معرفی شرکت ها


selinux-policy-targeted-3.14.3-71.el8.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

SELinux targeted base policy
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 8-stream
مخزن Centos BaseOS noarch
نام بسته selinux-policy-targeted
نام فایل بسته selinux-policy-targeted-3.14.3-71.el8.noarch.rpm
نسخه بسته 3.14.3
انتشار بسته 71.el8
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Wed 16 Jun 2021 06
هاست سازنده x86-02.mbox.centos.org
نوع بسته .rpm
آدرس صفحه اصلی https://github.com/fedora-selinux/selinux-policy
مجوز GPLv2+
حجم دانلود 15M
حجم نصب 50.260M
SELinux Reference policy targeted base module.


جایگزین ها

بسته نسخه معماری مخزن
selinux-policy-targeted-3.14.3-100.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-104.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-105.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-106.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-108.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-110.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-111.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-113.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-114.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-115.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-117.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-118.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-119.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-120.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-121.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-122.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-123.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-125.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-126.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-127.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-128.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-130.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-131.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-133.el8.noarch.rpm 3.14.3 noarch CentOS virt
selinux-policy-targeted-3.14.3-134.el8.noarch.rpm 3.14.3 noarch CentOS virt
selinux-policy-targeted-3.14.3-135.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-136.el8.noarch.rpm 3.14.3 noarch CentOS virt
selinux-policy-targeted-3.14.3-137.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-67.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-68.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-72.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-74.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-75.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-76.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-78.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-79.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-80.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-81.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-82.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-83.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-84.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-85.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-86.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-88.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-89.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-91.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-92.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-93.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-94.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-95.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-96.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-97.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-98.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-99.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS


نیازمندی

مقدار نام
- /bin/sh
- /bin/sh
- /bin/sh
- /bin/sh
= 3.14.3-71.el8 config(selinux-policy-targeted)
- coreutils
>= 2.9 policycoreutils
= 3.14.3-71.el8 selinux-policy
= 3.14.3-71.el8 selinux-policy


ارائه دهنده

مقدار نام
= 3.14.3-71.el8 config(selinux-policy-targeted)
= 3.14.3-71.el8 selinux-policy-base
= 3.14.3-71.el8 selinux-policy-targeted


نحوه نصب


نصب پکیج rpm selinux-policy-targeted:

    sudo dnf install selinux-policy-targeted-3.14.3-71.el8.noarch.rpm


فایل ها

مسیرها
/etc/selinux/targeted
/etc/selinux/targeted/.policy.sha512
/etc/selinux/targeted/booleans.subs_dist
/etc/selinux/targeted/contexts
/etc/selinux/targeted/contexts/customizable_types
/etc/selinux/targeted/contexts/dbus_contexts
/etc/selinux/targeted/contexts/default_contexts
/etc/selinux/targeted/contexts/default_type
/etc/selinux/targeted/contexts/failsafe_context
/etc/selinux/targeted/contexts/files
/etc/selinux/targeted/contexts/files/file_contexts
/etc/selinux/targeted/contexts/files/file_contexts.bin
/etc/selinux/targeted/contexts/files/file_contexts.homedirs
/etc/selinux/targeted/contexts/files/file_contexts.homedirs.bin
/etc/selinux/targeted/contexts/files/file_contexts.local
/etc/selinux/targeted/contexts/files/file_contexts.local.bin
/etc/selinux/targeted/contexts/files/file_contexts.subs
/etc/selinux/targeted/contexts/files/file_contexts.subs_dist
/etc/selinux/targeted/contexts/files/media
/etc/selinux/targeted/contexts/initrc_context
/etc/selinux/targeted/contexts/lxc_contexts
/etc/selinux/targeted/contexts/openssh_contexts
/etc/selinux/targeted/contexts/removable_context
/etc/selinux/targeted/contexts/securetty_types
/etc/selinux/targeted/contexts/sepgsql_contexts
/etc/selinux/targeted/contexts/snapperd_contexts
/etc/selinux/targeted/contexts/systemd_contexts
/etc/selinux/targeted/contexts/userhelper_context
/etc/selinux/targeted/contexts/users
/etc/selinux/targeted/contexts/users/guest_u
/etc/selinux/targeted/contexts/users/root
/etc/selinux/targeted/contexts/users/staff_u
/etc/selinux/targeted/contexts/users/sysadm_u
/etc/selinux/targeted/contexts/users/unconfined_u
/etc/selinux/targeted/contexts/users/user_u
/etc/selinux/targeted/contexts/users/xguest_u
/etc/selinux/targeted/contexts/virtual_domain_context
/etc/selinux/targeted/contexts/virtual_image_context
/etc/selinux/targeted/contexts/x_contexts
/etc/selinux/targeted/logins
/etc/selinux/targeted/policy
/etc/selinux/targeted/policy/policy.31
/etc/selinux/targeted/setrans.conf
/etc/selinux/targeted/seusers
/usr/share/selinux/targeted
/usr/share/selinux/targeted/base.lst
/usr/share/selinux/targeted/default
/usr/share/selinux/targeted/default/active
/usr/share/selinux/targeted/default/active/commit_num
/usr/share/selinux/targeted/default/active/file_contexts
... and 2967 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2021-06-15

