cpio 2.6-10ubuntu0.3 source package in Ubuntu

Changelog

cpio (2.6-10ubuntu0.3) dapper-security; urgency=low

  * SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
    cpio has unspecified attack vectors and impact, resulting in a "crashing
    stack."
  * src/copyin.c: patch copyin.c to correct an allocation weakness in
    safer_name_suffix() which could lead to a crash. Thanks to Stephan Hermann
  * References:
    CVE-2007-4476
    LP: #161173

 -- Jamie Strandboge <email address hidden>   Mon, 29 Sep 2008 16:58:13 -0500

Upload details

Uploaded by:
Jamie Strandboge
Uploaded to:
Dapper
Original maintainer:
Clint Adams
Architectures:
any
Section:
utils
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
cpio_2.6.orig.tar.gz 543.0 KiB 954c5705ea1861a443d7a61753e3226701c202fc8e398ca72f674e3561ccf6c2
cpio_2.6-10ubuntu0.3.diff.gz 401.1 KiB 6d2f372d654872c80abd35db085a382ebff062c748c44b24807060838e7e9ef8
cpio_2.6-10ubuntu0.3.dsc 550 bytes 0e378c4fd3dc3bdbd8a0c7fd6d46e5eb9b25a5c8cdf963b64ceb0ecf80f74623

Available diffs

View changes file

Binary packages built by this source

cpio: No summary available for cpio in ubuntu dapper.

No description available for cpio in ubuntu dapper.