cpio-mt-2.13-150400.3.6.1<>,&ep9|#6w?VBwU4c#Ae#Cc,m 9Q=s&œ-8`(CdM*R(!7lg@UYNr1R.{sJ_1c/ 4­Kױ"-qʜ`١떇7gKqbD0FSY$V0?@%3I/\δn<Ӵ^긝6&kf˼%4g>(.ɝd]qyhɵm>BL?<d   7| ;AITl x   " Xp ,  (#8,9:{> @FG4HLIdXlYx\]^bcd9e>fAlCuXvpwxyz8Ccpio-mt2.13150400.3.6.1Tape drive control utilityThis package includes the 'mt', a local tape drive control program.eibs-power9-11SUSE Linux Enterprise 15SUSE LLC GPL-3.0-onlyhttps://www.suse.com/Productivity/Archiving/Backuphttps://www.gnu.org/software/cpio/cpio.htmllinuxppc64le/usr/sbin/update-alternatives --force \ --install /usr/bin/mt mt /usr/bin/gnumt 10 \ --slave /usr/share/man/man1/mt.1.gz mt.1.gz /usr/share/man/man1/gnumt.1.gzif [ ! -f /usr/bin/gnumt ] ; then "/usr/sbin/update-alternatives" --remove mt /usr/bin/gnumt fi eeeeee9d5245981eb69b29295caddfcd632911c56461056c362519dda73b40c7fa75e198d7edb796489b79cb3df4199536ad7ed65fb68cb6024a717351c364e94380fc/etc/alternatives/mt/etc/alternatives/mt.1.gz@@@Brootrootrootrootrootrootrootrootrootrootrootrootcpio-2.13-150400.3.6.1.src.rpmcpio-mtcpio-mt(ppc-64)mt@@    /bin/sh/bin/shcpiolibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)update-alternativesupdate-alternatives2.133.0.4-14.6.0-14.0-15.2-14.14.3e@e)aza@a_@_[f_7@^]]m[t[X@XX @XӸV@V'@V'@VVZUT6T|X@danilo.spinella@suse.comdanilo.spinella@suse.comdanilo.spinella@suse.comdanilo.spinella@suse.comdanilo.spinella@suse.comlnussel@suse.dedmueller@suse.comdmueller@suse.comkstreitova@suse.comkstreitova@suse.comlnussel@suse.debwiedemann@suse.commpluskal@suse.comkstreitova@suse.commpluskal@suse.comsvalx@svalx.netkstreitova@suse.commpluskal@suse.comkstreitova@suse.comsvalx@svalx.netkstreitova@suse.comkstreitova@suse.commpluskal@suse.commeissner@suse.comvcizek@suse.com- Fix cpio not working after the fix in bsc#1218571, fixes bsc#1219238 * fix-bsc1219238.patch- Fix CVE-2023-7207, path traversal vulnerability (bsc#1218571) * fix-CVE-2023-7207.patch- Update keyring- Fix regression in last update (bsc#1189465) * fix-CVE-2021-38185_2.patch * fix-CVE-2021-38185_3.patch- Fix CVE-2021-38185 Remote code execution caused by an integer overflow in ds_fgetstr (CVE-2021-38185, bsc#1189206) * fix-CVE-2021-38185.patch- prepare usrmerge (boo#1029961)- add cpio-revert-CVE-2015-1197-fix.patch as recommended by upstream to fix https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00016.html- update to 2.13: * CVE-2015-1197, CVE-2016-2037, CVE-2019-14866 - remove patches (upstream): cpio-2.12-out_of_bounds_write.patch, cpio-2.12-CVE-2019-14866.patch, cpio-2.12-util.c_no_return_in_nonvoid_fnc.patch, cpio-check_for_symlinks.patch- starting with GCC 10, the default of '-fcommon' option will change to '-fno-common'. Because cpio build fails with 'fno-common', add '-fcommon' option to optflags as a temporary workaround for this problem till it's properly fixed [bsc#1160870]- add cpio-2.12-CVE-2019-14866.patch to fix a security issue where cpio does not properly validate the values written in the header of a TAR file through the to_oct() function [bsc#1155199] [CVE-2019-14866]- Do not recommend lang package. The lang package already has a supplements.