selinux-policy

Edit Package selinux-policy
No description set
Refresh
Refresh
Source Files
Filename Size Changed
Makefile.devel 0000000368 368 Bytes
README.Update 0000000728 728 Bytes
_service 0000000611 611 Bytes
_servicedata 0000000687 687 Bytes
booleans-minimum.conf 0000004932 4.82 KB
booleans-mls.conf 0000004934 4.82 KB
booleans-targeted.conf 0000004932 4.82 KB
booleans.subs_dist 0000002367 2.31 KB
container.fc 0000012281 12 KB
container.if 0000026310 25.7 KB
container.te 0000055684 54.4 KB
customizable_types 0000000241 241 Bytes
debug-build.sh 0000001705 1.67 KB
file_contexts.subs_dist 0000000440 440 Bytes
macros.selinux-policy 0000007219 7.05 KB
modules-minimum-base.conf 0000005697 5.56 KB
modules-minimum-contrib.conf 0000035077 34.3 KB
modules-minimum-disable.lst 0000002347 2.29 KB
modules-mls-base.conf 0000005252 5.13 KB
modules-mls-contrib.conf 0000021159 20.7 KB
modules-targeted-base.conf 0000005769 5.63 KB
modules-targeted-contrib.conf 0000035244 34.4 KB
securetty_types-minimum 0000000074 74 Bytes
securetty_types-mls 0000000119 119 Bytes
securetty_types-targeted 0000000074 74 Bytes
selinux-policy-20230428.tar.xz 0000752740 735 KB
selinux-policy-rpmlintrc 0000000392 392 Bytes
selinux-policy.changes 0000050285 49.1 KB
selinux-policy.conf 0000000096 96 Bytes
selinux-policy.spec 0000025031 24.4 KB
setrans-minimum.conf 0000000607 607 Bytes
setrans-mls.conf 0000001372 1.34 KB
setrans-targeted.conf 0000000607 607 Bytes
update.sh 0000000557 557 Bytes
users-minimum 0000001564 1.53 KB
users-mls 0000001559 1.52 KB
users-targeted 0000001648 1.61 KB
Latest Revision
Johannes Segitz's avatar Johannes Segitz (jsegitz) committed (revision 1)
- Update to version 20230428:
  * training modifications
  * cron
  * Revert "Apply fix_nagios.patch"
  * Revert "Apply fix_miscfiles.patch"
  * Revert "Apply fix_rtkit.patch"
  * Revert "Apply fix_bitlbee.patch"
  * make kernel_t unconfined again
  * prevent labeling of overlayfs filesystems based on the /var/lib/overlay path
  * allow kernel_t to relabel etc_t files
  * allow kernel_t to relabel sysnet config files

- Update to version 20230420:
  * libzypp creates temporary files in /var/adm/mount. Label it with
    rpm_var_cache_t to prevent wrong labels in /var/cache/zypp
  * only use rsync_exec_t for the rsync server, not for the client
    (bsc#1209890)
  * properly label sshd-gen-keys-start to ensure ssh host keys have proper
    labels after creation
  * Allow dovecot-deliver write to the main process runtime fifo files
  * Allow dmidecode write to cloud-init tmp files
  * Allow chronyd send a message to cloud-init over a datagram socket
  * Allow cloud-init domain transition to insights-client domain
  * Allow mongodb read filesystem sysctls
  * Allow mongodb read network sysctls
  * Allow accounts-daemon read generic systemd unit lnk files
  * Allow blueman watch generic device dirs
  * Allow nm-dispatcher tlp plugin create tlp dirs
  * Allow systemd-coredump mounton /usr
  * Allow rabbitmq to read network sysctls
Comments 0
openSUSE Build Service is sponsored by