drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Überschreiben von Dateien in pigz
Name: |
Überschreiben von Dateien in pigz |
|
ID: |
FEDORA-2015-1510 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 20 |
|
Datum: |
So, 15. Februar 2015, 11:31 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1191 |
|
Applikationen: |
pigz |
|
Originalnachricht |
Name : pigz Product : Fedora 20 Version : 2.3.3 Release : 1.fc20 URL : http://www.zlib.net/pigz/ Summary : Parallel implementation of gzip Description : pigz, which stands for parallel implementation of gzip, is a fully functional replacement for gzip that exploits multiple processors and multiple cores to the hilt when compressing data.
------------------------------------------------------------------------------- - Update Information:
Update to 2.3.3, fixes CVE-2015-1191:
- Return zero exit code when only warnings are issued
- Increase speed of unlzw (Unix compress decompression)
- Update zopfli to current google state
- Allow larger maximum blocksize (-b), now 512 MiB
- Do not require that -d precede -N, -n, -T options
- Strip any path from header name for -dN or -dNT
- Remove use of PATH_MAX (PATH_MAX is not reliable)
- Do not abort on inflate data error, do remaining files
- Check gzip header CRC if present
- Improve decompression error detection and reporting ------------------------------------------------------------------------------- - ChangeLog:
* Fri Jan 30 2015 Orion Poplawski <orion@cora.nwra.com> - 2.3.3-1 - Update to 2.3.3, fixes CVE-2015-1191 (bug #1181045) * Sun Aug 17 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.3.1-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild * Sat Jun 7 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.3.1-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild * Mon May 19 2014 Adel Gadllah <adel.gadllah@gmail.com> - 2.3.1-1 - Update to 2.3.1 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1181045 - CVE-2015-1191 pigz: directory traversal vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=1181045 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update pigz' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|