libpng12-0-1.2.57-150000.4.3.1<>,)i8xp9|3Ux@ęw7nbr!ĬmiG |Eʳ:|2Ce[Q5T`UZ@V(5~; Y <=,To0N|}l1*O;Mx`wf%i6#m`c:,n51bHI)"81iSm ϘF[lǟBJlRw`AW)`.yZ%BǎHTmj%aAgݹY9KZAl/JWJ>C,?d  ! X .X^hp t x   $&(M8T 9 :8 > @ B F G H I X Y $Z d[ h\ p] x^ b c Nd e f l u v wxy zClibpng12-01.2.57150000.4.3.1Library for the Portable Network Graphics Format (PNG)libpng is the official reference library for the Portable Network Graphics format (PNG).i8xh04-ch1d`SUSE Linux Enterprise 15SUSE LLC Zlibhttps://www.suse.com/System/Librarieshttp://www.libpng.org/pub/png/libpng.htmllinuxx86_64`i8wi8wd58e192c1705f6813e297be3d558e3dcf531d9aa564a713457460ac61b0f504clibpng12.so.0.57.0rootrootrootrootlibpng12-1.2.57-150000.4.3.1.src.rpmlibpnglibpng12-0libpng12-0(x86-64)libpng12.so.0()(64bit)libpng12.so.0(PNG12_0)(64bit)@@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.11)(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libm.so.6()(64bit)libm.so.6(GLIBC_2.2.5)(64bit)libz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1i0&@ZqZp^@Xj@VrV`.VEUĝT\@TTmpgajdos@suse.compgajdos@suse.comjengelh@inai.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comolaf@aepfle.depgajdos@suse.com- security update - modified patches * libpng-1.2.51-CVE-2013-7353.patch (-p1) * libpng-1.2.51-CVE-2013-7354.patch (-p1) - added patches CVE-2025-64505 [bsc#1254157], heap buffer over-read in `png_do_quantize` via malformed palette index * libpng12-CVE-2025-64505.patch- check with -j1, be explicit- Fix SRPM group and grammar issues.- updated to 1.2.57: fixes CVE-2016-10087- updated to 1.2.56: Fixed an out-of-range read in png_check_keyword() (Bug report from Qixue Xiao, CVE-2015-8540). Added keyword checks to pngset.c- updated to 1.2.55: Avoid potential pointer overflow in png_handle_iTXt(), png_handle_zTXt(), png_handle_sPLT(), and png_handle_pCAL() (Bug report by John Regehr). Fixed incorrect implementation of png_set_PLTE() that uses png_ptr not info_ptr, that left png_set_PLTE() open to the CVE-2015-8126 vulnerability.- updated to 1.2.54- build in build section- updated to 1.2.53: Issue a png_error() instead of a png_warning() when width is potentially too large for the architecture, in case the calling application has overridden the default 1,000,000-column limit (fixes CVE-2014-9495 and CVE-2015-0973). Display user limits in the output from pngtest. Changed PNG_USER_CHUNK_MALLOC_MAX from unlimited to 8,000,000. This can only be changed at library-build time. It only affects the maximum memory that can be allocated to an ancillary chunk; it does not limit the size of IDAT data, which is instead limited by PNG_USER_WIDTH_MAX.