Changelog for
libxml2-devel-32bit-2.7.8-49.1.x86_64.rpm :
* Wed May 07 2014 vcizekAATTsuse.com- fix for CVE-2014-0191 (bnc#876652)
* libxml2: external parameter entity loaded when entity substitution is disabled
* added libxml2-CVE-2014-0191.patch
* Thu Jul 11 2013 vcizekAATTsuse.com- fix for CVE-2013-2877 (bnc#829077)
* added libxml2-CVE-2013-2877.patch
* Fri Mar 22 2013 lijewski.stefanAATTgmail.com- fix for CVE-2013-0338 (bnc#805233) libxml2-CVE-2013-0338-Detect-excessive-entities-expansion-upon-replacement.patch
* Fri Dec 07 2012 lijewski.stefanAATTgmail.com- fixed CVE-2012-5134 (bnc#793334) / libxml2-CVE-2012-5134.patch
* Thu Jun 28 2012 vcizekAATTsuse.com- fixed CVE-2012-2807 (bnc#769184)
* Wed May 30 2012 vcizekAATTsuse.com- fixed CVE-2011-3102 (bnc#764538)
* Wed Feb 22 2012 vcizekAATTsuse.com- add fix for hash table collisions CVE-2012-0841 (bnc#748561)
* Fri Jan 06 2012 vcizekAATTsuse.com- fix for CVE-2011-3919 (bnc#739894)
* Mon Nov 28 2011 vcizekAATTsuse.com- add libxml2-CVE-2011-2821.patch (bnc#732787)
* Wed Jun 29 2011 puzelAATTnovell.com- add libxml2-CVE-2011-1944.patch (bnc#697372)
* Mon Jan 03 2011 puzelAATTnovell.com- add libxml2-CVE-2010-4494.patch (bnc#661471)
* Fri Dec 03 2010 puzelAATTnovell.com- update to libxml-2.7.8 - number of bufixes, documentation and portability fixes - update language ID parser to RFC 5646 - sort python generated stubs - add an HTML parser option to avoid a default doctype - see http://xmlsoft.org/news.html for exact details- drop libxml2-xpath-ns-attr-axis.patch (in upstream)- clean up specfile
* Mon Nov 01 2010 puzelAATTnovell.com- add libxml2-xpath-ns-attr-axis.patch (bnc#648277)
* Sat Oct 30 2010 cristian.rodriguezAATTopensuse.org- Use --disable-static
* Mon Sep 20 2010 puzelAATTnovell.com- drop libxml2-largefile64.patch (revert last change) - the issue is fixed in zlib
* Fri Sep 17 2010 puzelAATTnovell.com- add libxml2-largefile64.patch (fixes build) - debian bug#439843
* Wed Jul 14 2010 jwAATTnovell.com- added noxref.patch, this implements a new --noxref option, which turns validation errors about missing xrefs into warnings. Upstreamed as https://bugzilla.gnome.org/show_bug.cgi?id=624386
* Sat Apr 24 2010 cooloAATTnovell.com- buildrequire pkg-config to fix provides
* Tue Mar 23 2010 mrdocsAATTopensuse.org- update to 2.7.7- add extra options to ./configure for scribus features and avoid a crash- updates from 2.7.3 > 2.7.7 include a number of portability, correctness memory leaks and build fixes including some CVE- see http://xmlsoft.org/news.html for exact details
* Mon Feb 22 2010 mrdocsAATTopensuse.org- add sax parser option compiled in
* Mon Dec 14 2009 jengelhAATTmedozas.de- add baselibs.conf as a source- package documentation as noarch
* Sun Aug 02 2009 jansimon.moellerAATTopensuse.org- Disable the check for ARM as qemu-arm can\'t keep up atm.
* Thu Mar 19 2009 prusnakAATTsuse.cz- updated to 2.7.2
* Portability fix: fix solaris compilation problem, fix compilation if XPath is not configured in
* Bug fixes: nasty entity bug introduced in 2.7.0, restore old behaviour when saving an HTML doc with an xml dump function, HTML UTF-8 parsing bug, fix reader custom error handlers (Riccardo Scussat)
* Improvement: xmlSave options for more flexibility to save as XML/HTML/XHTML, handle leading BOM in HTML documents- updated to 2.7.3
* Build fix: fix build when HTML support is not included.
* Bug fixes: avoid memory overflow in gigantic text nodes, indentation problem on the writed (Rob Richards), xmlAddChildList pointer problem (Rob Richards and Kevin Milburn), xmlAddChild problem with attribute (Rob Richards and Kris Breuker), avoid a memory leak in an edge case (Daniel Zimmermann), deallocate some pthread data (Alex Ott).
* Improvements: configure option to avoid rebuilding docs (Adrian Bunk), limit text nodes to 10MB max by default, add element traversal APIs, add a parser option to enable pre 2.7 SAX behavior (Rob Richards), add gcc malloc checking (Marcus Meissner), add gcc printf like functions parameters checking (Marcus Meissner).- dropped obsoleted patches:
* alloc_size.patch (mainline)
* CVE-2008-4225.patch (mainline)
* CVE-2008-4226.patch (mainline)
* CVE-2008-4409.patch (mainline)
* oldsax.patch (mainline)
* pritnf.patch (mainline)
* xmlsave.patch (mainline)