Accepting request 30400 from Base:System
Copy from Base:System/gzip based on submit request 30400 from user mseben OBS-URL: https://build.opensuse.org/request/show/30400 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/gzip?expand=0&rev=13
This commit is contained in:
committed by
Git OBS Bridge
parent
89554c6fe1
commit
c7c6ba1ff6
24
gzip.changes
24
gzip.changes
@@ -1,3 +1,27 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Jan 19 15:26:41 UTC 2010 - mseben@novell.com
|
||||
|
||||
- updated to 1.3.13
|
||||
- gzip interprets an argument of "-" as indicating stdin, but when
|
||||
"-" is not the first name on the command line, it doesn't work.
|
||||
- remove useless if-before-free tests
|
||||
- remove useless casts to avoid "make syntax-check" failures
|
||||
- avoid spurious warnings from clang
|
||||
- avoid a leak on a error path
|
||||
- don't misinterpret a failing test as successful
|
||||
- avoid creating an undersized buffer for the hufts table
|
||||
A malformed input file can cause gzip to crash with a segmentation
|
||||
violation or hang in an endless loop.
|
||||
- avoid silent data loss e.g., on NFS, due to unchecked close of stdout
|
||||
- build require automake-1.11 and produce xz-compressed tarballs, too
|
||||
- deprecated futimens.diff and CVE-2009-2624.diff
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 14 17:17:49 UTC 2010 - mseben@novell.com
|
||||
|
||||
- added gzip-CVE-2009-2624.diff and gzip-CVE-2010-0001.diff : fix
|
||||
possible denial of service and arbitrary code execution
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sun Dec 6 18:57:34 CET 2009 - jengelh@medozas.de
|
||||
|
||||
|
Reference in New Issue
Block a user