libmspack0-0.6-3.14.1<>,a4p9|5a+Vr%d7 495X5J̕!,~)q+W31=ISvK򥽵ڻDIc+X~j.7`c0L}.mǻDCp(43P(o)O:6@NTqi *ެcsxS+pv$^>x\e̢ =cܙ>!bq# '9"DE>.Q 2VaȨ9r6@97[hrd?+4Q15iN>C(?d   Q 1R[ q     ,Ll   (8 9< : >@BFGHI$X,Y<Z`[d\p]^b0cdUeZf]l_utvw`xyzClibmspack00.63.14.1Library That Implements Different Microsoft CompressionsThe purpose of libmspack is to provide both compression and decompression of some loosely related file formats used by Microsoft. Currently the most common formats are implemented.a4goat16SUSE Linux Enterprise 15SUSE LLC LGPL-2.1https://www.suse.com/System/Librarieshttp://www.cabextract.org.uk/libmspack/linuxx86_64)`g>X?A큤a4a4a4YNUqYYYsUqY2eec0d93a9cfd1a297536f629ed06d16e3935e381a91485d0a30e6374967ebfa3b53007433803d17c51466a0b229d1e65ee97fdcbdc1f73817d1dc77f0fb30cfa190dc9c8043755d90f8b0a75fa66b9e42d4af4c980bf5ddc633f0124db3cee72be3032b574530cd3d9d24a5dc5d54276db376aee8f484ac3e232567f6c8bd33f9684b051faa8284c32e36fc98b117c709053b7b771d038770639405ba07a00d4b42024cdf112c38de8e198017e931d952e1a2871664f3372c7d3cca50cc7a15libmspack.so.0.1.0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootlibmspack-0.6-3.14.1.src.rpmlibmspacklibmspack.so.0()(64bit)libmspack0libmspack0(x86-64)@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1aՈ@`]\[ZaZ]@Z]@Z\T\@TD@TC@danilo.spinella@suse.comdanilo.spinella@suse.comkstreitova@suse.commcalabkova@suse.commcalabkova@suse.comadam.majer@suse.dejengelh@inai.demardnh@gmx.demardnh@gmx.desbrabec@suse.czp.drouand@gmail.comsbrabec@suse.cz- chmextract.c add anti "../" and leading slash protection to chmextract (CVE-2018-18586.patch, bsc#1113040) * cve-2018-18586.patch- There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (CVE-2018-14679, bsc#1103032) * libmspack-CVE-2018-14679.patch - Bad KWAJ file header extensions could cause a one or two byte overwrite (CVE-2018-14681, bsc#1103032). * libmspack-CVE-2018-14681.patch - There is an off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682, bsc#1103032). * libmspack-CVE-2018-14682.patch- add libmspack-0.6alpha-CVE-2019-1010305.patch to fix a buffer overflow in chmd_read_headers(): a CHM file name beginning "::" but shorter than 33 bytes will lead to reading past the freshly-allocated name buffer - checks for specific control filenames didn't take length into account [bsc#1141680] [CVE-2019-1010305]- Enable build-time tests (bsc#1130489) * Added patch libmspack-failing-tests.patch- Added patches: * libmspack-resize-buffer.patch -- CAB block input buffer is one byte too small for maximal Quantum block. * libmspack-fix-bounds-checking.patch -- Fix off-by-one bounds check on CHM PMGI/PMGL chunk numbers and reject empty filenames. * libmspack-reject-blank-filenames.patch -- Avoid returning CHM file entries that are "blank" because they have embedded null bytes. * (the last two patches were modified by removing unneeded part in order to make them more independent) - Fixed bugs: * CVE-2018-18584 (bsc#1113038) * CVE-2018-18585 (bsc#1113039)- Correct mspack-tools group to Productivity/File utilities- Correct SRPM group.- Fix typo- Update to version 0.6 * read_spaninfo(): a CHM file can have no ResetTable and have a negative length in SpanInfo, which then feeds a negative output length to lzxd_init(), which then sets frame_size to a value of your choosing, the lower 32 bits of output length, larger than LZX_FRAME_SIZE. If the first LZX block is uncompressed, this writes data beyond the end of the window. This issue was raised by ClamAV as CVE-2017-6419. * lzxd_init(), lzxd_set_output_length(), mszipd_init(): due to the issue mentioned above, these functions now reject negative lengths * cabd_read_string(): add missing error check on result of read(). If an mspack_system implementation returns an error, it's interpreted as a huge positive integer, which leads to reading past the end of the stack-based buffer. This issue was raised by ClamAV as CVE-2017-11423 - Add subpackage for helper tools - Run spec-cleaner- Remove problematic libmspack-qtmd_decompress-loop.patch (bnc#912214#c10). Version 0.5 has a correct fix dated 2015-01-05.- Update to version 0.5 * Please read the changelog; too many things to list- Fix possible infinite loop caused DoS (bnc912214, CVE-2014-9556, libmspack-qtmd_decompress-loop.patch)./sbin/ldconfig/sbin/ldconfiglibmspackgoat16 16415496200.6-3.14.10.6-3.14.10.6-3.14.10.6-3.14.1libmspack.so.0libmspack.so.0.1.0libmspack0AUTHORSCOPYING.LIBChangeLogREADMETODO/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libmspack0/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:22325/SUSE_SLE-15_Update/6e0c48d65487ba03676ae772ed09c42b-libmspack.SUSE_SLE-15_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=b82fc5e3bd6598f56b3efe4b22f346c311a2eb62, strippeddirectoryASCII textUTF-8 Unicode textC source, ASCII textPRRRRRy~U6utf-891d424677790a61ded31e755a3e8b7f395ce62060faa4c6c5269055dec3f0e3a?7zXZ !t/39]"k%adM8I1d9y/>Zj+_cwZ8o5 Ԍh$fybJTF*׶,oycG]Wu5a `xcDl#&Vd;hۭK Ÿ *dyuwai"И\W, tw ϴbs/EqTOO'#'yz;˸kO (UT6VfQRn+) u;B8u?owk}4 :BT{^&c)]c"Zqn5[á}ꭊJ\ "H*{&>yy{H/wbR\Tfq-㸾kN?%h4C7<>IlǦgD7kg\%Ǫca1ash$ZPV==Y`۝4:Xa;㡯=9h /,.Z$?B4RZ udxT˾0HUE p:"8WHv&THCGW~'O@6y۾y~M^췞j%Βl]&j+HE 6DL=Vo{3/TVݫ2W;'rVcJhAcRB^FFf;볙w?g (ۻaʥ3 ` pQO*7M"y]:ѺBC5ftP<7gua/~Lm4H>8ySo5k `N! n:2!0-JSK˘۵&3i>TxoC KPqPZT \б,\?*49 X }IΕu"aiP_ߢ ]IFB+|fM^TKEw\R >IF/הּ w;<խK96ϗidR|.W 2.kV(=wLL:Ld4ަŎ;m_xeay (NU*5 YZ