cpio 2.8-1ubuntu2.2 source package in Ubuntu
Changelog
cpio (2.8-1ubuntu2.2) gutsy-security; urgency=low * SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU cpio has unspecified attack vectors and impact, resulting in a "crashing stack." * patch paxnames.c to correct an allocation weakness in safer_name_suffix() which could lead to a crash. Thanks to Stephan Hermann * References: CVE-2007-4476 LP: #161173 -- Jamie Strandboge <email address hidden> Mon, 29 Sep 2008 16:58:13 -0500
Upload details
- Uploaded by:
- Jamie Strandboge
- Uploaded to:
- Gutsy
- Original maintainer:
- Ubuntu Development Team
- Architectures:
- any
- Section:
- utils
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
cpio_2.8.orig.tar.gz | 945.4 KiB | 1b203248874c3b5a728b351f06513e5282f73e0170b7f207fbf8c39f28f6b4ad |
cpio_2.8-1ubuntu2.2.diff.gz | 9.1 KiB | 939ea754eb8091f95b8c82022e62fc6a7956cc3b33cfbddf14ff38ac6d5e4579 |
cpio_2.8-1ubuntu2.2.dsc | 756 bytes | 7d299754d76ed102a4ea0b15bc5a9f9f4bf74ea748358777230b3d246158f7f5 |
Available diffs
- diff from 2.8-1ubuntu2 to 2.8-1ubuntu2.2 (1.3 KiB)
Binary packages built by this source
- cpio: No summary available for cpio in ubuntu gutsy.
No description available for cpio in ubuntu gutsy.