Allow nmap create and use rdma socket
Label /.k5identity file allow read of this file to rpc.gssd
Label /var/lib/kdump with kdump_var_lib_t
Label /run/libvirt/common with virt_common_var_run_t

2021-06-09

Allow using opencryptoki for ipsec
Remove all kernel_getattr_proc() interface calls
Allow domain stat /proc filesystem
Allow pkcs-slotd create and use netlink_kobject_uevent_socket
Allow using opencryptoki for certmonger
install_t: Allow NoNewPriv transition from systemd
Remove all kernel_getattr_proc() interface calls
Allow httpd_sys_script_t read, write, and map hugetlbfs files

2021-06-02

Add /var/usrlocal equivalency rule
Label /dev/trng with random_device_t
Allow systemd-sleep transition to sysstat_t
Allow systemd-sleep transition to tlp_t
Allow systemd-sleep transition to unconfined_service_t on bin_t executables
Allow systemd-sleep execute generic programs
Allow systemd-sleep execute shell
Allow nsswitch_domain read init pid lnk_files
Introduce logging_syslogd_list_non_security_dirs tunable
Add sysstat_domtrans() to allow systemd-sleep transition to sysstat_t
Change param description in cron interfaces to userdomain_prefix
Add missing declaration in rpm_named_filetrans()

2021-05-20

Allow pluto IKEv2 / ESP over TCP
Label SDC(scini) Dell Driver
Add file context specification for /var/tmp/tmp-inst
Allow virtlogd_t to create virt_var_lockd_t dir
Allow cups-lpd read its private runtime socket files

2021-03-15

Allow systemd the audit_control capability conditionally

2021-03-04

Disallow user_t run su/sudo and staff_t run su

2021-02-22

Relabel /usr/sbin/charon-systemd as ipsec_exec_t

2021-02-17

Allow unconfined_t and kprop_t to create krb5_0.rcache2 with the right context
Allow rhsmcertd bind tcp sockets to a generic node
Allow ipsec_mgmt_t mmap ipsec_conf_file_t files
Allow strongswan start using swanctl method
Allow systemd-importd manage machines.lock file

2021-02-11

Allow rtkit_daemon_t domain set process nice value in user namespaces
Allow gpsd read and write ptp4l_t shared memory.
Label /var/run/pcsd-ruby.socket socket with cluster_var_run_t type
Allow Certmonger to use opencryptoki services
Dontaudit vhostmd to write in /var/lib/rpm/ dir and allow signull rpm
Allow rhsmcertd_t read kpatch lib files
Allow ipsec_t connectto ipsec_mgmt_t
Allow IPsec to use opencryptoki services
Allow systemd-importd create /run/systemd/machines.lock file

2021-01-29

Allow rhsmcertd_t domain transition to kpatch_t
Revert "Add kpatch_exec() interface"
Revert "Allow rhsmcertd execute kpatch"
Dontaudit NetworkManager_t domain to write to kdump temp pipies
Allow NetworkManager_t domain to get status of samba services
Allow openvswitch create and use xfrm netlink sockets
Allow openvswitch_t perf_event write permission
Add write_perf_event_perms object permission set

2021-01-27

Add kpatch_exec() interface
Allow rhsmcertd execute kpatch
Allow openvswitch_t perf_event open permission
Allow openvswitch fowner capability and create netlink sockets
Add net_broadcast capability to openvswitch_t domain
Update interface modutils_read_module_deps to allow caller domain also mmap modules_dep_t files
Allow machinectl to run pull-tar

2021-01-13

Allow wireshark create and use rdma socket
Allow to use nnp_transition in pulseaudio_role
Allow certmonger fsetid capability
Add rsync_sys_admin tunable to allow rsync sys_admin capability
Allow sysadm read and write /dev/rfkill
Allow staff_u run pam_console_apply
Label /dev/vhost-vdpa-[0-9]+ as vhost_device_t

2020-12-17

Add cron_dbus_chat_system_job() interface
Dontaudit firewalld dac_override capability
Allow tcsd the setgid capability
Allow timedatex dbus chat with cron system domain
Allow systemd_hostnamed_t domain to dbus chat with sosreport_t domain
Allow pcp-pmcd manage perf_events
Label /dev/isst_interface as cpu_device_t
Allow ipsec set the context of a SPD entry to the default context
Allow sysadm_u user and unconfined_domain_type manage perf_events
Add manage_perf_event_perms object permissions set
Add perf_event access vectors.
Remove "ipa = module" from modules-targeted-contrib.conf

2020-12-03

Allow kexec manage generic tmp files
Update systemd-sleep policy
Add groupadd_t fowner capability

2020-11-24

Allow dovecot bind to smtp ports
Change fetchmail temporary files path to /var/spool/mail
Set file context for symlinks in /etc/httpd to etc_t
Allow dnsmasq read public files
Fix range for unreserved ports
Introduce logging_syslogd_append_public_content tunable
Add files_search_non_security_dirs() interface
Add miscfiles_append_public_files() interface

2020-11-12

Let keepalived bind a raw socket
Add fetchmail_uidl_cache_t type for /var/mail/.fetchmail.pid
Allow arpwatch create and use rdma socket
Allow systemd-logind manage efivarfs files
Allow systemd_resolved_t to read efivarfs
Allow systemd_modules_load_t to read efivarfs
Allow read efivarfs_t files by domains executing systemctl file
Introduce systemd_read_efivarfs_type attribute