Package: gzip / 1.9-3+deb10u1
Metadata
| Package | Version | Patches format |
|---|---|---|
| gzip | 1.9-3+deb10u1 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| sigpipe.diff | (download) |
gzip.c |
4 4 + 0 - 0 ! |
--- |
| gzip_reproducible_build.diff | (download) |
doc/gzip.texi |
2 1 + 1 - 0 ! |
--- |
| zgrep syntax error.diff | (download) |
zgrep.in |
2 1 + 1 - 0 ! |
--- |
| 0001 gzip port better to mingw.patch | (download) |
gzip.c |
7 5 + 2 - 0 ! |
[patch] gzip: port better to mingw Problem reported by Bdale Garbee for Debian * gzip.c (do_chown): Don't assume uid_t and gid_t. |
| 0001 gzip port better to mingw again.patch | (download) |
gzip.c |
2 1 + 1 - 0 ! |
[patch] gzip: port better to mingw again Problem reported by Bdale Garbee (Bug#32305#8). * gzip.c (do_chown): Use HAVE_FCHOWN || HAVE_CHOWN, which is configured, instead of DO_CHOWN, which is not. |
| gnulib 4af4a4a71827c0bc5.patch | (download) |
lib/fflush.c |
6 3 + 3 - 0 ! |
fflush: adjust to glibc 2.28 libio.h removal MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Problem reported by Daniel P. Berrang in: https://lists.gnu.org/r/bug-gnulib/2018-03/msg00000.html * lib/fbufmode.c (fbufmode): * lib/fflush.c (clear_ungetc_buffer_preserving_position) (disable_seek_optimization, rpl_fflush): * lib/fpending.c (__fpending): * lib/fpurge.c (fpurge): * lib/freadable.c (freadable): * lib/freadahead.c (freadahead): * lib/freading.c (freading): * lib/freadptr.c (freadptr): * lib/freadseek.c (freadptrinc): * lib/fseeko.c (fseeko): * lib/fseterr.c (fseterr): * lib/fwritable.c (fwritable): * lib/fwriting.c (fwriting): Check _IO_EOF_SEEN instead of _IO_ftrylockfile. * lib/stdio-impl.h (_IO_IN_BACKUP) [_IO_EOF_SEEN]: Define if not already defined. |
| disable broken Wabi.patch | (download) |
m4/manywarnings.m4 |
1 0 + 1 - 0 ! |
--- |
| disable Werror.patch | (download) |
configure.ac |
2 1 + 1 - 0 ! |
--- |
| CVE 2022 1271.patch | (download) |
gzexe.in |
9 5 + 4 - 0 ! |
fix arbitrary-file-write vulnerability (cve-2022-1271) Backported from gzip version 1.12: . * zgrep.in: The issue with the old code is that with multiple newlines, the N-command will read the second line of input, then the s-commands will be skipped because it's not the end of the file yet, then a new sed cycle starts and the pattern space is printed and emptied. So only the last line or two get escaped. This patch makes sed read all lines into the pattern space and then do the escaping. . This vulnerability was discovered by: cleemy desu wayo working with Trend Micro Zero Day Initiative . * zgrep.in (res): When escaping the file name do not rely on GNU seds extension to POSIX with respect to s/.../\n/. Instead, use features that should also work with AIX and/or Solaris sed. This is simpler anyway, and would have prevented the recently-fixed bug. . * gzexe.in: Avoid an unnecessary invocation of grep, by using sed instead. Also, look only for at-most-3-digit numbers, for consistency with the rest of the script. . |
