cpio 2.6-10ubuntu0.3 source package in Ubuntu
Changelog
cpio (2.6-10ubuntu0.3) dapper-security; urgency=low * SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU cpio has unspecified attack vectors and impact, resulting in a "crashing stack." * src/copyin.c: patch copyin.c to correct an allocation weakness in safer_name_suffix() which could lead to a crash. Thanks to Stephan Hermann * References: CVE-2007-4476 LP: #161173 -- Jamie Strandboge <email address hidden> Mon, 29 Sep 2008 16:58:13 -0500
Upload details
- Uploaded by:
- Jamie Strandboge
- Uploaded to:
- Dapper
- Original maintainer:
- Clint Adams
- Architectures:
- any
- Section:
- utils
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
cpio_2.6.orig.tar.gz | 543.0 KiB | 954c5705ea1861a443d7a61753e3226701c202fc8e398ca72f674e3561ccf6c2 |
cpio_2.6-10ubuntu0.3.diff.gz | 401.1 KiB | 6d2f372d654872c80abd35db085a382ebff062c748c44b24807060838e7e9ef8 |
cpio_2.6-10ubuntu0.3.dsc | 550 bytes | 0e378c4fd3dc3bdbd8a0c7fd6d46e5eb9b25a5c8cdf963b64ceb0ecf80f74623 |
Available diffs
- diff from 2.6-10 to 2.6-10ubuntu0.3 (1.0 KiB)
Binary packages built by this source
- cpio: No summary available for cpio in ubuntu dapper.
No description available for cpio in ubuntu dapper.