معرفی شرکت ها


selinux-policy-39.6-1.fc39.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

SELinux policy configuration
ویژگی مقدار
سیستم عامل Linux
توزیع Fedora 39
مخزن Fedora Everything noarch
نام بسته selinux-policy
نام فایل بسته selinux-policy-39.6-1.fc39.noarch.rpm
نسخه بسته 39.6
انتشار بسته 1.fc39
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Wed 24 Apr 2024 03
هاست سازنده buildvm-ppc64le-20.iad2.fedoraproject.org
نوع بسته .rpm
آدرس صفحه اصلی https://github.com/fedora-selinux/selinux-policy
مجوز GPL-2.0-or-later
حجم دانلود 58K
حجم نصب 25.139K
SELinux core policy package. Originally based off of reference policy, the policy has been adjusted to provide support for Fedora.


جایگزین ها

بسته نسخه معماری مخزن
selinux-policy-38.28-1.fc39.noarch.rpm 38.28 noarch Fedora Server
selinux-policy-38.28-1.fc39.src.rpm 38.28 noarch Fedora Server
selinux-policy-39.2-1.fc39.noarch.rpm 39.2 noarch Fedora Everything
selinux-policy-39.3-1.fc39.noarch.rpm 39.3 noarch Fedora Everything
selinux-policy-39.3-1.fc39.src.rpm 39.3 noarch Fedora Everything
selinux-policy-39.6-1.fc39.src.rpm 39.6 noarch Fedora Everything
selinux-policy-devel-38.28-1.fc39.noarch.rpm 38.28 noarch Fedora Everything
selinux-policy-devel-39.2-1.fc39.noarch.rpm 39.2 noarch Fedora Everything
selinux-policy-devel-39.3-1.fc39.noarch.rpm 39.3 noarch Fedora Everything
selinux-policy-devel-39.6-1.fc39.noarch.rpm 39.6 noarch Fedora Everything
selinux-policy-doc-38.28-1.fc39.noarch.rpm 38.28 noarch Fedora Everything
selinux-policy-doc-39.2-1.fc39.noarch.rpm 39.2 noarch Fedora Everything
selinux-policy-doc-39.3-1.fc39.noarch.rpm 39.3 noarch Fedora Everything
selinux-policy-doc-39.6-1.fc39.noarch.rpm 39.6 noarch Fedora Everything
selinux-policy-minimum-38.28-1.fc39.noarch.rpm 38.28 noarch Fedora Server
selinux-policy-minimum-39.2-1.fc39.noarch.rpm 39.2 noarch Fedora Everything
selinux-policy-minimum-39.3-1.fc39.noarch.rpm 39.3 noarch Fedora Everything
selinux-policy-minimum-39.6-1.fc39.noarch.rpm 39.6 noarch Fedora Everything
selinux-policy-mls-38.28-1.fc39.noarch.rpm 38.28 noarch Fedora Server
selinux-policy-mls-39.2-1.fc39.noarch.rpm 39.2 noarch Fedora Everything
selinux-policy-mls-39.3-1.fc39.noarch.rpm 39.3 noarch Fedora Everything
selinux-policy-mls-39.6-1.fc39.noarch.rpm 39.6 noarch Fedora Everything
selinux-policy-sandbox-38.28-1.fc39.noarch.rpm 38.28 noarch Fedora Everything
selinux-policy-sandbox-39.2-1.fc39.noarch.rpm 39.2 noarch Fedora Everything
selinux-policy-sandbox-39.3-1.fc39.noarch.rpm 39.3 noarch Fedora Everything
selinux-policy-sandbox-39.6-1.fc39.noarch.rpm 39.6 noarch Fedora Everything
selinux-policy-targeted-38.28-1.fc39.noarch.rpm 38.28 noarch Fedora Server
selinux-policy-targeted-39.2-1.fc39.noarch.rpm 39.2 noarch Fedora Everything
selinux-policy-targeted-39.3-1.fc39.noarch.rpm 39.3 noarch Fedora Everything
selinux-policy-targeted-39.6-1.fc39.noarch.rpm 39.6 noarch Fedora Everything


نیازمندی

مقدار نام
- /bin/awk
- /bin/sh
- /bin/sh
- /bin/sh
- /bin/sh
- /usr/bin/sha512sum
= 39.6-1.fc39 config(selinux-policy)
>= 3.4-1 policycoreutils
- rpm-plugin-selinux
= 39.6-1.fc39 selinux-policy-any


