zziplib-devel-0.13.69-150000.3.20.1<>,K؉f(p9|])5˨rа U&LLp杜 y],@GJ_.Td]MWq7ٚ3~ʷQ D+&^Eܧ1"]3R0=@(B#pδ}fpJw6eo 3aI7te<\;ugZ_g )Iq 3Ăe+`eq;hLiOL 7ClZw2H~EZ &R>>@?@d & _ :Y_h0(0 0 0 0 X0 0000tT&(X8`9:F./G.D0H/0I/0X/Y0\0`0]1 0^2b3c4Bd4e4f4l4u40v5w=0x>0y?|?z@x@@@@Czziplib-devel0.13.69150000.3.20.1Development files for zziplib, a ZIP compression libraryThat are the header files needed for developing applications using ZZipLib.f(h01-ch3aSUSE Linux Enterprise 15SUSE LLC LGPL-2.1+https://www.suse.com/Development/Libraries/C and C++http://zziplib.sourceforge.netlinuxx86_649X9999()(()8k]Ni"7 } F 8)"!| 4 A큤A큤f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f'f(Z5Z5Z5Z5ae72ba5434c1ef0a9201550dda01f28b90e3050e493b7c4281f98632f765976dde58030940d4a62ebb56234b579e3363f0b0aadf2ec310a008fbd0d31318f2bfbf6a00ee229aff3c12d24afb8a5408544f533fe3c114875cfd4c6f9c1071bb74b51e06e5a374dd68927b051c550299674d3476972268b6a8ba36effe1489d46c5beb4c1d0f600b97dd08d2e307ca50765bdf8c3e13a94b0fddb1d4377864280185f1903d5958f7b11752b6f1079a0e884853c98bc0464d81c91359106e007a460ed96e125b76c8cbbba7750e328cf3ff5be0c9d9c10b330f2a4d626bb92a20dae2cbdc1d8fbabb67f2af989f72bd6cb871245be5b1c058f8fee7f1d16c7f32ee8d181c49ea84174f0f1db7e87bb967f75af0e5b7ec065f02d36be092128291affbb5428bb361a9117990f839aa6b58ef28f8df7b852c16d05bf4648837920cc4ac0e5a9e840ddf42c1bdd4548e1e621835d5bc1472b37efc680d3ed4fc29623e9399427ea91d1dba3717dc23f10ecb215f2c38dd66e84e2b63855082cdeb0c8b431dd66023da143e5893b942ac5ffcc03360fcd91aeee7ee89e90b15519922976f869eda4b8bd6c31fd4a0615721026a26d4aedfa7d5c4770ca918da4605d9d5c1b5a4ccf235c40c04846ff74447910f411cb708c750e2f05470865d8308ea63a96811afd4d7005eb38f061ec9286882de5ef7690d6aa9fe319a3d3fe3ad5ec5fc024b151bf0625c32f7c68acbd48595dc50eeb384cf9f125012a309826719bc91edbf67e946e23094ed5ed7f192b74e256984d25526ba75d1ac8f9da60d11154211a35936e905742f75d922e55b22af15ffafb967a6b232df3e28f9b59927d9f5758bc325de855ad461bcb3592f33e0699f5f2469368a08a90a3b8f60d9d4aae7e28ad7a44508b15af0f974a251092230bcb0f8a2c8eeda64cf452a4fd7569b21429dbd83226c7dec93ae8ddb56c2fe9788caf1aed0023dc5b778be0f1f2b0990f725d4225053ff8982ff9d2e9ad427ee6def3cfd4971ff1db04cfb5a71b6cfa448a9444259340336912ca028f6e66e34062a50a974b462568cdbe47cd096b6879ecf2d72d34875254b7811dc76db70f5eb7b7102fb263784c321b0f1f9dcc9438ea96242dcb839044595f564c611b5918519dfca54a8f41c0140bacc2a518e84995c0ae570c227a38b3bd3c57c82fa0e7153e3e6c1ab871bdb7bc288491fbba6e90361fcf8d2de64f4d072b69b9c7a7a43dced8971f12ab90efe47628c63ee909c79ae082e2c107c7b6eb4471d15992a19979c327c66393502bee00ebd7e86f3fe75bf76287c5b8b005516859a0afc06e89b88e05b9ae9d0aad3998413923162d8b9daa4b5977029cffaac4742a21a192fd5af2e50c6342034e1d6024e731257074e56448d4add4a88e47c8291b5edb33d609e5246e2ce09e672fba8eeea1e14a4164dc4e99a39406c0a85a7d398133cb0c18a1e13e34888ad509dff463a1f8b4d3b44fd2c93005aa703f3986f49e70e8ada2b0c049997f138191d74e2e7c5535af3217718876c176a83462e5c1bd7c2fb96108f1ede13648f4d3442c221ee578f10157a4d2eccbebe05b565d3d05cd56c42ffa9f3ef4ee615811dffd3c5dd1e02156d70bb8273560bc93f08649b98cc78fd7cde79775d419f1de1c6d428ef93b72ddd676c5d9a61655d6139f25bb9f422a49a08d69182bfedd654873a166bbef2b7b06f6eb72626dda7efd1a03629651645e0ff98da99443ecefada18aa9eeb92020572a460