Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in zziplib
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in zziplib
ID: DTSA-56-1
Distribution: Debian Testing
Plattformen: Debian testing
Datum: Di, 4. September 2007, 23:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1614
Applikationen: ZZIPlib

Originalnachricht


--===============8923671945996707236==
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature";
boundary="+QahgC5+KEYLbs62"
Content-Disposition: inline


--+QahgC5+KEYLbs62
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

- --------------------------------------------------------------------------
Debian Testing Security Advisory DTSA-56-1 September 4st, 2007
secure-testing-team at lists.alioth.debian.org Nico Golde
http://secure-testing-master.debian.net/
- --------------------------------------------------------------------------

Package : zziplib
Vulnerability : buffer overflow
Problem-Scope : remote
Debian-specific: no
CVE ID : CVE-2007-1614

The zziplib library is prone to a stack-based buffer overflow
which might allow remote attackers to execute arbitrary code
or denial of service (application crash) via a long file name.

For the testing distribution (lenny) this is fixed in version
0.12.83-8lenny1

For the unstable distribution (sid) this is fixed in version
0.13.49-0

This upgrade is recommended if you use zziplib
(zziplib-bin, libzzip-0-12, libzzip-dev)

Upgrade Instructions
- --------------------

To use the Debian testing security archive, add the following lines to
your /etc/apt/sources.list:

deb http://security.debian.org/ testing/updates main contrib non-free
deb-src http://security.debian.org/ testing/updates main contrib non-free

To install the update, run this command as root:

apt-get update && apt-get upgrade

For further information about the Debian testing security team, please refer
to http://secure-testing-master.debian.net/


--+QahgC5+KEYLbs62
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG3cbiHYflSXNkfP8RArNgAJ4zZd6Fzv9hJhQ6fVKVhz7aFbFJTwCgnkZZ
G75oITJUQC6S3xRJRjXp2/Y=
=2JtQ
-----END PGP SIGNATURE-----

--+QahgC5+KEYLbs62--


--===============8923671945996707236==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
secure-testing-announce mailing list
secure-testing-announce@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/secure-testing-announce
--===============8923671945996707236==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung