libtiff-static-4.3.0-37.oe2203sp3 0 >
fMI ;G|`u` ,K=
9*^5ӑՒ vɶC~`
~W@ul;.bRh[
<toEh?&T;?ЧvS~VG:32m=G94b5fe3666bbc205e4d077cdfd91ef163c3329dc 530e5148b81da4a8f6a26092b6c82bf2c03a1c4337b8a2366388a5e8a0645671 [e '
W뜫o > : } ? m d $ J $ , A M t z
( P d ( 8 9 x : F
% G
D H
T I
d X
h Y
p \
]
^ F b d o e t f w l y t u v z ( , C libtiff-static 4.3.0 37.oe2203sp3 Static TIFF image format file library the libtiff-static package contains the syatically linkable version of libtiff.
Linking to static libraries is discouraged for most applications,but it is necessary for some boot packages. fMIdc-64g.compass-ci libtiff http://openeuler.org Unspecified https://www.simplesystems.org/libtiff/ linux aarch64 ~ ]B fMIfMIfMIfMI244a1222d08906b78f4ecaa371f7f4df0b374b3ebb929900828d633652cac9cb 48f03e54b818c7f32384ca5057f9f0eb2b6cba39bb9df68bf52c6043218da162 c4888c683bf6aa672c2b0a8be719cdbfbcb4b51567b2e496ad0c84b940343721 421ce849fbdf220806451a45f0532bf097e75b3a6eb4f9865370e62da0a590ee root root root root root root root root libtiff-4.3.0-37.oe2203sp3.src.rpm libtiff-static libtiff-static(aarch-64)
libtiff-devel(aarch-64) rpmlib(CompressedFileNames) rpmlib(FileDigests) rpmlib(PayloadFilesHavePrefix) rpmlib(PayloadIsXz) 4.3.0-37.oe2203sp3 3.0.4-1 4.6.0-1 4.0-1 5.2-1 4.17.0 fK;@eg'eae\d@d@dܺ@díd@d d,@d@dm@c`cc_cv"@cY!@cMCc pc@b'bx@blingsheng - 4.3.0-37 liningjie - 4.3.0-36 liningjie - 4.3.0-35 liningjie - 4.3.0-34 zhangpan - 4.3.0-33 zhangpan - 4.3.0-32 liningjie - 4.3.0-31 zhangpan - 4.3.0-30 zhangpan - 4.3.0-29 zhangpan - 4.3.0-28 zhangpan - 4.3.0-27 zhangpan - 4.3.0-26 zhangpan - 4.3.0-25 zhouwenpei - 4.3.0-24 zhouwenpei - 4.3.0-23 zhouwenpei - 4.3.0-22 qisen - 4.3.0-21 zhouwenpei - 4.3.0-20 zhouwenpei - 4.3.0-19 zhouwenpei - 4.3.0-18 zhouwenpei - 4.3.0-17 zhouwenpei - 4.3.0-16 wuchaochao - 4.3.0-15 wangkerong - 4.3.0-14 - Type:CVE
- ID:CVE-2023-1916,CVE-2023-3164
- SUG:NA
- DESC:fix CVE-2023-1916 CVE-2023-3164 - backport patch for fix CVE-2023-6277 issue - fix CVE-2023-6277 - fix CVE-2023-6228 - fix CVE-2022-34526 - fix CVE-2022-40090 - fix CVE-2023-3618 - fix CVE-2023-38288 CVE-2023-38289 - fix CVE-2023-3576 - fix CVE-2023-25433 CVE-2023-26966 CVE-2023-2908 - fix CVE-2023-3316 - fix CVE-2023-26965 - fix CVE-2023-2731 - modified backport-CVE-2022-48281.patch - fix CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799,
- fix CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804 - Type:cve
- ID:CVE-2022-48281
- SUG:NA
- DESC:fix CVE-2022-48281 - Type:cve
- ID:CVE-2022-3970
- SUG:NA
- DESC:fix CVE-2022-3970 - fix CVE-2022-3570,CVE-2022-3597,CVE-2022-3598,CVE-2022-3599,CVE-2022-3626,CVE-2022-3627 - fix CVE-2022-2056,CVE-2022-2057,CVE-2022-2058 - fix CVE-2022-2953,CVE-2022-2519,CVE-2022-2520,CVE-2022-2521 - fix CVE-2022-2867,CVE-2022-2868,CVE-2022-2869 - fix CVE-2022-1354 - fix CVE-2022-1622 and CVE-2022-1623 - delete macro in changelog dc-64g.compass-ci 1716341177 4.3.0-37.oe2203sp3 4.3.0-37.oe2203sp3 0-metadata_list-compact_tlv-libtiff-static-4.3.0-37.oe2203sp3.aarch64 0-metadata_list-compact-libtiff-static-4.3.0-37.oe2203sp3.aarch64 libtiff.a libtiffxx.a /etc/ima/digest_lists.tlv/ /etc/ima/digest_lists/ /usr/lib64/ -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protection cpio xz 2 aarch64-openEuler-linux-gnu current ar archive ;HBs ov utf-8 db3619c05f824b243207b913b49209a387f27c53c35aa672437e76224cb26d36 6947bdad33da1b73e5bb298d727706265a7c6099403c8ad7a4d1140645b3bd47 ? ` 7zXZ
! #,ގ]
b2uQ{LY0G68)&c9移<EZqst]P6dֹ[e@?BІrb IzFh
2.%9sbIC&dvjs-ֺDR~!ͪ[ \"WWUsn'ꈊxUpɜk)_g\!T:˟d.B=P+aO4.ڱ
$`-3BO(bGߚ-):t/U!kc`? rVM6r[w_lçM5+|uN`v7-q!s6dB9VT[VM)0Y{qPs1i34ͧzu[7kgHwz1{U7V̡GxrF8/IPqXs+xT- HFwA,RHPDӝ)Xy% #9Q~6BI,#U̓i( 1t"%'
0ܭIY3)Չ^=a~^ݱ 4_Q~mMc2A1gVGSG|b5+E*vTr>+x.[ @[5c/2MI_oIqd[3Cik@Y'HtGޔ\Z'0%%zwt:~l"sلb!\ttNTcp_jdjܰ[g
ْO