ecryptfs-utils-32bit-103-7.1<>,@Zro/=„;Mӧf'w+ww4 -2RNU¹E+3c? %]dY%h$kI\J _;p燭]2 Qo]"wjW-.T[yh#iwG5y"zg"ks,[7"9c6/%>@̵)FA]Qd$j[,Һ6mre:꧀ʫ9T"| <#%2ĝHWTqKLrۣE r>=,(?,d  @pt| X |    "| @(89 : b>!]G!hH!I!X" Y"0 \"H]"^#b$c%7d%e%f%l%u%v&4 w*Tx*y*B+,,Cecryptfs-utils-32bit1037.1Userspace Utilities for ecryptfsA stacked cryptographic filesystem for Linux.Zrolamb28openSUSE Leap 42.3openSUSEGPL-2.0+http://bugs.opensuse.orgProductivity/Securityhttps://launchpad.net/ecryptfslinuxx86_64/sbin/ldconfigF$q @6-XAAAAAZroZroZroZroZroZroZroZroZroZroZroZroZroZroZroZroZroZro720a99c02a49310de12d7c1580edf0ac674f5c00760ff489a2cf73c25495de1ab56cbfe23a989ef9c8c103563e458abc290adc51e1df6df5424e15674d0fe5239f8f4c9e1b81e07609f0d7480559152501c6c63c4a4b978b7bd07ed63dd64daa64a7a68268cd04dc8c28e6a1da9349a32e6405bbbf8e7a8d66f0255cdd3098b13d878d933b457cb747865f61bd458f65libecryptfs.so.0.0.0libecryptfs.so.0.0.0_libecryptfs.so.0.0.0_libecryptfs.so.0.0.0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootecryptfs-utils-103-7.1.src.rpm_libecryptfs.so.0ecryptfs-utils-32bitecryptfs-utils-32bit(x86-32)libecryptfs.so.0libecryptfs_key_mod_openssl.solibecryptfs_key_mod_passphrase.solibecryptfs_key_mod_pkcs11_helper.solibecryptfs_key_mod_tspi.sopam_ecryptfs.so@@@@@@@@@@@@@@@@@@@@@@@@@   /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.8)libcrypto.so.1.0.0libdl.so.2libdl.so.2(GLIBC_2.0)libdl.so.2(GLIBC_2.1)libecryptfs.so.0libkeyutils.so.1libkeyutils.so.1(KEYUTILS_0.3)libnss3.solibnss3.so(NSS_3.2)libnss3.so(NSS_3.3)libpam.so.0libpam.so.0(LIBPAM_1.0)libpam.so.0(LIBPAM_EXTENSION_1.0)libpkcs11-helper.so.1libtspi.so.1python(abi)rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)2.73.0.4-14.0-14.4.6-14.11.2ZWQVSR QOjO@O0@O O~Or@N@Nx@Nu@NC@M'Kh@KKepJCfkbabioch@suse.commeissner@suse.comfcrozat@suse.comdarin@darins.netdarin@darins.netmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comdarin@darins.netmeissner@suse.comcoolo@suse.commeissner@suse.dejengelh@medozas.demeissner@suse.demeissner@suse.deaj@suse.demeissner@suse.dejengelh@medozas.desbrabec@suse.cz- Fix for CVE-2015-8946: ecryptfs-setup-swap improperly configures encrypted swap when using GPT partitioning (bsc#989121) - Added CVE-2015-8946.patch - Fix for CVE-2016-6224: ecryptfs-setup-swap improperly configures encrypted swap when using GPT partitioning on a NVMe or MMC drive (bsc#989122) - Added CVE-2016-6224.patch- validate-mount-destination-fs-type.patch: Fixed mounting over specific system mounts that could be used to escalate privileges by local users. (bsc#962052 CVE-2016-1572) - ecryptfs-utils-CVE-2014-9687.patch: Do not use a default salt to encrypt the mount passphrase, which would make it easier for attackers to obtain user passwords via a brute force attack. (bsc#920160 CVE-2014-9687)- Drop ecryptfs-correct-desktop.patch and ensure ecryptfs-mount-private.desktop is properly generated and installed in a program specific location (ecryptfs-setup-private will take care of creating the right symlink) and not in /usr/share/applications by default. - Add ecryptfs-mount-private.png (from Fedora) - Create tmpfiles.d to ensure ecryptfs module is autoloaded at start. - Fix category on ecryptfs-setup-private.desktop.- fix %postun to not run pam-config on update (bnc#814098, bnc#834993)- update to 103 - move -pie/-fpie into separate patch - update ecryptfs-setup-swap-SuSE.patch for systmd and fstab without UUID lables - remove ecryptfs-utils.security.patch, fixed upstream - add PreReq: permissions - removed unpackaged doc- also supply MS_NODEV to avoid exposing device files if someone got them on the encrypted media.- point the desktop link to the right .desktop file - build mount.ecryptfs_private with -pie/-fpie- hook pam_ecryptfs into pam session and auth bnc#755475- added security improvements to mount.ecryptfs_private and pam_ecryptfs (bnc#740110)- patch so ecryptfs-setup-swap executes boot.crypto- updated to 96 - bugfixes - testsuite added - ecryptfs-verify utility added - write-read test utility - mark /sbin/mount.eccryptfs_private as setuidable (bnc#745584 , bnc#740110)- add libtool as buildrequire to make the spec file more reliable- Updated to 92 * Fix umask issue introduced by last security update * some bugfixes- Remove redundant/obsolete tags/sections from specfile (cf. packaging guidelines) - Put make call in the right spot - Use %_smp_mflags for parallel build- Updated to 90 Fixed several security issues: * CVE-2011-1831 - Race condition when checking mountpoint during mount. * CVE-2011-1832 - Race condition when checking mountpoint during unmount. * CVE-2011-1833 - Race condition when checking source during mount. * CVE-2011-1834 - Improper mtab handling allowing corruption due to resource limits, signals, etc. * CVE-2011-1835 - Key poisoning in ecryptfs-setup-private due to insecure temp directory. * CVE-2011-1836 - ecryptfs-recover-private mounts directly in /tmp * CVE-2011-1837 - Predictable lock counter name and associated races. New ecryptfs-find binary to find by inode.- Updated to 87 * src/utils/ecryptfs-setup-private: update the Private.* selinux contexts * src/utils/ecryptfs-setup-private: - add -p to mkdir, address noise for a non-error - must insert keys during testing phase, since we remove keys on unmount now, LP: #725862 * src/utils/ecryptfs_rewrap_passphrase.c: confirm passphrases in interactive mode, LP: #667331 - Updated to 86 * src/pam_ecryptfs/pam_ecryptfs.c: - check if this file exists and ask the user for the wrapping passphrase if it does - eliminate both ecryptfs_pam_wrapping_independent_set() and ecryptfs_pam_automount_set() and replace with a reusable file_exists_dotecryptfs() function * src/utils/mount.ecryptfs_private.c: - support multiple, user configurable private directories by way of a command line "alias" argument - this "alias" references a configuration file by the name of: $HOME/.ecryptfs/alias.conf, which is in an fstab(5) format, as well as $HOME/.ecryptfs/alias.sig, in the same format as Private.sig - if no argument specified, the utility operates in legacy mode, defaulting to "Private" - rename variables, s/dev/src/ and s/mnt/dest/ - add a read_config() function - add an alias char* to replace the #defined ECRYPTFS_PRIVATE_DIR - this is half of the fix to LP: #615657 * doc/manpage/mount.ecryptfs_private.1: document these changes * src/libecryptfs/main.c, src/utils/mount.ecryptfs_private.c: - allow umount.ecryptfs_private to succeed when the key is no longer in user keyring. - Updated to 85 * src/utils/ecryptfs-recover-private: clean sigs of invalid characters * src/utils/mount.ecryptfs_private.c: - fix bug LP: #313812, clear used keys on unmount - add ecryptfs_unlink_sigs to the mount opts, so that unmounts from umount.ecryptfs behave similarly - use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek * src/utils/ecryptfs-migrate-home: - support user databases outside of /etc/passwd, LP: #627506 - Updated to 84 * src/desktop/ecryptfs-record-passphrase: fix typo, LP: #524139 * debian/rules, debian/control: - disable the gpg key module, as it's not yet functional - clean up unneeded build-deps - also, not using opencryptoki either * doc/manpage/ecryptfs.7: fix minor documentation bug, reported by email by Jon 'maddog' Hall * doc/manpage/ecryptfs-recover-private.1, doc/manpage/Makefile.am, po/POTFILES.in, src/utils/ecryptfs-recover-private, src/utils/Makefile.am: add a utility to simplify data recovery of an encrypted private directory from a Live ISO, LP: #689969- Fix build with adding requires on mozilla-nss-devel and python-devel. - Fix package list.- Updated to 83 - lots of bugfixes - improvements- Package baselibs.conf- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164)./bin/sh 103-7.1103-7.1securitypam_ecryptfs.soecryptfslibecryptfs_key_mod_openssl.solibecryptfs_key_mod_passphrase.solibecryptfs_key_mod_pkcs11_helper.solibecryptfs_key_mod_tspi.solibecryptfs.lalibecryptfs.solibecryptfs.so.0libecryptfs.so.0.0.0python2.7site-packagesecryptfs-utils_libecryptfs.la_libecryptfs.so_libecryptfs.so.0_libecryptfs.so.0.0.0/lib//lib/security//usr/lib//usr/lib/ecryptfs//usr/lib/python2.7//usr/lib/python2.7/site-packages//usr/lib/python2.7/site-packages/ecryptfs-utils/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:7750/openSUSE_Leap_42.3_Update/9cfdd9898c1e1a3c06f6eab06ff4cb0d-ecryptfs-utils.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linux directoryELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=db34d9da59312146692c36539676ac60df09004a, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=e268ab2bb463c1b6a3bcbaea5d9cbc0befb8f8ff, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=1f69fb49fabbe3375328621ae082d56ca329ffb6, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=611077b52e4eb74fa8a6e493c63eb023919e3d1a, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=d4666f45dae5cc4dec5c192ea66dad2aae1dd6a8, strippedlibtool library fileELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=095617263cac7e2dd0da3e0e49a86fadcf691acb, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=3e536e755b017ec76e60916cea750e7a34ce89df, stripped  (:;  PRRR RRRRRRPR RRRR RPR RRRRPR RRRRRR RPRR RRRRRPR R RRRRRR RRRRRRRR RRPRRRRRRpackageand(ecryptfs-utils:pam-32bit)?0]"k%MfjN9EXM@W=~!Vt/JFۃ9,z"=]' ~x_1c8L՛H鮭)~Y:}yԗhI!:m7{c0R{?]]A&&7}/VEL~b8Y(lthIdY{ʳ T A~Vq69%lm0.M' 83?u6=X`$ICS.Hv+v@z:{USZPAuBySɈ\(%Fcef~eTU6ePkX\`fK!˔ˤ=Rҷ 21![7& ?q(b0k?IܑM?HscCTnQD_!82@̺ovJa40t(>dZ Ud^@U S"VVoŊK+:,丨Q rB9cѲ"X$9ei^J@3+O狭D2a]' vĘ|/XdP> 0N|2,=AfbbaJ//,~`LzZϗT0lMz:alk* NumC ީv| %ܧZeLB0ڕd ,U}4CZYRzWUVىr{`FDRWW%FGq5:7 S|.US=MWrq /"O`l+ ,}Tߦ?z>G[kY"?jr%vd[bfƴ>%3 ?t /-ƣgkQRh DXa/Izxe|P$j9JyHnU:WG8?/] g`A2503烥7ܴ|PRfqN`*d354=:Gno2+P}-0?R̴2V:%R-أנ_GPhآ] n*;'8-aNƁ** r+-#00y6buĜRKGh4Ajs1tK.&jKwgcҗ#AAYL: :ph Nl(!rkBԊ-uҁaB=9dXѤn rQb B$L{xW|+&2ƿug#"4]"yp(Q :27Bhw:hk )WNj(RhNVA&lsL=ԇs.U&B]zѡ8(fiICLr?B=]izoj)[~AjW'1 D(׻3x~͇B,`L}+ (< ^{3n-+_Br连 "M,]VfoѲ\ ȡ1ce 6E?rXT [Y.@,M{n;` IW0H\REܮ J&Xw4L8w"H},R`ob%mP=Vi[zdt,N'U9;~:x]}"cd=ZYK\7]7i\щ?!W:j#w,iZ>~9dTrb`:O+5 < b-PoIH}4Eں[.t8Ѿ JTONeȻ-BS7 xav@%ڇAgʘmK?%'aNS}{Z- ́066V(h`W9esy5}vY '+?񰠠<yC J ˘h֣`BsWbt{RG@֦ ĺ$[P4SxhZ~?emGK&əJ^Dmptp$~[9l)ԵBc.<:y(LZJvGnX+'1VEvGMf[aJv,n0ʹ=Z;G *ď;I oQ3k ض> 2ќ Bbq"?u4O8RFrm.{.`_ 1 5? [٫"c| >;&o@@گ.)g~sN`Cub z7eugzd՝|ܔO\|- )m%]@WI#Ǝm`4J϶1Tް,'?[Ac裏Sx'[m>UDB+]܉!7/Sl !9 Ü^֚k!#6vM^jy2:ByI;f$"貭ãX` bqchO*u0{ s1 qVN2NEbgCo RXʙzu|5}զ?o5G+X_8YMm1# 3-׆C6G-Z C {_ Lrh! ?[av mw/)OU=&3.ȅ/ nB;m!Y# #wZ;)eh0sC{eYyN^ii~| {qA oDV p07)x8ZBDWN/綻ʕqfmBlֺO~14F̤YY0N+&S"1G"Q.UCaKfR2 .nZ0{1L*gfPTht&~6t,/9ܑ^sUvpzs <%}OHy0(9%Sdk]ώEZg"K Z B4UXƘ1CY8>>gy dy6*-q텸9oDɑ=mmա5MHzjI9VncKXmlXd8ГQ1\54aBQFP1NflrFrX#Qy;9iP;^qS[=.@{ ʌ;Uu&Tdg+7t͂@G^?d4+o݀Ka$ၔ11D#ཹ?/za|Ds:Vk3\>`I$==Ǝh@L)