[DSE-Dev] Bug#742966: selinux-policy-default: user programs denied access to SIGCHLD
Laurent Bigonville
bigon at debian.org
Thu Apr 17 15:04:37 UTC 2014
Package: selinux-policy-default
Followup-For: Bug #742966
Hi,
So this should be fixed for *_gkeyringd_t, I'm not really sure how to
reproduce this for *_ssh_agent_t
Was there more denials in the logs?
Cheers,
Laurent Bigonville
-- System Information:
Debian Release: jessie/sid
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 3.13-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=fr_BE.utf8, LC_CTYPE=fr_BE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages selinux-policy-default depends on:
ii libpam-modules 1.1.8-3
ii libselinux1 2.2.2-1
ii libsepol1 2.2-1
ii policycoreutils 2.2.5-1
ii python 2.7.5-5
ii selinux-utils 2.2.2-1
Versions of packages selinux-policy-default recommends:
ii checkpolicy 2.2-1
ii setools 3.3.8-3
Versions of packages selinux-policy-default suggests:
pn logcheck <none>
pn syslog-summary <none>
-- Configuration Files:
/etc/selinux/default/modules/active/file_contexts.local [Errno 13] Permission non accordée: u'/etc/selinux/default/modules/active/file_contexts.local'
-- no debconf information
More information about the SELinux-devel
mailing list