Skip to navigation

Security Advisory Low: unzip security and bug fix update

Advisory: RHSA-2007:0203-7
Type: Security Advisory
Severity: Low
Issued on: 2007-05-01
Last updated on: 2007-05-01
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2005-2475
CVE-2005-4667

Details

Updated unzip packages that fix two security issues and various bugs are
now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

The unzip utility is used to list, test, or extract files from a zip archive.

A race condition was found in Unzip. Local users could use this flaw to
modify permissions of arbitrary files via a hard link attack on a file
while it was being decompressed (CVE-2005-2475)

A buffer overflow was found in Unzip command line argument handling.
If a user could be tricked into running Unzip with a specially crafted long
file name, an attacker could execute arbitrary code with that user's
privileges. (CVE-2005-4667)

As well, this update adds support for files larger than 2GB.

All users of unzip should upgrade to these updated packages, which
contain backported patches that resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
unzip-5.51-9.EL4.5.src.rpm
File outdated by:  RHBA-2008:0752
    MD5: dde2030ecdb6904361b00056d6271c5d
 
IA-32:
unzip-5.51-9.EL4.5.i386.rpm
File outdated by:  RHBA-2008:0752
    MD5: d694a66c36337360c4b4dc46e4295e17
 
x86_64:
unzip-5.51-9.EL4.5.x86_64.rpm
File outdated by:  RHBA-2008:0752
    MD5: c70ff5fb35d0fae41b4440361095f25b
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
unzip-5.51-9.EL4.5.src.rpm
File outdated by:  RHBA-2008:0752
    MD5: dde2030ecdb6904361b00056d6271c5d
 
IA-32:
unzip-5.51-9.EL4.5.i386.rpm
File outdated by:  RHBA-2008:0752
    MD5: d694a66c36337360c4b4dc46e4295e17
 
IA-64:
unzip-5.51-9.EL4.5.ia64.rpm
File outdated by:  RHBA-2008:0752
    MD5: fd654f89bbb37937ac5c0bdf0df80843
 
PPC:
unzip-5.51-9.EL4.5.ppc.rpm
File outdated by:  RHBA-2008:0752
    MD5: fea3d9b6075db7578c5d55dc10712bfc
 
s390:
unzip-5.51-9.EL4.5.s390.rpm
File outdated by:  RHBA-2008:0752
    MD5: e154c6e1e1d5da18a4134582fd78df6f
 
s390x:
unzip-5.51-9.EL4.5.s390x.rpm
File outdated by:  RHBA-2008:0752
    MD5: dc980ef3c7de918e07ed51c73e63ba4a
 
x86_64:
unzip-5.51-9.EL4.5.x86_64.rpm
File outdated by:  RHBA-2008:0752
    MD5: c70ff5fb35d0fae41b4440361095f25b
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
unzip-5.51-9.EL4.5.src.rpm
File outdated by:  RHBA-2008:0752
    MD5: dde2030ecdb6904361b00056d6271c5d
 
IA-32:
unzip-5.51-9.EL4.5.i386.rpm
File outdated by:  RHBA-2008:0752
    MD5: d694a66c36337360c4b4dc46e4295e17
 
IA-64:
unzip-5.51-9.EL4.5.ia64.rpm
File outdated by:  RHBA-2008:0752
    MD5: fd654f89bbb37937ac5c0bdf0df80843
 
x86_64:
unzip-5.51-9.EL4.5.x86_64.rpm
File outdated by:  RHBA-2008:0752
    MD5: c70ff5fb35d0fae41b4440361095f25b
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
unzip-5.51-9.EL4.5.src.rpm
File outdated by:  RHBA-2008:0752
    MD5: dde2030ecdb6904361b00056d6271c5d
 
IA-32:
unzip-5.51-9.EL4.5.i386.rpm
File outdated by:  RHBA-2008:0752
    MD5: d694a66c36337360c4b4dc46e4295e17
 
IA-64:
unzip-5.51-9.EL4.5.ia64.rpm
File outdated by:  RHBA-2008:0752
    MD5: fd654f89bbb37937ac5c0bdf0df80843
 
x86_64:
unzip-5.51-9.EL4.5.x86_64.rpm
File outdated by:  RHBA-2008:0752
    MD5: c70ff5fb35d0fae41b4440361095f25b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

164927 - CVE-2005-2475 TOCTOU issue in unzip
178960 - CVE-2005-4667 unzip long filename buffer overflow
199104 - unzip has not been compiled with large file support and cannot unzip files > 2G
230558 - unzip-5.51-8 leaves files as read-only (400)


References


Keywords

file, large, toctou


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/