[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1DYckc-00011P-KH@mercury.mandriva.com>
Date: Wed, 18 May 2005 22:35:14 -0600
From: Mandriva Security Team <security@...driva.com>
To: bugtraq@...urityfocus.com
Subject: MDKSA-2005:091 - Updated bzip2 packages fix multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Update Advisory
_______________________________________________________________________
Package name: bzip2
Advisory ID: MDKSA-2005:091
Date: May 18th, 2005
Affected versions: 10.0, 10.1, 10.2, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________
Problem Description:
A race condition in the file permission restore code of bunzip2 was
discovered by Imran Ghory. While a user was decompressing a file, a
local attacker with write permissions to the directory containing the
compressed file could replace the target file with a hard link which
would cause bunzip2 to restore the file permissions of the original
file to the hard link target. This could be exploited to gain read or
write access to files of other users (CAN-2005-0953).
A vulnerability was found where specially crafted bzip2 archives would
cause an infinite loop in the decompressor, resulting in an
indefinitively large output file (also known as a "decompression
bomb"). This could be exploited to cause a Denial of Service attack
on the host computer due to disk space exhaustion (CAN-2005-1260).
The provided packages have been patched to correct these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0953
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1260
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
4b2bb8d970b222f3d941181c97ac90b4 10.0/RPMS/bzip2-1.0.2-17.1.100mdk.i586.rpm
668e3c51aba91c2593a8acff74d44454 10.0/RPMS/libbzip2_1-1.0.2-17.1.100mdk.i586.rpm
94f02cd14f2600f9bb2feafa3bb9d86e 10.0/RPMS/libbzip2_1-devel-1.0.2-17.1.100mdk.i586.rpm
c22b1d64b5479d4924612a96d20f7944 10.0/SRPMS/bzip2-1.0.2-17.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
cb22383be6cb4a2f32170a1c6b5aa0cf amd64/10.0/RPMS/bzip2-1.0.2-17.1.100mdk.amd64.rpm
923353937d7dd11490f769a23012d229 amd64/10.0/RPMS/lib64bzip2_1-1.0.2-17.1.100mdk.amd64.rpm
796494bd8a1731f1b970421a6c1657ee amd64/10.0/RPMS/lib64bzip2_1-devel-1.0.2-17.1.100mdk.amd64.rpm
c22b1d64b5479d4924612a96d20f7944 amd64/10.0/SRPMS/bzip2-1.0.2-17.1.100mdk.src.rpm
Mandrakelinux 10.1:
c712f5670311f97e101fe2d0a8ed8c2b 10.1/RPMS/bzip2-1.0.2-20.1.101mdk.i586.rpm
3b7a755b9faf46953f8030eab2b9a5f0 10.1/RPMS/libbzip2_1-1.0.2-20.1.101mdk.i586.rpm
70428efe689e2e0e6e88ee0f1c930475 10.1/RPMS/libbzip2_1-devel-1.0.2-20.1.101mdk.i586.rpm
19be2dba061d76a9b79f7376077e238f 10.1/SRPMS/bzip2-1.0.2-20.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
02b04af8089d801bf139dfdc5fbe61e3 x86_64/10.1/RPMS/bzip2-1.0.2-20.1.101mdk.x86_64.rpm