- Use gettextize --no-changelog to drop build date to make package build reproducible (boo#1047218)- Use URL to fetch keyring - Do not force building with PIE, it is default now anyways - Use https for URLs - Install license- modify cpio-2.12-out_of_bounds_write.patch to fix a regression causing cpio to crash for tar and ustar archive types [bsc#1028410]- Use macro for configure and make install - Use update-alternatives according to current documentation - Enable testsuite- Enable mt building - Separated cpio-mt subpackge - Change recommend to own mt subpackge - Remove cpio-mt.patch - those features available in original mt-st package - Switch to use alternatives system for mt - Disable rmt building: this binary fully identical to rmt from tar - Change default rmt dir to /usr/bin- cleanup with spec-cleaner- Recommend mt_st as it is not hard dependency- fix typos in the description - add 'Require: mt_st' in order not to surprise users by the missing 'mt' binary- Disable mt building: this binary from mt_st package offers advanced capabilities with the same functionality. - Enable rmt building: 'dump' package no longer include it, besides cpio code base for rmt is more fresh. - Reflect those changes in the package description.- add cpio-2.12-out_of_bounds_write.patch to fix an out of bounds write in a way cpio parses certain cpio files [bsc#963448], [CVE-2016-2037]- update to 2.12 * Improved documentation * Manpages are installed by make install * New options for copy-out mode: --ignore-devno, - -renumber-inodes, --device-independent, --reproducible * update * cpio-use_new_ascii_format.patch * cpio-mt.patch * cpio-eof_tape_handling.patch * cpio-pattern-file-sigsegv.patch * cpio-check_for_symlinks.patch * remove (no longer needed) * cpio-stdio.in.patch * 0001-Fix-memory-overrun-on-reading-improperly-created-lin.patch * add * cpio-2.12-util.c_no_return_in_nonvoid_fnc.patch to add missing return to the nonvoid get_inode_and_dev() function - use spec-cleaner- Add gpg signature - Correct info scriplet dependencies - Cleanup spec file with spec-cleaner- build with PIE- fix an OOB write with cpio -i (bnc#907456) (CVE-2014-9112) * added 0001-Fix-memory-overrun-on-reading-improperly-created-lin.patch/bin/sh/bin/shibs-power9-11 17065420672.13-150400.3.6.12.13-150400.3.6.1mtmt.1.gzgnumtmtgnumt.1.gzmt.1.gz/etc/alternatives//usr/bin//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:32275/SUSE_SLE-15-SP4_Update/2737cea406e20f432c7d74db5884cc74-cpio.SUSE_SLE-15-SP4_Updatedrpmxz5ppc64le-suse-linuxcannot open `/home/abuild/rpmbuild/BUILDROOT/cpio-2.13-150400.3.6.1.ppc64le/etc/alternatives/mt' (No such file or directory)cannot open `/home/abuild/rpmbuild/BUILDROOT/cpio-2.13-150400.3.6.1.ppc64le/etc/alternatives/mt.1.gz' (No such file or directory)ELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=ecdfbdd07f52aa771fd205b12e1d49f9d5d08a9a, for GNU/Linux 3.10.0, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RR!B+]D%kutf-829ee208f0d23c5b45307cdbec32adb3de8b1c4b553712c6da6572a4458610b86?7zXZ !t/]"k%n K|<"V .]L(Ta!FWgm{T@u9zZHr.7Um *}Rʐ]*x$dB3Qfý̓Zا{ZOa̕إh{YR%.H$hb0bK(2Th nET O+Գͻ11ekL+f"]<ߎu3j݅<02YxޡN3 tx )tC*nCܭ&,Ns+$\* 4/N=lGm=jRsjy5r?䙥qZ`E kB5^^6DfQn7vxA[)nDq g 4=&Ӕ-ۂ^bn5;װ c5ëC- 0(x6B+Infy& 4||ӧsEH*fh1@W*soZ/6CUK#\ \OԘN1ko\R[2C1Gg[ 9SY>) \H^AodUiKe$E4'< 4y*8j&+M}.s[ dŽ+:I*+U$r,l/ˈuYOxSrc3'@n7@ $Aw@܍S>3z 2ⲔSʒ=ɑR:uH]gbZVw!1+{;yrC>!db@PpT=/"s YZ