libzzip-0-13-32bit-0.13.69-lp150.7.1<>,<] N/=„Sk|V{-ބn{D`Tw;*pgmxn67V7$Vݫg 8/ǯ!;mET9,g>A&<?&,d ' ? !(8|     \JlL(89D: >BGH$IhX|YZ[\]^ b c!d"e"f"l"u"0v"tw$x%y%H%%%%&(Clibzzip-0-13-32bit0.13.69lp150.7.1ZIP compression libraryZZipLib is a library for dealing with ZIP and ZIP-like archives by using algorithms of zlib.] Nbuild36)topenSUSE Leap 15.0openSUSELGPL-2.1+http://bugs.opensuse.orgSystem/Librarieshttp://zziplib.sourceforge.netlinuxx86_64/sbin/ldconfig5V] N] N] N] N] N] N] N] N] N] N] N] N] N] N] N] N] N1e07526e9fe26808dfacf9c8df3311b7aab6a21ef9b77554c8f48e7021b1893bedd91032040a5070c298fd393bd1909d251b071b5d1226df206ddb2ba59104a2ccbb0ff367806fa7f7482f5d43921b1b08d2f53bb024b41c9186abb7b07287dbda9530aa16f1c4a5cfe9280a8a72d3f3f9588695c4976ebbdbd4a9ea7b83aeb8libzzip-0-64.so.13libzzip-0-64.so.13libzzip-0-64.so.13libzzip-0-64.so.13.0.69libzzipfseeko-0-64.so.13libzzipfseeko-0-64.so.13libzzipfseeko-0-64.so.13libzzipfseeko-0-64.so.13.0.69libzzipmmapped-0-64.so.13libzzipmmapped-0-64.so.13libzzipmmapped-0-64.so.13libzzipmmapped-0-64.so.13.0.69libzzipwrap-0-64.so.13.0.69rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootzziplib-0.13.69-lp150.7.1.src.rpmlibzzip-0-13-32bitlibzzip-0-13-32bit(x86-32)libzzip-0-64.so.13libzzipfseeko-0-64.so.13libzzipmmapped-0-64.so.13libzzipwrap-0-64.so.13zziplib-32bit@@@@@@@@@@@    /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.7)libz.so.1libzzip-0-64.so.13rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1]W]:[[h@Z@Z@Z@Z@ZjZ$ZZyZtRZs@Zg#Zg#Y@XӸJosef Möllers josef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comavindra@opensuse.orgadam.majer@suse.dejengelh@inai.deavindra@opensuse.orgjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comtchvatal@suse.comtchvatal@suse.commpluskal@suse.comjosef.moellers@suse.com- Fixed another instance where division by 0 may occur. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Prevent division by zero by first checking if uncompressed size is 0. This may happen with directories which have a compressed and uncompressed size of 0. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]- Remove any "../" components from pathnames of extracted files. [bsc#1110687, CVE-2018-17828, CVE-2018-17828.patch]- Avoid memory leak from __zzip_parse_root_directory(). Free allocated structure if its address is not passed back. [bsc#1107424, CVE-2018-16548, CVE-2018-16548.patch]- Check if data from End of central directory record makes sense. Especially the Offset of start of central directory must not a) be negative or b) point behind the end-of-file. - Check if compressed size in Central directory file header makes sense, i.e. the file's data does not extend beyond the end of the file. [bsc#1084517, CVE-2018-7726, CVE-2018-7726.patch, bsc#1084519, CVE-2018-7725, CVE-2018-7725.patch]- Update to 0.13.69: * fix a number of CVEs reported with special *.zip PoC files * completing some doc strings while checking the new man-pages to look good * update refs to point to github instead of sf.net * man-pages are generated with new dbk2man.py - docbook xmlto is optional now * a zip-program is still required for testing, but some errors are gone when not present - run spec-cleaner - don't ship Windows only file, README.MSVC6- Drop BR: fdupes since it does nothing.