libpolkit0-0.114-lp151.5.3.1<>, ]@Q/=„C2u˜ɼdj#uckBn=UVhW1FqH4 YBՕ+~DG#6E`DGQ4T:<ٹ߉ g3 xː cyƃTg;;En`giNh`9ݞ_t,LȡCVgbӕ)W?7!q̡ 'h!IY^ oQ]S/שBd>6MWz@L%@: ~صi|NΌa>= L{쀶>@?d   N  3<N gx    h `(89:#>4@CFRGhHxIXY\]^<bFcdefluvwxyztClibpolkit00.114lp151.5.3.1PolicyKit Authorization Framework -- LibrariesPolicyKit is a toolkit for defining and handling authorizations. It is used for allowing unprivileged processes to speak to privileged processes. This package contains the libraries only.]@Qcloud115openSUSE Leap 15.1openSUSELGPL-2.1-or-laterhttp://bugs.opensuse.orgSystem/Librarieshttp://www.freedesktop.org/wiki/Software/polkit/linuxi5860]@Q ]@Q]@Q ]@Q2a25146dbbe62b59e2d1e29071f3d4925d051d003defa463bdbbf6edf9073d56379a33ce8f4643de7fe04275aed69799a74bca1d5508b3c0d59d91d1f1250561libpolkit-agent-1.so.0.0.0libpolkit-gobject-1.so.0.0.0rootrootrootrootrootrootrootrootpolkit-0.114-lp151.5.3.1.src.rpmlibpolkit-agent-1.so.0libpolkit-gobject-1.so.0libpolkit0libpolkit0(x86-32)@@@@@@@@@@@@@@@@     /sbin/ldconfig/sbin/ldconfiglibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.2)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgio-2.0.so.0libglib-2.0.so.0libgobject-2.0.so.0libpolkit-gobject-1.so.0libpthread.so.0libpthread.so.0(GLIBC_2.0)libsystemd.so.0libsystemd.so.0(LIBSYSTEMD_209)libsystemd.so.0(LIBSYSTEMD_213)polkitrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.1143.0.4-14.6.0-14.0-15.2-14.14.1]6\@[meissner@suse.commeissner@suse.combjorn.lie@gmail.comschwab@suse.dedimstar@opensuse.orgdimstar@opensuse.orglnussel@suse.defbui@suse.comfbui@suse.commeissner@suse.comantoine.belvire@laposte.nettchvatal@suse.commeissner@suse.com- CVE-2019-6133.patch: Fixed improper caching of auth decisions, which could bypass uid checking in the interactive backend. (bsc#1121826 CVE-2019-6133)- polkit-CVE-2018-19788.patch: Fixed handling of UIDs over MAX_UINT (bsc#1118277 CVE-2018-19788)- 0001-Fix-CVE-FIXME-Trusting-client-supplied-UID.patch: Fixed trusting the client-supplied UID (CVE-2018-1116 bsc#1099031)- Update to version 0.114: + Port to mozjs 52, the latest version of the firefox JavaScript engine. + Add gettext support for policy files. + Fixes for various memory leaks. + Updated translations. - Update keyring with Ray Strode public key. - Drop with_systemd define and all conditionals and polkit-no-systemd.patch and ConsoleKit BuildRequires, we only support systemd now. - Drop upstream fixed polkit-itstools.patch. - Rebase pkexec.patch with quilt. - Add gcc-c++ and pkgconfig(mozjs-52) BuildRequires: New dependencies. - Drop conditional pkgconfig(mozjs-17.0) and pkgconfig(mozjs185): no longer supported. - Drop autoconf and automake BuildRequires: They are implicit via libtool BuildRequires. - Replace glib2-devel and gobject-introspection-devel with their pkgconfig counterparts: pkgconfig(gio-unix-2.0), pkgconfig(gmodule-2.0) and pkgconfig(gobject-introspection-1.0). - Add polkit-jsauthority-pass-format-string.patch: jsauthority: pass "%s" format string to remaining report function, patch from upstream git, adding missed commit (bgo#105865). - Drop polkit-revert-session-magic.patch: Upstream systemd bug is since a long time fixed (gh#systemd#58) (boo#954139).