Package: selinux-default-policy
Version: 1.26-2
Severity: normal

Do you want domains/program/slrnpull.te:slrnpull
Yes/No/Display [Y/n/d]?
Do you want domains/program/crack.te:Crack - Password cracking application
Yes/No/Display [Y/n/d]?
Installing the new SE Linux policy
mount: none already mounted or /selinux busy
dpkg: error processing selinux-policy-default (--configure):
 subprocess post-installation script returned error exit status 32
Errors were encountered while processing:
 selinux-policy-default
E: Sub-process /usr/bin/dpkg returned an error code (1)
driftcreek:/home/epperly#
driftcreek:/home/epperly# apt-get install selinux-policy-default
Reading package lists... Done
Building dependency tree... Done
selinux-policy-default is already the newest version.
0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
1 not fully installed or removed.
Need to get 0B of archives.
After unpacking 0B of additional disk space will be used.
Setting up selinux-policy-default (1.26-2) ...
Building policy.conf ...
Compiling policy ...
/usr/bin/checkpolicy:  loading policy configuration from policy.conf
domains/admin.te:18:ERROR 'unknown type utempter_exec_t' at token ';' on line 
40745:
#line 18
allow sysadm_games_t { shell_exec_t bin_t utempter_exec_t }:file { { read 
getattr lock execute ioctl } execute_no_trans };
/usr/bin/checkpolicy:  error(s) encountered while parsing configuration
make: *** [/etc/selinux/./policy/policy.20] Error 1
dpkg: error processing selinux-policy-default (--configure):
 subprocess post-installation script returned error exit status 2
Errors were encountered while processing:
 selinux-policy-default


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13.1
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to