polkit-devel-0.116-3.9.1<>,>Xbzp9|1vMdXbmG)Rp_"܎vCiYjE#Pmwgn`XZC3GflXܭWfv3{!2t7Ȯ9 Yl."$%WўgV|ý%ׂ1~ vF "Ki|+!3P?:8uWOu5ڳK}VIRYžD~^D#3),K$ s9}PAeG2 @bHX>>>3h?3Xd  ;tx  ;AL)) B) ) 8)  a)  ) d)1))\(89t: F'G')H()I)@)X)lY)|\))]*D)^-o b.Jc.d/te/yf/|l/~u/)v08w1)x2$)y2 z233 33TCpolkit-devel0.1163.9.1Development files for PolicyKitDevelopment files for PolicyKit Authorization Framework.bzcabernetSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/Development/Libraries/C and C++http://www.freedesktop.org/wiki/Software/polkit/linuxppc64le"C~ U U T e ?{  ^ 9 f 'D5AA큤A큤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-agent-1.so.0.0.0libpolkit-gobject-1.so.0.0.0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootpolkit-0.116-3.9.1.src.rpmpkgconfig(polkit-agent-1)pkgconfig(polkit-gobject-1)polkit-develpolkit-devel(ppc-64)@@@@@@@ @ @    /usr/bin/pkg-configlibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libglib-2.0.so.0()(64bit)libpolkit0libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.17)(64bit)pkgconfigpkgconfig(gio-2.0)pkgconfig(glib-2.0)pkgconfig(polkit-gobject-1)polkitrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)typelib-1_0-Polkit-1_00.1162.182.180.116-3.9.13.0.4-14.6.0-14.0-15.2-10.1164.14.1b a@`]@]z@\t@\g\\@[v[E@ZUZ@ZY@Y?WXWV@VV@UL@T@T@rfrohl@suse.commeissner@suse.commeissner@suse.combjorn.lie@gmail.commeissner@suse.combjorn.lie@gmail.comdimstar@opensuse.orgmvetter@suse.commeissner@suse.combjorn.lie@gmail.commeissner@suse.combjorn.lie@gmail.comschwab@suse.dedimstar@opensuse.orgdimstar@opensuse.orglnussel@suse.defbui@suse.comfbui@suse.commeissner@suse.comantoine.belvire@laposte.nettchvatal@suse.commeissner@suse.com- CVE-2021-4115: fixed a denial of service via file descriptor leak (bsc#1195542) added CVE-2021-4115.patch- CVE-2021-4034: fixed a local privilege escalation in pkexec (bsc#1194568) added CVE-2021-4034-pkexec-fix.patch- CVE-2021-3560: fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync() (bsc#1186497) CVE-2021-3560.patch- Fix usage of libexecdir instead of prefix/lib where applicable.- polkit-keyinit.patch: add pam_keyinit to the polkit configuration (bsc#1144053)- Update to version 0.116: + Leaking zombie child processes. + Possible resource leak found by static analyzer. + Output messages tuneup. + Sanity fixes. + pkttyagent tty echo disabled on SIGINT. + HACKING: add link to Code of Conduct. + polkitbackend: comment typos fix. + configure.ac: fix detection of systemd with cgroups v2. + CVE-2018-19788 High UIDs overflow fix. + CVE-2019-6133 Slowfork vulnerability fix. + Allow unset process-uid. + Port the JS authority to mozjs-60. + Use JS_EncodeStringToUTF8. + Updated translations. - Replace pkgconfig(mozjs-52) with pkgconfig(mozjs-60) BuildRequires following upstreams changes. - Drop patches fixed upstream: + polkit-fix-possible-resource-leak.patch + polkit-fix-leaking-zombie-child-processes.patch + polkit-CVE-2018-19788.patch - Refresh patches with quilt.- Use systemd_ordering instead of systemd_requires: strictly speaking, polkit does not require systemd to be present. Just that when we install on a system with systemd (e.g outside containers) we would want systemd to be present before installing polkit. Help also reduce a cycle without special hacks in systemd.spec.- bsc#1130588: Require shadow instead of old pwdutils - User proper Requires(pre)/Requires(post) for permissions and shadow- polkit-CVE-2018-19788.patch: Fixed handling of UIDs over MAX_UINT (bsc#1118277 CVE-2018-19788)- Add polkit-fix-possible-resource-leak.patch: Fix possible resource leak found by static analyzer. - Add polkit-fix-leaking-zombie-child-processes.patch: polkitd: fix zombie not reaped when js spawned process timed out (fdo#106021).