libxml2-devel-2.9.7-150000.3.51.1<>,XcO=p9|P:5<rP Tܫ^C,Ѯ'm6{چjUUULHJ]hpQKm$Ko|<"53Q-kSk!}%ǐXEACݳ.0_\hT6H=fKj,[.sQ;}.əKkD6tBF"T]MK\cZWr -a~6f)Vj@o4~ө,JOގ>>OH?O8d $ _(,<@Yz~ >> L> > > > >>J>> (  (+84$9$:$FBGB>HC>ID>XDYD\E$>]F>^H bIcJLdJeJfJlJuJ>vK wL>xM>yNzNNNNO4Clibxml2-devel2.9.7150000.3.51.1Development files for libxml2, an XML manipulation libraryThe XML C library can load and save extensible data structures or manipulate any kind of XML files. This subpackage contains header files for developing applications that want to make use of libxml.cO=ibs-power9-11SUSE Linux Enterprise 15SUSE LLC MIThttps://www.suse.com/Development/Libraries/C and C++http://xmlsoft.orglinuxppc64lej U$>U %)'  mh9f\ &%D lf h56 )stP91?R !' S@K hNQAA큤AA큤A큤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.so.2.9.7rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootlibxml2-2.9.7-150000.3.51.1.src.rpmlibtool(/usr/lib64/libxml2.la)libxml2-devellibxml2-devel(ppc-64)pkgconfig(libxml-2.0)@@    /bin/sh/usr/bin/pkg-configglibc-devellibxml2-2libxml2-toolspkgconfig(liblzma)pkgconfig(zlib)readline-develrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)2.9.72.9.73.0.4-14.6.0-14.0-15.2-14.14.1cMCc @bq@b `` @`N@`N@`N@_G@_V ^V@^Y^(9@^ @]fl]@[@[@Z@YéYéY)@YBvYA%@Y"XWXWH6W>@W(VTQ@TWn@TWn@TSyTAdavid.anes@suse.compmonreal@suse.comdavid.anes@suse.comdavid.anes@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comaavindraa@gmail.comjengelh@inai.detchvatal@suse.comtchvatal@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comkstreitova@suse.compsimons@suse.comkstreitova@suse.comsflees@suse.derpm@fthiessen.devcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.com- Security fixes: * [CVE-2022-40303, bsc#1204366] Fix integer overflows with XML_PARSE_HUGE + Added patch libxml2-CVE-2022-40303.patch * [CVE-2022-40304, bsc#1204367] Fix dict corruption caused by entity reference cycles + Added patch libxml2-CVE-2022-40304.patch- Security fix: [bsc#1201978, CVE-2016-3709] * Cross-site scripting vulnerability after commit 960f0e2 * Add libxml2-CVE-2016-3709.patch- Security fix: [bsc#1199132, CVE-2022-29824] * Integer overflow leading to out-of-bounds write in buf.c (xmlBuf*) and tree.c (xmlBuffer*) * Add libxml2-CVE-2022-29824.patch- Security fix: [bsc#1196490, CVE-2022-23308] * Use-after-free of ID and IDREF attributes. * Add libxml2-CVE-2022-23308.patch- Security fix: [bsc#1186015, CVE-2021-3541] * Exponential entity expansion attack bypasses all existing protection mechanisms. * Add libxml2-CVE-2021-3541.patch- Security fix: [bsc#1185698, bsc#1185879, CVE-2021-3537] * NULL pointer dereference in valid.c:xmlValidBuildAContentModel * Add libxml2-CVE-2021-3537.patch- Security fix: [bsc#1185408, CVE-2021-3518] * Fix use-after-free in xinclude.c:xmlXIncludeDoProcess() * Add libxml2-CVE-2021-3518.patch- Security fix: [bsc#1185410, CVE-2021-3517] * Fix heap-based buffer overflow in entities.c:xmlEncodeEntitiesInternal() * Add libxml2-CVE-2021-3517.patch- Security fix: [bsc#1185409, CVE-2021-3516] * Fix use-after-free in entities.c:xmlEncodeEntitiesInternal() * Add libxml2-CVE-2021-3516.patch- Avoid quadratic checking of identity-constraints: [bsc#1178823] * key/unique/keyref