bsdtar-3.7.2-150600.3.3.1<>,L<fkp9|`@oSoxs 4|כ[|J4 Zkf>?D??4d   X  <BL p           0 ]  %% n%( 8 ,9 h,: ,F6YG6p H6 I6 X6Y6\6 ]7 ^7b7c8_d8e8f8l8u9 v9$w= x=4 y=X_z>>>>?0Cbsdtar3.7.2150600.3.3.1Utility to read several different streaming archive formatsThis package contains the bsdtar cmdline utility.fkh01-ch2dpSUSE Linux Enterprise 15SUSE LLC BSD-2-Clausehttps://www.suse.com/Productivity/Archiving/Compressionhttps://www.libarchive.org/linuxx86_64  I'//# n큤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-3.7.2-150600.3.3.1.src.rpmbsdtarbsdtar(x86-64)@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@    libacl.so.1()(64bit)libacl.so.1(ACL_1.0)(64bit)libarchive13libbz2.so.1()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.2)(64bit)libc.so.6(GLIBC_2.3.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.34)(64bit)libc.so.6(GLIBC_2.36)(64bit)libc.so.6(GLIBC_2.38)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.6)(64bit)libc.so.6(GLIBC_2.7)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)liblz4.so.1()(64bit)liblzma.so.5()(64bit)liblzma.so.5(XZ_5.0)(64bit)liblzma.so.5(XZ_5.2)(64bit)libxml2.so.2()(64bit)libxml2.so.2(LIBXML2_2.4.30)(64bit)libxml2.so.2(LIBXML2_2.5.0)(64bit)libxml2.so.2(LIBXML2_2.5.2)(64bit)libxml2.so.2(LIBXML2_2.6.0)(64bit)libxml2.so.2(LIBXML2_2.6.5)(64bit)libz.so.1()(64bit)libzstd.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.7.23.0.4-14.6.0-14.0-15.2-14.14.3fiee@dgc@c|bP#bN@bs@b!aaaqV@a=_@_0@_V ^^K^C^ ^ ]]Y=] u@]:\Yz\-@[[Y4X9@XAb@XW\@WgWbW0{W,@UN@UUt@TE@Ta@antonio.teixeira@suse.comdmueller@suse.comdmueller@suse.combwiedemann@suse.comdmueller@suse.comdanilo.spinella@suse.comdmueller@suse.comdanilo.spinella@suse.comrpm@fthiessen.dedanilo.spinella@suse.comadrian@suse.deandreas.stieger@gmx.dedanilo.spinella@suse.comdanilo.spinella@suse.comdmueller@suse.comidonmez@suse.comandreas.stieger@gmx.deidonmez@suse.comidonmez@suse.comidonmez@suse.comidonmez@suse.comidonmez@suse.comadrian@suse.deidonmez@suse.comidonmez@suse.comidonmez@suse.comadrian@suse.dekbabioch@suse.dejengelh@inai.deadrian@suse.deadrian@suse.deadrian@suse.deadrian@suse.comadrian@suse.comdmueller@suse.comadrian@suse.deadrian@suse.deadrian@suse.denormand@linux.vnet.ibm.comastieger@suse.comastieger@suse.comastieger@suse.comadrian@suse.comjsegitz@novell.com- Fix CVE-2024-20696, heap based out-of-bounds write (CVE-2024-20696, bsc#1225971) * CVE-2024-20696.patch - Fix CVE-2024-20697, Out of bounds Remote Code Execution Vulnerability (CVE-2024-20697, bsc#1225972) * CVE-2024-20697.patch- skip write tests on 32bit, they OOM- update to 3.7.2: * Multiple vulnerabilities have been fixed in the PAX writer * bsdunzip(1) now correctly handles arguments following an - x after the zipfile * zstd filter now supports the "long" write option * SEGV and stack buffer overflow in verbose mode of cpio * bsdunzip updated to match latest upstream code * miscellaneous functional bugfixes- update to 3.7.0 * bsdunzip port from FreeBSD * fix 2 year 2038 issues- update to 3.6.2 (bsc#1205629, CVE-2022-36227) * NULL pointer dereference vulnerability in archive_write.c * include ZSTD in Windows builds (#1688) * SSL fixes on Windows (#1714, #1723, #1724) * rar5 reader: fix possible garbled output with bsdtar -O (#1745) * mtree reader: support reading mtree files with tabs (#1783) * various small fixes for issues found by CodeQL - Drop upstream merged CVE-2022-36227.patch- Fix CVE-2022-36227, Handle a calloc returning NULL (CVE-2022-36227, bsc#1205629) * CVE-2022-36227.patch- update to 3.6.1: * 7zip reader: fix PPMD read beyond boundary (#1671) * ZIP reader: fix possible out of bounds read (OSS-Fuzz 38766 #1672) * ISO reader: fix possible heap buffer overflow in read_children() (OSS-Fuzz 38764, #1685) * RARv4 redaer: fix multiple issues in RARv4 filter code (introduced in libarchive 3.6.0) * fix heap use after free in archive_read_format_rar_read_data() (OSS-Fuzz 44547, 52efa50) * fix null dereference in read_data_compressed() (OSS-Fuzz 44843, 1271f77) * fix heap user after free in run_filters() (OSS-Fuzz 46279, #1715) - Drop upstream merged fix-CVE-2022-26280.patch- Fix CVE-2022-26280 out-of-bounds read via the component zipx_lzma_alone_init (CVE-2022-26280, bsc#1197634) * fix-CVE-2022-26280.patch- Update to 3.6.0 * Fix use-after-free bug (CVE-2021-36976) * tar: new option "--no-read-sparse" * tar: threads support for zstd * RAR reader: filter support * RAR5 reader: self-extracting archive support * ZIP reader: zstd decompression support * tar: respect "--ignore-zeros" in c, r and u modes * reduced size of application binaries * internal code optimizations - Drop upstream merged: * fix-following-symlinks.patch * fix-CVE-2021-36976.patch- Fix CVE-2021-36976 use-after-free in copy_string (CVE-2021-36976, bsc#1188572) * fix-CVE-2021-36976.patch - The following issues have already been fixed in this package but weren't previously mentioned in the changes file: CVE-2017-5601, bsc#1022528, bsc#1189528- fix permission settings on following symlinks (fix-following-symlinks.patch) this fixes also wrong permissions of /var/tmp in factory systems CVE-2021-31566- update to 3.5.2: * CPIO: Support for PWB and v7 binary cpio formats * ZIP reader: Support of deflate algorithm in symbolic link decompression * security: fix handling of symbolic link ACLs on Linux (boo#1192425) * security: never follow symlinks when setting file flags on Linux (boo#1192426) * security: do not follow symlinks when processing the fixup list (boo#1192427) * fix extraction of hardlinks to symlinks * 7zip reader and writer fixes * RAR reader fixes * ZIP reader: fix excessive read for padded zip * CAB reader: fix double free * handle short writes from archive_write_callback - Drop upstream mereged: * CVE-2021-23177.patch * CVE-2021-31566.patch * bsc1192427.patch- Fix CVE-2021-31566, modifies file flags of symlink target (CVE-2021-31566, bsc#1192426.patch) CVE-2021-31566.patch - Fix bsc#1192427, processing fixup entries may follow symbolic links bsc1192427.patch- Fix CVE-2021-23177, extracting a symlink with ACLs modifies ACLs of target (CVE-2021-23177, bsc#1192425) * CVE-2021-23177.patch- update to 3.5.1: * various compilation fixes (#1461, #1462, #1463, #1464) * fixed undefined behavior in a function in warc reader (#1465)- Update to version 3.5.0 New features: * mtree digest reader support (#1347) * completed support for UTF-8 encoding conversion (#1389) * minor API enhancements (#1258, #1405) * support for system extended attributes (#1409) * support for decompression of symbolic links in zipx archives (#1435) Important bugfixes * fixed extraction of archives with hard links pointing to itself (#1381) * cpio fixes (#1387, #1388) * fixed uninitialized size in rar5_read_data (#1408) * fixed memory leaks in error case of archive_write_open() functions (#1456) - Drop libarchive-3.4.3-fix_test_write_disk_secure.patch, fixed upstream.- fix build with binutils submitted to Factory, adding upstream libarchive-3.4.3-fix_test_write_disk_secure.patch- Update to version 3.4.3 * support for pzstd compressed files (#1357) * support for RHT.security.selinux tar extended attribute (#1348) * various zstd fixes and improvements (#1342 #1352 #1359) * child process handling fixes (#1372)- Switch back to cmake build now that cmake-mini exists, this will no longer create a build-cycle.- Update to version 3.4.2 New features: * support for atomic file extraction (bsdtar -x --safe-writes) (#1289) * support for mbed TLS (PolarSSL) (#1301) Important bugfixes: * security fixes in RAR5 reader (#1280 #1326) * compression buffer fix in XAR writer (#1317) * fix uname and gname longer than 32 characters in PAX writer (#1319) * fix segfault when archiving hard links in ISO9660 and XAR writers (#1325) * fix support for extracting 7z archive entries with Delta filter (#987)- Revert back to autoconf, cmake introduces a cycle. Leave cmake patches in since they are basically correct and might be useful in the future.- Update to version 3.4.1 New features: * Unicode filename support for reading lha/lzh archives * New pax write option "xattrhdr" Important bugfixes: * security fixes in wide string processing (#1276 #1298) * security fixes in RAR5 reader (#1212 #1217 #1296) CVE-2019-19221 * security fixes and optimizations to write filter logic (#351) * security fix related to use of readlink(2) (1dae5a5) * sparse file handling fixes (#1218 #1260) - Drop CVE-2019-19221.patch and fix-zstd-test.patch, fixed upstream- fix bsc#1157569 CVE-2019-19221.patch out-of-bounds read in libarchive- Switch to cmake build - Add lib-suffix.patch to honor LIB_SUFFIX - Add fix-zstd-test.patch to fix zstd test - Add fix-soversion.patch to fix the soversion to 13 as autotools- Add lz4 and zstd support - Add BuildRequires on liblz4-devel and libzstd-devel- Update to version 3.4.0 * Support for file and directory symlinks on Windows * Read support for RAR 5.0 archives * Read support for ZIPX archives with xz, lzma, ppmd8 and bzip2 compression * Support for non-recursive list and extract * New tar option: --exclude-vcs * Improved file attribute support on Linux and file flags support on FreeBSD * Fix reading Android APK archives (#1055 ) * Fix problems related to unreadable directories (#1167) * A two-digit number of OSS-Fuzz issues was resolved in this release including CVE-2019-18408 - Add libarchive.keyring and validate the tarball signature - Drop all security patches, fixed upstream: * CVE-2018-1000877.patch * CVE-2018-1000878.patch * CVE-2018-1000879.patch * CVE-2018-1000880.patch * CVE-2019-1000019.patch * CVE-2019-1000020.patch- Added patches: * CVE-2019-1000019.patch Fixes 7zip crash (boo#1124341) * CVE-2019-1000020.patch ISO9660 infinite loop fixed (boo#1124342)- Added patches: * CVE-2018-1000877.patch, which fixes a double free vulnerability in RAR decoder (CVE-2018-1000877 bsc#1120653) * CVE-2018-1000878.patch, which fixes a Use-After-Free vulnerability in RAR decoder (CVE-2018-1000878 bsc#1120654) * CVE-2018-1000879.patch, which fixes a NULL Pointer Dereference vulnerability in ACL parser (CVE-2018-1000879 bsc#1120656) * CVE-2018-1000880.patch, which fixes an improper input validation vulnerability in WARC parser (CVE-2018-1000880 bsc#1120659) - Make use of %license macro - Applied spec-cleaner- Fix RPM groups. Remove idempotent %if..%endif guards. Diversify summaries. Set CFLAGS instead of re-defining optflags with itself.