Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libzzip-0-13-0.13.72-1.3 RPM for aarch64

From OpenSuSE Ports Tumbleweed for aarch64

Name: libzzip-0-13 Distribution: openSUSE Tumbleweed
Version: 0.13.72 Vendor: openSUSE
Release: 1.3 Build date: Thu Jan 13 10:19:51 2022
Group: System/Libraries Build host: obs-arm-11
Size: 295834 Source RPM: zziplib-0.13.72-1.3.src.rpm
Summary: ZIP compression library
ZZipLib is a library for dealing with ZIP and ZIP-like archives by
using algorithms of zlib.






* Sun Feb 07 2021 Dirk Müller <>
  - update to 0.13.72:
    * The testbuilds were fixed to make cmake install and automake install the same
    * The cmake install did need patches for man3 installation on Unix
    * The cmake install did need patches for dll installation on Windows
    * The cmake install did need patches for dylib installation on MacOS
    * The cmake install did need patches for pkgconfig generation
    * Bump testbuilds to modern distro versions (ubuntu 20.04 centos 7.9 / 8.3)
    * Takeover for air-gap testings (for
    * handle UNZZIP-NOTFOUND in cmake and mark Ubuntu 'unzip' to be broken
    * merge patches for zzip_pread feature from Max Kellermann
    * merge patches for some bugs being found and reported via GitHub issues
    * run azure-pipelines with -DZZIP_TESTCVE=OFF to skip CVE *.zip downloads
    * use --downloadonly to get the CVE zip files for local storage
    * switch to cmake build system
  - remove zziplib-0.13.62-wronglinking.patch zziplib-largefile.patch:
    obsolete with switch to cmake
* Tue Apr 28 2020 Paolo Stivanin <>
  - Update to 0.13.71:
    * testbuilds fixes
    * fixes to bring base, sdl, manpages and site docs to same level
* Tue Apr 14 2020 Josef Möllers <>
  - Update to 1.13.70:
    * there have been tons of bugfixes over the last two years ...
    * Thanks go to Patrick Steinhardt (then at Aservo) for python3 updates
    * Thanks go to Josef Moellers (working at SUSE Labs) for many CVE fixes
    * and of course all the other patches that came in via github issues.
    * I have cleaned up sources to only uses Python3 (as needed by 2020).
    * !!! The old automake/autconf/libtool system will be dumped soon!!!
    * The build system was ported to 'cmake' .. (last tested cmake 3.10.2)
    Obsoletes patches
    - CVE-2018-7726.patch
    - CVE-2018-7725.patch
    - CVE-2018-16548.patch
    - CVE-2018-17828.patch
    - bsc1129403-prevent-division-by-zero.patch
    [zziplib-0.13.70.tar.gz, CVE-2018-7726.patch, CVE-2018-7725.patch,
    CVE-2018-16548.patch, CVE-2018-17828.patch,
* Mon Feb 24 2020 Josef Möllers <>
  - Corrected control flow in zzip_mem_entry_make() to
    gain correct exit status.
    [bsc#1154002, bsc1154002-prevent-unnecessary-perror.patch]
* Fri Dec 13 2019 Josef Möllers <>
  - Make an unconditional error message conditional by checking
    the return value of a function call.
    Also removed an unwanted debug output.
    [bsc#154002, bsc1154002-prevent-unnecessary-perror.patch,
* Thu Oct 17 2019 Josef Möllers <>
  - Fixed another instance where division by 0 may occur.
    [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]
* Thu Jun 13 2019
  - Prevent division by zero by first checking if uncompressed size
    is 0. This may happen with directories which have a compressed
    and uncompressed size of 0.
    [bsc#1129403, bsc1129403-prevent-division-by-zero.patch]
* Thu Oct 04 2018
  - Remove any "../" components from pathnames of extracted files.
    [bsc#1110687, CVE-2018-17828, CVE-2018-17828.patch]
* Fri Sep 07 2018
  - Avoid memory leak from __zzip_parse_root_directory().
    Free allocated structure if its address is not passed back.
    [bsc#1107424, CVE-2018-16548, CVE-2018-16548.patch]
* Mon Mar 19 2018
  - Check if data from End of central directory record makes sense.
    Especially the Offset of start of central directory must not
    a) be negative or
    b) point behind the end-of-file.
  - Check if compressed size in Central directory file header
    makes sense, i.e. the file's data does not extend beyond the
    end of the file.
    [bsc#1084517, CVE-2018-7726, CVE-2018-7726.patch,
    bsc#1084519, CVE-2018-7725, CVE-2018-7725.patch]
* Sat Mar 17 2018
  - Update to 0.13.69:
    * fix a number of CVEs reported with special *.zip PoC files
    * completing some doc strings while checking the new man-pages to
      look good
    * update refs to point to github instead of
    * man-pages are generated with new - docbook xmlto is
      optional now
    * a zip-program is still required for testing, but some errors
      are gone when not present
  - run spec-cleaner
  - don't ship Windows only file, README.MSVC6
* Mon Feb 19 2018
  - Drop BR: fdupes since it does nothing.
* Mon Feb 19 2018
  - Fix RPM groups. Remove ineffective --with-pic.
    Trim redundancies from description.
    Do not let fdupes run across partitions.
* Sun Feb 18 2018
  - Update to 0.13.68:
    * fix a number of CVEs reported with special *.zip files
    * minor doc updates referencing GitHub instead of