schema attributes currently use qudratic loops to check their various constraints (that keys are unique and that keyrefs refer to existing keys). * This fix uses a hash table to avoid the quadratic behaviour. - Add libxml2-Avoid-quadratic-checking-of-identity-constraints.patch- Security fix: [bsc#1176179, CVE-2020-24977] * xmllint: global-buffer-overflow in xmlEncodeEntitiesInternal - Add patch libxml2-CVE-2020-24977.patch- Fix invalid xmlns references since the fix for CVE-2019-19956 [bsc#1172021] - Remove libxml2-CVE-2019-19956.patch- Security fix: [bsc#1161521, CVE-2019-20388] * Memory leak in xmlSchemaPreRun in xmlschemas.c - Add libxml2-CVE-2019-20388.patch- Security fix: [bsc#1161517, CVE-2020-7595] * xmlStringLenDecodeEntities in parser.c has an infinite loop in a certain end-of-file situation - Add libxml2-CVE-2020-7595.patch- Security fix: [bsc#1159928, CVE-2019-19956] * Memory leak related to newDoc->oldNs in xmlParseBalancedChunkMemoryRecover:parser.c - Add libxml2-CVE-2019-19956.patch- Synchronize changelog files for libxml2 and python-libxml2-python [bsc#1123919]- Added a new configurable variable XPATH_DEFAULT_MAX_NODESET_LENGTH to avoid nodeset limit when processing large XML files [bsc#1135123] * Added libxml2-make-XPATH_MAX_NODESET_LENGTH-configurable.patch- Security fix: [bsc#1088279, CVE-2018-9251][bsc#1105166, CVE-2018-14567] * Infinite loop in LZMA decompression * Fixes CVE-2018-9251 introduced by CVE-2017-18258 * Added libxml2-CVE-2018-14567.patch- Security fix [bsc#1102046, CVE-2018-14404] * NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service * Added libxml2-CVE-2018-14404.patch- Version update to 2.9.7 release: * Bug Fixes: + xmlcatalog: restore ability to query system catalog easily + Fix comparison of nodesets to strings * Improvements: + Add Makefile rules to rebuild HTML man pages + Remove generated file python/setup.py from version control + Fix mixed decls and code in timsort.h + Rework handling of return values in thread tests + Fix unused variable warnings in testrecurse + Fix -Wimplicit-fallthrough warnings + Upgrade timsort.h to latest revision + Fix a couple of warnings in dict.c and threads.c + Fix unused variable warnings in nanohttp.c + Don't include winsock2.h in xmllint.c + Use __linux__ macro in generated code * Portability: + Add declaration for DllMain + Fix preprocessor conditional in threads.h + Fix macro redefinition warning + many Windows specific improvements * Documentation: + xmlcatalog: refresh man page wrt. quering system catalog easily - Includes bug fixes from 2.9.6: * Fix XPath stack frame logic * Report undefined XPath variable error message * Fix regression with librsvg * Handle more invalid entity values in recovery mode * Fix structured validation errors * Fix memory leak in LZMA decompressor * Set memory limit for LZMA decompression * Handle illegal entity values in recovery mode * Fix debug dump of streaming XPath expressions * Fix memory leak in nanoftp * Fix memory leaks in SAX1 parser - Drop libxml2-bug787941.patch * upstreamed in 3157cf4e53c03bc3da604472c015c63141907db8- Update package summaries and RPM groups. Trim descriptions for size on secondary subpackages. Replace install call by a commonly-used macro.- Add patch to fix TW integration: * libxml2-bug787941.patch- Version update to 2.9.5 release: * Merged all the previous cve fixes that were patched in * Few small tweaks - Remove merged patches: * libxml2-CVE-2016-4658.patch * libxml2-CVE-2017-0663.patch * libxml2-CVE-2017-5969.patch * libxml2-CVE-2017-9047.patch * libxml2-CVE-2017-9048.patch * libxml2-CVE-2017-9049.patch * libxml2-2.9.4-fix_attribute_decoding.patch- Security fix: * libxml2-CVE-2017-0663.patch [bsc#1044337, CVE-2017-0663] * Fix Heap buffer overflow in xmlAddID- Security fix: * libxml2-CVE-2017-5969.patch [bsc#1024989, CVE-2017-5969] * Fix NULL pointer deref in xmlDumpElementContent- Security fixes: * libxml2-CVE-2017-9049.patch [bsc#1039066] * heap-based buffer overflow (xmlDictComputeFastKey func) * libxml2-CVE-2017-9048.patch [bsc#1039063] * stack overflow vulnerability (xmlSnprintfElementContent func) * libxml2-CVE-2017-9047.patch [bsc#1039064] * stack overflow vulnerability (xmlSnprintfElementContent func)- Added libxml2-CVE-2016-4658.patch: Disallow namespace nodes in XPointer ranges. Namespace nodes must be copied to avoid use-after-free errors. But they don't necessarily have a physical representation in a document, so simply disallow them in XPointer ranges [bsc#1005544] [CVE-2016-4658]- add libxml2-2.9.4-fix_attribute_decoding.patch to fix attribute decoding during XML schema validation [bnc#983288]- Update libxml2 to version libxml2-2.9.4. The new version is resistant against CVE-2016-3627, CVE-2016-1833, CVE-2016-1835, CVE-2016-1837, CVE-2016-1836, CVE-2016-1839, CVE-2016-1838, CVE-2016-1840, CVE-2016-4483, CVE-2016-1834, CVE-2016-3705, and CVE-2016-1762. - Remove obsolete patches libxml2-2.9.1-CVE-2016-3627.patch, 0001-Add-missing-increments-of-recursion-depth-counter-to.patch, and libxml2-2.9.3-bogus_UTF-8_encoding_error.patch.- add libxml2-2.9.3-bogus_UTF-8_encoding_error.patch to fix XML push parser that fails with bogus UTF-8 encoding error when multi-byte character in large CDATA section is split across buffer [bnc#962796]- Add libxml2-2.9.1-CVE-2016-3627.patch to fix stack exhaustion while parsing certain XML files in recovery mode (CVE-2016-3627, bnc#972335). - Add 0001-Add-missing-increments-of-recursion-depth-counter-to.patch to improve protection against Billion Laughs Attack (bnc#975947).- Update to new upstream release 2.9.3 (bsc#954429): * Fixes for CVE-2015-8035, CVE-2015-7942, CVE-2015-7941, CVE-2015-1819, CVE-2015-7497, CVE-2015-7498, CVE-2015-5312, CVE-2015-7499, CVE-2015-7500 and CVE-2015-8242 * And other bugfixes - Removed upstream fixed patches: * libxml2-dont_initialize_catalog.patch * 0001-Fix-missing-entities-after-CVE-2014-3660-fix.patch * 0002-Adding-example-from-bugs-738805-to-regression-tests.patch- fix a missing entities after CVE-2014-3660 fix (https://bugzilla.gnome.org/show_bug.cgi?id=738805) * added patches: 0001-Fix-missing-entities-after-CVE-2014-3660-fix.patch 0002-Adding-example-from-bugs-738805-to-regression-tests.patch- fix a regression in libxml2 2.9.2 * https://bugzilla.redhat.com/show_bug.cgi?id=1153753 - add libxml2-dont_initialize_catalog.patch- update