Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in UnZip
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in UnZip
ID: FEDORA-2015-2035
Distribution: Fedora
Plattformen: Fedora 21
Datum: Mo, 16. Februar 2015, 08:27
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8141
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636

Originalnachricht

Name        : unzip
Product : Fedora 21
Version : 6.0
Release : 20.fc21
URL : http://www.info-zip.org/UnZip.html
Summary : A utility for unpacking zip files
Description :
The unzip utility is used to list, test, or extract files from a zip
archive. Zip archives are commonly found on MS-DOS systems. The zip
utility, included in the zip package, creates zip archives. Zip and
unzip are both compatible with archives created by PKWARE(R)'s PKZIP
for MS-DOS, but the programs' options and default behaviors do differ
in some respects.

Install the unzip package if you need to list, test or extract files from
a zip archive.

-------------------------------------------------------------------------------
-
Update Information:

- Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844)

- Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851)

- Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856)

- Fix buffer overflow on long file sizes (#1191136)

- CVE-2014-9636 unzip: out-of-bounds read/write in test_compr_eb() in extract.c - re-fix (see https://bugzilla.redhat.com/show_bug.cgi?id=1184985#c7)
- Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844)

- Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851)

- Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856)

- Fix buffer overflow on long file sizes (#1191136)

- Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844)

- Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851)

- Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856)

- Fix buffer overflow on long file sizes (#1191136)

-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Feb 11 2015 Petr Stodulka <pstodulk@redhat.com> - 6.0-20
- re-patch CVE-2014-9636 - original patch was incorrect (#1184986)
* Tue Feb 10 2015 Petr Stodulka <pstodulk@redhat.com> - 6.0-19
- Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread
(#1174844)
- Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb()
(#1174851)
- Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues
(#1174856)
- Fix buffer overflow on long file sizes
(#1191136)
* Mon Jan 26 2015 Petr Stodulka <pstodulk@redhat.com> - 6.0-18
- Fix security bug - CVE-2014-9636
* Thu Nov 27 2014 Petr Stodulka<pstodulk@redhat.com> - 6.0-17
- Fix unitialized reads (#558738)
- Fix fix broken -X option - never worked before. Added -DIZ_HAVE_UXUIDGID
option for compilation.
(#935202)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1174844 - CVE-2014-8139 unzip: CRC32 verification heap-based
buffer overread (oCERT-2014-011)
https://bugzilla.redhat.com/show_bug.cgi?id=1174844
[ 2 ] Bug #1174851 - CVE-2014-8140 unzip: out-of-bounds write issue in
test_compr_eb() (oCERT-2014-011)
https://bugzilla.redhat.com/show_bug.cgi?id=1174851
[ 3 ] Bug #1174856 - CVE-2014-8141 unzip: getZip64Data() out-of-bounds read
issues (oCERT-2014-011)
https://bugzilla.redhat.com/show_bug.cgi?id=1174856
[ 4 ] Bug #1184985 - CVE-2014-9636 unzip: out-of-bounds read/write in
test_compr_eb() in extract.c
https://bugzilla.redhat.com/show_bug.cgi?id=1184985
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update unzip' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung