Security update for unrar

This update for unrar to version 5.5 fixes the following issues:

Version 5.5.5

* CVE-2012-6706: fixes VMSF_DELTA memory corruption (boo#1045315)
see https://bugs.chromium.org/p/project-zero/issues/detail?id=1286&can=1&q=unrar&desc=2

Version 5.5.1

* Based on RAR 5.50 beta1
* Added extraction support for .LZ archives created by Lzip
compressor.
* Modern TAR tools can store high precision file times, lengthy
file names and large file sizes in special PAX extended headers
inside of TAR archive. Now WinRAR supports such PAX headers
and uses them when extracting TAR archives.
* unrar no longer fails to unpack files in ZIP archives compressed
with XZ algorithm and encrypted with AES

Version 5.4.5.

* Based on final RAR 5.40.
* If RAR recovery volumes (.rev files) are present in the same
folder as usual RAR volumes, archive test command verifies .rev
contents after completing testing .rar files.
If you wish to test only .rev files without checking .rar
volumes, you can run: `unrar t arcname.part1.rev`.
* If -p switch is used without optional parameter, a
password can be also set with file redirection or pipe.
* unrar treats 'arcname.partN' as 'arcname.partN.rar' if
'arcname.partN' does not exist and 'arcname.part#.rar' exists.
For example, it is allowed to run:
`unrar x arcname.part01` to start extraction from
'arcname.part01.rar'.

Fixed bugs
bnc#1045315
VUL-0: CVE-2012-6706: unrar: VMSF_DELTA filter allows arbitrary memory write
CVE-2012-6706
VUL-0: CVE-2012-6706: unrar: VMSF_DELTA filter allows arbitrary memory write
Selected Binaries
openSUSE Build Service is sponsored by