pam_cifscreds-6.9-150100.5.18.1 >  A b1p9|TF5/玮ss)ae~2:}pEh؛Es;/ ύB %m~'yvW4I=f i_s34.ԉb1p9|r]LM* `@]^}.4Ck.NRf͇3IWi_9:(#Goi6˼^gM@n-<2:X}],J91 C:Si97hL>z w Š)-l'xrZlM = O<{KHk)Yq j)).9u4p,fbFQZȅI;ٌ1YnfÏn˟ZC?Ɵ.m(M>p> ? d " Z$(Abs     n px  _ (89:F;GPHXI`XdYl\]^bcdeflu,v4w x (y 0z P ` d j Cpam_cifscreds6.9150100.5.18.1PAM module to manage NTLM credentials in kernel keyringThe pam_cifscreds PAM module is a tool for automatically adding credentials (username and password) for the purpose of establishing sessions in multiuser mounts. When a cifs filesystem is mounted with the "multiuser" option, and does not use krb5 authentication, it needs to be able to get the credentials for each user from somewhere. The pam_cifscreds module can be used to provide these credentials to the kernel automatically at login.b1s390zl37LQSUSE Linux Enterprise 15SUSE LLC GPL-3.0-or-laterhttps://www.suse.com/System/Librarieshttp://www.samba.org/linux-cifs/cifs-utils/linuxs390xGX큤b1b18d3b9042797efa1653daac39aa7e40b764210c855ebe9e344ee4e337fffab88a78e8598f6e08f62e6acfa6f02cb2c41921119085b1dec4c4625c0a81ababcc52rootrootrootrootcifs-utils-6.9-150100.5.18.1.src.rpmpam_cifscredspam_cifscreds(s390-64)@@@@@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.4)(64bit)libkeyutils.so.1()(64bit)libkeyutils.so.1(KEYUTILS_0.3)(64bit)libpam.so.0()(64bit)libpam.so.0(LIBPAM_1.0)(64bit)libpam.so.0(LIBPAM_EXTENSION_1.0)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1b'bY^@`@`Gc@_16]@]v>]UI@\@\eX@\b@\ac[\ZZjY@XX@V@V@UpUmT~@TO@TO@T;T;ematsumiya@suse.depalcantara@suse.depalcantara@suse.depalcantara@suse.deaaptel@suse.compalcantara@suse.deaaptel@suse.comaaptel@suse.compalcantara@suse.deaaptel@suse.comaaptel@suse.comdmulder@suse.comaaptel@suse.comschwab@suse.deavindra@opensuse.orgaaptel@suse.comaaptel@suse.comaaptel@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.combwiedemann@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.com- CVE-2022-29869: mount.cifs: fix verbose messages on option parsing (bsc#1198976, CVE-2022-29869) * add cifs-utils-CVE-2022-29869.patch- CVE-2022-27239: mount.cifs: fix length check for ip option parsing; (bsc#1197216) (bso#15025); CVE-2022-27239. * add 0016-CVE-2022-27239-mount.cifs-fix-length-check-for-ip-op.patch- cifs.upcall: fix regression in kerberos mount; (bsc#1184815). * add 0015-cifs.upcall-fix-regression-in-kerberos-mount.patch- CVE-2021-20208: cifs-utils: cifs.upcall kerberos auth leak in container; (bsc#1183239); CVE-2021-20208.- CVE-2020-14342: Shell command injection vulnerability in mount.cifs; (bsc#1174477); (bso#14442); CVE-2020-14342. * add 0013-CVE-2020-14342-mount.cifs-fix-shell-command-injectio.patch- Fix invalid free in mount.cifs; (bsc#1152930). * add 0012-mount.cifs-Fix-invalid-free.patch- Fix double-free in mount.cifs; (bsc#1149164). * add 0011-fix-doublefree.patch- Update to cifs-utils 6.9; (bsc#1132087); (bsc#1136031). * adds fixes for Azure * new smbinfo utility * remove cifs-utils-6.8.tar.bz2 * remove cifs-utils-6.8.tar.bz2.asc * add cifs-utils-6.9.tar.bz2 * add cifs-utils-6.9.tar.bz2.asc * add 0001-smbinfo-Improve-help-usage-and-add-h-option.patch * add 0002-smbinfo-Add-bash-completion-support-for-smbinfo.patch * add 0003-getcifsacl-Add-support-to-accept-more-paths.patch * add 0004-getcifsacl-Fix-usage-message-to-include-multiple-fil.patch * add 0005-smbinfo-add-GETCOMPRESSION-support.patch * add 0006-getcifsacl-Add-support-for-R-recursive-option.patch * add 0007-smbinfo-add-bash-completion-support-for-getcompressi.patch * add 0008-mount.cifs.c-fix-memory-leaks-in-main-func.patch * add 0009-Zero-fill-the-allocated-memory-for-new-struct-cifs_n.patch * add 0010-Zero-fill-the-allocated-memory-for-a-new-ACE.patch - Remove backports that are already in 6.9; (fate#325270); (bsc#1130528); * remove 0001-docs-cleanup-rst-formating.patch * remove 0002-mount.cifs.rst-document-new-no-handlecache-mount-opt.patch * remove 0003-manpage-update-mount.cifs-manpage-with-info-about-rd.patch * remove 0004-checkopts-add-python-script-to-cross-check-mount-opt.patch * remove 0005-mount.cifs.rst-document-missing-options-correct-wron.patch * remove 0006-cifs-utils-support-rst2man-3.patch * remove 0007-checkopts-report-duplicated-options-in-man-page.patch * remove 0008-mount.cifs.rst-more-cleanups.patch * remove 0009-mount.cifs.rst-document-vers-3-mount-option.patch * remove 0010-mount.cifs.rst-document-vers-3.02-mount-option.patch * remove allow-dns-resolver-key-to-expire.patch * remove suse-document-new-vers-default-SMB2.1.patch - Remove dependency workaround regarding python2/python3- Fix dependency failure on SLE15 regarding python2/python3.- Allow cached DNS entry to expire; (fate#325270). * add allow-dns-resolver-key-to-expire.patch- Document new SMB2.1+ defaults; (bsc#1130528). * be more verbose on mount errors, especially with EHOSTDOWN which is often returned on SMB version issues. * add suse-document-new-vers-default-SMB2.1.patch- Fix python dependency stalemate by requiring python3 version of samba-libs.- Update to cifs-utils 6.8. + document more mount options + man pages now generated from RST files + add python-docutils build dependency + update keyring to check tarball signature + remove 0001-manpage-correct-typos-and-spelling-mistakes.patch + remove 0002-mount.cifs-document-SMBv3.1.1-and-new-seal-option.patch - Add typo corrections, better doc and configure fixes from upstream + add 0001-docs-cleanup-rst-formating.patch + add 0002-mount.cifs.rst-document-new-no-handlecache-mount-opt.patch + add 0003-manpage-update-mount.cifs-manpage-with-info-about-rd.patch + add 0004-checkopts-add-python-script-to-cross-check-mount-opt.patch + add 0005-mount.cifs.rst-document-missing-options-correct-wron.patch + add 0006-cifs-utils-support-rst2man-3.patch + add 0007-checkopts-report-duplicated-options-in-man-page.patch + add 0008-mount.cifs.rst-more-cleanups.patch + add 0009-mount.cifs.rst-document-vers-3-mount-option.patch + add 0010-mount.cifs.rst-document-vers-3.02-mount-option.patch - Cleanup spec file * assume SUSE vendor and SLE >= 11- Update BuildIgnore to break build cycle samba-client <-> cifs-utils- update to 6.7: * mount.cifs cleanups - includes 6.6: * cleanup/overhaul of cifs.upcall krb5 credcache handling - partial cleanup with spec-cleaner- Document SMB3+ and new seal option; (fate#322075). + add patch 0001-manpage-correct-typos-and-spelling-mistakes.patch + add patch 0002-mount.cifs-document-SMBv3.1.1-and-new-seal-option.patch- Get rid of init script on everything based off SLE12+ (bsc#1025471).