libzzip-0-13-0.13.72-150600.4.3.1<>,8Hfp9| kK@~1'@ /jpFP.+e)"PfW tMq'[1"3v7SEI8+g\ɁWy;K`Gg㷢U}C!#ڠKL0ݷZ׸:x!yŔءR6זe1"wKEouDHb[)#`Zhh"tvj8A.edṳ&[͹;r%e>C.?.d $ < #BHP x          x   , T((89(: Z>'l@'{B'F'G' H' I' X(Y( Z(d[(h\( ]( ^)gb)c*Sd*e*f*l*u* v+w-p x- y-z.0.@.D.J.Clibzzip-0-130.13.72150600.4.3.1ZIP compression libraryZZipLib is a library for dealing with ZIP and ZIP-like archives by using algorithms of zlib.fs390zl34SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttp://zziplib.sourceforge.netlinuxs390x(7hWh'hbA큤fffffffff_$b704499ce57d7f8ea3953d5df7571360da42c3a8aedd4d7c321aacaf8729b1ca3cb8a4afe21d73628131a2036caf734abe166dd30805b813b17637ddb4a27c3f00c0fae7a34b9523c330014c1c7c2377adf71177c952ef39eb88b76d46a57c45b8916750ce49d69a4eca8c0f668e8b4c3d42e8e6ff52b3d9e6919e634cfd89da94b03f1a60a7fd5007149530626a895a6ef5a8b9342abfd56860c5f3956f5d23libzzip.so.13.0.72libzzipfseeko.so.13.0.72libzzipmmapped.so.13.0.72libzzipwrap.so.13.0.72rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootzziplib-0.13.72-150600.4.3.1.src.rpmlibzzip-0-13libzzip-0-13(s390-64)libzzip.so.13()(64bit)libzzipfseeko.so.13()(64bit)libzzipmmapped.so.13()(64bit)libzzipwrap.so.13()(64bit)zziplib@@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libz.so.1()(64bit)libzzip.so.13()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3f@e`@^^^S]}@]W]:[[h@Z@Z@Z@Z@ZjZ$ZZyZtRZs@Zg#Zg#Y@XӸvalentin.lefebvre@suse.comvalentin.lefebvre@suse.comdmueller@suse.cominfo@paolostivanin.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comavindra@opensuse.orgadam.majer@suse.dejengelh@inai.deavindra@opensuse.orgjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comtchvatal@suse.comtchvatal@suse.commpluskal@suse.comjosef.moellers@suse.com- fetch_disk_trailer: Don't truncate the size verif. [bsc#1227178, CVE-2024-39134, bsc1227178-fetch_disk_trailer-Don-t-truncate-the-size-verif.patch]- assert full zzip_file_header. [bsc#1214577, CVE-2020-18770, CVE-2020-18770.patch] - Use autosetup- update to 0.13.72: * The testbuilds were fixed to make cmake install and automake install the same * The cmake install did need patches for man3 installation on Unix * The cmake install did need patches for dll installation on Windows * The cmake install did need patches for dylib installation on MacOS * The cmake install did need patches for pkgconfig generation * Bump testbuilds to modern distro versions (ubuntu 20.04 centos 7.9 / 8.3) * Takeover docker_mirror.py for air-gap testings (for testbuilds.py) * handle UNZZIP-NOTFOUND in cmake and mark Ubuntu 'unzip' to be broken * merge patches for zzip_pread feature from Max Kellermann * merge patches for some bugs being found and reported via GitHub issues * run azure-pipelines with -DZZIP_TESTCVE=OFF to skip CVE *.zip downloads * use zziptests.py --downloadonly to get the CVE zip files for local storage * switch to cmake build system - remove zziplib-0.13.62-wronglinking.patch zziplib-largefile.patch: obsolete with switch to cmake- Update to 0.13.71: * testbuilds fixes * fixes to bring base, sdl, manpages and site docs to same level- Update to 1.13.70: * there have been tons of bugfixes over the last two years ... * Thanks go to Patrick Steinhardt (then at Aservo) for python3 updates * Thanks go to Josef Moellers (working at SUSE Labs) for many CVE fixes * and of course all the other patches that came in via github issues. * I have cleaned up sources to only uses Python3 (as needed by 2020). * !!! The old automake/autconf/libtool system will be dumped soon!!! * The build system was ported to 'cmake' .. (last