معرفی شرکت ها


selinux-policy-minimum-3.14.3-88.el8.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

SELinux minimum base policy
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 8-stream
مخزن Centos BaseOS noarch
نام بسته selinux-policy-minimum
نام فایل بسته selinux-policy-minimum-3.14.3-88.el8.noarch.rpm
نسخه بسته 3.14.3
انتشار بسته 88.el8
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Thu 27 Jan 2022 11
هاست سازنده aarch64-02.mbox.centos.org
نوع بسته .rpm
آدرس صفحه اصلی https://github.com/fedora-selinux/selinux-policy
مجوز GPLv2+
حجم دانلود 14M
حجم نصب 33.789M
SELinux Reference policy minimum base module.


جایگزین ها

بسته نسخه معماری مخزن
selinux-policy-minimum-3.14.3-100.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-104.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-105.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-106.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-108.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-110.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-111.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-113.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-114.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-115.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-117.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-118.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-119.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-120.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-121.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-122.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-123.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-125.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-126.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-127.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-128.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-130.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-131.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-133.el8.noarch.rpm 3.14.3 noarch CentOS virt
selinux-policy-minimum-3.14.3-134.el8.noarch.rpm 3.14.3 noarch CentOS virt
selinux-policy-minimum-3.14.3-135.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-136.el8.noarch.rpm 3.14.3 noarch CentOS virt
selinux-policy-minimum-3.14.3-137.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-67.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-68.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-71.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-72.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-74.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-75.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-76.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-78.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-79.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-80.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-81.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-82.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-83.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-84.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-85.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-86.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-89.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-91.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-92.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-93.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-94.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-95.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-96.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-97.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-98.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-minimum-3.14.3-99.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS


نیازمندی

مقدار نام
- /bin/sh
- /bin/sh
- /bin/sh
- /bin/sh
= 3.14.3-88.el8 config(selinux-policy-minimum)
- coreutils
>= 2.9 policycoreutils-python-utils
= 3.14.3-88.el8 selinux-policy
= 3.14.3-88.el8 selinux-policy


ارائه دهنده

مقدار نام
= 3.14.3-88.el8 config(selinux-policy-minimum)
= 3.14.3-88.el8 selinux-policy-base
= 3.14.3-88.el8 selinux-policy-minimum


نحوه نصب


نصب پکیج rpm selinux-policy-minimum:

    sudo dnf install selinux-policy-minimum-3.14.3-88.el8.noarch.rpm


فایل ها

مسیرها
/etc/selinux/minimum
/etc/selinux/minimum/.policy.sha512
/etc/selinux/minimum/booleans.subs_dist
/etc/selinux/minimum/contexts
/etc/selinux/minimum/contexts/customizable_types
/etc/selinux/minimum/contexts/dbus_contexts
/etc/selinux/minimum/contexts/default_contexts
/etc/selinux/minimum/contexts/default_type
/etc/selinux/minimum/contexts/failsafe_context
/etc/selinux/minimum/contexts/files
/etc/selinux/minimum/contexts/files/file_contexts
/etc/selinux/minimum/contexts/files/file_contexts.bin
/etc/selinux/minimum/contexts/files/file_contexts.homedirs
/etc/selinux/minimum/contexts/files/file_contexts.homedirs.bin
/etc/selinux/minimum/contexts/files/file_contexts.local
/etc/selinux/minimum/contexts/files/file_contexts.local.bin
/etc/selinux/minimum/contexts/files/file_contexts.subs
/etc/selinux/minimum/contexts/files/file_contexts.subs_dist
/etc/selinux/minimum/contexts/files/media
/etc/selinux/minimum/contexts/initrc_context
/etc/selinux/minimum/contexts/lxc_contexts
/etc/selinux/minimum/contexts/openssh_contexts
/etc/selinux/minimum/contexts/removable_context
/etc/selinux/minimum/contexts/securetty_types
/etc/selinux/minimum/contexts/sepgsql_contexts
/etc/selinux/minimum/contexts/snapperd_contexts
/etc/selinux/minimum/contexts/systemd_contexts
/etc/selinux/minimum/contexts/userhelper_context
/etc/selinux/minimum/contexts/users
/etc/selinux/minimum/contexts/users/guest_u
/etc/selinux/minimum/contexts/users/root
/etc/selinux/minimum/contexts/users/staff_u
/etc/selinux/minimum/contexts/users/sysadm_u
/etc/selinux/minimum/contexts/users/unconfined_u
/etc/selinux/minimum/contexts/users/user_u
/etc/selinux/minimum/contexts/users/xguest_u
/etc/selinux/minimum/contexts/virtual_domain_context
/etc/selinux/minimum/contexts/virtual_image_context
/etc/selinux/minimum/contexts/x_contexts
/etc/selinux/minimum/logins
/etc/selinux/minimum/policy
/etc/selinux/minimum/policy/policy.31
/etc/selinux/minimum/setrans.conf
/etc/selinux/minimum/seusers
/usr/share/selinux/minimum
/usr/share/selinux/minimum/base.lst
/usr/share/selinux/minimum/default
/usr/share/selinux/minimum/default/active
/usr/share/selinux/minimum/default/active/commit_num
/usr/share/selinux/minimum/default/active/file_contexts
... and 2951 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2022-01-20