079f998e343f7d622276f41e3a7853e6de0558ddfdfa795c8a144b1d4d8aac86ec4829c07897f42749c54321ab5d4e5c8a146d8733aa6963689d9ff9b30a51ff29a6c69ca9a75c178ed2024828f25876ddba0ef5ff803b2027libzzip-0.so.13.0.69libzzipfseeko-0.so.13.0.69libzzipmmapped-0.so.13.0.69libzzipwrap-0.so.13.0.69rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootzziplib-0.13.69-150000.3.20.1.src.rpmpkgconfig(zzip-zlib-config)pkgconfig(zzipfseeko)pkgconfig(zziplib)pkgconfig(zzipmmapped)pkgconfig(zzipwrap)zziplib-develzziplib-devel(x86-64)@@@@@@@@@@@@@    /usr/bin/pkg-configlibc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libz.so.1()(64bit)libzzip-0-13libzzip-0.so.13()(64bit)libzzipfseeko-0.so.13()(64bit)libzzipmmapped-0.so.13()(64bit)pkgconfig(zlib)pkgconfig(zzip-zlib-config)pkgconfig(zziplib)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.13.693.0.4-14.6.0-14.0-15.2-14.14.1f@e`@^]W]:[[h@Z@Z@Z@Z@ZjZ$ZZyZtRZs@Zg#Zg#Y@XӸvalentin.lefebvre@suse.comvalentin.lefebvre@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comavindra@opensuse.orgadam.majer@suse.dejengelh@inai.deavindra@opensuse.orgjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comtchvatal@suse.comtchvatal@suse.commpluskal@suse.comjosef.moellers@suse.com- fetch_disk_trailer: Don't truncate the size verif. [bsc#1227178, CVE-2024-39134, bsc1227178-fetch_disk_trailer-Don-t-truncate-the-size-verif.patch- assert full zzip_file_header. [bsc#1214577, CVE-2020-18770, CVE-2020-18770.patch]- A recent upstream commit has introduced a regression: The return value of the function ‘zzip_fread’ is a signed int and "0" is a valid return value. [bsc#1187526, CVE-2020-18442, bsc1187526-fix-Incorrect-handling-of-function-zzip_fread-return-value.patch]- Make an unconditional error message conditional by checking the return value of a function call. [bsc1154002, bsc1154002-prevent-unnecessary-perror.patch]- Fixed another instance where division by 0 may occur. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Prevent division by zero by first checking if uncompressed size is 0. This may happen with directories which have a compressed and uncompressed size of 0. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Remove any "../" components from pathnames of extracted files. [bsc#1110687, CVE-2018-17828, CVE-2018-17828.patch]- Avoid memory leak from __zzip_parse_root_directory(). Free allocated structure if its address is not passed back. [bsc#1107424, CVE-2018-16548, CVE-2018-16548.patch]- Check if data from End of central directory record makes sense. Especially the Offset of start of central directory must not a) be negative or b) point behind the end-of-file. - Check if compressed size in Central directory file header makes sense, i.e. the file's data does not extend beyond the end of the file. [bsc#1084517, CVE-2018-7726, CVE-2018-7726.patch, bsc#1084519, CVE-2018-7725, CVE-2018-7725.patch]- Update to 0.13.69: * fix a number of CVEs reported with special *.zip PoC files * completing some doc strings while checking the new man-pages to look good * update refs to point to github instead of sf.net * man-pages are generated with new dbk2man.py - docbook xmlto is optional now * a zip-program is still required for testing, but some errors are gone when not present - run spec-cleaner - don't ship Windows only file, README.MSVC6- Drop BR: fdupes since it does nothing.