cpio 2.8-1ubuntu2.2 source package in Ubuntu

Changelog

cpio (2.8-1ubuntu2.2) gutsy-security; urgency=low

  * SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
    cpio has unspecified attack vectors and impact, resulting in a "crashing
    stack."
  * patch paxnames.c to correct an allocation weakness in safer_name_suffix()
    which could lead to a crash. Thanks to Stephan Hermann
  * References:
    CVE-2007-4476
    LP: #161173

 -- Jamie Strandboge <email address hidden>   Mon, 29 Sep 2008 16:58:13 -0500

Upload details

Uploaded by:
Jamie Strandboge
Uploaded to:
Gutsy
Original maintainer:
Ubuntu Development Team
Architectures:
any
Section:
utils
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
cpio_2.8.orig.tar.gz 945.4 KiB 1b203248874c3b5a728b351f06513e5282f73e0170b7f207fbf8c39f28f6b4ad
cpio_2.8-1ubuntu2.2.diff.gz 9.1 KiB 939ea754eb8091f95b8c82022e62fc6a7956cc3b33cfbddf14ff38ac6d5e4579
cpio_2.8-1ubuntu2.2.dsc 756 bytes 7d299754d76ed102a4ea0b15bc5a9f9f4bf74ea748358777230b3d246158f7f5

Available diffs

View changes file

Binary packages built by this source

cpio: No summary available for cpio in ubuntu gutsy.

No description available for cpio in ubuntu gutsy.