-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2008:068 http://www.mandriva.com/security/ _______________________________________________________________________ Package : unzip Date : March 18, 2008 Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0, Multi Network Firewall 2.0 _______________________________________________________________________ Problem Description: Tavis Ormandy of Google Security discovered an invalid pointer flaw in unzip that could lead to the execution of arbitrary code with the privileges of the user running unzip. The updated packages have been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.0: 8ab02d1ae7407c44cd1a1b9ec6c9cf61 2007.0/i586/unzip-5.52-3.1mdv2007.0.i586.rpm 57f5147c837b81e917a8d5651360e2cc 2007.0/SRPMS/unzip-5.52-3.1mdv2007.0.src.rpm Mandriva Linux 2007.0/X86_64: b7e80efd92608ae0a78a984e34bb8eff 2007.0/x86_64/unzip-5.52-3.1mdv2007.0.x86_64.rpm 57f5147c837b81e917a8d5651360e2cc 2007.0/SRPMS/unzip-5.52-3.1mdv2007.0.src.rpm Mandriva Linux 2007.1: 57dde2a4dc7f38ebcdff410b370f61f4 2007.1/i586/unzip-5.52-3.1mdv2007.1.i586.rpm d8415ea1276040828fe1d413ee286563 2007.1/SRPMS/unzip-5.52-3.1mdv2007.1.src.rpm Mandriva Linux 2007.1/X86_64: 5cb9ca374ed552c88db439e6cb940e33 2007.1/x86_64/unzip-5.52-3.1mdv2007.1.x86_64.rpm d8415ea1276040828fe1d413ee286563 2007.1/SRPMS/unzip-5.52-3.1mdv2007.1.src.rpm Mandriva Linux 2008.0: 994efe8ccdbc3513e8095dd35065905c 2008.0/i586/unzip-5.52-3.1mdv2008.0.i586.rpm 166137b40bd05dcd93a014d9ce0bb34f 2008.0/SRPMS/unzip-5.52-3.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 38d80bbd775b4d190adc8c4b86cc77aa 2008.0/x86_64/unzip-5.52-3.1mdv2008.0.x86_64.rpm 166137b40bd05dcd93a014d9ce0bb34f 2008.0/SRPMS/unzip-5.52-3.1mdv2008.0.src.rpm Corporate 3.0: fc663b970f8876e8f83a8d93acf019c0 corporate/3.0/i586/unzip-5.50-9.4.C30mdk.i586.rpm dafe241ea7b42965ad69da9d4b95719a corporate/3.0/SRPMS/unzip-5.50-9.4.C30mdk.src.rpm Corporate 3.0/X86_64: ac91d1e086ad8aeb7c6bd1e8a67a2beb corporate/3.0/x86_64/unzip-5.50-9.4.C30mdk.x86_64.rpm dafe241ea7b42965ad69da9d4b95719a corporate/3.0/SRPMS/unzip-5.50-9.4.C30mdk.src.rpm Corporate 4.0: 6389250d173ed94a1736a1881247e29e corporate/4.0/i586/unzip-5.52-1.4.20060mlcs4.i586.rpm 589667d7f856c52f748fae21a76bed57 corporate/4.0/SRPMS/unzip-5.52-1.4.20060mlcs4.src.rpm Corporate 4.0/X86_64: 2d28c159cb0e827c84de9f79acfbfde6 corporate/4.0/x86_64/unzip-5.52-1.4.20060mlcs4.x86_64.rpm 589667d7f856c52f748fae21a76bed57 corporate/4.0/SRPMS/unzip-5.52-1.4.20060mlcs4.src.rpm Multi Network Firewall 2.0: 57b08ef4bc95454c51a06606c5b3ec2e mnf/2.0/i586/unzip-5.50-9.4.M20mdk.i586.rpm a08d9ddf441401aa1967cd81b781e6cd mnf/2.0/SRPMS/unzip-5.50-9.4.M20mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (GNU/Linux) iD8DBQFH4EAlmqjQ0CJFipgRAjsfAJ0cIy+MQW/ARQmvODg70kOv2neK/gCdEFRj M7cz0koPMBEkaShat50CIqc= =BTId -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/