- update to version 3.3.3 * Avoid super-linear slowdown on malformed mtree files * Many fixes for building with Visual Studio * NO_OVERWRITE doesn't change existing directory attributes * New support for Zstandard read and write filters - Fixes CVE-2017-14501, CVE-2017-14502, CVE-2017-14503 - fix-CVE-2017-14166.patch is obsolete- update to version 3.3.2 * NFSv4 ACL support for Linux (librichacl) - fix-CVE-2017-14166.patch (boo#1057514)- update to version 3.3.1 * Security & Feature release Details are not documented from upstream yet fix-extract-over-links.patch and libarchive-openssl.patch obsoleted- fix extracting over symlinks: fix-extract-over-links.patch the problem is solved upstream different, but git master is too different atm.- update to version 3.2.2 Unspecified security fixes, but at least: * CVE-2016-8687 * CVE-2016-8689 * CVE-2016-8688 * CVE-2016-5844 * CVE-2016-6250 * CVE-2016-5418 - obsoletes fix-build.patch- make bsdtar require a matching libarchive version to avoid missing symbol errors- update to version 3.2.1 Fixes a number of security issues: CVE-2015-8934, CVE-2015-8933, CVE-2015-8917, CVE-2016-4301, CVE-2016-4300 - and fixing the build (fix-build.patch)- limit size of symlinks in cpio archives (CVE-2016-4809, boo#984990) CVE-2016-4809.patch- 4GB _constraints for ppc64le only, it would break other archs - update to version 3.2.0 * Fixes CVE-2016-1541 * Fixes CVE-2015-8928 * changes are only documented in git history * updated openssl patch * new bsdcat utility - removed obsolete patches for: * CVE-2013-0211.patch * directory-traversal-fix.patch * libarchive-xattr.patch- add _constraints memory 4096MB to avoid ppc64le build failure- build static lib on RHEL 7- RHEL/CentOS build fix, skipping autoreconf- add CVE for previous change- fix a directory traversal in cpio tool (bnc#920870) directory-traversal-fix.patch CVE-2015-2304- Added CVE-2013-0211.patch to fix CVE-2013-0211 (bnc#800024)h01-ch2d 1718350103 3.7.2-150600.3.3.13.7.2-150600.3.3.1bsdcatbsdcpiobsdtarbsdunzipbsdcat.1.gzbsdcpio.1.gzbsdtar.1.gzbsdunzip.1.gzlibarchive-formats.5.gz/usr/bin//usr/share/man/man1//usr/share/man/man5/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:34317/SUSE_SLE-15-SP6_Update/4ec7e5b7f901b790630388d31e238c52-libarchive.SUSE_SLE-15-SP6_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=af7d8e77a9c3ed300852915ba9d5039068397c7e, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=51fe402e8a4c1968e2546ac171c25a4f402cfd0d, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=8641b6a4c6d0051b47b94137122437a642b7d379, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=75d91003c1aee0f259b5ab9dc9a64707ac48e68e, for GNU/Linux 3.2.0, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)troff or preprocessor input, UTF-8 Unicode text (gzip compressed data, max compression, from Unix).N RR RRRR R RRRRRR RRRRRRRRRRRR RRRR RRR RRR RR RRRRR RRRRRRRRRRRRRRR RRRR RRR RRR RR RRRRR RRRRRRR R RRR RRRR RRRR RR1m7] &.utf-8fd13007057619dacc2919480c489bc332724e854b09497e12891ab58520bf05b? 7zXZ !t/N]"k%jU?}|0'bt.~An#a]2`j9E{9OnX1hv?47j2 B;42f"Z>8~R489b] ^](ha6w;ߪyIѿ Sh+{(bj< Jwԫ"A}WX1Ǐt)יc 8 2kphy\y&,Kv޳19n3]̃ۡ2DnMC\B}/faSM ; Ta/>5ǛQ=0֘xSس TbF>rÄnZMYc5Jy4d;$KȏUTJ@< oO($)9!m G*/;7dLdhI^p}r~BR{S7yHoظPCL<`T6j8qk@aJ]9e+.#@ iKkpPeս&LA3ῒ6Ke)IAfWA^_(L n>J}^FQQN\nu8RAĀV^e$*ۅj=u[wTC!OUppǔ'fz'uTMTv.6cEj\f+Rcz9 ߐX5fXi-C YR>:gvcs8#<˦NUAr=o:8uo/qc|eIdq,E nԣkNJWN%nm-2mGR{ũpJrhO푐zEæ9< P @:C^P Q~.ձIN#8Fx)H'clIepDGJg0_-_ԅU|4yu mLSAMb];.k^]f-ZB@c۶U,9w}P<욏hU㌄7Z-pH[(LŠw02- ` ͮ)3u=64tM =l{C%?&ъx*APfc{Tg\?~0J@VjnJj-𴁂1>Hvzr=v7./JÜoRΑRK$x r :h,MHERb=70jҰވ(b=uǰBݐλs,6KapO*n沑)CXU~A bCR:?ثʗ 9 ݛ'4P9n!܇IaAHiRљ 8bPjERBVJ.J5y|{ЀD)b{ٌ*AV'>F>N;qiEgj\>!S +%r3^w.N.KQVj.0Ni!ݷEDT&fC0<Ae1UE