libzzip-0-13-0.13.69-150000.3.17.1<>,Ke#p9|e~ niy"o6_fvHɴvPynQ<>oj*P,똴p9>}a1U|:~bMXw߫R3:hiix*y#GBf+6uB xcas'QM!j,iu'>E5'H`BxҝIx >ŀ+dH[! :C)`?)Pd % =  :@H   ,  O I(o8x9: > @ B F G H!I!dX!xY!Z![!\!]"D^#b$ c$d%0e%5f%8l%:u%Lv%w'x(0y(|z())) )LClibzzip-0-130.13.69150000.3.17.1ZIP compression libraryZZipLib is a library for dealing with ZIP and ZIP-like archives by using algorithms of zlib.e#h01-ch4dSUSE Linux Enterprise 15SUSE LLC LGPL-2.1+https://www.suse.com/System/Librarieshttp://zziplib.sourceforge.netlinuxx86_64|8IP(HbA큤e"e"e"e"e"e"e"e"e"e"e"e"e"e"e"e"e"e"Z5a2e3b4401c63499e99ffe1c48534156af0cc78ea949e1da19cbd2efe0f9ac1734aa7d0e89efefddad0e4ac91d44e134940898bb46d004936c68ba20e924c59ac0c635e4f890d65d3825d6e990858ccfdc56e70c77726034974add85301e963af7abe16e89f58fb66385c3e91efe319e2c061ed850743587de529f22d0d0a341394b03f1a60a7fd5007149530626a895a6ef5a8b9342abfd56860c5f3956f5d23libzzip-0.so.13libzzip-0.so.13libzzip-0.so.13libzzip-0.so.13.0.69libzzipfseeko-0.so.13libzzipfseeko-0.so.13libzzipfseeko-0.so.13libzzipfseeko-0.so.13.0.69libzzipmmapped-0.so.13libzzipmmapped-0.so.13libzzipmmapped-0.so.13libzzipmmapped-0.so.13.0.69libzzipwrap-0.so.13.0.69rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootzziplib-0.13.69-150000.3.17.1.src.rpmlibzzip-0-13libzzip-0-13(x86-64)libzzip-0.so.13()(64bit)libzzipfseeko-0.so.13()(64bit)libzzipmmapped-0.so.13()(64bit)libzzipwrap-0.so.13()(64bit)zziplib@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libz.so.1()(64bit)libzzip-0.so.13()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1e`@^]W]:[[h@Z@Z@Z@Z@ZjZ$ZZyZtRZs@Zg#Zg#Y@XӸvalentin.lefebvre@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comavindra@opensuse.orgadam.majer@suse.dejengelh@inai.deavindra@opensuse.orgjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comtchvatal@suse.comtchvatal@suse.commpluskal@suse.comjosef.moellers@suse.com- assert full zzip_file_header. [bsc#1214577, CVE-2020-18770, CVE-2020-18770.patch]- A recent upstream commit has introduced a regression: The return value of the function ‘zzip_fread’ is a signed int and "0" is a valid return value. [bsc#1187526, CVE-2020-18442, bsc1187526-fix-Incorrect-handling-of-function-zzip_fread-return-value.patch]- Make an unconditional error message conditional by checking the return value of a function call. [bsc1154002, bsc1154002-prevent-unnecessary-perror.patch]- Fixed another instance where division by 0 may occur. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Prevent division by zero by first checking if uncompressed size is 0. This may happen with directories which have a compressed and uncompressed size of 0. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Remove any "../" components from pathnames of extracted files. [bsc#1110687, CVE-2018-17828, CVE-2018-17828.patch]- Avoid memory leak from __zzip_parse_root_directory(). Free allocated structure if its address is not passed back. [bsc#1107424, CVE-2018-16548, CVE-2018-16548.patch]- Check if data from End of central directory record makes sense. Especially the Offset of start of central directory must not a) be negative or b) point behind the end-of-file. - Check if compressed size in Central directory file header makes sense, i.e. the file's data does not extend beyond the end of the file. [bsc#1084517, CVE-2018-7726, CVE-2018-7726.patch, bsc#1084519, CVE-2018-7725, CVE-2018-7725.patch]- Update to 0.13.69: * fix a number of CVEs reported with special *.zip PoC files * completing some doc strings while checking the new man-pages to look good * update refs to point to github instead of sf.net * man-pages are generated with new dbk2man.py - docbook xmlto is optional now * a zip-program is still required for testing, but some errors are gone when not present - run spec-cleaner - don't ship Windows only file, README.MSVC6- Drop BR: fdupes since it does nothing.