libzzip-0-13-0.13.69-150000.3.20.1<>,Vf%p9|2$^&In N:esϘx_# *׊uux?`9KZR&jr,]zj BxKd@Q哶]POLНb)y">m ı*kupeXcBXWcjd +|W#NO/W.Pz( >rܺd/E;)<0_|$Wl\FSf]8̒u/uש#h׮zW>C)?)d % =  :@H   ,  O    (=8D9: >!@!"B!1F!9G!PH!I!X!Y"Z"`["d\"|]"^$Nb$c%:d%e%f%l%u%v& w(x(y)z)x))))Clibzzip-0-130.13.69150000.3.20.1ZIP compression libraryZZipLib is a library for dealing with ZIP and ZIP-like archives by using algorithms of zlib.f%h04-armsrv2qSUSE Linux Enterprise 15SUSE LLC LGPL-2.1+https://www.suse.com/System/Librarieshttp://zziplib.sourceforge.netlinuxaarch64  0 bA큤f#f#f#f#f$f#f#f#f#f$f#f#f#f#f$f$f$f$Z5b8b0854b4043c842dd2222a70c4314bd9bc88b9697a447554c55bdae386cdc568d1aa149e4684a46b8d64368f486141ae9f753eb1daa6f4cd518a9b5ea7aaab47aba9406133eda5f97edde616bbcaef37f36cfd2535bcf5f30ac191bf3a3bc0a1fc3057c7973673c42d5c655689449ebe42216ac9716d496c7c641c0fc11366d94b03f1a60a7fd5007149530626a895a6ef5a8b9342abfd56860c5f3956f5d23libzzip-0.so.13libzzip-0.so.13libzzip-0.so.13libzzip-0.so.13.0.69libzzipfseeko-0.so.13libzzipfseeko-0.so.13libzzipfseeko-0.so.13libzzipfseeko-0.so.13.0.69libzzipmmapped-0.so.13libzzipmmapped-0.so.13libzzipmmapped-0.so.13libzzipmmapped-0.so.13.0.69libzzipwrap-0.so.13.0.69rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootzziplib-0.13.69-150000.3.20.1.src.rpmlibzzip-0-13libzzip-0-13(aarch-64)libzzip-0.so.13()(64bit)libzzipfseeko-0.so.13()(64bit)libzzipmmapped-0.so.13()(64bit)libzzipwrap-0.so.13()(64bit)zziplib@@@@@@    /sbin/ldconfig/sbin/ldconfigld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libz.so.1()(64bit)libzzip-0.so.13()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1f@e`@^]W]:[[h@Z@Z@Z@Z@ZjZ$ZZyZtRZs@Zg#Zg#Y@XӸvalentin.lefebvre@suse.comvalentin.lefebvre@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comavindra@opensuse.orgadam.majer@suse.dejengelh@inai.deavindra@opensuse.orgjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comtchvatal@suse.comtchvatal@suse.commpluskal@suse.comjosef.moellers@suse.com- fetch_disk_trailer: Don't truncate the size verif. [bsc#1227178, CVE-2024-39134, bsc1227178-fetch_disk_trailer-Don-t-truncate-the-size-verif.patch- assert full zzip_file_header. [bsc#1214577, CVE-2020-18770, CVE-2020-18770.patch]- A recent upstream commit has introduced a regression: The return value of the function ‘zzip_fread’ is a signed int and "0" is a valid return value. [bsc#1187526, CVE-2020-18442, bsc1187526-fix-Incorrect-handling-of-function-zzip_fread-return-value.patch]- Make an unconditional error message conditional by checking the return value of a function call. [bsc1154002, bsc1154002-prevent-unnecessary-perror.patch]- Fixed another instance where division by 0 may occur. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Prevent division by zero by first checking if uncompressed size is 0. This may happen with directories which have a compressed and uncompressed size of 0. