[<prev] [next>] [day] [month] [year] [list]
Message-ID: <44331384.8040307@videotron.ca>
Date: Tue, 04 Apr 2006 20:47:00 -0400
From: Marc Deslauriers <marcdeslauriers@...eotron.ca>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: [FLSA-2006:180159] Updated unzip package fixes security issue
---------------------------------------------------------------------
Fedora Legacy Update Advisory
Synopsis: Updated unzip package fixes security issue
Advisory ID: FLSA:180159
Issue date: 2006-04-04
Product: Red Hat Linux, Fedora Core
Keywords: Bugfix, Security
CVE Names: CVE-2005-4667
---------------------------------------------------------------------
---------------------------------------------------------------------
1. Topic:
An updated unzip package that fixes a buffer overflow vulnerability is
now available.
The unzip utility is used to list, test, or extract files from a zip
archive.
2. Relevant releases/architectures:
Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386
Fedora Core 1 - i386
Fedora Core 2 - i386
Fedora Core 3 - i386, x86_64
3. Problem description:
A buffer overflow bug has been discovered in unzip when handling long
file names. An attacker could create a specially crafted path which
could cause unzip to crash or execute arbitrary instructions. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2005-4667 to this issue.
Users of unzip should upgrade to this updated package, which contains
backported patches and is not vulnerable to this issue.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which
are not installed but included in the list will not be updated. Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.
Please note that this update is also available via yum and apt. Many
people find this an easier way to apply updates. To use yum issue:
yum update
or to use apt:
apt-get update; apt-get upgrade
This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system. This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.
5. Bug IDs fixed:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=180159
6. RPMs required:
Red Hat Linux 7.3:
SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/unzip-5.50-31.1.legacy.src.rpm
i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/unzip-5.50-31.1.legacy.i386.rpm
Red Hat Linux 9:
SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/unzip-5.50-33.1.legacy.src.rpm
i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/unzip-5.50-33.1.legacy.i386.rpm
Fedora Core 1:
SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/unzip-5.50-35.1.legacy.src.rpm
i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/unzip-5.50-35.1.legacy.i386.rpm
Fedora Core 2:
SRPM:
http://download.fedoralegacy.org/fedora/2/updates/SRPMS/unzip-5.50-37.1.legacy.src.rpm
i386:
http://download.fedoralegacy.org/fedora/2/updates/i386/unzip-5.50-37.1.legacy.i386.rpm
Fedora Core 3:
SRPM:
http://download.fedoralegacy.org/fedora/3/updates/SRPMS/unzip-5.51-4.fc3.1.legacy.src.rpm
i386:
http://download.fedoralegacy.org/fedora/3/updates/i386/unzip-5.51-4.fc3.1.legacy.i386.rpm
x86_64:
http://download.fedoralegacy.org/fedora/3/updates/x86_64/unzip-5.51-4.fc3.1.legacy.x86_64.rpm
7. Verification:
SHA1 sum Package Name
---------------------------------------------------------------------
5d341df449ddf2d22410bd37bfba7d124960c1ae
redhat/7.3/updates/i386/unzip-5.50-31.1.legacy.i386.rpm
d76fb8e7acc75cfca6d419b461ded4176348e2a2
redhat/7.3/updates/SRPMS/unzip-5.50-31.1.legacy.src.rpm
00b6b6b34e4229e9a2547418c83470752c9c9ff9
redhat/9/updates/i386/unzip-5.50-33.1.legacy.i386.rpm
30aa7fdaf8aada1dbb30dab4e6058a846d6a1e34
redhat/9/updates/SRPMS/unzip-5.50-33.1.legacy.src.rpm
473bf802cf9257684f534cb99e7813e4257bf189
fedora/1/updates/i386/unzip-5.50-35.1.legacy.i386.rpm
5f5fba20950799ed5676fa1e65044f3b2a61c497
fedora/1/updates/SRPMS/unzip-5.50-35.1.legacy.src.rpm
475ae5bed64d3273ccd986d5ee55bd5300b9b01f
fedora/2/updates/i386/unzip-5.50-37.1.legacy.i386.rpm
4d35e2bceeb45747e415b66deea0e955b258889e
fedora/2/updates/SRPMS/unzip-5.50-37.1.legacy.src.rpm
3fdea3917830be7fd801a2872ef2caa115592d13
fedora/3/updates/i386/unzip-5.51-4.fc3.1.legacy.i386.rpm
a55ddb890db2308be565ea22057624808afda1b3
fedora/3/updates/x86_64/unzip-5.51-4.fc3.1.legacy.x86_64.rpm
e1f9b432cec0100d9a50ad99d3b72c8b19aea8b4
fedora/3/updates/SRPMS/unzip-5.51-4.fc3.1.legacy.src.rpm
These packages are GPG signed by Fedora Legacy for security. Our key is
available from http://www.fedoralegacy.org/about/security.php
You can verify each package with the following command:
rpm --checksig -v <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:
sha1sum <filename>
8. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4667
9. Contact:
The Fedora Legacy security contact is <secnotice@...oralegacy.org>. More
project details at http://www.fedoralegacy.org
---------------------------------------------------------------------
Download attachment "signature.asc" of type "application/pgp-signature" (192 bytes)
--
fedora-legacy-list mailing list
fedora-legacy-list@...hat.com
https://www.redhat.com/mailman/listinfo/fedora-legacy-list
Powered by blists - more mailing lists