wavpack-devel-5.4.0-4.12.1 >  A b1p9| i(d4=x ǀ{"\fMe 7s4OĺnZ?ߓ5t('~N$Ou"rI pb&X(CwT~A`7.)R^Zx&L.z3g3rM~gi୕(~#)"dnƈT6 <6"eR.j.u\h%I\FF+{O!L_'N/SPd4247ef6967e0100efd94bdfe8b5e44bc00ab696cce4109ebbc0277fc9ca1fffcf24bf440b52134f3e42f720550f614b866c32df6Pb1p9|:[a"ĢswpA@s{CaW}ɰAYpwE_E+dmmw|S>VWStj= MK4G ]7 88R8u>+M)7s"cT*,0~2`-2-N7}6ֹQm.|3 ;4(M]VڣlT(LSxY%oNlLg]r2KY<0i&pw[ߧ%,^IVQ>p>,?d  XDHTXq     ,   0h(38< 9d :% F/GDHTIdXhYt\]^bcd8e=f@lBuTvdwxyzCwavpack-devel5.4.04.12.1Development files for wavpack, an audio compression formatWavPack is an open audio compression format providing lossless, high-quality lossy, and unique hybrid compression modes. This subpackage contains libraries and header files for developing applications that want to make use of wavpack.b1is390zl3aO'SUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Development/Libraries/C and C++http://www.wavpack.com/linuxs390xNJA큤b1ib1ib1ib1i88e20e53d2d1d0da152310936fc31ab2cdffa506a816f9ef70a1d9a4f2d175e017dbe74598c4a3873e108793cb4de84482ef5768fe4b6040fa9a1098fc2c5bc2libwavpack.so.1.2.3rootrootrootrootrootrootrootrootwavpack-5.4.0-4.12.1.src.rpmpkgconfig(wavpack)wavpack-develwavpack-devel(s390-64)@    /usr/bin/pkg-configglibc-develrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)wavpack3.0.4-14.6.0-14.0-15.2-15.4.04.14.1b1@`x@]S\3?@Z Z@Z @ZC@QőO8@pgajdos@suse.comatoptsoglou@suse.comtchvatal@suse.comsbrabec@suse.comkbabioch@suse.compmonrealgonzalez@suse.comjengelh@inai.deaavindraa@gmail.comcrrodriguez@opensuse.orgcoolo@suse.com- security update - added patches fix CVE-2021-44269 [bsc#1197020], out of bounds read in processing .wav file + wavpack-CVE-2021-44269.patch- Update to version 5.4.0 * CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414) * fixed: disable A32 asm code when building for Apple silicon * fixed: issues with Adobe-style floating-point WAV files * added: --normalize-floats option to wvunpack for correctly exporting un-normalized floating-point files - Update to version 5.3.0 * fixed: OSS-Fuzz issues 19925, 19928, 20060, 20448 * fixed: trailing garbage characters on imported ID3v2 TXXX tags * fixed: various minor undefined behavior and memory access issues * fixed: sanitize tag extraction names for length and path inclusion * improved: reformat wvunpack "help" and split into long + short versions * added: regression testing to Travis CI for OSS-Fuzz crashers - Updated to version 5.2.0 * fixed: potential security issues including the following CVEs: CVE-2018-19840, CVE-2018-19841, CVE-2018-10536 (bsc#1091344), CVE-2018-10537 (bsc#1091343) CVE-2018-10538 (bsc#1091342), CVE-2018-10539 (bsc#1091341), CVE-2018-10540 (bsc#1091340), CVE-2018-7254, CVE-2018-7253, CVE-2018-6767, CVE-2019-11498 and CVE-2019-1010319 * added: support for CMake, Travis CI, and Google's OSS-fuzz * fixed: use correction file for encode verify (pipe input, Windows) * fixed: correct WAV header with actual length (pipe input, -i option) * fixed: thumb interworking and not needing v6 architecture (ARM asm) * added: handle more ID3v2.3 tag items and from all file types * fixed: coredump on Sparc64 (changed MD5 implementation) * fixed: handle invalid ID3v2.3 tags from sacd-ripper * fixed: several corner-case memory leaks Dropped patches that included in upstream version: * CVE-2018-19840.patch * CVE-2018-19841.patch * CVE-2018-7253.patch * CVE-2018-7254.patch * wavpack-CVE-2018-6767.patch * CVE-2019-1010319.patch * CVE-2019-11498.patch- Add patch for bsc#1141334 CVE-2019-1010319 (use of unitialized var): * CVE-2019-1010319.patch - Add patch for bsc#1133384 CVE-2019-11498 (conditional jump): * CVE-2019-11498.patch- Fix denial-of-service (resource exhaustion caused by an infinite loop; bsc#1120930, CVE-2018-19840, CVE-2018-19840.patch). - Fix denial-of-service (out-of-bounds read and application crash; bsc#1120929, CVE-2018-19841, CVE-2018-19841.patch).- Added CVE-2018-7253.patch: Fixed a heap based buffer overread in cli/dsdiff.c, which allowed remote attackers to cause DoS via a specially crafted input file (CVE-2018-7253, bsc#1081692) - Added CVE-2018-7254.patch: Fixed a buffer overread in cli/caff.c, which allowed remote attackers to cause DoS via a specially crafted input file (CVE-2018-7254, bsc#1081693)- Security fix [bsc#1079746, CVE-2018-6767] * Crafted wav file can trigger a stack buffer overflow when parsing the file * Added wavpack-CVE-2018-6767.patch- Compact description. Drop pointless --with-pic since no static libs are built.- Update to version 5.1.0 * new: command-line tagging utility (wvtag) * added: option to import ID3v2.3 tags from Sony DSF files * fixed: fuzz test failures from AFL reported on SourceForge * improved: DSD decimation filter (less HF rolloff & CPU use) * fixed: non-byte audio depths (12-bit, 20-bit) not showing * fixed: rare case of noise-shaping triggering a lossy mute * fixed: recognize UTF-8 BOM when reading text files * fixed: a few portability issues - Includes changes from 5.0.0: * new: input formats (RF64, Wave64, and CAF) * removed: support for legacy WavPack files (< 4.0) * added: lossless DSD audio in Philips DSDIFF and Sony DSF files * fixed: seeking in > 2GB WavPack files (new stream reader) * fixed: accept > 4GB source audio files (all formats) * improved: increase maximum samples from 2^32 to 2^40 * added: block checksums for robustness to corruption * added: support for non-standard channel identities * added: block decoder for streaming applications * added: new pdf documentation - For other changes, see upstream: * https://github.com/dbry/WavPack/blob/master/ChangeLog - cleanup with spec-cleaner - remove wavpack-fix_pkgconfig.patch, fixed upstream in: * d440649aa113797a50e94285c8c037dc2ad7a5a9 * 779a2e62783acc6a46f75dd89359e95079ef708a * 7846e95eb1c3fa97da41dfe96de532c2df5ad281 - remove license.txt, use upstream copying file instead - Drop Requires, Provides and Obsoletes, as the SUSE versions they were needed for are now EOL.