Tavis Ormandy from the Google Security Team discovered several vulnerabilities in gzip, the GNU compression utility. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-4334 A null pointer dereference may lead to denial of service if gzip is used in an automated manner. CVE-2006-4335 Missing boundary checks may lead to stack modification, allowing execution of arbitrary code. CVE-2006-4336 A buffer underflow in the pack support code may lead to execution of arbitrary code. CVE-2006-4337 A buffer underflow in the LZH support code may lead to execution of arbitrary code. CVE-2006-4338 An infinite loop may lead to denial of service if gzip is used in an automated manner. For the stable distribution (sarge) these problems have been fixed in version 1.3.5-10sarge2. For the unstable distribution (sid) these problems have been fixed in version 1.3.5-15. We recommend that you upgrade your gzip package.
Tavis Ormandy from the Google Security Team discovered several vulnerabilities in gzip, the GNU compression utility. The Common Vulnerabilities and Exposures project identifies the following problems:
A null pointer dereference may lead to denial of service if gzip is used in an automated manner.
Missing boundary checks may lead to stack modification, allowing execution of arbitrary code.
A buffer underflow in the pack support code may lead to execution of arbitrary code.
A buffer underflow in the LZH support code may lead to execution of arbitrary code.
An infinite loop may lead to denial of service if gzip is used in an automated manner.
For the stable distribution (sarge) these problems have been fixed in version 1.3.5-10sarge2.
For the unstable distribution (sid) these problems have been fixed in version 1.3.5-15.
We recommend that you upgrade your gzip package.
MD5 checksums of the listed files are available in the original advisory.