ارائه دهنده

مقدار نام
= 39.6-1.fc39 config(selinux-policy)
- rpm_macro(_file_context_file)
- rpm_macro(_file_context_file_pre)
- rpm_macro(_file_custom_defined_booleans)
- rpm_macro(_file_custom_defined_booleans_tmp)
- rpm_macro(_selinux_policy_version)
- rpm_macro(_selinux_store_path)
- rpm_macro(_selinux_store_policy_path)
- rpm_macro(selinux_modules_install)
- rpm_macro(selinux_modules_uninstall)
- rpm_macro(selinux_relabel_post)
- rpm_macro(selinux_relabel_pre)
- rpm_macro(selinux_requires)
- rpm_macro(selinux_set_booleans)
- rpm_macro(selinux_unset_booleans)
= 39.6-1.fc39 selinux-policy
= 39.6-1.fc39 selinux-policy-base


نحوه نصب


نصب پکیج rpm selinux-policy:

    dnf install selinux-policy-39.6-1.fc39.noarch.rpm


فایل ها

مسیرها
/etc/selinux
/etc/selinux/config
/etc/sysconfig/selinux
/usr/lib/rpm/macros.d/macros.selinux-policy
/usr/lib/systemd/system/selinux-check-proper-disable.service
/usr/lib/tmpfiles.d/selinux-policy.conf
/usr/share/licenses/selinux-policy
/usr/share/licenses/selinux-policy/COPYING
/usr/share/selinux


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2024-04-23

Allow smbd_t to watch user_home_dir_t if samba_enable_home_dirs is on
Allow auditd read all domains process state
Allow keyutils-dns-resolver connect to the system log service
dontaudit execmem for modemmanager
Dontaudit systemd-hwdb dac_override capability
Allow plymouthd log during shutdown
Allow journalctl_t read filesystem sysctls
Replace init domtrans rule for confined users to allow exec init
Allow sulogin relabel tty1
Dontaudit sulogin the checkpoint_restore capability
Allow wireguard work with firewall-cmd

2024-02-27

Allow userdomain get attributes of files on an nsfs filesystem
Allow login_userdomain map files in /var
Update ssh_role_template() for user ssh-agent type
Dontaudit getty and plymouth the checkpoint_restore capability
Allow sendmail MTA connect to sendmail LDA
Allow system_mail_t manage exim spool files and dirs

2024-01-25

Allow collectd read raw fixed disk device
Allow collectd read udev pid files
Allow httpd work with PrivateTmp
Allow certmonger read network sysctls
Allow systemd-sleep set attributes of efivarfs files
Allow spamd_update_t the sys_ptrace capability in user namespace
Allow alsa get attributes filesystems with extended attributes
Allow systemd-sleep send a message to syslog over a unix dgram socket

2023-12-15

Allow init create and use vsock sockets
Allow ddclient send e-mail notifications
Allow postfix_master_t map postfix data files
Allow thumb_t append to init unix domain stream sockets
Allow spamd_update_t read hardware state information
Allow systemd-sleep create efivarfs files

2023-11-14

Allow graphical applications work in Wayland
Allow map xserver_tmpfs_t files when xserver_clients_write_xshm is on
Allow kdump work with PrivateTmp
Allow dovecot-auth work with PrivateTmp
Allow nfsd get attributes of all filesystems
Allow fido-device-onboard (FDO) read the crack database
Allow ntp to bind and connect to ntske port.
Allow apcupsd cgi scripts read /sys
Allow rpcbind read network sysctls

2023-11-02

Support using systemd containers
Allow kernel_t to manage and relabel all files
Add missing optional_policy() to files_relabel_all_files()
Improve default file context(None) of /var/lib/authselect/backups
Allow targetd write to the syslog pid sock_file
Add ipa_pki_retrieve_key_exec() interface
Allow kdumpctl_t to list all directories with a filesystem type
Allow udev additional permissions
Allow udev load kernel module
Allow sysadm_t to mmap modules_object_t files
Add the unconfined_read_files() and unconfined_list_dirs() interfaces
Allow kernel_generic_helper_t to execute mount(1)

2023-10-02

Allow sssd send SIGKILL to passkey_child running in ipa_otpd_t
Allow systemd-localed create Xserver config dirs
Allow sssd read symlinks in /etc/sssd
Label /dev/gnss[0-9] with gnss_device_t
Allow systemd-sleep read/write efivarfs variables
ci: Fix version number of packit generated srpms
Dontaudit rhsmcertd write memory device
Allow ssh_agent_type create a sockfile in /run/user/USERID
Set default file context of /var/lib/authselect/backups to <<none>>
Allow prosody read network sysctls
Allow cupsd_t to use bpf capability

2023-09-15

Allow sssd domain transition on passkey_child execution conditionally
Allow login_userdomain watch lnk_files in /usr
Allow login_userdomain watch video4linux devices
Change systemd-network-generator transition to include class file
Revert "Change file transition for systemd-network-generator"
Allow nm-dispatcher winbind plugin read/write samba var files
Allow systemd-networkd write to cgroup files
Allow kdump create and use its memfd: objects