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Remove any "../" components from pathnames of extracted files. [bsc#1110687, CVE-2018-17828, CVE-2018-17828.patch]- Avoid memory leak from __zzip_parse_root_directory(). Free allocated structure if its address is not passed back. [bsc#1107424, CVE-2018-16548, CVE-2018-16548.patch]- Check if data from End of central directory record makes sense. Especially the Offset of start of central directory must not a) be negative or b) point behind the end-of-file. - Check if compressed size in Central directory file header makes sense, i.e. the file's data does not extend beyond the end of the file. [bsc#1084517, CVE-2018-7726, CVE-2018-7726.patch, bsc#1084519, CVE-2018-7725, CVE-2018-7725.patch]- Update to 0.13.69: * fix a number of CVEs reported with special *.zip PoC files * completing some doc strings while checking the new man-pages to look good * update refs to point to github instead of sf.net * man-pages are generated with new dbk2man.py - docbook xmlto is optional now * a zip-program is still required for testing, but some errors are gone when not present - run spec-cleaner - don't ship Windows only file, README.MSVC6- Drop BR: fdupes since it does nothing.- Fix RPM groups. Remove ineffective --with-pic. Trim redundancies from description. Do not let fdupes run across partitions.- Update to 0.13.68: * fix a number of CVEs reported with special *.zip files * minor doc updates referencing GitHub instead of sf.net - drop CVE-2018-6381.patch * merged in a803559fa9194be895422ba3684cf6309b6bb598 - drop CVE-2018-6484.patch * merged in 0c0c9256b0903f664bca25dd8d924211f81e01d3 - drop CVE-2018-6540.patch * merged in 15b8c969df962a444dfa07b3d5bd4b27dc0dbba7 - drop CVE-2018-6542.patch * merged in 938011cd60f5a8a2a16a49e5f317aca640cf4110- Changed %license to %doc in SPEC file.- If the size of the central directory is too big, reject the file. Then, if loading the ZIP file fails, display an error message. [CVE-2018-6542.patch, CVE-2018-6542, bsc#1079094]- If an extension block is too small to hold an extension, do not use the information therein. - If the End of central directory record (EOCD) contains an Offset of start of central directory which is beyond the end of the file, reject the file. [CVE-2018-6540, bsc#1079096, CVE-2018-6540.patch]- Reject the ZIP file and report it as corrupt if the size of the central directory and/or the offset of start of central directory point beyond the end of the ZIP file. [CVE-2018-6484, boo#1078701, CVE-2018-6484.patch]- If a file is uncompressed, compressed and uncompressed sizes should be identical. [CVE-2018-6381, bsc#1078497, CVE-2018-6381.patch]- Drop tests as they fail completely anyway, not finding lib needing zip command, this should allow us to kill python dependency - Also drop docs subdir avoiding python dependency for it * The generated xmls were used for mans too but we shipped those only in devel pkg and as such we will live without them- Version update to 0.13.67: * Various fixes found by fuzzing * Merged bellow patches - Remove merged patches: * zziplib-CVE-2017-5974.patch * zziplib-CVE-2017-5975.patch * zziplib-CVE-2017-5976.patch * zziplib-CVE-2017-5978.patch * zziplib-CVE-2017-5979.patch * zziplib-CVE-2017-5981.patch - Switch to github tarball as upstream seem no longer pull it to sourceforge - Remove no longer applying patch zziplib-unzipcat-NULL-name.patch * The sourcecode was quite changed for this to work this way anymore, lets hope this is fixed too- Packaking changes: * Depend on python2 explicitly * Cleanup with spec-cleaner- Several bugs fixed: * heap-based buffer overflows (bsc#1024517, CVE-2017-5974, zziplib-CVE-2017-5974.patch) * check if "relative offset of local header" in "central directory header" really points to a local header (ZZIP_FILE_HEADER_MAGIC) (bsc#1024528, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against bad formatted data in extra blocks (bsc#1024531, CVE-2017-5976, zziplib-CVE-2017-5976.patch) * NULL pointer dereference in main (unzzipcat-mem.c) (bsc#1024532, bsc#1024536, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against huge values of "extra field length" in local file header and central file header (bsc#1024533, CVE-2017-5978, zziplib-CVE-2017-5978.patch) * clear ZZIP_ENTRY record before use. (bsc#1024534, bsc#1024535, CVE-2017-5979, CVE-2017-5977, zziplib-CVE-2017-5979.patch) * prevent unzzipcat.c from trying to print a NULL name (bsc#1024537, zziplib-unzipcat-NULL-name.patch) * Replace assert() by going to error exit. (bsc#1034539, CVE-2017-5981, zziplib-CVE-2017-5981.patch)/sbin/ldconfig/sbin/ldconfigzziplibh04-armsrv2 1723532837 0.13.69-150000.3.20.10.13.69-150000.3.20.10.13.69-150000.3.20.10.13.69-150000.3.20.1libzzip-0.so.10libzzip-0.so.11libzzip-0.so.12libzzip-0.so.13libzzip-0.so.13.0.69libzzipfseeko-0.so.10libzzipfseeko-0.so.11libzzipfseeko-0.so.12libzzipfseeko-0.so.13libzzipfseeko-0.so.13.0.69libzzipmmapped-0.so.10libzzipmmapped-0.so.11libzzipmmapped-0.so.12libzzipmmapped-0.so.13libzzipmmapped-0.so.13.0.69libzzipwrap-0.so.13libzzipwrap-0.so.13.0.69libzzip-0-13COPYING.LIB/usr/lib64//usr/share/licenses//usr/share/licenses/libzzip-0-13/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:35220/SUSE_SLE-15_Update/d4cf1719d7ddfd380f7d75a99444cfe5-zziplib.SUSE_SLE-15_Updatedrpmxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=3b50d2f164a819bfc5fc96f1d1de5f185e663c31, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=bd4a519809308d67de36d2d22b63c6bdbc6f787b, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=56d7e71b898db1c9496dddaa40a7a1dc2ebe6ffe, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=86a3fd445a62ecef9ab3c723452b040fdba69194, strippeddirectoryASCII text PRRRRRPRRRRRPRRRRRPRRRRRD|1u;utf-8d88c1a3193b197fc4af1a59d7ebf95949f9fd85790e95b8a9cf41468804e97d7?7zXZ !t/A~(]"k%r=d5NmBonqjkޠS>4ޞi '&D'%D\àM кB>TJnB }+#۶CACoyDH0l8#s2fIEcsJ6!53)x8PqNE՟Sxs\F;ѧaO.WɛlRN91OWh-H0]vbCq.= .wRR+}*行}3:٧kv`ti$ktHq+WX;oz5ﮫPԞIHnh4%QaX_Hn! _%AՍA f\\;?XWGԄKj`;!jC:T_Deuccڡa^ 5 K+F"7 Lزy Iڬa hO!`61(%=) o?#%Jt%m(,< #*6d5Y9p#Kc;4"d&"vlwŶL1YԵMwT)[¡%"40<¿lk1&gqhO5ᑼ>g~}c$.wh-oʛPBDHzڄNE`;C1sh M$3*gs S019 ފ݄ؗSpZ3+4D])!y -]y@mP<lȡ3,Ls{<؁섅ѰLR _A]Y]>$MkC쒪_tIR_dsL:/g%EQ@y+(0W'ŒYP1 uK5 1sle&ޒ_7y,)ozޓūe4$ 76q:<>Nk Jn|>B{Lyg wQx 3\ bL2iE(@u,MKdc$0$z-Fa*Ѡ^g @ͪ_(XuU.k,d  pH<'>!LU#}!w_ΰՏ "ZJM)7$6ܢ|1,BSj jT?&dpinY" SK m"^=F:"1Ոk0x%:Rb!\D\ @8>s)B)@ 9f/fBzVރIfg/?fq  e.f{ O!`]7WpIs.<4] KD=I>]̭J<`):}KUeP^WzԤ}7$  >> ?1,zK|nGI*S3{m!zBZIv2">ypO-r07@U7u>~qBvǗ3*-im6کډ~S_S G'xb-dzѾtч~,>kU^[Q/SgzH*rE{{-o)TsSA`f!&M`;L +v,|_MW@_Eyhi:{UbtVK_ ;5Z,<*G_?OM.+xRtRu8*ѸٵKF !$0R"Yxz6`;c.σ&UaTUdd H?q`q>:6Ƣp>sZk*7I#?3ָ}ܨ(1RVb @n3I°f`UlMx{*4`={1AnnI eĴڜ/%MFQ(cJ6_ޞj r% J^'_& =@g$ƍqCn?ԘL%td& ]W%c_:d?J`zoZZH(x|x d{WK(.g(Uq;6c5e8J!Dj[w:;_y_ 8%X5'zRtM+M1r" ;A4ڔ f@7i哣"r=}[@# ;IػBvr4V;uKLXkL[Ã?sň/ұ¥3|# ٺh ? 8؊֍xBU?Lyq$عL*{T;|@,rH:8S8qcJ|AsBKSqֶپ(p ĵ S[!;*/3STHeyٲ)eZ|d+ĝ}6wLZMq/αؕ2l* Ҽ XRѾv2TѢx,8f@=f謹Kd7sܲrucqDnY B.Z/speU*`G5ϖsN9B#@lK& SPcfǁڏ4V-T\&3LHrBn+eO޷Yl"$pwMWHsopY _wIPa=V(>&6F|^--Po Be=. NxfQw/ &'((~H.n j *YN66\Xqf_d+^GSm> >_[:K|j;m iZ"_1BUY]TZ:'yteHM"Ò[u\2;XYe*ޒ̢M0fǯB-67vP2ˁuMXԀy" x;>}IH&89,Cq5l4yd;KW_(/W$@IADdΒrl mP\u>5B$#Skj/ќeD]Fx#.<0= H'jɑcN狓V658bKzY 1?=ӝv8W_fOj z]ZO``ѻ-W VLSP>ĕ<(owM91 C>sC#tt𦿙T8G=5ˑo3d@\f *c*h2n.6bsP6t8+@ B'c6-nhhNQSK#~A(@60DGX/)$#ve>4jMSTb+N D|JbuOުrwWAp·g=?6w`<][t7rt'*>8N 3_@q)@||?g`5!5oXfYm9,pKvOKlM(KU5, !x r4!jh9OԦ(n%$_U;dcj}^s~r~!m%vb`wA[B,tS#` g ΎHل緋6j qLMk̊nrNgT3hDŽ`(:L!pP=1{4;'M{<<,/M3|a.={,bˏ+Bv,7z GŐ8ѳ +95ճXƨ9"7Hi؎1eEG}4R

] vc6;奤'[="4i)yK'2^$b!:V Gû@NnI0dϲtCjablY:Kf㗿Ϻc:-#be\I> !i<{͵5 Dq! { F6lARTOxjg :4X.޶xĉkEK4mSϗ2unA"v3TǵH>ꡝP>O"هp\]CY!̏]ۜXS):.iDOO 7l@yT1-Dh AT |km=*HffQ%Ⱦ-}AY>0r{ |~ry[i3x|x6=7p@{JF_|զeߊ wP͂31vWtb%w#;d^zM gXx{T36*| {RC|Zq:v%IT|=3X.1&ߋ.KJ*!q+j`љ$nAJgtTW0 )m$Wf)"qVFI^e&T6Fj>/O)|ԿR#rN#:''dgu[$ʀvrP2L fmU 5uVYVLIi=Ӂc4uŞwk4ZNbøIGa hU8*t OݢKKu~@%Q$hMPoPQkxm&d6Ry@n?4]+-Parub<8b?xȢPVK7!~O6 _g A$Η# b9l1`OD_xxL(%yc_tE>/$s auI9l1QhR&G~eayܻ]V ^<SC_>"D+*<9<e= H-ݼqj˜A@?W,O&$1 UrƄ"&R |P&EwOA#~xjTWrU&`\kzSVI׀ BdžC3y[/a1|OH+f6gfB> N;Ήs2l@Ux| *ʆ/0]+c),NY9րs,hy F j 싅tdI hLx58fj'ŽuR69Vn.?FvdlWGZPqH,;]G'E'zWg sQ_4\܃B%d#zZlQ'?O0 (!r^Lz|_Qv5ǕV9| c񅰡KJ *c̏;Yw9P8s?^]=QęY ܹk6N(mȼa@-DZC.-y TUaiMiX{4q{d ~+?CP 4tڽtv,;XR'"_oT^/+db(@ˠBӕR)l 4lmuGeڠLRe'АH84`FQY"SVÚE!"Q?_KfLW)d\l üA%;4^˙GskCSvçj1foCH@BLjBdD?Hc*eİ6亿"4mm䃞ZOTѐ/D]"<X9 fCX]< SjB^묳U" Q(ժKYO+qPf_ƭWwk5 uֻalRq1] ,fnL+.N*HNaQQ(CR"{E]PYxS0bQTCوQm^Qojv9滴M_E(|^ 8ҚU7 Rg<)ql^uʀ N*8hH 1=hӪ??n27V b_8fl j9(~Fpuh~Z`W0!l|栘Om3O+,m80쾺87B_=JDGY;vOnH Bl)}"L1M܏6VnO8 -B[xQ#3ʵ Q1sز ›;&w2烃usaABpk( h*c/YߩFL.x*!j'RF+.WQ:IaSXJ6ۆYy̱g c*NOqʹbĖR[̟n+iy˱,D +OmEa|'S׋c ccO4,|d\Or/!v/ۦ10:0^` kaR>Ld7rY kZVʾ7| #wLf~3%tc/h 1B ;ܻȘ@jG %>[tEZ`i " rYk _%׏MR2.bggͿ>gyBNL`*RwykBKB I3J'2*@'N)D@xt(%keG}*<8RB Q?:̄io̴NQfFpu,E?N0?^ejdyLvz&c91y K )A6mĹ`|4<;L,<8nωC N>KƽB\py(2u[ڿTԎ<я~wH>v,,y!01G&0Q`l[tT63Ȁ6k\Q[ l Xǜ nAeU`%HdL[!ic[IXoۍ/vXVPEO^McF4"q[o=b /ۺvy oQy,<5뮖!d^'|𒺖n*'yLx[pG7(u1tf%}?[!oҡ"h5c 6O<#k{t?Ƣ ua3,_~-ꮙ?թ hfKIpm#!a :tsNctʪfhIɝexn%'uNPf/{a$@Ի+z4#T.I2kηkޛjA|WoOHT{żSD#ރ9u{&ZV$=W:$@P+_ YZ