Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in cpio
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in cpio
ID: FEDORA-2014-16250
Distribution: Fedora
Plattformen: Fedora 20
Datum: Di, 6. Januar 2015, 10:10
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112
Applikationen: GNU cpio

Originalnachricht

Name        : cpio
Product : Fedora 20
Version : 2.11
Release : 28.fc20
URL : http://www.gnu.org/software/cpio/
Summary : A GNU archiving program
Description :
GNU cpio copies files into or out of a cpio or tar archive. Archives
are files which contain a collection of other files plus information
about them, such as their file name, owner, timestamps, and access
permissions. The archive can be another file on the disk, a magnetic
tape, or a pipe. GNU cpio supports the following archive formats: binary,
old ASCII, new ASCII, crc, HPUX binary, HPUX old ASCII, old tar and POSIX.1
tar. By default, cpio creates binary format archives, so that they are
compatible with older cpio programs. When it is extracting files from
archives, cpio automatically recognizes which kind of archive it is reading
and can read archives created on machines with a different byte-order.

Install cpio if you need a program to manage file archives.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2014-9112 (#1167573)
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Dec 3 2014 Pavel Raiskup <praiskup@redhat.com> - 2.11-28
- the stored archive in testsuite has little endian headers, expect also
'reversed byte-order' warning on big-endian
* Wed Dec 3 2014 Pavel Raiskup <praiskup@redhat.com> - 2.11-27
- adjust the testsuite fix for CVE-2014-9112 (#1167573)
- put the testsuite.log to standard output if make check fails
* Tue Dec 2 2014 Pavel Raiskup <praiskup@redhat.com> - 2.11-26
- fix for CVE-2014-9112 (#1167573)
* Mon Apr 7 2014 Pavel Raiskup <praiskup@redhat.com> - 2.11-25
- fix manual page to warn users about inode truncation (#952313)
- fix for RU translation (#1075510)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1167571 - CVE-2014-9112 cpio: heap-based buffer overflow flaw in
list_file()
https://bugzilla.redhat.com/show_bug.cgi?id=1167571
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update cpio' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung