معرفی شرکت ها


selinux-policy-targeted-3.14.3-76.el8.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

SELinux targeted base policy
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 8-stream
مخزن Centos BaseOS noarch
نام بسته selinux-policy-targeted
نام فایل بسته selinux-policy-targeted-3.14.3-76.el8.noarch.rpm
نسخه بسته 3.14.3
انتشار بسته 76.el8
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Thu 12 Aug 2021 09
هاست سازنده x86-01.mbox.centos.org
نوع بسته .rpm
آدرس صفحه اصلی https://github.com/fedora-selinux/selinux-policy
مجوز GPLv2+
حجم دانلود 16M
حجم نصب 50.294M
SELinux Reference policy targeted base module.


جایگزین ها

بسته نسخه معماری مخزن
selinux-policy-targeted-3.14.3-100.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-104.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-105.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-106.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-108.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-110.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-111.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-113.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-114.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-115.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-117.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-118.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-119.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-120.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-121.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-122.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-123.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-125.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-126.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-127.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-128.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-130.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-131.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-133.el8.noarch.rpm 3.14.3 noarch CentOS virt
selinux-policy-targeted-3.14.3-134.el8.noarch.rpm 3.14.3 noarch CentOS virt
selinux-policy-targeted-3.14.3-135.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-136.el8.noarch.rpm 3.14.3 noarch CentOS virt
selinux-policy-targeted-3.14.3-137.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-67.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-68.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-71.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-72.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-74.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-75.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-78.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-79.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-80.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-81.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-82.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-83.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-84.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-85.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-86.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-88.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-89.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-91.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-92.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-93.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-94.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-95.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-96.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-97.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-98.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS
selinux-policy-targeted-3.14.3-99.el8.noarch.rpm 3.14.3 noarch CentOS BaseOS


نیازمندی

مقدار نام
- /bin/sh
- /bin/sh
- /bin/sh
- /bin/sh
= 3.14.3-76.el8 config(selinux-policy-targeted)
- coreutils
>= 2.9 policycoreutils
= 3.14.3-76.el8 selinux-policy
= 3.14.3-76.el8 selinux-policy


ارائه دهنده

مقدار نام
= 3.14.3-76.el8 config(selinux-policy-targeted)
= 3.14.3-76.el8 selinux-policy-base
= 3.14.3-76.el8 selinux-policy-targeted


نحوه نصب


نصب پکیج rpm selinux-policy-targeted:

    sudo dnf install selinux-policy-targeted-3.14.3-76.el8.noarch.rpm


فایل ها

مسیرها
/etc/selinux/targeted
/etc/selinux/targeted/.policy.sha512
/etc/selinux/targeted/booleans.subs_dist
/etc/selinux/targeted/contexts
/etc/selinux/targeted/contexts/customizable_types
/etc/selinux/targeted/contexts/dbus_contexts
/etc/selinux/targeted/contexts/default_contexts
/etc/selinux/targeted/contexts/default_type
/etc/selinux/targeted/contexts/failsafe_context
/etc/selinux/targeted/contexts/files
/etc/selinux/targeted/contexts/files/file_contexts
/etc/selinux/targeted/contexts/files/file_contexts.bin
/etc/selinux/targeted/contexts/files/file_contexts.homedirs
/etc/selinux/targeted/contexts/files/file_contexts.homedirs.bin
/etc/selinux/targeted/contexts/files/file_contexts.local
/etc/selinux/targeted/contexts/files/file_contexts.local.bin
/etc/selinux/targeted/contexts/files/file_contexts.subs
/etc/selinux/targeted/contexts/files/file_contexts.subs_dist
/etc/selinux/targeted/contexts/files/media
/etc/selinux/targeted/contexts/initrc_context
/etc/selinux/targeted/contexts/lxc_contexts
/etc/selinux/targeted/contexts/openssh_contexts
/etc/selinux/targeted/contexts/removable_context
/etc/selinux/targeted/contexts/securetty_types
/etc/selinux/targeted/contexts/sepgsql_contexts
/etc/selinux/targeted/contexts/snapperd_contexts
/etc/selinux/targeted/contexts/systemd_contexts
/etc/selinux/targeted/contexts/userhelper_context
/etc/selinux/targeted/contexts/users
/etc/selinux/targeted/contexts/users/guest_u
/etc/selinux/targeted/contexts/users/root
/etc/selinux/targeted/contexts/users/staff_u
/etc/selinux/targeted/contexts/users/sysadm_u
/etc/selinux/targeted/contexts/users/unconfined_u
/etc/selinux/targeted/contexts/users/user_u
/etc/selinux/targeted/contexts/users/xguest_u
/etc/selinux/targeted/contexts/virtual_domain_context
/etc/selinux/targeted/contexts/virtual_image_context
/etc/selinux/targeted/contexts/x_contexts
/etc/selinux/targeted/logins
/etc/selinux/targeted/policy
/etc/selinux/targeted/policy/policy.31
/etc/selinux/targeted/setrans.conf
/etc/selinux/targeted/seusers
/usr/share/selinux/targeted
/usr/share/selinux/targeted/base.lst
/usr/share/selinux/targeted/default
/usr/share/selinux/targeted/default/active
/usr/share/selinux/targeted/default/active/commit_num
/usr/share/selinux/targeted/default/active/file_contexts
... and 2967 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2021-08-10

