Change log for gzip package in Ubuntu

160 of 60 results
Published in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
gzip (1.12-1ubuntu3) noble; urgency=high

  * No change rebuild for 64-bit time_t and frame pointers.

 -- Julian Andres Klode <email address hidden>  Mon, 08 Apr 2024 17:58:45 +0200

Available diffs

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
gzip (1.12-1ubuntu2) noble; urgency=medium

  [ Helmut Grohne ]
  * Move files to /usr (closes: #1059533)

 -- Julian Andres Klode <email address hidden>  Thu, 22 Feb 2024 12:24:36 +0100

Available diffs

Published in jammy-updates
Deleted in jammy-proposed (Reason: moved to -updates)
gzip (1.10-4ubuntu4.1) jammy; urgency=medium

  * Cherry-pick upstream patch to use more portable alignment to resolve
    failure to execute on
    WSL1. https://github.com/microsoft/WSL/issues/8219 LP: #1966849

 -- Dimitri John Ledkov <email address hidden>  Mon, 05 Sep 2022 14:33:59 +0100

Available diffs

Superseded in noble-release
Published in mantic-release
Published in lunar-release
Obsolete in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
gzip (1.12-1ubuntu1) kinetic; urgency=low

  * Merge from Debian unstable. Remaining changes:
    - Enable DFLTCC optimisations on s390x by default.
  * Dropped changes, included upstream:
    - Cherrypick upstream patches for optimized s390x zlib compression
      and enable it
    - Applying patch from upstream to fix a segfault caused by passing
      multiple files larger than 5kb to a gzip command while zlib
      acceleration is enabled
    - debian/patches/CVE-2022-1271-1.patch: avoid exploit via multi-newline
      file names in zgrep.in.
    - debian/patches/CVE-2022-1271-2.patch: add test in tests/Makefile.am,
      tests/zgrep-abuse.
    - debian/patches/CVE-2022-1271-3.patch: port to POSIX sed in zgrep.in.
    - debian/patches/CVE-2022-1271-4.patch: optimize out a grep in
      gzexe.in.
    - debian/patches/CVE-2022-1271-5.patch: use C locale more often in
      gzexe.in, sample/zfile, zdiff.in, zgrep.in, znew.in.
    - debian/patches/CVE-2022-1271-6.patch: fix "binary file matches"
      mislabeling in tests/Makefile.am, tests/zgrep-binary, zgrep.in.
  * Dropped changes, superseded upstream:
    - debian/rules: fix permissions on new test scripts.

Available diffs

Superseded in kinetic-release
Published in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
gzip (1.10-4ubuntu4) jammy; urgency=medium

  * SECURITY UPDATE: arbitrary file override with crafted file names
    - debian/patches/CVE-2022-1271-1.patch: avoid exploit via multi-newline
      file names in zgrep.in.
    - debian/patches/CVE-2022-1271-2.patch: add test in tests/Makefile.am,
      tests/zgrep-abuse.
    - debian/patches/CVE-2022-1271-3.patch: port to POSIX sed in zgrep.in.
    - debian/patches/CVE-2022-1271-4.patch: optimize out a grep in
      gzexe.in.
    - debian/patches/CVE-2022-1271-5.patch: use C locale more often in
      gzexe.in, sample/zfile, zdiff.in, zgrep.in, znew.in.
    - debian/patches/CVE-2022-1271-6.patch: fix "binary file matches"
      mislabeling in tests/Makefile.am, tests/zgrep-binary, zgrep.in.
    - debian/rules: fix permissions on new test scripts.
    - CVE-2022-1271

 -- Marc Deslauriers <email address hidden>  Fri, 08 Apr 2022 06:53:06 -0400
Published in focal-updates
Published in focal-security
gzip (1.10-0ubuntu4.1) focal-security; urgency=medium

  * SECURITY UPDATE: arbitrary file override with crafted file names
    - debian/patches/CVE-2022-1271-1.patch: avoid exploit via multi-newline
      file names in zgrep.in.
    - debian/patches/CVE-2022-1271-2.patch: add test in tests/Makefile.am,
      tests/zgrep-abuse.
    - debian/patches/CVE-2022-1271-3.patch: port to POSIX sed in zgrep.in.
    - debian/patches/CVE-2022-1271-4.patch: optimize out a grep in
      gzexe.in.
    - debian/patches/CVE-2022-1271-5.patch: use C locale more often in
      gzexe.in, sample/zfile, zdiff.in, zgrep.in, znew.in.
    - debian/patches/CVE-2022-1271-6.patch: fix "binary file matches"
      mislabeling in tests/Makefile.am, tests/zgrep-binary, zgrep.in.
    - debian/rules: fix permissions on new test scripts.
    - CVE-2022-1271