tested cmake 3.10.2) Obsoletes patches - CVE-2018-7726.patch - CVE-2018-7725.patch - CVE-2018-16548.patch - CVE-2018-17828.patch - bsc1129403-prevent-division-by-zero.patch [zziplib-0.13.70.tar.gz, CVE-2018-7726.patch, CVE-2018-7725.patch, CVE-2018-16548.patch, CVE-2018-17828.patch, bsc1129403-prevent-division-by-zero.patch]- Corrected control flow in zzip_mem_entry_make() to gain correct exit status. [bsc#1154002, bsc1154002-prevent-unnecessary-perror.patch]- Make an unconditional error message conditional by checking the return value of a function call. Also removed an unwanted debug output. [bsc#154002, bsc1154002-prevent-unnecessary-perror.patch, CVE-2018-7725.patch]- Fixed another instance where division by 0 may occur. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Prevent division by zero by first checking if uncompressed size is 0. This may happen with directories which have a compressed and uncompressed size of 0. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Remove any "../" components from pathnames of extracted files. [bsc#1110687, CVE-2018-17828, CVE-2018-17828.patch]- Avoid memory leak from __zzip_parse_root_directory(). Free allocated structure if its address is not passed back. [bsc#1107424, CVE-2018-16548, CVE-2018-16548.patch]- Check if data from End of central directory record makes sense. Especially the Offset of start of central directory must not a) be negative or b) point behind the end-of-file. - Check if compressed size in Central directory file header makes sense, i.e. the file's data does not extend beyond the end of the file. [bsc#1084517, CVE-2018-7726, CVE-2018-7726.patch, bsc#1084519, CVE-2018-7725, CVE-2018-7725.patch]- Update to 0.13.69: * fix a number of CVEs reported with special *.zip PoC files * completing some doc strings while checking the new man-pages to look good * update refs to point to github instead of sf.net * man-pages are generated with new dbk2man.py - docbook xmlto is optional now * a zip-program is still required for testing, but some errors are gone when not present - run spec-cleaner - don't ship Windows only file, README.MSVC6- Drop BR: fdupes since it does nothing.- Fix RPM groups. Remove ineffective --with-pic. Trim redundancies from description. Do not let fdupes run across partitions.- Update to 0.13.68: * fix a number of CVEs reported with special *.zip files * minor doc updates referencing GitHub instead of sf.net - drop CVE-2018-6381.patch * merged in a803559fa9194be895422ba3684cf6309b6bb598 - drop CVE-2018-6484.patch * merged in 0c0c9256b0903f664bca25dd8d924211f81e01d3 - drop CVE-2018-6540.patch * merged in 15b8c969df962a444dfa07b3d5bd4b27dc0dbba7 - drop CVE-2018-6542.patch * merged in 938011cd60f5a8a2a16a49e5f317aca640cf4110- Changed %license to %doc in SPEC file.- If the size of the central directory is too big, reject the file. Then, if loading the ZIP file fails, display an error message. [CVE-2018-6542.patch, CVE-2018-6542, bsc#1079094]- If an extension block is too small to hold an extension, do not use the information therein. - If the End of central directory record (EOCD) contains an Offset of start of central directory which is beyond the end of the file, reject the file. [CVE-2018-6540, bsc#1079096, CVE-2018-6540.patch]- Reject the ZIP file and report it as corrupt if the size of the central directory and/or the offset of start of central directory point beyond the end of the ZIP file. [CVE-2018-6484, boo#1078701, CVE-2018-6484.patch]- If a file is uncompressed, compressed and uncompressed