opensc-32bit-0.19.0-150100.3.19.1<>,9c-hp9|(i@S"rzK I3!j\nqWvRKnç2EFZ6 C 'Htf2DZ3)&/Ԡ e.e\_۴6Q\e Hu@i#ezR7,J'IƹNStkQ~х LXr{}_!UQ'@+,z}5ӹ%vV%"͡*ޑ ]D>>0<?0,d $ 9X\dh  $l     \ X |   4 ( T8 \9 :>&G&H'I'\X'p Y' \'](^)Lb){c*9d*e*f*l*u*v+ w.,x.ty.H///0(Copensc-32bit0.19.0150100.3.19.1Smart Card UtilitiesOpenSC provides a set of utilities to access smart cards. It mainly focuses on cards that support cryptographic operations. It facilitates their use in security applications such as mail encryption, authentication, and digital signature. OpenSC implements the PKCS#11 API. Applications supporting this API, such as Mozilla Firefox and Thunderbird, can use it. OpenSC implements the PKCS#15 standard and aims to be compatible with every software that does so, too. Before purchasing any cards, please read carefully documentation on the web pageonly some cards are supported. Not only card type matters, but also card version, card OS version and preloaded applet. Only subset of possible operations may be supported for your card. Card initialization may require third party proprietary software.c-hsheep73)1SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/Productivity/Securityhttps://github.com/OpenSC/OpenSC/wikilinuxx86_64/sbin/ldconfig &((:4Ac-hc-hc-hc-hc-hc-hc-hc-hc-hc-hc-hc-hc-hc-hc-hc-hc-hc-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.so.6.0.0libsmm-local.so.6.0.0libsmm-local.so.6.0.0../onepin-opensc-pkcs11.so../opensc-pkcs11.so../pkcs11-spy.sorootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootopensc-0.19.0-150100.3.19.1.src.rpmlibopensc.so.6libsmm-local.so.6libtool(/usr/lib/libopensc.la)libtool(/usr/lib/libsmm-local.la)libtool(/usr/lib/onepin-opensc-pkcs11.la)libtool(/usr/lib/opensc-pkcs11.la)libtool(/usr/lib/pkcs11-spy.la)opensc-32bitopensc-32bit(x86-32)pkgconfig(opensc-pkcs11)@@@@@@@@@@@@@@@@@@@    /bin/sh/usr/bin/pkg-configlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.11)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.7)libcrypto.so.1.1libcrypto.so.1.1(OPENSSL_1_1_0)libdl.so.2libdl.so.2(GLIBC_2.0)libdl.so.2(GLIBC_2.1)libopensc.so.6libpthread.so.0libpthread.so.0(GLIBC_2.0)libz.so.1openscrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.19.03.0.4-14.6.0-14.0-15.2-14.14.1c*b=awas@`i@`W5@`OL@\u*@[@[DZJ"Ym@X43@W{@UTjsikes@suse.comjsikes@suse.comsbrabec@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.comkbabioch@suse.commcalabkova@suse.comsbrabec@suse.commichael@stroeder.comtchvatal@suse.comsbrabec@suse.comt.gruner@katodev.debwachter-pkg@lart.infomichael@stroeder.com- Added patch opensc-CVE-2019-6502.patch * fixes memory leak in sc_context_create in ctx.c * bsc#1122756 * CVE-2019-6502- bsc#1114649 - Opensc software package command error * replaced opensc-bsc1114649_fix_pkcs11-tool_segfault.patch because previous change didn't work.- tcos: Fix use after return (bsc#1192005, CVE-2021-42780, opensc-tcos-bound-check.patch). - oberthur: Fix use after free (bsc#1191992, CVE-2021-42779, opensc-oberthur-return-values.patch). - oberthur: Fix multiple heap buffer overflows (bsc#1192000, CVE-2021-42781, opensc-oberthur-overflow1.patch, opensc-oberthur-memory-init.patch, opensc-oberthur-overflow2.patch, opensc-oberthur-overflow3.patch, opensc-oberthur-invalid-length.patch).