tar-backup-scripts-1.30-lp152.4.6.1<>,(`,ڸ/=„58)rRHAyMk>!Nק9jJ EӃ)N̪]#ȧ}׹;Y ܕV˅af .O|?yC[Yoo@1U@dR ك!pn5 l7D/tqZz?ns[+l4>12fϸT"q8&2[CAyF:D~u1{\!Znt 7N &U -H֚^cppn׏}xn<Q>>?d & 5`dpt   , 8 P  (Xt(1889: FGHIXY\]^Lbtcdefluvw<xTylz|Ctar-backup-scripts1.30lp152.4.6.1Backup scriptsShell scripts for system backup/restore`,obs-arm-7ropenSUSE Leap 15.2openSUSEGPL-3.0-or-laterhttp://bugs.opensuse.orgProductivity/Archiving/Backuphttps://www.gnu.org/software/tar/linuxnoarch &~A큤`+`+`+`+`+`+c8e8ca28074462b66966232bcad647aa5ab14b27a852e6d781b520337053a2bd73bfa053abfb8a64afdf54ec0156b6a1c244112cfd53b7715303898de51ac8ed02fff6ece58c765d312d12191e6bb6e822113cf1b6dda157cebfe10a89d68cf56989389cb9c695982090a7a80e041c488b4e0967a9d071d09866eda0546569917b388abcabe717f599b38927d11d277b637b3a68a6fb35e128f68051fd8dc691rootrootrootrootrootrootrootrootrootrootrootroottar-1.30-lp152.4.6.1.src.rpmconfig(tar-backup-scripts)tar-backup-scripts@    /bin/shconfig(tar-backup-scripts)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)tar1.30-lp152.4.6.13.0.4-14.6.0-14.0-15.2-11.304.14.1`@`OL@\ZZlZN@Z7XX9@XXӸXRX!@WI@V@U+Tء@T@TmWolfgang Frisch pgajdos@suse.comKristýna Streitová kstreitova@suse.comkukuk@suse.dekstreitova@suse.comavindra@opensuse.orgkstreitova@suse.comsvalx@svalx.netsvalx@svalx.netkstreitova@suse.comvcizek@suse.comkstreitova@suse.comastieger@suse.comsvalx@svalx.netvcizek@suse.comvcizek@suse.commeissner@suse.comandreas.stieger@gmx.de- Link /var/lib/tests/tar/bin/genfile as Position-Independent Executable (bsc#1184124). + tar-PIE.patch- security update - added patches fix CVE-2021-20193 [bsc#1181131], Memory leak in read_header() in list.c + tar-CVE-2021-20193.patch- add tar-1.30-CVE-2018-20482.patch to fix a security issue where tar when "--sparse" option is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process [bsc#1120610] [CVE-2018-20482] - add tar-1.30-CVE-2019-9923.patch to fix a security issue where pax_decode_header in sparse.c in tar had a NULL pointer dereference when parsing certain archives that have malformed extended headers [bsc#1130496] [CVE-2019-9923]- add tar-1.30-tests_dirrem_race.patch to fix race in dirrem01 and dirrem02 tests that were passing/failing randomly because of that - run spec-cleaner - renumber patches- Use %license instead of %doc [bsc#1082318]- add tar-1.30-tests-difflink.patch to fix difflink.at test (https://www.mail-archive.com/bug-tar@gnu.org/msg05440.html)- GNU tar 1.30: * Member names containing '..' components are now skipped when extracting. * Report erroneous use of position-sensitive options. * --numeric-owner now affects private headers too. * Fixed the --delay-directory-restore option * The --warnings=failed-read option * The --warnings=none option now suppresses all warnings * Fix reporting of hardlink mismatches during compare - cleanup with spec-cleaner - switch all urls to https - drop upstreamed patches * add-return-values-to-backup-scripts.patch * tar-1.29-extract_pathname_bypass.patch - rebase add_readme-tests.patch- remove tar-1.26-remove_O_NONBLOCK.patch as this issue was fixed in tar 1.27 (commit 03858cf583ce299b836d8a848967ce290a6bf303)- Use update-alternatives according to current documentation- Disable tar-1.26-remove_O_NONBLOCK.patch - this issue has been fixed in tar-1.27 - backup-scripts subpackage change to noarch - Change rpm group of tar-tests to Development/Tools/Other - Enable rmt building, change package description - Switch rmt to