python3-libxml2-python-2.9.7-150000.3.57.1<>,h؉dF8p9|1@ȅ*BՌSnmwj,T!#X3WL})c]r8sMHA7Vq.i,B"쨨|y(|_.hjK*קh&Y%=S4 %Q?Pm+.H0" VBۼ/]M6 g}hM_6~w.R>>_?_d - I (,Efj @@ @@ @ @ @@ @@@4@41d1!1(!8!*9"*:%*FPeGPx@HQx@IRx@XRYR\R@]S@^WHbXcXdYLeYQfYTlYVuYh@vZhw[@x\@y]3z^^^^^Cpython3-libxml2-python2.9.7150000.3.57.1Python Bindings for libxml2The libxml2-python package contains a module that permits applications written in the Python programming language to use the interface supplied by the libxml2 library to manipulate XML files. This library allows manipulation of XML files. It includes support for reading, modifying, and writing XML and HTML files. There is DTD support that includes parsing and validation even with complex DTDs, either at parse time or later once the document has been modified.dF8sheep16SUSE Linux Enterprise 15SUSE LLC MIThttps://www.suse.com/Development/Libraries/Pythonhttp://xmlsoft.orglinuxx86_64$$~~;F|WY3, k% j5 IL09 q Y* K VO/ hd('A큤A큤A큤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-libxml2-python-2.9.7-150000.3.57.1.src.rpmlibxml2mod.cpython-36m-x86_64-linux-gnu.so()(64bit)python3-libxml2-pythonpython3-libxml2-python(x86-64)@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2.5)(64bit)libpython3.6m.so.1.0()(64bit)libxml2-2libxml2.so.2()(64bit)libxml2.so.2(LIBXML2_2.4.30)(64bit)libxml2.so.2(LIBXML2_2.5.0)(64bit)libxml2.so.2(LIBXML2_2.5.2)(64bit)libxml2.so.2(LIBXML2_2.5.4)(64bit)libxml2.so.2(LIBXML2_2.5.6)(64bit)libxml2.so.2(LIBXML2_2.5.7)(64bit)libxml2.so.2(LIBXML2_2.5.8)(64bit)libxml2.so.2(LIBXML2_2.5.9)(64bit)libxml2.so.2(LIBXML2_2.6.0)(64bit)libxml2.so.2(LIBXML2_2.6.1)(64bit)libxml2.so.2(LIBXML2_2.6.10)(64bit)libxml2.so.2(LIBXML2_2.6.11)(64bit)libxml2.so.2(LIBXML2_2.6.12)(64bit)libxml2.so.2(LIBXML2_2.6.14)(64bit)libxml2.so.2(LIBXML2_2.6.15)(64bit)libxml2.so.2(LIBXML2_2.6.16)(64bit)libxml2.so.2(LIBXML2_2.6.17)(64bit)libxml2.so.2(LIBXML2_2.6.18)(64bit)libxml2.so.2(LIBXML2_2.6.2)(64bit)libxml2.so.2(LIBXML2_2.6.20)(64bit)libxml2.so.2(LIBXML2_2.6.21)(64bit)libxml2.so.2(LIBXML2_2.6.23)(64bit)libxml2.so.2(LIBXML2_2.6.25)(64bit)libxml2.so.2(LIBXML2_2.6.27)(64bit)libxml2.so.2(LIBXML2_2.6.28)(64bit)libxml2.so.2(LIBXML2_2.6.3)(64bit)libxml2.so.2(LIBXML2_2.6.5)(64bit)libxml2.so.2(LIBXML2_2.6.6)(64bit)libxml2.so.2(LIBXML2_2.6.8)(64bit)libxml2.so.2(LIBXML2_2.7.0)(64bit)libxml2.so.2(LIBXML2_2.7.3)(64bit)libxml2.so.2(LIBXML2_2.8.0)(64bit)libxml2.so.2(LIBXML2_2.9.0)(64bit)libxml2.so.2(LIBXML2_2.9.1)(64bit)python(abi)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)2.9.73.63.0.4-14.6.0-14.0-15.2-14.14.1dBzc_cMCc @bq@b `` @`N@`N@`N@_G@_V ^V@^Y^(9@^ @]fl]@\N[@[@Z@Z@Y@Y*@YéYéY)@YBvYA%@Y"XWXWH6W>@W(VTQ@TWn@TWn@TSyTAdavid.anes@suse.comdavid.anes@suse.comdavid.anes@suse.compmonreal@suse.comdavid.anes@suse.comdavid.anes@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.commgorse@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comaavindraa@gmail.comaavindraa@gmail.comjmatejek@suse.comjmatejek@suse.comjengelh@inai.detchvatal@suse.comtchvatal@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comkstreitova@suse.compsimons@suse.comkstreitova@suse.comsflees@suse.derpm@fthiessen.devcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.com- Security update: * [CVE-2023-29469, bsc#1210412] Hashing of empty dict strings isn't deterministic - Added patch libxml2-CVE-2023-29469.patch * [CVE-CVE-2023-28484, bsc#1210411] NULL dereference in xmlSchemaFixupComplexType - Added patch libxml2-CVE-2023-28484-1.patch - Added patch libxml2-CVE-2023-28484-2.patch - Fix changelog entries in both .changes files. - Apply al patches correctly for libxml2 and python-libxml2.- Add W3C conformance tests to the testsuite (bsc#1204585): * Added file xmlts20080827.tar.gz- Security fixes: * [CVE-2022-40303, bsc#1204366] Fix integer overflows with XML_PARSE_HUGE + Added patch libxml2-CVE-2022-40303.patch * [CVE-2022-40304, bsc#1204367] Fix dict corruption caused by entity reference cycles + Added patch libxml2-CVE-2022-40304.patch- Security fix: [bsc#1201978, CVE-2016-3709] * Cross-site scripting vulnerability after commit 960f0e2 * Add libxml2-CVE-2016-3709.patch- Security fix: [bsc#1199132, CVE-2022-29824] * Integer overflow leading to out-of-bounds write in buf.c (xmlBuf*) and tree.c (xmlBuffer*) * Add libxml2-CVE-2022-29824.patch- Security fix: [bsc#1196490, CVE-2022-23308] * Use-after-free of ID and IDREF attributes. * Add libxml2-CVE-2022-23308.patch- Security fix: [bsc#1186015, CVE-2021-3541] * Exponential entity expansion attack bypasses all existing protection mechanisms. * Add libxml2-CVE-2021-3541.patch- Security fix: [bsc#1185698, bsc#1185879, CVE-2021-3537] * NULL pointer dereference in valid.c:xmlValidBuildAContentModel * Add libxml2-CVE-2021-3537.patch- Security fix: [bsc#1185408, CVE-2021-3518] * Fix use-after-free in xinclude.c:xmlXIncludeDoProcess() * Add libxml2-CVE-2021-3518.patch- Security fix: [bsc#1185410, CVE-2021-3517] * Fix heap-based buffer overflow in entities.c:xmlEncodeEntitiesInternal() * Add libxml2-CVE-2021-3517.patch- Security fix: [bsc#1185409, CVE-2021-3516] * Fix use-after-free in entities.c:xmlEncodeEntitiesInternal() * Add libxml2-CVE-2021-3516.patch- Avoid quadratic checking of identity-constraints: [bsc#1178823] * key/unique/keyref schema attributes currently use qudratic loops to check their various constraints (that keys are unique and that keyrefs refer to existing keys). * This fix uses a hash table to avoid the quadratic behaviour. - Add libxml2-Avoid-quadratic-checking-of-identity-constraints.patch- Security fix: [bsc#1176179, CVE-2020-24977] * xmllint: global-buffer-overflow in xmlEncodeEntitiesInternal - Add patch libxml2-CVE-2020-24977.patch- Fix invalid xmlns references since the fix for CVE-2019-19956 [bsc#1172021] - Remove libxml2-CVE-2019-19956.patch- Security fix: [bsc#1161521, CVE-2019-20388] * Memory leak in xmlSchemaPreRun in xmlschemas.c - Add libxml2-CVE-2019-20388.patch- Security fix: [bsc#1161517, CVE-2020-7595] * xmlStringLenDecodeEntities in parser.c has an infinite loop in a certain end-of-file situation - Add libxml2-CVE-2020-7595.patch- Security fix: [bsc#1159928, CVE-2019-19956] * Memory leak related to newDoc->oldNs in xmlParseBalancedChunkMemoryRecover:parser.c - Add libxml2-CVE-2019-19956.patch- Synchronize changelog files for libxml2 and python-libxml2-python [bsc#1123919]- Added a new configurable variable XPATH_DEFAULT_MAX_NODESET_LENGTH to avoid nodeset limit when processing large XML files [bsc#1135123] * Added libxml2-make-XPATH_MAX_NODESET_LENGTH-configurable.patch- Add libxml2-python3-string-null-check.patch: fix NULL pointer dereference when parsing invalid data (bsc#1065270 glgo#libxml2!15).).