- Fix RPM groups. Remove ineffective --with-pic. Trim redundancies from description. Do not let fdupes run across partitions.- Update to 0.13.68: * fix a number of CVEs reported with special *.zip files * minor doc updates referencing GitHub instead of sf.net - drop CVE-2018-6381.patch * merged in a803559fa9194be895422ba3684cf6309b6bb598 - drop CVE-2018-6484.patch * merged in 0c0c9256b0903f664bca25dd8d924211f81e01d3 - drop CVE-2018-6540.patch * merged in 15b8c969df962a444dfa07b3d5bd4b27dc0dbba7 - drop CVE-2018-6542.patch * merged in 938011cd60f5a8a2a16a49e5f317aca640cf4110- Changed %license to %doc in SPEC file.- If the size of the central directory is too big, reject the file. Then, if loading the ZIP file fails, display an error message. [CVE-2018-6542.patch, CVE-2018-6542, bsc#1079094]- If an extension block is too small to hold an extension, do not use the information therein. - If the End of central directory record (EOCD) contains an Offset of start of central directory which is beyond the end of the file, reject the file. [CVE-2018-6540, bsc#1079096, CVE-2018-6540.patch]- Reject the ZIP file and report it as corrupt if the size of the central directory and/or the offset of start of central directory point beyond the end of the ZIP file. [CVE-2018-6484, boo#1078701, CVE-2018-6484.patch]- If a file is uncompressed, compressed and uncompressed sizes should be identical. [CVE-2018-6381, bsc#1078497, CVE-2018-6381.patch]- Drop tests as they fail completely anyway, not finding lib needing zip command, this should allow us to kill python dependency - Also drop docs subdir avoiding python dependency for it * The generated xmls were used for mans too but we shipped those only in devel pkg and as such we will live without them- Version update to 0.13.67: * Various fixes found by fuzzing * Merged bellow patches - Remove merged patches: * zziplib-CVE-2017-5974.patch * zziplib-CVE-2017-5975.patch * zziplib-CVE-2017-5976.patch * zziplib-CVE-2017-5978.patch * zziplib-CVE-2017-5979.patch * zziplib-CVE-2017-5981.patch - Switch to github tarball as upstream seem no longer pull it to sourceforge - Remove no longer applying patch zziplib-unzipcat-NULL-name.patch * The sourcecode was quite changed for this to work this way anymore, lets hope this is fixed too- Packaking changes: * Depend on python2 explicitly * Cleanup with spec-cleaner- Several bugs fixed: * heap-based buffer overflows (bsc#1024517, CVE-2017-5974, zziplib-CVE-2017-5974.patch) * check if "relative offset of local header" in "central directory header" really points to a local header (ZZIP_FILE_HEADER_MAGIC) (bsc#1024528, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against bad formatted data in extra blocks (bsc#1024531, CVE-2017-5976, zziplib-CVE-2017-5976.patch) * NULL pointer dereference in main (unzzipcat-mem.c) (bsc#1024532, bsc#1024536, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against huge values of "extra field length" in local file header and central file header (bsc#1024533, CVE-2017-5978, zziplib-CVE-2017-5978.patch) * clear ZZIP_ENTRY record before use. (bsc#1024534, bsc#1024535, CVE-2017-5979, CVE-2017-5977, zziplib-CVE-2017-5979.patch) * prevent