libselinux1-3.5-150600.3.3.1<>,EdhZp9|'>$`HpMih1*X* -<@l T䨶kX[Q@0k ů?fU.;c>2? l1X׹\PiX_1nBb^`t U4ޭF?HrVj =tu rQR)y+^lȖ9 $p-8һa>,#yqx_P86+&p"NOLy lO:=Qv_"1ErURxorɓ0>@:?9d  7| <BHT Z ` l  DP\(8090: 0>6"@61F6@G6TH6`I6lX6pY6\6]6^6b7"c7d8Pe8Uf8Xl8Zu8lv8xw9 x9,y98z99999Clibselinux13.5150600.3.3.1SELinux runtime librarylibselinux provides an interface to get and set process and file security contexts and to obtain security policy decisions. (Security-enhanced Linux is a feature of the kernel and some utilities that implement mandatory access control policies, such as Type Enforcement, Role-based Access Control and Multi-Level Security.)hZs390zl31SUSE Linux Enterprise 15SUSE LLC SUSE-Public-Domainhttps://www.suse.com/System/Librarieshttps://github.com/SELinuxProject/selinux/wiki/Releaseslinuxs390x A큤hWhYcg1ff2058fd08e5985184af46fda8a576c1f12420b02f47505cbd2b78b63c4bcef86657b4c0fe868d7cbd977cb04c63b6c667e08fa51595a7bc846ad4bed8fc364rootrootrootrootrootrootlibselinux-3.5-150600.3.3.1.src.rpmlibselinux.so.1()(64bit)libselinux.so.1(LIBSELINUX_1.0)(64bit)libselinux.so.1(LIBSELINUX_3.4)(64bit)libselinux.so.1(LIBSELINUX_3.5)(64bit)libselinux1libselinux1(s390-64)@@@@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfigld64.so.1()(64bit)ld64.so.1(GLIBC_2.3)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.2.3)(64bit)libc.so.6(GLIBC_2.2.4)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.2)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.30)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.34)(64bit)libc.so.6(GLIBC_2.38)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libc.so.6(GLIBC_2.8)(64bit)libpcre2-8.so.0()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3h@e_@d.@d@d d@ddx@dTdS@dd?@cbb@by@b a``@`Q@`Gc@`__ @^|@^^F]q]@]{@\ \"\\@\+@\/J[$@Zz@ZZ Y\WWWs@W~W{@UUejsegitz@suse.comgeorg.pfuetzenreuter@suse.comdimstar@opensuse.orgmcepl@suse.comjsegitz@suse.commcepl@suse.comjsegitz@suse.comkastl@b1-systems.dedaniel.garcia@suse.comfcrozat@suse.comjsegitz@suse.commliska@suse.czjsegitz@suse.comjsegitz@suse.comjsegitz@suse.comjsegitz@suse.comjsegitz@suse.comjsegitz@suse.comgmbr3@opensuse.orgjsegitz@suse.comdimstar@opensuse.orgjsegitz@suse.commcepl@suse.comlnussel@suse.dejsegitz@suse.comjsegitz@suse.dejsegitz@suse.dejsegitz@suse.dejsegitz@suse.demcepl@suse.comjsegitz@suse.commliska@suse.czjsegitz@suse.commliska@suse.czjsegitz@suse.comjsegitz@suse.comjsegitz@suse.commcepl@cepl.eujsegitz@suse.comjsegitz@suse.comschwab@suse.decrrodriguez@opensuse.orgcrrodriguez@opensuse.orgjengelh@inai.dejsegitz@novell.comi@marguerite.sujsegitz@novell.comdimstar@opensuse.org- Ship license file (bsc#1252160)- Repair initrd libselinux check in selinux-ready- Do not BuildRequire swig and ruby-devel in the main build phase: those are only needed for the bindings.- (bsc#1212618) Divide libselinux and libselinux-bindings again. libselinux itself is in Ring0 so it has to have absolutely minimal dependencies, so it is better to separate libselinux-bindings into a separate pacakge.- Fix python packaging by setting the name to a fixed value- Remove separate libselinux-bindings SPEC file (bsc#1212618).- Add explicit BuildRequires for python3-pip and python3-wheel on 15.5, currently the macros don't do the right thing- allow building this with different python versions, to make this usable for the new sle15 macro (using python3.11)- Add python-wheel build dependency to build correctly with latest python-pip version.- Add _multibuild to define additional spec files as additional flavors. Eliminates the need for source package links in OBS.