Fedora 20: arj Security Update

    Date13 Apr 2015
    CategoryFedora
    134
    Posted ByLinuxSecurity Advisories
    - Added patch from Debian to avoid free on invalid pointer due to a buffer overflow (#1196751, #1207180) - Added patch from Debian for symlink directory traversal (#1178824) - Added patch from Debian to fix the directory traversal via //multiple/leading/slash (#1178824)
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2015-5546
    2015-04-05 11:01:36
    --------------------------------------------------------------------------------
    
    Name        : arj
    Product     : Fedora 20
    Version     : 3.10.22
    Release     : 22.fc20
    URL         : http://arj.sourceforge.net/
    Summary     : Archiver for .arj files
    Description :
    This package is an open source version of the arj archiver. It has
    been created with the intent to preserve maximum compatibility and
    retain the feature set of original ARJ archiver as provided by ARJ
    Software, Inc.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    - Added patch from Debian to avoid free on invalid pointer due to a buffer overflow (#1196751, #1207180)
    - Added patch from Debian for symlink directory traversal (#1178824)
    - Added patch from Debian to fix the directory traversal via //multiple/leading/slash (#1178824)
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Fri Apr  3 2015 Robert Scheck  3.10.22-22
    - Added patch from Debian to avoid free on invalid pointer due to a
      buffer overflow (#1196751, #1207180)
    - Added patch from Debian for symlink directory traversal (#1178824)
    - Added patch from Debian to fix the directory traversal via
      //multiple/leading/slash (#1178824)
    * Sat Feb 21 2015 Till Maas  - 3.10.22-21
    - Rebuilt for Fedora 23 Change
      https://fedoraproject.org/wiki/Changes/Harden_all_packages_with_position-independent_code
    * Fri Aug 15 2014 Fedora Release Engineering  - 3.10.22-20
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
    * Sat Jun  7 2014 Fedora Release Engineering  - 3.10.22-19
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
    * Sun Oct 20 2013 Robert Scheck  3.10.22-18
    - Replaced compressed Debian patch file by regular patches
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1178824 - CVE-2015-0556 CVE-2015-0557 arj: two directory traversal flaws
            https://bugzilla.redhat.com/show_bug.cgi?id=1178824
      [ 2 ] Bug #1207180 - CVE-2015-2782 arj: free on invalid pointer due to to buffer overflow
            https://bugzilla.redhat.com/show_bug.cgi?id=1207180
      [ 3 ] Bug #1196751 - arj: buffer overflow write access initiated by a size read from a crafted archive
            https://bugzilla.redhat.com/show_bug.cgi?id=1196751
    --------------------------------------------------------------------------------
    
    This update can be installed with the "yum" update program.  Use
    su -c 'yum update arj' at the command line.
    For more information, refer to "Managing Software with yum",
    available at http://docs.fedoraproject.org/yum/.
    
    All packages are signed with the Fedora Project GPG key.  More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://admin.fedoraproject.org/mailman/listinfo/package-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"7","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.