معرفی شرکت ها


selinux-policy-targeted-37.19-1.fc37.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

SELinux targeted policy
ویژگی مقدار
سیستم عامل Linux
توزیع Fedora 37
مخزن Fedora Everything noarch
نام بسته selinux-policy-targeted
نام فایل بسته selinux-policy-targeted-37.19-1.fc37.noarch.rpm
نسخه بسته 37.19
انتشار بسته 1.fc37
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Fri 03 Feb 2023 06
هاست سازنده buildvm-s390x-27.s390.fedoraproject.org
نوع بسته .rpm
آدرس صفحه اصلی https://github.com/fedora-selinux/selinux-policy
مجوز GPLv2+
حجم دانلود 6.6M
حجم نصب 17.611M
SELinux targeted policy package.


جایگزین ها

بسته نسخه معماری مخزن
selinux-policy-targeted-37.12-2.fc37.noarch.rpm 37.12 noarch Fedora Server
selinux-policy-targeted-37.23-1.fc37.noarch.rpm 37.23 noarch Fedora Everything


نیازمندی

مقدار نام
- /bin/sh
- /bin/sh
- /bin/sh
- /bin/sh
- /bin/sh
= 37.19-1.fc37 config(selinux-policy-targeted)
- coreutils
>= 3.4-1 policycoreutils
= 37.19-1.fc37 selinux-policy
= 37.19-1.fc37 selinux-policy


ارائه دهنده

مقدار نام
= 37.19-1.fc37 config(selinux-policy-targeted)
= 37.19-1.fc37 selinux-policy-any
= 37.19-1.fc37 selinux-policy-targeted


نحوه نصب


نصب پکیج rpm selinux-policy-targeted:

    dnf install selinux-policy-targeted-37.19-1.fc37.noarch.rpm


فایل ها

مسیرها
/etc/selinux/targeted
/etc/selinux/targeted/.policy.sha512
/etc/selinux/targeted/booleans.subs_dist
/etc/selinux/targeted/contexts
/etc/selinux/targeted/contexts/customizable_types
/etc/selinux/targeted/contexts/dbus_contexts
/etc/selinux/targeted/contexts/default_contexts
/etc/selinux/targeted/contexts/default_type
/etc/selinux/targeted/contexts/failsafe_context
/etc/selinux/targeted/contexts/files
/etc/selinux/targeted/contexts/files/file_contexts
/etc/selinux/targeted/contexts/files/file_contexts.bin
/etc/selinux/targeted/contexts/files/file_contexts.homedirs
/etc/selinux/targeted/contexts/files/file_contexts.homedirs.bin
/etc/selinux/targeted/contexts/files/file_contexts.local
/etc/selinux/targeted/contexts/files/file_contexts.local.bin
/etc/selinux/targeted/contexts/files/file_contexts.subs
/etc/selinux/targeted/contexts/files/file_contexts.subs_dist
/etc/selinux/targeted/contexts/files/media
/etc/selinux/targeted/contexts/initrc_context
/etc/selinux/targeted/contexts/lxc_contexts
/etc/selinux/targeted/contexts/openssh_contexts
/etc/selinux/targeted/contexts/removable_context
/etc/selinux/targeted/contexts/securetty_types
/etc/selinux/targeted/contexts/sepgsql_contexts
/etc/selinux/targeted/contexts/snapperd_contexts
/etc/selinux/targeted/contexts/systemd_contexts
/etc/selinux/targeted/contexts/userhelper_context
/etc/selinux/targeted/contexts/users
/etc/selinux/targeted/contexts/users/guest_u
/etc/selinux/targeted/contexts/users/root
/etc/selinux/targeted/contexts/users/staff_u
/etc/selinux/targeted/contexts/users/sysadm_u
/etc/selinux/targeted/contexts/users/unconfined_u
/etc/selinux/targeted/contexts/users/user_u
/etc/selinux/targeted/contexts/users/xguest_u
/etc/selinux/targeted/contexts/virtual_domain_context
/etc/selinux/targeted/contexts/virtual_image_context
/etc/selinux/targeted/contexts/x_contexts
/etc/selinux/targeted/logins
/etc/selinux/targeted/policy
/etc/selinux/targeted/policy/policy.33
/etc/selinux/targeted/setrans.conf
/etc/selinux/targeted/seusers
/usr/share/selinux/targeted
/usr/share/selinux/targeted/base.lst
/usr/share/selinux/targeted/modules-base.lst
/usr/share/selinux/targeted/modules-contrib.lst
/usr/share/selinux/targeted/nonbasemodules.lst
/var/lib/selinux/targeted
... and 1702 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2023-02-03

Allow systemd-userdbd the sys_resource capability
Additional support for rpmdb_migrate
Allow nm-cloud-setup dispatcher plugin restart nm services
Dontaudit ftpd the execmem permission
Allow icecast rename its log files
Allow systemd-rfkill the bpf capability

2023-01-16

Allow apcupsd dbus chat with systemd-logind
Allow nut_domain manage also files and sock_files in /var/run
Label /usr/lib/rpm/rpmdb_migrate with rpmdb_exec_t
Allow tlp read generic SSL certificates
Allow systemd-resolved watch tmpfs directories
Revert "Allow systemd-resolved watch tmpfs directories"
Allow stalld to read /sys/kernel/security/lockdown file

2022-12-19

Allow gpsd the sys_ptrace userns capability
Introduce gpsd_tmp_t for sockfiles managed by gpsd_t
Allow ndc read hardware state information
Allow journalctl relabel with var_log_t and syslogd_var_run_t files
Allow systemd-resolved watch tmpfs directories
Allow systemd-timedated watch init runtime dir
donaudit virtlogd and dnsmasq execmem
Do not run restorecon /etc/NetworkManager/dispatcher.d in targeted
Trim changelog so that it starts at F35 time

2022-12-06

Reuse tmpfs_t also for the ramfs filesystem
Allow spamc read hardware state information files
Dontaudit systemd-gpt-generator the sys_admin capability
Allow syslogd read network sysctls

2022-11-23

Revert "Allow sysadm_t read raw memory devices"
Allow systemd-socket-proxyd get attributes of cgroup filesystems
Allow rpc.gssd read network sysctls
Allow winbind-rpcd get attributes of device and pty filesystems
Allow insights-client domain transition on semanage execution
Allow insights-client create gluster log dir with a transition
Allow insights-client manage generic locks
Allow insights-client unix_read all domain semaphores
Add domain_unix_read_all_semaphores() interface
Allow winbind-rpcd use the terminal multiplexor
Allow mrtg send mails
Allow systemd-hostnamed dbus chat with init scripts
Allow sssd dbus chat with system cronjobs
Add interface to watch all filesystems
Add watch_sb interfaces
Add watch interfaces
Allow dhcpd bpf capability to run bpf programs
Allow netutils and traceroute bpf capability to run bpf programs
Allow pkcs_slotd_t bpf capability to run bpf programs
Allow xdm bpf capability to run bpf programs
Allow pcscd bpf capability to run bpf programs
Allow lldpad bpf capability to run bpf programs
Allow keepalived bpf capability to run bpf programs
Allow ipsec bpf capability to run bpf programs
Allow fprintd bpf capability to run bpf programs
Allow systemd-socket-proxyd get filesystems attributes
Allow dirsrv_snmp_t to manage dirsrv_config_t & dirsrv_var_run_t files

