LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 29th, 2014
Linux Security Week: August 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: Low: gzip security update Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
RedHat Linux An updated gzip package is now available. This update has been rated as having low security impact by the Red Hat Security Response Team.
- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: gzip security update
Advisory ID:       RHSA-2005:357-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-357.html
Issue date:        2005-06-13
Updated on:        2005-06-13
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-0758 CAN-2005-0988 CAN-2005-1228
- ---------------------------------------------------------------------

1. Summary:

An updated gzip package is now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The gzip package contains the GNU gzip data compression program.

A bug was found in the way zgrep processes file names. If a user can be
tricked into running zgrep on a file with a carefully crafted file name,
arbitrary commands could be executed as the user running zgrep. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-0758 to this issue.

A bug was found in the way gunzip modifies permissions of files being
decompressed. A local attacker with write permissions in the directory in
which a victim is decompressing a file could remove the file being written
and replace it with a hard link to a different file owned by the victim. 
gunzip then gives the linked file the permissions of the uncompressed file.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-0988 to this issue.

A directory traversal bug was found in the way gunzip processes the -N
flag. If a victim decompresses a file with the -N flag, gunzip fails to
sanitize the path which could result in a file owned by the victim being
overwritten. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-1228 to this issue.

Users of gzip should upgrade to this updated package, which contains
backported patches to correct these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

121514 - CAN-2005-0758 zgrep has security issue in sed usage
155745 - CAN-2005-0988 Race condition in gzip
156266 - CAN-2005-1228 directory traversal bug


6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/gzip-1.3-18.rhel2.src.rpm
050bb94660b780e46c007801901d1f48  gzip-1.3-18.rhel2.src.rpm

i386:
a9c2aeef541764f49a88ecac9c3d9df3  gzip-1.3-18.rhel2.i386.rpm

ia64:
21a0525f3e99b47785846b68f7a12e14  gzip-1.3-18.rhel2.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/gzip-1.3-18.rhel2.src.rpm
050bb94660b780e46c007801901d1f48  gzip-1.3-18.rhel2.src.rpm

ia64:
21a0525f3e99b47785846b68f7a12e14  gzip-1.3-18.rhel2.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/gzip-1.3-18.rhel2.src.rpm
050bb94660b780e46c007801901d1f48  gzip-1.3-18.rhel2.src.rpm

i386:
a9c2aeef541764f49a88ecac9c3d9df3  gzip-1.3-18.rhel2.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/gzip-1.3-18.rhel2.src.rpm
050bb94660b780e46c007801901d1f48  gzip-1.3-18.rhel2.src.rpm

i386:
a9c2aeef541764f49a88ecac9c3d9df3  gzip-1.3-18.rhel2.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/gzip-1.3.3-12.rhel3.src.rpm
c782da7e04807a88d25df7827a106d8c  gzip-1.3.3-12.rhel3.src.rpm

i386:
1f9538d3128e0bcc76736323385e2220  gzip-1.3.3-12.rhel3.i386.rpm

ia64:
6ac0ce3ed4161bce4e767737923c1886  gzip-1.3.3-12.rhel3.ia64.rpm

ppc:
6c44dc3336b806231012820e460de026  gzip-1.3.3-12.rhel3.ppc.rpm

s390:
60174ff6847b82896ffd07669e483393  gzip-1.3.3-12.rhel3.s390.rpm

s390x:
3a38fb878896505c3a96cc4b0ddae4b8  gzip-1.3.3-12.rhel3.s390x.rpm

x86_64:
483982c10b5e7d5d0fe050c409fad0d1  gzip-1.3.3-12.rhel3.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/gzip-1.3.3-12.rhel3.src.rpm
c782da7e04807a88d25df7827a106d8c  gzip-1.3.3-12.rhel3.src.rpm

i386:
1f9538d3128e0bcc76736323385e2220  gzip-1.3.3-12.rhel3.i386.rpm

x86_64:
483982c10b5e7d5d0fe050c409fad0d1  gzip-1.3.3-12.rhel3.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/gzip-1.3.3-12.rhel3.src.rpm
c782da7e04807a88d25df7827a106d8c  gzip-1.3.3-12.rhel3.src.rpm

i386:
1f9538d3128e0bcc76736323385e2220  gzip-1.3.3-12.rhel3.i386.rpm

ia64:
6ac0ce3ed4161bce4e767737923c1886  gzip-1.3.3-12.rhel3.ia64.rpm

x86_64:
483982c10b5e7d5d0fe050c409fad0d1  gzip-1.3.3-12.rhel3.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/gzip-1.3.3-12.rhel3.src.rpm
c782da7e04807a88d25df7827a106d8c  gzip-1.3.3-12.rhel3.src.rpm

i386:
1f9538d3128e0bcc76736323385e2220  gzip-1.3.3-12.rhel3.i386.rpm

ia64:
6ac0ce3ed4161bce4e767737923c1886  gzip-1.3.3-12.rhel3.ia64.rpm

x86_64:
483982c10b5e7d5d0fe050c409fad0d1  gzip-1.3.3-12.rhel3.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gzip-1.3.3-15.rhel4.src.rpm
2ab2fa50a597a9a99484b40e1a15f510  gzip-1.3.3-15.rhel4.src.rpm

i386:
bab580dbcc384693e2c60c9c4eeb743c  gzip-1.3.3-15.rhel4.i386.rpm

ia64:
c1ad3d861270717a1c492f1e962aaab0  gzip-1.3.3-15.rhel4.ia64.rpm

ppc:
46a890b156a25e7390961011aa1f99b3  gzip-1.3.3-15.rhel4.ppc.rpm

s390:
8adbf741f5f5b0b78f153acf305be1b8  gzip-1.3.3-15.rhel4.s390.rpm

s390x:
1656bd93bd9765203bf9996e54148d90  gzip-1.3.3-15.rhel4.s390x.rpm

x86_64:
20aa8fe74a5db703c86f82329d2b3b7e  gzip-1.3.3-15.rhel4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gzip-1.3.3-15.rhel4.src.rpm
2ab2fa50a597a9a99484b40e1a15f510  gzip-1.3.3-15.rhel4.src.rpm

i386:
bab580dbcc384693e2c60c9c4eeb743c  gzip-1.3.3-15.rhel4.i386.rpm

x86_64:
20aa8fe74a5db703c86f82329d2b3b7e  gzip-1.3.3-15.rhel4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gzip-1.3.3-15.rhel4.src.rpm
2ab2fa50a597a9a99484b40e1a15f510  gzip-1.3.3-15.rhel4.src.rpm

i386:
bab580dbcc384693e2c60c9c4eeb743c  gzip-1.3.3-15.rhel4.i386.rpm

ia64:
c1ad3d861270717a1c492f1e962aaab0  gzip-1.3.3-15.rhel4.ia64.rpm

x86_64:
20aa8fe74a5db703c86f82329d2b3b7e  gzip-1.3.3-15.rhel4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gzip-1.3.3-15.rhel4.src.rpm
2ab2fa50a597a9a99484b40e1a15f510  gzip-1.3.3-15.rhel4.src.rpm

i386:
bab580dbcc384693e2c60c9c4eeb743c  gzip-1.3.3-15.rhel4.i386.rpm

ia64:
c1ad3d861270717a1c492f1e962aaab0  gzip-1.3.3-15.rhel4.ia64.rpm

x86_64:
20aa8fe74a5db703c86f82329d2b3b7e  gzip-1.3.3-15.rhel4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Mozilla reports user data leak from Bugzilla project
These 3-D Printed Skeleton Keys Can Pick High-Security Locks in Seconds
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.