lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1EUswJ-0001z5-SW@mercury.mandriva.com>
Date: Wed Oct 26 22:38:39 2005
From: security at mandriva.com (Mandriva Security Team)
Subject: MDKSA-2005:197 - Updated unzip packages fix suid,
	permissions vulnerabilities.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2005:197
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : unzip
 Date    : October 26, 2005
 Affected: 10.1,  10.2,  2006.0,  Corporate 2.1,  Corporate 3.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 Unzip 5.51 and earlier does not properly warn the user when 
 extracting setuid or setgid files, which may allow local users 
 to gain privileges. (CAN-2005-0602)
 
 Imran Ghory found a race condition in the handling of output files.
 While a file was unpacked by unzip, a local attacker with write
 permissions to the target directory could exploit this to change the
 permissions of arbitrary files of the unzip user. This affects
 versions of unzip 5.52 and lower (CAN-2005-2475)
 
 The updated packages have been patched to address these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0602
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2475
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate Server 2.1:
 7588a2f5d443685a928d3c3feb547aba  corporate/2.1/RPMS/unzip-5.50-4.4.C21mdk.i586.rpm
 7d3e7ef187a36a39b3427d0d38959189  corporate/2.1/SRPMS/unzip-5.50-4.4.C21mdk.src.rpm

 Corporate Server 2.1/X86_64:
 79aa9befeb7ed8de2220afc3fb3d1886  x86_64/corporate/2.1/RPMS/unzip-5.50-4.4.C21mdk.x86_64.rpm
 7d3e7ef187a36a39b3427d0d38959189  x86_64/corporate/2.1/SRPMS/unzip-5.50-4.4.C21mdk.src.rpm

 Mandriva Linux 10.1:
 cb3280ad8d82e7f7108ed7a5336217ea  10.1/RPMS/unzip-5.51-1.2.101mdk.i586.rpm
 0ec9c5f7200a6bc97429408d49f26252  10.1/SRPMS/unzip-5.51-1.2.101mdk.src.rpm

 Mandriva Linux 10.1/X86_64:
 67cb90cf939bd25c74deba5e45d6dbb8  x86_64/10.1/RPMS/unzip-5.51-1.2.101mdk.x86_64.rpm
 0ec9c5f7200a6bc97429408d49f26252  x86_64/10.1/SRPMS/unzip-5.51-1.2.101mdk.src.rpm

 Corporate 3.0:
 b17cff4c27c1a268fd3cd7cec5661c12  corporate/3.0/RPMS/unzip-5.50-9.2.C30mdk.i586.rpm
 1aedfd6f58ec41f16c72f3581744812e  corporate/3.0/SRPMS/unzip-5.50-9.2.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 0b6a7cbd46e1ae821ad90bfc9623d86b  x86_64/corporate/3.0/RPMS/unzip-5.50-9.2.C30mdk.x86_64.rpm
 1aedfd6f58ec41f16c72f3581744812e  x86_64/corporate/3.0/SRPMS/unzip-5.50-9.2.C30mdk.src.rpm

 Multi Network Firewall 2.0:
 09797c30705503bef945eac7ae58e6ba  mnf/2.0/RPMS/unzip-5.50-9.2.M20mdk.i586.rpm
 81f25b8506bab3e2d467a918247a24ea  mnf/2.0/SRPMS/unzip-5.50-9.2.M20mdk.src.rpm

 Mandriva Linux 10.2:
 2fbac32dc8e75c593af39fda3abb2b85  10.2/RPMS/unzip-5.51-1.2.102mdk.i586.rpm
 95661a9046eb3b823a631ad85d9e0805  10.2/SRPMS/unzip-5.51-1.2.102mdk.src.rpm

 Mandriva Linux 10.2/X86_64:
 099a8fe40622a82cabd9495cdf52377a  x86_64/10.2/RPMS/unzip-5.51-1.2.102mdk.x86_64.rpm
 95661a9046eb3b823a631ad85d9e0805  x86_64/10.2/SRPMS/unzip-5.51-1.2.102mdk.src.rpm

 Mandriva Linux 2006.0:
 36aa8d839b74be9bb71fffd19f55e20c  2006.0/RPMS/unzip-5.52-1.2.20060mdk.i586.rpm
 0dce17e0e7ff5040bf7d28802df8de7c  2006.0/SRPMS/unzip-5.52-1.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 10ac5d8076fa230106359170360a5f23  x86_64/2006.0/RPMS/unzip-5.52-1.2.20060mdk.x86_64.rpm
 0dce17e0e7ff5040bf7d28802df8de7c  x86_64/2006.0/SRPMS/unzip-5.52-1.2.20060mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDX/bHmqjQ0CJFipgRAu/dAKDkvstFLoqaBkWZAJmBF7ymm4SFVgCfSOak
4YlJec53w5WEyuPn7PXTSPE=
=prpn
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