Changelog for
libplist-2_0-devel-2.3.0-1.5.i586.rpm :
* Mon Apr 24 2023 Sebastian Wagner
- Update to version 2.3.0: - Changes:
* Rename PLIST_UINT to PLIST_INT and add plist_new_int() and plist_get_int_val()
* Add support for JSON format
* Add support for OpenStep format
* Introduce error codes and format constants
* Add return value to import/export functions to allow returning error codes
* Add new plist_sort function
* Add several human-readable output-only formats
* Add new plist_write_to_string/_stream/_file functions
* Add new plist_print function
* Add new plist_read_from_file function
* Add new plist_mem_free() function
* Add a few C++ methods
* Add C++ interface test
* Add PLIST_NULL type
* Some code housekeeping (mostly clang-tidy) - Breaking:
* plist_from_memory() gets additional parameter - Bugfixes:
* Fix multiple bugs in all of the parsers
* Fix handling of PLIST_UID nodes
* Mon Jan 17 2022 Michael Gorse - Add python-rpm-macros to BuildRequires (boo#1194756).
* Mon Dec 06 2021 Fabian Vogt - Drop incorrect Provides/Obsoletes of library packages- Avoid libplist{,++} capabilities by using the library names directly- Use %autosetup- Use install with -D instead of mkdir
* Tue Sep 28 2021 Michael Gorse - Obsolete old python 2 plist module. It conflicts with the python 3 version.
* Sun Nov 08 2020 Christophe Giboudeaux - Update baselibs.conf.- Stop obsoleting \'virtual\' provides. The package manager will take care of package updates.- Also rename libplist-devel to libplist-2_0-devel.- Add missing provides/obsoletes for devel packages.
* Mon Sep 21 2020 Stefan Elser - Update to 2.2.0: - Rename library and all related files by adding an API version resulting in libplist-2.0 and libplist++-2.0 - bplist: Improve recursion check performance by at least 30% for large files - Add new plist_val_compare(), plist_val_contains() helper functions - plistutil: Added ability for files to be read from stdin - plistutil: Added ability to specify output format - Fix/suppress several compiler warnings - Fix: Return NULL from plist_copy() if passed a NULL pointer instead of asserting - Fix removal of docs directory on make clean
* Thu Mar 12 2020 Tomáš Chvátal - Update to 2.1.0:
* Add new plist_get_data_ptr() and plist_get_string_ptr() for direct access to underlying buffer
* Increase precision when converting PLIST_REAL nodes to XML
* Fix several issues in libcnary (UaF, segfault, memory leak)
* Fix copying of hash table entries when cloning array/dict nodes
* cython: Implement load()/loads() and dump()/dumps() to match up with plistlib (Python 3.4)
* Add new plist_dict_item_get_key() for retrieving key node of a dict item
* Add new plist_array_item_remove() to allow removing an array\'s child node without relying on the index
* Make plist_array_get_item_index() return UINT_MAX instead of 0 when node can\'t be found
* Add index lookup table for large PLIST_ARRAY nodes
* Add iterator for array nodes: plist_array_new_iter(), plist_array_next_item()
* Improve performance of plist_dict_next_item() drastically
* Improve performance and memory usage when writing XML plists
* Improve performance and memory usage when writing binary plists
* Allow building with sanitizers (without fuzzers)
* Prevent store to misaligned address when writing real/date nodes
* Work around misaligned reads in binary plist parser
* Integrate fuzzing targets (libFuzzer) into project
* Add sanitizers (ASAN, UBSAN) when building fuzzers (--with-fuzzers)
* Mon May 01 2017 mgorseAATTsuse.com- update to version 2.0.0:
* Improved malformed XML and binary plist detection and error handling
* Add parser debug/error output (when compiled with - -enable-debug), controlled via environment variables
* Fix unicode character handling
* Add PLIST_IS_
* helper macros for the different node types
* Extend date/time range and date conversion issues
* Plug several memory leaks
* Speed improvements for handling large plist files
* Includes security fixes for:
* CVE-2017-6440, CVE-2017-6439, CVE-2017-6438, CVE-2017-6437,
* CVE-2017-6436, CVE-2017-6435, CVE-2017-5836, CVE-2017-5835,
* CVE-2017-5834,
* CVE-2017-5545,
* CVE-2017-7982 (boo#1035312) ... and several others that didn\'t receive any CVE (yet).
* Thu Feb 02 2017 jengelhAATTinai.de- RPM group assignment fixes
* Wed Jan 25 2017 iAATTmarguerite.su- update version 1.12+git20170119.6a44dfb
* xplist: Fix limiited but possible XXE security vulnerability with XML
* plistutil: use static buffer for stat()
* plistutil: Plug some memory leaks
* bplist: Fix possible crash in plist_from_bin() caused by access to already freed memory
* bplist: Plug memory leaks caused by unused and unfreed buffer
* bplist: Refactor binary plist parsing in a recursive way
* xplist: Get rid of setlocale() and use custom function to print floating point values
* Node.cpp: let plist_t operations free _node when in a container
* cython: Fix module build with libplist already installed
* bplist: Speed up plist_to_bin conversion for large plists
* Implemented plist_is_binary() and plist_from_memory()
* plist_data_compare: Make sure to compare the node sizes for integer nodes
* xplist: Plug memory leak when converting PLIST_UID nodes to XML
* Change internal storage of PLIST_DATE values from struct timeval to double
* Use time64 implementation by Michael G Schwern to extend allowed date/time range
* remove libxml2 in favor of custom XML parsing
* base64: Rework base64decode to handle split encoded data correctly
* plistutil: Prevent OOB heap buffer read by checking input size
* plistutil: Use plist_is_binary() to check for binary plist data
* bplist: Improve UINT_TO_HOST macro, remove uint24_from_be function
* bplist: Check for invalid offset_size in bplist trailer
* bplist: Use proper struct for binary plist trailer
* bplist: Check for invalid ref_size in bplist trailer- fixed CVE-2017-5209, boo#1019531
* The base64decode function in base64.c allows attackers to obtaiin sensitive info from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data.