-----------------------------------------------------------------------
Immunix Secured OS Security Advisory
Packages updated: unzip
Affected products: Immunix OS 7+
Bugs fixed: CAN-2003-0282
Date: Wed Jul 2 2003
Advisory ID: IMNX-2003-7+-017-01
Author: Seth Arnold <sarnold (at) immunix (dot) com [email concealed]>
-----------------------------------------------------------------------
Description:
Jelmer has discovered it is possible to bypass unzip's ".." protections
by including garbage characters between the two periods. A user or
system administrator unpacking an untrusted .zip file could overwrite
arbitrary files on the system. This release includes new protectiosn
to fix this problem.
Package names and locations:
Precompiled binary packages for Immunix 7+ are available at:
http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/unzip-5.50-11_imnx
_1.i386.rpm
Immunix OS 7+ md5sums:
9556c649f1570a9f3d9f13fa18786901 unzip-5.50-11_imnx_1.i386.rpm
GPG verification:
Our public key is available at http://download.immunix.org/GPG_KEY
NOTE:
Ibiblio is graciously mirroring our updates, so if the links above are
slow, please try:
ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
or one of the many mirrors available at:
http://www.ibiblio.org/pub/Linux/MIRRORS.html
ImmunixOS 6.2 is no longer officially supported.
ImmunixOS 7.0 is no longer officially supported.
Contact information:
To report vulnerabilities, please contact security (at) immunix (dot) com. [email concealed]
Immunix attempts to conform to the RFP vulnerability disclosure protocol
http://www.wiretrip.net/rfp/policy.html.
Immunix Secured OS Security Advisory
Packages updated: unzip
Affected products: Immunix OS 7+
Bugs fixed: CAN-2003-0282
Date: Wed Jul 2 2003
Advisory ID: IMNX-2003-7+-017-01
Author: Seth Arnold <sarnold (at) immunix (dot) com [email concealed]>
-----------------------------------------------------------------------
Description:
Jelmer has discovered it is possible to bypass unzip's ".." protections
by including garbage characters between the two periods. A user or
system administrator unpacking an untrusted .zip file could overwrite
arbitrary files on the system. This release includes new protectiosn
to fix this problem.
Package names and locations:
Precompiled binary packages for Immunix 7+ are available at:
http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/unzip-5.50-11_imnx
_1.i386.rpm
Immunix OS 7+ md5sums:
9556c649f1570a9f3d9f13fa18786901 unzip-5.50-11_imnx_1.i386.rpm
GPG verification:
Our public key is available at http://download.immunix.org/GPG_KEY
NOTE:
Ibiblio is graciously mirroring our updates, so if the links above are
slow, please try:
ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
or one of the many mirrors available at:
http://www.ibiblio.org/pub/Linux/MIRRORS.html
ImmunixOS 6.2 is no longer officially supported.
ImmunixOS 7.0 is no longer officially supported.
Contact information:
To report vulnerabilities, please contact security (at) immunix (dot) com. [email concealed]
Immunix attempts to conform to the RFP vulnerability disclosure protocol
http://www.wiretrip.net/rfp/policy.html.
[ reply ]