selinux-policy-sandbox-38.33-3.red80> K KtĉH2!c31^ WggŠhsupport@red-soft.ru  Wgʇx50v&*9ChB:iA mk5RLLrjJKõd_aoŭC%Q(~^ȝz c2;+<z)j?JT, B1|d<~hJ&efvyX_i'Gq[y'@=' Ȕ,󞷯jY:2/pz{ve$>i?Yd ' >x|  *      %*PTl-(j8t 9 :- > ? G H I X Y \ ] ^ b d e f l t u v    Cselinux-policy-sandbox38.333.red80SELinux sandbox policySELinux sandbox policy for use with the sandbox utility.gQstapel80.red-soft.ruUaredosredsoftGPL-2.0-or-laterRED SOFTUnspecifiedhttps://github.com/fedora-selinux/selinux-policylinuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null /usr/sbin/semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then /usr/sbin/semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0UagRd8af19380178fa692cdf5f68f09cc33336342d0bd9b5ea4b68d82cc118850263rootrootselinux-policy-38.33-3.red80.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.4.18-138.33-3.red8038.33-3.red804.18.2g|f@fU@f! @f e@e\e9@e ddgdd@Oleg Sviridov - 38.33-3Oleg Sviridov - 38.33-2Oleg Sviridov - 38.33-1Oleg Sviridov - 38.32-2Oleg Sviridov - 38.32-1Oleg Sviridov - 38.31-1Oleg Sviridov - 38.29-2Alexandr Subbotin - 0:38.29-1Vladislav Mitin - 0:3.14.5-54Anton Fadeev - 0:3.14.5-53Anton Fadeev - 0:3.14.5-52Anton Fadeev - 0:3.14.5-51- Update policy for haproxyd - Dontaudit firewalld dac_raed_search capability - Allow webadm_t use generic ptys - Dontaudit webadm_t read passwd - Allow xdm_t to watch and watch_reads mount_var_run_t- Allow qemu-ga read vm sysctls - Allow svirt_t read vm sysctls - Allow svirt_tcg_t read vm sysctls - Allow svirt_tcg_t map svirt_image_t files- Allow smbd_t to watch user_home_dir_t if samba_enable_home_dirs is on - Allow keyutils-dns-resolver connect to the system log service - dontaudit execmem for modemmanager - Allow alsa get attributes filesystems with extended attributes - Allow xdm_t read unconfined services state- Allow mongodb search nfs dir- update to 38.32 - Fix NM dispatcher script runing with dhcp-client - Dont audit winbind_rpcd_t write urandom - Dont audit winbind_t write urandom- update to 38.31- Allow cifs.upcall open accesses to user_tmp_t- Update to 38.29- add policy for ip-client- Fix RO_0004_allow_systemd_machined_userdbd_runtime_sock_files.patch - Enable daemons_enable_cluster_mode by default- Add watch, watch_sb, watch_mount to access_vector- Allow local_login_t and passwd_t getattr proc/bin/sh/bin/sh38.33-3.red80sandbox.pp/usr/share/selinux/packages/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -U_FORTIFY_SOURCE -Wp,-U_FORTIFY_SOURCE -Wp,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redsoft/redsoft-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redsoft/redsoft-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpiozstd19noarch-redsoft-linux-gnuutf-89d643acf91604166a92a6e55cb4a51498a48dc68dce046e2b2e31cd8419d2b37b6c6c4a23ce9c409ef094c4f7dc39cf23a01aaf28952475154e879e09dccea72? (/htSOOZI0N%86kRdV.7(Eڇ4ɪ\(pYY:*/>iqsk|ڑf_uRO_HtMߣhpLU[+ח0NbēESB`P8{A.k|jo i. /_#7䴷Oh5m N;QVq_։iaxD Źn_vc?