 -- Marc Deslauriers <email address hidden>  Fri, 08 Apr 2022 07:05:45 -0400
Obsolete in impish-updates
Obsolete in impish-security
gzip (1.10-4ubuntu1.1) impish-security; urgency=medium

  * SECURITY UPDATE: arbitrary file override with crafted file names
    - debian/patches/CVE-2022-1271-1.patch: avoid exploit via multi-newline
      file names in zgrep.in.
    - debian/patches/CVE-2022-1271-2.patch: add test in tests/Makefile.am,
      tests/zgrep-abuse.
    - debian/patches/CVE-2022-1271-3.patch: port to POSIX sed in zgrep.in.
    - debian/patches/CVE-2022-1271-4.patch: optimize out a grep in
      gzexe.in.
    - debian/patches/CVE-2022-1271-5.patch: use C locale more often in
      gzexe.in, sample/zfile, zdiff.in, zgrep.in, znew.in.
    - debian/patches/CVE-2022-1271-6.patch: fix "binary file matches"
      mislabeling in tests/Makefile.am, tests/zgrep-binary, zgrep.in.
    - debian/rules: fix permissions on new test scripts.
    - CVE-2022-1271

 -- Marc Deslauriers <email address hidden>  Fri, 08 Apr 2022 07:04:04 -0400
Published in bionic-updates
Published in bionic-security
gzip (1.6-5ubuntu1.2) bionic-security; urgency=medium

  * SECURITY UPDATE: arbitrary file override with crafted file names
    - debian/patches/CVE-2022-1271-1.patch: avoid exploit via multi-newline
      file names in zgrep.in.
    - debian/patches/CVE-2022-1271-2.patch: add test in tests/Makefile.am,
      tests/zgrep-abuse.
    - debian/patches/CVE-2022-1271-3.patch: port to POSIX sed in zgrep.in.
    - debian/patches/CVE-2022-1271-4.patch: optimize out a grep in
      gzexe.in.
    - debian/patches/CVE-2022-1271-5.patch: use C locale more often in
      gzexe.in, sample/zfile, zdiff.in, zgrep.in, znew.in.
    - debian/patches/CVE-2022-1271-6.patch: fix "binary file matches"
      mislabeling in tests/Makefile.am, tests/zgrep-binary, zgrep.in.
    - debian/rules: fix permissions on new test scripts.
    - CVE-2022-1271

 -- Marc Deslauriers <email address hidden>  Fri, 08 Apr 2022 07:12:17 -0400
Superseded in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
gzip (1.10-4ubuntu3) jammy; urgency=medium

  * No-change rebuild for ppc64el baseline bump.

 -- Ɓukasz 'sil2100' Zemczak <email address hidden>  Wed, 23 Mar 2022 14:57:33 +0100
Superseded in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
Deleted in impish-proposed (Reason: Moved ot jammy)
gzip (1.10-4ubuntu2) impish; urgency=medium

  * No-change rebuild to build packages with zstd compression.

 -- Matthias Klose <email address hidden>  Thu, 07 Oct 2021 12:12:32 +0200

Available diffs

Superseded in bionic-updates
Deleted in bionic-proposed (Reason: moved to -updates)
gzip (1.6-5ubuntu1.1) bionic; urgency=medium

  * d/rules: Do not use ASM (LP: #1933516)

 -- Dan Streetman <email address hidden>  Thu, 24 Jun 2021 11:38:02 -0400

Available diffs

Superseded in jammy-release
Obsolete in impish-release
Deleted in impish-proposed (Reason: Moved to impish)
gzip (1.10-4ubuntu1) impish; urgency=low

  * Merge from Debian unstable. Remaining changes:
    - Cherrypick upstream patches for optimizied s390x zlib compression
      and enable it
    - Applying patch from upstream to fix a segfault caused by passing
      multiple files larger than 5kb to a gzip command while zlib
      acceleration is enabled
    - Enable DFLTCC optimisations on s390x by default. LP: #1884514

