Bug Fix Advisory gzip bug fix update

Advisory: RHBA-2014:0297-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2014-03-17
Last updated on: 2014-10-13
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated gzip packages that fix two bugs are now available for Red Hat Enterprise
Linux 6.

The gzip packages provide the GNU gzip data compression program.

This update fixes the following bugs:

* Previously, the "-h" option of the zgrep command was absent from the source
code of the gzip utility. As a consequence, the output of running the "zgrep -h"
command was not parsed, and the file name was printed. With this update, the
possibility to use the short "-h" option besides the "--no-filename" option has
been added. As a result, running the zgrep command with the "-h" option now
prints the correct lines and suppresses the prefixing of the file names on
output when multiple files are searched. (BZ#949820)

* Prior to this update, the time stamp of an archive was set by the futimesat()
or utime() system calls when using the gzip utility. Consequently, the archived
file had a lower time stamp than expected because only microsecond resolution
was enabled, and a nanosecond time stamp was not provided. The underlying source
code has been modified to attempt to use the utimensat() or futimens() system
calls for nanosecond resolution. As a result, the archived file has exactly the
same time stamp as the original file. (BZ#961810)

Users of gzip are advised to upgrade to these updated packages, which fix these
bugs.


Solution

Before applying this update, make sure all previously released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
gzip-1.3.12-22.el6.src.rpm     MD5: b3cb4efd35492834f1088456181f3c2b
SHA-256: af6f1e362e0c6da11422e9e7accea0f171e04f4f20edcadc0e311af5f887ddf6
 
IA-32:
gzip-1.3.12-22.el6.i686.rpm     MD5: 651320fa9cfe153558aaa7a9b4bbf830
SHA-256: 69b0bbe096d46451bec15f27a7e0e50db90fdad9b8dffc68870d9cfff403bb42
gzip-debuginfo-1.3.12-22.el6.i686.rpm     MD5: b7a2dbf0543275002d2a179958ab4504
SHA-256: 3c8e021a3160961647d4ee61798d54babf77eec263d7785873fc9913c77ba83f
 
x86_64:
gzip-1.3.12-22.el6.x86_64.rpm     MD5: 1dad5a4c15adc7e6bc010a98272543e3
SHA-256: a1eb7990015688dac97853b42f6cad3fefa19262a4d937685f2aa5e6131ecdf0
gzip-debuginfo-1.3.12-22.el6.x86_64.rpm     MD5: 00bb3c8122937f922f2516c90d4f52aa
SHA-256: cbe5b2d1fa30af301e9759cb78489a7c93b454d71bb9149a54a277d43ce1756f
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
gzip-1.3.12-22.el6.src.rpm     MD5: b3cb4efd35492834f1088456181f3c2b
SHA-256: af6f1e362e0c6da11422e9e7accea0f171e04f4f20edcadc0e311af5f887ddf6
 
x86_64:
gzip-1.3.12-22.el6.x86_64.rpm     MD5: 1dad5a4c15adc7e6bc010a98272543e3
SHA-256: a1eb7990015688dac97853b42f6cad3fefa19262a4d937685f2aa5e6131ecdf0
gzip-debuginfo-1.3.12-22.el6.x86_64.rpm     MD5: 00bb3c8122937f922f2516c90d4f52aa
SHA-256: cbe5b2d1fa30af301e9759cb78489a7c93b454d71bb9149a54a277d43ce1756f
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
gzip-1.3.12-22.el6.src.rpm     MD5: b3cb4efd35492834f1088456181f3c2b
SHA-256: af6f1e362e0c6da11422e9e7accea0f171e04f4f20edcadc0e311af5f887ddf6
 
IA-32:
gzip-1.3.12-22.el6.i686.rpm     MD5: 651320fa9cfe153558aaa7a9b4bbf830
SHA-256: 69b0bbe096d46451bec15f27a7e0e50db90fdad9b8dffc68870d9cfff403bb42
gzip-debuginfo-1.3.12-22.el6.i686.rpm     MD5: b7a2dbf0543275002d2a179958ab4504
SHA-256: 3c8e021a3160961647d4ee61798d54babf77eec263d7785873fc9913c77ba83f
 
PPC:
gzip-1.3.12-22.el6.ppc64.rpm     MD5: 527211638a615dd93890ab6a758bcc56
SHA-256: a7e24adf54d3e521b10a1e2454ff4f8d245ad335f121b61e916680d53434a414
gzip-debuginfo-1.3.12-22.el6.ppc64.rpm     MD5: f440bb79d0a03c1ac31aef7a3b888107
SHA-256: 62144b6536d8c6930b5bab7cd3ccdd103562b6cce0dae47575c1d7934e8f5639
 
s390x:
gzip-1.3.12-22.el6.s390x.rpm     MD5: 3d7cc4153406a1aca9a83f9a2875476f
SHA-256: 099c6de38874aada4d3541dd6395a3b91eeecf0941e9dacb6c06c65b460e5e01
gzip-debuginfo-1.3.12-22.el6.s390x.rpm     MD5: 866e65c5ebf5612b321ce3ab29f3c939
SHA-256: 0fbc6e573a822c7ce153c77841ce133179902935f69e5e5b038e324137d4339a
 
x86_64:
gzip-1.3.12-22.el6.x86_64.rpm     MD5: 1dad5a4c15adc7e6bc010a98272543e3
SHA-256: a1eb7990015688dac97853b42f6cad3fefa19262a4d937685f2aa5e6131ecdf0
gzip-debuginfo-1.3.12-22.el6.x86_64.rpm     MD5: 00bb3c8122937f922f2516c90d4f52aa
SHA-256: cbe5b2d1fa30af301e9759cb78489a7c93b454d71bb9149a54a277d43ce1756f
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
gzip-1.3.12-22.el6.src.rpm     MD5: b3cb4efd35492834f1088456181f3c2b
SHA-256: af6f1e362e0c6da11422e9e7accea0f171e04f4f20edcadc0e311af5f887ddf6
 
IA-32:
gzip-1.3.12-22.el6.i686.rpm     MD5: 651320fa9cfe153558aaa7a9b4bbf830
SHA-256: 69b0bbe096d46451bec15f27a7e0e50db90fdad9b8dffc68870d9cfff403bb42
gzip-debuginfo-1.3.12-22.el6.i686.rpm     MD5: b7a2dbf0543275002d2a179958ab4504
SHA-256: 3c8e021a3160961647d4ee61798d54babf77eec263d7785873fc9913c77ba83f
 
x86_64:
gzip-1.3.12-22.el6.x86_64.rpm     MD5: 1dad5a4c15adc7e6bc010a98272543e3
SHA-256: a1eb7990015688dac97853b42f6cad3fefa19262a4d937685f2aa5e6131ecdf0
gzip-debuginfo-1.3.12-22.el6.x86_64.rpm     MD5: 00bb3c8122937f922f2516c90d4f52aa
SHA-256: cbe5b2d1fa30af301e9759cb78489a7c93b454d71bb9149a54a277d43ce1756f
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/