From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-200609-13.xml | 76 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 76 insertions(+) create mode 100644 metadata/glsa/glsa-200609-13.xml (limited to 'metadata/glsa/glsa-200609-13.xml') diff --git a/metadata/glsa/glsa-200609-13.xml b/metadata/glsa/glsa-200609-13.xml new file mode 100644 index 000000000000..0b3c073c2014 --- /dev/null +++ b/metadata/glsa/glsa-200609-13.xml @@ -0,0 +1,76 @@ + + + + gzip: Multiple vulnerabilities + + gzip is affected by multiple vulnerabilities, including buffer overflows + and infinite loops, possibly allowing the execution of arbitrary code. + + gzip + 2006-09-23 + 2006-09-23: 01 + 145511 + remote + + + 1.3.5-r9 + 1.3.5-r9 + + + +

+ gzip, the GNU zip compression utility, is a free and patent + unencumbered replacement for the standard compress utility. +

+
+ +

+ Tavis Ormandy of the Google Security Team has reported multiple + vulnerabilities in gzip. A stack buffer modification vulnerability was + discovered in the LZH decompression code, where a pathological data + stream may result in the modification of stack data such as frame + pointer, return address or saved registers. A static buffer underflow + was discovered in the pack decompression support, allowing a specially + crafted pack archive to underflow a .bss buffer. A static buffer + overflow was uncovered in the LZH decompression code, allowing a data + stream consisting of pathological huffman codes to overflow a .bss + buffer. Multiple infinite loops were also uncovered in the LZH + decompression code. +

+
+ +

+ A remote attacker may create a specially crafted gzip archive, which + when decompressed by a user or automated system exectues arbitrary code + with the privileges of the user id invoking gzip. The infinite loops + may be abused by an attacker to disrupt any automated systems invoking + gzip to handle data decompression. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ All gzip users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/gzip-1.3.5-r9" +
+ + CVE-2006-4334 + CVE-2006-4335 + CVE-2006-4336 + CVE-2006-4337 + CVE-2006-4338 + + + taviso + + + jaervosz + +
-- cgit v1.2.3