2023-08-31

Allow fedora-third-party get generic filesystem attributes
Allow sssd use usb devices conditionally
Update policy for qatlib
Allow ssh_agent_type manage generic cache home files
Update make-rhat-patches.sh file to use the f39 dist-git branch in F39

2023-08-24

Change file transition for systemd-network-generator
Additional support for gnome-initial-setup
Update gnome-initial-setup policy for geoclue
Allow openconnect vpn open vhost net device
Allow cifs.upcall to connect to SSSD also through the /var/run socket
Grant cifs.upcall more required capabilities
Allow xenstored map xenfs files
Update policy for fdo
Allow keepalived watch var_run dirs
Allow svirt to rw /dev/udmabuf
Allow qatlib to modify hardware state information.
Allow key.dns_resolve connect to avahi over a unix stream socket
Allow key.dns_resolve create and use unix datagram socket
Use quay.io as the container image source for CI

2023-08-11

ci: Move srpm/rpm build to packit
.copr: Avoid subshell and changing directory
Allow gpsd, oddjob and oddjob_mkhomedir_t write user_tty_device_t chr_file
Label /usr/libexec/openssh/ssh-pkcs11-helper with ssh_agent_exec_t
Make insights_client_t an unconfined domain
Allow insights-client manage user temporary files
Allow insights-client create all rpm logs with a correct label
Allow insights-client manage generic logs
Allow cloud_init create dhclient var files and init_t manage net_conf_t
Allow insights-client read and write cluster tmpfs files
Allow ipsec read nsfs files
Make tuned work with mls policy
Remove nsplugin_role from mozilla.if
allow mon_procd_t self:cap_userns sys_ptrace
Allow pdns name_bind and name_connect all ports
Set the MLS range of fsdaemon_t to s0 - mls_systemhigh
ci: Move to actions/checkout@v3 version
.copr: Replace chown call with standard workflow safe.directory setting
.copr: Enable `set -u` for robustness
.copr: Simplify root directory variable

2023-08-04

Allow rhsmcertd dbus chat with policykit
Allow polkitd execute pkla-check-authorization with nnp transition
Allow user_u and staff_u get attributes of non-security dirs
Allow unconfined user filetrans chrome_sandbox_home_t
Allow svnserve execute postdrop with a transition
Do not make postfix_postdrop_t type an MTA executable file
Allow samba-dcerpc service manage samba tmp files
Add use_nfs_home_dirs boolean for mozilla_plugin
Fix labeling for no-stub-resolv.conf

2023-08-02

Revert "Allow winbind-rpcd use its private tmp files"
Allow upsmon execute upsmon via a helper script
Allow openconnect vpn read/write inherited vhost net device
Allow winbind-rpcd use its private tmp files
Update samba-dcerpc policy for printing
Allow gpsd,oddjob,oddjob_mkhomedir rw user domain pty
Allow nscd watch system db dirs
Allow qatlib to read sssd public files
Allow fedora-third-party read /sys and proc
Allow systemd-gpt-generator mount a tmpfs filesystem
Allow journald write to cgroup files
Allow rpc.mountd read network sysctls
Allow blueman read the contents of the sysfs filesystem
Allow logrotate_t to map generic files in /etc
Boolean: Allow virt_qemu_ga create ssh directory

2023-07-25

Allow systemd-network-generator send system log messages
Dontaudit the execute permission on sock_file globally
Allow fsadm_t the file mounton permission
Allow named and ndc the io_uring sqpoll permission
Allow sssd io_uring sqpoll permission
Fix location for /run/nsd
Allow qemu-ga get fixed disk devices attributes
Update bitlbee policy
Label /usr/sbin/sos with sosreport_exec_t
Update policy for the sblim-sfcb service
Add the files_getattr_non_auth_dirs() interface
Fix the CI to work with DNF5

2023-07-22

Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild

2023-07-13

Make systemd_tmpfiles_t MLS trusted for lowering the level of files
Revert "Allow insights client map cache_home_t"
Allow nfsidmapd connect to systemd-machined over a unix socket
Allow snapperd connect to kernel over a unix domain stream socket
Allow virt_qemu_ga_t create .ssh dir with correct label
Allow targetd read network sysctls
Set the abrt_handle_event boolean to on
Permit kernel_t to change the user identity in object contexts
Allow insights client map cache_home_t
Label /usr/sbin/mariadbd with mysqld_exec_t
Trim changelog so that it starts at F37 time
Define equivalency for /run/systemd/generator.early