SCIENTIFIC-LINUX-ERRATA Archives

May 2007

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Content-type:
TEXT/PLAIN; format=flowed; charset=US-ASCII
Sender:
Security Errata for Scientific Linux <[log in to unmask]>
Subject:
From:
Connie Sieh <[log in to unmask]>
Date:
Mon, 14 May 2007 15:51:37 -0500
MIME-version:
1.0
Comments:
To: scientific <[log in to unmask]>
Reply-To:
Connie Sieh <[log in to unmask]>
Parts/Attachments:
TEXT/PLAIN (22 lines)
Synopsis:          Low: unzip security and bug fix update
Issue date:        2007-05-01
CVE Names:         CVE-2005-2475 CVE-2005-4667

A race condition was found in Unzip. Local users could use this flaw to
modify permissions of arbitrary files via a hard link attack on a file
while it was being decompressed (CVE-2005-2475)

A buffer overflow was found in Unzip command line argument handling.
If a user could be tricked into running Unzip with a specially crafted long
file name, an attacker could execute arbitrary code with that user's
privileges. (CVE-2005-4667)

SRPMS:
 	unzip-5.51-9.EL4.5.src.rpm

i386:
 	unzip-5.51-9.EL4.5.i386.rpm

x86_64:
 	unzip-5.51-9.EL4.5.x86_64.rpm

ATOM RSS1 RSS2