Available diffs

Superseded in impish-release
Obsolete in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
gzip (1.10-2ubuntu3) hirsute; urgency=medium

  * Enable DFLTCC optimisations on s390x by default. LP: #1884514

 -- Dimitri John Ledkov <email address hidden>  Thu, 28 Jan 2021 15:56:12 +0000

Available diffs

Obsolete in groovy-updates
Deleted in groovy-proposed (Reason: moved to -updates)
gzip (1.10-2ubuntu1.1) groovy; urgency=medium

  * Applying patch from upstream to fix a segfault caused by passing
    multiple files larger than 5kb to a gzip command while zlib
    acceleration is enabled (LP: #1901528)

 -- William 'jawn-smith' Wilson <email address hidden>  Tue, 19 Jan 2021 12:57:57 -0600

Available diffs

Superseded in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
gzip (1.10-2ubuntu2) hirsute; urgency=medium

  [ William 'jawn-smith' Wilson ]
  * Applying patch from upstream to fix a segfault caused by passing
    multiple files larger than 5kb to a gzip command while zlib
    acceleration is enabled (LP: #1901528)

 -- Brian Murray <email address hidden>  Mon, 18 Jan 2021 10:35:03 -0800

Available diffs

Superseded in hirsute-release
Obsolete in groovy-release
Deleted in groovy-proposed (Reason: moved to Release)
gzip (1.10-2ubuntu1) groovy; urgency=medium

  * Merge from Debian unstable
    - Remaining changes:
      * Cherrypick upstream patches for optimizied s390x zlib compression
        and enable it
    - Dropped changes:
      * Build-depend on binutils (>= 2.33.1-6ubuntu1)
      * Pass -fstack-protector to mingw build to fix FTBFS

Available diffs

Obsolete in eoan-updates
Deleted in eoan-proposed (Reason: moved to -updates)
gzip (1.10-0ubuntu3.1) eoan; urgency=high

  * Rebuild with binutils 2.33-2ubuntu1.1 (LP: #1843479)
    - Build-depend on binutils (>= 2.33-2ubuntu1.1)

 -- Balint Reczey <email address hidden>  Fri, 13 Dec 2019 16:41:46 +0100

Available diffs

Superseded in groovy-release
Published in focal-release
Deleted in focal-proposed (Reason: moved to Release)
gzip (1.10-0ubuntu4) focal; urgency=high

  * Rebuild with binutils 2.33.1-6ubuntu1 (LP: #1843479)
    - Build-depend on binutils (>= 2.33.1-6ubuntu1)
  * Pass -fstack-protector to mingw build to fix FTBFS

 -- Balint Reczey <email address hidden>  Fri, 13 Dec 2019 16:41:46 +0100

Available diffs

Superseded in focal-release
Obsolete in eoan-release
Deleted in eoan-proposed (Reason: moved to release)
gzip (1.10-0ubuntu3) eoan; urgency=medium

  * Fix typpo in enabling optimized s390x zlib compression. LP: #1841052

 -- Dimitri John Ledkov <email address hidden>  Fri, 23 Aug 2019 10:24:50 +0100

Available diffs

Superseded in eoan-release
Deleted in eoan-proposed (Reason: moved to release)
gzip (1.10-0ubuntu2) eoan; urgency=medium

  * Cherrypick gnu debbugs fixes for optimizied s390x zlib
    compression. LP: #1839123

 -- Dimitri John Ledkov <email address hidden>  Mon, 12 Aug 2019 12:08:24 +0100

Available diffs

Superseded in eoan-release
Deleted in eoan-proposed (Reason: moved to release)
gzip (1.10-0ubuntu1) eoan; urgency=medium

  * New upstream release
  * Cherrypick upstream patches for optimizied s390x zlib compression and
    enable it LP: #1825350

 -- Dimitri John Ledkov <email address hidden>  Tue, 30 Apr 2019 14:19:45 +0100

Available diffs

Superseded in eoan-release
Obsolete in disco-release
Deleted in disco-proposed (Reason: moved to release)
gzip (1.9-3) unstable; urgency=medium

  * move canonical packaging repo to salsa.debian.org
  * merge two existing NMUs
  * deliver NEWS file, closes: #908507

 -- Bdale Garbee <email address hidden>  Sat, 05 Jan 2019 16:03:32 -0700

Available diffs

Superseded in disco-release
Obsolete in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
gzip (1.6-5ubuntu2) cosmic; urgency=medium

  * debian/patches/adjust_glibc_libio_h_removal.patch: fix FTBFS caused by
    glibc's removal of libio.h.

 -- Mathieu Trudel-Lapierre <email address hidden>  Fri, 12 Oct 2018 15:46:05 -0400

Available diffs

Superseded in cosmic-release
Published in bionic-release
Obsolete in artful-release
Deleted in artful-proposed (Reason: moved to release)
gzip (1.6-5ubuntu1) artful; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - Added autopkgtest tests
  * Dropped changes:
    - restore mingw build, since dependencies in universe are now allowed.

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
gzip (1.6-4ubuntu2) artful; urgency=medium

  * No-change rebuild to pick up -fPIE compiler default in static
    libraries

 -- Steve Langasek <email address hidden>  Fri, 21 Apr 2017 20:49:13 +0000

Available diffs

Superseded in artful-release
Obsolete in zesty-release
Obsolete in yakkety-release
Published in xenial-release
Obsolete in wily-release
Obsolete in vivid-release
Deleted in vivid-proposed (Reason: moved to release)
gzip (1.6-4ubuntu1) vivid; urgency=medium

  * Merge from Debian unstable (lp: #1385793).  Remaining changes:
    - debian/{control,rules}: Remove the Win32 build and mingw64
      build-dependency, since mingw is in universe, and will remain so for
      the forseeable future.
    - Added autopkgtest tests

Available diffs

Superseded in vivid-release
Obsolete in utopic-release
Published in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
gzip (1.6-3ubuntu1) trusty; urgency=low

  * Merge from Debian unstable (lp: #1264431).  Remaining changes:
    - debian/{control,rules}: Remove the Win32 build and mingw64
      build-dependency, since mingw is in universe, and will remain so for
      the forseeable future.
    - Added autopkgtest tests

Available diffs

Superseded in trusty-release
Obsolete in saucy-release
Deleted in saucy-proposed (Reason: moved to release)
gzip (1.6-2ubuntu1) saucy; urgency=low

  * Merge from Debian unstable, remaining changes:
    - debian/{control,rules}: Remove the Win32 build and mingw64
      build-dependency, since mingw is in universe, and will remain so for
      the forseeable future.
  * Added autopkgtest tests

Available diffs

Superseded in saucy-release
Obsolete in raring-release
Obsolete in quantal-release
gzip (1.5-1.1ubuntu1) quantal; urgency=low

  * Merge from Debian unstable, remaining changes:
    - debian/{control,rules}: Remove the Win32 build and mingw64
      build-dependency, since mingw is in universe, and will remain so for
      the forseeable future.

Available diffs

Obsolete in oneiric-security
Obsolete in oneiric-updates
Deleted in oneiric-proposed (Reason: moved to -updates)
gzip (1.3.12-9ubuntu1.2) oneiric-proposed; urgency=low

  * clear gzip buffers between files.  Thanks to Cyril Brulebois
    <email address hidden>.  Closes: #647522, LP: #871083.
 -- Steve Langasek <email address hidden>   Fri, 10 Feb 2012 17:46:56 -0800
Superseded in quantal-release
Published in precise-release
gzip (1.4-1ubuntu2) precise; urgency=low

  * debian/patches/zeroify-buffers.diff: clear gzip buffers between
    files.  Thanks to Cyril Brulebois <email address hidden>.
    Closes: #647522, LP: #871083.
 -- Steve Langasek <email address hidden>   Wed, 08 Feb 2012 23:59:13 +0000

Available diffs

Superseded in precise-release
gzip (1.4-1ubuntu1) precise; urgency=low

  * Merge with Debian testing.  Remaining Ubuntu changes:
    - debian/{control,rules}: Remove the Win32 build and mingw64
      build-dependency, since mingw is in universe, and will remain so for
      the forseeable future.

