Home > Security > Advisories

Advisories

Mandriva Advisories

Package name ncompress
Date August 9th, 2006
Advisory ID MDKSA-2006:140
Affected versions CS3.0, 2006.0
Synopsis Updated ncompress packages fix vulnerability

Problem Description

Tavis Ormandy, of the Google Security Team, discovered that ncompress,
when uncompressing data, performed no bounds checking, which could
allow a specially crafted datastream to underflow a .bss buffer with
attacker controlled data.

Updated packages have been patched to correct this issue.

Updated Packages

Corporate Server 3.0

 30ecc6154bc75783218b82961288b085  corporate/3.0/RPMS/ncompress-4.2.4-28.1.C30mdk.i586.rpm
 bda272f060534aa25bebf22ed852f647  corporate/3.0/SRPMS/ncompress-4.2.4-28.1.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 c9340a5c9bea0316f31fc61f6916f192  x86_64/corporate/3.0/RPMS/ncompress-4.2.4-28.1.C30mdk.x86_64.rpm
 bda272f060534aa25bebf22ed852f647  x86_64/corporate/3.0/SRPMS/ncompress-4.2.4-28.1.C30mdk.src.rpm

Mandriva Linux 2006

 a1e4fe7d74a1c8e043beb83baec7b34b  2006.0/RPMS/ncompress-4.2.4-28.1.20060mdk.i586.rpm
 4b87e1b5ba659ce410067b09a75d669e  2006.0/SRPMS/ncompress-4.2.4-28.1.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

 7ce7f3a618b9c3687936145e2563733a  x86_64/2006.0/RPMS/ncompress-4.2.4-28.1.20060mdk.x86_64.rpm
 4b87e1b5ba659ce410067b09a75d669e  x86_64/2006.0/SRPMS/ncompress-4.2.4-28.1.20060mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1168

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.