- Fix RPM groups. Remove ineffective --with-pic. Trim redundancies from description. Do not let fdupes run across partitions.- Update to 0.13.68: * fix a number of CVEs reported with special *.zip files * minor doc updates referencing GitHub instead of sf.net - drop CVE-2018-6381.patch * merged in a803559fa9194be895422ba3684cf6309b6bb598 - drop CVE-2018-6484.patch * merged in 0c0c9256b0903f664bca25dd8d924211f81e01d3 - drop CVE-2018-6540.patch * merged in 15b8c969df962a444dfa07b3d5bd4b27dc0dbba7 - drop CVE-2018-6542.patch * merged in 938011cd60f5a8a2a16a49e5f317aca640cf4110- Changed %license to %doc in SPEC file.- If the size of the central directory is too big, reject the file. Then, if loading the ZIP file fails, display an error message. [CVE-2018-6542.patch, CVE-2018-6542, bsc#1079094]- If an extension block is too small to hold an extension, do not use the information therein. - If the End of central directory record (EOCD) contains an Offset of start of central directory which is beyond the end of the file, reject the file. [CVE-2018-6540, bsc#1079096, CVE-2018-6540.patch]- Reject the ZIP file and report it as corrupt if the size of the central directory and/or the offset of start of central directory point beyond the end of the ZIP file. [CVE-2018-6484, boo#1078701, CVE-2018-6484.patch]- If a file is uncompressed, compressed and uncompressed sizes should be identical. [CVE-2018-6381, bsc#1078497, CVE-2018-6381.patch]- Drop tests as they fail completely anyway, not finding lib needing zip command, this should allow us to kill python dependency - Also drop docs subdir avoiding python dependency for it * The generated xmls were used for mans too but we shipped those only in devel pkg and as such we will live without them- Version update to 0.13.67: * Various fixes found by fuzzing * Merged bellow patches - Remove merged patches: * zziplib-CVE-2017-5974.patch * zziplib-CVE-2017-5975.patch * zziplib-CVE-2017-5976.patch * zziplib-CVE-2017-5978.patch * zziplib-CVE-2017-5979.patch * zziplib-CVE-2017-5981.patch - Switch to github tarball as upstream seem no longer pull it to sourceforge - Remove no longer applying patch zziplib-unzipcat-NULL-name.patch * The sourcecode was quite changed for this to work this way anymore, lets hope this is fixed too- Packaking changes: * Depend on python2 explicitly * Cleanup with spec-cleaner- Several bugs fixed: * heap-based buffer overflows (bsc#1024517, CVE-2017-5974, zziplib-CVE-2017-5974.patch) * check if "relative offset of local header" in "central directory header" really points to a local header (ZZIP_FILE_HEADER_MAGIC) (bsc#1024528, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against bad formatted data in extra blocks (bsc#1024531, CVE-2017-5976, zziplib-CVE-2017-5976.patch) * NULL pointer dereference in main (unzzipcat-mem.c) (bsc#1024532, bsc#1024536, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against huge values of "extra field length" in local file header and central file header (bsc#1024533, CVE-2017-5978, zziplib-CVE-2017-5978.patch) * clear ZZIP_ENTRY record before use. (bsc#1024534, bsc#1024535, CVE-2017-5979, CVE-2017-5977, zziplib-CVE-2017-5979.patch) * prevent unzzipcat.c from trying to print a NULL name (bsc#1024537, zziplib-unzipcat-NULL-name.patch) * Replace assert() by going to error exit. (bsc#1034539, CVE-2017-5981, zziplib-CVE-2017-5981.patch)h01-ch3a 1723532840  !"