tar-rmt-1.30-lp152.4.6.1<>,%`8۸/=„[Ե;hcT:jLa+,*H!E Ӂߺ-bfC|-,r؜,MV0"#TFJ mp҃R'SpMA~ZO%Pl.%y kĻ'H SQ-o׏kOQt`R}XdV$ XJ ◎Ne&/d&Er/6ňuz\`܏reLD"d{ K/?M>B?d   C 6<DXp |   & \t@R(x89:U>@FGHIX$Y0\T]l^bctde flu$v<wXxpyzCtar-rmt1.30lp152.4.6.1Remote tape drive control server by GNUProvides remote access to files and devices for tar, cpio and similar backup utilities`8obs-arm-5ѓopenSUSE Leap 15.2openSUSEGPL-3.0-or-laterhttp://bugs.opensuse.orgProductivity/Archiving/Backuphttps://www.gnu.org/software/tar/linuxarmv7hl/usr/sbin/update-alternatives --force \ --install /usr/bin/rmt rmt /usr/bin/gnurmt 10 \ --slave /usr/share/man/man1/rmt.1.gz rmt.1.gz /usr/share/man/man1/gnurmt.1.gzif [ ! -f /usr/bin/gnurmt ] ; then "/usr/sbin/update-alternatives" --remove rmt /usr/bin/gnurmt fi< W`8`8`-`-`-`-cfe6f9f6d4ec215084e985d9ec25134391e638a16302b2c1a42ff60f78534d4ea4a8cf620c9e39a86cebf256cc8caabdd57f9b744acedf23ff92628f4362efa7/etc/alternatives/rmt/etc/alternatives/rmt.1.gz@@@Brootrootrootrootrootrootrootrootrootrootrootroottar-1.30-lp152.4.6.1.src.rpmrmttar-rmttar-rmt(armv7hl-32)@@@@@@    /bin/sh/bin/shld-linux-armhf.so.3ld-linux-armhf.so.3(GLIBC_2.4)libc.so.6libc.so.6(GLIBC_2.4)libgcc_s.so.1libgcc_s.so.1(GCC_3.5)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)update-alternativesupdate-alternatives3.0.4-14.6.0-14.0-15.2-14.14.1`@`OL@\ZZlZN@Z7XX9@XXӸXRX!@WI@V@U+Tء@T@TmWolfgang Frisch pgajdos@suse.comKristýna Streitová kstreitova@suse.comkukuk@suse.dekstreitova@suse.comavindra@opensuse.orgkstreitova@suse.comsvalx@svalx.netsvalx@svalx.netkstreitova@suse.comvcizek@suse.comkstreitova@suse.comastieger@suse.comsvalx@svalx.netvcizek@suse.comvcizek@suse.commeissner@suse.comandreas.stieger@gmx.de- Link /var/lib/tests/tar/bin/genfile as Position-Independent Executable (bsc#1184124). + tar-PIE.patch- security update - added patches fix CVE-2021-20193 [bsc#1181131], Memory leak in read_header() in list.c + tar-CVE-2021-20193.patch- add tar-1.30-CVE-2018-20482.patch to fix a security issue where tar when "--sparse" option is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process [bsc#1120610] [CVE-2018-20482] - add tar-1.30-CVE-2019-9923.patch to fix a security issue where pax_decode_header in sparse.c in tar had a NULL pointer dereference when parsing certain archives that have malformed extended headers [bsc#1130496] [CVE-2019-9923]- add tar-1.30-tests_dirrem_race.patch to fix race in dirrem01 and dirrem02 tests that were passing/failing randomly because of that - run spec-cleaner - renumber patches- Use %license instead of %doc [bsc#1082318]- add tar-1.30-tests-difflink.patch to fix difflink.at test (https://www.mail-archive.com/bug-tar@gnu.org/msg05440.html)- GNU tar 1.30: * Member names containing '..' components are now skipped when extracting. * Report erroneous use of position-sensitive options. * --numeric-owner now affects private headers too. * Fixed the --delay-directory-restore option * The --warnings=failed-read option * The --warnings=none option now suppresses all warnings * Fix reporting of hardlink mismatches during compare - cleanup with spec-cleaner - switch all urls to https - drop upstreamed patches * add-return-values-to-backup-scripts.patch * tar-1.29-extract_pathname_bypass.patch - rebase add_readme-tests.patch- remove tar-1.26-remove_O_NONBLOCK.patch as this issue was fixed in tar 1.27 (commit 03858cf583ce299b836d8a848967ce290a6bf303)- Use update-alternatives according to current documentation- Disable tar-1.26-remove_O_NONBLOCK.patch - this issue has been fixed in tar-1.27 - backup-scripts subpackage change to noarch - Change rpm group of tar-tests to Development/Tools/Other - Enable rmt building, change package description - Switch rmt to alternatives system - Separate rmt subpackage - it can be used by different archiving tools as a dedicated program - Change rmt path to /usr/bin folder - it can be used by non privileged users for backup purposes. Security is controlled by access rights to the targets and remote shell. - Separate doc subpackage - Remove conditions for old SUSE builds and lang subpackage - Rename restore script to restore.sh for avoiding file conflicts with dump/restore- move binaries from /bin to /usr/bin [bsc#1029977] * refresh tar-backup-spec-fix-paths.patch to change path of the tar binary from TAR=/bin/tar to TAR=/usr/bin/tar - use spec-cleaner- update tar-1.29-extract_pathname_bypass.patch to the upstream one that fixes POINTYFEATHER issue but it doesn't limit append or create operations as the initial patch did [bsc#1012633] [CVE-2016-6321]- add tar-1.29-extract_pathname_bypass.patch to fix POINTYFEATHER vulnerability - GNU tar archiver can be tricked into extracting files and directories in the given destination, regardless of the path name(s) specified on the command line [bsc#1007188] [CVE-2016-6321]- GNU tar 1.29: * New options: --verbatim-files-from, --no-verbatim-files-from * --null option reads file names verbatim * New options: --owner-map=FILE and --group-map=FILE * New option --clamp-mtime * Deprecated --preserve option removed * Sparse file detection - now uses SEEK_DATA/SEEK_HOLE on systems that support it. This allows for considerable speed-up in sparse-file detection. New option --hole-detection for algorithm selection.- Add add-return-values-to-backup-scripts.patch- Revert tar-recursive--files-from.patch because it causes regression (bnc#918487, bnc#919233)- extract files recursively with --files-from (bnc#913058) * added tar-recursive--files-from.patch - call autoreconf in %prep- build with PIE- compile in ACLs, Xattr and selinux support [boo#906413]/bin/sh/bin/shobs-arm-5 16249796751.30-lp152.4.6.11.30-lp152.4.6.1rmtrmt.1.gzgnurmtrmtgnurmt.1.gzrmt.1.gz/etc/alternatives//usr/bin//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:16631/openSUSE_Leap_15.2_Update_ports/2f64add3726c03ba8bfa1423e2d452dd-tar.openSUSE_Leap_15.2_Updatedrpmxz5armv7hl-suse-linuxcannot open `/home/abuild/rpmbuild/BUILDROOT/tar-1.30-lp152.4.6.1.arm/etc/alternatives/rmt' (No such file or directory)cannot open `/home/abuild/rpmbuild/BUILDROOT/tar-1.30-lp152.4.6.1.arm/etc/alternatives/rmt.1.gz' (No such file or directory)ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-armhf.so.3, BuildID[sha1]=94e96e6a997508cc505666642598f7f7aa7254e9, for GNU/Linux 3.2.0, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RRRRRRs@)utf-84c1fd754744c4e7208299ad25125e72158f964820e9b379f98bfd77c60d1e6c7?7zXZ !t/I]"k%n|.D 8SBOyt鄠N+SݞKqkk]hP|D/Ϩ}]b"æҖaU;AT?;I{nEYvwjӅ"HQ/Bc٦C㫷@ 2E Μ4__%PyKG̝,P\%޳BTH&KJgT)Fifzq89KocLZVa'11i(ukAL\7v}U$jh@^N,alL; {{%Ņ M FM;f.@6LK4Ű@7FX4<$)M1Ivi"d5g?o+TVۘIJ |6/^JJq$h[ g"Pxɣ{{y'aqyT)"Q^b:4;NrH iLܒa h?H${!FDEv:UWo^u< HZVMioR>XH82\3PgϊTb3N(|~4`oc겵Qc.(Ķ̃_>F#'׊{f,ꔟTem Mwm9! ,IXJ^$`U @DM矋>ŸmOrx T񫟴OHO_jtTA![2ɭU"uymY>},t[\r/ gǮxg.jy58ڵvyR)KO=wb6DW!Ox+\A>!B3cwNXX '!ț}^CxWb~0iXٔow[tq"uW8'nfwQO?+փ/3aϱ#Ŋ7.Y߶ YZ