libzstd (1.3.8+dfsg-3+deb10u1) buster-security; urgency=high
authorÉtienne Mollier <etienne.mollier@mailoo.org>
Mon, 1 Feb 2021 19:36:53 +0000 (19:36 +0000)
committerÉtienne Mollier <etienne.mollier@mailoo.org>
Mon, 1 Feb 2021 19:36:53 +0000 (19:36 +0000)
commit9fbe630bcf8b8088046867906279f5bf2a5abaea
tree0d6a6d36fbf75b0f8e18aac2cc3fe8d9b8cf3de2
parent5cb088232995057bb38cd817a95c0b03140fe6da
parent6d1c76073230d53289bb73f3c4566b2c68dec93c
libzstd (1.3.8+dfsg-3+deb10u1) buster-security; urgency=high

  * Team upload.
  * When a file with restricted permissions is compressed, the resulting file
    inherits the umask of the user for the time of the compression.  This will
    usually lead to surprising and too relaxed permissions.  This update adds
    fix-file-permissions-on-compression.patch to make sure the compressed file
    is not group or world readable for the duration of the compression.
Closes: #981404
[dgit import unpatched libzstd 1.3.8+dfsg-3+deb10u1]
24 files changed:
debian/README.Debian
debian/README.source
debian/changelog
debian/compat
debian/control
debian/copyright
debian/libzstd-dev.examples
debian/libzstd1.symbols
debian/patches/0006-Use-bash-for-test-script-portablitity.patch
debian/patches/0008-Address-embedded-zlib.patch
debian/patches/0013-skip-memory-greedy-tests.patch
debian/patches/0014-Reproducible-build.patch
debian/patches/0015-Skip-dev-random-tests-on-hurd.patch
debian/patches/0016-fix-zstdgrep-exit-code.patch
debian/patches/fix-file-permissions-on-compression.patch
debian/patches/series
debian/rules
debian/source/format
debian/tests/control
debian/watch
debian/zstd.docs
debian/zstd.install
debian/zstd.lintian-overrides
debian/zstd.manpages