2022-11-01

Allow systemd-gpt-generator raw write to a fixed disk
Allow rotatelogs read httpd_log_t symlinks
Add winbind-rpcd to samba_enable_home_dirs boolean
Allow system cronjobs dbus chat with setroubleshoot
Allow setroubleshootd read device sysctls
Allow virt_domain read device sysctls
Allow rhcd compute selinux access vector
Allow insights-client manage samba var dirs
Label ports 10161-10162 tcp/udp with snmp
Allow aide to connect to systemd_machined with a unix socket.
Allow samba-dcerpcd use NSCD services over a unix stream socket
Allow vlock search the contents of the /dev/pts directory
Allow insights-client send null signal to rpm and system cronjob
Label port 15354/tcp and 15354/udp with opendnssec
Allow ftpd map ftpd_var_run files
Allow targetclid to manage tmp files
Allow insights-client connect to postgresql with a unix socket
Allow insights-client domtrans on unix_chkpwd execution
Add file context entries for insights-client and rhc
Allow pulseaudio create gnome content (~/.config)
Allow login_userdomain dbus chat with rhsmcertd
Allow sbd the sys_ptrace capability
Allow ptp4l_t name_bind ptp_event_port_t

2022-10-03

Remove the ipa module
Allow sss daemons read/write unnamed pipes of cloud-init
Allow postfix_mailqueue create and use unix dgram sockets
Allow xdm watch user home directories
Allow nm-dispatcher ddclient plugin load a kernel module
Stop ignoring standalone interface files
Drop cockpit module
Allow init map its private tmp files
Allow xenstored change its hard resource limits
Allow system_mail-t read network sysctls
Add bgpd sys_chroot capability

2022-09-23

Update make-rhat-patches.sh file to use the f37 dist-git branch in F37

2022-09-22

nut-upsd: kernel_read_system_state, fs_getattr_cgroup
Add numad the ipc_owner capability
Allow gst-plugin-scanner read virtual memory sysctls
Allow init read/write inherited user fifo files
Update dnssec-trigger policy: setsched, module_request
added policy for systemd-socket-proxyd
Add the new 'cmd' permission to the 'io_uring' class
Allow winbind-rpcd read and write its key ring
Label /run/NetworkManager/no-stub-resolv.conf net_conf_t
Fix typo in comment
Do not run restorecon /etc/NetworkManager/dispatcher.d in mls and minimum

2022-09-14

Allow tor get filesystem attributes
Allow utempter append to login_userdomain stream
Allow login_userdomain accept a stream connection to XDM
Allow login_userdomain write to boltd named pipes
Allow staff_u and user_u users write to bolt pipe
Allow login_userdomain watch various directories
Update rhcd policy for executing additional commands 5
Update rhcd policy for executing additional commands 4
Allow rhcd create rpm hawkey logs with correct label
Allow systemd-gpt-auto-generator to check for empty dirs
Update rhcd policy for executing additional commands 3
Allow journalctl read rhcd fifo files
Update insights-client policy for additional commands execution 5
Allow init remount all file_type filesystems
Confine insights-client systemd unit
Update insights-client policy for additional commands execution 4
Allow pcp pmcd search tracefs and acct_data dirs
Allow httpd read network sysctls
Dontaudit domain map permission on directories
Revert "Allow X userdomains to mmap user_fonts_cache_t dirs"
Revert "Allow xdm_t domain to mmap /var/lib/gdm/.cache/fontconfig BZ(1725509)"
Update insights-client policy for additional commands execution 3
Allow systemd permissions needed for sandboxed services
Add rhcd module
Make dependency on rpm-plugin-selinux unordered

2022-09-02

Allow ipsec_t read/write tpm devices
Allow rhcd execute all executables
Update rhcd policy for executing additional commands 2
Update insights-client policy for additional commands execution 2
Allow sysadm_t read raw memory devices
Allow chronyd send and receive chronyd/ntp client packets
Allow ssh client read kerberos homedir config files
Label /var/log/rhc-worker-playbook with rhcd_var_log_t
Update insights-client policy (auditctl, gpg, journal)
Allow system_cronjob_t domtrans to rpm_script_t
Allow smbd_t process noatsecure permission for winbind_rpcd_t
Update tor_bind_all_unreserved_ports interface
Allow chronyd bind UDP sockets to ptp_event ports.
Allow unconfined and sysadm users transition for /root/.gnupg
Add gpg_filetrans_admin_home_content() interface
Update rhcd policy for executing additional commands
Update insights-client policy for additional commands execution
Add userdom_view_all_users_keys() interface
Allow gpg read and write generic pty type
Allow chronyc read and write generic pty type
Allow system_dbusd ioctl kernel with a unix stream sockets
Allow samba-bgqd to read a printer list
Allow stalld get and set scheduling policy of all domains.
Allow unconfined_t transition to targetclid_home_t

