Your message dated Tue, 07 Mar 2006 14:03:53 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#354461: fixed in zoo 2.10-17
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Subject: zoo: buffer overflow when processing archives
Package: zoo
Version: 2.10-16
Severity: grave
Justification: user security hole
Tags: security

Hello,

Jean-Sébastien Guay-Leroux has found a buffer overflow vulnerability in zoo:

  o http://secunia.com/advisories/19002/
  o http://seclists.org/lists/fulldisclosure/2006/Feb/0572.html

The full-disclosure post includes a patch.

// Ulf Harnhammar

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-686
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages zoo depends on:
ii  libc6                         2.3.5-13   GNU C Library: Shared libraries an

zoo recommends no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: zoo
Source-Version: 2.10-17

We believe that the bug you reported is fixed in the latest version of
zoo, which is due to be installed in the Debian FTP archive:

zoo_2.10-17.diff.gz
  to pool/main/z/zoo/zoo_2.10-17.diff.gz
zoo_2.10-17.dsc
  to pool/main/z/zoo/zoo_2.10-17.dsc
zoo_2.10-17_i386.deb
  to pool/main/z/zoo/zoo_2.10-17_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jose Carlos Medeiros <[EMAIL PROTECTED]> (supplier of updated zoo package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri,  3 Mar 2006 18:56:02 -0300
Source: zoo
Binary: zoo
Architecture: source i386
Version: 2.10-17
Distribution: unstable
Urgency: low
Maintainer: Jose Carlos Medeiros <[EMAIL PROTECTED]>
Changed-By: Jose Carlos Medeiros <[EMAIL PROTECTED]>
Description: 
 zoo        - manipulate zoo archives
Closes: 354461
Changes: 
 zoo (2.10-17) unstable; urgency=low
 .
   * Added 04_fix_fullpath_buffer_overflow patch to fix a Buffer Overflow,
     CAN-2006-0855. Thanks to Jean-SébastienGuay-Leroux
     <jean-sebastien_at_guay-leroux.com>, (closes: #354461)
Files: 
 123e1150ca19f03d30fa6366215c48c6 617 utils optional zoo_2.10-17.dsc
 77c580eafeb9b64c6977872d2588b2ca 12013 utils optional zoo_2.10-17.diff.gz
 e76d6855bac61e68ff3079138751df0c 62854 utils optional zoo_2.10-17_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFEDeSbGKGxzw/lPdkRAv9WAJ0ZvWWOrIVnZFSFtikXBoCVZ3oS7QCfS/bo
Bwn49GaghHFobPiUhwxC5gg=
=lP9K
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to