libsepol-utils-3.1-150400.1.70 >  A bvؓp9|MtǨBv =$I3Aήa t4T =LӾD,zbUsC] d#n!%LY-חi{aG&]:m&4*j-߉28(0|3ER8ďz2 ||LbW]#-K98I P>;4 Plm&%D.6XL9J#?`yR vaDϵ}j  L_56695decc45c70603f426c23a0a5aa151f319f7b0c85a551f8e541bd526921c0293f05061676a7178fa85912bd6fe719e373b2ee<bvؓp9|1| =5sS:ɱ#=[nB;{|!+E-8eĦV3ZQQQ1Ox>=mb* &F#* eC)Zmkom]{fr.ڬ@&P tgq 9գgV7!t(t%05qJ'7Rmvw^[S~(8ixX|Oc֪a'3d!;gg];_RI q:{(X@> CMNz&)L>p>#0?# d ! Jpt| &,4H R \ p  $8`  p (89:FGHIXY\8]L^bc md e f l u v w"x"y"z""""#Clibsepol-utils3.1150400.1.70SELinux binary policy manipulation toolslibsepol provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies such as customizing policy boolean settings.bvasheep54%SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Basehttps://github.com/SELinuxProject/selinux/wiki/Releaseslinuxx86_64Hv:g큤bv_bv_bv_bv_bv_b040fb5f46bd23e353fcc6d10bc7cdb1f26144605b8b9cc11d8b1946f9d0c95970f72868bf9f9a0c2c02627b2226a5cd96f3ba693bf0646811ddf19b49d85e813713628c42da6fe7f226578a042aeefc340b3d15c1e991119bbf6acbffe9d32a5b68e2eababb82bf1882860a966d2661a00283e1f8587aff0163257daf50d157e1d6d6b28561d88e2d6dd3028107c58007f0f05a2c5d747675d525c73b9c1614rootrootrootrootrootrootrootrootrootrootlibsepol-3.1-150400.1.70.src.rpmlibsepol-utilslibsepol-utils(x86-64)@@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libsepol.so.1()(64bit)libsepol.so.1(LIBSEPOL_1.0)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3_ @^@^^F^2@] u@\+@[%@[%@[$@Z@Z W@W~W~W~W{@jsegitz@suse.commliska@suse.czjsegitz@suse.dejsegitz@suse.demliska@suse.czjsegitz@suse.comjengelh@inai.dejsegitz@suse.comjsegitz@suse.commcepl@suse.comjsegitz@suse.comjengelh@inai.dempluskal@suse.comjsegitz@novell.comjsegitz@novell.comi@marguerite.su- Update to version 3.1 * Add support for new polcap genfs_seclabel_symlinks * Initialize the multiple_decls field of the cil db * Return error when identifier declared as both type and attribute * Write CIL default MLS rules on separate lines * Sort portcon rules consistently * Remove leftovers of cil_mem_error_handler * Drop remove_cil_mem_error_handler.patch, is included- Enable -fcommon in order to fix boo#1160874.- Update to version 3.0 * cil: Allow validatetrans rules to be resolved * cil: Report disabling an optional block only at high verbose levels * cil: do not dereference perm_value_to_cil when it has not been allocated * cil: fix mlsconstrain segfault * Further improve binary policy optimization * Make an unknown permission an error in CIL * Remove cil_mem_error_handler() function pointer * Use LIBSEPOL_3.0 and fix sepol_policydb_optimize symbol mapping * Add a function to optimize kernel policy * Add ebitmap_for_each_set_bit macro Dropped fnocommon.patch as it's included upstream- Add fnocommon.patch to prevent build failures on gcc10 and remove_cil_mem_error_handler.patch to prevent build failures due to leftovers from the removal of cil_mem_error_handler (bsc#1160874)- Disable LTO due to symbol versioning (boo#1138813).- Update to version 2.9 * Add two new Xen initial SIDs * Check that initial sid indexes are within the valid range * Create policydb_sort_ocontexts() * Eliminate initial sid string definitions in module_to_cil.c * Rename kernel_to_common.c stack functions * add missing ibendport port validity check * destroy the copied va_list * do not call malloc with 0 byte * do not leak memory if list_prepend fails * do not use uninitialized value for low_value * fix endianity in ibpkey range checks * ibpkeys.c: fix printf format string specifiers for subnet_prefix * mark permissive types when loading a binary policy- Use more %make_install.