AnNyung Official Homepage Home > Update [ 1.1 ]  

HOME
What is AnNyung
Documents
Packages System
White Paper
Download
Update
  . 3.x [RSS]
  . 2.x [RSS]
  . 1.3 [RSS]
  . 1.2 [RSS]
  . 1.1 [RSS]
  . 1.0 [RSS]
FAQ
Hardware
RoadMap
Gallery

  Go oops.org
  AnNyung banner 88x31

  AnNyung 1 banner 80x15
  AnNyung 2 banner 80x15
  AnNyung 3 banner 80x15
  AnNyung banner 80x15
  AnNyung banner 80x15



gzip 보안 업데이트
Web Browser 로는 FTP 접속이 불가능 합니다.

문서번호 : 1121107760
업데이트 : 2005.07.12


상세내용

CAN-2005-0758:

zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows
local users to execute arbitrary commands via filenames that are injected
into a sed script.

CAN-2005-0988 :

Race condition in gzip 1.2.4, 1.3.3, and earlier when decompressing a gzip
allows local users to modify permissions of arbitrary files via a hard link
attack on a file while it is being decompressed, whose permissions are
changed by gzip after the decompression is complete.

CAN-2005-1228 :

Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5
allows remote attackers to write to arbitrary directories via a .. (dot dot)
in the original filename within a compressed file.


Autoupdates 지원 : 지원

update 패키지

  RPMS :

    . gzip-1.3.3-15.i686.rpm


  SRPMS :

    . gzip-1.3.3-15.src.rpm

참고 :
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228



    



 Home > Update [ 1.1 ]

Copyright 2024 OOPS Development Organization 
LAST MODIFIED: 2018/04/10