TITLE: Debian update for unzip SECUNIA ADVISORY ID: SA17653 VERIFY ADVISORY: http://secunia.com/advisories/17653/ CRITICAL: Not critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux 3.0 http://secunia.com/product/143/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for unzip. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. For more information: SA16309 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.0 alias woody -- Source archives: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4.dsc Size/MD5 checksum: 571 684b8e8a520bfb6fa00ed477e1df9f0e http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4.diff.gz Size/MD5 checksum: 6099 44a7e7bb15dd3ab02a7e001cdaa0ca79 http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50.orig.tar.gz Size/MD5 checksum: 1068379 6d27bcdf9b51d0ad0f78161d0f99582e Alpha architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4_alpha.deb Size/MD5 checksum: 160404 4031c211175ee7c728f8cc42334ae816 ARM architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4_arm.deb Size/MD5 checksum: 139336 7ebcf2fc5f4cc97000954c05bd80966b Intel IA-32 architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4_i386.deb Size/MD5 checksum: 122764 2369eed1365bb4f6aadd09ac75c9693b Intel IA-64 architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4_ia64.deb Size/MD5 checksum: 190982 a0e88f9c1279d3b2c7941690e439ff65 HP Precision architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4_hppa.deb Size/MD5 checksum: 146928 7cfae9b95228d90ca3a1d83bda79655b Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4_m68k.deb Size/MD5 checksum: 119542 f3b8481fb06596dc6fc84aeefd7e5bbf Big endian MIPS architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4_mips.deb Size/MD5 checksum: 142948 dc037b7fa6f703ca7a1b140d2c19911e Little endian MIPS architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4_mipsel.deb Size/MD5 checksum: 143390 3630211263e9245e1773913a2474a9ff PowerPC architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4_powerpc.deb Size/MD5 checksum: 136326 0aa9b78a55e11796693b906f0900ac64 IBM S/390 architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4_s390.deb Size/MD5 checksum: 137018 cfd3ef68d1c6d2ecde54c1a67a6c3adc Sun Sparc architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody4_sparc.deb Size/MD5 checksum: 147472 3f90c2488e0bf3aa6b3f0ec8acd815d9 -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2.dsc Size/MD5 checksum: 528 84e70559fc6ca7a2a9331f31f462b548 http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2.diff.gz Size/MD5 checksum: 4970 69b3a1be17c376bf4419201f4d1ec8a5 http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52.orig.tar.gz Size/MD5 checksum: 1140291 9d23919999d6eac9217d1f41472034a9 Alpha architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2_alpha.deb Size/MD5 checksum: 175420 841029027991b860df6215c994b7c3b6 AMD64 architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2_amd64.deb Size/MD5 checksum: 154804 c3a1cf3a9e5f63af998df54898e4d88f ARM architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2_arm.deb Size/MD5 checksum: 155356 7d0ea21c83b7c01c74c3822abd5f022c Intel IA-32 architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2_i386.deb Size/MD5 checksum: 144864 320a080d0cfbf93a47e75469d95f84e9 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2_ia64.deb Size/MD5 checksum: 206580 ba92d4f8810bc7a44ab7c8957f23222a HP Precision architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2_hppa.deb Size/MD5 checksum: 162756 fd86bf652a165e4f8d390faae9568514 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2_m68k.deb Size/MD5 checksum: 133674 da733ceba3d7467b46a5ec4ba92d4acc Big endian MIPS architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2_mips.deb Size/MD5 checksum: 163318 773c63ffc83a536d8809757d5a8a8b4a Little endian MIPS architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2_mipsel.deb Size/MD5 checksum: 163892 18f2898f965b04c40d72d92c91243dfd PowerPC architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2_powerpc.deb Size/MD5 checksum: 157286 822fb6f064c6a298659f4966034a76fb IBM S/390 architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2_s390.deb Size/MD5 checksum: 156410 7bb65d46d779040eeaddab1ff916c039 Sun Sparc architecture: http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge2_sparc.deb Size/MD5 checksum: 154876 763b24730efd2ac6a334f8d1af1706be -- Debian GNU/Linux unstable alias sid -- Fixed in version 5.52-4. ORIGINAL ADVISORY: http://www.debian.org/security/2005/dsa-903 OTHER REFERENCES: SA16309: http://secunia.com/advisories/16309/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------