How to Install and Uninstall semanage-utils Package on Ubuntu 21.10 (Impish Indri)

Last updated: May 19,2024

1. Install "semanage-utils" package

This tutorial shows how to install semanage-utils on Ubuntu 21.10 (Impish Indri)

$ sudo apt update $ sudo apt install semanage-utils

2. Uninstall "semanage-utils" package

This guide let you learn how to uninstall semanage-utils on Ubuntu 21.10 (Impish Indri):

$ sudo apt remove semanage-utils $ sudo apt autoclean && sudo apt autoremove

3. Information about the semanage-utils package on Ubuntu 21.10 (Impish Indri)

Package: semanage-utils
Architecture: amd64
Version: 3.1-1ubuntu2
Priority: optional
Section: universe/admin
Source: libsemanage
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian SELinux maintainers
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 32
Depends: libsepol1 (>= 3.1), python3 (>= 3.2), python3-selinux (>= 3.1), python3-semanage (>= 3.1)
Filename: pool/universe/libs/libsemanage/semanage-utils_3.1-1ubuntu2_amd64.deb
Size: 4666
MD5sum: 7766f807192313138baacc31d8361f43
SHA1: 68e178214268e235c74a70c85332bf2e5cc4c4a7
SHA256: 14f558697c3a5f1c9bf11554dc1fa6b54ded3382bf0c6f99700f4ba152b8a18c
SHA512: a232eb74243f8a40710f76f9df44387b949c403c8ce9715f1cd54a16e77ba4ae1e05f775ef30adebca67b0d2349280f4d379d8ee6505fb30fae55f7019fd246d
Homepage: http://userspace.selinuxproject.org/
Description-en: SELinux policy management utilities
This package contains an utility that can be used to migrate from the old
policy store format (HLL, stored in /etc/selinux) to the new one (CLI, stored
in /var/lib/selinux).
.
Security-enhanced Linux is a patch of the Linux kernel and a
number of utilities with enhanced security functionality designed to
add mandatory access controls to Linux. The Security-enhanced Linux
kernel contains new architectural components originally developed to
improve the security of the Flask operating system. These
architectural components provide general support for the enforcement
of many kinds of mandatory access control policies, including those
based on the concepts of Type Enforcement, Role-based Access
Control, and Multi-level Security.
Description-md5: f08c1d00467630f36653d6234f30403c