Fedora 20 Security Update: pigz-2.3.3-1.fc20

Resolved Bugs
1181045 – CVE-2015-1191 pigz: directory traversal vulnerability
1181046 – pigz: directory traversal vulnerability [fedora-all]<br
Update to 2.3.3, fixes CVE-2015-1191:
– Return zero exit code when only warnings are issued
– Increase speed of unlzw (Unix compress decompression)
– Update zopfli to current google state
– Allow larger maximum blocksize (-b), now 512 MiB
– Do not require that -d precede -N, -n, -T options
– Strip any path from header name for -dN or -dNT
– Remove use of PATH_MAX (PATH_MAX is not reliable)
– Do not abort on inflate data error, do remaining files
– Check gzip header CRC if present
– Improve decompression error detection and reporting

Fedora 21 Security Update: pigz-2.3.3-1.fc21

Resolved Bugs
1181045 – CVE-2015-1191 pigz: directory traversal vulnerability
1181046 – pigz: directory traversal vulnerability [fedora-all]<br
Update to 2.3.3, fixes CVE-2015-1191:
– Return zero exit code when only warnings are issued
– Increase speed of unlzw (Unix compress decompression)
– Update zopfli to current google state
– Allow larger maximum blocksize (-b), now 512 MiB
– Do not require that -d precede -N, -n, -T options
– Strip any path from header name for -dN or -dNT
– Remove use of PATH_MAX (PATH_MAX is not reliable)
– Do not abort on inflate data error, do remaining files
– Check gzip header CRC if present
– Improve decompression error detection and reporting

Fedora 20 Security Update: kernel-3.18.5-100.fc20

Resolved Bugs
1186448 – CVE-2015-0239 kernel: kvm: insufficient sysenter emulation when invoked from 16-bit code
1186453 – CVE-2015-0239 kernel: kvm: insufficient sysenter emulation when invoked from 16-bit code [fedora-all]<br
The 3.18.5 stable update contains a number of important fixes across the tree.
The 3.18.4 stable update contains a number new features and drivers as well as several important fixes across the tree.

Fedora EPEL 7 Security Update: pigz-2.3.3-1.el7

Resolved Bugs
1181045 – CVE-2015-1191 pigz: directory traversal vulnerability
1181047 – pigz: directory traversal vulnerability [epel-all]<br
Update to 2.3.3, fixes CVE-2015-1191:
– Return zero exit code when only warnings are issued
– Increase speed of unlzw (Unix compress decompression)
– Update zopfli to current google state
– Allow larger maximum blocksize (-b), now 512 MiB
– Do not require that -d precede -N, -n, -T options
– Strip any path from header name for -dN or -dNT
– Remove use of PATH_MAX (PATH_MAX is not reliable)
– Do not abort on inflate data error, do remaining files
– Check gzip header CRC if present
– Improve decompression error detection and reporting