- bsc#1191957 - Stack buffer overflow issues in various places * VUL-0: CVE-2021-42782 * opensc-0_19_0-CVE-2021-42782.patch * Sourced from: [1] https://github.com/OpenSC/OpenSC/commit/78cdab94 [2] https://github.com/OpenSC/OpenSC/commit/7114fb71 [3] https://github.com/OpenSC/OpenSC/commit/1252aca9 [4] https://github.com/OpenSC/OpenSC/commit/ae1cf0be [5] https://github.com/OpenSC/OpenSC/commit/456ac566- bsc#1114649 - Opensc software package command error * opensc-bsc1114649_fix_pkcs11-tool_segfault.patch * Fixes segmentation fault in pkcs11-tool.c * Sourced from OpenSC git: git diff 728d099a536ab1923a217ae00408f72aa0b8ecee..31831c300be3d1fc6387ce221c069301ecb3c087- bsc#1177380 - VUL-0: CVE-2020-26571 * gemsafe GPK smart card software driver stack-based buffer overflow * opensc-0_19_0-CVE-2020-26571.patch - bsc#1158307 - VUL-1: CVE-2019-19480 * improper free operation in sc_pkcs15_decode_prkdf_entry * opensc-0_19_0-CVE-2019-19480.patch - bsc#1149747 – VUL-1: CVE-2019-15946 * out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry * opensc-0_19_0-CVE-2019-15946.patch - bsc#1149746 – VUL-1: CVE-2019-15945 * out-of-bounds access of an ASN.1 Bitstring in decode_bit_string * opensc-0_19_0-CVE-2019-15945.patch - bsc#1158256 – VUL-1: CVE-2019-19479 * incorrect read operation during parsing of a SETCOS file attribute * opensc-0_19_0-CVE-2019-19479.patch - bsc#1170809 – VUL-1: CVE-2019-20792 * double free in coolkey_free_private_data * opensc-0_19_0-CVE-2019-20792.patch - bsc#1177378 - VUL-0: CVE-2020-26572 * Prevent out of bounds write * opensc-0_19_0-CVE-2020-26572.patch- Fix buffer overflow in sc_oberthur_read_file * bsc#1177364 * CVE-2020-26570 * Added opensc-0_19_0-CVE-2020-26570.patch- Update to version 0.19.0 * Fixed multiple security problems (out of bound writes/reads): * CVE-2018-16391 (bsc#1106998) * CVE-2018-16392 (bsc#1106999) * CVE-2018-16393 (bsc#1108318) * CVE-2018-16418 (bsc#1107039) * CVE-2018-16419 (bsc#1107107) * CVE-2018-16420 (bsc#1107097) * CVE-2018-16421 (bsc#1107049) * CVE-2018-16422 (bsc#1107038) * CVE-2018-16423 (bsc#1107037) * CVE-2018-16424 (bsc#1107036) * CVE-2018-16425 (bsc#1107035) * CVE-2018-16426 (bsc#1107034) * CVE-2018-16427 (bsc#1107033) * Drop patches: opensc-fixed-out-of-bounds-reads.patch opensc-fixed-out-of-bounds-writes.patch opensc-iasecc-fixed-unbound-recursion.patch opensc-added-bounds-checking.patch * Workaround cards returning short signatures without leading zeroes * Distribute minimal opensc.conf * `pkcs11_enable_InitToken made` global configuration option * Modify behavior of `OPENSC_DRIVER` environment variable to restrict driver list instead of forcing one driver and skipping vital parts of configuration * Removed configuration options `zero_ckaid_for_ca_certs`, `force_card_driver`, `reopen_debug_file`, `paranoid-memory` * Generalized configuration option `ignored_readers` * If card initialization fails, continue card detection with other card drivers * reader-pcsc: allow fixing the length of a PIN * fixed crash during `C_WaitForSlotEvent` * Allow cancelling the PIN pad prompt before starting the reader transaction. Whether to start the transaction immediately or not is user-configurable for each application * opensc-notify * add Exit button to tray icon * User better description (GenericName) and a generic application icon * Do not display in the application list - Removed patches included upstream now: * opensc-desktop.patch * opensc-desktop2.patch * opensc-bash-completions.patch - Applied spec-cleaner- fixed multiple security problems (out of bound writes/reads): bsc#1104812 CVE-2018-16391 (bsc#1106998) CVE-2018-16392 (bsc#1106999) CVE-2018-16393 (bsc#1108318) CVE-2018-16418 (bsc#1107039) CVE-2018-16419 (bsc#1107107) CVE-2018-16420 (bsc#1107097) CVE-2018-16421 (bsc#1107049) CVE-2018-16422 (bsc#1107038) CVE-2018-16423 (bsc#1107037) CVE-2018-16424 (bsc#1107036) CVE-2018-16425 (bsc#1107035) CVE-2018-16426 (bsc#1107034) CVE-2018-16427 (bsc#1107033) - added patches: opensc-fixed-out-of-bounds-reads.patch opensc-fixed-out-of-bounds-writes.patch opensc-iasecc-fixed-unbound-recursion.patch opensc-added-bounds-checking.patch (fixes security issue caused by opensc-fixed-out-of-bounds-writes.patch) (see upstream commits for more informations)- Update to version 0.18.0: * Further improvements of PIN support. * Large number of improvements and fixes (boo#1097951, boo#1100501). * See /usr/share/doc/packages/opensc/NEWS for complete list. - Add opensc-desktop.patch, opensc-desktop2.patch and opensc-bash-completions.patch.- update to version 0.17.0: * support for new cards * PIN support enhancemets * added .pc file * builds with OpenSSL 1.1.0 (1074799) * See /usr/share/doc/packages/opensc/NEWS for complete list.- Switch to tarball fetching from github - Few small cleanups- Add baselibs.conf to provide 32-bit PKCS11 plugins (bsc#996047). - Drop opensc-ADVISORIES. There is no new advisory since 2009.- update to version 0.16.0 - remove fix (issue 505) - clean up spec-file- update to version 0.15.0 - register with p11-kit (https://www.opensc-project.org/opensc/ticket/390)- update to version 0.14.0/bin/sh 0.19.0-150100.3.19.10.19.0-150100.3.19.10.19.0libopensc.lalibopensc.so.6libopensc.so.6.0.0libsmm-local.lalibsmm-local.solibsmm-local.so.6libsmm-local.so.6.0.0onepin-opensc-pkcs11.laonepin-opensc-pkcs11.soopensc-pkcs11.laopensc-pkcs11.sopkcs11pkcs11-spy.lapkcs11-spy.soonepin-opensc-pkcs11.soopensc-pkcs11.sopkcs11-spy.soopensc-pkcs11.pc/usr/lib//usr/lib/pkcs11//usr/lib/pkgconfig/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:26104/SUSE_SLE-15-SP1_Update/a5c4c3d0cf06d3b9a2855cd45db7da9c-opensc.SUSE_SLE-15-SP1_Updatedrpmxz5x86_64-suse-linuxlibtool library fileELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=60fcfddbf75087e116aacf94386f841f6acab713, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=2906c5f30a19dc5dcbd91f7f6be3a26b90522791, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=88c4128c9919b5f8a29620be32c6a0130a34e23f, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=d5d213d6cc1d495a2d9092a3319a8511cefa6957, strippeddirectoryELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=e691cf65bfab6cdd0936c6c3a67853bafbff6ac2, strippedpkgconfig file,-:;F    PPRRRR RR RRR RRRRR R RRPPR RR RRRR RRPRRRR RR RRRR R RRPRRRR RR RRRR R RRPR RRRR RRRR R RP Rutf-8e0189f0163f58d95bb1f360ea8727de191807b9a394c2e7bf754636199f7558f? 7zXZ !t/ ]"k%N6~4h76Tsxw|w!NAzvy\& 曑mCMٙ,qʁ7%R _w^pV 2ZF#u3$E#i%xMҹR /|dF7Ww8/otg9H4K)>T "c'ҝ8Dž/n!֪Yi:`WY!D[2w,0ciz{_Vz>hߎy8I뺲j&{ӵRD~`6H{ó|Tk~wŷv&k~;H;~Lwn vb,V`b?_zyOZݺ|Uf7JHyX>8 AHQUrG\eY?979Kiqlt?0I k@gu93p<],=2aoN˃"HKۍY"DV1KFq/׳7X!@LJK/aKѹ-RXJ?gbۜJ17VZ. QkF,ZѨz |8| m` OVU1X] YfW3[C20va Q$`&@E~ uy gQܥ~V UkU3kC %-T#dxoIHKR[]*ρ52[>.Tg#!Ɏ:, aLK^B(;V2)ãTCcrdeD{ %jJ¼T[z,ɶflldϋlmw#qLX4_FI5J'&5 &Ͳ*[}mʛ xڛgm_'l/`K7f:-)U͆!1qi!lygE;P4ei7$)uq_%.}E'{h6j+}~'ctBDe-5agDyb𚬻q>+ڲ_ j6;k-/~0 q[R?q UH-a@炇%EG-/KpkJUYE&F`;ZP !пr`[@(QZ^.~Mxt)[SUs7hʝezFФBj#R?MN(2 lӣ~(*ѲmnW\O6Xn@G:ꖹ -zkZ\>PD -3|;L2vH/ [teUi ,bRf YZ