معرفی شرکت ها


selinux-policy-minimum-3.14.3-74.el8.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

SELinux minimum base policy
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 8-stream
مخزن Centos BaseOS noarch
نام بسته selinux-policy-minimum
نام فایل بسته selinux-policy-minimum-3.14.3-74.el8.noarch.rpm
نسخه بسته 3.14.3
انتشار بسته 74.el8
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Wed 21 Jul 2021 04
هاست سازنده ppc64le-01.mbox.centos.org
نوع بسته .rpm
آدرس صفحه اصلی https://github.com/fedora-selinux/selinux-policy
مجوز GPLv2+
حجم دانلود 14M
حجم نصب 33.872M
SELinux Reference policy minimum base module.


جایگزین ها

بسته نسخه معماری مخزن
selinux-policy-minimum-3.14.3-100.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-104.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-105.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-106.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-108.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-110.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-111.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-113.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-114.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-115.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-117.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-118.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-119.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-120.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-121.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-122.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-123.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-125.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-126.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-127.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-128.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-130.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-131.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-133.el8.noarch.rpm 3.14.3 noarch CentOS virt
selinux-policy-minimum-3.14.3-134.el8.noarch.rpm 3.14.3 noarch CentOS virt
selinux-policy-minimum-3.14.3-135.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-136.el8.noarch.rpm 3.14.3 noarch CentOS virt
selinux-policy-minimum-3.14.3-137.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-67.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-68.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-71.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-72.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-75.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-76.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-78.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-79.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-80.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-81.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-82.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-83.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-84.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-85.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-86.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-88.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-89.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-91.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-92.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-93.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-94.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-95.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-96.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-97.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-98.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-99.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS


نیازمندی

مقدار نام
- /bin/sh
- /bin/sh
- /bin/sh
- /bin/sh
= 3.14.3-74.el8 config(selinux-policy-minimum)
- coreutils
>= 2.9 policycoreutils-python-utils
= 3.14.3-74.el8 selinux-policy
= 3.14.3-74.el8 selinux-policy


ارائه دهنده

مقدار نام
= 3.14.3-74.el8 config(selinux-policy-minimum)
= 3.14.3-74.el8 selinux-policy-base
= 3.14.3-74.el8 selinux-policy-minimum


نحوه نصب


نصب پکیج rpm selinux-policy-minimum:

    sudo dnf install selinux-policy-minimum-3.14.3-74.el8.noarch.rpm


فایل ها

مسیرها
/etc/selinux/minimum
/etc/selinux/minimum/.policy.sha512
/etc/selinux/minimum/booleans.subs_dist
/etc/selinux/minimum/contexts
/etc/selinux/minimum/contexts/customizable_types
/etc/selinux/minimum/contexts/dbus_contexts
/etc/selinux/minimum/contexts/default_contexts
/etc/selinux/minimum/contexts/default_type
/etc/selinux/minimum/contexts/failsafe_context
/etc/selinux/minimum/contexts/files
/etc/selinux/minimum/contexts/files/file_contexts
/etc/selinux/minimum/contexts/files/file_contexts.bin
/etc/selinux/minimum/contexts/files/file_contexts.homedirs
/etc/selinux/minimum/contexts/files/file_contexts.homedirs.bin
/etc/selinux/minimum/contexts/files/file_contexts.local
/etc/selinux/minimum/contexts/files/file_contexts.local.bin
/etc/selinux/minimum/contexts/files/file_contexts.subs
/etc/selinux/minimum/contexts/files/file_contexts.subs_dist
/etc/selinux/minimum/contexts/files/media
/etc/selinux/minimum/contexts/initrc_context
/etc/selinux/minimum/contexts/lxc_contexts
/etc/selinux/minimum/contexts/openssh_contexts
/etc/selinux/minimum/contexts/removable_context
/etc/selinux/minimum/contexts/securetty_types
/etc/selinux/minimum/contexts/sepgsql_contexts
/etc/selinux/minimum/contexts/snapperd_contexts
/etc/selinux/minimum/contexts/systemd_contexts
/etc/selinux/minimum/contexts/userhelper_context
/etc/selinux/minimum/contexts/users
/etc/selinux/minimum/contexts/users/guest_u
/etc/selinux/minimum/contexts/users/root
/etc/selinux/minimum/contexts/users/staff_u
/etc/selinux/minimum/contexts/users/sysadm_u
/etc/selinux/minimum/contexts/users/unconfined_u
/etc/selinux/minimum/contexts/users/user_u
/etc/selinux/minimum/contexts/users/xguest_u
/etc/selinux/minimum/contexts/virtual_domain_context
/etc/selinux/minimum/contexts/virtual_image_context
/etc/selinux/minimum/contexts/x_contexts
/etc/selinux/minimum/logins
/etc/selinux/minimum/policy
/etc/selinux/minimum/policy/policy.31
/etc/selinux/minimum/setrans.conf
/etc/selinux/minimum/seusers
/usr/share/selinux/minimum
/usr/share/selinux/minimum/base.lst
/usr/share/selinux/minimum/default
/usr/share/selinux/minimum/default/active
/usr/share/selinux/minimum/default/active/commit_num
/usr/share/selinux/minimum/default/active/file_contexts
... and 2958 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2021-07-16

