Skip to navigation

Security Advisory Moderate: gzip security update

Advisory: RHSA-2010:0061-1
Type: Security Advisory
Severity: Moderate
Issued on: 2010-01-20
Last updated on: 2010-01-20
Affected Products: Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux EUS (v. 5.4.z server)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2010-0001

Details

An updated gzip package that fixes one security issue is now available for
Red Hat Enterprise Linux 3, 4, and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

The gzip package provides the GNU gzip data compression program.

An integer underflow flaw, leading to an array index error, was found in
the way gzip expanded archive files compressed with the Lempel-Ziv-Welch
(LZW) compression algorithm. If a victim expanded a specially-crafted
archive, it could cause gzip to crash or, potentially, execute arbitrary
code with the privileges of the user running gzip. This flaw only affects
64-bit systems. (CVE-2010-0001)

Red Hat would like to thank Aki Helin of the Oulu University Secure
Programming Group for responsibly reporting this flaw.

Users of gzip should upgrade to this updated package, which contains a
backported patch to correct this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
gzip-1.3.3-15.rhel3.src.rpm     MD5: 0a84dd2bf337b71b776f6c1cd4ffb4e4
 
IA-32:
gzip-1.3.3-15.rhel3.i386.rpm     MD5: 82d1c5a493b4a1dd748cc883c55ed840
 
x86_64:
gzip-1.3.3-15.rhel3.x86_64.rpm     MD5: 71ff9b4ff0fdfff115452eadaade078b
 
Red Hat Desktop (v. 4)

SRPMS:
gzip-1.3.3-18.el4_8.1.src.rpm     MD5: 38745760cc10f0d7ad03abf1c5fbe2be
 
IA-32:
gzip-1.3.3-18.el4_8.1.i386.rpm     MD5: 606f853dd6fd26e711741eaef9c2eb4b
 
x86_64:
gzip-1.3.3-18.el4_8.1.x86_64.rpm     MD5: cdc35f184de1265843d1d1cfa5f74fca
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
gzip-1.3.5-11.el5_4.1.src.rpm
File outdated by:  RHBA-2011:0976
    MD5: 10a5c07501f439da5c6e5e3db02a62b2
 
IA-32:
gzip-1.3.5-11.el5_4.1.i386.rpm
File outdated by:  RHBA-2011:0976
    MD5: 2721a44fdb05361610973018ce70b7c4
 
IA-64:
gzip-1.3.5-11.el5_4.1.ia64.rpm
File outdated by:  RHBA-2011:0976
    MD5: a6f88e9c76831bbc6da30ccd82d28e62
 
PPC:
gzip-1.3.5-11.el5_4.1.ppc.rpm
File outdated by:  RHBA-2011:0976
    MD5: a2e45b626b290cd3391b7daed076d102
 
s390x:
gzip-1.3.5-11.el5_4.1.s390x.rpm
File outdated by:  RHBA-2011:0976
    MD5: 09e99f25100822c3e2da230e31a273aa
 
x86_64:
gzip-1.3.5-11.el5_4.1.x86_64.rpm
File outdated by:  RHBA-2011:0976
    MD5: b7e5dbe1cc70e5d922a0c15d5db68f20
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
gzip-1.3.3-15.rhel3.src.rpm     MD5: 0a84dd2bf337b71b776f6c1cd4ffb4e4
 
IA-32:
gzip-1.3.3-15.rhel3.i386.rpm     MD5: 82d1c5a493b4a1dd748cc883c55ed840
 
IA-64:
gzip-1.3.3-15.rhel3.ia64.rpm     MD5: c47c2bea12d4b17de548a99d96921930
 
PPC:
gzip-1.3.3-15.rhel3.ppc.rpm     MD5: 670cc13320815b806ac908b078f2a4c4
 
s390:
gzip-1.3.3-15.rhel3.s390.rpm     MD5: 868f5c7f5b8fcc870748489d433a2878
 
s390x:
gzip-1.3.3-15.rhel3.s390x.rpm     MD5: 261356714206953ec9c692ad2c55c977
 
x86_64:
gzip-1.3.3-15.rhel3.x86_64.rpm     MD5: 71ff9b4ff0fdfff115452eadaade078b
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
gzip-1.3.3-18.el4_8.1.src.rpm     MD5: 38745760cc10f0d7ad03abf1c5fbe2be
 
IA-32:
gzip-1.3.3-18.el4_8.1.i386.rpm     MD5: 606f853dd6fd26e711741eaef9c2eb4b
 
IA-64:
gzip-1.3.3-18.el4_8.1.ia64.rpm     MD5: 0d637b1ddd67fdaedd5b4252dae334d1
 
PPC:
gzip-1.3.3-18.el4_8.1.ppc.rpm     MD5: 64b35f54d6af0d8356ab8c68b91bba82
 
s390:
gzip-1.3.3-18.el4_8.1.s390.rpm     MD5: a295bbcf612372432d52cc06e3bbeadc
 
s390x:
gzip-1.3.3-18.el4_8.1.s390x.rpm     MD5: 476a1ead2c2f35493bd67535cb25d621
 
x86_64:
gzip-1.3.3-18.el4_8.1.x86_64.rpm     MD5: cdc35f184de1265843d1d1cfa5f74fca
 
Red Hat Enterprise Linux AS (v. 4.8.z)

