libmspack-devel-0.6-3.14.1<>,4ap9|Z}{& zRa*^l"d-ei˃5wBgIR= 6cLV2~3ʶMSbX?bD%ϊe7(k+olky mٸk)8r6pOAwkg4ؠgj/lG3cP(2KG^iPzԚ~/|T¯KȁRÉ֥c( Htǣ4d%30/{lc!b3+}IT 3Ia>>? d  \ *3 Ii    G \hw(8 9 : FRGhHtIXY\]^bcd4e9f<l>uTv`wxyzClibmspack-devel0.63.14.1Static libraries, header files and documentation for libmspackThe libmspack-devel package contains the header files and static libraries necessary for developing programs using libmspack.aibs-arm-1\SUSE Linux Enterprise 15SUSE LLC LGPL-2.1https://www.suse.com/Development/Libraries/C and C++http://www.cabextract.org.uk/libmspack/linuxaarch64[ށaaacff93d08933124485f6c59621abd7d6d4e3e4180d01e29b28081d4cf0f80e6f93d7f3a5c7f2048aa98240a469d43a3071bc1db9c96a7657d38caf2318b154da0libmspack.so.0.1.0rootrootrootrootrootrootlibmspack-0.6-3.14.1.src.rpmlibmspack-devellibmspack-devel(aarch-64)pkgconfig(libmspack)@    /usr/bin/pkg-configlibmspack0rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.63.0.4-14.6.0-14.0-15.2-14.14.1aՈ@`]\[ZaZ]@Z]@Z\T\@TD@TC@danilo.spinella@suse.comdanilo.spinella@suse.comkstreitova@suse.commcalabkova@suse.commcalabkova@suse.comadam.majer@suse.dejengelh@inai.demardnh@gmx.demardnh@gmx.desbrabec@suse.czp.drouand@gmail.comsbrabec@suse.cz- chmextract.c add anti "../" and leading slash protection to chmextract (CVE-2018-18586.patch, bsc#1113040) * cve-2018-18586.patch- There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (CVE-2018-14679, bsc#1103032) * libmspack-CVE-2018-14679.patch - Bad KWAJ file header extensions could cause a one or two byte overwrite (CVE-2018-14681, bsc#1103032). * libmspack-CVE-2018-14681.patch - There is an off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682, bsc#1103032). * libmspack-CVE-2018-14682.patch- add libmspack-0.6alpha-CVE-2019-1010305.patch to fix a buffer overflow in chmd_read_headers(): a CHM file name beginning "::" but shorter than 33 bytes will lead to reading past the freshly-allocated name buffer - checks for specific control filenames didn't take length into account [bsc#1141680] [CVE-2019-1010305]- Enable build-time tests (bsc#1130489) * Added patch libmspack-failing-tests.patch- Added patches: * libmspack-resize-buffer.patch -- CAB block input buffer is one byte too small for maximal Quantum block. * libmspack-fix-bounds-checking.patch -- Fix off-by-one bounds check on CHM PMGI/PMGL chunk numbers and reject empty filenames. * libmspack-reject-blank-filenames.patch -- Avoid returning CHM file entries that are "blank" because they have embedded null bytes. * (the last two patches were modified by removing unneeded part in order to make them more independent) - Fixed bugs: * CVE-2018-18584 (bsc#1113038) * CVE-2018-18585 (bsc#1113039)- Correct mspack-tools group to Productivity/File utilities- Correct SRPM group.- Fix typo- Update to version 0.6 * read_spaninfo(): a CHM file can have no ResetTable and have a negative length in SpanInfo, which then feeds a negative output length to lzxd_init(), which then sets frame_size to a value of your choosing, the lower 32 bits of output length, larger than LZX_FRAME_SIZE. If the first LZX block is uncompressed, this writes data beyond the end of the window. This issue was raised by ClamAV as CVE-2017-6419. * lzxd_init(), lzxd_set_output_length(), mszipd_init(): due to the issue mentioned above, these functions now reject negative lengths * cabd_read_string(): add missing error check on result of read(). If an mspack_system implementation returns an error, it's interpreted as a huge positive integer, which leads to reading past the end of the stack-based buffer. This issue was raised by ClamAV as CVE-2017-11423 - Add subpackage for helper tools - Run spec-cleaner- Remove problematic libmspack-qtmd_decompress-loop.patch (bnc#912214#c10). Version 0.5 has a correct fix dated 2015-01-05.- Update to version 0.5 * Please read the changelog; too many things to list- Fix possible infinite loop caused DoS (bnc912214, CVE-2014-9556, libmspack-qtmd_decompress-loop.patch).ibs-arm-1 16415497160.6-3.14.10.6-3.14.10.6alphamspack.hlibmspack.solibmspack.pc/usr/include//usr/lib64//usr/lib64/pkgconfig/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:22325/SUSE_SLE-15_Update/6e0c48d65487ba03676ae772ed09c42b-libmspack.SUSE_SLE-15_Updatedrpmxz5aarch64-suse-linuxLaTeX document, ASCII textpkgconfig filePR]p9#\F utf-808a8811dae1c20ce88fe217e9a2203c557da0a16507e8296d0bb26f32dd29022? 7zXZ !t/]"k%ndM8I1n",)k*t ;43j/:sYQLݗ1ğgaU>#/qO IQx2mhfi` >~&JcLOǴV ntCAW@ߊ**ͫP< FyJ%vUV>7~t^°[0Rz&E{='ӰY*$c](/2enrݧ Z<n,ru)K:3|: {&%/ON`A6=޽h%^[0YD(hIꢇLgm{wI@ }v\6U:}, e. ~UNIҌip^(ҌHJVL6$1785բuz Ч @nBf82mՇB ]dι} ,s^;ܶtRE&,g&9 (NnQdznxih0g 7-l԰-wrn<)k֘۴<Mcqbona -i&I=*֎N6`L2EU׉LM`#z|&90 M$2U0PjiKk+NYu*`dO :VQ3*M|+sw'9[a)7"@-G(kt?GjhZꯁ i&)*WPPӼr@ f·~;a-S&W*ͮ6 Kk2w់\k؆w9XtDx`,S*#zaGnƋW‡_N ۛwBk¦$ٜ C⑏̿_:W7)1 YZ