Hello,
Any news for this bug?
I've an extra request related to this.
According to [0] the selinuxfs in the chroot should be mounted as
read-only so the userspace inside the chroot thinks selinux is disabled.
If we are not doing this, dpkg (and other selinux-aware software) might
fail (see
Hello,
Currently in the refpolicy unconfined users can transition to the rpm_t
(and then to rpm_script_t) domain when using the rpm commands.
On the other hand, the transition is not allowed for unconfined users
to transition to dpkg_t. Shouldn't also be the case?
I can propose a patch if you
control: tags -1 + help
Hi Laurent,
On Dienstag, 7. Januar 2014, Laurent Bigonville wrote:
Any news for this bug?
no.
I also don't have motivation to work on this, so help would be welcome. (I'd
rather invest time in AppArmor than SELinux...)
cheers,
Holger
signature.asc