|
|
Subscribe / Log in / New account

Fedora alert FEDORA-2015-2035 (unzip)

From:  updates@fedoraproject.org
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 21 Update: unzip-6.0-20.fc21
Date:  Mon, 16 Feb 2015 03:25:55 +0000
Message-ID:  <20150216032555.7FEC4604CD60@bastion01.phx2.fedoraproject.org>

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2015-2035 2015-02-14 23:25:06 -------------------------------------------------------------------------------- Name : unzip Product : Fedora 21 Version : 6.0 Release : 20.fc21 URL : http://www.info-zip.org/UnZip.html Summary : A utility for unpacking zip files Description : The unzip utility is used to list, test, or extract files from a zip archive. Zip archives are commonly found on MS-DOS systems. The zip utility, included in the zip package, creates zip archives. Zip and unzip are both compatible with archives created by PKWARE(R)'s PKZIP for MS-DOS, but the programs' options and default behaviors do differ in some respects. Install the unzip package if you need to list, test or extract files from a zip archive. -------------------------------------------------------------------------------- Update Information: - Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844) - Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851) - Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856) - Fix buffer overflow on long file sizes (#1191136) - CVE-2014-9636 unzip: out-of-bounds read/write in test_compr_eb() in extract.c - re-fix (see https://bugzilla.redhat.com/show_bug.cgi?id=1184985#c7) - Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844) - Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851) - Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856) - Fix buffer overflow on long file sizes (#1191136) - Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844) - Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851) - Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856) - Fix buffer overflow on long file sizes (#1191136) -------------------------------------------------------------------------------- ChangeLog: * Wed Feb 11 2015 Petr Stodulka <pstodulk@redhat.com> - 6.0-20 - re-patch CVE-2014-9636 - original patch was incorrect (#1184986) * Tue Feb 10 2015 Petr Stodulka <pstodulk@redhat.com> - 6.0-19 - Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844) - Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851) - Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856) - Fix buffer overflow on long file sizes (#1191136) * Mon Jan 26 2015 Petr Stodulka <pstodulk@redhat.com> - 6.0-18 - Fix security bug - CVE-2014-9636 * Thu Nov 27 2014 Petr Stodulka<pstodulk@redhat.com> - 6.0-17 - Fix unitialized reads (#558738) - Fix fix broken -X option - never worked before. Added -DIZ_HAVE_UXUIDGID option for compilation. (#935202) -------------------------------------------------------------------------------- References: [ 1 ] Bug #1174844 - CVE-2014-8139 unzip: CRC32 verification heap-based buffer overread (oCERT-2014-011) https://bugzilla.redhat.com/show_bug.cgi?id=1174844 [ 2 ] Bug #1174851 - CVE-2014-8140 unzip: out-of-bounds write issue in test_compr_eb() (oCERT-2014-011) https://bugzilla.redhat.com/show_bug.cgi?id=1174851 [ 3 ] Bug #1174856 - CVE-2014-8141 unzip: getZip64Data() out-of-bounds read issues (oCERT-2014-011) https://bugzilla.redhat.com/show_bug.cgi?id=1174856 [ 4 ] Bug #1184985 - CVE-2014-9636 unzip: out-of-bounds read/write in test_compr_eb() in extract.c https://bugzilla.redhat.com/show_bug.cgi?id=1184985 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update unzip' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds