libzzip-0-13-0.13.69-150000.3.20.1<>,HfLp9|Ӻa.%lltGp@uH+`Gstky椮[9GC뤇nxAaCQ쯮#^@gԜk9S g0=\-!'OEc")N݌ZO"?7p pDQ ^90T'+H,)A60dXzNzs MW8= ͠76sFLgDE?@z#k0,.J}Upp9gSÒ|U˅ lGb>C)?)d % =  :@H   ,  O    (89H: 9> @ B F G H!HI!X!Y!Z" ["\"(]"t^#b$=c$d%`e%ef%hl%ju%v%w(px(y)z)H)X)\)b)Clibzzip-0-130.13.69150000.3.20.1ZIP compression libraryZZipLib is a library for dealing with ZIP and ZIP-like archives by using algorithms of zlib.fLnebbioloqSUSE Linux Enterprise 15SUSE LLC LGPL-2.1+https://www.suse.com/System/Librarieshttp://zziplib.sourceforge.netlinuxppc64le `bA큤fIfIfIfIfKfIfIfIfIfJfIfIfIfIfKfJfJfKZ564b0f8666277a218aa2f47b1c203a2d3dc02415f1f3bc877538033531926c52f188e8923e1e32a3b9f73fcd25d1ce6b3e21b18f1768c949d1e6d179b8fceed047a529e9f06434bc3f3be2643ac1f831f92313bff90b540e1ef296a9df04b6f32890b3e5d5a6f93390bf10ede9ccd6a06219ecce547af10333e401920129af02794b03f1a60a7fd5007149530626a895a6ef5a8b9342abfd56860c5f3956f5d23libzzip-0.so.13libzzip-0.so.13libzzip-0.so.13libzzip-0.so.13.0.69libzzipfseeko-0.so.13libzzipfseeko-0.so.13libzzipfseeko-0.so.13libzzipfseeko-0.so.13.0.69libzzipmmapped-0.so.13libzzipmmapped-0.so.13libzzipmmapped-0.so.13libzzipmmapped-0.so.13.0.69libzzipwrap-0.so.13.0.69rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootzziplib-0.13.69-150000.3.20.1.src.rpmlibzzip-0-13libzzip-0-13(ppc-64)libzzip-0.so.13()(64bit)libzzipfseeko-0.so.13()(64bit)libzzipmmapped-0.so.13()(64bit)libzzipwrap-0.so.13()(64bit)zziplib@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libz.so.1()(64bit)libzzip-0.so.13()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1f@e`@^]W]:[[h@Z@Z@Z@Z@ZjZ$ZZyZtRZs@Zg#Zg#Y@XӸvalentin.lefebvre@suse.comvalentin.lefebvre@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comavindra@opensuse.orgadam.majer@suse.dejengelh@inai.deavindra@opensuse.orgjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comtchvatal@suse.comtchvatal@suse.commpluskal@suse.comjosef.moellers@suse.com- fetch_disk_trailer: Don't truncate the size verif. [bsc#1227178, CVE-2024-39134, bsc1227178-fetch_disk_trailer-Don-t-truncate-the-size-verif.patch- assert full zzip_file_header. [bsc#1214577, CVE-2020-18770, CVE-2020-18770.patch]- A recent upstream commit has introduced a regression: The return value of the function ‘zzip_fread’ is a signed int and "0" is a valid return value. [bsc#1187526, CVE-2020-18442, bsc1187526-fix-Incorrect-handling-of-function-zzip_fread-return-value.patch]- Make an unconditional error message conditional by checking the return value of a function call. [bsc1154002, bsc1154002-prevent-unnecessary-perror.patch]- Fixed another instance where division by 0 may occur. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Prevent division by zero by first checking if uncompressed size is 0. This may happen with directories which have a compressed and uncompressed size of 0. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Remove any "../" components from pathnames of extracted files. [bsc#1110687, CVE-2018-17828, CVE-2018-17828.patch]- Avoid memory leak from __zzip_parse_root_directory(). Free allocated structure if its address is not passed back. [bsc#1107424, CVE-2018-16548, CVE-2018-16548.patch]- Check if data from End of central directory record makes sense. Especially the Offset of start of central directory must not a) be negative or b) point behind the end-of-file. - Check if compressed size in Central directory file header makes sense, i.e. the