Package: gzip / 1.10-4+deb11u1
Metadata
| Package | Version | Patches format |
|---|---|---|
| gzip | 1.10-4+deb11u1 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| sigpipe.diff | (download) |
gzip.c |
4 4 + 0 - 0 ! |
--- |
| gzip_reproducible_build.diff | (download) |
doc/gzip.texi |
2 1 + 1 - 0 ! |
--- |
| zgrep syntax error.diff | (download) |
zgrep.in |
2 1 + 1 - 0 ! |
--- |
| disable Werror.patch | (download) |
configure.ac |
2 1 + 1 - 0 ! |
--- |
| gzexe fix count of lines to skip.patch | (download) |
gzexe.in |
2 1 + 1 - 0 ! |
[patch] gzexe: fix count of lines to skip Problem reported by Jakub Martisko (Bug#35002). * gzexe.in (skip): Bump from 44 to 49. |
| skip out of range timestamp test mips64el.patch | (download) |
tests/timestamp |
2 2 + 0 - 0 ! |
--- |
| CVE 2022 1271.patch | (download) |
gzexe.in |
9 5 + 4 - 0 ! |
fix arbitrary-file-write vulnerability (cve-2022-1271) Backported from gzip version 1.12: . * zgrep.in: The issue with the old code is that with multiple newlines, the N-command will read the second line of input, then the s-commands will be skipped because it's not the end of the file yet, then a new sed cycle starts and the pattern space is printed and emptied. So only the last line or two get escaped. This patch makes sed read all lines into the pattern space and then do the escaping. . This vulnerability was discovered by: cleemy desu wayo working with Trend Micro Zero Day Initiative . * zgrep.in (res): When escaping the file name do not rely on GNU seds extension to POSIX with respect to s/.../\n/. Instead, use features that should also work with AIX and/or Solaris sed. This is simpler anyway, and would have prevented the recently-fixed bug. . * gzexe.in: Avoid an unnecessary invocation of grep, by using sed instead. Also, look only for at-most-3-digit numbers, for consistency with the rest of the script. . |
