A gzip security update is available for Red Hat Enterprise Linux
----------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Low: gzip security update
Advisory ID: RHSA-2005:357-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-357.html
Issue date: 2005-06-13
Updated on: 2005-06-13
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-0758 CAN-2005-0988 CAN-2005-1228
----------------------------------------------------------------------
1. Summary:
An updated gzip package is now available.
This update has been rated as having low security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
The gzip package contains the GNU gzip data compression program.
A bug was found in the way zgrep processes file names. If a user can be tricked into running zgrep on a file with a carefully crafted file name, arbitrary commands could be executed as the user running zgrep. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0758 to this issue.
A bug was found in the way gunzip modifies permissions of files being decompressed. A local attacker with write permissions in the directory in which a victim is decompressing a file could remove the file being written and replace it with a hard link to a different file owned by the victim. gunzip then gives the linked file the permissions of the uncompressed file. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0988 to this issue.
A directory traversal bug was found in the way gunzip processes the -N flag. If a victim decompresses a file with the -N flag, gunzip fails to sanitize the path which could result in a file owned by the victim being overwritten. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-1228 to this issue.
Users of gzip should upgrade to this updated package, which contains backported patches to correct these issues.
4. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs.
Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
121514 - CAN-2005-0758 zgrep has security issue in sed usage
155745 - CAN-2005-0988 Race condition in gzip
156266 - CAN-2005-1228 directory traversal bug
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/gzip-1.3-18.rhel2.src.rpm
050bb94660b780e46c007801901d1f48 gzip-1.3-18.rhel2.src.rpm
i386:
a9c2aeef541764f49a88ecac9c3d9df3 gzip-1.3-18.rhel2.i386.rpm
ia64:
21a0525f3e99b47785846b68f7a12e14 gzip-1.3-18.rhel2.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/gzip-1.3-18.rhel2.src.rpm
050bb94660b780e46c007801901d1f48 gzip-1.3-18.rhel2.src.rpm
ia64:
21a0525f3e99b47785846b68f7a12e14 gzip-1.3-18.rhel2.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/gzip-1.3-18.rhel2.src.rpm
050bb94660b780e46c007801901d1f48 gzip-1.3-18.rhel2.src.rpm
i386:
a9c2aeef541764f49a88ecac9c3d9df3 gzip-1.3-18.rhel2.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/gzip-1.3-18.rhel2.src.rpm
050bb94660b780e46c007801901d1f48 gzip-1.3-18.rhel2.src.rpm
i386:
a9c2aeef541764f49a88ecac9c3d9df3 gzip-1.3-18.rhel2.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/gzip-1.3.3-12.rhel3.src.rpm
c782da7e04807a88d25df7827a106d8c gzip-1.3.3-12.rhel3.src.rpm
i386:
1f9538d3128e0bcc76736323385e2220 gzip-1.3.3-12.rhel3.i386.rpm
ia64:
6ac0ce3ed4161bce4e767737923c1886 gzip-1.3.3-12.rhel3.ia64.rpm
ppc:
6c44dc3336b806231012820e460de026 gzip-1.3.3-12.rhel3.ppc.rpm
s390:
60174ff6847b82896ffd07669e483393 gzip-1.3.3-12.rhel3.s390.rpm
s390x:
3a38fb878896505c3a96cc4b0ddae4b8 gzip-1.3.3-12.rhel3.s390x.rpm
x86_64:
483982c10b5e7d5d0fe050c409fad0d1 gzip-1.3.3-12.rhel3.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/gzip-1.3.3-12.rhel3.src.rpm
c782da7e04807a88d25df7827a106d8c gzip-1.3.3-12.rhel3.src.rpm
i386:
1f9538d3128e0bcc76736323385e2220 gzip-1.3.3-12.rhel3.i386.rpm
x86_64:
483982c10b5e7d5d0fe050c409fad0d1 gzip-1.3.3-12.rhel3.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/gzip-1.3.3-12.rhel3.src.rpm
c782da7e04807a88d25df7827a106d8c gzip-1.3.3-12.rhel3.src.rpm
i386:
