Linux Compatible
  • News
    • Channels
    • Archive
    • Search
    • Submit
  • Articles
    • Categories
  • Knowledgebase
  • Compatibility
    • Search
  • Links
  • Forums
  • Twitter
Advertisement

Latest News
[ Windows | Linux | Apple ]

· Ruby Updates for Debian 7 LTS
· ASUS ROG Strix Scar Edition Laptop Review and more
· Gunicorn Security Update for Debian 7
· ClamAV, Quagga and 6 more updates for Gentoo
· Dune HD PRO 4K Premium Compact Media Player Review and more
· Gigabyte Aorus X470 Gaming 7 Wifi Review and more
· Libreoffice and Libsdl2-image Updates for Debian 8/9
· Chromium and Cfitsio Updates for openSUSE
· MySQL-5.5 Security Update for Debian 8
· AMD 2nd Gen Ryzen Reviews and more

Upcoming News
· Samsung 860 Pro SSD Review @ Vortez
· Raijintek Orcus 240 @ TechPowerUp
· Team Group Cardea Zero 240 GB @ TechPowerUp
· Guru3D Rig of the Month - January 2018
· Cooler Master MK750 Review @ Vortez
· Seagate Skyhawk 10TB SATA III HDD Review
· Vulkan Continues To Show Its Gaming Strength On Low-End Hardware
· Seagate IronWolf ST12000VN0007 12TB Hard Drive Review @ APH Networks
· Sennheiser Game One @ TechPowerUp
· be quiet! Straight Power 11 1000W Power Supply Review

Linux Compatibility
· Brother DCP-L2540DN
· Sound Blaster E5
· WD Elements 500GB external hard drive
· Canon D660U Flatbad scanner
· Umax Astra 4500 USB Scanner
· Logitech QuickCam Pro 4000
· Dell Latitude E6420
· Creative Sound Blaster Z
· Photosmart 5520
· TB-5300 Slimline Design Tablet

New Forum Topics
· Dale
by: Dale Blinco
on: 2018-02-05 00:26
1 replies, 1210 views

· modem driver needed
by: jongiffen777
on: 2017-12-13 11:11
1 replies, 2386 views

· Need a decent browser for XP Pro!
by: percy
on: 2017-12-05 11:02
2 replies, 4276 views

· Comodo Time Machine + Faronics Deep Freeze
by: Jabberwocky
on: 2017-11-15 23:17
1 replies, 2880 views

· Linux compatablity
by: ibme
on: 2017-10-04 18:05
1 replies, 4791 views

News Channels
· Drivers
· Guides
· Reviews
· Security
· Software
· Press Release
· Updates
· Interviews
· Linux
· General
· Debian
· Red Hat
· Slackware
· Gentoo
· Mandriva
· White Box
· SUSE
· GNOME
· KDE
· CentOS
· Ubuntu
· MEPIS
· Android
· Oracle Linux
· Arch Linux

What's New
Login to see an overview of all news stories since your last visit.

Welcome to our website

To take full advantage of all features you need to login or register. Registration is completely free and takes only a few seconds.

Linux Compatible » News » March 2006 » DSA 991-1: New zoo packages fix arbitrary code execution

DSA 991-1: New zoo packages fix arbitrary code execution

Posted by Bob on: 03/10/2006 11:42 AM [ Print | 0 comment(s) ]

The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:




-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 991-1 security@debian.org
http://www.debian.org/security/ Steve Kemp
March 10th, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : zoo
Vulnerability : buffer overflow
Problem type : local (remote)
Debian-specific: no
CVE ID : CVE-2006-0855
BugTraq ID : 16790

Jean-Sébastien Guay-Leroux discovered a buffer overflow in zoo, a
utility to manipulate zoo archives, that could lead to the execution
of arbitrary code when unpacking a specially crafted zoo archive.

For the old stable distribution (woody) this problem has been fixed in
version 2.10-9woody0.

For the stable distribution (sarge) this problem has been fixed in
version 2.10-11sarge0.

For the unstable distribution (sid) this problem has been fixed in
version 2.10-17.

We recommend that you upgrade your zoo package.


Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0.dsc
Size/MD5 checksum: 548 ef03c4ed23cd19e2b791305544ad7282
http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0.diff.gz
Size/MD5 checksum: 7728 07d2db9edea11af77aad4e8d5c9b8874
http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10.orig.tar.gz
Size/MD5 checksum: 172629 dca5f2cf71379a51ea1e66b25f1e0294

Alpha architecture:

http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_alpha.deb
Size/MD5 checksum: 93250 aba6e78276c8e01a0925ab6f510ba338

ARM architecture:

http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_arm.deb
Size/MD5 checksum: 75576 2580898865c3e4e33a24c858516e1126

Intel IA-32 architecture:

http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_i386.deb
Size/MD5 checksum: 71756 132e994d1aa2e6b9afdbdc9080096c79

Intel IA-64 architecture:

http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_ia64.deb
Size/MD5 checksum: 101932 a38a4310f844c787336e25e60d68013f

HP Precision architecture:

http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_hppa.deb
Size/MD5 checksum: 82142 7e58124a7a5fe4f3484061760b7ae31d

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_m68k.deb
Size/MD5 checksum: 69256 28c63fd4df6cef9f61107486833b2391

Big endian MIPS architecture:

http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_mips.deb
Size/MD5 checksum: 81414 85b3b61aac7b519436b0807c74b6a454

Little endian MIPS architecture:

http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_mipsel.deb
Size/MD5 checksum: 81482 fe95e1e25a38927bf8f0d00b96175002

PowerPC architecture:

http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_powerpc.deb
Size/MD5 checksum: 77366 9b266ee5e580e116c8c8aac9c431c7d2

IBM S/390 architecture:

http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_s390.deb
Size/MD5 checksum: 75504 0e6e36ba663fe90246be243887588b5f

Sun Sparc architecture:

http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_sparc.deb
Size/MD5 checksum: 78076 723450123fbfce159e283fc050f1d648


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0.dsc
Size/MD5 checksum: 559 18ceb7390f4c0b6585363fa766919740
http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0.diff.gz
Size/MD5 checksum: 8094 26b6614990ef9bb1148d3d21bdc6b8e9
http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10.orig.tar.gz
Size/MD5 checksum: 172629 dca5f2cf71379a51ea1e66b25f1e0294

Alpha architecture:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_alpha.deb
Size/MD5 checksum: 77732 3a423d0fe79fba46773d9b0dc9297bc2

AMD64 architecture:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_amd64.deb
Size/MD5 checksum: 64852 b6a03b631dac2c925c5a12d97ba4edf3

ARM architecture:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_arm.deb
Size/MD5 checksum: 62264 151f74479f713a9cfda24a992d1633ad

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_i386.deb
Size/MD5 checksum: 59796 1f15aac30cb8c74c5607c7a90b871dd7

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_ia64.deb
Size/MD5 checksum: 85178 e9d753a1327b5f357438b8a0dd6728fa

HP Precision architecture:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_hppa.deb
Size/MD5 checksum: 68114 80b4ef98bef5ebb1e639878afe3b07e0

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_m68k.deb
Size/MD5 checksum: 55814 e6ed85459200692340233756ae688339

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_mips.deb
Size/MD5 checksum: 70240 b9ccb5f4b939bf9b8e27efbab3de82d6

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_mipsel.deb
Size/MD5 checksum: 70394 4b515292106e987ea13b2dd447337814

PowerPC architecture:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_powerpc.deb
Size/MD5 checksum: 63886 0fa7b5bd7468b49a6e83887fb027a0a8

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_s390.deb
Size/MD5 checksum: 64796 638e23c7e27ee59cb608a3ef1d8eafd4

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_sparc.deb
Size/MD5 checksum: 60682 e1b1bd3d785f8b154533a48e7931d729


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show lt;pkggt;' and http://packages.debian.org/lt;pkggt;

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFEEVOEW5ql+IAeqTIRAvs+AKChcPq9RBVsUO3rs9udsgvaIiAu8wCfRe9k
2n1sHOS5tXk067WAHRQWv0E=
=ZeCy
-----END PGP SIGNATURE-----


Bookmark and Share

« DSA 919-2: New curl packages fix potential security problem · Interview with Robin Miller, Author of "Point and Click OpenOffice.org" »

Linux Compatible » News » March 2006 » DSA 991-1: New zoo packages fix arbitrary code execution
All products mentioned are registered trademarks or trademarks of their respective owners.
© 2002-2018 Esselbach Internet Solutions - All Rights Reserved. Terms and privacy policy
Powered by Contentteller® Business Edition