You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa arj

Sigurnosni nedostaci programskog paketa arj

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-5603
2015-04-05 11:04:02
——————————————————————————–

Name : arj
Product : Fedora 21
Version : 3.10.22
Release : 22.fc21
URL : http://arj.sourceforge.net/
Summary : Archiver for .arj files
Description :
This package is an open source version of the arj archiver. It has
been created with the intent to preserve maximum compatibility and
retain the feature set of original ARJ archiver as provided by ARJ
Software, Inc.

——————————————————————————–
Update Information:

– Added patch from Debian to avoid free on invalid pointer due to a buffer overflow (#1196751, #1207180)
– Added patch from Debian for symlink directory traversal (#1178824)
– Added patch from Debian to fix the directory traversal via //multiple/leading/slash (#1178824)
——————————————————————————–
ChangeLog:

* Fri Apr 3 2015 Robert Scheck <robert@fedoraproject.org> 3.10.22-22
– Added patch from Debian to avoid free on invalid pointer due to a
buffer overflow (#1196751, #1207180)
– Added patch from Debian for symlink directory traversal (#1178824)
– Added patch from Debian to fix the directory traversal via
//multiple/leading/slash (#1178824)
* Sat Feb 21 2015 Till Maas <opensource@till.name> – 3.10.22-21
– Rebuilt for Fedora 23 Change
https://fedoraproject.org/wiki/Changes/Harden_all_packages_with_position-independent_code
——————————————————————————–
References:

[ 1 ] Bug #1178824 – CVE-2015-0556 CVE-2015-0557 arj: two directory traversal flaws
https://bugzilla.redhat.com/show_bug.cgi?id=1178824
[ 2 ] Bug #1207180 – CVE-2015-2782 arj: free on invalid pointer due to to buffer overflow
https://bugzilla.redhat.com/show_bug.cgi?id=1207180
[ 3 ] Bug #1196751 – arj: buffer overflow write access initiated by a size read from a crafted archive
https://bugzilla.redhat.com/show_bug.cgi?id=1196751
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update arj’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

ition-independent_code
* Fri Aug 15 2014 Fedora Release Engineering  – 3.10.22-20
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Sat Jun  7 2014 Fedora Release Engineering  – 3.10.22-19
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Sun Oct 20 2013 Robert Scheck  3.10.22-18
– Replaced compressed Debian patch file by regular patches
——————————————————————————–
References:

  [ 1 ] Bug #1178824 – CVE-2015-0556 CVE-2015-0557 arj: two directory traversal flaws
        https://bugzilla.redhat.com/show_bug.cgi?id=1178824
  [ 2 ] Bug #1207180 – CVE-2015-2782 arj: free on invalid pointer due to to buffer overflow
        https://bugzilla.redhat.com/show_bug.cgi?id=1207180
  [ 3 ] Bug #1196751 – arj: buffer overflow write access initiated by a size read from a crafted archive
        https://bugzilla.redhat.com/show_bug.cgi?id=1196751
——————————————————————————–

This update can be installed with the “yum” update program.  Use
su -c ‘yum update arj’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2015-04-0049-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni propust programskog paketa dpkg

Otkriven je sigurnosni propust u programskom paketu dpkg koji može omogućiti zaobilaženje provjere integriteta izvornog paketa unutar dpkg-source pomoću posebno...

Close