Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libzzip-0-13-0.13.69-3.10.1 RPM for aarch64

From OpenSuSE Leap 15.4 for aarch64

Name: libzzip-0-13 Distribution: SUSE Linux Enterprise 15
Version: 0.13.69 Vendor: SUSE LLC <https://www.suse.com/>
Release: 3.10.1 Build date: Mon Oct 21 13:54:52 2019
Group: System/Libraries Build host: ibs-centriq-3
Size: 297049 Source RPM: zziplib-0.13.69-3.10.1.src.rpm
Packager: https://www.suse.com/
Url: http://zziplib.sourceforge.net
Summary: ZIP compression library
ZZipLib is a library for dealing with ZIP and ZIP-like archives by
using algorithms of zlib.

Provides

Requires

License

LGPL-2.1+

Changelog

* Thu Oct 17 2019 josef.moellers@suse.com
  - Fixed another instance where division by 0 may occur.
    [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]
* Thu Jun 13 2019 josef.moellers@suse.com
  - Prevent division by zero by first checking if uncompressed size
    is 0. This may happen with directories which have a compressed
    and uncompressed size of 0.
    [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]
* Thu Oct 04 2018 josef.moellers@suse.com
  - Remove any "../" components from pathnames of extracted files.
    [bsc#1110687, CVE-2018-17828, CVE-2018-17828.patch]
* Fri Sep 07 2018 josef.moellers@suse.com
  - Avoid memory leak from __zzip_parse_root_directory().
    Free allocated structure if its address is not passed back.
    [bsc#1107424, CVE-2018-16548, CVE-2018-16548.patch]
* Mon Mar 19 2018 josef.moellers@suse.com
  - Check if data from End of central directory record makes sense.
    Especially the Offset of start of central directory must not
    a) be negative or
    b) point behind the end-of-file.
  - Check if compressed size in Central directory file header
    makes sense, i.e. the file's data does not extend beyond the
    end of the file.
    [bsc#1084517, CVE-2018-7726, CVE-2018-7726.patch,
    bsc#1084519, CVE-2018-7725, CVE-2018-7725.patch]
* Sat Mar 17 2018 avindra@opensuse.org
  - Update to 0.13.69:
    * fix a number of CVEs reported with special *.zip PoC files
    * completing some doc strings while checking the new man-pages to
      look good
    * update refs to point to github instead of sf.net
    * man-pages are generated with new dbk2man.py - docbook xmlto is
      optional now
    * a zip-program is still required for testing, but some errors
      are gone when not present
  - run spec-cleaner
  - don't ship Windows only file, README.MSVC6
* Mon Feb 19 2018 adam.majer@suse.de
  - Drop BR: fdupes since it does nothing.
* Mon Feb 19 2018 jengelh@inai.de
  - Fix RPM groups. Remove ineffective --with-pic.
    Trim redundancies from description.
    Do not let fdupes run across partitions.
* Sun Feb 18 2018 avindra@opensuse.org
  - Update to 0.13.68:
    * fix a number of CVEs reported with special *.zip files
    * minor doc updates referencing GitHub instead of sf.net
  - drop CVE-2018-6381.patch
    * merged in a803559fa9194be895422ba3684cf6309b6bb598
  - drop CVE-2018-6484.patch
    * merged in 0c0c9256b0903f664bca25dd8d924211f81e01d3
  - drop CVE-2018-6540.patch
    * merged in 15b8c969df962a444dfa07b3d5bd4b27dc0dbba7
  - drop CVE-2018-6542.patch
    * merged in 938011cd60f5a8a2a16a49e5f317aca640cf4110
* Wed Feb 14 2018 josef.moellers@suse.com
  - Changed %license to %doc in SPEC file.
* Mon Feb 12 2018 josef.moellers@suse.com
  - If the size of the central directory is too big, reject
    the file.
    Then, if loading the ZIP file fails, display an error message.
    [CVE-2018-6542.patch, CVE-2018-6542, bsc#1079094]
* Tue Feb 06 2018 josef.moellers@suse.com
  - If an extension block is too small to hold an extension,
    do not use the information therein.
  - If the End of central directory record (EOCD) contains an
    Offset of start of central directory which is beyond the end of
    the file, reject the file.
    [CVE-2018-6540, bsc#1079096, CVE-2018-6540.patch]
* Fri Feb 02 2018 josef.moellers@suse.com
  - Reject the ZIP file and report it as corrupt if the size of the
    central directory and/or the offset of start of central directory
    point beyond the end of the ZIP file.
    [CVE-2018-6484, boo#1078701, CVE-2018-6484.patch]
* Thu Feb 01 2018 josef.moellers@suse.com
  - If a file is uncompressed, compressed and uncompressed sizes
    should be identical.
    [CVE-2018-6381, bsc#1078497, CVE-2018-6381.patch]
* Tue Jan 23 2018 tchvatal@suse.com
  - Drop tests as they fail completely anyway, not finding lib needing
    zip command, this should allow us to kill python dependency
  - Also drop docs subdir avoiding python dependency for it
    * The generated xmls were used for mans too but we shipped those
      only in devel pkg and as such we will live without them
* Tue Jan 23 2018 tchvatal@suse.com
  - Version update to 0.13.67:
    * Various fixes found by fuzzing
    * Merged bellow patches
  - Remove merged patches:
    * zziplib-CVE-2017-5974.patch
    * zziplib-CVE-2017-5975.patch
    * zziplib-CVE-2017-5976.patch
    * zziplib-CVE-2017-5978.patch
    * zziplib-CVE-2017-5979.patch
    * zziplib-CVE-2017-5981.patch
  - Switch to github tarball as upstream seem no longer pull it to
    sourceforge
  - Remove no longer applying patch zziplib-unzipcat-NULL-name.patch
    * The sourcecode was quite changed for this to work this way
      anymore, lets hope this is fixed too
* Wed Nov 01 2017 mpluskal@suse.com
  - Packaking changes:
    * Depend on python2 explicitly
    * Cleanup with spec-cleaner
* Thu Mar 23 2017 josef.moellers@suse.com
  - Several bugs fixed:
    * heap-based buffer overflows
      (bsc#1024517, CVE-2017-5974, zziplib-CVE-2017-5974.patch)
    * check if "relative offset of local header" in "central
      directory header" really points to a local header
      (ZZIP_FILE_HEADER_MAGIC)
      (bsc#1024528, CVE-2017-5975, zziplib-CVE-2017-5975.patch)
    * protect against bad formatted data in extra blocks
      (bsc#1024531, CVE-2017-5976, zziplib-CVE-2017-5976.patch)
    * NULL pointer dereference in main (unzzipcat-mem.c)
      (bsc#1024532, bsc#1024536, CVE-2017-5975,
      zziplib-CVE-2017-5975.patch)
    * protect against huge values of "extra field length"
      in local file header and central file header
      (bsc#1024533, CVE-2017-5978, zziplib-CVE-2017-5978.patch)
    * clear ZZIP_ENTRY record before use.
      (bsc#1024534, bsc#1024535, CVE-2017-5979, CVE-2017-5977,
      zziplib-CVE-2017-5979.patch)
    * prevent unzzipcat.c from trying to print a NULL name
      (bsc#1024537, zziplib-unzipcat-NULL-name.patch)
    * Replace assert() by going to error exit.
      (bsc#1034539, CVE-2017-5981, zziplib-CVE-2017-5981.patch)

Files

/usr/lib64/libzzip-0.so.10
/usr/lib64/libzzip-0.so.11
/usr/lib64/libzzip-0.so.12
/usr/lib64/libzzip-0.so.13
/usr/lib64/libzzip-0.so.13.0.69
/usr/lib64/libzzipfseeko-0.so.10
/usr/lib64/libzzipfseeko-0.so.11
/usr/lib64/libzzipfseeko-0.so.12
/usr/lib64/libzzipfseeko-0.so.13
/usr/lib64/libzzipfseeko-0.so.13.0.69
/usr/lib64/libzzipmmapped-0.so.10
/usr/lib64/libzzipmmapped-0.so.11
/usr/lib64/libzzipmmapped-0.so.12
/usr/lib64/libzzipmmapped-0.so.13
/usr/lib64/libzzipmmapped-0.so.13.0.69
/usr/lib64/libzzipwrap-0.so.13
/usr/lib64/libzzipwrap-0.so.13.0.69
/usr/share/licenses/libzzip-0-13
/usr/share/licenses/libzzip-0-13/COPYING.LIB


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Mar 9 17:10:10 2024