Bug 28990 - lz4 new security issue CVE-2021-3520
Summary: lz4 new security issue CVE-2021-3520
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA7TOO MGA7-64-OK MGA8-64-Ok
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2021-05-28 22:28 CEST by David Walser
Modified: 2021-06-08 16:34 CEST (History)
5 users (show)

See Also:
Source RPM: lz4-1.9.3-1.mga8.src.rpm
CVE: CVE-2021-3520
Status comment:


Attachments

Description David Walser 2021-05-28 22:28:04 CEST
Debian and Ubuntu have issued advisories on May 21 and May 26:
https://www.debian.org/security/2021/dsa-4919
https://ubuntu.com/security/notices/USN-4968-1

Mageia 7 and Mageia 8 are also affected.
David Walser 2021-05-28 22:28:21 CEST

CC: (none) => geiger.david68210
Status comment: (none) => Patch available from upstream
Whiteboard: (none) => MGA8TOO, MGA7TOO

Comment 1 David GEIGER 2021-05-29 08:11:07 CEST
Done for Cauldron, mga8 and mga7!
Comment 2 Lewis Smith 2021-05-29 20:48:30 CEST
Assigning to DavidG as having already done it!

CC: geiger.david68210 => (none)
Assignee: bugsquad => geiger.david68210

Comment 3 David Walser 2021-05-30 04:56:00 CEST
Updated packages in core/updates_testing:
lz4-1.9.2-1.1.mga7
liblz4-devel-1.9.2-1.1.mga7
liblz4-static-devel-1.9.2-1.1.mga7
liblz4_1-1.9.2-1.1.mga7
lz4-1.9.3-1.1.mga8
liblz4-static-devel-1.9.3-1.1.mga8
liblz4_1-1.9.3-1.1.mga8
liblz4-devel-1.9.3-1.1.mga8

from SRPMS:
lz4-1.9.2-1.1.mga7.src.rpm
lz4-1.9.3-1.1.mga8.src.rpm

CC: (none) => geiger.david68210
Status comment: Patch available from upstream => (none)
Assignee: geiger.david68210 => qa-bugs
Whiteboard: MGA8TOO, MGA7TOO => MGA7TOO
Version: Cauldron => 8

Comment 4 Brian Rockwell 2021-05-31 17:12:41 CEST
MGA7 - 64bit

The following 3 packages are going to be installed:

- lib64lz4-devel-1.9.2-1.1.mga7.x86_64
- lib64lz4_1-1.9.2-1.1.mga7.x86_64
- lz4-1.9.2-1.1.mga7.x86_64

compressed a text file

$ lz4 -12 kerneldesktop510141.txt
Compressed filename will be : kerneldesktop510141.txt.lz4 
kerneldesktop510141.txt.lz4 already exists; do you wish to overwrite (y/N) ? y
                                                                             Compressed 381 bytes into 223 bytes ==> 58.53%


Decompressed

$ lz4 -d kerneldesktop510141.txt.lz4
Decoding file kerneldesktop510141.txt 
kerneldesktop510141.txt already exists; do you wish to overwrite (y/N) ? y
                                                                             kerneldesktop510141. : decoded 381 bytes


confirmed the text file looks fine.

CC: (none) => brtians1
Whiteboard: MGA7TOO => MGA7TOO MGA7-64-OK

Comment 5 Brian Rockwell 2021-05-31 17:32:24 CEST
MGA8 - 64

The following 4 packages are going to be installed:

- lib64lz4-devel-1.9.3-1.1.mga8.x86_64
- lib64lz4-static-devel-1.9.3-1.1.mga8.x86_64
- lib64lz4_1-1.9.3-1.1.mga8.x86_64
- lz4-1.9.3-1.1.mga8.x86_64

2.4MB of additional disk space will be used.


$ lz4 -12 lz4_installed
Compressed filename will be : lz4_installed.lz4 
Compressed 248 bytes into 185 bytes ==> 74.60%


$ lz4 -d lz4_installed.lz4
Decoding file lz4_installed 
lz4_installed already exists; do you wish to overwrite (y/N) ? y
lz4_installed.lz4    : decoded 248 bytes 

cat'd the file it looks fine.

Whiteboard: MGA7TOO MGA7-64-OK => MGA7TOO MGA7-64-OK MGA8-64-Ok

Comment 6 Thomas Andrews 2021-06-02 20:04:37 CEST
Validating.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 7 Aurelien Oudelet 2021-06-07 08:45:34 CEST
Advisory:
========================

Updated lz4 packages fix a security vulnerability:

An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well (CVE-2021-3520).

References:
- https://bugs.mageia.org/show_bug.cgi?id=28990
- https://www.debian.org/security/2021/dsa-4919
- https://ubuntu.com/security/notices/USN-4968-1
========================

Updated packages in 7/core/updates_testing:
========================
lz4-1.9.2-1.1.mga7
lib(64)lz4-devel-1.9.2-1.1.mga7
lib(64)lz4-static-devel-1.9.2-1.1.mga7
lib(64)lz4_1-1.9.2-1.1.mga7

from SRPM:
lz4-1.9.2-1.1.mga7.src.rpm

========================

Updated packages in 8/core/updates_testing:
========================
lz4-1.9.3-1.1.mga8
lib(64)lz4-static-devel-1.9.3-1.1.mga8
lib(64)lz4_1-1.9.3-1.1.mga8
lib(64)lz4-devel-1.9.3-1.1.mga8

from SRPM:
lz4-1.9.3-1.1.mga8.src.rpm

CC: (none) => ouaurelien
CVE: (none) => CVE-2021-3520
Keywords: (none) => advisory

Comment 8 Mageia Robot 2021-06-08 16:34:36 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0229.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.