Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in cpio
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in cpio
ID: FEDORA-2014-16168
Distribution: Fedora
Plattformen: Fedora 21
Datum: Do, 18. Dezember 2014, 07:38
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112
Applikationen: GNU cpio

Originalnachricht

Name        : cpio
Product : Fedora 21
Version : 2.11
Release : 33.fc21
URL : http://www.gnu.org/software/cpio/
Summary : A GNU archiving program
Description :
GNU cpio copies files into or out of a cpio or tar archive. Archives
are files which contain a collection of other files plus information
about them, such as their file name, owner, timestamps, and access
permissions. The archive can be another file on the disk, a magnetic
tape, or a pipe. GNU cpio supports the following archive formats: binary,
old ASCII, new ASCII, crc, HPUX binary, HPUX old ASCII, old tar and POSIX.1
tar. By default, cpio creates binary format archives, so that they are
compatible with older cpio programs. When it is extracting files from
archives, cpio automatically recognizes which kind of archive it is reading
and can read archives created on machines with a different byte-order.

Install cpio if you need a program to manage file archives.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2014-9112 (#1167573)
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Dec 3 2014 Pavel Raiskup <praiskup@redhat.com> - 2.11-33
- the stored archive in testsuite has little endian headers, expect also
'reversed byte-order' warning on big-endian
* Wed Dec 3 2014 Pavel Raiskup <praiskup@redhat.com> - 2.11-32
- adjust the testsuite fix for CVE-2014-9112 (#1167573)
- put the testsuite.log to standard output if make check fails
* Tue Dec 2 2014 Pavel Raiskup <praiskup@redhat.com> - 2.11-31
- fix for CVE-2014-9112 (#1167573)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1167571 - CVE-2014-9112 cpio: heap-based buffer overflow flaw in
list_file()
https://bugzilla.redhat.com/show_bug.cgi?id=1167571
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update cpio' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung