Home > Security > Advisories

Advisories

Mandriva Advisories

Package name gzip
Date June 16th, 2003
Advisory ID MDKSA-2003:068
Affected versions 8.2, 9.0, 9.1, MNF8.2, CS2.1
Synopsis Updated gzip packages fix insecure temporary file creation

Problem Description

A vulnerability exists in znew, a script included with gzip, that
would create temporary files without taking precautions to avoid a
symlink attack. Patches have been applied to make use of mktemp to
generate unique filenames, and properly make use of noclobber in the
script. Likewise, a fix for gzexe which had been applied previously
was incomplete. It has been fixed to make full use of mktemp
everywhere a temporary file is created.

The znew problem was initially reported by Michal Zalewski and was
again reported more recently to Debian by Paul Szabo.

Updated Packages

Mandrakelinux 8.2

 e114d1ff62fe8456d945a11d91362855  8.2/RPMS/gzip-1.2.4a-11.2mdk.i586.rpm
ddf940b835e0718d80840694b65067bc  8.2/SRPMS/gzip-1.2.4a-11.2mdk.src.rpm

Mandrakelinux 8.2/PPC

 0d290a3f2a22396bcc5a6fc7c77aaeaa  ppc/8.2/RPMS/gzip-1.2.4a-11.2mdk.ppc.rpm
ddf940b835e0718d80840694b65067bc  ppc/8.2/SRPMS/gzip-1.2.4a-11.2mdk.src.rpm

Mandrakelinux 9.0

 3e7bff9e74dfacdb5708fdf60b8f18c6  9.0/RPMS/gzip-1.2.4a-11.2mdk.i586.rpm
ddf940b835e0718d80840694b65067bc  9.0/SRPMS/gzip-1.2.4a-11.2mdk.src.rpm

Mandrakelinux 9.1

 fe732815834057c64e3c4e311ee9462d  9.1/RPMS/gzip-1.2.4a-11.2mdk.i586.rpm
ddf940b835e0718d80840694b65067bc  9.1/SRPMS/gzip-1.2.4a-11.2mdk.src.rpm

Mandrakelinux 9.1/PPC

 c4947b2e7a4de6f2e72c038e953a402f  ppc/9.1/RPMS/gzip-1.2.4a-11.2mdk.ppc.rpm
ddf940b835e0718d80840694b65067bc  ppc/9.1/SRPMS/gzip-1.2.4a-11.2mdk.src.rpm

Multi Network Firewall 8.2

 e114d1ff62fe8456d945a11d91362855  mnf8.2/RPMS/gzip-1.2.4a-11.2mdk.i586.rpm
ddf940b835e0718d80840694b65067bc  mnf8.2/SRPMS/gzip-1.2.4a-11.2mdk.src.rpm

Corporate Server 2.1

 3e7bff9e74dfacdb5708fdf60b8f18c6  corporate/2.1/RPMS/gzip-1.2.4a-11.2mdk.i586.rpm
ddf940b835e0718d80840694b65067bc  corporate/2.1/SRPMS/gzip-1.2.4a-11.2mdk.src.rpm

Corporate Server 2.1/X86_64

 f75a916a9aeda90ea43cd4f9855199f6  x86_64/corporate/2.1/RPMS/gzip-1.2.4a-11.2mdk.x86_64.rpm
ddf940b835e0718d80840694b65067bc  x86_64/corporate/2.1/SRPMS/gzip-1.2.4a-11.2mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0367
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1332
http://marc.theaimsgroup.com/?l=bugtraq&m=88998519803911&w=2
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=193375

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.