cpio-mt-2.13-150400.3.6.1<>,0`eüp9| Qs]W43$k*Ӽ6:`Yo 3Gia *A'-+!\rRopݫ%^ C8ҏ]?@P&|Vx8w}/@nZ7:X'_$8p-z`lye|J;02rdbמR3 1?APOJB?d   7|  7=DPh t    Tl<(894:>@FGHIX Y\@]X^bcZdefluvw4xLydzCcpio-mt2.13150400.3.6.1Tape drive control utilityThis package includes the 'mt', a local tape drive control program.eüh03-ch2dFSUSE Linux Enterprise 15SUSE LLC GPL-3.0-onlyhttps://www.suse.com/Productivity/Archiving/Backuphttps://www.gnu.org/software/cpio/cpio.htmllinuxx86_64/usr/sbin/update-alternatives --force \ --install /usr/bin/mt mt /usr/bin/gnumt 10 \ --slave /usr/share/man/man1/mt.1.gz mt.1.gz /usr/share/man/man1/gnumt.1.gzif [ ! -f /usr/bin/gnumt ] ; then "/usr/sbin/update-alternatives" --remove mt /usr/bin/gnumt fi>Xeüeüeúeúeùeú68fa585d6ebc972b77c414f8f37a72eedd61a01acaf916a1567469ab278d2b1198d7edb796489b79cb3df4199536ad7ed65fb68cb6024a717351c364e94380fc/etc/alternatives/mt/etc/alternatives/mt.1.gz@@@Brootrootrootrootrootrootrootrootrootrootrootrootcpio-2.13-150400.3.6.1.src.rpmcpio-mtcpio-mt(x86-64)mt@@@@@@@    /bin/sh/bin/shcpiolibc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)update-alternativesupdate-alternatives2.133.0.4-14.6.0-14.0-15.2-14.14.3e@e)aza@a_@_[f_7@^]]m[t[X@XX @XӸV@V'@V'@VVZUT6T|X@danilo.spinella@suse.comdanilo.spinella@suse.comdanilo.spinella@suse.comdanilo.spinella@suse.comdanilo.spinella@suse.comlnussel@suse.dedmueller@suse.comdmueller@suse.comkstreitova@suse.comkstreitova@suse.comlnussel@suse.debwiedemann@suse.commpluskal@suse.comkstreitova@suse.commpluskal@suse.comsvalx@svalx.netkstreitova@suse.commpluskal@suse.comkstreitova@suse.comsvalx@svalx.netkstreitova@suse.comkstreitova@suse.commpluskal@suse.commeissner@suse.comvcizek@suse.com- Fix cpio not working after the fix in bsc#1218571, fixes bsc#1219238 * fix-bsc1219238.patch- Fix CVE-2023-7207, path traversal vulnerability (bsc#1218571) * fix-CVE-2023-7207.patch- Update keyring- Fix regression in last update (bsc#1189465) * fix-CVE-2021-38185_2.patch * fix-CVE-2021-38185_3.patch- Fix CVE-2021-38185 Remote code execution caused by an integer overflow in ds_fgetstr (CVE-2021-38185, bsc#1189206) * fix-CVE-2021-38185.patch- prepare usrmerge (boo#1029961)- add cpio-revert-CVE-2015-1197-fix.patch as recommended by upstream to fix https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00016.html- update to 2.13: * CVE-2015-1197, CVE-2016-2037, CVE-2019-14866 - remove patches (upstream): cpio-2.12-out_of_bounds_write.patch, cpio-2.12-CVE-2019-14866.patch, cpio-2.12-util.c_no_return_in_nonvoid_fnc.patch, cpio-check_for_symlinks.patch- starting with GCC 10, the default of '-fcommon' option will change to '-fno-common'. Because cpio build fails with 'fno-common', add '-fcommon' option to optflags as a temporary workaround for this problem till it's properly fixed [bsc#1160870]- add cpio-2.12-CVE-2019-14866.patch to fix a security issue where cpio does not properly validate the values written in the header of a TAR file through the to_oct() function [bsc#1155199] [CVE-2019-14866]- Do not recommend lang package. The lang package already has a supplements.