cpio 2.6-17ubuntu0.7.04.1 source package in Ubuntu

Changelog

cpio (2.6-17ubuntu0.7.04.1) feisty-security; urgency=low

  * SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
    cpio has unspecified attack vectors and impact, resulting in a "crashing
    stack."
  * src/copyin.c: patch copyin.c to correct an allocation weakness in
    safer_name_suffix() which could lead to a crash. Thanks to Stephan Hermann
  * References:
    CVE-2007-4476
    LP: #161173

 -- Jamie Strandboge <email address hidden>   Mon, 29 Sep 2008 16:58:13 -0500

Upload details

Uploaded by:
Jamie Strandboge
Uploaded to:
Feisty
Original maintainer:
Clint Adams
Architectures:
any
Section:
utils
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
cpio_2.6.orig.tar.gz 543.0 KiB 954c5705ea1861a443d7a61753e3226701c202fc8e398ca72f674e3561ccf6c2
cpio_2.6-17ubuntu0.7.04.1.diff.gz 449.8 KiB 6baf7473cde2ab71b143a2977b829ebdd5758ef0ce032ebe0ab099fdfaec9e30
cpio_2.6-17ubuntu0.7.04.1.dsc 569 bytes fefc8530a2a3d5ae79677c31d60cc8bf896a1da6f8325c7ecd0873eec83aab78

Available diffs

View changes file

Binary packages built by this source

cpio: No summary available for cpio in ubuntu feisty.

No description available for cpio in ubuntu feisty.