drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in UnZip
Name: |
Mehrere Probleme in UnZip |
|
ID: |
FEDORA-2015-1993 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 20 |
|
Datum: |
Di, 24. Februar 2015, 07:00 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8141
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636 |
|
Applikationen: |
UnZip |
|
Originalnachricht |
Name : unzip Product : Fedora 20 Version : 6.0 Release : 17.fc20 URL : http://www.info-zip.org/UnZip.html Summary : A utility for unpacking zip files Description : The unzip utility is used to list, test, or extract files from a zip archive. Zip archives are commonly found on MS-DOS systems. The zip utility, included in the zip package, creates zip archives. Zip and unzip are both compatible with archives created by PKWARE(R)'s PKZIP for MS-DOS, but the programs' options and default behaviors do differ in some respects.
Install the unzip package if you need to list, test or extract files from a zip archive.
------------------------------------------------------------------------------- - Update Information:
- Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844)
- Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851)
- Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856)
- Fix buffer overflow on long file sizes (#1191136)
- CVE-2014-9636 unzip: out-of-bounds read/write in test_compr_eb() in extract.c - re-fix (see https://bugzilla.redhat.com/show_bug.cgi?id=1184985#c7) - Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844)
- Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851)
- Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856)
- Fix buffer overflow on long file sizes (#1191136)
- Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844)
- Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851)
- Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856)
- Fix buffer overflow on long file sizes (#1191136)
------------------------------------------------------------------------------- - ChangeLog:
* Wed Feb 11 2015 Petr Stodulka <pstodulk@redhat.com> - 6.0-17 - re-patch CVE-2014-9636 - original patch was incorrect (#1184986) * Tue Feb 10 2015 Petr Stodulka <pstodulk@redhat.com> - 6.0-16 - Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844) - Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851) - Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856) - Fix buffer overflow on long file sizes (#1191136) * Mon Jan 26 2015 Petr Stodulka <pstodulk@redhat.com> - 6.0-15 - Fix security bug - CVE-2014-9636 * Thu Nov 27 2014 Petr Stodulka <pstodulk@redhat.com> - 6.0-14 - Fix unitialized reads (#558738) - Fix fix broken -X option - never worked before. Added -DIZ_HAVE_UXUIDGID option for compilation. (#935202) * Thu Nov 6 2014 Petr Stodulka <pstodulk@redhat.com> - 6.0-13 - Fix producing of incorrect output due to memcpy overlapping by added option -D NOMEMCPY to compile section. (#1153388) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1174844 - CVE-2014-8139 unzip: CRC32 verification heap-based buffer overread (oCERT-2014-011) https://bugzilla.redhat.com/show_bug.cgi?id=1174844 [ 2 ] Bug #1174851 - CVE-2014-8140 unzip: out-of-bounds write issue in test_compr_eb() (oCERT-2014-011) https://bugzilla.redhat.com/show_bug.cgi?id=1174851 [ 3 ] Bug #1174856 - CVE-2014-8141 unzip: getZip64Data() out-of-bounds read issues (oCERT-2014-011) https://bugzilla.redhat.com/show_bug.cgi?id=1174856 [ 4 ] Bug #1184985 - CVE-2014-9636 unzip: out-of-bounds read/write in test_compr_eb() in extract.c https://bugzilla.redhat.com/show_bug.cgi?id=1184985 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update unzip' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|