- Security fix: [bsc#1088279, CVE-2018-9251][bsc#1105166, CVE-2018-14567] * Infinite loop in LZMA decompression * Fixes CVE-2018-9251 introduced by CVE-2017-18258 * Added libxml2-CVE-2018-14567.patch- Security fix [bsc#1102046, CVE-2018-14404] * NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service * Added libxml2-CVE-2018-14404.patch- Version update to 2.9.7 release: * Bug Fixes: + xmlcatalog: restore ability to query system catalog easily + Fix comparison of nodesets to strings * Improvements: + Add Makefile rules to rebuild HTML man pages + Remove generated file python/setup.py from version control + Fix mixed decls and code in timsort.h + Rework handling of return values in thread tests + Fix unused variable warnings in testrecurse + Fix -Wimplicit-fallthrough warnings + Upgrade timsort.h to latest revision + Fix a couple of warnings in dict.c and threads.c + Fix unused variable warnings in nanohttp.c + Don't include winsock2.h in xmllint.c + Use __linux__ macro in generated code * Portability: + Add declaration for DllMain + Fix preprocessor conditional in threads.h + Fix macro redefinition warning + many Windows specific improvements * Documentation: + xmlcatalog: refresh man page wrt. quering system catalog easily - Includes bug fixes from 2.9.6: * Fix XPath stack frame logic * Report undefined XPath variable error message * Fix regression with librsvg * Handle more invalid entity values in recovery mode * Fix structured validation errors * Fix memory leak in LZMA decompressor * Set memory limit for LZMA decompression * Handle illegal entity values in recovery mode * Fix debug dump of streaming XPath expressions * Fix memory leak in nanoftp * Fix memory leaks in SAX1 parser - Drop libxml2-bug787941.patch * upstreamed in 3157cf4e53c03bc3da604472c015c63141907db8- clean with spec-cleaner- libxml2-python3-unicode-errors.patch: work around an issue with libxml2 supplied error strings being undecodable UTF-8 (bsc#1065270)- convert to singlespec, build a python 3 version - change build instructions to use setup.py (and %python_build macros) instead of makefile-based approach - add python3.6-verify_fd.patch that fixes libxml2 on python 3.6 - rename to python-libxml2-python to conform to package naming policy (PyPI name is "libxml2-python")- Update package summaries and RPM groups. Trim descriptions for size on secondary subpackages. Replace install call by a commonly-used macro.