Sun, 24 Nov 2024 11:37:04 UTC | login

Information for build xz-5.4.6-3.fc41

ID305944
Package Namexz
Version5.4.6
Release3.fc41
Epoch1
Sourcegit+https://src.fedoraproject.org/rpms/xz.git#91940317881fb3fd42e1cd9453e52a62b0a4deb1
SummaryLZMA compression utilities
DescriptionXZ Utils are an attempt to make LZMA compression easy to use on free (as in freedom) operating systems. This is achieved by providing tools and libraries which are similar to use than the equivalents of the most popular existing compression algorithms. LZMA is a general purpose compression algorithm designed by Igor Pavlov as part of 7-Zip. It provides high compression ratio while keeping the decompression speed fast.
Built bydavidlt
State complete
Volume DEFAULT
StartedWed, 22 May 2024 06:27:21 UTC
CompletedWed, 22 May 2024 06:45:51 UTC
Taskbuild (f41, /rpms/xz.git:91940317881fb3fd42e1cd9453e52a62b0a4deb1)
Extra{'source': {'original_url': 'git+https://src.fedoraproject.org/rpms/xz.git#91940317881fb3fd42e1cd9453e52a62b0a4deb1'}}
Tags
f41
RPMs
src
xz-5.4.6-3.fc41.src.rpm (info) (download)
riscv64
xz-5.4.6-3.fc41.riscv64.rpm (info) (download)
xz-devel-5.4.6-3.fc41.riscv64.rpm (info) (download)
xz-libs-5.4.6-3.fc41.riscv64.rpm (info) (download)
xz-lzma-compat-5.4.6-3.fc41.riscv64.rpm (info) (download)
xz-static-5.4.6-3.fc41.riscv64.rpm (info) (download)
xz-debuginfo-5.4.6-3.fc41.riscv64.rpm (info) (download)
xz-debugsource-5.4.6-3.fc41.riscv64.rpm (info) (download)
xz-libs-debuginfo-5.4.6-3.fc41.riscv64.rpm (info) (download)
xz-lzma-compat-debuginfo-5.4.6-3.fc41.riscv64.rpm (info) (download)
Logs
riscv64
hw_info.log
state.log
build.log
root.log
mock_output.log
Changelog * Thu Mar 28 2024 Richard W.M. Jones <rjones@redhat.com> - 1:5.4.6-3 - Revert to 5.4.6, bump epoch * Sat Mar 09 2024 Richard W.M. Jones <rjones@redhat.com> - 5.6.1-1 - New version 5.6.1 (RHBZ#2267598) - Reenable ifunc as it is supposed to be fixed in 5.6.1. * Mon Mar 04 2024 Richard W.M. Jones <rjones@redhat.com> - 5.6.0-3 - --disable-ifunc (workaround for 2267598) * Thu Feb 29 2024 Adam Williamson <awilliam@redhat.com> - 5.6.0-2 - Rebuild on a side tag to create a coherent update * Tue Feb 27 2024 Jindrich Novy <jnovy@redhat.com> - 5.6.0-1 - Rebase to version 5.6.0 * Mon Jan 29 2024 Richard W.M. Jones <rjones@redhat.com> - 5.4.6-1 - New version 5.4.6 (RHBZ#2260521) - Fix Source URLs. * Sat Jan 27 2024 Fedora Release Engineering <releng@fedoraproject.org> - 5.4.5-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild * Wed Nov 01 2023 Richard W.M. Jones <rjones@redhat.com> - 5.4.5-1 - New version 5.4.5 (RHBZ#2247487) * Thu Oct 19 2023 Debarshi Ray <rishi@fedoraproject.org> - 5.4.4-2 - Mark translations of manuals with %lang() * Wed Aug 02 2023 Richard W.M. Jones <rjones@redhat.com> - 5.4.4-1 - New version 5.4.4 (RHBZ#2228542) * Sat Jul 22 2023 Fedora Release Engineering <releng@fedoraproject.org> - 5.4.3-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild * Thu May 04 2023 Richard W.M. Jones <rjones@redhat.com> - 5.4.3-1 - Rebase to version 5.4.3 (RHBZ#2179570) - Update the pubkey which appears to have changed. * Mon Apr 17 2023 Matej Mužila <mmuzila@redhat.com> - 5.4.2-1 - Rebase to version 5.4.2 (#2179570) * Mon Jan 23 2023 Richard W.M. Jones <rjones@redhat.com> - 5.4.1-1 - Rebase to version 5.4.1 (#2142405) * Sat Jan 21 2023 Fedora Release Engineering <releng@fedoraproject.org> - 5.2.9-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild * Thu Dec 01 2022 Richard W.M. Jones <rjones@redhat.com> - 5.2.9-1 - Rebase to version 5.2.9 (#2142405) * Tue Nov 22 2022 Matej Mužila <mmuzila@redhat.com> - 5.2.8-1 - Rebase to version 5.2.8 (#2142405) * Tue Aug 30 2022 Matej Mužila <mmuzila@redhat.com> - 5.2.7-1 - Rebase to version 5.2.7 (#2131313) * Tue Aug 30 2022 Matej Mužila <mmuzila@redhat.com> - 5.2.6-1 - Rebase to version 5.2.6 (#2117931) * Sat Jul 23 2022 Fedora Release Engineering <releng@fedoraproject.org> - 5.2.5-10 - Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild * Sat Apr 16 2022 Todd Zullinger <tmz@pobox.com> - 5.2.5-9 - verify upstream GPG signature - xzgrep: arbitrary-file-write vulnerability (#2073310, CVE-2022-1271)