You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa pigz

Sigurnosni nedostatak programskog paketa pigz

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-1510
2015-01-31 21:11:07
——————————————————————————–

Name : pigz
Product : Fedora 20
Version : 2.3.3
Release : 1.fc20
URL : http://www.zlib.net/pigz/
Summary : Parallel implementation of gzip
Description :
pigz, which stands for parallel implementation of gzip,
is a fully functional replacement for gzip that exploits
multiple processors and multiple cores to the hilt when compressing data.

——————————————————————————–
Update Information:

Update to 2.3.3, fixes CVE-2015-1191:

– Return zero exit code when only warnings are issued
– Increase speed of unlzw (Unix compress decompression)
– Update zopfli to current google state
– Allow larger maximum blocksize (-b), now 512 MiB
– Do not require that -d precede -N, -n, -T options
– Strip any path from header name for -dN or -dNT
– Remove use of PATH_MAX (PATH_MAX is not reliable)
– Do not abort on inflate data error, do remaining files
– Check gzip header CRC if present
– Improve decompression error detection and reporting
——————————————————————————–
ChangeLog:

* Fri Jan 30 2015 Orion Poplawski <orion@cora.nwra.com> – 2.3.3-1
– Update to 2.3.3, fixes CVE-2015-1191 (bug #1181045)
* Sun Aug 17 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 2.3.1-3
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Sat Jun 7 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 2.3.1-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Mon May 19 2014 Adel Gadllah <adel.gadllah@gmail.com> – 2.3.1-1
– Update to 2.3.1
——————————————————————————–
References:

[ 1 ] Bug #1181045 – CVE-2015-1191 pigz: directory traversal vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=1181045
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update pigz’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2015-1488
2015-01-31 21:10:03
——————————————————————————–

Name : pigz
Product : Fedora 21
Version : 2.3.3
Release : 1.fc21
URL : http://www.zlib.net/pigz/
Summary : Parallel implementation of gzip
Description :
pigz, which stands for parallel implementation of gzip,
is a fully functional replacement for gzip that exploits
multiple processors and multiple cores to the hilt when compressing data.

——————————————————————————–
Update Information:

Update to 2.3.3, fixes CVE-2015-1191:

– Return zero exit code when only warnings are issued
– Increase speed of unlzw (Unix compress decompression)
– Update zopfli to current google state
– Allow larger maximum blocksize (-b), now 512 MiB
– Do not require that -d precede -N, -n, -T options
– Strip any path from header name for -dN or -dNT
– Remove use of PATH_MAX (PATH_MAX is not reliable)
– Do not abort on inflate data error, do remaining files
– Check gzip header CRC if present
– Improve decompression error detection and reporting
——————————————————————————–
ChangeLog:

* Fri Jan 30 2015 Orion Poplawski <orion@cora.nwra.com> – 2.3.3-1
– Update to 2.3.3, fixes CVE-2015-1191 (bug #1181045)
——————————————————————————–
References:

[ 1 ] Bug #1181045 – CVE-2015-1191 pigz: directory traversal vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=1181045
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update pigz’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarijo Plepelic
Cert idNCERT-REF-2015-02-0010-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa clamav

Otkriveni su sigurnosni nedostaci u programskom paketu clamav za operacijski sustav Suse. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanja...

Close