libxml2-devel-2.9.14-150400.5.25.1<>,eS6p9|V,ݙ'09Q>0^ +5y' \=Tì kVqJaߊyIF3%~25B..hp >o%׫Qwm<}B4wf5K s^k]DU\>>?d % `(,8<Uvz == B= = = m= ==="H=<x(8;9;:b;Fw;GwT=HxH=Iy<=Xy|Yy\y=]z=^}I b~,c~dWe\f_laut=vhwP=xD=y8zDTX^Clibxml2-devel2.9.14150400.5.25.1Development files for libxml2, an XML manipulation libraryThe XML C library can load and save extensible data structures or manipulate any kind of XML files. This subpackage contains header files for developing applications that want to make use of libxml.eS6h01-armsrv2=SUSE Linux Enterprise 15SUSE LLC MIThttps://www.suse.com/Unspecifiedhttps://gitlab.gnome.org/GNOME/libxml2linuxaarch64 U$>U -*' !;h9N 6D lfp h56 )t;91?R !' hS@K wQAA큤AA큤A큤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.so.2.9.14rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootlibxml2-2.9.14-150400.5.25.1.src.rpmlibxml2-devellibxml2-devel(aarch-64)pkgconfig(libxml-2.0)@@    /bin/sh/usr/bin/pkg-configglibc-devellibxml2libxml2-2libxml2-toolspkgconfig(liblzma)pkgconfig(zlib)readline-develrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)xz-develzlib-devel2.9.142.9.142.9.143.0.4-14.6.0-14.0-15.2-14.14.3e?ddBzdBzd?c_cMCbob4t@b'E@ap`!@`!@`` @`N@`N@`N@`4@_H@_G@__V ^V@^oj@^oj@^l@] @]߶]Γ@]v>]D%]B@]A]@\s\LKZZZ@Z@Y@Y*@YéYéY)@YBvYA%@Y"XWXWH6W>@W(VTQ@TWn@TWn@TSyTAdavid.anes@suse.comdavid.anes@suse.comdavid.anes@suse.comdavid.anes@suse.comdaniel.garcia@suse.comdavid.anes@suse.comdavid.anes@suse.comdavid.anes@suse.comdimstar@opensuse.orgluc14n0@opensuse.orgmcepl@suse.compmonreal@suse.comrpm@fthiessen.depmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comwicked@iki.fipmonreal@suse.compmonreal@suse.comcode@bnavigator.depmonreal@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comtchvatal@suse.comtchvatal@suse.comstefan.bruens@rwth-aachen.depmonrealgonzalez@suse.compmonrealgonzalez@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.commgorse@suse.comkukuk@suse.detchvatal@suse.comaavindraa@gmail.comaavindraa@gmail.comjmatejek@suse.comjmatejek@suse.comjengelh@inai.detchvatal@suse.comtchvatal@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comkstreitova@suse.compsimons@suse.comkstreitova@suse.comsflees@suse.derpm@fthiessen.devcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.com- Security update: * [CVE-2023-45322, bsc#1216129] use-after-free in xmlUnlinkNode() in tree.c - Added file libxml2-CVE-2023-45322.patch- Security update: * [CVE-2023-39615, bsc#1214768] Crafted xml can cause global buffer overflow - Added file libxml2-CVE-2023-39615.patch- Security update: * [CVE-2023-29469, bsc#1210412] Hashing of empty dict strings isn't deterministic - Added patch libxml2-CVE-2023-29469.patch * [CVE-CVE-2023-28484, bsc#1210411] NULL dereference in xmlSchemaFixupComplexType - Added patch libxml2-CVE-2023-28484-1.patch - Added patch libxml2-CVE-2023-28484-2.patch- Remove unneeded dependency (bsc#1209918).