- Fix RPM groups. Remove ineffective --with-pic. Trim redundancies from description. Do not let fdupes run across partitions.- Update to 0.13.68: * fix a number of CVEs reported with special *.zip files * minor doc updates referencing GitHub instead of sf.net - drop CVE-2018-6381.patch * merged in a803559fa9194be895422ba3684cf6309b6bb598 - drop CVE-2018-6484.patch * merged in 0c0c9256b0903f664bca25dd8d924211f81e01d3 - drop CVE-2018-6540.patch * merged in 15b8c969df962a444dfa07b3d5bd4b27dc0dbba7 - drop CVE-2018-6542.patch * merged in 938011cd60f5a8a2a16a49e5f317aca640cf4110- Changed %license to %doc in SPEC file.- If the size of the central directory is too big, reject the file. Then, if loading the ZIP file fails, display an error message. [CVE-2018-6542.patch, CVE-2018-6542, bsc#1079094]- If an extension block is too small to hold an extension, do not use the information therein. - If the End of central directory record (EOCD) contains an Offset of start of central directory which is beyond the end of the file, reject the file. [CVE-2018-6540, bsc#1079096, CVE-2018-6540.patch]- Reject the ZIP file and report it as corrupt if the size of the central directory and/or the offset of start of central directory point beyond the end of the ZIP file. [CVE-2018-6484, boo#1078701, CVE-2018-6484.patch]- If a file is uncompressed, compressed and uncompressed sizes should be identical. [CVE-2018-6381, bsc#1078497, CVE-2018-6381.patch]- Drop tests as they fail completely anyway, not finding lib needing zip command, this should allow us to kill python dependency - Also drop docs subdir avoiding python dependency for it * The generated xmls were used for mans too but we shipped those only in devel pkg and as such we will live without them- Version update to 0.13.67: * Various fixes found by fuzzing * Merged bellow patches - Remove merged patches: * zziplib-CVE-2017-5974.patch * zziplib-CVE-2017-5975.patch * zziplib-CVE-2017-5976.patch * zziplib-CVE-2017-5978.patch * zziplib-CVE-2017-5979.patch * zziplib-CVE-2017-5981.patch - Switch to github tarball as upstream seem no longer pull it to sourceforge - Remove no longer applying patch zziplib-unzipcat-NULL-name.patch * The sourcecode was quite changed for this to work this way anymore, lets hope this is fixed too- Packaking changes: * Depend on python2 explicitly * Cleanup with spec-cleaner- Several bugs fixed: * heap-based buffer overflows (bsc#1024517, CVE-2017-5974, zziplib-CVE-2017-5974.patch) * check if "relative offset of local header" in "central directory header" really points to a local header (ZZIP_FILE_HEADER_MAGIC) (bsc#1024528, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against bad formatted data in extra blocks (bsc#1024531, CVE-2017-5976, zziplib-CVE-2017-5976.patch) * NULL pointer dereference in main (unzzipcat-mem.c) (bsc#1024532, bsc#1024536, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against huge values of "extra field length" in local file header and central file header (bsc#1024533, CVE-2017-5978, zziplib-CVE-2017-5978.patch) * clear ZZIP_ENTRY record before use. (bsc#1024534, bsc#1024535, CVE-2017-5979, CVE-2017-5977, zziplib-CVE-2017-5979.patch) * prevent unzzipcat.c from trying to print a NULL name (bsc#1024537, zziplib-unzipcat-NULL-name.patch) * Replace assert() by going to error exit. (bsc#1034539, CVE-2017-5981, zziplib-CVE-2017-5981.patch)/bin/shzziplib-32bit 0.13.69-lp150.7.10.13.69-lp150.7.10.13.69 0.13.69libzzip-0-64.so.10libzzip-0-64.so.11libzzip-0-64.so.12libzzip-0-64.so.13libzzip-0-64.so.13.0.69libzzipfseeko-0-64.so.10libzzipfseeko-0-64.so.11libzzipfseeko-0-64.so.12libzzipfseeko-0-64.so.13libzzipfseeko-0-64.so.13.0.69libzzipmmapped-0-64.so.10libzzipmmapped-0-64.so.11libzzipmmapped-0-64.so.12libzzipmmapped-0-64.so.13libzzipmmapped-0-64.so.13.0.69libzzipwrap-0-64.so.13libzzipwrap-0-64.so.13.0.69/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11326/openSUSE_Leap_15.0_Update/198c5a4d7ec4c0d0f991a4294876324a-zziplib.openSUSE_Leap_15.0_Updatedrpmxz5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=30b4f1f915cbdb5fe4afd593fa56c8ae4ce1fbcf, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=8a1c2f521806174838b766b22ab9dd236ea19710, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=3d84746a500e324ad3a5881839ae0200730db3d3, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=f8ba02ccc35a88d9fd64eb87e3571b3dd811b05b, stripped  PRRRRRRR RPR RRRRRR RPRRRRRRRR RPRR RRRRR Rutf-856889a8f798afa20f9edbf0818002b9e89a8945fc3bfd1868d1d2d05c2dc6f37?7zXZ !t/&c]"k%۫g|m@YXX(g}dg-/Үc{XNoδAEDJ=2Ar;1}P.u_"OBv<'؛lVZSw͏YX߮<Օ^w}$2W'xٞ7IPڮ؏/"%]mw#~TkS# @Dixc$rt&>@S`e*p17x83(T;D-PRqd|ԍN0=$Z(MJHGd_7| nǫE(?:gGG2}^Zse$ZhonOjx"PePN?`ԝ͹)~IK_~[n%Ow>{VXd@q ZВ)5ox*mU zu|9#,IS/}@5`"Tꋻ_W2忇Lxx(` G-&~F!¥x凃Ǫp͈  + ; <,ؽt1/Q:Ic[S(T̶mJW6I,E/贯)5;"2Q]*&UI٦:˸iC!4:ALZMuy,W:WL.HmS k:pV@2* h HnEL;KE:ehkCa>ъEvrVlItr^ހ]r)oo|,8\0^aBK q<+'|*Af?;4}D*XamE,VLZ}y8-e0B9%Sl)4VI rR*:S節{IHyϘ]ƚKu'k9?lSi#ko/| El,6(%\e>6uGnz J!ةtai\{1<`Y$yч 02dq Opɡpl>LɋmS*_\`/+u鳆5Yn?姾dN CZzL\L L.C6&:GNno2{q[D&!KmW˱þY eG}T8%(ruoTҳDm O@bҷ}݄dZV:h5lI$}R˧vÒCI1avj&"$Pj$mFL脙P7z?fǒ_oTUo#`qD4g ˑ PP?r JgK8wPPT!ܴ3D>1Y)c-9[Yw Zoxn K+C _WACuL(uˎ_*3<Oٍ3ނ6wS7Mo!!oب-.!a71jADC?a~#`&I`\A'#v%<'Q^b;֛`$>2d,sꝿ!Ѣj%"Zl-TopB%kAH}E皞aaCZҦ弓Pr.cˤ1 <:7 y BۑUיAPt t0x(]uuObdXsc3/ =$z/IavȄ7U8oIkvTP#A2:y{q4AA’Miu1ns|9Xg趨94&@!g{>Bɛ Dĉ޼tc݁;H; Snҕ9qw@Op0f@$D90 W(*6U_U@.:Tl0!ԧָg> NcJ OH9;f$`(;}!+T5WNv'jx{Пҍ1\.?KEZ@+]|ٍk' ,Nf$d4ghP<c¼"T_8/[vUMTRiBJ "Ez۹BOB/ԑN8+@fu"k$EGNQTŷ.jFf*ЗOQ]ّ'Do:(fLO/OΏ]X@?-bŎtB<ğmV:hMoyҶ`GS|h<Ԋ'!WydϚ>GVQ6c afP^I1OOG쌄 ]r͈y&+~?6͉,N x7Oք1}hQM!0^Zt$K+p#a5}OUKr+$GdA{t@G 1BO:8ݜs7@YDo9 7WdP:-EaGJBD5cn'`F8Ř7P`rjOA.!\!*0)r{<W>Is.Mq+Y!q{~_`y6NͬK#tCDV[#؋`QPgf킛 0-aVq9SQjoƗC& RBTY-vE*P Nn~y}a20>18in'%S)Fs@,A,3k-u\BL GV)}N9ށ)r 2u|'E[?]XNKI ji$q gXQ6!Y˅[:?B6Z,|3Φ~泥vN=T@E!t]{j8}]xT3lޱ FJ.{R:Fi0X45)u0N>:4!1`Fi0sbJ:t'}|pώsdqN$ Xce9I 9jCM@P#VzLhR\]Wr~U"9m4 s$/I\i` 4ׇlyCfB..B`ڽx:AM"Br.Yf[l#ޤSɊ U*цR'P}mxM׫W_)prs'85DPΆ*99ELړj eddR?P ?6ɔ˼너d iq|o,l_ ~U sFY#i#L歇{ YZ