- Use gettextize --no-changelog to drop build date to make package build reproducible (boo#1047218)- Use URL to fetch keyring - Do not force building with PIE, it is default now anyways - Use https for URLs - Install license- modify cpio-2.12-out_of_bounds_write.patch to fix a regression causing cpio to crash for tar and ustar archive types [bsc#1028410]- Use macro for configure and make install - Use update-alternatives according to current documentation - Enable testsuite- Enable mt building - Separated cpio-mt subpackge - Change recommend to own mt subpackge - Remove cpio-mt.patch - those features available in original mt-st package - Switch to use alternatives system for mt - Disable rmt building: this binary fully identical to rmt from tar - Change default rmt dir to /usr/bin- cleanup with spec-cleaner- Recommend mt_st as it is not hard dependency- fix typos in the description - add 'Require: mt_st' in order not to surprise users by the missing 'mt' binary- Disable mt building: this binary from mt_st package offers advanced capabilities with the same functionality. - Enable rmt building: 'dump' package no longer include it, besides cpio code base for rmt is more fresh. - Reflect those changes in the package description.- add cpio-2.12-out_of_bounds_write.patch to fix an out of bounds write in a way cpio parses certain cpio files [bsc#963448], [CVE-2016-2037]- update to 2.12 * Improved documentation * Manpages are installed by make install * New options for copy-out mode: --ignore-devno, - -renumber-inodes, --device-independent, --reproducible * update * cpio-use_new_ascii_format.patch * cpio-mt.patch * cpio-eof_tape_handling.patch * cpio-pattern-file-sigsegv.patch * cpio-check_for_symlinks.patch * remove (no longer needed) * cpio-stdio.in.patch * 0001-Fix-memory-overrun-on-reading-improperly-created-lin.patch * add * cpio-2.12-util.c_no_return_in_nonvoid_fnc.patch to add missing return to the nonvoid get_inode_and_dev() function - use spec-cleaner- Add gpg signature - Correct info scriplet dependencies - Cleanup spec file with spec-cleaner- build with PIE- fix an OOB write with cpio -i (bnc#907456) (CVE-2014-9112) * added 0001-Fix-memory-overrun-on-reading-improperly-created-lin.patch/bin/sh/bin/shh03-ch2d 17065420122.13-150400.3.6.12.13-150400.3.6.1mtmt.1.gzgnumtmtgnumt.1.gzmt.1.gz/etc/alternatives//usr/bin//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:32275/SUSE_SLE-15-SP4_Update/2737cea406e20f432c7d74db5884cc74-cpio.SUSE_SLE-15-SP4_Updatedrpmxz5x86_64-suse-linuxcannot open `/home/abuild/rpmbuild/BUILDROOT/cpio-2.13-150400.3.6.1.x86_64/etc/alternatives/mt' (No such file or directory)cannot open `/home/abuild/rpmbuild/BUILDROOT/cpio-2.13-150400.3.6.1.x86_64/etc/alternatives/mt.1.gz' (No such file or directory)ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=9dba3c48ec4e778224b124b21a4504637d13dc2e, for GNU/Linux 3.2.0, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RRRR RRRY -E@q~.Cutf-811093f99327f40f932c02a264c69454a10f75bceb1d95d114e58639900269177?7zXZ !t/%#]"k%n K|<"V .]L(TZײpq5 O-bZfr.~ÀwVPW E_ S"HG* RvipGu>3Dk]Kc_X~+vg}Đ50-/5 Uwڻ$~[a~-l+yi2 @[gb-M5{)<-K4ӳu+VÈD?&%= \7[e',ܴ@~$l,ߤtP|@uڥhLEkA;:lDpk ТڬѺ|?K.k hܕr2P=Ht ;ž$:.BJl#_؁M$ˆx#Fj+=~QY&ޣ2wgIF)!,`W7FDFufb &êYa,k2҅~#a0rWҧS;u?dcEQ^;k<`H gŖjl.BOwy: gBشS [k_~vfQ!G3$]P@$3E%Ze| +V\l$Z~/P^üS|&{ ~,%m!x.7ʐ%4ّׄq=mrGIxfη:2OXͪߥժ!o۔1:zTd+(yӒaPg`@" ;c.~>e_CKۧRX-|{Ҕ8[BH18_u.51͠FYD<+ΛUx[*!ol]Q7ǃ ̶⾦@> P3_ER=09J ٌ0spMV58FVfc:)VEt-ߓxY‡6:;$ !A#m< ᷛ? z< # *0OL1 5$&o@`x15L=Ek*`@.l5K8q.2e SЀEinY9)PcԔ*>;0/L`3{uH}+}_Ӎʃ0WI+h+Q#17eq7=2C΄lʮ/;yoX镕;!eF=}' 0?`P0ސUJue68c+m|?ΛI^yeA*t7+V_SmP ;ԕe cM u"NdK8j?"k7P̝Yf hWp0Bl]Ӗ(@`+235C38qk[n'.!>T ˜k|P)]}{'˳7a@d+|Al2n- $Zě ЍT DյGM*˞D1[|eu`َ p,s;qDBP4_ z3iEèMJ|v:q?U}(;@ر|kd?Z=ړB1tgTkdt'X[7~>Ȃ+LZ/g%29xaeB 1@7{Inc^M͔FsyqN-TR>_Y5fsC"etuq~a,~ <(g7-l /; '$_[pD[DoO)1ҷERzUgہk)NEj,$bC<6DF*Qן!3ӆlT2jN\ 20ܚz[F5A4uWqVʭi0zdAnݼbrf;Q`"tuVrˏC:>OyxRvcG#w9Ń JЈ8:Q J: YZ