Allow dyntransition from sshd_t to unconfined_t

2021-07-14

Removed adding to attribute unpriv_userdomain from userdom_unpriv_type template
Allow transition from xdm domain to unconfined_t domain.
Allow nftables read NetworkManager unnamed pipes
Create a policy for systemd-journal-upload
Add dev_getattr_infiniband_dev() interface.
Allow tcpdump and nmap get attributes of infiniband_device_t
Allow fcoemon create sysfs files
Allow nftables read NetworkManager unnamed pipes
Allow radius map its library files
Allow arpwatch get attributes of infiniband_device_t devices

2021-06-29

Allow systemd-sleep get attributes of fixed disk device nodes
Allow systemd-sleep create hardware state information files
virtiofs supports Xattrs and SELinux
Label 4460/tcp port as ntske_port_t
Add the miscfiles_map_generic_certs macro to the sysnet_dns_name_resolve macro.
Allow chronyd_t to accept and make NTS-KE connections
Dontaudit NetworkManager write to initrc_tmp_t pipes
Allow logrotate rotate container log files
Allow rhsmd read process state of all domains and kernel threads

2021-06-15

Allow nmap create and use rdma socket
Label /.k5identity file allow read of this file to rpc.gssd
Label /var/lib/kdump with kdump_var_lib_t
Label /run/libvirt/common with virt_common_var_run_t

2021-06-09

Allow using opencryptoki for ipsec
Remove all kernel_getattr_proc() interface calls
Allow domain stat /proc filesystem
Allow pkcs-slotd create and use netlink_kobject_uevent_socket
Allow using opencryptoki for certmonger
install_t: Allow NoNewPriv transition from systemd
Remove all kernel_getattr_proc() interface calls
Allow httpd_sys_script_t read, write, and map hugetlbfs files

2021-06-02

Add /var/usrlocal equivalency rule
Label /dev/trng with random_device_t
Allow systemd-sleep transition to sysstat_t
Allow systemd-sleep transition to tlp_t
Allow systemd-sleep transition to unconfined_service_t on bin_t executables
Allow systemd-sleep execute generic programs
Allow systemd-sleep execute shell
Allow nsswitch_domain read init pid lnk_files
Introduce logging_syslogd_list_non_security_dirs tunable
Add sysstat_domtrans() to allow systemd-sleep transition to sysstat_t
Change param description in cron interfaces to userdomain_prefix
Add missing declaration in rpm_named_filetrans()

2021-05-20

Allow pluto IKEv2 / ESP over TCP
Label SDC(scini) Dell Driver
Add file context specification for /var/tmp/tmp-inst
Allow virtlogd_t to create virt_var_lockd_t dir
Allow cups-lpd read its private runtime socket files

2021-03-15

Allow systemd the audit_control capability conditionally

2021-03-04

Disallow user_t run su/sudo and staff_t run su

2021-02-22

Relabel /usr/sbin/charon-systemd as ipsec_exec_t

2021-02-17

Allow unconfined_t and kprop_t to create krb5_0.rcache2 with the right context
Allow rhsmcertd bind tcp sockets to a generic node
Allow ipsec_mgmt_t mmap ipsec_conf_file_t files
Allow strongswan start using swanctl method
Allow systemd-importd manage machines.lock file

2021-02-11

Allow rtkit_daemon_t domain set process nice value in user namespaces
Allow gpsd read and write ptp4l_t shared memory.
Label /var/run/pcsd-ruby.socket socket with cluster_var_run_t type
Allow Certmonger to use opencryptoki services
Dontaudit vhostmd to write in /var/lib/rpm/ dir and allow signull rpm
Allow rhsmcertd_t read kpatch lib files
Allow ipsec_t connectto ipsec_mgmt_t
Allow IPsec to use opencryptoki services
Allow systemd-importd create /run/systemd/machines.lock file

2021-01-29

Allow rhsmcertd_t domain transition to kpatch_t
Revert "Add kpatch_exec() interface"
Revert "Allow rhsmcertd execute kpatch"
Dontaudit NetworkManager_t domain to write to kdump temp pipies
Allow NetworkManager_t domain to get status of samba services
Allow openvswitch create and use xfrm netlink sockets
Allow openvswitch_t perf_event write permission
Add write_perf_event_perms object permission set

2021-01-27

Add kpatch_exec() interface
Allow rhsmcertd execute kpatch
Allow openvswitch_t perf_event open permission
Allow openvswitch fowner capability and create netlink sockets
Add net_broadcast capability to openvswitch_t domain
Update interface modutils_read_module_deps to allow caller domain also mmap modules_dep_t files
Allow machinectl to run pull-tar

2021-01-13

Allow wireshark create and use rdma socket
Allow to use nnp_transition in pulseaudio_role
Allow certmonger fsetid capability
Add rsync_sys_admin tunable to allow rsync sys_admin capability
Allow sysadm read and write /dev/rfkill
Allow staff_u run pam_console_apply
Label /dev/vhost-vdpa-[0-9]+ as vhost_device_t

2020-12-17

Add cron_dbus_chat_system_job() interface
Dontaudit firewalld dac_override capability
Allow tcsd the setgid capability
Allow timedatex dbus chat with cron system domain
Allow systemd_hostnamed_t domain to dbus chat with sosreport_t domain
Allow pcp-pmcd manage perf_events
Label /dev/isst_interface as cpu_device_t
Allow ipsec set the context of a SPD entry to the default context
Allow sysadm_u user and unconfined_domain_type manage perf_events
Add manage_perf_event_perms object permissions set
Add perf_event access vectors.
Remove "ipa = module" from modules-targeted-contrib.conf