SRPMS:
gzip-1.3.3-18.el4_8.1.src.rpm     MD5: 38745760cc10f0d7ad03abf1c5fbe2be
 
IA-32:
gzip-1.3.3-18.el4_8.1.i386.rpm     MD5: 606f853dd6fd26e711741eaef9c2eb4b
 
IA-64:
gzip-1.3.3-18.el4_8.1.ia64.rpm     MD5: 0d637b1ddd67fdaedd5b4252dae334d1
 
PPC:
gzip-1.3.3-18.el4_8.1.ppc.rpm     MD5: 64b35f54d6af0d8356ab8c68b91bba82
 
s390:
gzip-1.3.3-18.el4_8.1.s390.rpm     MD5: a295bbcf612372432d52cc06e3bbeadc
 
s390x:
gzip-1.3.3-18.el4_8.1.s390x.rpm     MD5: 476a1ead2c2f35493bd67535cb25d621
 
x86_64:
gzip-1.3.3-18.el4_8.1.x86_64.rpm     MD5: cdc35f184de1265843d1d1cfa5f74fca
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
gzip-1.3.5-11.el5_4.1.src.rpm
File outdated by:  RHBA-2011:0976
    MD5: 10a5c07501f439da5c6e5e3db02a62b2
 
IA-32:
gzip-1.3.5-11.el5_4.1.i386.rpm
File outdated by:  RHBA-2011:0976
    MD5: 2721a44fdb05361610973018ce70b7c4
 
x86_64:
gzip-1.3.5-11.el5_4.1.x86_64.rpm
File outdated by:  RHBA-2011:0976
    MD5: b7e5dbe1cc70e5d922a0c15d5db68f20
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
gzip-1.3.3-15.rhel3.src.rpm     MD5: 0a84dd2bf337b71b776f6c1cd4ffb4e4
 
IA-32:
gzip-1.3.3-15.rhel3.i386.rpm     MD5: 82d1c5a493b4a1dd748cc883c55ed840
 
IA-64:
gzip-1.3.3-15.rhel3.ia64.rpm     MD5: c47c2bea12d4b17de548a99d96921930
 
x86_64:
gzip-1.3.3-15.rhel3.x86_64.rpm     MD5: 71ff9b4ff0fdfff115452eadaade078b
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
gzip-1.3.3-18.el4_8.1.src.rpm     MD5: 38745760cc10f0d7ad03abf1c5fbe2be
 
IA-32:
gzip-1.3.3-18.el4_8.1.i386.rpm     MD5: 606f853dd6fd26e711741eaef9c2eb4b
 
IA-64:
gzip-1.3.3-18.el4_8.1.ia64.rpm     MD5: 0d637b1ddd67fdaedd5b4252dae334d1
 
x86_64:
gzip-1.3.3-18.el4_8.1.x86_64.rpm     MD5: cdc35f184de1265843d1d1cfa5f74fca
 
Red Hat Enterprise Linux ES (v. 4.8.z)

SRPMS:
gzip-1.3.3-18.el4_8.1.src.rpm     MD5: 38745760cc10f0d7ad03abf1c5fbe2be
 
IA-32:
gzip-1.3.3-18.el4_8.1.i386.rpm     MD5: 606f853dd6fd26e711741eaef9c2eb4b
 
IA-64:
gzip-1.3.3-18.el4_8.1.ia64.rpm     MD5: 0d637b1ddd67fdaedd5b4252dae334d1
 
x86_64:
gzip-1.3.3-18.el4_8.1.x86_64.rpm     MD5: cdc35f184de1265843d1d1cfa5f74fca
 
Red Hat Enterprise Linux EUS (v. 5.4.z server)

SRPMS:
gzip-1.3.5-11.el5_4.1.src.rpm
File outdated by:  RHBA-2011:0976
    MD5: 10a5c07501f439da5c6e5e3db02a62b2
 
IA-32:
gzip-1.3.5-11.el5_4.1.i386.rpm     MD5: 2721a44fdb05361610973018ce70b7c4
 
IA-64:
gzip-1.3.5-11.el5_4.1.ia64.rpm     MD5: a6f88e9c76831bbc6da30ccd82d28e62
 
PPC:
gzip-1.3.5-11.el5_4.1.ppc.rpm     MD5: a2e45b626b290cd3391b7daed076d102
 
s390x:
gzip-1.3.5-11.el5_4.1.s390x.rpm     MD5: 09e99f25100822c3e2da230e31a273aa
 
x86_64:
gzip-1.3.5-11.el5_4.1.x86_64.rpm     MD5: b7e5dbe1cc70e5d922a0c15d5db68f20
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
gzip-1.3.3-15.rhel3.src.rpm     MD5: 0a84dd2bf337b71b776f6c1cd4ffb4e4
 
IA-32:
gzip-1.3.3-15.rhel3.i386.rpm     MD5: 82d1c5a493b4a1dd748cc883c55ed840
 
IA-64:
gzip-1.3.3-15.rhel3.ia64.rpm     MD5: c47c2bea12d4b17de548a99d96921930
 
x86_64:
gzip-1.3.3-15.rhel3.x86_64.rpm     MD5: 71ff9b4ff0fdfff115452eadaade078b
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
gzip-1.3.3-18.el4_8.1.src.rpm     MD5: 38745760cc10f0d7ad03abf1c5fbe2be
 
IA-32:
gzip-1.3.3-18.el4_8.1.i386.rpm     MD5: 606f853dd6fd26e711741eaef9c2eb4b
 
IA-64:
gzip-1.3.3-18.el4_8.1.ia64.rpm     MD5: 0d637b1ddd67fdaedd5b4252dae334d1
 
x86_64:
gzip-1.3.3-18.el4_8.1.x86_64.rpm     MD5: cdc35f184de1265843d1d1cfa5f74fca
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

554418 - CVE-2010-0001 gzip: (64 bit) Integer underflow by decompressing LZW format files


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/