  - drop CVE-2018-6381.patch
    * merged in a803559fa9194be895422ba3684cf6309b6bb598
  - drop CVE-2018-6484.patch
    * merged in 0c0c9256b0903f664bca25dd8d924211f81e01d3
  - drop CVE-2018-6540.patch
    * merged in 15b8c969df962a444dfa07b3d5bd4b27dc0dbba7
  - drop CVE-2018-6542.patch
    * merged in 938011cd60f5a8a2a16a49e5f317aca640cf4110
* Wed Feb 14 2018
  - Changed %license to %doc in SPEC file.
* Mon Feb 12 2018
  - If the size of the central directory is too big, reject
    the file.
    Then, if loading the ZIP file fails, display an error message.
    [CVE-2018-6542.patch, CVE-2018-6542, bsc#1079094]
* Tue Feb 06 2018
  - If an extension block is too small to hold an extension,
    do not use the information therein.
  - If the End of central directory record (EOCD) contains an
    Offset of start of central directory which is beyond the end of
    the file, reject the file.
    [CVE-2018-6540, bsc#1079096, CVE-2018-6540.patch]
* Fri Feb 02 2018
  - Reject the ZIP file and report it as corrupt if the size of the
    central directory and/or the offset of start of central directory
    point beyond the end of the ZIP file.
    [CVE-2018-6484, boo#1078701, CVE-2018-6484.patch]
* Thu Feb 01 2018
  - If a file is uncompressed, compressed and uncompressed sizes
    should be identical.
    [CVE-2018-6381, bsc#1078497, CVE-2018-6381.patch]
* Tue Jan 23 2018
  - Drop tests as they fail completely anyway, not finding lib needing
    zip command, this should allow us to kill python dependency
  - Also drop docs subdir avoiding python dependency for it
    * The generated xmls were used for mans too but we shipped those
      only in devel pkg and as such we will live without them
* Tue Jan 23 2018
  - Version update to 0.13.67:
    * Various fixes found by fuzzing
    * Merged bellow patches
  - Remove merged patches:
    * zziplib-CVE-2017-5974.patch
    * zziplib-CVE-2017-5975.patch
    * zziplib-CVE-2017-5976.patch
    * zziplib-CVE-2017-5978.patch
    * zziplib-CVE-2017-5979.patch
    * zziplib-CVE-2017-5981.patch
  - Switch to github tarball as upstream seem no longer pull it to
  - Remove no longer applying patch zziplib-unzipcat-NULL-name.patch
    * The sourcecode was quite changed for this to work this way
      anymore, lets hope this is fixed too
* Wed Nov 01 2017
  - Packaking changes:
    * Depend on python2 explicitly
    * Cleanup with spec-cleaner
* Thu Mar 23 2017
  - Several bugs fixed:
    * heap-based buffer overflows
      (bsc#1024517, CVE-2017-5974, zziplib-CVE-2017-5974.patch)
    * check if "relative offset of local header" in "central
      directory header" really points to a local header
      (bsc#1024528, CVE-2017-5975, zziplib-CVE-2017-5975.patch)
    * protect against bad formatted data in extra blocks
      (bsc#1024531, CVE-2017-5976, zziplib-CVE-2017-5976.patch)
    * NULL pointer dereference in main (unzzipcat-mem.c)
      (bsc#1024532, bsc#1024536, CVE-2017-5975,
    * protect against huge values of "extra field length"
      in local file header and central file header
      (bsc#1024533, CVE-2017-5978, zziplib-CVE-2017-5978.patch)
    * clear ZZIP_ENTRY record before use.
      (bsc#1024534, bsc#1024535, CVE-2017-5979, CVE-2017-5977,
    * prevent unzzipcat.c from trying to print a NULL name
      (bsc#1024537, zziplib-unzipcat-NULL-name.patch)
    * Replace assert() by going to error exit.
      (bsc#1034539, CVE-2017-5981, zziplib-CVE-2017-5981.patch)
* Sat Mar 16 2013
  - zziplib-largefile.patch: Enable largefile support
  - Enable debug information
* Sat Dec 15 2012
  - Update to 0.13.62 version:
    * fallback to libtool -export-dynamic unless being sure to
      use gnu-ld --export-dynamic. The darwin case is a bit special here
    as the c-compiler and linker might be from different worlds.
    * allow nonstaic build
    * wrap like in the Fedora patch
  - Remove the package name on summary
  - Add dos2unix as build dependencie to fix a wrong file encoding
* Sat Nov 19 2011
  - add libtool as buildrequire to avoid implicit dependency
* Fri Sep 16 2011
  - Implement shlib policy/packaging for package, add baselibs.conf
    and resolve redundant constructs
* Sat Apr 30 2011
  - Fix build with gcc 4.6
* Mon Feb 15 2010
  - Update to version 0.13.58:
    + Some bugs fixed, see ChangeLog
* Mon Jul 27 2009
  - update to version 0.13.56 - fixes many smaller issues
    (see Changelog)
* Wed Jun 17 2009
  - fix build with automake 1.11
* Mon Jan 26 2009
  - remove "la" files
* Fri Oct 24 2008
  - removed ./msvc7/pkzip.exe and ./msvc8/zip.exe to avoid license
* Wed Aug 15 2007
  - update to version 0.13.49 fixes #260734 buffer overflow
    due to wrong usage of strcpy()
* Thu Mar 29 2007
  - adjust buildrequires
* Mon Dec 04 2006
  - don't build as root
* Tue Oct 03 2006
  - Fix build.
* Fri Aug 18 2006
  - Fix build.
* Mon May 22 2006
  - initial release
  - still problems with the "make check" build option



Generated by rpm2html 1.8.1

Fabrice Bellet, Wed Apr 27 00:22:51 2022