- Add -ffat-lto-objects to CFLAGS to prevent rpmlint errors because of LTO- Enable LTO as it works fine now.- Update to version 3.5: * check for truncations * avoid newline in avc message * bail out on path truncations * add getpidprevcon to gather the previous context before the last exec of a given process * Workaround for heap overhead of pcre * fix memory leaks on the audit2why module init * ignore invalid class name lookup - Drop restorecon_pin_file.patch, is upstream - Refreshed python3.8-compat.patch - Added additional developer key (Jason Zaman)- Fixed initrd check in selinux-ready (bnc#1186127)- Added restorecon_pin_file.patch. Fixes issus when running fixfiles/restorecon- Update to version 3.4: * Use PCRE2 by default * Make selinux_log() and is_context_customizable() thread-safe * Prevent leakeing file descriptors * Correctly hash specfiles larger than 4G - Refreshed skip_cycles.patch- Add Requires for exact libselinux1 version for selinux-tools - Simplyfied check for correct boot paramaters in selinux-ready (bsc#1195361)- Update to version 3.3: * Lots of smaller issues fixed found by fuzzing- Add missing libselinux-utils Provides to selinux-tools so that %selinux_requires works- Remove Recommends for selinux-autorelabel. It's better to have this in the policy package itself (bsc#1181837)- Switch to pcre2: + Replace pcre-devel BuildRequires with pkgconfig(libpcre2-8) + Pass USE_PCRE2=y to make. + Replace pkgconfig(libpcre) Requires in -devel static with pkgconfig(libpcre2-8).- Update to version 3.2: * Use mmap()'ed kernel status page instead of netlink by default. See "KERNEL STATUS PAGE" section in avc_init(3) for more details. * New log callback levels for enforcing and policy load notices - SELINUX_POLICYLOAD, SELINUX_SETENFORCE * Changed userspace AVC setenforce and policy load messages to audit format.- Add Recommends: selinux-autorelabel, which is very important for healthy use of the SELinux on the system (/.autorelabel mechanism) (bsc#1181837).- install to /usr (boo#1029961)- Update to version 3.1: * selinux/flask.h, selinux/av_permissions.h and sepol/policydb/flask.h were removed. All userspace object managers should have been updated to use the dynamic class/perm mapping support. Use string_to_security_class(3) and string_to_av_perm(3) to map the class and permission names to their policy values, or selinux_set_mapping(3) to create a mapping from class and permission index values used by the application to the policy values. * Removed restrictions in libsepol and checkpolicy that required all declared initial SIDs to be assigned a context. * Support for new policy capability genfs_seclabel_symlinks * selinuxfs is mounted with noexec and nosuid * `security_compute_user()` was deprecated * Refreshed python3.8-compat.patch- Added skip_cycles.patch to skip directory cycles and not error out- Update to version 3.0 * Ignore the stem when looking up all matches in file context * Save digest of all partial matches for directory * Use Python distutils to install SELinux python bindings * ensure that digest_len is not zero * fix string conversion of unknown perms * mark all exported function "extern" Dropped Use-Python-distutils-to-install-SELinux.patch, included upstream- Added swig4_moduleimport.patch to prevent import errors due to SWIG 4- Added Use-Python-distutils-to-install-SELinux.patch to use Python's distutils instead of building and installing python bindings manually- Add python3.8-compat.patch which makes build possible even with Python 3.8, which doesn’t automatically adds -lpython- In selinux-ready * Removed check for selinux-policy package as we don't ship one (bsc#1136845) * Add check that restorecond is installed and enabled- Disable LTO (boo#1133244).- Set License: to correct value (bsc#1135710)- Disable LTO (boo#1133244).- Update to version 2.9 * Add security_reject_unknown(3) man page * Change matchpathcon usage to match with matchpathcon manpage * Do not define gettid() if glibc >= 2.30 is used * Fix RESOURCE_LEAK defects reported by coverity scan * Fix line wrapping in selabel_file.5 * Do not dereference symlink with statfs in selinux_restorecon * Fix overly strict validation of file_contexts.bin * Fix selinux_restorecon() on non-SELinux hosts * Fix the whatis line for the selinux_boolean_sub.3 manpage * Fix printf format string specifier for uint64_t * Fix handling of unknown classes/perms * Set an appropriate errno in booleans.c - Dropped python3.patch, is now upstream- Remove unneeded build requires for python3 (bsc#1120255)- Update to version 2.8 (bsc#1111732) For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt - ran spec-cleaner on spec files- Update to version 2.7. * %files needed to be heavily modified * Based expressly on python3, not just python For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt- Updated spec file to use python3. Added python3.patch to fix build- Update to version 2.6. Notable changes: * selinux_restorecon: fix realpath logic * sefcontext_compile: invert semantics of "-r" flag * sefcontext_compile: Add "-i" flag * Introduce configurable backends * Add function to find security.restorecon_last entries * Add openrc_contexts functions * Add support for pcre2 * Handle NULL pcre study data * Add setfiles support to selinux_restorecon(3) * Evaluate inodes in selinux_restorecon(3) * Change the location of _selinux.so * Explain how to free policy type from selinux_getpolicytype() * Compare absolute pathname in matchpathcon -V * Add selinux_snapperd_contexts_path() * Modify audit2why analyze function to use loaded policy * Avoid mounting /proc outside of selinux_init_load_policy() * Fix location of selinuxfs mount point * Only mount /proc if necessary * procattr: return einval for <= 0 pid args * procattr: return error on invalid pid_t input - Dropped * libselinux-2.2-ruby.patch * libselinux-proc-mount-only-if-needed.patch * python-selinux-swig-3.10.patch- readv-proto.patch: include for readv prototype- -devel static subpackage requires libpcre-devel and libsepol-devel- Avoid mounting /proc outside of selinux_init_load_policy(). (Stephen Smalley) reverts upstream 5a8d8c4, 9df4988, fixes among other things systemd seccomp sandboxing otherwise all filters must allow mount(2) (libselinux-proc-mount-only-if-needed.patch)- Update RPM groups, trim description and combine filelist entries.- Adjusted source link- add patch: python-selinux-swig-3.10.patch, fixed boo#985368 * swig-3.10 in Factory use importlib instead of imp to find _selinux.so. imp searched the same directory as __init__.py is while importlib searchs only standard paths. so we have to move _selinux.so. fixed by upstream - update version 2.5 * Add selinux_restorecon function * read_spec_entry: fail on non-ascii * Add man information about thread specific functions * Don't wrap rpm_execcon with DISABLE_RPM with SWIG * Correct line count for property and service context files * label_file: fix memory leaks and uninitialized jump * Replace selabel_digest hash function * Fix selabel_open(3) services if no digest requested * Add selabel_digest function * Flush the class/perm string mapping cache on policy