DSA-903-2 unzip -- race condition

Related Vulnerabilities: CVE-2005-2475  

The unzip update in DSA 903 contained a regression so that symbolic links that are resolved later in a zip archive aren't supported anymore.  This update corrects this behaviour.  For completeness, below please find the original advisory text: Imran Ghory discovered a race condition in the permissions setting code in unzip. When decompressing a file in a directory an attacker has access to, unzip could be tricked to set the file permissions to a different file the user has permissions to. For the old stable distribution (woody) this problem has been fixed in version 5.50-1woody5. For the stable distribution (sarge) this problem has been fixed in version 5.52-1sarge3. For the unstable distribution (sid) this problem has been fixed in version 5.52-6. We recommend that you upgrade your unzip package.

Debian Security Advisory

DSA-903-2 unzip -- race condition

Date Reported:
21 Nov 2005
Affected Packages:
unzip
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 321927, Bug 343680.
In the Bugtraq database (at SecurityFocus): BugTraq ID 14450.
In Mitre's CVE dictionary: CVE-2005-2475.
More information:

The unzip update in DSA 903 contained a regression so that symbolic links that are resolved later in a zip archive aren't supported anymore.  This update corrects this behaviour.  For completeness, below please find the original advisory text:

Imran Ghory discovered a race condition in the permissions setting code in unzip. When decompressing a file in a directory an attacker has access to, unzip could be tricked to set the file permissions to a different file the user has permissions to.

For the old stable distribution (woody) this problem has been fixed in version 5.50-1woody5.

For the stable distribution (sarge) this problem has been fixed in version 5.52-1sarge3.

For the unstable distribution (sid) this problem has been fixed in version 5.52-6.

We recommend that you upgrade your unzip package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5.dsc
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5.diff.gz
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.50-1woody5_sparc.deb

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3.dsc
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3.diff.gz
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/u/unzip/unzip_5.52-1sarge3_sparc.deb

MD5 checksums of the listed files are available in the original advisory.

MD5 checksums of the listed files are available in the revised advisory.