>c{k1im/¦k͉yJb=yOO\7Q>}N!<;,i]A5_?^5&lm~5&5A#g#Urö#2qCp~(@VgC2ף;NXe)J!O{/cqo;n=anye$k;xki[ 75`U4SUI$, {al#v+?~ 2_I m6 t*ܽbB2nR~L#[w ~X kO{>Fka?}Cq e#3 JV<ѕvH/#dU93ypY;êwPhYssf3D2v.'-L;v#s{*CBewAC$:?ϫktS|_ކ֎^};+L [N*f改6"!v͑ol:iiegY"ȩ8CoQ$1.SeSr"ÏٵCpӏߵ%\rfb nĵR,ݵU?Ժ֪4a MGk\?;fB#L*GuC֑ԀmN44U&C_IBa!꤂) 'L/&   ܰ Ԑ f8`$Ì(U4ACԘiY AcŢ bj% Td|!(<OgG^!xLmt&I"k BfhYhI<&n)bdC9mf1: G$D$fgF{=e+<ɝ(84yKeG`45/A—b1u:Y}U=^F>fI;#=1́l0!O/['v^S,h @,wʫ;C .GqhRdUfH2<5lxDu wX OC|o{;N{w΋R:h3RRE_7H /||gb{#_&_J*s#vWMR?tKy6 'GUQg,0\HTd<k<.TLL#Qc"J5 Ψf$M-*l-Jlw,{L/3Y0]$>%yQufxA׊)VOMHD4)5W""Wn)~WLTd\#k Ք8ѸfTӲSc'9CPi"a-E&RUڏP )׃<_Ӳ,4RXV?X $!2~V&dƈ2S c*eG!jm\TB8nT%k}!jJi/ bwtf/-dZ|m-YI+M`%2\Z?I%%.@A5l5IrA>K]êU+SY ÚpIҙSYJdRshèf&R0 P^p>aOyGR+G1K)UQcN~*.6+5R6nrQ nR$R1+nZqfGL)vDD&FOD_æG TC$yygkfٕ,)ea5?Q6m I ;䂿E(QMqvH H WU&AlTN-@і]A"N mP*lPK &e\e)zTsHAo2jןpWEg W0$(9psYIY_i;92vUskK_Ԅ}$f &,BmߏqiOÅɁT50'KUc()>;w)]l$LDpn9tHdsy߀n +PO9>"4Gq~B]1Q ~ }[)> >GYN(o2sZG(d!L*ȇGT!(ƛ^ӍxaB 7t;Kyj HIlI} kR\MxZdIHBEl:BUlÞQ[!:j?"Ǜ3$Z Ԟ`9YPlU[C{bz1 =joKŜ15[Ն 8xbRp@X=?$^aR=9/&*Qk[Bx6]Kc8((tzHpF ?+GxS,ʏim^&ߔްN9 }rCQ NN-9NMfmh MxFa܌COd Qh7=P[X~%5C̹_n*^ [>d@G g_WDo_ժ`$/>҈HL#42FPÑ捠(PAER' L'I7d0q׏ojKEuK?56i6=c66j>k?l@mAnBoCpDq8E8r9F9_53c55`4a5b6c7d8e9f:g;hί?ϰ@бAѲBҳCӴDԡ61662£3ä4ĥ5Ŧ6Ƨ7Ǩ8ȩ9ɪ:ʗ5'55()*+,-./0444 !"#$%&9O99PQRSTUVWX8E88FַG׸HعIٺJڻKۼLܽMݾNޯ43?831@2A23B3=cI$m@~JW,2{tt]R3CʢRe/2>tEIN͠*rJ* 0Xl :U$`(=?dс*)j&ӹ([r)VJ6dtdRl+@6Ё-)CBڲMS[XV. E<`< =$ ;(ж;we܍5'^uvtn W5jqu3D`IoУ *X^?hQCGH6~74GhޭuQ})ҕdt9tyVuMw/䰘L;9=\0I(u+cҧS?&d[Y4!@L0k g\)ɂ2GM 1Y4 c'x2N| V4)LOx>qEǎՑd`c>Fi\ǫj ۠9Ly3ۜΡVM_Da"#!*ZD(:KYÄ͘!iH3-|ۛHm5jץǩe]6JIaIbbP®1y-&^w t ceƚ,LyܵfPX3E)+esJl$Uqƿ St#S i$;F ?.0 )DcD@=Yݲl4$Pߪ* ܁E]Ra`;h"#򌑡nx!xQם~ⴀF%}_{B6yTD|4C45D56E67F78G89H952016127238495:6;7<8=9>1+11,1-.34/4505616727838949!0"#$%&'()*7g1h2i3j4k5l6m7n8o9p6]^_`abcdef5STUVWXYZ[\4IJKLMOa}I*!$ h  Tl$_XpWXpWRJF\;ȩUZȪUZȪOіJ,0`,,o*R߆Pł4pgL8P T0j ZVȖn4!D+0I.7ڧոҵJ,IucaD"P6KN שFZqٸlSM3/Pw`#f133gGdzt+&[W !2|njR4sCgY{rǗ;_"-kݎV5E';Nȅ<%S 骰1QWR H(|^^nD!ʅpuhFe00%DO}^Gڍ:Ң$Om!e23D$2 l#` 2BB`Աa `J&PSTT3?fmRP4PK^T9Ŗ,_xM>n EqgtT;ɚxS;"h:CIv:SRC $8WG ;㲱SK 5E]JT5IzD@cr H6i~q %CoP~x1d[JchV͹W /~$ؙ8%L抾_eBsAZGK])Cn Tɟ$@8b0)(¸3 7ߚ\F1(#0nzO`r[DW 0IMh (@#8 ߁ay;KWq"E]3UIC>x4A|:$cBC,یiCE~S'n{z3ɸth3FCK õA~ .& ;>cB26*DAc 8Nة.R OY]%锚M?=}s5J y$Ʊg4ĵ:Q1)O6$"ϤM`r ˜YAHjr.RDQ)UJUx3Pl 0KЍ78j]n :ԜF#NصAl eFCVuSfg%@aSUм9P$^JD lI ULΈ|rVԑIVO1?d $I#=e+F~H$d$GDBH4-fΐqJ lsǖ;wlJ >_+webm]Ɩ0WM**5UjUjԪԇu;̘12!6aOEUFME&,g87?#:MIʔk !!$Il۶m@!;")+eѼgegege;3$YUED4o EsE,>+>+>+>+>+> (˲$ C!X(x8 ` L"}V4, =k b# @b# B3`vt ^Du96C+'O2?t|GOxlaҽ*D?(qoꇪm1=9$%P}~a}z%-Dтzp.pV~3X,mE|Et h'8QpCRCYp$Q|l(AD$:?hxM5%&jJDݵ)2\9O%8`1*+ԈC.lIrl *yB܅=lAeظ t<7R-EAFfF}Ya-kGH Ff(gj9Z\Z;' )"4\uLR$("K ׬(W|"cȲ#h]CAp*6+