- Build also for modern python version (jsc#PED-68)- Add W3C conformance tests to the testsuite (bsc#1204585): * Added file xmlts20080827.tar.gz- Security fixes: * [CVE-2022-40303, bsc#1204366] Fix integer overflows with XML_PARSE_HUGE + Added patch libxml2-CVE-2022-40303.patch * [CVE-2022-40304, bsc#1204367] Fix dict corruption caused by entity reference cycles + Added patch libxml2-CVE-2022-40304.patch- Update to 2.9.14: * Security: + [CVE-2022-29824] Integer overflow in xmlBuf and xmlBuffer + Fix potential double-free in xmlXPtrStringRangeFunction + Fix memory leak in xmlFindCharEncodingHandler + Normalize XPath strings in-place + Prevent integer-overflow in htmlSkipBlankChars() and xmlSkipBlankChars() + Fix leak of xmlElementContent * Bug fixes: + Fix parsing of subtracted regex character classes + Fix recursion check in xinclude.c + Reset last error in xmlCleanupGlobals + Fix certain combinations of regex range quantifiers + Fix range quantifier on subregex * Improvements: + Fix recovery from invalid HTML start tags * Build system, portability: + Define LFS macros before including system headers + Initialize XPath floating-point globals + configure: check for icu DEFS + configure.ac: produce tar.xz only (GNOME policy) + CMakeLists.txt: Fix LIBXML_VERSION_NUMBER + Fix build with older Python versions + Fix --without-valid build- Build python bindings in a 2nd run, using multibuild: otherwise, libxml2 requires pkgconfig(libxml-2.0) to build, causing issues to bootstrap.- Update to version 2.9.13: * Security fixes: + [CVE-2022-23308] Use-after-free of ID and IDREF attributes (boo#1196490); + Several memory leaks and another issues. * Many regressions fixes. * Numerous bug fixes, including, among many others: + xmllint's --maxmem option should work as expected now; + xmllint now returns an error if arguments are missing. * Numerous tests and code and fuzzing fixes and improvements. * Updated documentation. - The full Libxml2 2.9.13 NEWS can be found here: https://download.gnome.org/sources/libxml2/2.9/\ libxml2-2.9.13.news. - Replace version-release macros in all 3 Obsoletes tag with plain 2.9.13 to avoid unwanted behaviors in the future. - Remove dropped upstream AUTHORS file from list of files to be installed in the documentation location with 'cp' command. - Update http://xmlsoft.org URL tag to Libxml2's new web home: https://gitlab.gnome.org/GNOME/libxml2. - Update ftp://xmlsoft.org Source tag to Libxml2's new download host: https://download.gnome.org. - Drop deprecated Python-2-related macro definitions/conditional statement from spec file. - Drop merged upstream patches: libxml2-fix-lxml-corrupted-subtree-structures.patch; libxml2-fix-regression-in-xmlNodeDumpOutputInternal.patch. - Drop libxml2.keyring source file as the new download host doesn't offer GPG signatures. - Use ldconfig_scriptlets macro for post(un) handling.- Rewrite package to the single-spec %python_subpackage_only style and eliminate unnecessary multibuild.- Fix python-lxml regression with libxml2 2.9.12: * Work around lxml API abuse: gitlab.gnome.org/GNOME/libxml2/issues/255 - Add upstream patches: * libxml2-fix-lxml-corrupted-subtree-structures.patch * libxml2-fix-regression-in-xmlNodeDumpOutputInternal.patch- Update to version 2.9.12 * Fix CVE-2021-3541, CVE-2021-3537 (bsc#1185698, bsc#1185879), CVE-2021-3518, CVE-2021-3517, CVE-2021-3516, CVE-2020-7595, CVE-2019-20388, CVE-2020-24977, and CVE-2019-19956 (bsc#1159928) * Fix null deref in legacy SAX1 parser * Fix handling of unexpected EOF in xmlParseContent * Fix user-after-free * Validate UTF8 in xmlEncodeEntities * Fix memory leak in xmlParseElementMixedContentDecl * Fix integer overflow in xmlSchemaGetParticleTotalRangeMin * Fix SEGV in xmlSAXParseFileWithData * Don't process siblings