Skip to navigation

Bug Fix Advisory gzip bug fix update

Advisory: RHBA-2011:0976-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated gzip package that fixes two bugs is now available for Red Hat
Enterprise Linux 5.

The gzip package provides the GNU gzip data compression program.

This update fixes the following bugs:

* Previously, an automatic attempt to close the standard output (stdout) stream
could under certain circumstances fail. However, the gzip utility did not check
if the final stdout close was successful. Due to this issue, the gzip utility
could cause silent data loss while it returned a zero exit status, indicating
success. This update closes the stdin and stdout streams carefully at exit time.
Now, a non-zero exit status is returned if there are any problems while closing
the stdin or stdout streams. (BZ#514562)

* Previously, the gzip(1) man page contained a typographic error. This update
corrects this error. Now, the manual page is typographically correct.
(BZ#675464)

Users of gzip are advised to upgrade to this updated package, which fixes these
bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259/

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
gzip-1.3.5-13.el5.src.rpm     MD5: 93a6dcf8526f36a5693c30bec0f5831b
SHA-256: fb494800cd64ce21ab794869378b25aeac9051cabfeac4a8f7100849fe29520b
 
IA-32:
gzip-1.3.5-13.el5.i386.rpm     MD5: cd9115a640c85c11144d4c251bbd5318
SHA-256: ff657f55c0ee71b62969e5f7b880911a26063ccfc11613b0a3ae0bdcdc39a5e1
 
IA-64:
gzip-1.3.5-13.el5.ia64.rpm     MD5: 7e5b28623f3e082655936e0ab2f76136
SHA-256: 734641a11138c74515c3dfedccbc291c83b1fd6d14db15025a3c5bd24dd8fa69
 
PPC:
gzip-1.3.5-13.el5.ppc.rpm     MD5: ee604601534e9ed47d352ddec167e686
SHA-256: b5e90149f9ab263e336a723d470ace82f8eed98a3ecb226e46d20e361d74e842
 
s390x:
gzip-1.3.5-13.el5.s390x.rpm     MD5: 3fd3562d0ad6c988a591782476b34ba3
SHA-256: 42bf066913cdc23a41f4be2bac6701117282c5bf908c5f1cb4fc294abfb4d9f1
 
x86_64:
gzip-1.3.5-13.el5.x86_64.rpm     MD5: fe161de638df1c3b87faceb70465d77c
SHA-256: f0ad4c069d96ea1495b4e1612267a64a485349c26096ea6ea4550dd9c01abec5
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
gzip-1.3.5-13.el5.src.rpm     MD5: 93a6dcf8526f36a5693c30bec0f5831b
SHA-256: fb494800cd64ce21ab794869378b25aeac9051cabfeac4a8f7100849fe29520b
 
IA-32:
gzip-1.3.5-13.el5.i386.rpm     MD5: cd9115a640c85c11144d4c251bbd5318
SHA-256: ff657f55c0ee71b62969e5f7b880911a26063ccfc11613b0a3ae0bdcdc39a5e1
 
x86_64:
gzip-1.3.5-13.el5.x86_64.rpm     MD5: fe161de638df1c3b87faceb70465d77c
SHA-256: f0ad4c069d96ea1495b4e1612267a64a485349c26096ea6ea4550dd9c01abec5
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

514562 - gzip: silent data loss e.g., on NFS, due to unchecked close of stdout
675464 - gzip(1) manpage fix



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/