- Add patch to fix TW integration: * libxml2-bug787941.patch- Version update to 2.9.5 release: * Merged all the previous cve fixes that were patched in * Few small tweaks - Remove merged patches: * libxml2-CVE-2016-4658.patch * libxml2-CVE-2017-0663.patch * libxml2-CVE-2017-5969.patch * libxml2-CVE-2017-9047.patch * libxml2-CVE-2017-9048.patch * libxml2-CVE-2017-9049.patch * libxml2-2.9.4-fix_attribute_decoding.patch- Security fix: * libxml2-CVE-2017-0663.patch [bsc#1044337, CVE-2017-0663] * Fix Heap buffer overflow in xmlAddID- Security fix: * libxml2-CVE-2017-5969.patch [bsc#1024989, CVE-2017-5969] * Fix NULL pointer deref in xmlDumpElementContent- Security fixes: * libxml2-CVE-2017-9049.patch [bsc#1039066] * heap-based buffer overflow (xmlDictComputeFastKey func) * libxml2-CVE-2017-9048.patch [bsc#1039063] * stack overflow vulnerability (xmlSnprintfElementContent func) * libxml2-CVE-2017-9047.patch [bsc#1039064] * stack overflow vulnerability (xmlSnprintfElementContent func)- Added libxml2-CVE-2016-4658.patch: Disallow namespace nodes in XPointer ranges. Namespace nodes must be copied to avoid use-after-free errors. But they don't necessarily have a physical representation in a document, so simply disallow them in XPointer ranges [bsc#1005544] [CVE-2016-4658]- add libxml2-2.9.4-fix_attribute_decoding.patch to fix attribute decoding during XML schema validation [bnc#983288]- Update libxml2 to version libxml2-2.9.4. The new version is resistant against CVE-2016-3627, CVE-2016-1833, CVE-2016-1835, CVE-2016-1837, CVE-2016-1836, CVE-2016-1839, CVE-2016-1838, CVE-2016-1840, CVE-2016-4483, CVE-2016-1834, CVE-2016-3705, and CVE-2016-1762. - Remove obsolete patches libxml2-2.9.1-CVE-2016-3627.patch, 0001-Add-missing-increments-of-recursion-depth-counter-to.patch, and libxml2-2.9.3-bogus_UTF-8_encoding_error.patch.- add libxml2-2.9.3-bogus_UTF-8_encoding_error.patch to fix XML push parser that fails with bogus UTF-8 encoding error when multi-byte character in large CDATA section is split across buffer [bnc#962796]- Add libxml2-2.9.1-CVE-2016-3627.patch to fix stack exhaustion while parsing certain XML files in recovery mode (CVE-2016-3627, bnc#972335). - Add 0001-Add-missing-increments-of-recursion-depth-counter-to.patch to improve protection against Billion Laughs Attack (bnc#975947).- Update to new upstream release 2.9.3 (bsc#954429): * Fixes for CVE-2015-8035, CVE-2015-7942, CVE-2015-7941, CVE-2015-1819, CVE-2015-7497, CVE-2015-7498, CVE-2015-5312, CVE-2015-7499, CVE-2015-7500 and CVE-2015-8242 * And other bugfixes - Removed upstream fixed patches: * libxml2-dont_initialize_catalog.patch * 0001-Fix-missing-entities-after-CVE-2014-3660-fix.patch * 0002-Adding-example-from-bugs-738805-to-regression-tests.patch- fix a missing entities after CVE-2014-3660 fix (https://bugzilla.gnome.org/show_bug.cgi?id=738805) * added patches: 0001-Fix-missing-entities-after-CVE-2014-3660-fix.patch 0002-Adding-example-from-bugs-738805-to-regression-tests.patch- fix a regression in libxml2 2.9.2 * https://bugzilla.redhat.com/show_bug.cgi?id=1153753 - add libxml2-dont_initialize_catalog.patch- update to 2.9.2 * drop libxml2-CVE-2014-3660.patch (upstream) * add keyring to verify tarball Security: Fix for CVE-2014-3660 billion laugh variant CVE-2014-0191 Do not fetch external parameter entities Improvements: win32/libxml2.def.src after rebuild in doc elfgcchack.h: more legacy needs xmlSAX2StartElement() and xmlSAX2EndElement() elfgcchack.h: add xmlXPathNodeEval and xmlXPathSetContextNode Provide cmake module Fix a