sizes should be identical. [CVE-2018-6381, bsc#1078497, CVE-2018-6381.patch]- Drop tests as they fail completely anyway, not finding lib needing zip command, this should allow us to kill python dependency - Also drop docs subdir avoiding python dependency for it * The generated xmls were used for mans too but we shipped those only in devel pkg and as such we will live without them- Version update to 0.13.67: * Various fixes found by fuzzing * Merged bellow patches - Remove merged patches: * zziplib-CVE-2017-5974.patch * zziplib-CVE-2017-5975.patch * zziplib-CVE-2017-5976.patch * zziplib-CVE-2017-5978.patch * zziplib-CVE-2017-5979.patch * zziplib-CVE-2017-5981.patch - Switch to github tarball as upstream seem no longer pull it to sourceforge - Remove no longer applying patch zziplib-unzipcat-NULL-name.patch * The sourcecode was quite changed for this to work this way anymore, lets hope this is fixed too- Packaking changes: * Depend on python2 explicitly * Cleanup with spec-cleaner- Several bugs fixed: * heap-based buffer overflows (bsc#1024517, CVE-2017-5974, zziplib-CVE-2017-5974.patch) * check if "relative offset of local header" in "central directory header" really points to a local header (ZZIP_FILE_HEADER_MAGIC) (bsc#1024528, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against bad formatted data in extra blocks (bsc#1024531, CVE-2017-5976, zziplib-CVE-2017-5976.patch) * NULL pointer dereference in main (unzzipcat-mem.c) (bsc#1024532, bsc#1024536, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against huge values of "extra field length" in local file header and central file header (bsc#1024533, CVE-2017-5978, zziplib-CVE-2017-5978.patch) * clear ZZIP_ENTRY record before use. (bsc#1024534, bsc#1024535, CVE-2017-5979, CVE-2017-5977, zziplib-CVE-2017-5979.patch) * prevent unzzipcat.c from trying to print a NULL name (bsc#1024537, zziplib-unzipcat-NULL-name.patch) * Replace assert() by going to error exit. (bsc#1034539, CVE-2017-5981, zziplib-CVE-2017-5981.patch)/sbin/ldconfig/sbin/ldconfigzziplibs390zl34 1723532757 0.13.72-150600.4.3.10.13.72-150600.4.3.10.13.72-150600.4.3.10.13.72-150600.4.3.1libzzip.so.13libzzip.so.13.0.72libzzipfseeko.so.13libzzipfseeko.so.13.0.72libzzipmmapped.so.13libzzipmmapped.so.13.0.72libzzipwrap.so.13libzzipwrap.so.13.0.72libzzip-0-13COPYING.LIB/usr/lib64//usr/share/licenses//usr/share/licenses/libzzip-0-13/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:35219/SUSE_SLE-15-SP6_Update/e59050dd2e05883ebea4f8e10a77a5f3-zziplib.SUSE_SLE-15-SP6_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=983e6fb0163731905855761fef7202ecd8b77739, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=41ff202780077e78ac8facfddf780270c3e5c855, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=50b912fcc817a912ea6cf77a68c0226e61e1567f, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=53aa6850c847c1a45fbabd904578b5c9b5979acb, strippeddirectoryASCII textPRRRRR RPRRRRR RPRRRRR RPRRRRR Rx5Ltjutf-8e52dbde0692d35da1607cee625dc336aa98204ab121738eeb5b0ac4c46719640?7zXZ !t/]"k%AKg|m')?Fп1Қ@L?NzYbverAW-t6zBվ<$ ruegYí&k_E"CE[>p_:KgB segG$\`\ƈoٵ> !?< TaŶF͝<ӹߨ6oCd*62߬T#xGګ;XX I˟ء3?vfy\b0~qBy,}Kfo-R]%аVA)$kqx" (U0x:Ꮱıt['4CFǷɅ{G!<Yz:!9@F 'viTq[yFK =NPғy曩1hQ>6h lz$ .ʿd<8żB?j8nXD7]˔+v@+m}I59;m<tRf_|>'贵׷P^2Ǡ-j.9 z. h" ]<'r?ۊFa7s:+&0yse ILc'>E 1̹>R9me3p%utl], !u|SiQ߬%!A\JӡP>9܈xWEWYM|%țTz"Z݅d(.F޻rd-`HyPꓸ>#].*u9Ь+ B67ml͛'V7Dq]k*Izfb$ L y<֦4sKtZ$ jRL1YLXz٬h-"wu_m6q>ۉ1io*hK/}bGR'vUX7LL=8e( @XR##0Is/)"Ey8 ^/wҤ*{Lj/`qj-yF$ L"ӮcwǾj U}hBV:&SQ nz[a"ǒdQ9 eoC4.W|ӌ~yI;5v5UJ&fimҜ 'k¶ YZ