cpio 2.6-17ubuntu0.7.04.1 source package in Ubuntu
Changelog
cpio (2.6-17ubuntu0.7.04.1) feisty-security; urgency=low * SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU cpio has unspecified attack vectors and impact, resulting in a "crashing stack." * src/copyin.c: patch copyin.c to correct an allocation weakness in safer_name_suffix() which could lead to a crash. Thanks to Stephan Hermann * References: CVE-2007-4476 LP: #161173 -- Jamie Strandboge <email address hidden> Mon, 29 Sep 2008 16:58:13 -0500
Upload details
- Uploaded by:
- Jamie Strandboge
- Uploaded to:
- Feisty
- Original maintainer:
- Clint Adams
- Architectures:
- any
- Section:
- utils
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
cpio_2.6.orig.tar.gz | 543.0 KiB | 954c5705ea1861a443d7a61753e3226701c202fc8e398ca72f674e3561ccf6c2 |
cpio_2.6-17ubuntu0.7.04.1.diff.gz | 449.8 KiB | 6baf7473cde2ab71b143a2977b829ebdd5758ef0ce032ebe0ab099fdfaec9e30 |
cpio_2.6-17ubuntu0.7.04.1.dsc | 569 bytes | fefc8530a2a3d5ae79677c31d60cc8bf896a1da6f8325c7ecd0873eec83aab78 |
Available diffs
- diff from 2.6-17 to 2.6-17ubuntu0.7.04.1 (680 bytes)
Binary packages built by this source
- cpio: No summary available for cpio in ubuntu feisty.
No description available for cpio in ubuntu feisty.