROTECTED]>    <[EMAIL PROTECTED]> 
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to