- Use https urls.- Don't ignore libldb, libtalloc, libtevent, and samba-client-libs at build time; (bsc#966174).- Update to cifs-utils 6.5. + mount.cifs: ignore x- mount options + minor build fixes; obsoletes include_paths.h_for__PATH_MOUNTED.patch + minor manpage fix- Ignore samba-client-libs at build-time on post-22 Fedora systems.- Add include_paths.h_for__PATH_MOUNTED.patch- Use rccifs -> service symlink for proper status (bnc#908023).- Remove dependency on gpg-offline as signature checking is implemented in the source validator.- Add README.cifstab.migration to document the cifstab removal; (bnc#902947).- Fix broken rccifs symbolic link.- Remove dead code associated with cifstab file which is no longer used.s390zl37 16570904806.9-150100.5.18.16.9-150100.5.18.1pam_cifscreds.sopam_cifscreds.8.gz/lib64/security//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:24916/SUSE_SLE-15-SP1_Update/d62d2e61ddf95cc3495582360dbcfd04-cifs-utils.SUSE_SLE-15-SP1_Updatecpioxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=505b3512a0d4ca933533b787862ac7ebceef410f, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RRRRRRRR!6<*ܺFݲ;/ r%J6sy$h&[UQC@̣ YN٠q\v ._)&Jшfzr.l- H'zjU.5`i$c>k3 ηL Nۍ{3k$mqG/Um'66bB`qsți -nT+|\(՘]<GHjsi0P4Uuۓ<XM}rp9Z1R;U3)s([bM;a)SpW~uSG0wL39I'^'M3c_P~zD}s2uŠek*" }#z7|樂Js4>I*dgjAUNiyZP~.gWMi(&%҇i(~< SbvRu ]*D(HAx9zFI,6g憽ƹ{!-HSK(!,++Ze@%% c-?Ơ?XS >|zA۩_-GUE>{n!)w,O+7$Oع &H:4g5qLZV909L%x 忛"714o8f5 zL[p]f;Ļ;NGJ *{% PL]r*cy?5p҉cZ96@owgK)9Ku2cණ:8;)'ȟ٣{C;u&PϏo-a^ rn ګ3%EGnƲ0_}2O TWxglq%@ǫ]~0c"5&F.#B}lnѭiȒ[~.B3=9S'egx?yЪQ>hr 5ztf'cH1Oz0[\)yF؏iRJpD)sQ,L38j{Yc4^4~탷桷.<t_<*sp_5 p kg߭SZSH︴(cPe˛>ŀ8{e++ߦM% w8ccy/[_u)cO(&M>&9mE.:h$/d?Iq;E6L߾hE:W7:/MiG@eq԰ZȤ*eVEЌ},TGl'e.3DW35JC7Rg dS>[B.ph(>D/m'qWtfsC}{QahkFd&''TQ/?'rn+VGء'|M G$C="ec9E)1 ~4,NS P8ue]6slB1(CxO /Pag4LLO=hO,У0<-E%%լh.ߖdֽJ,`}=8ڶ;\;/8 4OF) e6Aڐ̘V8]!"-uW7@]!0pSc%;=Sr",m*14e=$+^SmnY5Pf.%a1]:-g9)$:G=kO[m i\wԍ27.f6};ŸYqH4ۂ?_u~l0~` ?ۨػX>{G/ǞpdofBzx~qU fBW})[nGFn\ !;|41BM"/Q|mHkNӈ˿_Cg\46H\1YP(~-up{,k|S)9tYW. Xo^PPگdh^ZA3t'JUl\6YziE)FS×D2'#]c&oFodƨG( U^rٹvjT6?‰LTimM q9W$iNz@ Itbyxpk! b | {ԛ~K=6"wҲeӾ6`+vn (6'E#sb>O tp)jC8?MO=C,k4j=uUfOKbvqkkP(MKq@98[d1>cpl1#@7eH[3(F LQ@);♆R EހAZX+yik5a؊S\Itv F aּ3sݒy8?l8ҸjϖCƢ<8PÁJ#rEG#^/d]y*;/`uJ~њ%4.i+>_ܼ^\x4m0ā,t𮚬#ByXtݎ%9фMXz_p|!}φ9"\XD/qP1Y}beyD_uFa8is'K.7]-ao]ǎ|=prZ{>ۉvGk_HI5|%?M8iJcЏ,.S#@^xb; d ńs>ZIHVA?j=ȧ[AB):5_⹸qnTemMe\n'`$x$($4j3ġNe[uu}f&  m0.^i3C5YPf5 \u@Yo*.E'M)m;.gXVmD~~+x˴HX}h2HvUIr>_OQnO:0^F{#f" D pSfG O}rxBuȫA.1,?f-F:UU ̨<_q_v%bMYwb5xk=a; Uԙ_Hjn!UW;ڴ؍O#iX/7l'xFAH@v˺Uu楨`!+'jגgZFSIz~w7p鼂 nN_sm'sE!g"*^ OIEYjF#յc^h&0%\`Ǿ<.c)aOaՉJ`jK:~o LR>Ҁq/g9pc/E)n3;P{$НzqK;klO{D(Qˮ6׎6Ӿ>ؿgxu v}$w%"e}T?P]8`r&UofO, 9Hu3VxhkS-:.mlK o5t' WG~(`5$彻h'b"O%AEFR &_3q=!tp(BF$lq{*Hn,z[ XneWDl4_^${ljFYl G7h; M4^;w_^it$#ݞ2 >F8 fpUz#Hg!H| Yö6]p:IE$IhD J *L/Wx"Ủ3'onnQBH!7H双&Ru|74ԯ5x&=n&Xc,;IZ"-'Ca]W@%u5F3TDW' YZ