cifs-utils-devel-6.10-4.oe1 >  A azW^^fx㓷 w [%2a':eI<_{Ez`]qkдpK3縘jq'c }MccsؓXb]Wl|łAA9Śɨa_=#dpOqb[6=:%$KkN5M9K`Q[tZja`[+w,dHKI\f4M5mGa\Efh ց(>Zt/#MVzzMʋ65b5fca3a1e0d3f688c5d7d3670462ef856fed51553ba2da49652cddbf9b661b54cfc7e4f59945dfa6bbded29c4392587f0c2dffĉazW^^f7dVv;}{F-Jzy7Cm5;kC}RO-eʌSdU\@s!6 ߦҺxd|Mj^yP^k>MO27y)> n*?:B;^q(W![3JZ6mSK&a"{[amSs4}Yjᤃxt6Chp3} @Cu3$BHdVRcB$q bf+':GDߦSTۈr>p< @? 0d  O8<f{     % (,16TX(890:FGHIXY\] ^b&c &d e f l t u v z     ,Ccifs-utils-devel6.104.oe1Files needed for building plugins for cifs-utilsThe SMB/CIFS protocol is a standard file sharing protocol widely deployed on Microsoft Windows machines. This package contains the header file necessary for building ID mapping plugins for cifs-utils.azobs-worker1638948070-x86openEuler:20.03:LTS:SP3 / standard_x86_64http://openeuler.orgGPLv3+http://openeuler.orgUnspecifiedhttp://linux-cifs.samba.org/cifs-utils/linuxx86_64]f44f50ce7d64cce4bafde2f6045e5cae7033e036fe7190314a56e0227e556b9frootrootcifs-utils-6.10-4.oe1.src.rpmcifs-utils-develcifs-utils-devel(x86-64)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.15.1aa`}@_l@^@konglidong - 6.10-4haowenchao - 6.10-3yanglongkang - 6.10-2volcanodragon - 6.10-1Miaohe Lin - 6.10-0- sync patch from Upstream for fix capng apply for libcap-ng-0.8.1- DESC: delete -Sgit from %setup -q /usr/bin/cat /home/abuild/rpmbuild/SOURCES/0001-CVE-2020-14342-mount.cifs-fix-shell-command-injectio.patch | /usr/bin/patch -s --fuzz=0 --no-backup-if-mismatch /usr/bin/cat /home/abuild/rpmbuild/SOURCES/0002-CVE-2021-20208.patch | /usr/bin/patch -s --fuzz=0 --no-backup-if-mismatch /usr/bin/cat /home/abuild/rpmbuild/SOURCES/1001-cifs.upcall-update-the-cap-bounding-set-only-when-CA.patch | /usr/bin/patch -s --fuzz=0 --no-backup-if-mismatch /usr/bin/cat /home/abuild/rpmbuild/SOURCES/1002-mount.cifs-update-the-cap-bounding-set-only-when-CAP.patch | /usr/bin/patch -s --fuzz=0 --no-backup-if-mismatch , and delete BuildRequires git- Fix CVE-2021-20208- Type:CVE - ID:CVE-2020-14342 - SUG:restart - DESC:fix CVE-2020-14342- Type:enhancemnet - ID:NA - SUG:restart - DESC:Upgrade Package to 6.10obs-worker1638948070-x86 16409873646.10-4.oe16.10-4.oe1cifsidmap.h/usr/include/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP3/standard_x86_64/adcc15bc28504d68f057a817b82645e5-cifs-utilscpioxz2x86_64-openEuler-linux-gnuC source, ASCII textz<e<1Ā`RCutf-82664aef71ebce630d8ac0f7ff13ead60b5f227d36271f3092e259cf2701963e5?@7zXZ !#,Z] b2u Q{K(!"@ 빻#qjx.涥fkRT9wʮM4ʮ_"G;ceVڈ5KwwCbnD{[XhZb-Jw\p3{/Jؒhʉ6 x%hyݎߡk<+'( C.^t#P0x;}j}d[©obt7.j˜+[>x<.$I[:Q&&39$x8^k׿M$L-ts-qO4VsZg;>yÔKz!埝d~.epJyl+ڌfcP$f2b+L5z8:PX-rN3uh >_q` 2ą\fmtչ &!Cm9$(r3Ѷ >furYߙnbo3}+D,89/ǶPN^=>8@}BE4r *&?P*Rm\YR! `C%R&>DR[ s(Jlc0o! X i"sH ݿqmW6-y] b1?ψzqs輋Rhj)d!XE'xKQdq),=DH nf8J鯿7սdȞ o|&&Z{r; 2eg cr 3ӈyNl83Cz@qDݛ;6W~A^; ny4T$!8CmiiEQB:㠰$ Bԋ9ԽzRvfڮSܲ^rIc~,vRGHl=̫AsTZ -. 3m | NnCU:uH#h->Dp!@o"8tt{lOX*ψiz%WNn"\b(I?IqWk譆kN_ ~Ҋja /'a"&|Pý.oc{+ ްf8:QeV>hcGMZj}]!ԡ&l5 [7n ;ԥ&`+ƒPWmG} h?b5Q?Q>kT<+.Y={`J9(]fnfè):b EY/gvR(CGzbzvaO8{͕= u{Y5Yn9~MgS·d?EP%H/iki9?֍\Uz4hv%\_A#tF2/5ϳv7u\8`gEn!nVn3Eaބ- p/dFM[;UekaGKDL๑: S UP=wXmT<{%!Z{;3rMs _riU q7ǑI Z]$acb=OQ mr3<0ptsQK.rh7.S|_U]Ә%l& TmV/% o>B54/C* ӑǺ@i