Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package zlib-ng for openSUSE:Factory checked in at 2023-06-27 23:17:38 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/zlib-ng (Old) and /work/SRC/openSUSE:Factory/.zlib-ng.new.15902 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "zlib-ng" Tue Jun 27 23:17:38 2023 rev:12 rq:1095555 version:2.1.2 Changes: -------- --- /work/SRC/openSUSE:Factory/zlib-ng/zlib-ng.changes 2023-06-22 23:27:21.682239461 +0200 +++ /work/SRC/openSUSE:Factory/.zlib-ng.new.15902/zlib-ng.changes 2023-06-27 23:17:50.203804756 +0200 @@ -1,0 +2,6 @@ +Tue Jun 27 08:11:40 UTC 2023 - Guillaume GARDET <guillaume.gar...@opensuse.org> + +- Add patch to fix boo#1212735: + * 1526.patch + +------------------------------------------------------------------- New: ---- 1526.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ zlib-ng.spec ++++++ --- /var/tmp/diff_new_pack.f0zlNs/_old 2023-06-27 23:17:51.111810100 +0200 +++ /var/tmp/diff_new_pack.f0zlNs/_new 2023-06-27 23:17:51.123810171 +0200 @@ -1,5 +1,5 @@ # -# spec file for package zlib-ng +# spec file # # Copyright (c) 2023 SUSE LLC # @@ -37,6 +37,8 @@ URL: https://github.com/zlib-ng/zlib-ng Source0: https://github.com/zlib-ng/zlib-ng/archive/refs/tags/%{version}.tar.gz#/zlib-ng-%{version}.tar.gz Source1: baselibs.conf +# https://github.com/zlib-ng/zlib-ng/pull/1526 - boo#1212735 +Patch1: 1526.patch BuildRequires: cmake BuildRequires: gcc BuildRequires: gcc-c++ ++++++ 1526.patch ++++++ >From 457dafd5dbc67ca353ae4776e6cd9b22565dd06d Mon Sep 17 00:00:00 2001 From: Fabian Vogt <fv...@suse.de> Date: Tue, 27 Jun 2023 09:47:04 +0200 Subject: [PATCH] Handle complete overlap in chunkcopy_safe Fixes #1525 --- inflate_p.h | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/inflate_p.h b/inflate_p.h index a007cd05d..eff73876d 100644 --- a/inflate_p.h +++ b/inflate_p.h @@ -161,6 +161,11 @@ static inline uint8_t* chunkcopy_safe(uint8_t *out, uint8_t *from, uint64_t len, return out + len; } + /* Complete overlap: Source == destination */ + if (out == from) { + return out + len; + } + /* We are emulating a self-modifying copy loop here. To do this in a way that doesn't produce undefined behavior, * we have to get a bit clever. First if the overlap is such that src falls between dst and dst+len, we can do the * initial bulk memcpy of the nonoverlapping region. Then, we can leverage the size of this to determine the safest