#$%&'()*+,-./00.13.690.13.690.13.690.13.690.13.69-150000.3.20.10.13.69-150000.3.20.1unzip-memunzzipunzzip-bigunzzip-memunzzip-mixzzcatzzdirzzxorcatzzxorcopyzzxordirzzipzzip-io.hzzip.h_config.h_msvc.hautoconf.hconf.hfetch.hfile.hformat.hfseeko.hinfo.hlib.hmemdisk.hmmapped.hplugin.hstdint.htypes.hwrap.hwrite.hzzip.hzzip32.hzziplib.hlibzzip.solibzzipfseeko.solibzzipmmapped.solibzzipwrap.sozzip-zlib-config.pczzipfseeko.pczziplib.pczzipmmapped.pczzipwrap.pczziplib.m4zziplib-develChangeLogREADMEREADME.SDLTODO/usr/bin//usr/include//usr/include/zzip//usr/lib64//usr/lib64/pkgconfig//usr/share/aclocal//usr/share/doc/packages//usr/share/doc/packages/zziplib-devel/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:35220/SUSE_SLE-15_Update/d4cf1719d7ddfd380f7d75a99444cfe5-zziplib.SUSE_SLE-15_Updatedrpmxz5x86_64-suse-linux  ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=dff379461b0a83afa97b96a5bda4b85b11df1839, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=54ee9557e3f670ba5cd4f444e7cc80c57e4ee9d9, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=d163b8141fca9b7e2a6c1ae08a9a338510130708, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=3a887af6c3270b401dede9be72518c997de3a43b, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=e9b1b53431f5240039a6596a06bcdbed7a034c14, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=08db91a5cdf90e45aa7098754befe64f8d07ffa5, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=ea0cc295d5c0578008356236a0f36803a3c299da, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=7b05331093756e1d66076c3973ba5f65bc6df2d3, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=f31b30fbea770a84e33f6f502647308671065427, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=264661337e052ab2a57bd0a9c4b0993836cae268, for GNU/Linux 3.2.0, strippeddirectoryC source, ASCII textpkgconfig fileM4 macro processor script, ASCII textUTF-8 Unicode textASCII text #(,1369<RRRR RRRRRR RRRRR RRRRR RRRRRR RRRR RRRR RRRRR RRRRRRRRR RPRPRR PRR PRR PRR0Iwbkk$\utf-86027ac9b5faa013f51316ce8d9128cab9f8b8fd8ccabeba0abe5c6a2c9b2c243? 7zXZ !t/Q]"k%JsXNģ'68"d35H:"W`O!,.GLZ 8欌ÐM5$0JZyp1az>uf8(x&a8౩.t)fGϘ\Mr*Ek<|nl v X5EfZnsoξ}'ްRL3!~s~'6h艋xpa f^Re:yq VB}dɠ g4w`1{QO5C$ءLR$5@ /|)RHPQxHq :ѱ>e99Lv+YŠLh3;K CZi7$0;3S{9&Z'9))DQo">$瘻Îdo0%+-`eGc-tv nD,H"dlSLkMIĽS2Sͪ7Uƚn3jP ,|DwZhi ,Ec+^&oKc$ cɣ\+#$c^u2$tY= w5cW]}m?swL˿fQPe{p[qYcjq>">çmBtݨTyg Ը IW,QXQu.$eGI<_bEm-<.K&KK}>mHO@ޢma`h 6_(| @-L6?LȜϜ'D` Z܈&2ڵp4*g"h].tQ&{f*vpHyg{8}m&5$׌ޱp >.{h¦/O!O0߇Q1z3zdF;FD[;q0>zs*ą*)?d^Y>qZO ?8~:`""AOU)% t^Va jnc<_8uC`$i@Uf']OXA$@eY<_-̖CTe=n_ke5Lכ94Y*;%g;sdGX:L<3hWeVUi@l;;?(x/dP4f'x) ~gͅUvϰ:uCeL8 K3 \bO4 M¼G+}qu4P kny!-OIk6`^~NU)hDhxG&dx7#T³ -`4ˎ 9:a$mJC-wu(ۣd>dEFpҦf UD_LWQee|X-i p`k0/ÀY:=_ k/᤺i]׵]Q.Bƫȱ"@3/X&&9gPOD^h{V[| Gw܁eOzGB)s|}!a2/}/(QӔ|0R$RL("`ނz8kd *N YZ