[SECURITY] Fedora 20 Update: pigz-2.3.3-1.fc20

updates at fedoraproject.org updates at fedoraproject.org
Sun Feb 15 03:18:48 UTC 2015


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-1510
2015-01-31 21:11:07
--------------------------------------------------------------------------------

Name        : pigz
Product     : Fedora 20
Version     : 2.3.3
Release     : 1.fc20
URL         : http://www.zlib.net/pigz/
Summary     : Parallel implementation of gzip
Description :
pigz, which stands for parallel implementation of gzip,
is a fully functional replacement for gzip that exploits
multiple processors and multiple cores to the hilt when compressing data.

--------------------------------------------------------------------------------
Update Information:

Update to 2.3.3, fixes CVE-2015-1191:

- Return zero exit code when only warnings are issued
- Increase speed of unlzw (Unix compress decompression)
- Update zopfli to current google state
- Allow larger maximum blocksize (-b), now 512 MiB
- Do not require that -d precede -N, -n, -T options
- Strip any path from header name for -dN or -dNT
- Remove use of PATH_MAX (PATH_MAX is not reliable)
- Do not abort on inflate data error, do remaining files
- Check gzip header CRC if present
- Improve decompression error detection and reporting
--------------------------------------------------------------------------------
ChangeLog:

* Fri Jan 30 2015 Orion Poplawski <orion at cora.nwra.com> - 2.3.3-1
- Update to 2.3.3, fixes CVE-2015-1191 (bug #1181045)
* Sun Aug 17 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 2.3.1-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Sat Jun  7 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 2.3.1-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Mon May 19 2014 Adel Gadllah <adel.gadllah at gmail.com> - 2.3.1-1
- Update to 2.3.1
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1181045 - CVE-2015-1191 pigz: directory traversal vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=1181045
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update pigz' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list