Allow login_userdomain read and map /var/lib/systemd files
Allow sysadm acces to kernel module resources
Allow sysadm to read/write scsi files and manage shadow
Allow sysadm access to files_unconfined and bind rpc ports
Allow sysadm read and view kernel keyrings
Allow bootloader to read tuned etc files
Update the policy for systemd-journal-upload
Allow journal mmap and read var lib files
Allow tuned to read rhsmcertd config files
Allow bootloader to read tuned etc files
Confine rhsm service and rhsm-facts service as rhsmcertd_t
Allow virtlogd_t read process state of user domains
Allow cockpit_ws_t get attributes of fs_t filesystems

2021-07-29

Add the unconfined_dgram_send() interface
Change dev_getattr_infiniband_dev() to use getattr_chr_files_pattern()
Add checkpoint_restore cap2 capability
Allow fcoemon talk with unconfined user over unix domain datagram socket
Allow hostapd bind UDP sockets to the dhcpd port
Allow NetworkManager read and write z90crypt device
Allow abrt_domain read and write z90crypt device
Label /usr/lib/pcs/pcs_snmp_agent with cluster_exec_t
Allow mdadm read iscsi pid files

2021-07-16

Allow dyntransition from sshd_t to unconfined_t

2021-07-14

Removed adding to attribute unpriv_userdomain from userdom_unpriv_type template
Allow transition from xdm domain to unconfined_t domain.
Allow nftables read NetworkManager unnamed pipes
Create a policy for systemd-journal-upload
Add dev_getattr_infiniband_dev() interface.
Allow tcpdump and nmap get attributes of infiniband_device_t
Allow fcoemon create sysfs files
Allow nftables read NetworkManager unnamed pipes
Allow radius map its library files
Allow arpwatch get attributes of infiniband_device_t devices

2021-06-29

Allow systemd-sleep get attributes of fixed disk device nodes
Allow systemd-sleep create hardware state information files
virtiofs supports Xattrs and SELinux
Label 4460/tcp port as ntske_port_t
Add the miscfiles_map_generic_certs macro to the sysnet_dns_name_resolve macro.
Allow chronyd_t to accept and make NTS-KE connections
Dontaudit NetworkManager write to initrc_tmp_t pipes
Allow logrotate rotate container log files
Allow rhsmd read process state of all domains and kernel threads

2021-06-15

Allow nmap create and use rdma socket
Label /.k5identity file allow read of this file to rpc.gssd
Label /var/lib/kdump with kdump_var_lib_t
Label /run/libvirt/common with virt_common_var_run_t

2021-06-09

Allow using opencryptoki for ipsec
Remove all kernel_getattr_proc() interface calls
Allow domain stat /proc filesystem
Allow pkcs-slotd create and use netlink_kobject_uevent_socket
Allow using opencryptoki for certmonger
install_t: Allow NoNewPriv transition from systemd
Remove all kernel_getattr_proc() interface calls
Allow httpd_sys_script_t read, write, and map hugetlbfs files

2021-06-02

Add /var/usrlocal equivalency rule
Label /dev/trng with random_device_t
Allow systemd-sleep transition to sysstat_t
Allow systemd-sleep transition to tlp_t
Allow systemd-sleep transition to unconfined_service_t on bin_t executables
Allow systemd-sleep execute generic programs
Allow systemd-sleep execute shell
Allow nsswitch_domain read init pid lnk_files
Introduce logging_syslogd_list_non_security_dirs tunable
Add sysstat_domtrans() to allow systemd-sleep transition to sysstat_t
Change param description in cron interfaces to userdomain_prefix
Add missing declaration in rpm_named_filetrans()

2021-05-20

Allow pluto IKEv2 / ESP over TCP
Label SDC(scini) Dell Driver
Add file context specification for /var/tmp/tmp-inst
Allow virtlogd_t to create virt_var_lockd_t dir
Allow cups-lpd read its private runtime socket files

2021-03-15

Allow systemd the audit_control capability conditionally

2021-03-04

Disallow user_t run su/sudo and staff_t run su

2021-02-22

Relabel /usr/sbin/charon-systemd as ipsec_exec_t

2021-02-17

Allow unconfined_t and kprop_t to create krb5_0.rcache2 with the right context
Allow rhsmcertd bind tcp sockets to a generic node
Allow ipsec_mgmt_t mmap ipsec_conf_file_t files
Allow strongswan start using swanctl method
Allow systemd-importd manage machines.lock file

2021-02-11

Allow rtkit_daemon_t domain set process nice value in user namespaces
Allow gpsd read and write ptp4l_t shared memory.
Label /var/run/pcsd-ruby.socket socket with cluster_var_run_t type
Allow Certmonger to use opencryptoki services
Dontaudit vhostmd to write in /var/lib/rpm/ dir and allow signull rpm
Allow rhsmcertd_t read kpatch lib files
Allow ipsec_t connectto ipsec_mgmt_t
Allow IPsec to use opencryptoki services
Allow systemd-importd create /run/systemd/machines.lock file

2021-01-29

Allow rhsmcertd_t domain transition to kpatch_t
Revert "Add kpatch_exec() interface"
Revert "Allow rhsmcertd execute kpatch"
Dontaudit NetworkManager_t domain to write to kdump temp pipies
Allow NetworkManager_t domain to get status of samba services
Allow openvswitch create and use xfrm netlink sockets
Allow openvswitch_t perf_event write permission
Add write_perf_event_perms object permission set

2021-01-27

Add kpatch_exec() interface
Allow rhsmcertd execute kpatch
Allow openvswitch_t perf_event open permission
Allow openvswitch fowner capability and create netlink sockets
Add net_broadcast capability to openvswitch_t domain
Update interface modutils_read_module_deps to allow caller domain also mmap modules_dep_t files
Allow machinectl to run pull-tar