what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

FLSA-2006-180159.txt

FLSA-2006-180159.txt
Posted Apr 6, 2006
Site fedoralegacy.org

Fedora Legacy Update Advisory - Updated unzip package fixes security issue.

tags | advisory
systems | linux, fedora
SHA-256 | bd82df65b59622809e6838fda935603bd870f806ae949bd909b06de69f7f4929

FLSA-2006-180159.txt

Change Mirror Download
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig0E2BF1A53F2C37989FCFC284
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

---------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated unzip package fixes security issue
Advisory ID: FLSA:180159
Issue date: 2006-04-04
Product: Red Hat Linux, Fedora Core
Keywords: Bugfix, Security
CVE Names: CVE-2005-4667
---------------------------------------------------------------------


---------------------------------------------------------------------
1. Topic:

An updated unzip package that fixes a buffer overflow vulnerability is
now available.

The unzip utility is used to list, test, or extract files from a zip
archive.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386
Fedora Core 1 - i386
Fedora Core 2 - i386
Fedora Core 3 - i386, x86_64

3. Problem description:

A buffer overflow bug has been discovered in unzip when handling long
file names. An attacker could create a specially crafted path which
could cause unzip to crash or execute arbitrary instructions. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2005-4667 to this issue.

Users of unzip should upgrade to this updated package, which contains
backported patches and is not vulnerable to this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which
are not installed but included in the list will not be updated. Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt. Many
people find this an easier way to apply updates. To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system. This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=3D180159

6. RPMs required:

Red Hat Linux 7.3:
SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/unzip-5.50-31.1=
=2Elegacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/unzip-5.50-31.1.=
legacy.i386.rpm

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/unzip-5.50-33.1.l=
egacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/unzip-5.50-33.1.le=
gacy.i386.rpm

Fedora Core 1:

SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/unzip-5.50-35.1.l=
egacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/unzip-5.50-35.1.le=
gacy.i386.rpm

Fedora Core 2:

SRPM:
http://download.fedoralegacy.org/fedora/2/updates/SRPMS/unzip-5.50-37.1.l=
egacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/2/updates/i386/unzip-5.50-37.1.le=
gacy.i386.rpm

Fedora Core 3:

SRPM:
http://download.fedoralegacy.org/fedora/3/updates/SRPMS/unzip-5.51-4.fc3.=
1.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/3/updates/i386/unzip-5.51-4.fc3.1=
=2Elegacy.i386.rpm

x86_64:
http://download.fedoralegacy.org/fedora/3/updates/x86_64/unzip-5.51-4.fc3=
=2E1.legacy.x86_64.rpm


7. Verification:

SHA1 sum Package Name
---------------------------------------------------------------------

5d341df449ddf2d22410bd37bfba7d124960c1ae
redhat/7.3/updates/i386/unzip-5.50-31.1.legacy.i386.rpm
d76fb8e7acc75cfca6d419b461ded4176348e2a2
redhat/7.3/updates/SRPMS/unzip-5.50-31.1.legacy.src.rpm

00b6b6b34e4229e9a2547418c83470752c9c9ff9
redhat/9/updates/i386/unzip-5.50-33.1.legacy.i386.rpm
30aa7fdaf8aada1dbb30dab4e6058a846d6a1e34
redhat/9/updates/SRPMS/unzip-5.50-33.1.legacy.src.rpm

473bf802cf9257684f534cb99e7813e4257bf189
fedora/1/updates/i386/unzip-5.50-35.1.legacy.i386.rpm
5f5fba20950799ed5676fa1e65044f3b2a61c497
fedora/1/updates/SRPMS/unzip-5.50-35.1.legacy.src.rpm

475ae5bed64d3273ccd986d5ee55bd5300b9b01f
fedora/2/updates/i386/unzip-5.50-37.1.legacy.i386.rpm
4d35e2bceeb45747e415b66deea0e955b258889e
fedora/2/updates/SRPMS/unzip-5.50-37.1.legacy.src.rpm

3fdea3917830be7fd801a2872ef2caa115592d13
fedora/3/updates/i386/unzip-5.51-4.fc3.1.legacy.i386.rpm
a55ddb890db2308be565ea22057624808afda1b3
fedora/3/updates/x86_64/unzip-5.51-4.fc3.1.legacy.x86_64.rpm
e1f9b432cec0100d9a50ad99d3b72c8b19aea8b4
fedora/3/updates/SRPMS/unzip-5.51-4.fc3.1.legacy.src.rpm


These packages are GPG signed by Fedora Legacy for security. Our key is
available from http://www.fedoralegacy.org/about/security.php

You can verify each package with the following command:

rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

sha1sum <filename>

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2005-4667

9. Contact:

The Fedora Legacy security contact is <secnotice@fedoralegacy.org>. More
project details at http://www.fedoralegacy.org

---------------------------------------------------------------------


--------------enig0E2BF1A53F2C37989FCFC284
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEMxOELMAs/0C4zNoRAmJzAJ4vFSWccJOzR34nvBfTpEURZ+ogCQCfSELf
UkKxP0dREL47J3X/Ic3hDVE=
=jXcf
-----END PGP SIGNATURE-----

--------------enig0E2BF1A53F2C37989FCFC284--

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close