--------------------------------------------------------------------- Fedora Legacy Update Advisory Synopsis: Updated unzip package fixes security issue Advisory ID: FLSA:180159 Issue date: 2006-04-04 Product: Red Hat Linux, Fedora Core Keywords: Bugfix, Security CVE Names: CVE-2005-4667 --------------------------------------------------------------------- --------------------------------------------------------------------- 1. Topic: An updated unzip package that fixes a buffer overflow vulnerability is now available. The unzip utility is used to list, test, or extract files from a zip archive. 2. Relevant releases/architectures: Red Hat Linux 7.3 - i386 Red Hat Linux 9 - i386 Fedora Core 1 - i386 Fedora Core 2 - i386 Fedora Core 3 - i386, x86_64 3. Problem description: A buffer overflow bug has been discovered in unzip when handling long file names. An attacker could create a specially crafted path which could cause unzip to crash or execute arbitrary instructions. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-4667 to this issue. Users of unzip should upgrade to this updated package, which contains backported patches and is not vulnerable to this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via yum and apt. Many people find this an easier way to apply updates. To use yum issue: yum update or to use apt: apt-get update; apt-get upgrade This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. This assumes that you have yum or apt-get configured for obtaining Fedora Legacy content. Please visit http://www.fedoralegacy.org/docs for directions on how to configure yum and apt-get. 5. Bug IDs fixed: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=180159 6. RPMs required: Red Hat Linux 7.3: SRPM: http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/unzip-5.50-31.1.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/7.3/updates/i386/unzip-5.50-31.1.legacy.i386.rpm Red Hat Linux 9: SRPM: http://download.fedoralegacy.org/redhat/9/updates/SRPMS/unzip-5.50-33.1.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/9/updates/i386/unzip-5.50-33.1.legacy.i386.rpm Fedora Core 1: SRPM: http://download.fedoralegacy.org/fedora/1/updates/SRPMS/unzip-5.50-35.1.legacy.src.rpm i386: http://download.fedoralegacy.org/fedora/1/updates/i386/unzip-5.50-35.1.legacy.i386.rpm Fedora Core 2: SRPM: http://download.fedoralegacy.org/fedora/2/updates/SRPMS/unzip-5.50-37.1.legacy.src.rpm i386: http://download.fedoralegacy.org/fedora/2/updates/i386/unzip-5.50-37.1.legacy.i386.rpm Fedora Core 3: SRPM: http://download.fedoralegacy.org/fedora/3/updates/SRPMS/unzip-5.51-4.fc3.1.legacy.src.rpm i386: http://download.fedoralegacy.org/fedora/3/updates/i386/unzip-5.51-4.fc3.1.legacy.i386.rpm x86_64: http://download.fedoralegacy.org/fedora/3/updates/x86_64/unzip-5.51-4.fc3.1.legacy.x86_64.rpm 7. Verification: SHA1 sum Package Name --------------------------------------------------------------------- 5d341df449ddf2d22410bd37bfba7d124960c1ae redhat/7.3/updates/i386/unzip-5.50-31.1.legacy.i386.rpm d76fb8e7acc75cfca6d419b461ded4176348e2a2 redhat/7.3/updates/SRPMS/unzip-5.50-31.1.legacy.src.rpm 00b6b6b34e4229e9a2547418c83470752c9c9ff9 redhat/9/updates/i386/unzip-5.50-33.1.legacy.i386.rpm 30aa7fdaf8aada1dbb30dab4e6058a846d6a1e34 redhat/9/updates/SRPMS/unzip-5.50-33.1.legacy.src.rpm 473bf802cf9257684f534cb99e7813e4257bf189 fedora/1/updates/i386/unzip-5.50-35.1.legacy.i386.rpm 5f5fba20950799ed5676fa1e65044f3b2a61c497 fedora/1/updates/SRPMS/unzip-5.50-35.1.legacy.src.rpm 475ae5bed64d3273ccd986d5ee55bd5300b9b01f fedora/2/updates/i386/unzip-5.50-37.1.legacy.i386.rpm 4d35e2bceeb45747e415b66deea0e955b258889e fedora/2/updates/SRPMS/unzip-5.50-37.1.legacy.src.rpm 3fdea3917830be7fd801a2872ef2caa115592d13 fedora/3/updates/i386/unzip-5.51-4.fc3.1.legacy.i386.rpm a55ddb890db2308be565ea22057624808afda1b3 fedora/3/updates/x86_64/unzip-5.51-4.fc3.1.legacy.x86_64.rpm e1f9b432cec0100d9a50ad99d3b72c8b19aea8b4 fedora/3/updates/SRPMS/unzip-5.51-4.fc3.1.legacy.src.rpm These packages are GPG signed by Fedora Legacy for security. Our key is available from http://www.fedoralegacy.org/about/security.php You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the sha1sum with the following command: sha1sum <filename> 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4667 9. Contact: The Fedora Legacy security contact is <secnotice@xxxxxxxxxxxxxxxx>. More project details at http://www.fedoralegacy.org ---------------------------------------------------------------------
Attachment:
signature.asc
Description: OpenPGP digital signature
-- fedora-legacy-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-legacy-list