Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libplist++-2_0-devel-2.2.0-5.1 RPM for armv7hl

From OpenSuSE Ports Leap 15.5 for armv7hl

Name: libplist++-2_0-devel Distribution: openSUSE Step 15
Version: 2.2.0 Vendor: openSUSE
Release: 5.1 Build date: Sat Feb 5 17:12:46 2022
Group: Unspecified Build host: obs-arm-5
Size: 18453 Source RPM: libplist-2.2.0-5.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://github.com/libimobiledevice/libplist
Summary: Library for handling Apple Binary and XML Property Lists -- Development Files
libplist is a library for handling Apple Binary and XML Property Lists.

This package contains the development files for C++.

Provides

Requires

License

GPL-2.0-only AND LGPL-2.1-or-later

Changelog

* Mon Jan 17 2022 mgorse@suse.com
  - Add python-rpm-macros to BuildRequires (boo#1194756).
* Mon Dec 06 2021 fvogt@suse.com
  - Drop incorrect Provides/Obsoletes of library packages
  - Avoid libplist{,++} capabilities by using the library names directly
  - Use %autosetup
  - Use install with -D instead of mkdir
* Tue Sep 28 2021 mgorse@suse.com
  - Obsolete old python 2 plist module. It conflicts with the
    python 3 version.
* Sun Nov 08 2020 christophe@krop.fr
  - Update baselibs.conf.
  - Stop obsoleting 'virtual' provides. The package manager
    will take care of package updates.
  - Also rename libplist-devel to libplist-2_0-devel.
  - Add missing provides/obsoletes for devel packages.
* Mon Sep 21 2020 suse@foomaster.de
  - Update to 2.2.0:
    - Rename library and all related files by adding an API version resulting in libplist-2.0 and libplist++-2.0
    - bplist: Improve recursion check performance by at least 30% for large files
    - Add new plist_val_compare(), plist_val_contains() helper functions
    - plistutil: Added ability for files to be read from stdin
    - plistutil: Added ability to specify output format
    - Fix/suppress several compiler warnings
    - Fix: Return NULL from plist_copy() if passed a NULL pointer instead of asserting
    - Fix removal of docs directory on make clean
* Thu Mar 12 2020 tchvatal@suse.com
  - Update to 2.1.0:
    * Add new plist_get_data_ptr() and plist_get_string_ptr() for direct access to underlying buffer
    * Increase precision when converting PLIST_REAL nodes to XML
    * Fix several issues in libcnary (UaF, segfault, memory leak)
    * Fix copying of hash table entries when cloning array/dict nodes
    * cython: Implement load()/loads() and dump()/dumps() to match up with plistlib (Python 3.4)
    * Add new plist_dict_item_get_key() for retrieving key node of a dict item
    * Add new plist_array_item_remove() to allow removing an array's child node without relying on the index
    * Make plist_array_get_item_index() return UINT_MAX instead of 0 when node can't be found
    * Add index lookup table for large PLIST_ARRAY nodes
    * Add iterator for array nodes: plist_array_new_iter(), plist_array_next_item()
    * Improve performance of plist_dict_next_item() drastically
    * Improve performance and memory usage when writing XML plists
    * Improve performance and memory usage when writing binary plists
    * Allow building with sanitizers (without fuzzers)
    * Prevent store to misaligned address when writing real/date nodes
    * Work around misaligned reads in binary plist parser
    * Integrate fuzzing targets (libFuzzer) into project
    * Add sanitizers (ASAN, UBSAN) when building fuzzers (--with-fuzzers)
* Mon May 01 2017 mgorse@suse.com
  - update to version 2.0.0:
    * Improved malformed XML and binary plist detection and error
      handling
    * Add parser debug/error output (when compiled with
    - -enable-debug), controlled via environment variables
    * Fix unicode character handling
    * Add PLIST_IS_* helper macros for the different node types
    * Extend date/time range and date conversion issues
    * Plug several memory leaks
    * Speed improvements for handling large plist files
    * Includes security fixes for:
    * CVE-2017-6440, CVE-2017-6439, CVE-2017-6438, CVE-2017-6437,