Available diffs

Superseded in precise-release
Obsolete in oneiric-release
Obsolete in natty-release
Obsolete in lucid-updates
Obsolete in maverick-release
Deleted in lucid-proposed (Reason: moved to -updates)
gzip (1.3.12-9ubuntu1.1) lucid-proposed; urgency=low

  * Backport fix from upstream commit
    b9e94c93df914bd1d9eec9f150b2e4e00702ae7b: inflate.c (inflate_codes):
    Don't call memcpy with overlapping regions. (Closes LP #524366)
 -- Marcel Stimberg <email address hidden>   Wed, 04 Aug 2010 18:04:45 +0200
Superseded in maverick-release
Obsolete in lucid-release
gzip (1.3.12-9ubuntu1) lucid; urgency=low

  * Merge from debian testing.  Remaining changes:
    - debian/{control,rules}: Remove the Win32 build (and mingw32
      build-dependency), since mingw32 is in universe, and will remain so for
      the forseeable future.

Obsolete in dapper-updates
Obsolete in dapper-security
gzip (1.3.5-12ubuntu0.3) dapper-security; urgency=low

  * SECURITY UPDATE: denial of service or possible code execution via
    integer underflow
    - unlzw.c: prevent integer underflow.
    - Patch thanks to Jim Meyering
    - CVE-2010-0001
 -- Marc Deslauriers <email address hidden>   Tue, 19 Jan 2010 16:22:50 -0500
Obsolete in hardy-updates
Obsolete in hardy-security
gzip (1.3.12-3.2ubuntu0.1) hardy-security; urgency=low

  * SECURITY UPDATE: denial of service or possible code execution via
    missing input sanitation
    - inflate.c: avoid creating undersized hufts table.
    - http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2
    - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263
    - CVE-2009-2624
  * SECURITY UPDATE: denial of service or possible code execution via
    integer underflow
    - unlzw.c: prevent integer underflow.
    - Patch thanks to Jim Meyering
    - CVE-2010-0001
 -- Marc Deslauriers <email address hidden>   Tue, 19 Jan 2010 16:16:48 -0500
Obsolete in intrepid-updates
Obsolete in intrepid-security
gzip (1.3.12-6ubuntu2.8.10.1) intrepid-security; urgency=low

  * SECURITY UPDATE: denial of service or possible code execution via
    missing input sanitation
    - inflate.c: avoid creating undersized hufts table.
    - http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2
    - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263
    - CVE-2009-2624
  * SECURITY UPDATE: denial of service or possible code execution via
    integer underflow
    - unlzw.c: prevent integer underflow.
    - Patch thanks to Jim Meyering
    - CVE-2010-0001
 -- Marc Deslauriers <email address hidden>   Tue, 19 Jan 2010 16:15:27 -0500
Obsolete in jaunty-updates
Obsolete in jaunty-security
gzip (1.3.12-6ubuntu2.9.04.1) jaunty-security; urgency=low

  * SECURITY UPDATE: denial of service or possible code execution via
    missing input sanitation
    - inflate.c: avoid creating undersized hufts table.
    - http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2
    - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263
    - CVE-2009-2624
  * SECURITY UPDATE: denial of service or possible code execution via
    integer underflow
    - unlzw.c: prevent integer underflow.
    - Patch thanks to Jim Meyering
    - CVE-2010-0001
 -- Marc Deslauriers <email address hidden>   Tue, 19 Jan 2010 16:01:49 -0500
Obsolete in karmic-updates
Obsolete in karmic-security
gzip (1.3.12-8ubuntu1.1) karmic-security; urgency=low

  * SECURITY UPDATE: denial of service or possible code execution via
    integer underflow
    - unlzw.c: prevent integer underflow.
    - Patch thanks to Jim Meyering
    - CVE-2010-0001
 -- Marc Deslauriers <email address hidden>   Tue, 19 Jan 2010 15:54:27 -0500
Superseded in lucid-release
Obsolete in karmic-release
gzip (1.3.12-8ubuntu1) karmic; urgency=low

  * Merge with Debian; remaining Ubuntu changes:
    - debian/{control,rules}: Remove the Win32 build (and mingw32
      build-dependency), since mingw32 is in universe, and will remain so for
      the forseeable future.

Superseded in karmic-release
Obsolete in jaunty-release
Superseded in jaunty-release
Obsolete in intrepid-release
gzip (1.3.12-6ubuntu2) intrepid; urgency=low

  * debian/rules: Fix installation path for man and info pages. Thanks to
    Martijn van de Streek for the patch! (LP: #281825)

 -- Martin Pitt <email address hidden>   Wed, 15 Oct 2008 09:23:31 +0200

Available diffs

Superseded in intrepid-release
gzip (1.3.12-6ubuntu1) intrepid; urgency=low

  * Remove the Win32 build (and mingw32 build-dependency), since mingw32
    is in universe, and will remain so for the forseeable future.

