libmspack-devel-0.6-lp152.6.3.1<>,a=/=„n !1* M5e)]U]kKQNwgV{WH6$S#/15aRPJ5V"Fp"^s}Ⱥ(cO_>2C)- Ӄ.RaW {)!}ZqQ+#V5]) a,$dKI} yQԮVZx vQ3 ['3+Bi+MBmTD wcS x.)iwTN Y!>>?d " a  .Nv|    + @L[jr(8 9 : FGHIXY \L]X^{bcTdefluvw<xHyTz\lpvClibmspack-devel0.6lp152.6.3.1Static libraries, header files and documentation for libmspackThe libmspack-devel package contains the header files and static libraries necessary for developing programs using libmspack.a=lamb10\openSUSE Leap 15.2openSUSELGPL-2.1http://bugs.opensuse.orgDevelopment/Libraries/C and C++http://www.cabextract.org.uk/libmspack/linuxx86_64[ށaKristyna Streitova Marketa Calabkova Marketa Calabkova adam.majer@suse.dejengelh@inai.demardnh@gmx.demardnh@gmx.desbrabec@suse.czp.drouand@gmail.comsbrabec@suse.cz- There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (CVE-2018-14679, bsc#1103032) * libmspack-CVE-2018-14679.patch - Bad KWAJ file header extensions could cause a one or two byte overwrite (CVE-2018-14681, bsc#1103032). * libmspack-CVE-2018-14681.patch - There is an off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682, bsc#1103032). * libmspack-CVE-2018-14682.patch- add libmspack-0.6alpha-CVE-2019-1010305.patch to fix a buffer overflow in chmd_read_headers(): a CHM file name beginning "::" but shorter than 33 bytes will lead to reading past the freshly-allocated name buffer - checks for specific control filenames didn't take length into account [bsc#1141680] [CVE-2019-1010305]- Enable build-time tests (bsc#1130489) * Added patch libmspack-failing-tests.patch- Added patches: * libmspack-resize-buffer.patch -- CAB block input buffer is one byte too small for maximal Quantum block. * libmspack-fix-bounds-checking.patch -- Fix off-by-one bounds check on CHM PMGI/PMGL chunk numbers and reject empty filenames. * libmspack-reject-blank-filenames.patch -- Avoid returning CHM file entries that are "blank" because they have embedded null bytes. * (the last two patches were modified by removing unneeded part in order to make them more independent) - Fixed bugs: * CVE-2018-18584 (bsc#1113038) * CVE-2018-18585 (bsc#1113039)- Correct mspack-tools group to Productivity/File utilities- Correct SRPM group.- Fix typo- Update to version 0.6 * read_spaninfo(): a CHM file can have no ResetTable and have a negative length in SpanInfo, which then feeds a negative output length to lzxd_init(), which then sets frame_size to a value of your choosing, the lower 32 bits of output length, larger than LZX_FRAME_SIZE. If the first LZX block is uncompressed, this writes data beyond the end of the window. This issue was raised by ClamAV as CVE-2017-6419. * lzxd_init(), lzxd_set_output_length(), mszipd_init(): due to the issue mentioned above, these functions now reject negative lengths * cabd_read_string(): add missing error check on result of read(). If an mspack_system implementation returns an error, it's interpreted as a huge positive integer, which leads to reading past the end of the stack-based buffer. This issue was raised by ClamAV as CVE-2017-11423 - Add subpackage for helper tools - Run spec-cleaner- Remove problematic libmspack-qtmd_decompress-loop.patch (bnc#912214#c10). Version 0.5 has a correct fix dated 2015-01-05.- Update to version 0.5 * Please read the changelog; too many things to list- Fix possible infinite loop caused DoS (bnc912214, CVE-2014-9556, libmspack-qtmd_decompress-loop.patch).lamb10 16294543970.6-lp152.6.3.10.6-lp152.6.3.10.6alphamspack.hlibmspack.solibmspack.pc/usr/include//usr/lib64//usr/lib64/pkgconfig/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:16844/openSUSE_Leap_15.2_Update/a484bd006f4ff339c7734d5e8d4b3c5a-libmspack.openSUSE_Leap_15.2_Updatedrpmxz5x86_64-suse-linuxLaTeX document, ASCII textpkgconfig filePR'P,B,xJutf-8398aea1866628977ec6603f2e0b4ff53afe14bd3c15a3e701c707178170350db? 7zXZ !t/]"k%ʽdM8I1n",)Djny`<;lrg_.L"P5t;{vY %6'x|(8IKЏxxR4 pz˻Z $!KԥEB՛N-dJ.X%\ms8)bj|kO%]$\58;djpo0/5TߞǙZ!z1_3/ͧ./,a^shW%m b;Do딋uYoj`RHC$}Ch#mAnk%ۉGؖ*KMÑ'#ij? r΍8|z`%5LgXaa*|qsWE٧#THu.ZaIOVLok9C\'{)rKvr@1?5G]Sa|BS4+ zRxT&S\#3:pb8A2kxج/i_ (A iyv%fY*M5:vZ5t]pidk'_1NZJY?^_6(YPd?8\``A 5MAOU.z2H0|%bۦ<T4n^,r+P}([1={/6SIh_5g}ڌ7юۻQFY@8+. "J= tR \ LࡿjD[q,a-D'c/mrȵ`ßOP"hgctA9t8zY}p-XNi$w[ԹOs[F˕7*Qyq:;EqϹrka[`ek/ĝ"=% pΦQ,)tG N\ApDl sijW3:~$ {1)wռ"_B#aV/Mj'Nx\CWUOmj}h~}[.I~_ YZ