to 2.9.2 * drop libxml2-CVE-2014-3660.patch (upstream) * add keyring to verify tarball Security: Fix for CVE-2014-3660 billion laugh variant CVE-2014-0191 Do not fetch external parameter entities Improvements: win32/libxml2.def.src after rebuild in doc elfgcchack.h: more legacy needs xmlSAX2StartElement() and xmlSAX2EndElement() elfgcchack.h: add xmlXPathNodeEval and xmlXPathSetContextNode Provide cmake module Fix a couple of issues raised by make dist Fix and add const qualifiers Preparing for upcoming release of 2.9.2 Fix zlib and lzma libraries check via command line wrong error column in structured error when parsing end tag doc/news.html: small update to avoid line join while generating NEWS. Add methods for python3 iterator Support element node traversal in document fragments xmlNodeSetName: Allow setting the name to a substring of the currently set name Added macros for argument casts adding init calls to xml and html Read parsing entry points Get rid of 'REPLACEMENT CHARACTER' Unicode chars in xmlschemas.c Implement choice for name classes on attributes Two small namespace tweaks xmllint --memory should fail on empty files Cast encoding name to char pointer to match arg type- fix for CVE-2014-3660 (bnc#901546) * denial of service via recursive entity expansion (related to billion laughs) * added libxml2-CVE-2014-3660.patchibs-power9-11 1666167613  !"#$%&'()*+,-./0123456789:;<=>2.9.7-150000.3.51.12.9.7-150000.3.51.12.9.7 xml2-configlibxmllibxml2libxmlDOCBparser.hHTMLparser.hHTMLtree.hSAX.hSAX2.hc14n.hcatalog.hchvalid.hdebugXML.hdict.hencoding.hentities.hglobals.hhash.hlist.hnanoftp.hnanohttp.hparser.hparserInternals.hpattern.hrelaxng.hschemasInternals.hschematron.hthreads.htree.huri.hvalid.hxinclude.hxlink.hxmlIO.hxmlautomata.hxmlerror.hxmlexports.hxmlmemory.hxmlmodule.hxmlreader.hxmlregexp.hxmlsave.hxmlschemas.hxmlschemastypes.hxmlstring.hxmlunicode.hxmlversion.hxmlwriter.hxpath.hxpathInternals.hxpointer.hcmakelibxml2libxml2-config.cmakelibxml2.lalibxml2.solibxml-2.0.pcxml2Conf.shaclocallibxml.m4xml2-config.1.gzlibxml.3.gz/usr/bin//usr/include//usr/include/libxml2//usr/include/libxml2/libxml//usr/lib64//usr/lib64/cmake//usr/lib64/cmake/libxml2//usr/lib64/pkgconfig//usr/share//usr/share/aclocal//usr/share/man/man1//usr/share/man/man3/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:25882/SUSE_SLE-15_Update/99fc00ffab7d65536070d07045275b78-libxml2.SUSE_SLE-15_Updatedrpmxz5ppc64le-suse-linuxPOSIX shell script, ASCII text executabledirectoryC source, ASCII textASCII textlibtool library filepkgconfig fileM4 macro processor script, ASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RPPRkrG3ϼQutf-8945eb59f8ed308800972240b93f21eac9e16d8596fef85903aeb73361a9fbaf2? 7zXZ !t/]"k%H6_.*O?˜7:qs* vZ HOs zr3 fab/}4 hY:q|?1̆xfNMq-@׈W JΩ PqU)&GQi͇DWCo#\_Uh3rif+ %%Ķsu*ŨڿjbyhQUwx6/^XW]KJ;&CӈEA3ZrIǩ 0~9'l`RMHSifwCGmʵQcM~|%_;zՙihRO'AC8_["/f*9;(880`S0ղp-V3Ә)L rk,l؏JiŌ*Hv&x.Gk&Uz̉P3i9‡0%BEVa%aH Bь9>QQ kCZw˱z-LҜqn %ʜՒ6ʕm!x*'ۻ܎S+60;.ΆNZzqT_i$(";ھF˚=" ϯ/ǃc]XQ kH]9NQͤgMJCU9{6o*_VNIfx9_[synAqQ H]a(g<1wpşvʯt(cv&Ceg }j%A?!''lz~ZKepT|Hegt9傡.IbKys&I1SpaC.H Y ydR_V6nt0먅Å>”B1sDˑӬ*Iy:2LR=G>򮋆.-~FWj G`=]AtKYl Sô:ƭd?D~:cH'NP V= g$萵`j'in_%zXR8m ,R YZ