You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa cpio

Sigurnosni nedostatak programskog paketa cpio

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-16168
2014-12-03 05:43:16
——————————————————————————–

Name : cpio
Product : Fedora 21
Version : 2.11
Release : 33.fc21
URL : http://www.gnu.org/software/cpio/
Summary : A GNU archiving program
Description :
GNU cpio copies files into or out of a cpio or tar archive. Archives
are files which contain a collection of other files plus information
about them, such as their file name, owner, timestamps, and access
permissions. The archive can be another file on the disk, a magnetic
tape, or a pipe. GNU cpio supports the following archive formats: binary,
old ASCII, new ASCII, crc, HPUX binary, HPUX old ASCII, old tar and POSIX.1
tar. By default, cpio creates binary format archives, so that they are
compatible with older cpio programs. When it is extracting files from
archives, cpio automatically recognizes which kind of archive it is reading
and can read archives created on machines with a different byte-order.

Install cpio if you need a program to manage file archives.

——————————————————————————–
Update Information:

Security fix for CVE-2014-9112 (#1167573)
——————————————————————————–
ChangeLog:

* Wed Dec 3 2014 Pavel Raiskup <praiskup@redhat.com> – 2.11-33
– the stored archive in testsuite has little endian headers, expect also
‘reversed byte-order’ warning on big-endian
* Wed Dec 3 2014 Pavel Raiskup <praiskup@redhat.com> – 2.11-32
– adjust the testsuite fix for CVE-2014-9112 (#1167573)
– put the testsuite.log to standard output if make check fails
* Tue Dec 2 2014 Pavel Raiskup <praiskup@redhat.com> – 2.11-31
– fix for CVE-2014-9112 (#1167573)
——————————————————————————–
References:

[ 1 ] Bug #1167571 – CVE-2014-9112 cpio: heap-based buffer overflow flaw in list_file()
https://bugzilla.redhat.com/show_bug.cgi?id=1167571
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update cpio’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarijo Plepelic
Cert idNCERT-REF-2014-12-0011-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak u jezgri operacijskog sustava

Otkriven je sigurnosni nedostatak u jezgri (kernel-rt) operacijskog sustava Red Hat. Otkriveni nedostatak potencijalnim lokalnim napadačima omogućuje stjecanje povećanih korisničkih...

Close