Bug#929063: SELinux integration in sysVinit

2019-05-24 Thread Stephen Smalley
On 5/24/19 9:00 AM, Jason Zaman wrote: Bigon asked me to forward this so its part of the bug tracker. On Fri, May 24, 2019 at 08:55:22PM +0800, Jason Zaman wrote: On Fri, May 24, 2019 at 01:17:00PM +0200, Laurent Bigonville wrote: Hello, There is currently some discussion at [0] about SELinux

Bug#857660: SELinux: cannot sent policyload notice

2017-03-21 Thread Stephen Smalley
On Tue, 2017-03-14 at 00:11 +0100, cgzones wrote: > Hi list, > I created bug report against dbus 1.10 on Debian [1] due to failing > to > send policyload notices. > Are there any objections or comments on the upstream patch[2]? Also, the patch looks correct to me. > The patch works for me: > > M

Bug#857660: SELinux: cannot sent policyload notice

2017-03-21 Thread Stephen Smalley
On Tue, 2017-03-14 at 00:11 +0100, cgzones wrote: > Hi list, > I created bug report against dbus 1.10 on Debian [1] due to failing > to > send policyload notices. > Are there any objections or comments on the upstream patch[2]? The patch has been working correctly in dbus 1.11 in Fedora for quite

Bug#734806: [PATCH] Set self.sename to sename after calling semanage_seuser_set_sename()

2015-07-16 Thread Stephen Smalley
On 07/14/2015 01:07 PM, Laurent Bigonville wrote: > From: Laurent Bigonville > > This fixes audit information that are being logged and a crash when the > python-audit binding is not installed. > > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734806 Thanks, applied. > --- > policycoreuti

Bug#510466: [PATCH] Add SELinux support to run jobs in the proper domain

2015-07-09 Thread Stephen Smalley
On 07/09/2015 07:42 AM, Laurent Bigonville wrote: > From: Marcela Mašláňová > > Currently, jobs run by at are run in the crond_t domain and not > transitioned outside of it. > > With this patch, the jobs are transitioned in the same domain as the > jobs that are run by the cron daemon: > > - Wh

Bug#786956: getpidcon() behaviour when other LSM is enabled

2015-05-28 Thread Stephen Smalley
On 05/28/2015 02:06 PM, Laurent Bigonville wrote: > Hello, > > In procps(-ng)[0] when the use of libselinux is enabled at build time, > it always uses getpidcon() even if an other (or no) LSM is enabled. > > I tried to use getpidcon() (via the cmd tool getpidcon) with apparmor > enabled instead o

Bug#770492: [RFC PATCH RESEND] vfs: Move security_inode_killpriv() after permission checks

2015-01-21 Thread Stephen Smalley
On 01/20/2015 06:17 PM, James Morris wrote: > On Sat, 17 Jan 2015, Ben Hutchings wrote: > >> chown() and write() should clear all privilege attributes on >> a file - setuid, setgid, setcap and any other extended >> privilege attributes. >> >> However, any attributes beyond setuid and setgid are ma

Bug#543420: upstart: SELinux support

2009-09-18 Thread Stephen Smalley
hink that is needed anymore; it was a legacy of older libselinux. Modern libselinux will dlopen libsepol upon the call to selinux_init_load_policy(). -- Stephen Smalley National Security Agency -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#474339: dpkg bug related to SE Linux

2008-04-08 Thread Stephen Smalley
On Tue, 2008-04-08 at 10:30 +1100, Russell Coker wrote: > On Tuesday 08 April 2008 02:55, Stephen Smalley <[EMAIL PROTECTED]> wrote: > > On Mon, 2008-04-07 at 12:48 -0400, Stephen Smalley wrote: > > > On Sat, 2008-04-05 at 13:47 +1100, Russell Coker wrote: > > >