unzzipcat.c from trying to print a NULL name (bsc#1024537, zziplib-unzipcat-NULL-name.patch) * Replace assert() by going to error exit. (bsc#1034539, CVE-2017-5981, zziplib-CVE-2017-5981.patch)/sbin/ldconfig/sbin/ldconfigzziplibh01-ch4d 1709827107 0.13.69-150000.3.17.10.13.69-150000.3.17.10.13.69-150000.3.17.10.13.69-150000.3.17.1libzzip-0.so.10libzzip-0.so.11libzzip-0.so.12libzzip-0.so.13libzzip-0.so.13.0.69libzzipfseeko-0.so.10libzzipfseeko-0.so.11libzzipfseeko-0.so.12libzzipfseeko-0.so.13libzzipfseeko-0.so.13.0.69libzzipmmapped-0.so.10libzzipmmapped-0.so.11libzzipmmapped-0.so.12libzzipmmapped-0.so.13libzzipmmapped-0.so.13.0.69libzzipwrap-0.so.13libzzipwrap-0.so.13.0.69libzzip-0-13COPYING.LIB/usr/lib64//usr/share/licenses//usr/share/licenses/libzzip-0-13/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:13903/SUSE_SLE-15_Update/c63c91594715fe1ff338d69a19d851b2-zziplib.SUSE_SLE-15_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=866ec85370c6bf604cef2783150195b098c50eaf, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=2f1047bc4f9eda81708fa5afce0a28f6bcb2f59d, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=6814c96d88f948f1eda34010351f862239a657f0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=48b68bd82027461612b8534b6208b6823648a2be, strippeddirectoryASCII textPRRRRRRPRRRRRRRPRRRRRRPRRRRR RM8D?jF0utf-8827a0fedadf120bfcbd2970e244badd91d9e7fe0db213d8cf262bb7533bed724?7zXZ !t//q]"k%r=d5NmBonL15fADm"4&C؀sk箞3:8]=vs/Ft]&XVtIf{$h=O]'kxlg4o|2aYWaxg $:S d*eׁ)z!n^0ڒ&Xj,H㺢0}?kѳMx|EEGUjѤ,GUrL!אMW'Zo% \\fJ1TX,Nm3QNl_fZz51`#( +nOP&RKk[?>G$5']Uo:h꫺+fgƾsWwlqVm籄=`Geq}vu7R;g.vs(2ojEJ;3e Q￉Z#1+~ѷZ.ECwswA<':;+ńAZ1zVx';0W}KcSѲ_. T}"=CWc'-ukAk-"'J3#/=/?fNGnRw ݢ8'ώWBkW<,9Fadch<\pVF!aMNr m}M I :Vӧ'0S :~*NC aQpårߘYǮC"znޤԭS K\ӌˤ;B|z!z| js` kJm",ӊmBm]& $c fy5uR]UvD5SԬY+?N6q#sW)b~\N-#eGhbu0Ņ:$eJxh6Opx%sV3f+d )I1\Bd\c1Ék9by_/]VyM=r$p{lՍR1,\|S l+$F 7 "KoVM%^ߦ6v5Z+ fEyf˜뱞eG[1ʍTNϽ3wtw5bg'yWw(!D1$Ԟz.LO. <О11k_]z&_̡|*{*r^A-VסpVSt }}$c)Z ْhkU/CRT6p]R"0pZ@$Jq 5@'_kjj+ԫݡfs? )E{kӂ-8An"=Lشs8w6 S`V\ďBjc%@"㥁ݟ^YRJgܛ'Eܠ=z3/ى+IW]o>\Հ"#c{Pq:)0{خ䏠p\ 3in S3_+JUyJJ&]w(yF8qiSFow͑bt 1?:!A6o=Sٮ(q@84Q :e!{ZDCHQh*V93HkNp _rqhm& '6czA:+^S'CdE-j]ؕ8]v@h4~iɉZPh_[.ɴrw,sWnDx]BPˮQ?Ex\(DӼS^LWa:%冇_FzD9[O| ÔkhڑArj񳛐4ОUnY%o'w"+ (N%NR>tٺ>b>X>ʮe[_<Rxq!j#Qs1+ҁdtvn&=gw^U'Z@pěĐ9~~ 4SVGy`wz.+"G+pz)bƒ'iRaCxHH]/j(M)|4&f$(f`#jxP Yy*?ap2D)?Pqe ok{* *RUwvZ\g/;riyK$N&4{j֢.$ *17@tſd@;PGAh+aRLQd+[&ߠD멶mYnz}$W AqīpMmw0+oD#;oxy+F;>)3A R;)V+Җ쎧 ;NC{ ,",y2+GAoMX]0FRS4zɸk8< @-@5cO:v6y\ #> @,+߼s="+PoUp>+T:yX-vcZmĔP׳a2slL ?QX-"kMؖpϰOM0c~tղT%lgL fp׻j*@ .5ۉ5awt3scB_r-3T)aSGJ%@PmNhӽDFiGsEvWL B>\l/~7߭Oh'5cĐ/8B{!& ȣ|4f/|y\`pTOӽ?˗Hȓu"/Huh/7`┬|}=_¤:Qo>'Iy vÍa9 ڤS|ev2#ޓQ %0𸼌ՠ&=q̥ . 5(#%*2>6o/%:.|T$yq)E%Ju FQHIH6 XJ9*P:v^{;vg+rx!E8L "q& Tͱ})r2s(yWu:&)w׏Vw,@fi{r%fnXG6mx^qq-hJ`s/Sd%:꜐9O&h2*Kv57P w;Z&_#UA wb.QZ~ 5E_d=1YJb/#lU>}_Ʌ؋ӥ&Aɲ8OS/;EnNZQ;j>3x8{og@ٟ1V)9sDdJw}[xky - 23A #VTL4 &x;>G=b1dFYɒ[Q1zBxts2ae~w[qxLQըbRȍ[߂L2g]ĂބԦ-A׬5Ŀf,f.auӰ-d_ـضߖ&I=ѮHmy19kI)QbWޫz tZ w,^>b59ڤ]A߱l/Nm$K~tjC^k  EiT*e8zIYUOj!BG!Ml807H藅)06Ѳix-ram.{ϏT)ߐ?(xDod-.}Px5?RU|~2ة}pFr"*iF2dJ *[#N oEȸQN:~yB &Or Џ76],w%W<ߥkv)8+d>H%; 9*aި"2{"Aţ 0NFhˢ*0z]D(vEPSې̼25-a羚lIXbYdK"Zp^^vQ %_9uum] +l::ъAonT1LQ%"Nr&_ǘ 6PSEԁtvӞRe2ou#V~]$HݑߐWGڧF d?H^+f XL(e2G\_LZ1,I|WOb2 *6ejxd1پJ/X&zJX"Z&n/J˶cQi?Rx`ba4 vI?AhSN=G'7 ̘r未%ZK4Vp͛tu5IxkhR/žS8(zku u\3~SYHeѾ?o,чsfi( 1إiR#NMsȋ59YV/qpLL`)LeM#FR 6k?eW;VNyucq0do3H1Z"g5Vx Aԑ|.نuCsc(X#5#n/yw,6jo(ɒm~FHIBg1o׈Vh ܙKMsP0ᣭQw,qI KGKdux~ڬ~$Ad'Ңҿ0M觀޻4yGk7| !-5\ᦟu+Enn$Ӡz-f@;>/r':^ 7 YZ