On 5/24/19 9:00 AM, Jason Zaman wrote:
Bigon asked me to forward this so its part of the bug tracker.
On Fri, May 24, 2019 at 08:55:22PM +0800, Jason Zaman wrote:
On Fri, May 24, 2019 at 01:17:00PM +0200, Laurent Bigonville wrote:
Hello,
There is currently some discussion at [0] about SELinux
On Tue, 2017-03-14 at 00:11 +0100, cgzones wrote:
> Hi list,
> I created bug report against dbus 1.10 on Debian [1] due to failing
> to
> send policyload notices.
> Are there any objections or comments on the upstream patch[2]?
Also, the patch looks correct to me.
> The patch works for me:
>
> M
On Tue, 2017-03-14 at 00:11 +0100, cgzones wrote:
> Hi list,
> I created bug report against dbus 1.10 on Debian [1] due to failing
> to
> send policyload notices.
> Are there any objections or comments on the upstream patch[2]?
The patch has been working correctly in dbus 1.11 in Fedora for quite
On 07/14/2015 01:07 PM, Laurent Bigonville wrote:
> From: Laurent Bigonville
>
> This fixes audit information that are being logged and a crash when the
> python-audit binding is not installed.
>
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734806
Thanks, applied.
> ---
> policycoreuti
On 07/09/2015 07:42 AM, Laurent Bigonville wrote:
> From: Marcela Mašláňová
>
> Currently, jobs run by at are run in the crond_t domain and not
> transitioned outside of it.
>
> With this patch, the jobs are transitioned in the same domain as the
> jobs that are run by the cron daemon:
>
> - Wh
On 05/28/2015 02:06 PM, Laurent Bigonville wrote:
> Hello,
>
> In procps(-ng)[0] when the use of libselinux is enabled at build time,
> it always uses getpidcon() even if an other (or no) LSM is enabled.
>
> I tried to use getpidcon() (via the cmd tool getpidcon) with apparmor
> enabled instead o
On 01/20/2015 06:17 PM, James Morris wrote:
> On Sat, 17 Jan 2015, Ben Hutchings wrote:
>
>> chown() and write() should clear all privilege attributes on
>> a file - setuid, setgid, setcap and any other extended
>> privilege attributes.
>>
>> However, any attributes beyond setuid and setgid are ma
hink that is needed anymore; it was a legacy of older
libselinux. Modern libselinux will dlopen libsepol upon the call to
selinux_init_load_policy().
--
Stephen Smalley
National Security Agency
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
On Tue, 2008-04-08 at 10:30 +1100, Russell Coker wrote:
> On Tuesday 08 April 2008 02:55, Stephen Smalley <[EMAIL PROTECTED]> wrote:
> > On Mon, 2008-04-07 at 12:48 -0400, Stephen Smalley wrote:
> > > On Sat, 2008-04-05 at 13:47 +1100, Russell Coker wrote:
> > >
9 matches
Mail list logo