couple of issues raised by make dist Fix and add const qualifiers Preparing for upcoming release of 2.9.2 Fix zlib and lzma libraries check via command line wrong error column in structured error when parsing end tag doc/news.html: small update to avoid line join while generating NEWS. Add methods for python3 iterator Support element node traversal in document fragments xmlNodeSetName: Allow setting the name to a substring of the currently set name Added macros for argument casts adding init calls to xml and html Read parsing entry points Get rid of 'REPLACEMENT CHARACTER' Unicode chars in xmlschemas.c Implement choice for name classes on attributes Two small namespace tweaks xmllint --memory should fail on empty files Cast encoding name to char pointer to match arg type- fix for CVE-2014-3660 (bnc#901546) * denial of service via recursive entity expansion (related to billion laughs) * added libxml2-CVE-2014-3660.patchsheep16 1682343736  !"#$%&'()*+,-./0123456789:;<=>?@2.9.7-150000.3.57.12.9.7-150000.3.57.1__pycache__drv_libxml2.cpython-36.opt-1.pycdrv_libxml2.cpython-36.pyclibxml2.cpython-36.opt-1.pyclibxml2.cpython-36.pycdrv_libxml2.pylibxml2.pylibxml2_python-2.9.7-py3.6.egg-infolibxml2mod.cpython-36m-x86_64-linux-gnu.sopython3-libxml2-pythonTODOlibxml2class.txttestsattribs.pybuild.pycompareNodes.pyctxterror.pycutnpaste.pydtdvalid.pyerror.pyinbuf.pyindexes.pyinput_callback.pyinvalid.xmlnsdel.pyoutbuf.pypush.pypushSAX.pypushSAXhtml.pyreader.pyreader2.pyreader3.pyreader4.pyreader5.pyreader6.pyreader7.pyreader8.pyreadererr.pyreadernext.pyregexp.pyrelaxng.pyresolver.pyschema.pyserialize.pysync.pytest.dtdthread2.pytst.pytst.xmltstLastError.pytstURI.pytstmem.pytstxpath.pyvalid.xmlvalidDTD.pyvalidRNG.pyvalidSchemas.pyvalidate.pywalker.pyxpath.pyxpathext.pyxpathleak.pyxpathns.pyxpathret.py/usr/lib64/python3.6/site-packages//usr/lib64/python3.6/site-packages/__pycache__//usr/share/doc/packages//usr/share/doc/packages/python3-libxml2-python//usr/share/doc/packages/python3-libxml2-python/tests/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:28753/SUSE_SLE-15_Update/e5a626e0fa8a218d4466c6fb40d5e2d6-python-libxml2-python.SUSE_SLE-15_Updatedrpmxz5x86_64-suse-linuxdirectorypython 3.6 byte-compiledPython script, ISO-8859 text executablePython script, ASCII text executableASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=3cf89719b7e8c1e52c0a8f9f37074e9eaf3a0053, strippedexported SGML document, ASCII textPython script, ISO-8859 text executable, with very long lines-R,R,R,R,R,R,R,PRRRRRR R+R'R"RRR!R%RRRRR*RRR(R&RRRRRR R)RR$RR R RRR R#RR RRRӤDFBCJutf-8583ec8c6f295eb8787eb4bea186be7e4d3413ebd4eeee05dca151825727bc4e5? 7zXZ !t/|]"k%ΰa Ó\ǩoiițrO~%#ŴCROQʄKhvo,=$܅ x*~}׶ 1m6$vO 8ԟ6B^gń2WVQD'/#L/d{B8Fnw);ٍ]Qeef럁`I$-U^]Ȗ NpHd= (IK~-1ڠtEtUo}`>dY5vQ"ɷi{y=O&sL6C$kf4gw+־4<*ܩe+˩?{2aS7Gq?zg,%xC-stlrYfY8$F<%3#-'8vƘZ~w}FUW@\oöf݇Hq KeE*ɒcZAOU- :ncNw o* r '2|k`,c]E@˹e^3 2 ; tK /Yi]`fH8bmf \ [W4z/S0$`Ǣ2ZG RЀ$%f/֦%NSk(zfkJ<|=+[nq*KLn߿-Cr VD$mHd*(OriIJjK7+Zrܾ|  &cZIJ\m>z}v)7=ͅk\L{NtJiTHp@)^qkꈄUsTSg [lk<!cI?_7gGN*p/>iƢNH< %kg6NK|-J*;3*Ll<*ߌ"ڙYփ\5wr00H@'L "*!}=E"YmTSՐJNr z&,%9]%΢GW2 !>8?4(FGqN檶 %VMT;UۅfAփu,6j`Ak d_ޔ9 }0iOvqjr^՗Q<+ܚ7S8)!Ϫ