2022-08-11

Allow nm-dispatcher custom plugin dbus chat with nm
Allow nm-dispatcher sendmail plugin get status of systemd services
Allow xdm read the kernel key ring
Allow login_userdomain check status of mount units
Allow postfix/smtp and postfix/virtual read kerberos key table
Allow services execute systemd-notify
Do not allow login_userdomain use sd_notify()
Allow launch-xenstored read filesystem sysctls
Allow systemd-modules-load write to /dev/kmsg and send a message to syslogd
Allow openvswitch fsetid capability
Allow openvswitch use its private tmpfs files and dirs
Allow openvswitch search tracefs dirs
Allow pmdalinux read files on an nfsd filesystem
Allow winbind-rpcd write to winbind pid files
Allow networkmanager to signal unconfined process
Allow samba-bgqd get a printer list
fix(init.fc): Fix section description
Allow fedora-third-party read the passwords file
Remove permissive domain for rhcd_t
Allow pmie read network state information and network sysctls
Revert "Dontaudit domain the fowner capability"
Allow sysadm_t to run bpftool on the userdomain attribute
Add the userdom_prog_run_bpf_userdomain() interface
Allow insights-client rpm named file transitions
Add /var/tmp/insights-archive to insights_client_filetrans_named_content

2022-08-01

Allow sa-update to get init status and start systemd files
Use insights_client_filetrans_named_content
Make default file context match with named transitions
Allow nm-dispatcher tlp plugin send system log messages
Allow nm-dispatcher tlp plugin create and use unix_dgram_socket
Add permissions to manage lnk_files into gnome_manage_home_config
Allow rhsmcertd to read insights config files
Label /etc/insights-client/machine-id
fix(devices.fc): Replace single quote in comment to solve parsing issues
Make NetworkManager_dispatcher_custom_t an unconfined domain

2022-07-23

Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild

2022-07-14

Update winbind_rpcd_t
Allow some domains use sd_notify()
Revert "Allow rabbitmq to use systemd notify"
fix(sedoctool.py): Fix syntax warning: "is not" with a literal
Allow nm-dispatcher console plugin manage etc files
Allow networkmanager_dispatcher_plugin list NetworkManager_etc_t dirs
Allow nm-dispatcher console plugin setfscreate
Support using systemd-update-helper in rpm scriptlets
Allow nm-dispatcher winbind plugin read samba config files
Allow domain use userfaultfd over all domains
Allow cups-lpd read network sysctls

2022-06-29

Allow stalld set scheduling policy of kernel threads
Allow targetclid read /var/target files
Allow targetclid read generic SSL certificates (fixed)
Allow firewalld read the contents of the sysfs filesystem
Fix file context pattern for /var/target
Use insights_client_etc_t in insights_search_config()
Allow nm-dispatcher ddclient plugin handle systemd services
Allow nm-dispatcher winbind plugin run smbcontrol
Allow nm-dispatcher custom plugin create and use unix dgram socket
Update samba-dcerpcd policy for kerberos usage 2
Allow keepalived read the contents of the sysfs filesystem
Allow amandad read network sysctls
Allow cups-lpd read network sysctls
Allow kpropd read network sysctls
Update insights_client_filetrans_named_content()
Allow rabbitmq to use systemd notify
Label /var/target with targetd_var_t
Allow targetclid read generic SSL certificates
Update rhcd policy
Allow rhcd search insights configuration directories
Add the kernel_read_proc_files() interface
Require policycoreutils >= 3.4-1
Add a script for enclosing interfaces in ifndef statements
Disable rpm verification on interface_info