1f9538d3128e0bcc76736323385e2220 gzip-1.3.3-12.rhel3.i386.rpm
ia64:
6ac0ce3ed4161bce4e767737923c1886 gzip-1.3.3-12.rhel3.ia64.rpm
x86_64:
483982c10b5e7d5d0fe050c409fad0d1 gzip-1.3.3-12.rhel3.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/gzip-1.3.3-12.rhel3.src.rpm
c782da7e04807a88d25df7827a106d8c gzip-1.3.3-12.rhel3.src.rpm
i386:
1f9538d3128e0bcc76736323385e2220 gzip-1.3.3-12.rhel3.i386.rpm
ia64:
6ac0ce3ed4161bce4e767737923c1886 gzip-1.3.3-12.rhel3.ia64.rpm
x86_64:
483982c10b5e7d5d0fe050c409fad0d1 gzip-1.3.3-12.rhel3.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gzip-1.3.3-15.rhel4.src.rpm
2ab2fa50a597a9a99484b40e1a15f510 gzip-1.3.3-15.rhel4.src.rpm
i386:
bab580dbcc384693e2c60c9c4eeb743c gzip-1.3.3-15.rhel4.i386.rpm
ia64:
c1ad3d861270717a1c492f1e962aaab0 gzip-1.3.3-15.rhel4.ia64.rpm
ppc:
46a890b156a25e7390961011aa1f99b3 gzip-1.3.3-15.rhel4.ppc.rpm
s390:
8adbf741f5f5b0b78f153acf305be1b8 gzip-1.3.3-15.rhel4.s390.rpm
s390x:
1656bd93bd9765203bf9996e54148d90 gzip-1.3.3-15.rhel4.s390x.rpm
x86_64:
20aa8fe74a5db703c86f82329d2b3b7e gzip-1.3.3-15.rhel4.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gzip-1.3.3-15.rhel4.src.rpm
2ab2fa50a597a9a99484b40e1a15f510 gzip-1.3.3-15.rhel4.src.rpm
i386:
bab580dbcc384693e2c60c9c4eeb743c gzip-1.3.3-15.rhel4.i386.rpm
x86_64:
20aa8fe74a5db703c86f82329d2b3b7e gzip-1.3.3-15.rhel4.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gzip-1.3.3-15.rhel4.src.rpm
2ab2fa50a597a9a99484b40e1a15f510 gzip-1.3.3-15.rhel4.src.rpm
i386:
bab580dbcc384693e2c60c9c4eeb743c gzip-1.3.3-15.rhel4.i386.rpm
ia64:
c1ad3d861270717a1c492f1e962aaab0 gzip-1.3.3-15.rhel4.ia64.rpm
x86_64:
20aa8fe74a5db703c86f82329d2b3b7e gzip-1.3.3-15.rhel4.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gzip-1.3.3-15.rhel4.src.rpm
2ab2fa50a597a9a99484b40e1a15f510 gzip-1.3.3-15.rhel4.src.rpm
i386:
bab580dbcc384693e2c60c9c4eeb743c gzip-1.3.3-15.rhel4.i386.rpm
ia64:
c1ad3d861270717a1c492f1e962aaab0 gzip-1.3.3-15.rhel4.ia64.rpm
x86_64:
20aa8fe74a5db703c86f82329d2b3b7e gzip-1.3.3-15.rhel4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2005 Red Hat, Inc.
----------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Low: gzip security update
Advisory ID: RHSA-2005:357-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-357.html
Issue date: 2005-06-13
Updated on: 2005-06-13
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-0758 CAN-2005-0988 CAN-2005-1228
----------------------------------------------------------------------
1. Summary:
An updated gzip package is now available.
This update has been rated as having low security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
The gzip package contains the GNU gzip data compression program.
A bug was found in the way zgrep processes file names. If a user can be tricked into running zgrep on a file with a carefully crafted file name, arbitrary commands could be executed as the user running zgrep. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0758 to this issue.
A bug was found in the way gunzip modifies permissions of files being decompressed. A local attacker with write permissions in the directory in which a victim is decompressing a file could remove the file being written and replace it with a hard link to a different file owned by the victim. gunzip then gives the linked file the permissions of the uncompressed file. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0988 to this issue.
A directory traversal bug was found in the way gunzip processes the -N flag. If a victim decompresses a file with the -N flag, gunzip fails to sanitize the path which could result in a file owned by the victim being overwritten. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-1228 to this issue.
Users of gzip should upgrade to this updated package, which contains backported patches to correct these issues.
4. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs.
Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
121514 - CAN-2005-0758 zgrep has security issue in sed usage
155745 - CAN-2005-0988 Race condition in gzip
156266 - CAN-2005-1228 directory traversal bug
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/gzip-1.3-18.rhel2.src.rpm
050bb94660b780e46c007801901d1f48 gzip-1.3-18.rhel2.src.rpm
i386:
a9c2aeef541764f49a88ecac9c3d9df3 gzip-1.3-18.rhel2.i386.rpm
ia64:
21a0525f3e99b47785846b68f7a12e14 gzip-1.3-18.rhel2.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/gzip-1.3-18.rhel2.src.rpm
050bb94660b780e46c007801901d1f48 gzip-1.3-18.rhel2.src.rpm
ia64:
21a0525f3e99b47785846b68f7a12e14 gzip-1.3-18.rhel2.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/gzip-1.3-18.rhel2.src.rpm
050bb94660b780e46c007801901d1f48 gzip-1.3-18.rhel2.src.rpm
i386:
a9c2aeef541764f49a88ecac9c3d9df3 gzip-1.3-18.rhel2.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/gzip-1.3-18.rhel2.src.rpm
050bb94660b780e46c007801901d1f48 gzip-1.3-18.rhel2.src.rpm
i386:
a9c2aeef541764f49a88ecac9c3d9df3 gzip-1.3-18.rhel2.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/gzip-1.3.3-12.rhel3.src.rpm
c782da7e04807a88d25df7827a106d8c gzip-1.3.3-12.rhel3.src.rpm
i386:
1f9538d3128e0bcc76736323385e2220 gzip-1.3.3-12.rhel3.i386.rpm
ia64:
6ac0ce3ed4161bce4e767737923c1886 gzip-1.3.3-12.rhel3.ia64.rpm
ppc:
6c44dc3336b806231012820e460de026 gzip-1.3.3-12.rhel3.ppc.rpm
s390:
60174ff6847b82896ffd07669e483393 gzip-1.3.3-12.rhel3.s390.rpm
s390x:
3a38fb878896505c3a96cc4b0ddae4b8 gzip-1.3.3-12.rhel3.s390x.rpm
x86_64:
483982c10b5e7d5d0fe050c409fad0d1 gzip-1.3.3-12.rhel3.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/gzip-1.3.3-12.rhel3.src.rpm
c782da7e04807a88d25df7827a106d8c gzip-1.3.3-12.rhel3.src.rpm
i386:
1f9538d3128e0bcc76736323385e2220 gzip-1.3.3-12.rhel3.i386.rpm
x86_64:
483982c10b5e7d5d0fe050c409fad0d1 gzip-1.3.3-12.rhel3.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/gzip-1.3.3-12.rhel3.src.rpm
c782da7e04807a88d25df7827a106d8c gzip-1.3.3-12.rhel3.src.rpm
i386:
1f9538d3128e0bcc76736323385e2220 gzip-1.3.3-12.rhel3.i386.rpm
ia64:
6ac0ce3ed4161bce4e767737923c1886 gzip-1.3.3-12.rhel3.ia64.rpm
x86_64:
483982c10b5e7d5d0fe050c409fad0d1 gzip-1.3.3-12.rhel3.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/gzip-1.3.3-12.rhel3.src.rpm
c782da7e04807a88d25df7827a106d8c gzip-1.3.3-12.rhel3.src.rpm
i386:
1f9538d3128e0bcc76736323385e2220 gzip-1.3.3-12.rhel3.i386.rpm
ia64:
6ac0ce3ed4161bce4e767737923c1886 gzip-1.3.3-12.rhel3.ia64.rpm
x86_64:
483982c10b5e7d5d0fe050c409fad0d1 gzip-1.3.3-12.rhel3.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gzip-1.3.3-15.rhel4.src.rpm
2ab2fa50a597a9a99484b40e1a15f510 gzip-1.3.3-15.rhel4.src.rpm
i386:
bab580dbcc384693e2c60c9c4eeb743c gzip-1.3.3-15.rhel4.i386.rpm
ia64:
c1ad3d861270717a1c492f1e962aaab0 gzip-1.3.3-15.rhel4.ia64.rpm
ppc:
46a890b156a25e7390961011aa1f99b3 gzip-1.3.3-15.rhel4.ppc.rpm
s390:
8adbf741f5f5b0b78f153acf305be1b8 gzip-1.3.3-15.rhel4.s390.rpm
s390x:
1656bd93bd9765203bf9996e54148d90 gzip-1.3.3-15.rhel4.s390x.rpm
x86_64:
20aa8fe74a5db703c86f82329d2b3b7e gzip-1.3.3-15.rhel4.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gzip-1.3.3-15.rhel4.src.rpm
2ab2fa50a597a9a99484b40e1a15f510 gzip-1.3.3-15.rhel4.src.rpm
i386:
bab580dbcc384693e2c60c9c4eeb743c gzip-1.3.3-15.rhel4.i386.rpm
x86_64:
20aa8fe74a5db703c86f82329d2b3b7e gzip-1.3.3-15.rhel4.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gzip-1.3.3-15.rhel4.src.rpm
2ab2fa50a597a9a99484b40e1a15f510 gzip-1.3.3-15.rhel4.src.rpm
i386:
bab580dbcc384693e2c60c9c4eeb743c gzip-1.3.3-15.rhel4.i386.rpm
ia64:
c1ad3d861270717a1c492f1e962aaab0 gzip-1.3.3-15.rhel4.ia64.rpm
x86_64:
20aa8fe74a5db703c86f82329d2b3b7e gzip-1.3.3-15.rhel4.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gzip-1.3.3-15.rhel4.src.rpm
2ab2fa50a597a9a99484b40e1a15f510 gzip-1.3.3-15.rhel4.src.rpm
i386:
bab580dbcc384693e2c60c9c4eeb743c gzip-1.3.3-15.rhel4.i386.rpm
ia64:
c1ad3d861270717a1c492f1e962aaab0 gzip-1.3.3-15.rhel4.ia64.rpm
x86_64:
20aa8fe74a5db703c86f82329d2b3b7e gzip-1.3.3-15.rhel4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2005 Red Hat, Inc.