Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package zlib-ng for openSUSE:Factory checked 
in at 2023-06-27 23:17:38
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/zlib-ng (Old)
 and      /work/SRC/openSUSE:Factory/.zlib-ng.new.15902 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "zlib-ng"

Tue Jun 27 23:17:38 2023 rev:12 rq:1095555 version:2.1.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/zlib-ng/zlib-ng.changes  2023-06-22 
23:27:21.682239461 +0200
+++ /work/SRC/openSUSE:Factory/.zlib-ng.new.15902/zlib-ng.changes       
2023-06-27 23:17:50.203804756 +0200
@@ -1,0 +2,6 @@
+Tue Jun 27 08:11:40 UTC 2023 - Guillaume GARDET <guillaume.gar...@opensuse.org>
+
+- Add patch to fix boo#1212735:
+  * 1526.patch
+
+-------------------------------------------------------------------

New:
----
  1526.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ zlib-ng.spec ++++++
--- /var/tmp/diff_new_pack.f0zlNs/_old  2023-06-27 23:17:51.111810100 +0200
+++ /var/tmp/diff_new_pack.f0zlNs/_new  2023-06-27 23:17:51.123810171 +0200
@@ -1,5 +1,5 @@
 #
-# spec file for package zlib-ng
+# spec file
 #
 # Copyright (c) 2023 SUSE LLC
 #
@@ -37,6 +37,8 @@
 URL:            https://github.com/zlib-ng/zlib-ng
 Source0:        
https://github.com/zlib-ng/zlib-ng/archive/refs/tags/%{version}.tar.gz#/zlib-ng-%{version}.tar.gz
 Source1:        baselibs.conf
+# https://github.com/zlib-ng/zlib-ng/pull/1526 - boo#1212735
+Patch1:         1526.patch
 BuildRequires:  cmake
 BuildRequires:  gcc
 BuildRequires:  gcc-c++

++++++ 1526.patch ++++++
>From 457dafd5dbc67ca353ae4776e6cd9b22565dd06d Mon Sep 17 00:00:00 2001
From: Fabian Vogt <fv...@suse.de>
Date: Tue, 27 Jun 2023 09:47:04 +0200
Subject: [PATCH] Handle complete overlap in chunkcopy_safe

Fixes #1525
---
 inflate_p.h | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/inflate_p.h b/inflate_p.h
index a007cd05d..eff73876d 100644
--- a/inflate_p.h
+++ b/inflate_p.h
@@ -161,6 +161,11 @@ static inline uint8_t* chunkcopy_safe(uint8_t *out, 
uint8_t *from, uint64_t len,
         return out + len;
     }
 
+    /* Complete overlap: Source == destination */
+    if (out == from) {
+        return out + len;
+    }
+
     /* We are emulating a self-modifying copy loop here. To do this in a way 
that doesn't produce undefined behavior,
      * we have to get a bit clever. First if the overlap is such that src 
falls between dst and dst+len, we can do the
      * initial bulk memcpy of the nonoverlapping region. Then, we can leverage 
the size of this to determine the safest

Reply via email to