- update to WavPack 4.70-beta (packaged as 4.60.99) * 4GB file support on 32-bit OS * memcpy() not always used correctly (Linux targets) * unsigned char issue (ARM targets) * use temporary files for safer overwriting- patch license to follow spdx.org standards390zl3a 16474363935.4.05.4.0-4.12.15.4.0-4.12.1wavpackwavpack.hlibwavpack.sowavpack.pc/usr/include//usr/include/wavpack//usr/lib64//usr/lib64/pkgconfig/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:23273/SUSE_SLE-15_Update/fc17e07104d6042ea770eca6a25b2759-wavpack.SUSE_SLE-15_Updatecpioxz5s390x-suse-linuxdirectoryC source, ASCII textpkgconfig filePRl5&O5gutf-8669ac9f61a8ad1143f437430a21aaba6d7aa75977883cc783c7e0ff49cee873c? 7zXZ !t/Q] crt:bLL ep[e]emNmX ϯnSNEJx؈H\ ?NI04f%T(k1 %;/ N ?3 Aa`Tҗk-L\kGZ"V IPFmUcGd̰9Mmҳ x%\ňnVSX| o5IK[?\/SmA%%6l&|S/_-ۅFJCHlaU5I5^% iu];GJežW':]jDiP*!!mEe r=Q>kIN!:rv.Ųn..y@i5mFH bHv{-ZE=1Pw>Ye/BGy:zpmOOPknpІxj؊ryCw@il Ct)G`1w -.aXHZzN'X Dm:w"ˆ 6_g;8ýʆVJ'A^mI{0_mbRa-5{M+recPP}39d +{!ܴQtZ.)ԇ䦻LGְ+qsU@nh[evUhdnj&sDza1Ԉ(hWVH1f#*✰z@DoQ45Zl<{bRIc+9Wno:RGe[ПtR(hVD074-s( ֐ű(\YeSQG:'laS #o%H}Rh$kkid0N +t :΃X3֑OW:PD2 '+Jw<:vfݡ$% E҆>"%v.".AڱZ΀£1S NŊyБGOkk::FK/~O4X)X Ef^&h|Wo00ME7' Hhw͟'P}CދaQHbѣ2SMX\NQEŅ2|0#8hY_~wco\}ž0x8 aYf't: Ky|U`$dYt#(A׸yM. 4>G4dBό?e!!%>4`Z~:qxw_7; jwS.7j n1zy@%e$sxzJVe]5O[B\DO!+4rwdno3!c6<4J'̲$*U#~nn| um.3}%j3px\]?B/mٻlg'[ 'F&A4Č,M~rCSD^dU3KgPԧhxMs|02(~0B?Gg ,xV~PnF1f[ʖPV'q̯aXjɒ1ˣ`@gzy7by "˛դuz^\v }pd˜,[6G8:'h$NF9Z)v>=Ɯ"˗k$+ H-- ¤GK}*=Mش [^#|Y %Gxv1c}012k%2bWۡ45u]eӝ7(vڢQjѦ(4z;_NGƶ<joN̠84d$h[IJ<Ø KC⋴ws1jbE:x_:Dy\E[&?8)H7!1T|ߕQwȖ`\]k%v&{E*r  mR0:ic z (E޿ɝl-9+"%c4v8 T'D:|9F0[z<E ~BVAbz*+ ˬ"Ubl@>ew`"=!ZꟙHfxK҉r1BUENq֩$ю0מyzȶ bIϴ潷?eߴc5"U4;y 2B*23l#_J(: 5Qs #CQ&t#މii@ 2;3U"Sa kCZe<Ư=y=Tšw/ U^5RHDܳ剪ڠLB7Kf`]7+kq5섇q{ Z~O5ZNQ%\K[MҀkzئy2Œ4dQ:K5}^WKʏV#=4,*[6PHdk-eX2]v~_K;GJddɽQV^5Yb'mǔr:i"i6MUYBK`"rD_#v:NH-7٢s$ψE!L=B~ XO3XEYC{%@<jp.uyy" b 7RSw>We%ikѷ=LͭrucW;(joWp|Rğ)S[aĬ.$ p*1poXYS`IvʅWl-ʚDur/uOKkPE>Qn+k㐢- :7H^VG`kWPoVtcھz1Z_-w-Gb)F1pr[,r<4PZ 3hZۚ/JXTR>d ^^OiH|xruZBI EkxNM]^aqNp7}DVqXe 8`%u^> kxqhN|eTKjB @F6R ҕ 案S֬3!&>J8 ~t4M~b$Wgx*ŗ2=)cߢ 7R>BZexW"X^ؾLL_ŏȳ%(Չi%ϥ;=:dP{I ċi1_Ɵ]'RĖM5,`"([4yGi;lIf0pĻth-ZBiBU~asS9י̀x阑\5x=߅W*>OCg#Bz-) REru[]pꙖQqupLP%iR U Ix-Į%Mt;(7o&SO>~TCfKQDPZQ8 [v>T:`0.lOؾQ5gf7I*~ң&*ͤf7LI4^,<*sPី]WU>WEgɪ{=6yP̋$%x2Y4ZylPW%SZ<[3&ȼw('r:Jh̄=)=ov^{BjzpwǯOL79o|1MGQшpbxGG $LzgnRN'Il(6=6dx6;M .+"wפ!6PT_Դ%5\U&[~s; _cg"=7˻)]]wbd"ܐ R΁ !WQ5+7,@u7FŝI$݁?᪊lGO{w8>B|/Ts.0Ӡp kQ8aq n9Wn |S۱8`7y(ݓnpAJX>)X GmgCqA qM X5R#t3"&a7N{smt` 9Y7.k%pAk@|:=хTȔj=Dϟ}7'BJ8 #^.vR&~K+Qkkxyݿ[YiEK#YAXD)T'a61fxQ !028\nJ}.H YZ