Your message dated Sat, 19 May 2007 22:47:26 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#424686: fixed in zoo 2.10-19
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: zoo
Version: 2.10-18
Severity: grave
Tags: security patch
Justification: user security hole
>From CVE-2007-1673:
"unzoo.c allows remote attackers to cause a denial of service (infinite
loop) via a ZOO archive with a direntry structure that points to a
previous file."
Severity grave becaus zoo might be used by virus scanners:
zoo is suggested by amavisd-new.
unzoo is recommended by clamav.
PoC exploit is at [1]
Patch for zoo is at [2]
Please mention the CVE id in the changelog.
[1] http://www.sfritsch.de/CVE-2007-1673.zoo
[2] http://archives.neohapsis.com/archives/bugtraq/2007-05/0046.html
--- End Message ---
--- Begin Message ---
Source: zoo
Source-Version: 2.10-19
We believe that the bug you reported is fixed in the latest version of
zoo, which is due to be installed in the Debian FTP archive:
zoo_2.10-19.diff.gz
to pool/main/z/zoo/zoo_2.10-19.diff.gz
zoo_2.10-19.dsc
to pool/main/z/zoo/zoo_2.10-19.dsc
zoo_2.10-19_i386.deb
to pool/main/z/zoo/zoo_2.10-19_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jose Carlos Medeiros <[EMAIL PROTECTED]> (supplier of updated zoo package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Fri, 18 May 2007 14:32:12 -0300
Source: zoo
Binary: zoo
Architecture: source i386
Version: 2.10-19
Distribution: unstable
Urgency: low
Maintainer: Jose Carlos Medeiros <[EMAIL PROTECTED]>
Changed-By: Jose Carlos Medeiros <[EMAIL PROTECTED]>
Description:
zoo - manipulate zoo archives
Closes: 424686
Changes:
zoo (2.10-19) unstable; urgency=low
.
* Bump Standards-Version: 3.7.2.
* Added Homepage in debian/control.
* Added patch to solve "CVE-2007-1673: denial of service (infinite loop)",
thanks to Jean-Sébastien Guay-Lerou <[EMAIL PROTECTED]>.
(Closes: #424686)
Files:
7eab7de8eb37505b1775c33fa4e8f76e 617 utils optional zoo_2.10-19.dsc
8dc4b5df78b71a06d14335377b40db77 13242 utils optional zoo_2.10-19.diff.gz
1545c7dc273a3ca9e32fc6e028e5ab33 61248 utils optional zoo_2.10-19_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFGT3kuGKGxzw/lPdkRAml6AKCV7P0OW/g0CwJzHTtW4njQNeqLRQCeODJu
O9zzPj3CQL2d8WwRxPyzE+Y=
=R+8u
-----END PGP SIGNATURE-----
--- End Message ---