Bug#722700: selinux-policy-default: Permission block_suspend in class capability2 not defined in policy.

2013-09-14 Thread Dominick Grift
Yes and you might want to build with UNK_PERMS = allow to avoid similar issues in the future -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#722700: selinux-policy-default: Permission block_suspend in class capability2 not defined in policy.

2013-09-13 Thread Leos Bitto
Package: selinux-policy-default Version: 2:2.20110726-12 Severity: grave Tags: upstream Justification: renders package unusable Dear Maintainer, this is an example from ausearch -m avc: type=SYSCALL msg=audit(1379073446.149:88): arch=4003 syscall=255 success=yes exit=0 a0=e a1=2 a2=1f