libzzip-0-13-0.13.69-lp151.4.3.1<>,6] c/=„ThCje3G8R#aR[YB#eIxkvbZ)C'?'d # ; $p    [ O B(k8t9: X>@@OB^FfGxHIX$Y@Z[\]^!b!c"d#-e#2f#5l#7u#Hv#w%x&@y&%z' '0'4':'|Clibzzip-0-130.13.69lp151.4.3.1ZIP compression libraryZZipLib is a library for dealing with ZIP and ZIP-like archives by using algorithms of zlib.] clamb56-openSUSE Leap 15.1openSUSELGPL-2.1+http://bugs.opensuse.orgSystem/Librarieshttp://zziplib.sourceforge.netlinuxi5865V bA큤] _] _] _] _] `] _] _] _] _] `] _] _] _] _] `] _] `] bZ59be03658ba8db38caf0c3571ade89d4cd2e1083b923c3c999586c8f3fb5b1cfe765b0d790c77ea4b08159dfd3b293f159d981a50c9e606bca78252ab5bc6d366c348d0128f9320ff0d92d45833bea61fcb138317a88b363fb2d987c236a23c0f1a8fdb1f5f6dacc76543e3a428125133a5455b168d92b99e4d9619191c80cd7a94b03f1a60a7fd5007149530626a895a6ef5a8b9342abfd56860c5f3956f5d23libzzip-0-64.so.13libzzip-0-64.so.13libzzip-0-64.so.13libzzip-0-64.so.13.0.69libzzipfseeko-0-64.so.13libzzipfseeko-0-64.so.13libzzipfseeko-0-64.so.13libzzipfseeko-0-64.so.13.0.69libzzipmmapped-0-64.so.13libzzipmmapped-0-64.so.13libzzipmmapped-0-64.so.13libzzipmmapped-0-64.so.13.0.69libzzipwrap-0-64.so.13.0.69rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootzziplib-0.13.69-lp151.4.3.1.src.rpmlibzzip-0-13libzzip-0-13(x86-32)libzzip-0-64.so.13libzzipfseeko-0-64.so.13libzzipmmapped-0-64.so.13libzzipwrap-0-64.so.13zziplib@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.7)libz.so.1libzzip-0-64.so.13rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1]W]:[[h@Z@Z@Z@Z@ZjZ$ZZyZtRZs@Zg#Zg#Y@XӸJosef Möllers josef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comavindra@opensuse.orgadam.majer@suse.dejengelh@inai.deavindra@opensuse.orgjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comtchvatal@suse.comtchvatal@suse.commpluskal@suse.comjosef.moellers@suse.com- Fixed another instance where division by 0 may occur. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Prevent division by zero by first checking if uncompressed size is 0. This may happen with directories which have a compressed and uncompressed size of 0. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Remove any "../" components from pathnames of extracted files. [bsc#1110687, CVE-2018-17828, CVE-2018-17828.patch]- Avoid memory leak from __zzip_parse_root_directory(). Free allocated structure if its address is not passed back. [bsc#1107424, CVE-2018-16548, CVE-2018-16548.patch]- Check if data from End of central directory record makes sense. Especially the Offset of start of central directory must not a) be negative or b) point behind the end-of-file. - Check if compressed size in Central directory file header makes sense, i.e. the file's data does not extend beyond the end of the file. [bsc#1084517, CVE-2018-7726, CVE-2018-7726.patch, bsc#1084519, CVE-2018-7725, CVE-2018-7725.patch]- Update to 0.13.69: * fix a number of CVEs reported with special *.zip PoC files * completing some doc strings while checking the new man-pages to look good * update refs to point to github instead of sf.net * man-pages are generated with new dbk2man.py - docbook xmlto is optional now * a zip-program is still required for testing, but some errors are gone when not present - run spec-cleaner - don't ship Windows only file, README.MSVC6- Drop BR: fdupes since it does nothing.