Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Linux :: Apps A-M :: bt397.txt

gzip insecure creation of temp files

Hash: SHA1


OpenPKG Security Advisory                            The OpenPKG Project                   
OpenPKG-SA-2003.031                                          11-Jun-2003

Package:             gzip
Vulnerability:       insecure creation of temporary files
OpenPKG Specific:    no

Affected Releases:   Affected Packages:          Corrected Packages:
OpenPKG CURRENT      <= gzip-1.3.5-20030409      >= gzip-1.3.5-20030610
OpenPKG 1.2          <= gzip-1.3.5-1.2.0         >= gzip-1.3.5-1.2.1
OpenPKG 1.1          <= gzip-1.3.3-1.1.0         >= gzip-1.3.3-1.1.1

Dependent Packages:  none

  According to a Debian security advisory [0], based on hints from Paul
  Szabo, a vulnerability exists in the creation of temporary files in
  the znew(1) utility contained in GNU Zip (gzip) [1]. The GNU Bash
  based znew(1) shell script tried to prevent itself from overwriting
  existing files on shell redirection by using the POSIX "noclobber"
  shell option, but accidentally forgot to check for the results, and
  in case of existing files, stop further processing. This allowed a
  classical "symlink" attack. The Common Vulnerabilities and Exposures
  (CVE) project assigned the id CAN-2003-0367 [2] to the problem.

  Please check whether you are affected by running "<prefix>/bin/rpm
  -q gzip". If you have the "gzip" package installed and its version
  is affected (see above), we recommend that you immediately upgrade
  it (see Solution). [3][4]

  Select the updated source RPM appropriate for your OpenPKG release
  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  location, verify its integrity [9], build a corresponding binary RPM
  from it [3] and update your OpenPKG installation by applying the binary
  RPM [4]. For the current release OpenPKG 1.2, perform the following
  operations to permanently fix the security problem (for other releases
  adjust accordingly).

  $ ftp
  ftp> bin
  ftp> cd release/1.2/UPD
  ftp> get gzip-1.3.5-1.2.1.src.rpm
  ftp> bye
  $ <prefix>/bin/rpm -v --checksig gzip-1.3.5-1.2.1.src.rpm
  $ <prefix>/bin/rpm --rebuild gzip-1.3.5-1.2.1.src.rpm
  $ su -
  # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/gzip-1.3.5-1.2.1.*.rpm


For security reasons, this advisory was digitally signed with the
OpenPGP public key "OpenPKG <>" (ID 63C4CB9F) of the
OpenPKG project which you can retrieve from and
hkp:// Follow the instructions on
for details on how to verify the integrity of this advisory.

Comment: OpenPKG <>


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH