Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: zziplib-devel | Distribution: SUSE Linux Enterprise 15 |
Version: 0.13.72 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: 150600.2.2 | Build date: Thu May 9 12:03:18 2024 |
Group: Development/Libraries/C and C++ | Build host: h03-ch2b |
Size: 340498 | Source RPM: zziplib-0.13.72-150600.2.2.src.rpm |
Packager: https://www.suse.com/ | |
Url: http://zziplib.sourceforge.net | |
Summary: Development files for zziplib, a ZIP compression library |
That are the header files needed for developing applications using ZZipLib.
LGPL-2.1-or-later
* Tue Feb 27 2024 valentin.lefebvre@suse.com - assert full zzip_file_header. [bsc#1214577, CVE-2020-18770, CVE-2020-18770.patch] - Use autosetup * Sun Feb 07 2021 dmueller@suse.com - update to 0.13.72: * The testbuilds were fixed to make cmake install and automake install the same * The cmake install did need patches for man3 installation on Unix * The cmake install did need patches for dll installation on Windows * The cmake install did need patches for dylib installation on MacOS * The cmake install did need patches for pkgconfig generation * Bump testbuilds to modern distro versions (ubuntu 20.04 centos 7.9 / 8.3) * Takeover docker_mirror.py for air-gap testings (for testbuilds.py) * handle UNZZIP-NOTFOUND in cmake and mark Ubuntu 'unzip' to be broken * merge patches for zzip_pread feature from Max Kellermann * merge patches for some bugs being found and reported via GitHub issues * run azure-pipelines with -DZZIP_TESTCVE=OFF to skip CVE *.zip downloads * use zziptests.py --downloadonly to get the CVE zip files for local storage * switch to cmake build system - remove zziplib-0.13.62-wronglinking.patch zziplib-largefile.patch: obsolete with switch to cmake * Tue Apr 28 2020 info@paolostivanin.com - Update to 0.13.71: * testbuilds fixes * fixes to bring base, sdl, manpages and site docs to same level * Tue Apr 14 2020 josef.moellers@suse.com - Update to 1.13.70: * there have been tons of bugfixes over the last two years ... * Thanks go to Patrick Steinhardt (then at Aservo) for python3 updates * Thanks go to Josef Moellers (working at SUSE Labs) for many CVE fixes * and of course all the other patches that came in via github issues. * I have cleaned up sources to only uses Python3 (as needed by 2020). * !!! The old automake/autconf/libtool system will be dumped soon!!! * The build system was ported to 'cmake' .. (last tested cmake 3.10.2) Obsoletes patches - CVE-2018-7726.patch - CVE-2018-7725.patch - CVE-2018-16548.patch - CVE-2018-17828.patch - bsc1129403-prevent-division-by-zero.patch [zziplib-0.13.70.tar.gz, CVE-2018-7726.patch, CVE-2018-7725.patch, CVE-2018-16548.patch, CVE-2018-17828.patch, bsc1129403-prevent-division-by-zero.patch] * Mon Feb 24 2020 josef.moellers@suse.com - Corrected control flow in zzip_mem_entry_make() to gain correct exit status. [bsc#1154002, bsc1154002-prevent-unnecessary-perror.patch] * Fri Dec 13 2019 josef.moellers@suse.com - Make an unconditional error message conditional by checking the return value of a function call. Also removed an unwanted debug output. [bsc#154002, bsc1154002-prevent-unnecessary-perror.patch, CVE-2018-7725.patch] * Thu Oct 17 2019 josef.moellers@suse.com - Fixed another instance where division by 0 may occur. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch] * Thu Jun 13 2019 josef.moellers@suse.com - Prevent division by zero by first checking if uncompressed size is 0. This may happen with directories which have a compressed and uncompressed size of 0. [bsc#1129403, bsc1129403-prevent-division-by-zero.patch] * Thu Oct 04 2018 josef.moellers@suse.com - Remove any "../" components from pathnames of extracted files. [bsc#1110687, CVE-2018-17828, CVE-2018-17828.patch] * Fri Sep 07 2018 josef.moellers@suse.com - Avoid memory leak from __zzip_parse_root_directory(). Free allocated structure if its address is not passed back. [bsc#1107424, CVE-2018-16548, CVE-2018-16548.patch] * Mon Mar 19 2018 josef.moellers@suse.com - Check if data from End of central directory record makes sense. Especially the Offset of start of central directory must not a) be negative or b) point behind the end-of-file. - Check if compressed size in Central directory file header makes sense, i.e. the file's data does not extend beyond the end of the file. [bsc#1084517, CVE-2018-7726, CVE-2018-7726.patch, bsc#1084519, CVE-2018-7725, CVE-2018-7725.patch] * Sat Mar 17 2018 avindra@opensuse.org - Update to 0.13.69: * fix a number of CVEs reported with special *.zip PoC files * completing some doc strings while checking the new man-pages to look good * update refs to point to github instead of sf.net * man-pages are generated with new dbk2man.py - docbook xmlto is optional now * a zip-program is still required for testing, but some errors are gone when not present - run spec-cleaner - don't ship Windows only file, README.MSVC6 * Mon Feb 19 2018 adam.majer@suse.de - Drop BR: fdupes since it does nothing. * Mon Feb 19 2018 jengelh@inai.de - Fix RPM groups. Remove ineffective --with-pic. Trim redundancies from description. Do not let fdupes run across partitions. * Sun Feb 18 2018 avindra@opensuse.org - Update to 0.13.68: * fix a number of CVEs reported with special *.zip files * minor doc updates referencing GitHub instead of sf.net - drop CVE-2018-6381.patch * merged in a803559fa9194be895422ba3684cf6309b6bb598 - drop CVE-2018-6484.patch * merged in 0c0c9256b0903f664bca25dd8d924211f81e01d3 - drop CVE-2018-6540.patch * merged in 15b8c969df962a444dfa07b3d5bd4b27dc0dbba7 - drop CVE-2018-6542.patch * merged in 938011cd60f5a8a2a16a49e5f317aca640cf4110 * Wed Feb 14 2018 josef.moellers@suse.com - Changed %license to %doc in SPEC file. * Mon Feb 12 2018 josef.moellers@suse.com - If the size of the central directory is too big, reject the file. Then, if loading the ZIP file fails, display an error message. [CVE-2018-6542.patch, CVE-2018-6542, bsc#1079094] * Tue Feb 06 2018 josef.moellers@suse.com - If an extension block is too small to hold an extension, do not use the information therein. - If the End of central directory record (EOCD) contains an Offset of start of central directory which is beyond the end of the file, reject the file. [CVE-2018-6540, bsc#1079096, CVE-2018-6540.patch] * Fri Feb 02 2018 josef.moellers@suse.com - Reject the ZIP file and report it as corrupt if the size of the central directory and/or the offset of start of central directory point beyond the end of the ZIP file. [CVE-2018-6484, boo#1078701, CVE-2018-6484.patch] * Thu Feb 01 2018 josef.moellers@suse.com - If a file is uncompressed, compressed and uncompressed sizes should be identical. [CVE-2018-6381, bsc#1078497, CVE-2018-6381.patch] * Tue Jan 23 2018 tchvatal@suse.com - Drop tests as they fail completely anyway, not finding lib needing zip command, this should allow us to kill python dependency - Also drop docs subdir avoiding python dependency for it * The generated xmls were used for mans too but we shipped those only in devel pkg and as such we will live without them * Tue Jan 23 2018 tchvatal@suse.com - Version update to 0.13.67: * Various fixes found by fuzzing * Merged bellow patches - Remove merged patches: * zziplib-CVE-2017-5974.patch * zziplib-CVE-2017-5975.patch * zziplib-CVE-2017-5976.patch * zziplib-CVE-2017-5978.patch * zziplib-CVE-2017-5979.patch * zziplib-CVE-2017-5981.patch - Switch to github tarball as upstream seem no longer pull it to sourceforge - Remove no longer applying patch zziplib-unzipcat-NULL-name.patch * The sourcecode was quite changed for this to work this way anymore, lets hope this is fixed too * Wed Nov 01 2017 mpluskal@suse.com - Packaking changes: * Depend on python2 explicitly * Cleanup with spec-cleaner * Thu Mar 23 2017 josef.moellers@suse.com - Several bugs fixed: * heap-based buffer overflows (bsc#1024517, CVE-2017-5974, zziplib-CVE-2017-5974.patch) * check if "relative offset of local header" in "central directory header" really points to a local header (ZZIP_FILE_HEADER_MAGIC) (bsc#1024528, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against bad formatted data in extra blocks (bsc#1024531, CVE-2017-5976, zziplib-CVE-2017-5976.patch) * NULL pointer dereference in main (unzzipcat-mem.c) (bsc#1024532, bsc#1024536, CVE-2017-5975, zziplib-CVE-2017-5975.patch) * protect against huge values of "extra field length" in local file header and central file header (bsc#1024533, CVE-2017-5978, zziplib-CVE-2017-5978.patch) * clear ZZIP_ENTRY record before use. (bsc#1024534, bsc#1024535, CVE-2017-5979, CVE-2017-5977, zziplib-CVE-2017-5979.patch) * prevent unzzipcat.c from trying to print a NULL name (bsc#1024537, zziplib-unzipcat-NULL-name.patch) * Replace assert() by going to error exit. (bsc#1034539, CVE-2017-5981, zziplib-CVE-2017-5981.patch)
/usr/bin/unzip-mem /usr/bin/unzzip /usr/bin/unzzip-big /usr/bin/unzzip-mem /usr/bin/unzzip-mix /usr/bin/zzcat /usr/bin/zzdir /usr/bin/zzxorcat /usr/bin/zzxorcopy /usr/bin/zzxordir /usr/include/zzip /usr/include/zzip-io.h /usr/include/zzip.h /usr/include/zzip/_config.h /usr/include/zzip/_msvc.h /usr/include/zzip/autoconf.h /usr/include/zzip/conf.h /usr/include/zzip/fetch.h /usr/include/zzip/file.h /usr/include/zzip/format.h /usr/include/zzip/fseeko.h /usr/include/zzip/info.h /usr/include/zzip/lib.h /usr/include/zzip/memdisk.h /usr/include/zzip/mmapped.h /usr/include/zzip/plugin.h /usr/include/zzip/stdint.h /usr/include/zzip/types.h /usr/include/zzip/wrap.h /usr/include/zzip/write.h /usr/include/zzip/zzip.h /usr/include/zzip/zzip32.h /usr/include/zziplib.h /usr/lib64/libzzip.so /usr/lib64/libzzipfseeko.so /usr/lib64/libzzipmmapped.so /usr/lib64/libzzipwrap.so /usr/lib64/pkgconfig/zzipfseeko.pc /usr/lib64/pkgconfig/zziplib.pc /usr/lib64/pkgconfig/zzipmmapped.pc /usr/lib64/pkgconfig/zzipwrap.pc /usr/share/aclocal/zziplib.m4 /usr/share/doc/packages/zziplib-devel /usr/share/doc/packages/zziplib-devel/ChangeLog /usr/share/doc/packages/zziplib-devel/README /usr/share/doc/packages/zziplib-devel/README.SDL /usr/share/doc/packages/zziplib-devel/TODO /usr/share/man/man3/__zzip_fetch_disk_trailer.3.gz /usr/share/man/man3/__zzip_parse_root_directory.3.gz /usr/share/man/man3/__zzip_try_open.3.gz /usr/share/man/man3/zzip_close.3.gz /usr/share/man/man3/zzip_closedir.3.gz /usr/share/man/man3/zzip_compr_str.3.gz /usr/share/man/man3/zzip_dir_alloc.3.gz /usr/share/man/man3/zzip_dir_alloc_ext_io.3.gz /usr/share/man/man3/zzip_dir_close.3.gz /usr/share/man/man3/zzip_dir_fdopen.3.gz /usr/share/man/man3/zzip_dir_fdopen_ext_io.3.gz /usr/share/man/man3/zzip_dir_free.3.gz /usr/share/man/man3/zzip_dir_open.3.gz /usr/share/man/man3/zzip_dir_open_ext_io.3.gz /usr/share/man/man3/zzip_dir_read.3.gz /usr/share/man/man3/zzip_dir_real.3.gz /usr/share/man/man3/zzip_dir_stat.3.gz /usr/share/man/man3/zzip_dirfd.3.gz /usr/share/man/man3/zzip_dirhandle.3.gz /usr/share/man/man3/zzip_disk_buffer.3.gz /usr/share/man/man3/zzip_disk_close.3.gz /usr/share/man/man3/zzip_disk_entry_fopen.3.gz /usr/share/man/man3/zzip_disk_entry_strdup_comment.3.gz /usr/share/man/man3/zzip_disk_entry_strdup_name.3.gz /usr/share/man/man3/zzip_disk_entry_to_data.3.gz /usr/share/man/man3/zzip_disk_entry_to_file_header.3.gz /usr/share/man/man3/zzip_disk_fclose.3.gz /usr/share/man/man3/zzip_disk_feof.3.gz /usr/share/man/man3/zzip_disk_findfile.3.gz /usr/share/man/man3/zzip_disk_findfirst.3.gz /usr/share/man/man3/zzip_disk_findmatch.3.gz /usr/share/man/man3/zzip_disk_findnext.3.gz /usr/share/man/man3/zzip_disk_fopen.3.gz /usr/share/man/man3/zzip_disk_fread.3.gz /usr/share/man/man3/zzip_disk_init.3.gz /usr/share/man/man3/zzip_disk_mmap.3.gz /usr/share/man/man3/zzip_disk_munmap.3.gz /usr/share/man/man3/zzip_disk_new.3.gz /usr/share/man/man3/zzip_disk_open.3.gz /usr/share/man/man3/zzip_entry_data_offset.3.gz /usr/share/man/man3/zzip_entry_fclose.3.gz /usr/share/man/man3/zzip_entry_feof.3.gz /usr/share/man/man3/zzip_entry_ffile.3.gz /usr/share/man/man3/zzip_entry_findfile.3.gz /usr/share/man/man3/zzip_entry_findfirst.3.gz /usr/share/man/man3/zzip_entry_findmatch.3.gz /usr/share/man/man3/zzip_entry_findnext.3.gz /usr/share/man/man3/zzip_entry_fopen.3.gz /usr/share/man/man3/zzip_entry_fread.3.gz /usr/share/man/man3/zzip_entry_fread_file_header.3.gz /usr/share/man/man3/zzip_entry_free.3.gz /usr/share/man/man3/zzip_entry_strdup_name.3.gz /usr/share/man/man3/zzip_errno.3.gz /usr/share/man/man3/zzip_error.3.gz /usr/share/man/man3/zzip_fclose.3.gz /usr/share/man/man3/zzip_file_close.3.gz /usr/share/man/man3/zzip_file_open.3.gz /usr/share/man/man3/zzip_file_read.3.gz /usr/share/man/man3/zzip_file_real.3.gz /usr/share/man/man3/zzip_file_stat.3.gz /usr/share/man/man3/zzip_filesize.3.gz /usr/share/man/man3/zzip_fopen.3.gz /usr/share/man/man3/zzip_fread.3.gz /usr/share/man/man3/zzip_freopen.3.gz /usr/share/man/man3/zzip_fstat.3.gz /usr/share/man/man3/zzip_get_default_io.3.gz /usr/share/man/man3/zzip_inflate_init.3.gz /usr/share/man/man3/zzip_init_io.3.gz /usr/share/man/man3/zzip_open.3.gz /usr/share/man/man3/zzip_open_ext_io.3.gz /usr/share/man/man3/zzip_open_shared_io.3.gz /usr/share/man/man3/zzip_opendir.3.gz /usr/share/man/man3/zzip_opendir_ext_io.3.gz /usr/share/man/man3/zzip_read.3.gz /usr/share/man/man3/zzip_readdir.3.gz /usr/share/man/man3/zzip_realdir.3.gz /usr/share/man/man3/zzip_realfd.3.gz /usr/share/man/man3/zzip_rewind.3.gz /usr/share/man/man3/zzip_rewinddir.3.gz /usr/share/man/man3/zzip_seek.3.gz /usr/share/man/man3/zzip_seek32.3.gz /usr/share/man/man3/zzip_seekdir.3.gz /usr/share/man/man3/zzip_seekdir32.3.gz /usr/share/man/man3/zzip_seterror.3.gz /usr/share/man/man3/zzip_strerror.3.gz /usr/share/man/man3/zzip_strerror_of.3.gz /usr/share/man/man3/zzip_tell.3.gz /usr/share/man/man3/zzip_tell32.3.gz /usr/share/man/man3/zzip_telldir.3.gz /usr/share/man/man3/zzip_telldir32.3.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 20:06:21 2024