of root in xmlXIncludeProcess * Full changes: http://xmlsoft.org/news.html - Drop upstream fixed * libxml2-CVE-2021-3541.patch * libxml2-CVE-2021-3537.patch * libxml2-CVE-2021-3518.patch * libxml2-CVE-2021-3517.patch * libxml2-CVE-2021-3516.patch * libxml2-CVE-2020-7595.patch * libxml2-CVE-2019-20388.patch * libxml2-CVE-2020-24977.patch * libxml2-CVE-2019-19956.patch * libxml2-python39.patch * libxml2-Avoid-quadratic-checking-of-identity-constraints.patch - Drop since 2.9.10 merged libxml2-xmlFreeNodeList-recursive.patch - Drop since 2.8.0 merged fix-perl.diff - Refresh libxml2-make-XPATH_MAX_NODESET_LENGTH-configurable.patch- Security fix: [bsc#1186015, CVE-2021-3541] * Exponential entity expansion attack bypasses all existing protection mechanisms. - Add libxml2-CVE-2021-3541.patch- Security fix: [bsc#1185698, CVE-2021-3537] * NULL pointer dereference in valid.c:xmlValidBuildAContentModel * Add libxml2-CVE-2021-3537.patch- Security fix: [bsc#1185408, CVE-2021-3518] * Fix use-after-free in xinclude.c:xmlXIncludeDoProcess() * Add libxml2-CVE-2021-3518.patch- Security fix: [bsc#1185410, CVE-2021-3517] * Fix heap-based buffer overflow in entities.c:xmlEncodeEntitiesInternal() * Add libxml2-CVE-2021-3517.patch- Security fix: [bsc#1185409, CVE-2021-3516] * Fix use-after-free in entities.c:xmlEncodeEntitiesInternal() * Add libxml2-CVE-2021-3516.patch- Fails to build against Python 3.9: * Add upstream commit that fixes the issue https://github.com/GNOME/libxml2/commit/e4fb36841800038c289997432ca547c9bfef9db1 - Add patch libxml2-python39.patch- Security fix: [bsc#1161521, CVE-2019-20388] * Memory leak in xmlSchemaPreRun in xmlschemas.c - Add libxml2-CVE-2019-20388.patch- Avoid quadratic checking of identity-constraints: [bsc#1178823] * key/unique/keyref schema attributes currently use qudratic loops to check their various constraints (that keys are unique and that keyrefs refer to existing keys). * This fix uses a hash table to avoid the quadratic behaviour. - Add libxml2-Avoid-quadratic-checking-of-identity-constraints.patch- Make python subpackage ready for multiple python3 flavors gh#openSUSE/python-rpm-macros#66- Security fix: [bsc#1176179, CVE-2020-24977] * xmllint: global-buffer-overflow in xmlEncodeEntitiesInternal - Add patch libxml2-CVE-2020-24977.patch- Fix invalid xmlns references since the fix for CVE-2019-19956 [bsc#1172021] - Revert upstream commit 5a02583c7e683896d84878bd90641d8d9b0d0549 * Add patch libxml2-CVE-2019-19956.patch- Security fix: [bsc#1161517, CVE-2020-7595] * xmlStringLenDecodeEntities in parser.c has an infinite loop in a certain end-of-file situation - Add libxml2-CVE-2020-7595.patch- Do not pull in the non-python deps on the python build- Revert the previous change and use multibuild to determine supported flavors. We need to be able to enable/disable pythons in prjconf and multibuild directly clashes with that.- Build python2 and python3 bindings in separate flavors. As python3-libxml2 is a dependency of e.g. itstools and thus many other packages these packages no longer have a build dependency on python2. Breaks a build loop for python2.