Fedora Linux 8568 Published by

A xz security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: xz-5.2.5-9.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-c69e286f8d
2022-04-21 21:21:21.120477
--------------------------------------------------------------------------------

Name : xz
Product : Fedora 35
Version : 5.2.5
Release : 9.fc35
URL :   https://tukaani.org/xz/
Summary : LZMA compression utilities
Description :
XZ Utils are an attempt to make LZMA compression easy to use on free (as in
freedom) operating systems. This is achieved by providing tools and libraries
which are similar to use than the equivalents of the most popular existing
compression algorithms.

LZMA is a general purpose compression algorithm designed by Igor Pavlov as
part of 7-Zip. It provides high compression ratio while keeping the
decompression speed fast.

--------------------------------------------------------------------------------
Update Information:

verify upstream GPG signature
--------------------------------------------------------------------------------
ChangeLog:

* Sat Apr 16 2022 Todd Zullinger - 5.2.5-9
- verify upstream GPG signature
- xzgrep: arbitrary-file-write vulnerability (#2073310, CVE-2022-1271)
* Sat Jan 22 2022 Fedora Release Engineering - 5.2.5-8
- Rebuilt for   https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-c69e286f8d' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________