To: [email protected]Subject: [ MDKSA-2006:167 ] - Updated gzip packages fix multiple vulnerabilities
Date: Wed, 20 Sep 2006 18:22:00 -0600
From: [email protected]
Reply-To: <xsecurity@mandriva.com.>
Message-Id: <E1GQCKH-0001SP-1L@mercury.mandriva.com.>
Sender: QATeam User <qateam@mercury.mandriva.com.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2006:167
http://www.mandriva.com/security/
_______________________________________________________________________
Package : gzip
Date : September 20, 2006
Affected: 2006.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________
Problem Description:
NULL Dereference (CVE-2006-4334)
A stack modification vulnerability (where a stack buffer can be
modified out of bounds, but not in the traditional stack overrun sense)
exists in the LZH decompression support of gzip. (CVE-2006-4335)
A .bss buffer underflow exists in gzip's pack support, where a loop
from build_tree() does not enforce any lower bound while constructing
the prefix table. (CVE-2006-4336)
A .bss buffer overflow vulnerability exists in gzip's LZH support, due
to it's inability to handle exceptional input in the make_table()
function, a pathological decoding table can be constructed in such a
way as to generate counts so high that the rapid growth of `nextcode`
exceeds the size of the table[] buffer. (CVE-2006-4337)
A possible infinite loop exists in code from unlzh.c for traversing the
branches of a tree structure. This makes it possible to disrupt the
operation of automated systems relying on gzip for data decompression,
resulting in a minor DoS. (CVE-2006-4338) Updated packages have been
patched to address these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2006.0:
6da645cd7adea1af99a3fcd11e5a3fbc 2006.0/i586/gzip-1.2.4a-15.3.20060mdk.i586.rpm
d4acb45be5d2683759578a37d1b8435f 2006.0/SRPMS/gzip-1.2.4a-15.3.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
732d50ab4b4d7e18751f8a24026182d2 2006.0/x86_64/gzip-1.2.4a-15.3.20060mdk.x86_64.rpm
d4acb45be5d2683759578a37d1b8435f 2006.0/SRPMS/gzip-1.2.4a-15.3.20060mdk.src.rpm
Corporate 3.0:
6d80bed89cf647be72f127ed17c5359c corporate/3.0/i586/gzip-1.2.4a-13.5.C30mdk.i586.rpm
6c4e3de8975f5f568c5a7a18e7946112 corporate/3.0/SRPMS/gzip-1.2.4a-13.5.C30mdk.src.rpm
Corporate 3.0/X86_64:
7ed6fcfcaa6a43d5e6d055f72a7f7bc5 corporate/3.0/x86_64/gzip-1.2.4a-13.5.C30mdk.x86_64.rpm
6c4e3de8975f5f568c5a7a18e7946112 corporate/3.0/SRPMS/gzip-1.2.4a-13.5.C30mdk.src.rpm
Corporate 4.0:
da60be3f5d293fa5c246edf6ae256420 corporate/4.0/i586/gzip-1.2.4a-15.3.20060mlcs4.i586.rpm
71ee80833c3dd784d1a604698376b0a4 corporate/4.0/SRPMS/gzip-1.2.4a-15.3.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
940923c3880d84e597a8507155cc81fd corporate/4.0/x86_64/gzip-1.2.4a-15.3.20060mlcs4.x86_64.rpm
71ee80833c3dd784d1a604698376b0a4 corporate/4.0/SRPMS/gzip-1.2.4a-15.3.20060mlcs4.src.rpm
Multi Network Firewall 2.0:
c60c6b5559a4f6f3c9fa811433f2bce6 mnf/2.0/i586/gzip-1.2.4a-13.5.M20mdk.i586.rpm
b68cb1643f57f850fef0224788f95795 mnf/2.0/SRPMS/gzip-1.2.4a-13.5.M20mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFFEa5fmqjQ0CJFipgRAsAYAKCe1lgl7sy1o33Xa63FGEMmW6+GPQCdGhUd
XWAk7HaQOXICJUcuFHxyYSE=
=C3be
-----END PGP SIGNATURE-----