Fedora alert FEDORA-2015-1510 (pigz)
From: | updates@fedoraproject.org | |
To: | package-announce@lists.fedoraproject.org | |
Subject: | [SECURITY] Fedora 20 Update: pigz-2.3.3-1.fc20 | |
Date: | Sun, 15 Feb 2015 03:18:48 +0000 | |
Message-ID: | <20150215031848.9889360C7BF9@bastion01.phx2.fedoraproject.org> |
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2015-1510 2015-01-31 21:11:07 -------------------------------------------------------------------------------- Name : pigz Product : Fedora 20 Version : 2.3.3 Release : 1.fc20 URL : http://www.zlib.net/pigz/ Summary : Parallel implementation of gzip Description : pigz, which stands for parallel implementation of gzip, is a fully functional replacement for gzip that exploits multiple processors and multiple cores to the hilt when compressing data. -------------------------------------------------------------------------------- Update Information: Update to 2.3.3, fixes CVE-2015-1191: - Return zero exit code when only warnings are issued - Increase speed of unlzw (Unix compress decompression) - Update zopfli to current google state - Allow larger maximum blocksize (-b), now 512 MiB - Do not require that -d precede -N, -n, -T options - Strip any path from header name for -dN or -dNT - Remove use of PATH_MAX (PATH_MAX is not reliable) - Do not abort on inflate data error, do remaining files - Check gzip header CRC if present - Improve decompression error detection and reporting -------------------------------------------------------------------------------- ChangeLog: * Fri Jan 30 2015 Orion Poplawski <orion@cora.nwra.com> - 2.3.3-1 - Update to 2.3.3, fixes CVE-2015-1191 (bug #1181045) * Sun Aug 17 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.3.1-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild * Sat Jun 7 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.3.1-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild * Mon May 19 2014 Adel Gadllah <adel.gadllah@gmail.com> - 2.3.1-1 - Update to 2.3.1 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1181045 - CVE-2015-1191 pigz: directory traversal vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=1181045 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update pigz' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-...