Package: selinux-policy-default
Version: 2:0.2.20091117-2
Severity: critical
Justification: breaks the whole system

Current kernel/udev uses devtmpfs for /dev.  When booting today I got
lots of errors from udevd-work about getting EOPNOTSUPP from
setfilecon().  Looking at /proc/mounts after boot, I see that most file
systems are mounted with the seclabel option, but /dev isn't.
All files in /dev are unlabelled, and restorecon doesn't help.

Cheers,
Julien

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (101, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages selinux-policy-default depends on:
ii  libpam-modules                1.1.1-3    Pluggable Authentication Modules f
ii  libselinux1                   2.0.94-1   SELinux runtime shared libraries
ii  libsepol1                     2.0.41-1   SELinux library for manipulating b
ii  policycoreutils               2.0.82-1   SELinux core policy utilities
ii  python                        2.5.4-9    An interactive high-level object-o

Versions of packages selinux-policy-default recommends:
ii  checkpolicy                 2.0.21-1     SELinux policy compiler
ii  setools                     3.3.6.ds-7.2 tools for Security Enhanced Linux 

Versions of packages selinux-policy-default suggests:
pn  logcheck                      <none>     (no description available)
pn  syslog-summary                <none>     (no description available)

-- Configuration Files:
/etc/selinux/default/modules/active/file_contexts.local [Errno 13] Permission 
denied: u'/etc/selinux/default/modules/active/file_contexts.local'

-- no debconf information

Attachment: signature.asc
Description: Digital signature

Reply via email to