- Since libxml2-2.9.10 perl-XML-LibXSLT fails to build: [bsc#1157450] * Revert upstream commit to make xmlFreeNodeList non-recursive https://github.com/GNOME/libxml2/commit/0762c9b69ba01628f72eada1c64ff3d361fb5716 - Add patch libxml2-xmlFreeNodeList-recursive.patch- Version update to 2.9.10: * Portability: + Fix exponent digits when running tests under old MSVC + Work around buggy ceil() function on AIX + Don't call printf with NULL string in runtest.c + Switched from unsigned long to ptrdiff_t in parser.c + timsort.h: support older GCCs + Make configure.ac work with older pkg-config * Bug Fixes: + Fix for conditional sections at end of document + Make sure that Python tests exit with error code + Audit memory error handling in xpath.c + Fix error code in xmlTextWriterStartDocument + Fix integer overflow when counting written bytes + Fix uninitialized memory access in HTML parser + Fix memory leak in xmlSchemaValAtomicType + Disallow conditional sections in internal subset + Fix use-after-free in xmlTextReaderFreeNodeList + Fix Regextests + Fix empty branch in regex + Fix integer overflow in entity recursion check + Don't read external entities or XIncludes from stdin + Fix Schema determinism check of ##other namespaces + Fix potential null deref in xmlSchemaIDCFillNodeTables + Fix potential memory leak in xmlBufBackToBuffer + Fix error message when processing XIncludes with fallbacks + Fix memory leak in xmlRegEpxFromParse + 14:00 is a valid timezone for xs:dateTime + Fix memory leak in xmlParseBalancedChunkMemoryRecover + Fix potential null deref in xmlRelaxNGParsePatterns + Misleading error message with xs:{min|max}Inclusive + Fix memory leak in xmlXIncludeLoadTxt + Partial fix for comparison of xs:durations + Fix null deref in xmlreader buffer + Fix unability to RelaxNG-validate grammar with choice-based name class + Fix unability to validate ambiguously constructed interleave for RelaxNG + Fix possible null dereference in xmlXPathIdFunction + fix memory leak in xmlAllocOutputBuffer + Fix unsigned int overflow + dict.h: gcc 2.95 doesn't allow multiple storage classes + Fix another code path in xmlParseQName + Make sure that xmlParseQName returns NULL in error case + Fix build without reader but with pattern + Fix memory leak in xmlAllocOutputBufferInternal error path + Fix unsigned integer overflow + Fix return value of xmlOutputBufferWrite + Fix parser termination from "Double hyphen within comment" error + Fix call stack overflow in xmlFreePattern + Fix null deref in previous commit + Fix memory leaks in xmlXPathParseNameComplex error paths + Check for integer overflow in xmlXPtrEvalChildSeq + Fix xmllint dump of XPath namespace nodes + Fix float casts in xmlXPathSubstringFunction + Fix null deref in xmlregexp error path + Fix null pointer dereference in xmlTextReaderReadOuterXml + Fix memory leaks in xmlParseStartTag2 error paths + Fix memory leak in xmlSAX2StartElement + Fix commit "Memory leak in xmlFreeID (xmlreader.c)" + Fix NULL pointer deref in xmlTextReaderValidateEntity + Memory leak in xmlFreeTextReader + Memory leak in xmlFreeID (xmlreader.c) * Improvements: + Propagate memory errors in valuePush + Propagate memory errors in xmlXPathCompExprAdd + Make xmlFreeDocElementContent non-recursive + Avoid ignored attribute warnings under GCC + Make xmlDumpElementContent non-recursive + Make apibuild.py ignore ATTRIBUTE_NO_SANITIZE + Mark xmlExp* symbols as removed + Make xmlParseConditionalSections non-recursive + Adjust expected error in Python tests + Make xmlTextReaderFreeNodeList non-recursive + Make xmlFreeNodeList non-recursive + Make xmlParseContent and xmlParseElement non-recursive + Remove executable bit from non-executable files + Fix expected output of test/schemas/any4 + Optimize build instructions in README + xml2-config.in: Output CFLAGS and LIBS on the same line + xml2-config: Add a --dynamic switch to print only shared libraries + Annotate functions with __attribute__((no_sanitize)) + Fix warnings when compiling without reader or push parser + Remove unused member `doc` in xmlSaveCtxt + Limit recursion depth in xmlXPathCompOpEvalPredicate + Remove -Wno-array-bounds + Remove unreachable code in xmlXPathCountFunction + Improve XPath predicate and filter evaluation + Limit recursion depth in xmlXPathOptimizeExpression + Disable hash randomization when fuzzing + Optional recursion limit when parsing XPath expressions + Optional recursion limit when evaluating XPath expressions + Use break statements in xmlXPathCompOpEval + Optional XPath operation limit + Fix compilation with --with-minimum + Check XPath stack after calling functions + Remove debug printf in xmlreader.c + Always define LIBXML_THREAD_ENABLED when enabled + Fix unused function warning in testapi.c + Remove unneeded function pointer casts + Fix -Wcast-function-type warnings (GCC 8) + Fix -Wformat-truncation warnings (GCC 8) * Cleanups: + Rebuild docs + Disable xmlExp regex code + Remove redundant code in xmlRelaxNGValidateState + Remove redundant code in xmlXPathCompRelationalExpr - Rebase patch fix-perl.diff- Do not depend on setuptools to keep the depgraph small and avoid build cycles- Use python[23]-libmxl2 as python names not python-libxml2-python which is kinda confusing- Do not ship libtool archive anymore- Enable tests also in the python subpackages- Added a new configurable variable XPATH_DEFAULT_MAX_NODESET_LENGTH to avoid nodeset limit when processing large XML files [bsc#1135123] * Added libxml2-make-XPATH_MAX_NODESET_LENGTH-configurable.patch- Merge python-libxml2-python spec and changes files into the libxml2 ones using _multibuild [bsc#1126499, bsc#1123919]- Version update to 2.9.9: * Security: + CVE-2018-9251 CVE-2018-14567 Fix infinite loop in LZMA decompression (boo#1088279 boo#1105166). + CVE-2018-14404 Fix nullptr deref with XPath logic ops (boo#1102046). * Bug fixes: + Fix building relative URIs + Problem with data in interleave in RelaxNG validation + Fix memory leak in xmlSwitchInputEncodingInt error path + Set doc on element obtained from freeElems + Fix HTML serialization with UTF-8 encoding + Use actual doc in xmlTextReaderRead*Xml + Unlink node before freeing it in xmlSAX2StartElement + Check return value of nodePush in xmlSAX2StartElement + Free input buffer in xmlHaltParser + Reset HTML parser input pointers on encoding failure + Fix xmlSchemaValidCtxtPtr reuse memory leak + Fix xmlTextReaderNext with preparsed document + HTML noscript should not close p + Don't change context node in xmlXPathRoot * Improvements: + Remove redefined starts and defines inside include elements + Allow choice within choice in nameClass in RELAX NG + Look inside divs for starts and defines inside include + Add newlines to 'xmllint --xpath' output + Don't include SAX.h from globals.h + Support xmlTextReaderNextSibling w/o preparsed doc + Improve restoring of context size and position + Simplify and harden nodeset filtering + Avoid unnecessary backups of the context node + Fix inconsistency in xmlXPathIsInf - Add libxml2-python3-string-null-check.patch: fix NULL pointer dereference when parsing invalid data (bsc#1065270 glgo#libxml2!15).).