blob: 097a411087496c7f548a852540e0e2946bdbf5c5 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200505-05">
<title>gzip: Multiple vulnerabilities</title>
gzip contains multiple vulnerabilities potentially allowing an attacker to
execute arbitrary commands.
<product type="ebuild">gzip</product>
<announced>May 09, 2005</announced>
<revised>May 09, 2005: 01</revised>
<package name="app-arch/gzip" auto="yes" arch="*">
<unaffected range="ge">1.3.5-r6</unaffected>
<vulnerable range="lt">1.3.5-r6</vulnerable>
gzip (GNU zip) is a popular compression program. The included
zgrep utility allows you to grep gzipped files in place.
The gzip and gunzip programs are vulnerable to a race condition
when setting file permissions (CAN-2005-0988), as well as improper
handling of filename restoration (CAN-2005-1228). The zgrep utility
improperly sanitizes arguments, which may come from an untrusted source
<impact type="normal">
These vulnerabilities could allow arbitrary command execution,
changing the permissions of arbitrary files, and installation of files
to an aribitrary location in the filesystem.
There is no known workaround at this time.
All gzip users should upgrade to the latest stable version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-arch/gzip-1.3.5-r6&quot;</code>
<uri link="">CAN-2005-0758</uri>
<uri link="">CAN-2005-0988</uri>
<uri link="">CAN-2005-1228</uri>
<metadata tag="submitter" timestamp="Fri, 06 May 2005 19:23:26 +0000">
<metadata tag="bugReady" timestamp="Mon, 09 May 2005 05:30:13 +0000">