alternatives system - Separate rmt subpackage - it can be used by different archiving tools as a dedicated program - Change rmt path to /usr/bin folder - it can be used by non privileged users for backup purposes. Security is controlled by access rights to the targets and remote shell. - Separate doc subpackage - Remove conditions for old SUSE builds and lang subpackage - Rename restore script to restore.sh for avoiding file conflicts with dump/restore- move binaries from /bin to /usr/bin [bsc#1029977] * refresh tar-backup-spec-fix-paths.patch to change path of the tar binary from TAR=/bin/tar to TAR=/usr/bin/tar - use spec-cleaner- update tar-1.29-extract_pathname_bypass.patch to the upstream one that fixes POINTYFEATHER issue but it doesn't limit append or create operations as the initial patch did [bsc#1012633] [CVE-2016-6321]- add tar-1.29-extract_pathname_bypass.patch to fix POINTYFEATHER vulnerability - GNU tar archiver can be tricked into extracting files and directories in the given destination, regardless of the path name(s) specified on the command line [bsc#1007188] [CVE-2016-6321]- GNU tar 1.29: * New options: --verbatim-files-from, --no-verbatim-files-from * --null option reads file names verbatim * New options: --owner-map=FILE and --group-map=FILE * New option --clamp-mtime * Deprecated --preserve option removed * Sparse file detection - now uses SEEK_DATA/SEEK_HOLE on systems that support it. This allows for considerable speed-up in sparse-file detection. New option --hole-detection for algorithm selection.- Add add-return-values-to-backup-scripts.patch- Revert tar-recursive--files-from.patch because it causes regression (bnc#918487, bnc#919233)- extract files recursively with --files-from (bnc#913058) * added tar-recursive--files-from.patch - call autoreconf in %prep- build with PIE- compile in ACLs, Xattr and selinux support [boo#906413]obs-arm-7 16249766021.30-lp152.4.6.11.30-lp152.4.6.1backupbackup-specsbackup.shdump-remindbackuprestore.sh/etc//etc/backup//usr/lib//usr/sbin/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:16631/openSUSE_Leap_15.2_Update_ports/2f64add3726c03ba8bfa1423e2d452dd-tar.openSUSE_Leap_15.2_Updatedrpmxz5aarch64-suse-linuxdirectoryawk or perl script, ASCII textPOSIX shell script, ASCII text executableRRRR Fvq\gutf-84ba00eac0180332fbed1b905c83c3dd803771eafa87eb20088dffc515cb47fdf? 7zXZ !t/$3 d]"k%j @kޏ.PxUٽtnyPOv(Ia}xb $q@Ŀ:bg) r5|9ϔx]<ˍ # Jzx[[P?Dsdc{$l iS7(O=p{>e<@kF 箽P1xi8i_:RqHVȿо"W4uY7."x|IG:2 !>%]"3hk`oyƯΉy52$<Ӈ=:ݿQK@4P:=QqKir.6`BȊaPcw+#vf ,إA~П봕܅&+ i Ȱ0.qP JTk`RuC$;ѱ(li8LYV ov$mEfdWWGP\pȰAӒ,)*-qR NY/;Z+E0RN84[碇!F7esdzgP d4>qY)c @>Ȕ ]}Q[-7Mg;M~ɰjc$>Z6F5[`O[֋{K)::BQLp#6W)b}~*-ZşBTK0wpEPImU3#0##5uI)]XRѪͻe>t[ xh]=.[t!xkVq@Am,W^WrDM^ղuuF@mJP8ǒM0l`:KV9Mh0tƚK!wg9lHt_e[jU٣Gj颖ĪɒPKŤ!qjaD+Zâ5T;n 0!zk!BG&mK&@.׼m 3b_]=V(6r1ocMkW}P:~ŝcקd"ӛ4NoHZxCjI#8 䴮*<@1VA4n Eu/#j9ɠG\H*D>w![ܘj{ie Gp ըΖN`Caa !w9z 7G"8-]mzӸ/ʰ(0ɳROߝ1ߚ~=(ՆƏ)=7[ oP:f%h"b,Պ gW}GwSfr[fX-q*>3w(I>Βƀ|7FXwL$O#b8larC|D|[WO z(r-0 R:);].ʼDbMɓD_aaQ {9Q dr<>"]Wn> s8S2 GaD_Uv/g׳RA+'pmQRHBF1]"֪`ڱd"cpdP@sVH* 8rlQc02;x+[bCe!R*;N\xl3S3yx~# x3UnB"qi%s9i_8+Eu+"NqCB ĶMHTr9ϰ2w=3XٌB^`-yYF#k7ɷIEBY׺^=CXaW>B(tMQ-f. :$u_PEl_Mt3ҮvlHFSd3I?rF8*myJO}j (xmVw°M*d)~H(P3̐U)(^{ XP v@pȈbP# X]N m&-\`{C3K=EzFkz '[޾:og0&$ʐnblyܙ*bbH]-l-4u@h<5d0f:{h9/ :tC֡-=zw-Gt— V1;ÿ8@c|! |9%tfӳ*dhTg!|թ(r(͹4/'_5`+==#PH?tȰ_,"F/U<>7d?fmvu0)8O}4 z9ʬ7 %F88lMs٘XFrqbF|Gdr~َ 56GT773ezeTuuqfr m'&5 63[?L6U :|ګO[;$Ô]ƕhNN^fDƓ U\nTW;֏J/dH]v YZ