Bug 217881 - command `apropos selinux` doesn't list all tools for selinux
Summary: command `apropos selinux` doesn't list all tools for selinux
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: coreutils
Version: 5.0
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
: ---
Assignee: Ondrej Vasik
QA Contact: David Lawrence
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-11-30 16:12 UTC by Josef Kubin
Modified: 2008-05-21 15:16 UTC (History)
2 users (show)

Fixed In Version: RHBA-2008-0310
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-05-21 15:16:05 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2008:0310 0 normal SHIPPED_LIVE coreutils bug fix update 2008-05-20 18:53:27 UTC

Description Josef Kubin 2006-11-30 16:12:22 UTC
Description of problem:
User should easily find all tools for selinux with following commands:

$ apropos selinux
$ man -k selinux

I can't find in listing basic commands, for example "chcon" which is very
important for changing security context of folders/files.

How reproducible:
always

Comment 1 Tim Waugh 2007-01-12 10:59:07 UTC
apropos selinux 'security context'

finds many more, but as you'll see the relevant man pages are not restricted to
coreutils ones.  In fact, a large proportion seem to come from libselinux-devel.

chcon                (1)  - change security context
context_free [context_new] (3)  - Routines to manipulate SELinux security contexts
context_new          (3)  - Routines to manipulate SELinux security contexts
context_range_get [context_new] (3)  - Routines to manipulate SELinux security
contexts
context_range_set [context_new] (3)  - Routines to manipulate SELinux security
contexts
context_role_get [context_new] (3)  - Routines to manipulate SELinux security
contexts
context_role_set [context_new] (3)  - Routines to manipulate SELinux security
contexts
context_str [context_new] (3)  - Routines to manipulate SELinux security contexts
context_type_get [context_new] (3)  - Routines to manipulate SELinux security
contexts
context_type_set [context_new] (3)  - Routines to manipulate SELinux security
contexts
context_user_get [context_new] (3)  - Routines to manipulate SELinux security
contexts
context_user_set [context_new] (3)  - Routines to manipulate SELinux security
contexts
fgetfilecon [getfilecon] (3)  - get SE Linux security context of a file
fixfiles             (8)  - fix file security contexts
freecon              (3)  - free memory associated with SE Linux security contexts
freeconary [freecon] (3)  - free memory associated with SE Linux security contexts
fsetfilecon [setfilecon] (3)  - set SE Linux security context of a file
getcon               (3)  - get SE Linux security context of a process
getexeccon           (3)  - get or set the SE Linux security context used for
executing a new process
getfilecon           (3)  - get SE Linux security context of a file
getfscreatecon       (3)  - get or set the SE Linux security context used for
creating a new file system object
getpeercon [getcon]  (3)  - get security context of a peer socket
getpidcon [getcon]   (3)  - get SE Linux security context of a process
getprevcon [getcon]  (3)  - get SE Linux security context of a process
lgetfilecon [getfilecon] (3)  - get SE Linux security context of a file
lsetfilecon [setfilecon] (3)  - set SE Linux security context of a file
matchmediacon        (3)  - get the default security context for the specified
mediatype from the policy
matchpathcon         (3)  - get the default security context for the specified
path from the file contexts configuration
matchpathcon         (8)  - get the default security context for the specified
path from the file contexts configuration
pam_selinux          (8)  - PAM module to set the default security context
restorecon           (8)  - set file security contexts
rpm_execcon [getexeccon] (3)  - run a helper for rpm in an appropriate security
context
runcon               (1)  - run command with specified security context
sepol_check_context  (3)  - Check the validity of a security context against a
binary policy
setcon [getcon]      (3)  - set current security context of a process
setexeccon [getexeccon] (3)  - get or set the SE Linux security context used for
executing a new process
setfilecon           (3)  - set SE Linux security context of a file
setfiles             (8)  - set file security contexts
setfscreatecon [getfscreatecon] (3)  - get or set the SE Linux security context
used for creating a new file system object


Comment 2 Daniel Walsh 2007-01-12 16:47:47 UTC
Fixed in 
libselinux-1.33.4-2.el5
policycoreutils-1.33.12-2

man -k selinux | wc
now shows 157 versus 79 before update.

chcon still requires change  to coreutils.

I have a fix for that if we want to get it into RHEL5.  Already checked fix into
devel

Comment 3 RHEL Program Management 2007-06-05 20:48:49 UTC
This request was evaluated by Red Hat Product Management for
inclusion in a Red Hat Enterprise Linux release.  Since this
bugzilla is in a component that is not approved for the current
release, it has been closed with resolution deferred.  You may
reopen this bugzilla for consideration in the next release.

Comment 5 RHEL Program Management 2007-10-16 04:07:47 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.

Comment 11 errata-xmlrpc 2008-05-21 15:16:05 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHBA-2008-0310.html



Note You need to log in before you can comment on or make changes to this bug.