 -- Adam Conrad <email address hidden>   Fri, 04 Jul 2008 12:18:01 -0600

Available diffs

Superseded in dapper-updates
Deleted in dapper-proposed (Reason: moved to -updates)
gzip (1.3.5-12ubuntu0.2) dapper-proposed; urgency=low

  * gzip.c: Remove the input file after successfully closing the output file.
    Before, copy_stat() removed the output file already, and close() was
    called afterwards. However, close() can fail on network file systems, and
    thus you would previously end up with a deleted input file and no output
    file. Patch backported from version 1.3.12-1 (applied in Edgy and later).
    (LP: #69510)

 -- Martin Pitt <email address hidden>   Tue,  6 May 2008 12:40:06 +0200
Superseded in intrepid-release
gzip (1.3.12-6) unstable; urgency=low

  * strip the win32 gzip.exe binary during install, closes: #464455
  * patch from Reuben Thomas for the zless.1 man page with pointers to 
    lessfile and lesspipe, which are a better solution than zless in most
    cases... closes: #46787, #51162
  * fix FTBFS when using gcc-4.3, closes: #476031
  * remove the preinst since the --assert-support-predepends check should
    no longer be necessary

Superseded in intrepid-release
Obsolete in hardy-release
gzip (1.3.12-3.2) unstable; urgency=low

  * Non-maintainer upload.
  * Stop zdiff from dropping cmp's output. Patch thanks to Jorg-Volker Peetz
    (Closes: Bug#434275)

Superseded in hardy-release
Obsolete in gutsy-release
gzip (1.3.12-2ubuntu1) gutsy; urgency=low

  * Globally rename futimens to gz_futimens, so it doesn't clash with
    the new glibc-2.6 symbol of the same name, causing build failures.

 -- Adam Conrad <email address hidden>   Mon, 30 Jul 2007 18:01:45 +1000
Superseded in gutsy-release
gzip (1.3.12-2) unstable; urgency=low

  * fix typo in gzip fprintf, closes: #426965
  * revert my zgrep.in patch since upstream handles alternates differently now

Superseded in gutsy-release
Obsolete in feisty-release
gzip (1.3.9-2) unstable; urgency=low

  * change direntry ordering in gzip.texi to work around bug in install-info,
    closes: #404048

Superseded in feisty-release
gzip (1.3.5-15) unstable; urgency=high

  * security update, covering the following alerts:
    CVE-2006-4334 CVE-2006-4335 CVE-2006-4336 CVE-2006-4337 CVE-2006-4338

 -- Martin Pitt <email address hidden>   Tue,  14 Nov 2006 23:10:18 +0000
Obsolete in hoary-security
gzip (1.3.5-9ubuntu3.5) hoary-security; urgency=low

  * SECURITY UPDATE: Arbitrary code execution or DoS with specially crafted
    gzipped/compress'ed files. Tavis Ormandy did a comprehensive security
    review, applied his patch to fix the following issues:
  * NULL Dereference [CVE-2006-4334].
  * Buffer overflows in LZH uncompressor's make_table() [CVE-2006-4335,
    CVE-2006-4337].
  * Buffer underflow in gzip unpacker's build_tree() [CVE-2006-4336].
  * Infinite loop in LZH uncompressor [CVE-2006-4338].

 -- Martin Pitt <email address hidden>   Thu, 14 Sep 2006 12:35:29 +0000
Superseded in dapper-updates
Superseded in dapper-security
gzip (1.3.5-12ubuntu0.1) dapper-security; urgency=low

  * SECURITY UPDATE: Arbitrary code execution or DoS with specially crafted
    gzipped/compress'ed files. Tavis Ormandy did a comprehensive security
    review, applied his patch to fix the following issues:
  * NULL Dereference [CVE-2006-4334].
  * Buffer overflows in LZH uncompressor's make_table() [CVE-2006-4335,
    CVE-2006-4337].
  * Buffer underflow in gzip unpacker's build_tree() [CVE-2006-4336].
  * Infinite loop in LZH uncompressor [CVE-2006-4338].