- Adjusted source urls (bsc#1115052)- Update to version 2.8 (bsc#1111732) For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt- Rebase to 2.7 For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt- Update to version 2.6. Notable changes: * Add support for converting extended permissions to CIL * Create user and role caches when building binary policy * Check for too many permissions in classes and commons in CIL * Fix xperm mapping between avrule and avtab * Produce more meaningful error messages for conflicting type rules in CIL * Change which attributes CIL keeps in the binary policy * Warn instead of fail if permission is not resolved * Ignore object_r when adding userrole mappings to policydb * Correctly detect unknown classes in sepol_string_to_security_class * Fix neverallowxperm checking on attributes * Only apply bounds checking to source types in rules * Fix CIL and not add an attribute as a type in the attr_type_map * Fix extended permissions neverallow checking * Fix CIL neverallow and bounds checking * Add support for portcon dccp protocol- Update RPM groups, trim description and combine filelist entries.- Cleanup spec file with spec-cleaner - Make spec file a bit more easy - Ship new supbackage (-tools)- Without bug number no submit to SLE 12 SP2 is possible, so to make sle-changelog-checker happy: bsc#988977- Adjusted source link- update version 2.5 * Fix unused variable annotations * Fix uninitialized variable in CIL * Validate extended avrules and permissionxs in CIL * Add support in CIL for neverallowx * Fully expand neverallowxperm rules * Add support for unordered classes to CIL * Add neverallow support for ioctl extended permissions * Improve CIL block and macro call recursion detection * Fix CIL uninitialized false positive in cil_binary * Provide error in CIL if classperms are empty * Add userattribute{set} functionality to CIL * fix CIL blockinherit copying segfault and add macro restrictions * fix CIL NULL pointer dereference when copying classpermission/set * Add CIL support for ioctl whitelists * Fix memory leak when destroying avtab * Replace sscanf in module_to_cil * Improve CIL resolution error messages * Fix policydb_read for policy versions < 24 * Added CIL bounds checking and refactored CIL Neverallow checking * Refactored libsepol Neverallow and bounds (hierarchy) checking * Treat types like an attribute in the attr_type_map * Add new ebitmap function named ebitmap_match_any() * switch operations to extended perms * Write auditadm_r and secadm_r roles to base module when writing CIL * Fix module to CIL to only associate declared roleattributes with in-scope types * Don't allow categories/sensitivities inside blocks in CIL * Replace fmemopen() with internal function in libsepol * Verify users prior to evaluating users in cil * Binary modules do not support ioctl rules * Add support for ioctl command whitelisting * Don't use symbol versioning for static object files * Add sepol_module_policydb_to_cil(), sepol_module_package_to_cil(), and sepol_ppfile_to_module_package() * Move secilc out of libsepol * fix building Xen policy with devicetreecon, and add devicetreecon CIL documentation * bool_copy_callback set state on creation * Add device tree ocontext nodes to Xen policy * Widen Xen IOMEM context entries * Fix error path in mls_semantic_level_expand() * Update to latest CIL, includes new name resolution and fixes ordering issues with blockinherit statements, and bug fixes - changes in 2.4 * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR * Fix bugs found by hardened gcc flags * Build CIL into libsepol. libsepol can be built without CIL by setting the DISABLE_CIL flag to 'y' * Add an API function to set target_platform * Report all neverallow violations * Improve check_assertions performance * Allow libsepol C++ static library on devicesheep54 16519558093.1-150400.1.703.1-150400.1.70chkconchkcon.8.gzgenpolbools.8.gzgenpolusers.8.gzchkcon.8.gz/usr/bin//usr/share/man/man8//usr/share/man/ru/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:SLE-15-SP4:GA/standard/a816d3dcc0526cb1289f5a71c6abd44a-libsepolcpioxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=74dda48e751aa90ee0b1c4e6dfbee0e9b9d8bd30, for GNU/Linux 3.2.0, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)troff or preprocessor input, UTF-8 Unicode text (gzip compressed data, max compression, from Unix)RRRRR(e L<{Bm Iutf-893eb4d0b9a0428eaa56ff771fa9a14fdc829e68f9a9e9bc8c683031130580da3? 7zXZ !t/)Kq] crv9w (ut#>: d#?W0_|l5 >OudK#[RmG- !!LilE0m$!Bhwzw2])C cy,H ~RrMO]m<|ۻV|գ{c_r0N3wfvt.}9d"g:˱Bx7PF0Oy 4BInm)kirG7ybd9&X*usccdEV 2'|U.Y}L՞8-CibmӏY{Pm[R}vA \0#KF R @`=2"H8M I(g>kӜYkec`Ϙ WFiHH+"E*d%$"[ Aq) Q`;w y-7LRMOWQ,{$ S+V$_ (ED ar 7~D ;PsmRU<ܛhx7dEpzV-=WОK;tAQNcm 74 &P)wb@xTNO6-=d>bʡ̣ؒd=Y!ۅ*/ۧW'M̜: k@ytQ$vYU Mhq# 31gb9=Y$Y\hN<E_G#LcB_=)^5-]s*+t@,w̵!B{/5+FxOa E+ݦZ,ƥRV!/qDU G)`~Uӳd Ua)W%pՏtAOXc6qE<ǃNU ]\(]0 y\z3,j%炨428g}nqOssEP@!:8^0:g `\+ֲq x 6~WVÖFք6}8j|8Fw<Dk Ql?HbڴRCIbWبP`V9Eu.Hb'v g]v9~bTX@S=h ۲5aXM2޸Y~i ?`U;ݧoBbw"ZTuHl:IZr; .\FOgCza}HX, y9"ӯ:[q,!%_ưcsE Z=d4@(Fk9kzn.@/ [mh,og(+F7lmߩ}ͥ)̄"*c {C.-V&`pQSq)ʬS 9IAaJ&]B3se@ 6@i&@ޛol@G0EYPӤBn@#LK:ɂ*bMrg JVs%V-Q dEΎmfE/:`t8 Co;Jo_yp=OVU4E|ap^o\=VD_Cq8t* † MP7(w?Ѐ"@Չku3zLUSSڵAAYJ@'~-s߃E@ s? YfnWYOIK:@)9? |Lx>e}F b$۵zI!xq-kvƔ1#V_gSǮR "/@ v 勆nRs |?=džW%L*>R*Oyiܱٜ#HșuaQ$Tl"H]Tj;IdW9yi*ELߌΤ>;$#]m9otI lWWRr ޕpc> '9YWw}M^C'Zi(]a>nqRb.*vZwl왥x2]PS$3d :=m/re WLq C5qJ$1GH /Q}TY~~GAU`M$Dv󭦁mj'!J,ʣxAo #-{1@+8#jǺlGF}.LzEdeſy? xrL0]_Ô (5]{xwr͎z(UA۰f*FiU< lDrՎ $~k-7o ^)F N[%;j'gjVwnՄoG BhŻ{~ڃ92 4wAM?jgr{ލ}Pj&hH>~;Ӵ# !g n~{*ч:@E-6>G。OaS5m 9| 7Tϩ?`$O﹢<@re+c885*8K}o^ux,sƌJzR'mR8\ ZĿ]kBkQSɬϩ@:Ye'炃ȳ͚W:> X0(eFn( ,_66G[|b;U\(opԜ36 :#X;#AvTYAˎM.4|ŖT!Q-z l2TB$ Iij9h|뎈•~ygu5)*O:ׯ{%a7"]`gJ|9B;(5,ل8o9ʖK^2Smb #:I85&M)]gvZjq1}V狇` Xɀn_!Qt}vNt<6 f`r #%T5X|NYz_Ǥ:-yg36ٌ' zwZoc}g4E[P Bv]cjA6ʊUo'L'STk\i@"S@Wrr[@$씠n~ ?奜y} U)884gpm.h9mj(@}Lp\ҁ!KE@ƂݖU45vM Woʝqv)`fWF@FƻSYʿkߺWi+Flm:xPfЄَp^$եN"ŃOEC![ۉ%W];B!oa6-{9L K|qCk5g)$&iU(`vU.we9> ~_STϭ@S4^EF%:YSv\-?OJ5yA>pV=I4d]ȍNz\LR`BeMS~wm $f]5h#7F/Mkfek^c;:&r e_zҡ0xf#aF:W%7X5 ۟RE_[ 5! B2#E7סA+&A;|F"ѐMynX^W.*Xak+%O8 KGH^ o] X{1~*+f<} `E_=ogm󘄹yӉK(![POvs -)BoEK4 =D9lU ׄKUW>0ٽ+HAE]rr8%ft.tLdݺ̙@f-~TU | l1WV ҐR,ar_j7|^v| y .?`X =Jr+S+KC-6'WvB >mvԚ6W2W}Y\2- :`u=FIdNgG'-6챭md?2"y#4WCE<0։/S,PZI[| <+R6o YZ