First published: Thu Dec 12 2024(Updated: )
There were several "Security Fixes" for bzip2: out-of-bounds write in function <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED CURRENTRELEASE - broken links of default index.html" href="show_bug.cgi?id=2">BZ2</a>_decompress (<a href="https://access.redhat.com/security/cve/CVE-2019-12900">CVE-2019-12900</a>). e.g. RHSA-2024:8922 and RHSA-2024:10803. The problem is that <a href="https://access.redhat.com/security/cve/CVE-2019-12900">CVE-2019-12900</a> is 5 years old and bogus. The applied patch causes a change in behavior which causes some <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED CURRENTRELEASE - broken links of default index.html" href="show_bug.cgi?id=2">bz2</a> files to no longer decompress. Upstream did a better fix for bzip2 1.0.8. Full story is here: <a href="https://gnu.wildebeest.org/blog/mjw/2019/08/02/bzip2-and-the-cve-that-wasnt/">https://gnu.wildebeest.org/blog/mjw/2019/08/02/bzip2-and-the-cve-that-wasnt/</a> You can see check that the new bzip2 is broken by running the upstream bzip2 testsuite: $ git clone <a href="https://sourceware.org/git/bzip2-tests.git">https://sourceware.org/git/bzip2-tests.git</a> $ cd bzip2-tests $ ./run-tests.sh [...] bzip2: Data integrity error when decompressing. FAIL: ./lbzip2/32767.<a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED CURRENTRELEASE - broken links of default index.html" href="show_bug.cgi?id=2">bz2</a> Decompress [...] Bad results, look for FAIL and !!! in the logs above - ./lbzip2/32767.<a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED CURRENTRELEASE - broken links of default index.html" href="show_bug.cgi?id=2">bz2</a> bad decompress result There should obviously be no FAILs. Please revert this patch or apply the followup patch from 1.0.8: <a href="https://inbox.sourceware.org/bzip2-devel/f9230fc65a3529b59b31f13494c72a1c01a6148e.camel@klomp.org/">https://inbox.sourceware.org/bzip2-devel/f9230fc65a3529b59b31f13494c72a1c01a6148e.camel@klomp.org/</a> <a href="https://sourceware.org/cgit/bzip2/commit/?id=b07b105d1b66e32760095e3602261738443b9e13">https://sourceware.org/cgit/bzip2/commit/?id=b07b105d1b66e32760095e3602261738443b9e13</a> Upstream reminder to Please don't "fix" CVE-2019-12900: <a href="https://inbox.sourceware.org/bzip2-devel/20241108214034.GC8315@gnu.wildebeest.org">https://inbox.sourceware.org/bzip2-devel/20241108214034.GC8315@gnu.wildebeest.org</a>
Affected Software | Affected Version | How to fix |
---|---|---|
bzip2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2332075 is classified as high due to an out-of-bounds write vulnerability in bzip2.
To fix REDHAT-BUG-2332075, update bzip2 to the latest patched version provided by your distribution.
The impact of REDHAT-BUG-2332075 may allow an attacker to exploit an out-of-bounds write, potentially leading to arbitrary code execution.
You should check if your version of bzip2 is included in the list of affected versions related to REDHAT-BUG-2332075.
REDHAT-BUG-2332075 was reported in August 2019 detailing vulnerabilities in bzip2.