- Update to version 0.115: - Fix CVE-2018-1116: Trusting client-supplied UID (bsc#1099031) - jsauthority: pass "%s" format string to remaining report function (obsoletes polkit-jsauthority-pass-format-string.patch)- Update to version 0.114: + Port to mozjs 52, the latest version of the firefox JavaScript engine. + Add gettext support for policy files. + Fixes for various memory leaks. + Updated translations. - Update keyring with Ray Strode public key. - Drop with_systemd define and all conditionals and polkit-no-systemd.patch and ConsoleKit BuildRequires, we only support systemd now. - Drop upstream fixed polkit-itstools.patch. - Rebase pkexec.patch with quilt. - Add gcc-c++ and pkgconfig(mozjs-52) BuildRequires: New dependencies. - Drop conditional pkgconfig(mozjs-17.0) and pkgconfig(mozjs185): no longer supported. - Drop autoconf and automake BuildRequires: They are implicit via libtool BuildRequires. - Replace glib2-devel and gobject-introspection-devel with their pkgconfig counterparts: pkgconfig(gio-unix-2.0), pkgconfig(gmodule-2.0) and pkgconfig(gobject-introspection-1.0). - Add polkit-jsauthority-pass-format-string.patch: jsauthority: pass "%s" format string to remaining report function, patch from upstream git, adding missed commit (bgo#105865). - Drop polkit-revert-session-magic.patch: Upstream systemd bug is since a long time fixed (gh#systemd#58) (boo#954139).- pkexec.patch: pkexec: allow --version and --help even if not setuid- Modernize spec-file by calling spec-cleaner- Add polkit-itstools.patch: Add gettext support for .policy files.- Use gettext as fallback to get potential distro translations for polkit actions. Similar mechnism as used for desktop file translations. That way it's possible to use weblate to add additional translations that are not provided by upstream (polkit-gettext.patch).- Use pkgconfig() instead of requiring systemd package names directly.- systemd.pc is shipped by systemd main package (bsc#983167) Strangely polkit wants systemd.pc to detect that the target system is running systemd even if its configured to build systemd support...- polkit-revert-session-magic.patch: revert a session detection change that could lead to sessions not being detected as active due to a systemd bug. bsc#954139- Update to 0.113: * Fix CVE-2015-4625 * Fix CVE-2015-3256 * Fix CVE-2015-3255 * Fix CVE-2015-3218 * On systemd-213 and later, the “active” state is shared across all sessions of an user, instead of being tracked separately * pkexec: when not given a program to execute, runs the users’ shell by default - Remove polkit-no-kded-leak.patch (upstreamed)- Try to fix kded leaking due to powerdevil exposing this issue in polkit: (bsc#912889) * polkit-no-kded-leak.patch- Added gpg signature and keyring with David Zeuthen and Miloslav Trmac ids.cabernet 1644329631  !"#$%&'()0.1160.1160.116-3.9.10.116-3.9.1 pk-example-frobnicatepolkit-1polkitpolkit.hpolkitactiondescription.hpolkitauthority.hpolkitauthorityfeatures.hpolkitauthorizationresult.hpolkitcheckauthorizationflags.hpolkitdetails.hpolkitenumtypes.hpolkiterror.hpolkitidentity.hpolkitimplicitauthorization.hpolkitpermission.hpolkitprivate.hpolkitsubject.hpolkitsystembusname.hpolkittemporaryauthorization.hpolkittypes.hpolkitunixgroup.hpolkitunixnetgroup.hpolkitunixprocess.hpolkitunixsession.hpolkitunixuser.hpolkitagentpolkitagent.hpolkitagentenumtypes.hpolkitagentlistener.hpolkitagentsession.hpolkitagenttextlistener.hpolkitagenttypes.hlibpolkit-agent-1.solibpolkit-gobject-1.sopolkit-agent-1.pcpolkit-gobject-1.pcpolkit.itspolkit.locPolkit-1.0.girPolkitAgent-1.0.girorg.freedesktop.policykit.examples.pkexec.policy/usr/bin//usr/include//usr/include/polkit-1//usr/include/polkit-1/polkit//usr/include/polkit-1/polkitagent//usr/lib64//usr/lib64/pkgconfig//usr/share/gettext/its//usr/share/gir-1.0//usr/share/polkit-1/actions/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:22716/SUSE_SLE-15-SP2_Update/ec91c1ce954d2da72110deaed7a67a5e-polkit.SUSE_SLE-15-SP2_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=6b277fed157b4cc707699642f9c4ca80262d7be0, for GNU/Linux 3.10.0, strippeddirectoryC source, ASCII textpkgconfig fileXML 1.0 document, ASCII textXML 1.0 document, UTF-8 Unicode textRRRRRPRR PRR R>HP7)#޹utf-811636d5cc247ea095eb6b11a976483d2c0bd431f62ec4b1151a56b90b24ef4ac? 7zXZ !t/]"k%js0wGy-M5{Й:xǗO Y6pd gkmRw;!(_)jRCZ&+IzN>`o4'e' ݍ |NtO÷0` qs( RvS~#;of_1e@.S&0ԗMu Aɿ'DD(R="k,Q63q{s 5'I ًn6!MB6vAHk8l 8˽$#wg!N6GJOI9c\/yA( 6Sb.C}(!ׄK {SӮi;tGõ_ X TE\kuo3-N0+^k$K\R j&1a HQ0%.*!ӻ iaiRT" 2ضQPЯ(* 发VICvC~SC1oW_6 GqN\ugqTiA xra⍺6S0G W$F8O%TTl͇!u/dyTd*$BǖfSWaѝI(w]9/߬d +CϣHڹk1o`ٝ! U2 nϊʴBͰ0ȮsθԔ(Ȗ~YR1WQc=SXMNC5GM/d(be#̼T$hOU.=Z@ǩJpE.ej?<mmS,DG_u<ESM8xdc662tRRҤNu_O ΒF 2?}bGcA9S`ްMλ>^ņ Ϙ\{gBOksq1#d]^ZJԛ4~SK;A?aZ-7sMX I-c!D Dl? R3~1<ZkHP zJ n'3*ߛ\s?)?q\)T=y}K&K+h{t0(9 P6pDiAKCSQ L~D+In)'5Y74N-7qFk0A5q)p" \ZBKu!m˻Úupu̖\\ w`- ٠ߐwgVp%l3$~Ssh)/U7d e[CR!yƶ)tV'4'ފةzqD^mY͂}<ܘVzbAlƣ>ZɴjjSJr:c<ԝq6{s.OGQo!V[P΀Y4ztOP@ʅ+!Ӈ]1k1YGH$ګ+*F_"؅ȀE=;闕B'>,`1Qa 64 0io2jT&@$Sk} ԍ vTk'Y / ^ YZ