- Use %license instead of %doc [bsc#1082318]- Version update to 2.9.8: * Various -Werror fixes and compilation updates as travis is now used by upstream * Few additional tests added for ICU operations - Drop patch python3.6-verify_fd.patch merged upstream- Version update to 2.9.7 release: * Bug Fixes: + xmlcatalog: restore ability to query system catalog easily + Fix comparison of nodesets to strings * Improvements: + Add Makefile rules to rebuild HTML man pages + Remove generated file python/setup.py from version control + Fix mixed decls and code in timsort.h + Rework handling of return values in thread tests + Fix unused variable warnings in testrecurse + Fix -Wimplicit-fallthrough warnings + Upgrade timsort.h to latest revision + Fix a couple of warnings in dict.c and threads.c + Fix unused variable warnings in nanohttp.c + Don't include winsock2.h in xmllint.c + Use __linux__ macro in generated code * Portability: + Add declaration for DllMain + Fix preprocessor conditional in threads.h + Fix macro redefinition warning + many Windows specific improvements * Documentation: + xmlcatalog: refresh man page wrt. quering system catalog easily - Includes bug fixes from 2.9.6: * Fix XPath stack frame logic * Report undefined XPath variable error message * Fix regression with librsvg * Handle more invalid entity values in recovery mode * Fix structured validation errors * Fix memory leak in LZMA decompressor * Set memory limit for LZMA decompression * Handle illegal entity values in recovery mode * Fix debug dump of streaming XPath expressions * Fix memory leak in nanoftp * Fix memory leaks in SAX1 parser - Drop libxml2-bug787941.patch * upstreamed in 3157cf4e53c03bc3da604472c015c63141907db8- clean with spec-cleaner- libxml2-python3-unicode-errors.patch: work around an issue with libxml2 supplied error strings being undecodable UTF-8 (bsc#1065270)- convert to singlespec, build a python 3 version - change build instructions to use setup.py (and %python_build macros) instead of makefile-based approach - add python3.6-verify_fd.patch that fixes libxml2 on python 3.6 - rename to python-libxml2-python to conform to package naming policy (PyPI name is "libxml2-python")- Update package summaries and RPM groups. Trim descriptions for size on secondary subpackages. Replace install call by a commonly-used macro.- Add patch to fix TW integration: * libxml2-bug787941.patch- Version update to 2.9.5 release: * Merged all the previous cve fixes that were patched in * Few small tweaks - Remove merged patches: * libxml2-CVE-2016-4658.patch * libxml2-CVE-2017-0663.patch * libxml2-CVE-2017-5969.patch * libxml2-CVE-2017-9047.patch * libxml2-CVE-2017-9048.patch * libxml2-CVE-2017-9049.patch * libxml2-2.9.4-fix_attribute_decoding.patch- Security fix: * libxml2-CVE-2017-0663.patch [bsc#1044337, CVE-2017-0663] * Fix Heap buffer overflow in xmlAddID- Security fix: * libxml2-CVE-2017-5969.patch [bsc#1024989, CVE-2017-5969] * Fix NULL pointer deref in xmlDumpElementContent- Security fixes: * libxml2-CVE-2017-9049.patch [bsc#1039066] * heap-based buffer overflow (xmlDictComputeFastKey func) * libxml2-CVE-2017-9048.patch [bsc#1039063] * stack overflow vulnerability (xmlSnprintfElementContent func) * libxml2-CVE-2017-9047.patch [bsc#1039064] * stack overflow vulnerability (xmlSnprintfElementContent func)- Added libxml2-CVE-2016-4658.patch: Disallow namespace nodes in XPointer ranges. Namespace nodes must be copied to avoid use-after-free errors. But they don't necessarily have a physical representation in a document, so simply disallow them in XPointer ranges [bsc#1005544] [CVE-2016-4658]- add libxml2-2.9.4-fix_attribute_decoding.patch to fix attribute decoding during XML schema validation [bnc#983288]- Update libxml2 to version libxml2-2.9.4. The new version is resistant against CVE-2016-3627, CVE-2016-1833, CVE-2016-1835, CVE-2016-1837, CVE-2016-1836, CVE-2016-1839, CVE-2016-1838, CVE-2016-1840, CVE-2016-4483, CVE-2016-1834, CVE-2016-3705, and CVE-2016-1762. - Remove obsolete patches libxml2-2.9.1-CVE-2016-3627.patch, 0001-Add-missing-increments-of-recursion-depth-counter-to.patch, and libxml2-2.9.3-bogus_UTF-8_encoding_error.patch.- add libxml2-2.9.3-bogus_UTF-8_encoding_error.patch to fix XML push parser that fails with bogus UTF-8 encoding error when multi-byte character in large CDATA section is split across buffer [bnc#962796]- Add libxml2-2.9.1-CVE-2016-3627.patch to fix stack exhaustion while parsing certain XML files in recovery mode (CVE-2016-3627, bnc#972335). - Add 0001-Add-missing-increments-of-recursion-depth-counter-to.patch to improve protection against Billion Laughs Attack (bnc#975947).- Update to new upstream release 2.9.3 (bsc#954429): * Fixes for CVE-2015-8035, CVE-2015-7942, CVE-2015-7941, CVE-2015-1819, CVE-2015-7497, CVE-2015-7498, CVE-2015-5312, CVE-2015-7499, CVE-2015-7500 and CVE-2015-8242 * And other bugfixes - Removed upstream fixed patches: * libxml2-dont_initialize_catalog.patch * 0001-Fix-missing-entities-after-CVE-2014-3660-fix.patch * 0002-Adding-example-from-bugs-738805-to-regression-tests.patch- fix a missing entities after CVE-2014-3660 fix (https://bugzilla.gnome.org/show_bug.cgi?id=738805) * added patches: 0001-Fix-missing-entities-after-CVE-2014-3660-fix.patch 0002-Adding-example-from-bugs-738805-to-regression-tests.patch- fix a regression in libxml2 2.9.2 * https://bugzilla.redhat.com/show_bug.cgi?id=1153753 - add libxml2-dont_initialize_catalog.patch- update to 2.9.2 * drop libxml2-CVE-2014-3660.patch (upstream) * add keyring to verify tarball Security: Fix for CVE-2014-3660 billion laugh variant CVE-2014-0191 Do not fetch external parameter entities Improvements: win32/libxml2.def.src after rebuild in doc elfgcchack.h: more legacy needs xmlSAX2StartElement() and xmlSAX2EndElement() elfgcchack.h: add xmlXPathNodeEval and xmlXPathSetContextNode Provide cmake module Fix a couple of issues raised by make dist Fix and add const qualifiers Preparing for upcoming release of 2.9.2 Fix zlib and lzma libraries check via command line wrong error column in structured error when parsing end tag doc/news.html: small update to avoid line join while generating NEWS. Add methods for python3 iterator Support element node traversal in document fragments xmlNodeSetName: Allow setting the name to a substring of the currently set name Added macros for argument casts adding init calls to xml and html Read parsing entry points Get rid of 'REPLACEMENT CHARACTER' Unicode chars in xmlschemas.c Implement choice for name classes on attributes Two small namespace tweaks xmllint --memory should fail on empty files Cast encoding name to char pointer to match arg type- fix for CVE-2014-3660 (bnc#901546) * denial of service via recursive entity expansion (related to billion laughs) * added libxml2-CVE-2014-3660.patchh01-armsrv2 1699952257  !"