Bug 554418 (CVE-2010-0001) - CVE-2010-0001 gzip: (64 bit) Integer underflow by decompressing LZW format files
Summary: CVE-2010-0001 gzip: (64 bit) Integer underflow by decompressing LZW format files
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2010-0001
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 555085 555086 555087 555088 555089 555090 557471
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-01-11 16:53 UTC by Jan Lieskovsky
Modified: 2023-05-11 13:56 UTC (History)
9 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-02-08 17:52:48 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0061 0 normal SHIPPED_LIVE Moderate: gzip security update 2010-01-20 15:03:26 UTC

Description Jan Lieskovsky 2010-01-11 16:53:15 UTC
An integer underflow leading to array index error was found in the way
gzip used to decompress files / archives, compressed with the Lempel–Ziv–Welch
(LZW) compression algorithm. A remote attacker could provide a
specially-crafted LZW compressed gzip archive, which once decompressed
by a local, unsuspecting user would lead to gzip crash, or, potentially to arbitrary code execution with the privileges of the user running gzip.

Upstream patch:
---------------
http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f

Acknowledgements:

Red Hat would like to thank Aki Helin of the Oulu University Secure
Programming Group for responsibly reporting this flaw.

Comment 5 Jan Lieskovsky 2010-01-11 18:29:43 UTC
This issue affects the versions of the gzip package, as shipped
with Red Hat Enterprise Linux 3, 4, and 5.

This issue affects the versions of the gzip package, as shipped
with Fedora release of 11 and 12.

Comment 7 Jan Lieskovsky 2010-01-12 11:23:26 UTC
This issue does NOT affect the versions of ncompress and busybox packages,
as shipped with Red Hat Enterprise Linux 3, 4, and 5.

This issue does NOT affect the versions of ncompress and busybox packages,
as shipped with Fedora release of 11 and 12.

Comment 16 errata-xmlrpc 2010-01-20 15:04:06 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3
  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 5

Via RHSA-2010:0061 https://rhn.redhat.com/errata/RHSA-2010-0061.html

Comment 18 Fedora Update System 2010-01-21 19:56:04 UTC
gzip-1.3.12-14.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/gzip-1.3.12-14.fc12

Comment 19 Fedora Update System 2010-01-21 19:59:20 UTC
gzip-1.3.12-10.fc11 has been submitted as an update for Fedora 11.
http://admin.fedoraproject.org/updates/gzip-1.3.12-10.fc11

Comment 20 Fedora Update System 2010-02-01 01:03:05 UTC
gzip-1.3.12-14.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 21 Fedora Update System 2010-02-01 01:03:50 UTC
gzip-1.3.12-10.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 23 Tomas Hoger 2010-02-08 17:52:48 UTC
ncompress contains similar code where similar fix would apply, the impact is different though.  The difference between gzip and ncompress is in the types used for inbits (long in gzip, int in ncompress) and insize (unsigned in gzip, signed in ncompress).  In ncompress, negative insize will cause inbits to be negative rather than large positive (unsigned insize + 64bit long insize), failing the while-loop condition (inbits > posbits) to not be satisfied.


Note You need to log in before you can comment on or make changes to this bug.