You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa unzip

Sigurnosni nedostaci programskog paketa unzip

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-1993
2015-02-14 23:23:37
——————————————————————————–

Name : unzip
Product : Fedora 20
Version : 6.0
Release : 17.fc20
URL : http://www.info-zip.org/UnZip.html
Summary : A utility for unpacking zip files
Description :
The unzip utility is used to list, test, or extract files from a zip
archive. Zip archives are commonly found on MS-DOS systems. The zip
utility, included in the zip package, creates zip archives. Zip and
unzip are both compatible with archives created by PKWARE(R)’s PKZIP
for MS-DOS, but the programs’ options and default behaviors do differ
in some respects.

Install the unzip package if you need to list, test or extract files from
a zip archive.

——————————————————————————–
Update Information:

– Fix CVE-2014-8139 – CRC32 verification heap-based buffer overread (#1174844)

– Fix CVE-2014-8140 – out-of-bounds write issue in test_compr_eb() (#1174851)

– Fix CVE-2014-8141 – getZip64Data() out-of-bounds read issues (#1174856)

– Fix buffer overflow on long file sizes (#1191136)

– CVE-2014-9636 unzip: out-of-bounds read/write in test_compr_eb() in extract.c – re-fix (see https://bugzilla.redhat.com/show_bug.cgi?id=1184985#c7)
– Fix CVE-2014-8139 – CRC32 verification heap-based buffer overread (#1174844)

– Fix CVE-2014-8140 – out-of-bounds write issue in test_compr_eb() (#1174851)

– Fix CVE-2014-8141 – getZip64Data() out-of-bounds read issues (#1174856)

– Fix buffer overflow on long file sizes (#1191136)

– Fix CVE-2014-8139 – CRC32 verification heap-based buffer overread (#1174844)

– Fix CVE-2014-8140 – out-of-bounds write issue in test_compr_eb() (#1174851)

– Fix CVE-2014-8141 – getZip64Data() out-of-bounds read issues (#1174856)

– Fix buffer overflow on long file sizes (#1191136)

——————————————————————————–
ChangeLog:

* Wed Feb 11 2015 Petr Stodulka <pstodulk@redhat.com> – 6.0-17
– re-patch CVE-2014-9636 – original patch was incorrect (#1184986)
* Tue Feb 10 2015 Petr Stodulka <pstodulk@redhat.com> – 6.0-16
– Fix CVE-2014-8139 – CRC32 verification heap-based buffer overread
(#1174844)
– Fix CVE-2014-8140 – out-of-bounds write issue in test_compr_eb()
(#1174851)
– Fix CVE-2014-8141 – getZip64Data() out-of-bounds read issues
(#1174856)
– Fix buffer overflow on long file sizes
(#1191136)
* Mon Jan 26 2015 Petr Stodulka <pstodulk@redhat.com> – 6.0-15
– Fix security bug – CVE-2014-9636
* Thu Nov 27 2014 Petr Stodulka <pstodulk@redhat.com> – 6.0-14
– Fix unitialized reads (#558738)
– Fix fix broken -X option – never worked before. Added -DIZ_HAVE_UXUIDGID
option for compilation.
(#935202)
* Thu Nov 6 2014 Petr Stodulka <pstodulk@redhat.com> – 6.0-13
– Fix producing of incorrect output due to memcpy overlapping
by added option -D NOMEMCPY to compile section.
(#1153388)
——————————————————————————–
References:

[ 1 ] Bug #1174844 – CVE-2014-8139 unzip: CRC32 verification heap-based buffer overread (oCERT-2014-011)
https://bugzilla.redhat.com/show_bug.cgi?id=1174844
[ 2 ] Bug #1174851 – CVE-2014-8140 unzip: out-of-bounds write issue in test_compr_eb() (oCERT-2014-011)
https://bugzilla.redhat.com/show_bug.cgi?id=1174851
[ 3 ] Bug #1174856 – CVE-2014-8141 unzip: getZip64Data() out-of-bounds read issues (oCERT-2014-011)
https://bugzilla.redhat.com/show_bug.cgi?id=1174856
[ 4 ] Bug #1184985 – CVE-2014-9636 unzip: out-of-bounds read/write in test_compr_eb() in extract.c
https://bugzilla.redhat.com/show_bug.cgi?id=1184985
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update unzip’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2015-02-0020-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa php

Otkriveni su sigurnosni nedostaci u programskom paketu php za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog koda...

Close