mspack-tools-0.6-3.14.1 >  A a@p9|\fܨ7qG-[c_/J>7\I~<ߚs$ŮRL4EX@_FPd~ KI-(.܆d[FfR|4Vڼ~m4;/ˁIm6&sJ5]3m~KQ}ۢ7ݗa>hE3pY:K.Bʠ>=-Go3 rݞv!MM6o#ȩyӔln&>3ڤ98ڼ_181acd1f58bac0caa109d86c6b947e11d7a88d9ac215d540a49f1a3d0bff14639670f243b7dfdca939fb54eb718f28db3ebd0eb13̉a@p9|uHl2϶mYz :?rХ+:h,f҈jS4ӥlTu-BQtL?+٘L x!UuCZ.R!-a̰eߦ{?Q҇,ǣ<fz\7NI#>L+nk Br= |0 #bVt)ܕx^B7q:Ć-D\Ùyn*vj 0+GYvԏJ{ፈ09 H>p>P?@d  S<@LPi     , 0 4DXl   (8 9 : FGHIXY\]^b(cdMeRfUlWuhvxw|xyz<Cmspack-tools0.63.14.1Library That Implements Different Microsoft CompressionsThe purpose of libmspack is to provide both compression and decompression of some loosely related file formats used by Microsoft. Currently the most common formats are implemented. This subpacke provides useful programs that make use of libmspack. * cabrip - Extracts any CAB files embedded in another file. * chmextract - Extracts all files in a CHM file to disk. * msexpand - Expands an SZDD or KWAJ file. * oabextract - Extracts an Exchange Offline Address Book (.LZX) file.a6s390zl3ahSUSE Linux Enterprise 15SUSE LLC LGPL-2.1https://www.suse.com/Productivity/File utilitieshttp://www.cabextract.org.uk/libmspack/linuxs390x((((xa6a6a6a667b4a1851f7fd5ce0ef6b46d92293fad9baa38550889723aa3c24dcb13c8fc9e2749a9c370121ede92ec39d35269f92d968468d458d108f1db1046ef82e0984df2ff5b962069db8f9255dc703241f7b58be72c97cbda63c4dae4f0b19df0da9fcee37cfb36b3b297a2316517f68ea109d210c6ef2946d8f64f76f973068d7636rootrootrootrootrootrootrootrootlibmspack-0.6-3.14.1.src.rpmmspack-toolsmspack-tools(s390-64)@@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libmspack.so.0()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1aՈ@`]\[ZaZ]@Z]@Z\T\@TD@TC@danilo.spinella@suse.comdanilo.spinella@suse.comkstreitova@suse.commcalabkova@suse.commcalabkova@suse.comadam.majer@suse.dejengelh@inai.demardnh@gmx.demardnh@gmx.desbrabec@suse.czp.drouand@gmail.comsbrabec@suse.cz- chmextract.c add anti "../" and leading slash protection to chmextract (CVE-2018-18586.patch, bsc#1113040) * cve-2018-18586.patch- There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (CVE-2018-14679, bsc#1103032) * libmspack-CVE-2018-14679.patch - Bad KWAJ file header extensions could cause a one or two byte overwrite (CVE-2018-14681, bsc#1103032). * libmspack-CVE-2018-14681.patch - There is an off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682, bsc#1103032). * libmspack-CVE-2018-14682.patch- add libmspack-0.6alpha-CVE-2019-1010305.patch to fix a buffer overflow in chmd_read_headers(): a CHM file name beginning "::" but shorter than 33 bytes will lead to reading past the freshly-allocated name buffer - checks for specific control filenames didn't take length into account [bsc#1141680] [CVE-2019-1010305]- Enable build-time tests (bsc#1130489) * Added patch libmspack-failing-tests.patch- Added patches: * libmspack-resize-buffer.patch -- CAB block input buffer is one byte too small for maximal Quantum block. * libmspack-fix-bounds-checking.patch -- Fix off-by-one bounds check on CHM PMGI/PMGL chunk numbers and reject empty filenames. * libmspack-reject-blank-filenames.patch -- Avoid returning CHM file entries that are "blank" because they have embedded null bytes. * (the last two patches were modified by removing unneeded part in order to make them more independent) - Fixed bugs: * CVE-2018-18584 (bsc#1113038) * CVE-2018-18585 (bsc#1113039)- Correct mspack-tools group to Productivity/File utilities- Correct SRPM group.