- pkexec.patch: pkexec: allow --version and --help even if not setuid- Modernize spec-file by calling spec-cleaner- Add polkit-itstools.patch: Add gettext support for .policy files.- Use gettext as fallback to get potential distro translations for polkit actions. Similar mechnism as used for desktop file translations. That way it's possible to use weblate to add additional translations that are not provided by upstream (polkit-gettext.patch).- Use pkgconfig() instead of requiring systemd package names directly.- systemd.pc is shipped by systemd main package (bsc#983167) Strangely polkit wants systemd.pc to detect that the target system is running systemd even if its configured to build systemd support...- polkit-revert-session-magic.patch: revert a session detection change that could lead to sessions not being detected as active due to a systemd bug. bsc#954139- Update to 0.113: * Fix CVE-2015-4625 * Fix CVE-2015-3256 * Fix CVE-2015-3255 * Fix CVE-2015-3218 * On systemd-213 and later, the “active” state is shared across all sessions of an user, instead of being tracked separately * pkexec: when not given a program to execute, runs the users’ shell by default - Remove polkit-no-kded-leak.patch (upstreamed)- Try to fix kded leaking due to powerdevil exposing this issue in polkit: (bsc#912889) * polkit-no-kded-leak.patch- Added gpg signature and keyring with David Zeuthen and Miloslav Trmac ids./sbin/ldconfig/sbin/ldconfigcloud115 15644961490.114-lp151.5.3.10.114-lp151.5.3.1libpolkit-agent-1.so.0libpolkit-agent-1.so.0.0.0libpolkit-gobject-1.so.0libpolkit-gobject-1.so.0.0.0/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10709/openSUSE_Leap_15.1_Update/15b38c3478a29a627d88d92ad2d03da0-polkit.openSUSE_Leap_15.1_Updatedrpmxz5i586-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=d5745959841178f513991d560a5532c7ff34a4b4, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=e83932b4809ccd98f1a49dc22c0598665d7b921b, stripped PRRRRRRRR R R R R RPRRRRRRR R R RR R?}-If*utf-815c8d52ae2d6903565d3e4f4c455ada4896a4f7668c456c341bb013ac3d9a3e1?7zXZ !t/t]"k%{U}duLԦKU^4{晱RCwa1cF85\#ٌ jWR 雥-gV 6oᚯ--"mSN~k |a`q9; (MFI瀻"cV:nRwv)4 x_ +dtMbL{3°lwդϥ߭\iW&vCuӸ:=PEN,dӰ@/9H=WP`퐢-滳x Gޣd9}Αuavȶ猤4ڜ KjyU2U5:OߡH3HKB5zD\iygX/R &W/$XKxFHpYӦOIn{ѡ}֢2 L ZJrh0B7n ΂T): {C? P3ƼپWzeT\ ;A2$5ոӧso?1_`U+%US^xg ޷tDSlDfsќŒbK,9݃sOOJ7W3t{!vB= iq/ȝg|7ws/a^m& oɾ~;9AZR`JHY~H6lXw唤8=t6 Γ#p#Pں>!0 8߅܈3>}TY3&>.\auVx~-Δ\!`C4 4HI?srTIfv!D{J;+ &ZMAϹ 69B˭h$;ޘ^] 5Bũ\e5H~"oTʬ Cґ(<30pMUUu$;WґX5 !ڔI7qΏT LuENM2Ey4hњ}2썮sY*?mss!<}t]/TdsPQ%U4"~X-7t72G~xmqǺ)j*U0cdXX1|qU%kVxeHxtb4>=f%eoc̐. /R YZ