#$%&'()*+,-./0123456789:;<=2.9.14-150400.5.25.12.9.14-150400.5.25.12.9.14 xml2-configlibxmllibxml2libxmlDOCBparser.hHTMLparser.hHTMLtree.hSAX.hSAX2.hc14n.hcatalog.hchvalid.hdebugXML.hdict.hencoding.hentities.hglobals.hhash.hlist.hnanoftp.hnanohttp.hparser.hparserInternals.hpattern.hrelaxng.hschemasInternals.hschematron.hthreads.htree.huri.hvalid.hxinclude.hxlink.hxmlIO.hxmlautomata.hxmlerror.hxmlexports.hxmlmemory.hxmlmodule.hxmlreader.hxmlregexp.hxmlsave.hxmlschemas.hxmlschemastypes.hxmlstring.hxmlunicode.hxmlversion.hxmlwriter.hxpath.hxpathInternals.hxpointer.hcmakelibxml2libxml2-config.cmakelibxml2.solibxml-2.0.pcxml2Conf.shaclocallibxml.m4xml2-config.1.gzlibxml.3.gz/usr/bin//usr/include//usr/include/libxml2//usr/include/libxml2/libxml//usr/lib64//usr/lib64/cmake//usr/lib64/cmake/libxml2//usr/lib64/pkgconfig//usr/share//usr/share/aclocal//usr/share/man/man1//usr/share/man/man3/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:31448/SUSE_SLE-15-SP4_Update/b7c84f6800b875019405d6b2dfa92d27-libxml2.SUSE_SLE-15-SP4_Updatedrpmxz5aarch64-suse-linuxPOSIX shell script, ASCII text executabledirectoryC source, ASCII textASCII textpkgconfig fileM4 macro processor script, ASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RPRn.Etc5%utf-8b1e234dbb9de6c0db3170f9d2c0ceff622e22a2df31b9d542c8850d666cf9ff0? 7zXZ !t/4]"k%H6_.*O?˜7:<28Q?}3oy31Pu;`)A.0hmYڎg,1[4`ʊ5Lp̻ C᧎q%*x5ì4$;G\ԛzJj|K9RN qN$;'$uTUoK6O,xdϥxAv5 }LJà (J1F!WV:!|[2/bK =ISaV|^Sxq2fȸ=?węޮ)z!Č[=%Vb! MH'Y[ 3Yls+gy0}~y.JIl>;Y'QPڷru`IK*bSjm:yBCۨ%6WČXFe!F.RBKE}?hwStF*_,#LlG[%`^->\x7mR^{2="K3iPdV͍`[a>Nl4 mAUaNr2Ȇ! oH{uKjvYR}ɍwr;ˇP䐻- F %!30"-UBd>GULAc_q*=})|yk2\58PEcq=!ޯ+N;z<$deF>8gp[޽ee`Hd;HOSCin>Gڬr?N {^33;U69oD+KvatqZZvh>̀3/*d3zA!fi|tR=mZ >V:ߴU3U ȣ Ht1^PVTg(gN:I|W&>d4^FVgTfאּ{r$\NcC0пFCjq0$Pof˿ i~5|0llڇƋ,JD3'zZze?@/9t ]aR`fdE\5d|) MQڲFu҇B8y1:}2ΛŞ5e0z3"eb ZQ:&6sXEب+gvj}?*Pߍv)d>GBUoKf,Q[\ T)kEIz-``~n"^Է"'9=adhƈԅ?yoDX $:S}۲T$d׋.r#ZIҲg g7߂ 6d4tkesFVW&+J:,zJgpkXi~P(hKMM")ɮVk[Quȅ ҝoVnD;yΝ溻)Gt(h5Kyt D2z7j[\,DIF !ࣙyaAZ/@Om^3ď$ Ǔ-6i7(@Ect*(G8u^zA=z.Q˨ X#kDF4')HYz?ɜ݀0faGAx qxBmR bmӃzLjoliSn;!M>Ѭ U lµ>t 4 :{Fb<,pu>pC3 N3f~!*z|x-1}R7_u`8) .tx^ v3?Q'M;Sb,ss^TUyf~pR2N}qD6u;p{q#yB#m&=nm׌ɇ3 e ݏ qxAWzVe-vpL'+tgĖ$N\Ia~ʠO1i^vxW]9~E%1tp5p{obnI(`3Y`\S? 8@PUtLj6OWO M˧RqN/0!VȡBbVkhca^4}(R_:*jRUf.;zm3/Ems>ي\y\= j6awN]T evqS{xX0ݩTpgi(ro늡 Bhf`[8ɓ=?c!EFy I;r7V7bzajz+-ǡ{!685팤[E=XrC=H$\GTerQ=wrzuwH 0 t LιGn%I8w'᫬A}7F?^E-|b>* 7?X piE'QV -džF$< < f+Οvw~Dk-pă‘[YQ/a# r]7nrZTj<x {3Q)XM, "'k 7~&OoqfґԒ:ugOX }.WP;J Ӆb eEUg*L#M~/FR '7\Wqҳo/Fg^mQϙw$v<@³g,ɇ՟CdUq-\ jmNn8pk*,0 >D&͟kiu"5!;|~CEsGHyK5[ wCV/JGp.ĺ7i]b?\N6Eqf*$@2ߑ,A;7aPPD!F'*y_aP2y٬R݉›4I_񭐊O;|[W N_]hN#;8Qhas=8L.d כi?ifĆc6"H6 ͦ\;|"q705kU@b}u*u>3<֠x~[.'e AJsg قcܶJWQW~N=X%!'*d v\!{%,FK2VʉuBF{#t4M9|xͷ:97Lˮnc4?({[o#fkD-6/:uVrMH[W=Cqȸ$26ϯSa{9hY }O1vG䗌b~.bWjGSU)x}S\N >/b̲565$iȏ,=C0lј? -K-{} yth2zcJ?&ҴjGX'[+]-I3Tlsi䄕3AZj[VuXT*tw[y$i0O YZ