- Fix typo- Update to version 0.6 * read_spaninfo(): a CHM file can have no ResetTable and have a negative length in SpanInfo, which then feeds a negative output length to lzxd_init(), which then sets frame_size to a value of your choosing, the lower 32 bits of output length, larger than LZX_FRAME_SIZE. If the first LZX block is uncompressed, this writes data beyond the end of the window. This issue was raised by ClamAV as CVE-2017-6419. * lzxd_init(), lzxd_set_output_length(), mszipd_init(): due to the issue mentioned above, these functions now reject negative lengths * cabd_read_string(): add missing error check on result of read(). If an mspack_system implementation returns an error, it's interpreted as a huge positive integer, which leads to reading past the end of the stack-based buffer. This issue was raised by ClamAV as CVE-2017-11423 - Add subpackage for helper tools - Run spec-cleaner- Remove problematic libmspack-qtmd_decompress-loop.patch (bnc#912214#c10). Version 0.5 has a correct fix dated 2015-01-05.- Update to version 0.5 * Please read the changelog; too many things to list- Fix possible infinite loop caused DoS (bnc912214, CVE-2014-9556, libmspack-qtmd_decompress-loop.patch).s390zl3a 16415496220.6-3.14.10.6-3.14.1cabripchmextractmsexpandoabextract/usr/bin/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:22325/SUSE_SLE-15_Update/6e0c48d65487ba03676ae772ed09c42b-libmspack.SUSE_SLE-15_Updatecpioxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=d025082c82dd721dc6d5776701e063d30123cfbb, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=4727ea2622ddcbc3a6fc2cb38c05284e598f1943, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=2f9cee66f1fc19a092572a5e0195e2a52cdf9d51, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=b88b9438325f7d4aeba58ac7e27d2b55e96c95a2, for GNU/Linux 3.2.0, stripped RRRRRRRRRRRRRRRRR{nDA#utf-8d9a65ce7df1ee7977bc409d0d5121a9b82cb0627d9b9fb8d1e6f748273cdb30d? 7zXZ !t/1] crv9w582_mһʬLvgM|It~ʄ ;lf\ȉ|̶j"rF{\ok u5j&h6v@[}s˱#y$p*Ѥ -H6n;DspkYtlOЎ(CbH[GT-M@ʿiX"`EZ|u\F #{$Co&\joCCx?RowZM]Ed@>ol&F;NEƹ毯rJǷN| f4Jk^`oofݚ ǒWWƪٳ9Wzcur[D̿G9/bZ>.q).IQv* `ꌐ0ԸMG7Q^]5ƆHKSc {>9F yK`ͦPҰ`2  J+A~_e=[?ԑHӱ<\Aeuq-RUC4)}NHL_15 L̀K&4p,AM?a_|udkgEJ}*l!;-Z Q Y4~nrqQfɹ*2La/'}Krt f[?%O%)s_YoSC''P^t"o:X+=ұЂp9}fF9aUE%Q ~ڐ^O'E"_a A+fCi8<@ #VrbWs;ωh&EuFxl[WChDEsd+)'<[G9&[hF6ϱ}0 w7'"A-1G)B =  QYr%IiѬSdtAuS1r<{\i_p-w+j#&:ir&pȍD]*[sĨd*Q돢= J~c Um2])M*oX>TZcVk߫QvcZ}_Pcj=!WpDYfdXMGmMPQgpV{_?/]T–]%7HX&%ԁ@EZJmgf!6. H1]Jv6j} KS\iGln˹ KY{:~ _?RB6}Z_ԷXT~$%3P58vݦnv۪fUf 2'#_16 08O0կ |Ux-1u7c/[>> cAG**sAPA'*{=S?iT XݺR6Dһ6ѐ@Fd"ڈk0g`pz- 7T3\ju.>o:3Ο$c-]~t%A8[a[ϺD,:t il"bPGGhlhB~GB?;ߤ4;GL]ײݢv:i靽9G))3ȣ=Da9[ɱSI_Fcf< ‡BLJ)ywD=*-*!oz+%pfm`/ h1ш1{F 8zϒ9^R;B yh7yd+ߘ>C^dd&uT[LGQYbFPx*F9ʋRoUEN$$3u'[TC'[?puAyG|qT?}daAlevtxi119| ncj[85Y!§Ƣ+Y~l2)h#%ԬCp6[Х$"쩅hNJt]mAq$:Z8,.[[ ݏ6UOrI ;R={SZjK`v,^`Ǒu۩[4[]) &1p[|6oIz>{9 OiA^x.YB+D2>ux*߮RGQna7-7%γۀl#itX*wpA@THg_[TdR(zc,1θFNٻgG7 {f[a KW' jN5u8.0/{]?7ܩM(˰-K10P^^&%Լ (K#Qd*n M%égM@DuWOCC1ȷ2\K,S:UTu>+rJRp ߝy1^('!26tД -KPRn Կh:9>d ҆ ?`= 3\N(*~߫Y$$W!jߤ^}T"z.V6n,]c褜EQ]/]YHaULF~/n897k{,w|G s턈IYwm\f@=p $H;M ѫ.yQ0\:epYe}ׁqސ;H;aϴoʭweڒ9#?IlwGUܻ(Ŋf{BH p[P Dˏgp /K~"Gg)q(0b=E G֏+ A63!x>cg-\X.LT~Z\;;j-BgiUH.W+&oWvD'cQ,H$U*'wj͍5hAsUpqBJaE@8JA=9dBWۉ~->:.Ok2y,a`ǘɁ+9\J,܇QEyP.,mDy|IN S&iԫ${VW"Z&+S9=JB~F (Q) AƮpNliJ/Y} Z [YjeJsKֳ"^Sw%q協J7XCRʤpۚ?y&Rz FEӠXK?]{@dPɅFhw}~/NJ|Y)%0t3ɸDalcj7sH41եOT\@%z4MK-/zNb9w p44h*G$5B(.V/*}bs*DU򆠊(9ISI Po82MIaؘOr9([KRQ2KKi/ ~ tڰ3|=H1Ó4 A,WW 5L1pNCFPNmr'HxIBzUc=9>C?C>h ),V,7K7Ja9>=]\/pw34\B@&E굜j *O%oхozAJ^Ev# pTk(WҀDbUќHa ?5eRHHߴ׬rW<zXx$ʡX wGec+ɄR%Y8)?qs.O֣uڴ"T!mIyکKEFlϘmpmA9VR&WRCHJz>?GgB8V &p_WiE] P$g|)8^%fM+߮Oi3F"m܅~@ >PD˴Фydɀx ." h$lYG =ۺza}A"y N&bH}#ʼTk9Cj mױg:\*X{4wW h!}*s0T!- w5F^(/) Y/e^,p֤ͳPb=4{bYo:pF!<\t< @ȭw)|Sjzɻ^ [;A&S2͍F+Peq7ҬqiyR_BEi Xrr+)V؞] ^fxapڿvDJG@ џTŤW$rJ3,5YusH:!_|.cѶ YZ