- Fix CVE-2013-7354.patch, include limits.h for INT_MAX- updated to 1.2.52: * Avoid out-of-bounds memory access while checking version string./sbin/ldconfig/sbin/ldconfiglibpngh04-ch1d 17652783281.2.57-150000.4.3.11.2.57-150000.4.3.11.2.57-150000.4.3.11.2.57libpng12.so.0libpng12.so.0.57.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:41886/SUSE_SLE-15_Update/df3e432de8e28b67e8e6364e6918fd80-libpng12.SUSE_SLE-15_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=283065f0cb544df8e897c75d3f7c7c073005509b, stripped PPR RRRRRR RR9utf-87e75a12beee584f0b4805fe70b7ad9351eee8f3806df5a23f4ca53296891b29b?7zXZ !t/(Q]"k%f0]du O{6D4{ i)*Dmr@2^a)6B[6)v?hpe]_bQuiNhعt]5[[PIxߠoj%qCHՀeR^ {kӲᴱUW]V:MGYx DLJ쳦D~~2SIeA9n/NXnVoLw9@\Al!28πZCct#X iQIl =G=[A+lp|?N Y')ٻxL6SiсHNٳ.Ÿ;~Ȱ+v'g5ct_63#B^@+hĞ:8þC#.ޕ[7% ]U{$<1/(P,%^AC\mJ۱:bsmMl~b~!A[^4ȑ8ķ{{bBg!4 *m̼Q>FK%^iji?FUpN TME]oM 7ԙ&%*Y0R}8Ӊe`$J\z _5٪j, uD[|aayo]dmlԟ:V}N =|ZA{X=u=B ([ѤBxؠNȓP2Q`~b KI՛/ݵ&[ !#q `;,,x-*t͖+{pU&,d ,¤U+o Q&hD )d{Lڑqqo0xAqH5@?Ǽw8\[ڲnT*p vEeҁ|:1KRkݍ1ɵ)>#㧃RA$n:{~MO9 &{' XG=AbB3^NaM`w()) ~Sz V: `?y7Iim/gQ`}GU,j8i94՘aHm;?ugؠiW*(gn|=/R!O#)1ps&8NCRT~+*Ѫ&Q(a?}[7Ur3uk| ifG> 0u80.bXХ ;Pą8QPa7t0ǓiUDO6#,U/Vq @f."i L7@ <7^ӭe(8[&՞Ƞ}^}qbSWJ1u)疞0QҦ[1JYž8ʈ { 5A-zMĀ# W~qгxD5{5bMJ;{2^v C $d;N iJā1ɦrJJ%16._ׂ}~K R"UPE콢0k 4ڏ}6\"y~־LQ*]VqC>;f"އm%?͚{=[]rn|8kHS ;lq]Y4fExы?Em,ޏ氙UX Eՙޜo/dtP] (3fnZ}4RmK )"#y@$2~gŻG:SC ".5)p#DѺˈ-;obd t_4xVBHRoK+/ka6R(g (FtNF;V5<+loqe& e+;^2yVuYSG:6J #o F._dj>ue>1Uf}bOa!谙D Tѓki$U PTMܗ!6;ٖ[%7KG~OΣ"qZ&f} | \ uĭ8]8_!bT ZB_7M4co'3}eQlJȦx22T O}ϛpR fƋm9:p"Np~nJ5k {v\rVxs A 2q'Op ޳ w xWG<# ߬gd圄֎ -G-?? Q<-_d5z)5PL:'ޢXHQE!! mj,V!FZSl^Ԇ̞H4DL9&!r WʈgO%5Bf#]A@ߕ}&Gn^]BtfZxs6o%t  - F&@g)Z*r>2VjZF Ť0e' _ #pk? HcɎʃ v󨗒&EN^-;):q.\ wd*U,g?n5,#p[HA;! @l u]c~0N䍯[Q$,/>:J\)O&EL!1nmf ,o[QH[ŧ^ʇ捴j-A[6@_^?=Iy+AWmw ;_ȢX$."lr_o9 7dӮ#gMU9?,w7\n=K6L3!XcFxB @ IJM6ӒFyCD2OGMN:G.׆zrCSD5p)b MG#"I:Qu g&J^̂?(١h9h+l#KdÑoÓ7),{ ^qbqUy V",J#.E#q5TGC$07]@^ h@:Yp" Z:9Nvc-?jj EDxRw7Fɻ9_ņ\D( 찥9"AD<9FyuLADP4x4 Dawsc߫,l*+H?lr`)rgSo{H`iD6:r 7| 蕝G"xnr8-Gpj<Rطdk7tDaaWDtY}~! /;ԩ̢}!ڡۤgW[@OXR-2 jʁd 0\ELJ)KJ&2H rHf;c2*2 ,8jF"|n R[dCOF̫m4qPJiGU{  yƔQ|CDwn(BSm kxxg=2^&Ϯ/_HR<.V:Ee( zZ-nu󺂌4D?*{^0+/Bm[ZfKᐮN봞˵ y1ZI ?pgr  q܆9.KTتKg{B|.i͏?h@{D3]tYÕeL T-{(PBKK69zՏ;9PcQx  0ԺGR+]+$˶#Khݼq$)fg[#lDW5*=FBĢ"xwN ; d-T8̠-ygat27)T3{fٽx~eqMZz#n[[6e y ;uÐ^|Xpu/HmhdnTOUSPoedJሣv6ԣ :Dc`t,\hCEV35Mkp׍h͇ _'&dH0 ^Mã^Yʚ<#oIYU#w]rn7nƳߛv *M"(+ؤ;7w?ߓ{,j|JR0߂N Id}m)Xh] St~Յ1jDchCځ(/M^:AF eZ_m.co ^pW)LP V([$z:ȴEYQx./0pd;6/tւWeģlm <.uc)L/bSۙy^&ӫ5/oAh+*3c6aZA9 Sm_ņFy3\6t)SF,=c]@+xKbep eV:9 mԊ֤o{?5