<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in test-driver</title>
    <link>http://nxr.netbsd.org/rss/src/external/public-domain/xz/dist/build-aux/test-driver</link>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2005</copyright>
    <generator>Java</generator>
    
<item>
    <title>branches:  1.1.1;<br/>Initial revision</title>
    <description>/src/external/public-domain/xz/dist/build-aux/test-driver - 1.1</description>
    <pubDate>Wed Apr 08 20:28:17 UTC 2026</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Import xz-5.8.3 (previous was 5.2.4)<br/><br/>5.8.3 (2026-03-31)<br/><br/>    * liblzma:<br/><br/>        - Fix a buffer overflow in lzma_index_append(): If<br/>          lzma_index_decoder() was used to decode an Index that<br/>          contained no Records, the resulting lzma_index was left in<br/>          a state where where a subsequent lzma_index_append() would<br/>          allocate too little memory, and a buffer overflow would occur.<br/><br/>          The lzma_index functions are rarely used by applications<br/>          directly. In the few applications that do use these functions,<br/>          the combination of function calls required to trigger this bug<br/>          are unlikely to exist, because there typically is no reason to<br/>          append Records to a decoded lzma_index. Thus, it's likely that<br/>          this bug cannot be triggered in any real-world application.<br/><br/>          The bug was reported and discovered by Cantina using their<br/>          AppSec agent, Apex.<br/><br/>        - Fix the build on Windows ARM64EC.<br/><br/>        - Add "License: 0BSD" to liblzma.pc.<br/><br/>    * xz:<br/><br/>        - Fix invalid memory access in --files and --files0. All of<br/>          the following must be true to trigger it:<br/><br/>            1. A string being read (which supposedly is a filename) is<br/>               at least SIZE_MAX / 2 bytes long. This size is plausible<br/>               on 32-bit platforms (2 GiB - 1 B).<br/><br/>            2. realloc(ptr, SIZE_MAX / 2 + 1) must succeed.<br/>               On glibc &gt;= 2.30 it shouldn't because the value<br/>               exceeds PTRDIFF_MAX.<br/><br/>            3. An integer overflow results in a realloc(ptr, 0) call.<br/>               If it doesn't return NULL, then invalid memory access<br/>               will occur.<br/><br/>        - On QNX, don't use fsync() on directories because it fails.<br/><br/>    * Autotools: Enable 32-bit x86 assembler on Hurd by default.<br/>      It was already enabled in the CMake-based build.<br/><br/>    * Translations: Add Arabic man page translations.<br/><br/>For the changelog of previous versions please see:<br/><br/>    https://github.com/tukaani-project/xz/releases/tag/vM.m.p<br/><br/>The changes are too big to include here, since this package has not been<br/>updated for a while.</title>
    <description>/src/external/public-domain/xz/dist/build-aux/test-driver - 1.1.1.1</description>
    <pubDate>Wed Apr 08 20:28:17 UTC 2026</pubDate>
    <dc:creator>christos</dc:creator>
</item>
</channel></rss>