- Fix RPM groups. Remove ineffective --with-pic. Trim redundancies from description. Do not let fdupes run across partitions.- Update to 0.13.68: * fix a number of CVEs reported with special *.zip files * minor doc updates referencing GitHub instead of sf.net - drop CVE-2018-6381.patch * merged in a803559fa9194be895422ba3684cf6309b6bb598 - drop CVE-2018-6484.patch * merged in 0c0c9256b0903f664bca25dd8d924211f81e01d3 - drop CVE-2018-6540.patch * merged in 15b8c969df962a444dfa07b3d5bd4b27dc0dbba7 - drop CVE-2018-6542.patch * merged in 938011cd60f5a8a2a16a49e5f317aca640cf4110- Changed %license to %doc in SPEC file.- If the size of the central directory is too big, reject the file. Then, if loading the ZIP file fails, display an error message. [CVE-2018-6542.patch, CVE-2018-6542, bsc#1079094]- If an extension block is too small to hold an extension, do not use the information therein. - If the End of central directory record (EOCD) contains an Offset of start of central directory which is beyond the end of the file, reject the file. [CVE-2018-6540, bsc#1079096, CVE-2018-6540.patch]- Reject the ZIP file and report it as corrupt if the size of the central directory and/or the offset of start of central directory point beyond the end of the ZIP file. [CVE-2018-6484, boo#1078701, CVE-2018-6484.patch]- If a file is uncompressed, compressed and uncompressed sizes should be identical. [CVE-2018-6381, bsc#1078497, CVE-2018-6381.patch]- Drop tests as they fail completely anyway, not finding lib needing zip command, this should allow us to kill python dependency - Also drop docs subdir avoiding python dependency for it * The generated xmls were used for mans too but we shipped those only in devel pkg and as such we will live without them- Version update to 0.13.67: * Various fixes found by fuzzing * Merged bellow patches - Remove merged patches: * zziplib-CVE-2017-5974.patch * zziplib-CVE-2017-5975.patch * zziplib-CVE-2017-5976.patch * zziplib-CVE-2017-5978.patch * zziplib-CVE-2017-5979.patch * zziplib-CVE-2017-5981.patch - Switch to github tarball as upstream seem no longer pull it to sourceforge - Remove no longer applying patch zziplib-unzipcat-NULL-name.patch * The sourcecode was quite changed for this to work this way anymore, lets hope this is fixed too- Packaking changes: * Depend on python2 explicitly * Cleanup with spec-cleaner- Several bugs fixed: * heap-based buffer overflows (bsc#1024517, CVE-2017-5974, zziplib-CVE-2017-5974.patch) * check if "relative offset of local header" in "central directory header" really points to a local header (ZZIP_FILE_HEADER_MAGIC) (bsc#1024528, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against bad formatted data in extra blocks (bsc#1024531, CVE-2017-5976, zziplib-CVE-2017-5976.patch) * NULL pointer dereference in main (unzzipcat-mem.c) (bsc#1024532, bsc#1024536, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against huge values of "extra field length" in local file header and central file header (bsc#1024533, CVE-2017-5978, zziplib-CVE-2017-5978.patch) * clear ZZIP_ENTRY record before use. (bsc#1024534, bsc#1024535, CVE-2017-5979, CVE-2017-5977, zziplib-CVE-2017-5979.patch) * prevent unzzipcat.c from trying to print a NULL name (bsc#1024537, zziplib-unzipcat-NULL-name.patch) * Replace assert() by going to error exit. (bsc#1034539, CVE-2017-5981, zziplib-CVE-2017-5981.patch)/sbin/ldconfig/sbin/ldconfigzzipliblamb56 1571818595 0.13.69-lp151.4.3.10.13.69-lp151.4.3.10.13.69-lp151.4.3.10.13.69-lp151.4.3.1libzzip-0-64.so.10libzzip-0-64.so.11libzzip-0-64.so.12libzzip-0-64.so.13libzzip-0-64.so.13.0.69libzzipfseeko-0-64.so.10libzzipfseeko-0-64.so.11libzzipfseeko-0-64.so.12libzzipfseeko-0-64.so.13libzzipfseeko-0-64.so.13.0.69libzzipmmapped-0-64.so.10libzzipmmapped-0-64.so.11libzzipmmapped-0-64.so.12libzzipmmapped-0-64.so.13libzzipmmapped-0-64.so.13.0.69libzzipwrap-0-64.so.13libzzipwrap-0-64.so.13.0.69libzzip-0-13COPYING.LIB/usr/lib//usr/share/licenses//usr/share/licenses/libzzip-0-13/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11328/openSUSE_Leap_15.1_Update/d1ca4c96f925b623f08ae907c922136e-zziplib.openSUSE_Leap_15.1_Updatedrpmxz5i586-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=995ce742aefc00b18cbba361f9646e3e4ba61e73, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=a83055086e2e3b309350902c021db32a1d49160f, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=4da1256bcb7ab45bd1ee42a0c4452eecf2b62f18, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=02848cfea1cb5666bfbde08f79a2817ad8ffe35c, strippeddirectoryASCII text  PRRRR RRR RPR RRRR RR RPRRRRR RRR RPRR RRR RR RVNźH6%sutf-8e24cf67accc705c29bfa786ad3a40b62b991faa86bd7ed21ace481890acf8962?7zXZ !t/T ]"k%]d5NmB\ j^mRo]T}F:R#}wlP" BGC4&{$>,y >SzKNC9P{CjMŴ\$иtܨNy{Z@#~HcK<ƾĪ8!Ʋ1N[!ܸ %'i XG7k%#Zaa8l%1JrdzHŞYb(4eݓ6Q4ɰ# 6*@zR%AQ֭'_QivYst.JiH">d2wR;ʪ'VtSgj\WTY8 Y e>i'/pOJ^n ثײ:P +-2}`Y URxwf6i`4 3tKb%crT_Hd&ko| Wp@E`@M,cӞZܙ J6K9^ }4 Cn E'<{P'QDV嚤I>yoWFF࣫ ӝN10ئ"ȿ.43#{">WTÖL,Ԣӕf g3OjjE'ސ"}(q]5-?9; P9?s KF5}]I+ V5uyl!WT(Q@Lq^a{N-nϑ`I¹n{a|"TgQf@V[+_MC ,K0LA#7={F轓*sptNI;I5t, >ӐCꐔw]n0WHIY ?>b FH[QE 6BWåmڡeRjq] kG$t~KD1eI7W@s9Хd+ߩ۲=O\4#ܞ8zD=).WVqeW؋f:3!!Xߐ=/%W cv-4&a3W:'To|E)vnӞ c'KPnUJ`|Ҷ㵷~L;&Wnɺq!6u|̿t$jH4SKy-:ƒdغyp`|(,%s1^G|5D׭}j?M溅4˰~L/Jlß(>&c@@euE,Z=(nGěKb$l43Ca1N`}%L3"kNзfq_B<;QHO3w/n2T0éDl)&R-*Ifo])iGٌ= ⦵gk?t4'>` $nU/Dʫ<@(>b}F+}aRrkԻ{ ΑZʗ&\4[:Y: "] lOZLCU U)zNsRQÞK>-W݇ y-Ch3O"3 /BaNyAε- fPSO!encre% φ`6%3h6Fn (:?^!Qk)Cq2nj{qX V˷UD{ ;VDRϓ40c6`j_\ܔc8wK iO}r5!$ڙ$sZ\ #D:fDʱj%u5&~L:D_"13xEږ`)53_8\d8a94"|؁%?ou%ޢST䭡/sKM#vCYKC<t,1^Yvo8y"dT\ SRV'^G,1^G=f&mFsqD< YZ