[SECURITY] Fedora 21 Update: unzip-6.0-20.fc21

updates at fedoraproject.org updates at fedoraproject.org
Mon Feb 16 03:25:55 UTC 2015


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-2035
2015-02-14 23:25:06
--------------------------------------------------------------------------------

Name        : unzip
Product     : Fedora 21
Version     : 6.0
Release     : 20.fc21
URL         : http://www.info-zip.org/UnZip.html
Summary     : A utility for unpacking zip files
Description :
The unzip utility is used to list, test, or extract files from a zip
archive.  Zip archives are commonly found on MS-DOS systems.  The zip
utility, included in the zip package, creates zip archives.  Zip and
unzip are both compatible with archives created by PKWARE(R)'s PKZIP
for MS-DOS, but the programs' options and default behaviors do differ
in some respects.

Install the unzip package if you need to list, test or extract files from
a zip archive.

--------------------------------------------------------------------------------
Update Information:

- Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844)

- Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851)

- Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856)

- Fix buffer overflow on long file sizes (#1191136)

-  CVE-2014-9636 unzip: out-of-bounds read/write in test_compr_eb() in extract.c - re-fix (see https://bugzilla.redhat.com/show_bug.cgi?id=1184985#c7)
- Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844)

- Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851)

- Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856)

- Fix buffer overflow on long file sizes (#1191136)

- Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread (#1174844)

- Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb() (#1174851)

- Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues (#1174856)

- Fix buffer overflow on long file sizes (#1191136)

--------------------------------------------------------------------------------
ChangeLog:

* Wed Feb 11 2015 Petr Stodulka <pstodulk at redhat.com> - 6.0-20
- re-patch CVE-2014-9636 - original patch was incorrect (#1184986)
* Tue Feb 10 2015 Petr Stodulka <pstodulk at redhat.com> - 6.0-19
- Fix CVE-2014-8139 - CRC32 verification heap-based buffer overread
  (#1174844)
- Fix CVE-2014-8140 - out-of-bounds write issue in test_compr_eb()
  (#1174851)
- Fix CVE-2014-8141 - getZip64Data() out-of-bounds read issues
  (#1174856)
- Fix buffer overflow on long file sizes
  (#1191136)
* Mon Jan 26 2015 Petr Stodulka <pstodulk at redhat.com> - 6.0-18
- Fix security bug - CVE-2014-9636
* Thu Nov 27 2014 Petr Stodulka<pstodulk at redhat.com> - 6.0-17
- Fix unitialized reads (#558738)
- Fix fix broken -X option - never worked before. Added -DIZ_HAVE_UXUIDGID
  option for compilation.
    (#935202)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1174844 - CVE-2014-8139 unzip: CRC32 verification heap-based buffer overread (oCERT-2014-011)
        https://bugzilla.redhat.com/show_bug.cgi?id=1174844
  [ 2 ] Bug #1174851 - CVE-2014-8140 unzip: out-of-bounds write issue in test_compr_eb() (oCERT-2014-011)
        https://bugzilla.redhat.com/show_bug.cgi?id=1174851
  [ 3 ] Bug #1174856 - CVE-2014-8141 unzip: getZip64Data() out-of-bounds read issues (oCERT-2014-011)
        https://bugzilla.redhat.com/show_bug.cgi?id=1174856
  [ 4 ] Bug #1184985 - CVE-2014-9636 unzip: out-of-bounds read/write in test_compr_eb() in extract.c
        https://bugzilla.redhat.com/show_bug.cgi?id=1184985
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update unzip' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list