file's data does not extend beyond the end of the file. [bsc#1084517, CVE-2018-7726, CVE-2018-7726.patch, bsc#1084519, CVE-2018-7725, CVE-2018-7725.patch]- Update to 0.13.69: * fix a number of CVEs reported with special *.zip PoC files * completing some doc strings while checking the new man-pages to look good * update refs to point to github instead of sf.net * man-pages are generated with new dbk2man.py - docbook xmlto is optional now * a zip-program is still required for testing, but some errors are gone when not present - run spec-cleaner - don't ship Windows only file, README.MSVC6- Drop BR: fdupes since it does nothing.- Fix RPM groups. Remove ineffective --with-pic. Trim redundancies from description. Do not let fdupes run across partitions.- Update to 0.13.68: * fix a number of CVEs reported with special *.zip files * minor doc updates referencing GitHub instead of sf.net - drop CVE-2018-6381.patch * merged in a803559fa9194be895422ba3684cf6309b6bb598 - drop CVE-2018-6484.patch * merged in 0c0c9256b0903f664bca25dd8d924211f81e01d3 - drop CVE-2018-6540.patch * merged in 15b8c969df962a444dfa07b3d5bd4b27dc0dbba7 - drop CVE-2018-6542.patch * merged in 938011cd60f5a8a2a16a49e5f317aca640cf4110- Changed %license to %doc in SPEC file.- If the size of the central directory is too big, reject the file. Then, if loading the ZIP file fails, display an error message. [CVE-2018-6542.patch, CVE-2018-6542, bsc#1079094]- If an extension block is too small to hold an extension, do not use the information therein. - If the End of central directory record (EOCD) contains an Offset of start of central directory which is beyond the end of the file, reject the file. [CVE-2018-6540, bsc#1079096, CVE-2018-6540.patch]- Reject the ZIP file and report it as corrupt if the size of the central directory and/or the offset of start of central directory point beyond the end of the ZIP file. [CVE-2018-6484, boo#1078701, CVE-2018-6484.patch]- If a file is uncompressed, compressed and uncompressed sizes should be identical. [CVE-2018-6381, bsc#1078497, CVE-2018-6381.patch]- Drop tests as they fail completely anyway, not finding lib needing zip command, this should allow us to kill python dependency - Also drop docs subdir avoiding python dependency for it * The generated xmls were used for mans too but we shipped those only in devel pkg and as such we will live without them- Version update to 0.13.67: * Various fixes found by fuzzing * Merged bellow patches - Remove merged patches: * zziplib-CVE-2017-5974.patch * zziplib-CVE-2017-5975.patch * zziplib-CVE-2017-5976.patch * zziplib-CVE-2017-5978.patch * zziplib-CVE-2017-5979.patch * zziplib-CVE-2017-5981.patch - Switch to github tarball as upstream seem no longer pull it to sourceforge - Remove no longer applying patch zziplib-unzipcat-NULL-name.patch * The sourcecode was quite changed for this to work this way anymore, lets hope this is fixed too- Packaking changes: * Depend on python2 explicitly * Cleanup with spec-cleaner- Several bugs fixed: * heap-based buffer overflows (bsc#1024517, CVE-2017-5974, zziplib-CVE-2017-5974.patch) * check if "relative offset of local header" in "central directory header" really points to a local header (ZZIP_FILE_HEADER_MAGIC) (bsc#1024528, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against bad formatted data in extra blocks (bsc#1024531, CVE-2017-5976, zziplib-CVE-2017-5976.patch) * NULL