reload * Fix restorecon when path has no context * Free memory when processing media and x specfiles * Fix mmap memory release for file labeling * Add policy context validation to sefcontext_compile * Do not treat an empty file_contexts(.local) as an error * Fail hard on invalid property_contexts entries * Fail hard on invalid file_contexts entries * Support context validation on file_contexts.bin * Add selabel_cmp interface and label_file backend * Support specifying file_contexts.bin file path * Support file_contexts.bin without file_contexts * Simplify procattr cache * Use /proc/thread-self when available * Add const to selinux_opt for label backends * Fix binary file labels for regexes with metachars * Fix file labels for regexes with metachars * Fix if file_contexts not '\n' terminated * Enhance file context support * Fix property processing and cleanup formatting * Add read_spec_entries function to replace sscanf * Support consistent mode size for bin files * Fix more bin file processing core dumps * add selinux_openssh_contexts_path() * setrans_client: minimize overhead when mcstransd is not present * Ensure selabel_lookup_best_match links NULL terminated * Fix core dumps with corrupt *.bin files * Add selabel partial and best match APIs * Use os.walk() instead of the deprecated os.path.walk() * Remove deprecated mudflap option * Mount procfs before checking /proc/filesystems * Fix -Wformat errors with gcc-5.0.0 * label_file: handle newlines in file names * Fix audit2why error handling if SELinux is disabled * pcre_study can return NULL without error * Only check SELinux enabled status once in selinux_check_access - changes in 2.4 * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR * Fix bugs found by hardened gcc flags * Set the system to permissive if failing to disable SELinux because policy has already been loaded * Add db_exception and db_datatype support to label_db backend * Log an error on unknown classes and permissions * Add pcre version string to the compiled file_contexts format * Deprecate use of flask.h and av_permissions.h * Compiled file_context files and the original should have the same DAC permissions- fixed selinux-ready to work with initrd files created by dracut (bsc#940006)- Update libselinux-2.2-ruby.patch: use RbConfig instead of deprecated Config./sbin/ldconfig/sbin/ldconfigs390zl31 17609362823.5-150600.3.3.13.5-150600.3.3.1libselinux.so.1libselinux1LICENSE/usr/lib64//usr/share/licenses//usr/share/licenses/libselinux1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:41224/SUSE_SLE-15-SP6_Update/cbb927a0f67b8e2eac79a483fee1f05e-libselinux.SUSE_SLE-15-SP6_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=43e7274b6b69c9a84ae0ad46341fedb1daf78381, strippeddirectoryASCII textPPPPPPRR RRRRRR R RR RR RRRR|0m^utf-8addc46b7e5b60d77b06863e11a91d0adbb3557bcbe0882651214f793a29916ef?7zXZ !t/]"k%{U}dh-<[QJi R6n V)ܑ^0Ŗnk$qD!S˃YYE}k&@EΐEF 2B|KZ 6㜎i(B 됍 bF<*x/(Qp%P*~> tP T|߇@6cEIpS c waGCvVO'2w'=̚P9Y6F ,:{38`%6Bf3g6;P8 @U=w-$hBg Zb9ң'bqAKy(wG3+;Wij C#7@\[;hwvU] g<Ƕ[y a|-9_r4Ø(̎]{ gMleAqY.665*+B*]ޜkY aᐜbܝL˻E|Xy G4(Y*g(#(L ;EQZump5,Ɲѡ vZ~+)閪7=d@_'5l'EKdw??:_Y'b ā, n /r.V{i%Ckڠ}`Gdޝf𴽧/*H:ĨY\ލ:` sk1j T2 ݹ, Hp?% _4&}5 >BdpE$㙚= j-m$E-FFm3C{53WM+}Sjo^硋AQ{8Z7-"{63z|{tmX9K(q>a_0K^Rp6>A7[P5%}Lke yf@g;NGOP99iuVkWS ?{odI#1#61 )<$FgJ>d]Q^>>mN' a`T]E+~YWC Ou" R̥<*:YkUۘ"z {3oŕю>#^w|SeN5n90C,ʒM{Xi !#'Я ާVcSF% B)@N[/%EVAc3x0E*vJ.QZA =0閞t`&ShQ&Tbd^}',gРnyUlȓ{1tEչKL肔Er"H1Ec84rO1f()AiaSy5 eY2Mk%Ơd&cEdUtDkfHrȡ Ϣ~߄/f+RMW}4_d捯BMA/`k&Q Qg&g9XsP11}xP%1U?7TXhJ;NPRTߛǃ`V7 RaI'p<556@HǦ>Bbʨ5Ӷ)yta 4>OE#6ơ<')Z/44 YZ