Change logs for xz-utils source package in Focal

  • xz-utils (5.2.4-1ubuntu1.1) focal-security; urgency=medium
    
      * SECURITY UPDATE: arbitrary file overwrite or code execution with
        crafted file names
        - debian/patches/CVE-2022-1271.patch: fix escaping of malicious
          filenames in src/scripts/xzgrep.in.
        - CVE-2022-1271
    
     -- Marc Deslauriers <email address hidden>  Fri, 08 Apr 2022 08:56:10 -0400
  • xz-utils (5.2.4-1ubuntu1) focal; urgency=medium
    
      * Use the generic % rule in debian/rules, otherwise it FTBFS with
        debhelper 12.5. Closes: #945961. LP: #1870088.
    
     -- Tiago Stürmer Daitx <email address hidden>  Mon, 20 Apr 2020 21:43:24 +0000
  • xz-utils (5.2.4-1) unstable; urgency=low
    
      * New upstream release.  Closes: #851615.
      * Standards-Version: 4.3.0 (checked).
      * Use an XZ compressed tarball for upstream source.
      * Add upstream signing key and verify tarball at "uscan" time.
      * Drop patches; all were applied or otherwise fixed upstream.
      * Update copyright file.
      * debian/control:
        - Use a stable repo.or.cz URL for packaging repo.
          Closes: #826382.  Thanks to Rolf Leggewie.
        - Use https for upstream homepage URL.
        - No longer Build-Depends: freebsd-glue on kfreebsd.
      * get-orig-source: Use https for upstream Git repository.
      * liblzma:
        - Remove compatibility tricks that permit sharing a process with
          liblzma.so.2.  This means liblzma.a no longer depends on libdl
          at run time.
          Closes: #919950.  Thanks to Josh Triplett.
        - Breaks: liblzma2 versions without symbol versioning.
        - Priority: optional.
      * xz-utils:
        - Lower priority of xz-utils to standard.  Closes: #685203.
        - README.Debian: Remove notes about differences from upstream.
        - Remove old NEWS.Debian.
    
     -- Jonathan Nieder <email address hidden>  Sun, 27 Jan 2019 17:09:34 -0800