pointer dereference in main (unzzipcat-mem.c) (bsc#1024532, bsc#1024536, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against huge values of "extra field length" in local file header and central file header (bsc#1024533, CVE-2017-5978, zziplib-CVE-2017-5978.patch) * clear ZZIP_ENTRY record before use. (bsc#1024534, bsc#1024535, CVE-2017-5979, CVE-2017-5977, zziplib-CVE-2017-5979.patch) * prevent unzzipcat.c from trying to print a NULL name (bsc#1024537, zziplib-unzipcat-NULL-name.patch) * Replace assert() by going to error exit. (bsc#1034539, CVE-2017-5981, zziplib-CVE-2017-5981.patch)/sbin/ldconfig/sbin/ldconfigzziplibnebbiolo 1723532876 0.13.69-150000.3.20.10.13.69-150000.3.20.10.13.69-150000.3.20.10.13.69-150000.3.20.1libzzip-0.so.10libzzip-0.so.11libzzip-0.so.12libzzip-0.so.13libzzip-0.so.13.0.69libzzipfseeko-0.so.10libzzipfseeko-0.so.11libzzipfseeko-0.so.12libzzipfseeko-0.so.13libzzipfseeko-0.so.13.0.69libzzipmmapped-0.so.10libzzipmmapped-0.so.11libzzipmmapped-0.so.12libzzipmmapped-0.so.13libzzipmmapped-0.so.13.0.69libzzipwrap-0.so.13libzzipwrap-0.so.13.0.69libzzip-0-13COPYING.LIB/usr/lib64//usr/share/licenses//usr/share/licenses/libzzip-0-13/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:35220/SUSE_SLE-15_Update/d4cf1719d7ddfd380f7d75a99444cfe5-zziplib.SUSE_SLE-15_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=ea238c2365a800ed6159bf83c0fc099bbae2b0e4, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=b09eb0e815a1f83aeef094118fe4a01ae8f4363f, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=67224332332f49188c90a140c5ef26b29141fbee, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=5fcfea98ed4a78b21a38310ae04cc481652ed342, strippeddirectoryASCII text PRRRPRRRPRRRPRRR45oc7mrõ;<950 FbcNW#C]j,EC#[HU딢 {OO Fѭg:'Gm(r^GݔO[J#my([(b˄a1/RYO #{QIDNq Q62D)D,HGEk6Ep1bh8 'OJ=5LnDrOLƀ;80V8_Q5G4 ~8ȄzH{kPd9Jkw4M{:Lx8-¼0Ss~v?X"} Nm҉f2jJN+#b(1sN78))yezDɓ ]8*+;Ae}[EJ5:GPD cu)n] ,76/dښ>akumy>s بT7#0P(rigJo9,1נ ָ{ -F@3;IGP?:>D@j>K~/K_xN+}$3U?rT 2Rlboq r!"PZς la~ ǨomI Iq|T4z]<~ Zkof `m"XgNs'M|onЋ ,0P[FKrTWpqD,~#2F`6&o- g`C;EFfamyt{P:a QFWOy/iҝ  F4O}bI9\ydN*5!1RuSkm It!?T|DlC]j bЊ@!U8Xq epߌF$|tFfubKv^Ee3 R" HS:g}6G5,?;R䴮[ՉEJ(CT]tA5 ;7 o;jO_{ ,TJRZ< qPwjghQE\cprxsl`Wn w0@8@=<`rPpğiDk35ٶX}[R+edT# +ITZg,@='?38vFqIw\л\e\=`dǸDA9 v8[̨>6C{3| c<¸͍3z!e>Y'L uly G̓EW!IG!\ 6bZhm8£* 16Z۸qs$/nY<͕늻85%GY$ o|wEQ2>R =g#ƕϊd jEX4pfbq^A-'a }\? #i' akx6A'ZQd_%ȃ9 2.h'G/O?hSm{a<'P2S WZD.ekKx!gp.\33 a1ӻ~N+Gn]gF[s:2Sj,ǁ:z$lۮ·#3n 5}ɃO4pO^.Zj3QzVa~U՗6Rhhyo#Y)&eL,k?gmɏK#;Buz[cO&i w1·uѝU..6Y. d?M!䍾zpLP.gʲE/vKp #>9A(Z¥pFP :&*AP'J@9U׻= 9(B6pb2'_<z겪T Q;FMoGbnOk_&2^,v\k$5jjO]qCͤ2-x]^t0&˯ԲDyW:7"5?DŽh% +*MFT^Zl*aO*#VSkIƘ^;o5TvcSdOs{ÿhl3ORDc6eǁdWP$F5M0[-; OT鯧*(lex xJ5`WQN[W:*aarT Dߩ%Eb%6WoПL'݂jd;f}Ƈ5sX6T% zz L}fWGC)yґAVW Q ?!v(3\[V0վpLkSȮ_5EPS{rN;%:ݷgĮȡx ^XsCrmV6WHgp+`kqX Xj%dݟf3qm)M E䟩ˌp$nJP̟ [b~8N 6PPGXP-T./3U.&+ra-\TvM}AK!d]\'#Bc[YgicQO$SŠCR|} NIl$o%lݟ2Z^diҊ9\X* QtGhN!jrp 66 f .|hNzkj*C ;Cr#ρ'1` 5; *z!c;!N] yIxz 1`١y:ƠcD\"2z-BÖyUO'48tzNs6iW&?DТf`C*)JyO=9KWcm`_ɯwdѤWsD.BJjUT'іn\/I9IYgdWOp"mjR׋'KY9[!_Ih9mnQ\^>6;7rqդWFSi/Q Z 7Zo˹C*wg| OjMX4rREU' Njr:^9%{@e kN |8=.:جך*h6i3B69J%s3@𴨫]g/ҿ>ahimBvuV*8Xhpj+ܱ'5yUr W9n}# wDP߻=LIlJzk [l͇3꾞.-7>ܹ-J+p !|ɛt=& 57 2sx=$MwҬ/$9z3@?m\L E}+)G(a֬\=:Op}?|S~ #6TJ>ϕ&^ڔcmjѨ! ĬU=i~1e,Pdg%&l/BkIb:PE托<2q;Xʷ,v$|V-+L᳉5&tJ8 CVWi Z*zX].ױu 4 >~n-b،I)vuz7΃w90xٕϸsI%|ش{四,*t׆2:>O3mLg)aL}\M:JB(ۏZS9FD@I8ߦ:,!CBk{~cCq4dCۺ. O :r\Ԅb8VƃD;U=<[ņHq q?$5efVxLARʪt4Z4B YZ