    * CVE-2017-6436, CVE-2017-6435, CVE-2017-5836, CVE-2017-5835,
    * CVE-2017-5834, * CVE-2017-5545, * CVE-2017-7982 (boo#1035312)
    ... and several others that didn't receive any CVE (yet).
* Thu Feb 02 2017 jengelh@inai.de
  - RPM group assignment fixes
* Wed Jan 25 2017 i@marguerite.su
  - update version 1.12+git20170119.6a44dfb
    * xplist: Fix limiited but possible XXE security vulnerability
      with XML
    * plistutil: use static buffer for stat()
    * plistutil: Plug some memory leaks
    * bplist: Fix possible crash in plist_from_bin() caused by access
      to already freed memory
    * bplist: Plug memory leaks caused by unused and unfreed buffer
    * bplist: Refactor binary plist parsing in a recursive way
    * xplist: Get rid of setlocale() and use custom function to print
      floating point values
    * Node.cpp: let plist_t operations free _node when in a container
    * cython: Fix module build with libplist already installed
    * bplist: Speed up plist_to_bin conversion for large plists
    * Implemented plist_is_binary() and plist_from_memory()
    * plist_data_compare: Make sure to compare the node sizes for integer
      nodes
    * xplist: Plug memory leak when converting PLIST_UID nodes to XML
    * Change internal storage of PLIST_DATE values from struct timeval
      to double
    * Use time64 implementation by Michael G Schwern to extend allowed
      date/time range
    * remove libxml2 in favor of custom XML parsing
    * base64: Rework base64decode to handle split encoded data correctly
    * plistutil: Prevent OOB heap buffer read by checking input size
    * plistutil: Use plist_is_binary() to check for binary plist data
    * bplist: Improve UINT_TO_HOST macro, remove uint24_from_be function
    * bplist: Check for invalid offset_size in bplist trailer
    * bplist: Use proper struct for binary plist trailer
    * bplist: Check for invalid ref_size in bplist trailer
  - fixed CVE-2017-5209, boo#1019531
    * The base64decode function in base64.c allows attackers to
      obtaiin sensitive info from process memory or cause a denial
      of service (buffer over-read) via split encoded Apple Property
      List data.
* Tue Oct 21 2014 m.szulecki@libimobiledevice.org
  - Enable %check as it is provided by libplist and improves quality
* Fri Oct 17 2014 m.szulecki@libimobiledevice.org
  - Update to version 1.12
    * Fix plist_from_bin() changing value nodes to key nodes in dictionaries
    * Avoid exporting non-public symbols
    * Prevent crash in plist_from_bin() when parsing unusual binary plists
    * Fix crash in String|Key::GetValue() and actually make C++ interface work
    * Fix memory leaks in new_xml_plist() and parse_real_node()
    * Fix header guards to conform to C++ standard
    * Update Cython based Python bindings and remove plist_new_key()
    * Fix key nodes not being output correctly if they contained XML entities
    * Fix handling and storage of signed vs. unsigned integer values
    * Fix date handling to respect the "Mac Epoch" instead of "Unix Epoch"
    * Remove plist_set_type() as it should not be used
    * Fix deprecated macros to work with older LLVM/Clang
    * Fix various shadowed declarations
    * Add documentation to explicitly describe memory buffer ownership
    * Fix memory leak in plist_from_bin()
    * Add various test cases based on fixes
    * Fix wrong timezone related date/time conversion of date nodes
    * Fix endian detection on MIPS architecture
    * Fix parallel build for autotools

Files

/usr/include/plist
/usr/include/plist/Array.h
/usr/include/plist/Boolean.h
/usr/include/plist/Data.h
/usr/include/plist/Date.h
/usr/include/plist/Dictionary.h
/usr/include/plist/Integer.h
/usr/include/plist/Key.h
/usr/include/plist/Node.h
/usr/include/plist/Real.h
/usr/include/plist/String.h
/usr/include/plist/Structure.h
/usr/include/plist/Uid.h
/usr/include/plist/plist++.h
/usr/lib/libplist++-2.0.so
/usr/lib/pkgconfig/libplist++-2.0.pc


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 18:42:22 2024