Package: selinux-policy-default Version: 2:0.2.20091117-2 Severity: critical Justification: breaks the whole system
Current kernel/udev uses devtmpfs for /dev. When booting today I got lots of errors from udevd-work about getting EOPNOTSUPP from setfilecon(). Looking at /proc/mounts after boot, I see that most file systems are mounted with the seclabel option, but /dev isn't. All files in /dev are unlabelled, and restorecon doesn't help. Cheers, Julien -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (101, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores) Locale: LANG=C, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages selinux-policy-default depends on: ii libpam-modules 1.1.1-3 Pluggable Authentication Modules f ii libselinux1 2.0.94-1 SELinux runtime shared libraries ii libsepol1 2.0.41-1 SELinux library for manipulating b ii policycoreutils 2.0.82-1 SELinux core policy utilities ii python 2.5.4-9 An interactive high-level object-o Versions of packages selinux-policy-default recommends: ii checkpolicy 2.0.21-1 SELinux policy compiler ii setools 3.3.6.ds-7.2 tools for Security Enhanced Linux Versions of packages selinux-policy-default suggests: pn logcheck <none> (no description available) pn syslog-summary <none> (no description available) -- Configuration Files: /etc/selinux/default/modules/active/file_contexts.local [Errno 13] Permission denied: u'/etc/selinux/default/modules/active/file_contexts.local' -- no debconf information
signature.asc
Description: Digital signature

