Home > Security > Advisories

Advisories

Mandriva Advisories

Package name bzip2
Date January 30th, 2006
Advisory ID MDKSA-2006:026
Affected versions 10.1, CS2.1, CS3.0, MNF2.0, 10.2, 2006.0
Synopsis Updated bzip2 packages fix bzgrep vulnerabilities

Problem Description

A bug was found in the way that bzgrep processed file names. If a
user could be tricked into running bzgrep on a file with a special
file name, it would be possible to execute arbitrary code with the
privileges of the user running bzgrep.

As well, the bzip2 package provided with Mandriva Linux 2006 did not
the patch applied to correct CVE-2005-0953 which was previously fixed
by MDKSA-2005:091; those packages are now properly patched.

The updated packages have been patched to correct these problems.

Updated Packages

Mandrakelinux 10.1

 9ba66ec27bbf76ba782127e9d35b47cf  10.1/RPMS/bzip2-1.0.2-20.4.101mdk.i586.rpm
 aa67aef5d33f2d63dbe1970b75feeb6c  10.1/RPMS/libbzip2_1-1.0.2-20.4.101mdk.i586.rpm
 39ac11e51b9891bdbc781a5f57802532  10.1/RPMS/libbzip2_1-devel-1.0.2-20.4.101mdk.i586.rpm
 7af647d2bd9ed2235ce9f48e45b88510  10.1/SRPMS/bzip2-1.0.2-20.4.101mdk.src.rpm

Mandrakelinux 10.1/X86_64

 c482a9d432f31f6ae2de7b2a68547b97  x86_64/10.1/RPMS/bzip2-1.0.2-20.4.101mdk.x86_64.rpm
 e9ae19f83d4156ff00b64c3bb738094e  x86_64/10.1/RPMS/lib64bzip2_1-1.0.2-20.4.101mdk.x86_64.rpm
 464e89b49a8e8b50bf90c2591d0fe773  x86_64/10.1/RPMS/lib64bzip2_1-devel-1.0.2-20.4.101mdk.x86_64.rpm
 7af647d2bd9ed2235ce9f48e45b88510  x86_64/10.1/SRPMS/bzip2-1.0.2-20.4.101mdk.src.rpm

Corporate Server 2.1

 521d044c36980ad67d31d235cf1290bf  corporate/2.1/RPMS/bzip2-1.0.2-10.4.C21mdk.i586.rpm
 dafdb66e984581813890aa05a9e597e3  corporate/2.1/RPMS/libbzip2_1-1.0.2-10.4.C21mdk.i586.rpm
 5470771fb2586bf4c28439d7923cbf60  corporate/2.1/RPMS/libbzip2_1-devel-1.0.2-10.4.C21mdk.i586.rpm
 9215603a9dc985117ec1f5476fb0e05e  corporate/2.1/SRPMS/bzip2-1.0.2-10.4.C21mdk.src.rpm

Corporate Server 2.1/X86_64

 ec9760c37823edd74fbe67e4f7467607  x86_64/corporate/2.1/RPMS/bzip2-1.0.2-10.4.C21mdk.x86_64.rpm
 709e7e4d97e553500c334d443a99289d  x86_64/corporate/2.1/RPMS/libbzip2_1-1.0.2-10.4.C21mdk.x86_64.rpm
 032616025d51bb2e2c0d957deb606016  x86_64/corporate/2.1/RPMS/libbzip2_1-devel-1.0.2-10.4.C21mdk.x86_64.rpm
 9215603a9dc985117ec1f5476fb0e05e  x86_64/corporate/2.1/SRPMS/bzip2-1.0.2-10.4.C21mdk.src.rpm

Corporate Server 3.0

 abf848e7e0779c5df11a9f52a33c952e  corporate/3.0/RPMS/bzip2-1.0.2-17.4.C30mdk.i586.rpm
 ea41c2d1db6197763b8ae5602de69d47  corporate/3.0/RPMS/libbzip2_1-1.0.2-17.4.C30mdk.i586.rpm
 ae5a1944fc833de24f3d6845e815fb91  corporate/3.0/RPMS/libbzip2_1-devel-1.0.2-17.4.C30mdk.i586.rpm
 8f3a578903df91bcc206e20f51219063  corporate/3.0/SRPMS/bzip2-1.0.2-17.4.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 66856ec28ef826f1eeaca20fb71d1555  x86_64/corporate/3.0/RPMS/bzip2-1.0.2-17.4.C30mdk.x86_64.rpm
 9e46e6e8bc7eb84d74578339ab19dbd3  x86_64/corporate/3.0/RPMS/lib64bzip2_1-1.0.2-17.4.C30mdk.x86_64.rpm
 8a15e6bfcfcf7daee02a3c4770b85b25  x86_64/corporate/3.0/RPMS/lib64bzip2_1-devel-1.0.2-17.4.C30mdk.x86_64.rpm
 8f3a578903df91bcc206e20f51219063  x86_64/corporate/3.0/SRPMS/bzip2-1.0.2-17.4.C30mdk.src.rpm

Multi Network Firewall 2.0

 99d1d85e93178ef63268c0127b22b0ab  mnf/2.0/RPMS/bzip2-1.0.2-17.4.M20mdk.i586.rpm
 624b0cca4f32689662f41862783ec701  mnf/2.0/RPMS/libbzip2_1-1.0.2-17.4.M20mdk.i586.rpm
 384d5f1755aac9bef93454c394a38ba0  mnf/2.0/RPMS/libbzip2_1-devel-1.0.2-17.4.M20mdk.i586.rpm
 2426bf6007f6ed217ccbab7304a7bae6  mnf/2.0/SRPMS/bzip2-1.0.2-17.4.M20mdk.src.rpm

Mandriva Linux LE2005

 7df4a217662f8c37e245eb93d93a371d  10.2/RPMS/bzip2-1.0.2-20.3.102mdk.i586.rpm
 8f786bbbddacf81ccf78858566f4b61e  10.2/RPMS/libbzip2_1-1.0.2-20.3.102mdk.i586.rpm
 560e3fcafd35a390acc92b3585c3e209  10.2/RPMS/libbzip2_1-devel-1.0.2-20.3.102mdk.i586.rpm
 70536dcc4a48fd2c927533f5610e4c30  10.2/SRPMS/bzip2-1.0.2-20.3.102mdk.src.rpm

Mandriva Linux LE2005/X86_64

 fbb29ba214b192f71f93e1651e2859f6  x86_64/10.2/RPMS/bzip2-1.0.2-20.3.102mdk.x86_64.rpm
 fad0d57ba24c7c2564a052621dabef6f  x86_64/10.2/RPMS/lib64bzip2_1-1.0.2-20.3.102mdk.x86_64.rpm
 e88392d200f33e476e43ff9d07576173  x86_64/10.2/RPMS/lib64bzip2_1-devel-1.0.2-20.3.102mdk.x86_64.rpm
 70536dcc4a48fd2c927533f5610e4c30  x86_64/10.2/SRPMS/bzip2-1.0.2-20.3.102mdk.src.rpm

Mandriva Linux 2006

 4e0529ee4c44182a0595aafaa4cc5f07  2006.0/RPMS/bzip2-1.0.3-1.2.20060mdk.i586.rpm
 bce98fe9a3066968923b0bd067908777  2006.0/RPMS/libbzip2_1-1.0.3-1.2.20060mdk.i586.rpm
 cbed01da9b0111e3f47f59735ec16a09  2006.0/RPMS/libbzip2_1-devel-1.0.3-1.2.20060mdk.i586.rpm
 d099cf8e4a81702f32efbd9afe92f208  2006.0/SRPMS/bzip2-1.0.3-1.2.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

 c2c65e542f1e9b34a801f578f3ce0920  x86_64/2006.0/RPMS/bzip2-1.0.3-1.2.20060mdk.x86_64.rpm
 e401cf58458c72b0fa8de87352f81ecf  x86_64/2006.0/RPMS/lib64bzip2_1-1.0.3-1.2.20060mdk.x86_64.rpm
 920aa42c55fc7a97912433ca2c9f5adb  x86_64/2006.0/RPMS/lib64bzip2_1-devel-1.0.3-1.2.20060mdk.x86_64.rpm
 d099cf8e4a81702f32efbd9afe92f208  x86_64/2006.0/SRPMS/bzip2-1.0.3-1.2.20060mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0953

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.