selinux-policy
No description set
- Links to security:SELinux / selinux-policy
- Has a link diff
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:firstyear:branches:security:SELinux/selinux-policy && cd $_
- Create Badge
Refresh
Refresh
Source Files (show merged sources derived from linked package)
Filename | Size | Changed |
---|---|---|
Makefile.devel | 0000000368 368 Bytes | |
README.Update | 0000000728 728 Bytes | |
_link | 0000000124 124 Bytes | |
_service | 0000000610 610 Bytes | |
_servicedata | 0000000908 908 Bytes | |
booleans-minimum.conf | 0000004932 4.82 KB | |
booleans-mls.conf | 0000004934 4.82 KB | |
booleans-targeted.conf | 0000004932 4.82 KB | |
booleans.subs_dist | 0000002367 2.31 KB | |
container.fc | 0000012520 12.2 KB | |
container.if | 0000026378 25.8 KB | |
container.te | 0000059996 58.6 KB | |
customizable_types | 0000000241 241 Bytes | |
debug-build.sh | 0000001705 1.67 KB | |
file_contexts.subs_dist | 0000000440 440 Bytes | |
macros.selinux-policy | 0000007250 7.08 KB | |
modules-minimum-base.conf | 0000005697 5.56 KB | |
modules-minimum-contrib.conf | 0000035077 34.3 KB | |
modules-minimum-disable.lst | 0000002347 2.29 KB | |
modules-mls-base.conf | 0000005252 5.13 KB | |
modules-mls-contrib.conf | 0000021278 20.8 KB | |
modules-targeted-base.conf | 0000005769 5.63 KB | |
modules-targeted-contrib.conf | 0000036949 36.1 KB | |
securetty_types-minimum | 0000000074 74 Bytes | |
securetty_types-mls | 0000000119 119 Bytes | |
securetty_types-targeted | 0000000074 74 Bytes | |
selinux-policy-20240314.tar.xz | 0000768432 750 KB | |
selinux-policy-rpmlintrc | 0000000392 392 Bytes | |
selinux-policy.changes | 0000072417 70.7 KB | |
selinux-policy.conf | 0000000096 96 Bytes | |
selinux-policy.spec | 0000025121 24.5 KB | |
setrans-minimum.conf | 0000000607 607 Bytes | |
setrans-mls.conf | 0000001372 1.34 KB | |
setrans-targeted.conf | 0000000607 607 Bytes | |
update.sh | 0000000648 648 Bytes | |
users-minimum | 0000001564 1.53 KB | |
users-mls | 0000001559 1.52 KB | |
users-targeted | 0000001648 1.61 KB |
Latest Revision
William Brown (firstyear)
committed
(revision 2)
- Update to version 20240314: * nscd can go awa - Update to version 20240314: * kanidm module * Assign alts_exec_t to files_type * Support /bin/alts in the policy (bsc#1217530) * Allow ssh-keygen to use the libica crypto module (bsc#1220373) * Revert "Allow virtnetworkd_t to execute bin_t (bsc#1216903)" * Revert "Change domain_kernel_load_modules boolean to true" * Fix gitolite homedir paths (bsc#1218826) * Allow keepalived_t read+write kernel_t pipes (bsc#1216060) * allow rebootmgr to read the system state (bsc#1205931) * Allow virtnetworkd_t to execute bin_t (bsc#1216903) * Allow sssd_t watch permission to net_conf_t dirs (bsc#1216052) * Revert fix for bsc#1205770 since it causes a regression for bsc#1214887 * Allow kdump_t to manage symlinks under kdump_var_lib_t (bsc#1213721) * allow haveged to manage tmpfs directories (bsc#1213594) * removed merge conflict marker * Remove unneeded manage_dirs_pattern for lastlog_t (bsc#1210461) * Add policy for wtmpdb (bsc#1210717) * Add support for lastlog2 (bsc#1210461) * allow the chrony client to use unallocated ttys (bsc#1210672) * libzypp creates temporary files in /var/adm/mount. Label it with rpm_var_cache_t to prevent wrong labels in /var/cache/zypp * only use rsync_exec_t for the rsync server, not for the client (bsc#1209890) * properly label sshd-gen-keys-start to ensure ssh host keys have proper labels after creation * allow systemd_resolved_t to bind to all nodes (bsc#1200182) * make kernel_t unconfined again * prevent labeling of overlayfs filesystems based on the /var/lib/overlay path * allow kernel_t to relabel etc_t files
Comments 0