 -- Martin Pitt <email address hidden>   Thu, 14 Sep 2006 12:10:04 +0000
Obsolete in breezy-security
gzip (1.3.5-11ubuntu2.1) breezy-security; urgency=low

  * SECURITY UPDATE: Arbitrary code execution or DoS with specially crafted
    gzipped/compress'ed files. Tavis Ormandy did a comprehensive security
    review, applied his patch to fix the following issues:
  * NULL Dereference [CVE-2006-4334].
  * Buffer overflows in LZH uncompressor's make_table() [CVE-2006-4335,
    CVE-2006-4337].
  * Buffer underflow in gzip unpacker's build_tree() [CVE-2006-4336].
  * Infinite loop in LZH uncompressor [CVE-2006-4338].

 -- Martin Pitt <email address hidden>   Thu, 14 Sep 2006 12:31:01 +0000
Superseded in feisty-release
Obsolete in edgy-release
gzip (1.3.5-14ubuntu1) edgy; urgency=low

  * SECURITY UPDATE: Arbitrary code execution or DoS with specially crafted
    gzipped/compress'ed files. Tavis Ormandy did a comprehensive security
    review, applied his patch to fix the following issues:
  * NULL Dereference [CVE-2006-4334].
  * Buffer overflows in LZH uncompressor's make_table() [CVE-2006-4335,
    CVE-2006-4337].
  * Buffer underflow in gzip unpacker's build_tree() [CVE-2006-4336].
  * Infinite loop in LZH uncompressor [CVE-2006-4338].

 -- Martin Pitt <email address hidden>   Thu, 14 Sep 2006 13:45:18 +0200
Superseded in edgy-release
gzip (1.3.5-14) unstable; urgency=medium

  * update section to match override
  * patch from Matthew Chapman to avoid deleting input file before we're
    sure the output file has been written without errors, closes: #366660
  * patch from Reuben Thomas to fix zgrep return code, 
    closes: #292896, #192891, #190442
  * enable gzexe compressed files to work on systems where tempfile is not
    available while retaining preference for tempfile, closes: #334540

 -- Ubuntu Archive Auto-Sync <email address hidden>   Thu,  22 Jun 2006 08:21:10 +0100
Superseded in edgy-release
gzip (1.3.5-13) unstable; urgency=low

  * patch from Reuben Thomas fixes problem passing zgrep filenames starting
    with dashes, closes: #342501
  * fix a spelling error in gzip man page, closes: #356011
  * document the fact that zless doesn't work with stdin, 
    closes: #320226, #345036

 -- Ubuntu Archive Auto-Sync <email address hidden>   Thu,  15 Jun 2006 14:18:58 +0100
Superseded in edgy-release
Obsolete in dapper-release
Superseded in dapper-release
gzip (1.3.5-12) unstable; urgency=low


  * merge patch from Matt Zimmerman for futex hang due to improper signal
    handling, closes: #310053, #315612
  * merge patch to add --rsyncable to the man page, closes: #289616, #295721
  * don't return failing result code on harmless warning, closes: #169669

 -- Bdale Garbee <email address hidden>  Mon, 11 Jul 2005 22:10:51 +0300
Obsolete in breezy-release
gzip (1.3.5-11ubuntu2) breezy; urgency=low


  * no-change upload to fix erroneous /usr/share/info/dir.gz on hppa

 -- LaMont Jones <email address hidden>  Fri,  8 Jul 2005 12:34:59 -0600
Superseded in hoary-security
gzip (1.3.5-9ubuntu3.4) hoary-security; urgency=low


  *  Increment version number for hoary-security.

 -- Martin Pitt <email address hidden>  Mon,  1 Aug 2005 10:00:10 +0000
Obsolete in warty-security
gzip (1.3.5-9ubuntu3.3) warty-security; urgency=low


  * SECURITY UPDATE: Input sanitizing in zgrep.
  * zgrep.in: Escape shell characters properly.
  * References:
    CAN-2005-0758

 -- Martin Pitt <email address hidden>  Mon,  1 Aug 2005 09:58:29 +0000
Obsolete in hoary-release
Obsolete in warty-release
gzip (1.3.5-9ubuntu3) warty; urgency=low


  * Acutually use the abort_gzip_signal routine created in -9ubuntu2
    (really Closes: Ubuntu#1854)

 -- Matt Zimmerman <email address hidden>  Wed, 13 Oct 2004 08:15:48 -0700
160 of 60 results