8c835acc2c2dc823b94e332340502245 x86_64/10.1/RPMS/lib64bzip2_1-1.0.2-20.1.101mdk.x86_64.rpm
92a783e1d9dea6c00324b6ed12d74635 x86_64/10.1/RPMS/lib64bzip2_1-devel-1.0.2-20.1.101mdk.x86_64.rpm
19be2dba061d76a9b79f7376077e238f x86_64/10.1/SRPMS/bzip2-1.0.2-20.1.101mdk.src.rpm
Mandrakelinux 10.2:
64e8f1fb474606a4bfbeb2adee7cabf6 10.2/RPMS/bzip2-1.0.2-20.1.102mdk.i586.rpm
53fe82aefa0ff6aeff8ce0b5a7649b5c 10.2/RPMS/libbzip2_1-1.0.2-20.1.102mdk.i586.rpm
9d420447e67a42f77e22c28d55bf611a 10.2/RPMS/libbzip2_1-devel-1.0.2-20.1.102mdk.i586.rpm
bc16ae3ec7865dc9e8d382f22d296cb2 10.2/SRPMS/bzip2-1.0.2-20.1.102mdk.src.rpm
Mandrakelinux 10.2/X86_64:
d87a3bc804e9c716a17b44d2144255a7 x86_64/10.2/RPMS/bzip2-1.0.2-20.1.102mdk.x86_64.rpm
6f0841e3c59c302819abd300e37a4b4f x86_64/10.2/RPMS/lib64bzip2_1-1.0.2-20.1.102mdk.x86_64.rpm
31a163ba5a620dc925279e0cd2b988b4 x86_64/10.2/RPMS/lib64bzip2_1-devel-1.0.2-20.1.102mdk.x86_64.rpm
bc16ae3ec7865dc9e8d382f22d296cb2 x86_64/10.2/SRPMS/bzip2-1.0.2-20.1.102mdk.src.rpm
Corporate Server 2.1:
297004f1d8a720780325382271f94164 corporate/2.1/RPMS/bzip2-1.0.2-10.1.C21mdk.i586.rpm
2e9376a5ebaeef7ab611c31377962636 corporate/2.1/RPMS/libbzip2_1-1.0.2-10.1.C21mdk.i586.rpm
54747fe92a6779b85ac84286c398bb14 corporate/2.1/RPMS/libbzip2_1-devel-1.0.2-10.1.C21mdk.i586.rpm
2220cf9a3e6842172f98c01909e3f77e corporate/2.1/SRPMS/bzip2-1.0.2-10.1.C21mdk.src.rpm
Corporate Server 2.1/X86_64:
cfaf6fd095f0d7434e80d8a4f0156255 x86_64/corporate/2.1/RPMS/bzip2-1.0.2-10.1.C21mdk.x86_64.rpm
efddfee91fe70c73d3162cd4f2ab2581 x86_64/corporate/2.1/RPMS/libbzip2_1-1.0.2-10.1.C21mdk.x86_64.rpm
a41917f3e9a008c625b90481c9357aff x86_64/corporate/2.1/RPMS/libbzip2_1-devel-1.0.2-10.1.C21mdk.x86_64.rpm
2220cf9a3e6842172f98c01909e3f77e x86_64/corporate/2.1/SRPMS/bzip2-1.0.2-10.1.C21mdk.src.rpm
Corporate 3.0:
b01aca9e32f1b7beadf1dede32fe8726 corporate/3.0/RPMS/bzip2-1.0.2-17.1.C30mdk.i586.rpm
01fb59c1b265d341bd1182ef833186e3 corporate/3.0/RPMS/libbzip2_1-1.0.2-17.1.C30mdk.i586.rpm
7555509f257ddbef15e4f09e4bc3fda5 corporate/3.0/RPMS/libbzip2_1-devel-1.0.2-17.1.C30mdk.i586.rpm
361836a8f0bcdbd18cc376df549f1d2b corporate/3.0/SRPMS/bzip2-1.0.2-17.1.C30mdk.src.rpm
Corporate 3.0/X86_64:
b06a4e4af363c43e1e24e45e156f6282 x86_64/corporate/3.0/RPMS/bzip2-1.0.2-17.1.C30mdk.x86_64.rpm
7c075c3748cba9471e9d13ce4ae8b4c2 x86_64/corporate/3.0/RPMS/lib64bzip2_1-1.0.2-17.1.C30mdk.x86_64.rpm
d15c9f810a0b1ec7e153154304b8dc53 x86_64/corporate/3.0/RPMS/lib64bzip2_1-devel-1.0.2-17.1.C30mdk.x86_64.rpm
361836a8f0bcdbd18cc376df549f1d2b x86_64/corporate/3.0/SRPMS/bzip2-1.0.2-17.1.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFCjBeCmqjQ0CJFipgRAj/zAJ0ZbXjjihsKQHDasMvEL3zAH+aTkgCgqWSV
dHSH6DEdKzeVpHX1gbPFLPU=
=kJjT
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists