From mboxrd@z Thu Jan 1 00:00:00 1970 From: Thomas Petazzoni Date: Sun, 14 Jul 2019 15:04:30 +0200 Subject: [Buildroot] [PATCH 1/1] package/unzip: update security and bux fix patches from Debian In-Reply-To: <20190712133041.3611-1-sebastien.szymanski@armadeus.com> References: <20190712133041.3611-1-sebastien.szymanski@armadeus.com> Message-ID: <20190714150430.7d870370@windsurf> List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: buildroot@busybox.net On Fri, 12 Jul 2019 15:30:41 +0200 S?bastien Szymanski wrote: > Fix the URL and add three new patches. Quoting changelog [1]: > > unzip (6.0-24) unstable; urgency=medium > > * Apply two patches by Mark Adler: > - Fix bug in undefer_input() that misplaced the input state. > - Detect and reject a zip bomb using overlapped entries. Closes: #931433. > Bug discovered by David Fifield. For reference, this is CVE-2019-13232. > > -- Santiago Vila Thu, 11 Jul 2019 18:03:34 +0200 > > unzip (6.0-23) unstable; urgency=medium > > * Fix lame code in fileio.c which parsed 64-bit values incorrectly. > Thanks to David Fifield for the report. Closes: #929502. > > -- Santiago Vila Wed, 29 May 2019 00:24:08 +0200 > > [1] https://sources.debian.org/data/main/u/unzip/6.0-24/debian/changelog > > Signed-off-by: S?bastien Szymanski > --- > package/unzip/unzip.hash | 3 +++ > package/unzip/unzip.mk | 29 ++++++++++++++++------------- > 2 files changed, 19 insertions(+), 13 deletions(-) Applied to master, thanks. Thomas -- Thomas Petazzoni, CTO, Bootlin Embedded Linux and Kernel engineering https://bootlin.com