Revert "Label /etc/cockpit/ws-certs.d with cert_t"

2022-01-18

Set default file context for /sys/firmware/efi/efivars
Allow sysadm_t start and stop transient services
Label /etc/cockpit/ws-certs.d with cert_t
Allow smbcontrol read the network state information
Allow rhsm-service read/write its private memfd: objects
Allow fcoemon request the kernel to load a module
Allow radiusd connect to the radacct port
Label /var/lib/shorewall6-lite with shorewall_var_lib_t
Exclude container.if from selinux-policy-devel

2022-01-03

Allow sysadm execute sysadmctl in sysadm_t domain using sudo
Allow local_login_t get attributes of tmpfs filesystems
Allow local_login_t get attributes of filesystems with ext attributes
Allow local_login_t domain to getattr cgroup filesystem
Allow systemd read unlabeled symbolic links
Allow userdomains use pam_ssh_agent_auth for passwordless sudo
Allow sudodomains execute passwd in the passwd domain
Label authcompat.py with authconfig_exec_t
Dontaudit pkcsslotd sys_admin capability
Allow lldpd connect to snmpd with a unix domain stream socket

2021-12-07

Allow unconfined_t to node_bind icmp_sockets in node_t domain
Allow rhsmcertd get attributes of tmpfs_t filesystems
The nfsdcld service is now confined by SELinux
Allow smbcontrol use additional socket types
Allow lldpd use an snmp subagent over a tcp socket

2021-11-24

Allow sysadm_t read/write pkcs shared memory segments
Allow sysadm_t connect to sanlock over a unix stream socket
Allow sysadm_t dbus chat with sssd
Allow sysadm_t set attributes on character device nodes
Allow sysadm_t read and write watchdog devices
Allow sysadm_t connect to cluster domains over a unix stream socket
Allow sysadm_t dbus chat with tuned 2/2
Update userdom_exec_user_tmp_files() with an entrypoint rule
Allow sudodomain send a null signal to sshd processes
Allow sysadm_t dbus chat with tuned 1/2
Allow cloud-init dbus chat with systemd-logind
Allow svnserve send mail from the system
Allow svnserve_t domain to read system state

2021-11-09

VQP: Include IANA-assigned TCP/1589
Label port 3785/udp with bfd_echo
Allow sysadm_t dbus chat with realmd_t
Support sanlock VG automated recovery on storage access loss 1/2
Revert "Support sanlock VG automated recovery on storage access loss"
Support sanlock VG automated recovery on storage access loss
radius: Lexical sort of service-specific corenet rules by service name
radius: Allow binding to the BDF Control and Echo ports
radius: Allow binding to the DHCP client port
radius: Allow net_raw; allow binding to the DHCP server ports
Support hitless reloads feature in haproxy
Allow redis get attributes of filesystems with extended attributes
Support sanlock VG automated recovery on storage access loss 2/2
Revert "Support sanlock VG automated recovery on storage access loss"

2021-10-20

Support sanlock VG automated recovery on storage access loss
Allow proper function sosreport in sysadmin role
Allow systemd execute user bin files
Label /dev/crypto/nx-gzip with accelerator_device_t
Allow ipsec_t and login_userdomain named file transition in tmpfs
Support sanlock VG automated recovery on storage access loss
Allow proper function sosreport via iotop
Call pkcs_tmpfs_named_filetrans for certmonger
Allow ibacm the net_raw and sys_rawio capabilities
Support new PING_CHECK health checker in keepalived
Update spamassasin policy to make working /usr/share/spamassassin/sa-update.cron script

2021-10-04

Allow unconfined domains to bpf all other domains
Allow vmtools_unconfined_t domain transition to rpm_script_t
Allow unbound connectto unix_stream_socket
Label /usr/sbin/virtproxyd as virtd_exec_t
Allow postfix_domain to sendto unix dgram sockets.

2021-09-16

Allow rhsmcertd_t dbus chat with anaconda install_t

2021-08-27

Introduce xdm_manage_bootloader booelan
Rename samba_exec() to samba_exec_net()
Allow sssd to set samba setting
Allow dirsrv read slapd tmpfs files
Allow rhsmcertd to create cache file in /var/cache/cloud-what

2021-08-25

Label /usr/bin/Xwayland with xserver_exec_t
Label /usr/libexec/gdm-runtime-config with xdm_exec_t
Allow D-bus communication between avahi and sosreport
Allow lldpad send to kdumpctl over a unix dgram socket
Revert "Allow lldpad send to kdump over a unix dgram socket"
Allow chronyc respond to a user chronyd instance
Allow ptp4l respond to pmc
Allow lldpad send to unconfined_t over a unix dgram socket

2021-08-12

Revert "update libs_filetrans_named_content() to have support for /usr/lib/debug directory"
Allow sysadm to read/write scsi files and manage shadow
Allow rhsmcertd execute gpg
Allow lldpad send to kdump over a unix dgram socket
Remove glusterd SELinux module from distribution policy

2021-08-10

Allow login_userdomain read and map /var/lib/systemd files
Allow sysadm acces to kernel module resources
Allow sysadm to read/write scsi files and manage shadow
Allow sysadm access to files_unconfined and bind rpc ports
Allow sysadm read and view kernel keyrings
Allow bootloader to read tuned etc files
Update the policy for systemd-journal-upload
Allow journal mmap and read var lib files
Allow tuned to read rhsmcertd config files
Allow bootloader to read tuned etc files
Confine rhsm service and rhsm-facts service as rhsmcertd_t
Allow virtlogd_t read process state of user domains
Allow cockpit_ws_t get attributes of fs_t filesystems

2021-07-29

Add the unconfined_dgram_send() interface
Change dev_getattr_infiniband_dev() to use getattr_chr_files_pattern()
Add checkpoint_restore cap2 capability
Allow fcoemon talk with unconfined user over unix domain datagram socket
Allow hostapd bind UDP sockets to the dhcpd port
Allow NetworkManager read and write z90crypt device
Allow abrt_domain read and write z90crypt device
Label /usr/lib/pcs/pcs_snmp_agent with cluster_exec_t
Allow mdadm read iscsi pid files

2021-07-16

Allow dyntransition from sshd_t to unconfined_t

2021-07-14

Removed adding to attribute unpriv_userdomain from userdom_unpriv_type template
Allow transition from xdm domain to unconfined_t domain.
Allow nftables read NetworkManager unnamed pipes
Create a policy for systemd-journal-upload
Add dev_getattr_infiniband_dev() interface.
Allow tcpdump and nmap get attributes of infiniband_device_t
Allow fcoemon create sysfs files
Allow nftables read NetworkManager unnamed pipes
Allow radius map its library files
Allow arpwatch get attributes of infiniband_device_t devices