TITLE: Debian update for zoo SECUNIA ADVISORY ID: SA19166 VERIFY ADVISORY: http://secunia.com/advisories/19166/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux 3.0 http://secunia.com/product/143/ DESCRIPTION: Debian has issued an update for zoo. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. For more information: SA19002 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.0 alias woody -- Source archives: http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0.dsc Size/MD5 checksum: 548 ef03c4ed23cd19e2b791305544ad7282 http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0.diff.gz Size/MD5 checksum: 7728 07d2db9edea11af77aad4e8d5c9b8874 http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10.orig.tar.gz Size/MD5 checksum: 172629 dca5f2cf71379a51ea1e66b25f1e0294 Alpha architecture: http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_alpha.deb Size/MD5 checksum: 93250 aba6e78276c8e01a0925ab6f510ba338 ARM architecture: http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_arm.deb Size/MD5 checksum: 75576 2580898865c3e4e33a24c858516e1126 Intel IA-32 architecture: http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_i386.deb Size/MD5 checksum: 71756 132e994d1aa2e6b9afdbdc9080096c79 Intel IA-64 architecture: http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_ia64.deb Size/MD5 checksum: 101932 a38a4310f844c787336e25e60d68013f HP Precision architecture: http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_hppa.deb Size/MD5 checksum: 82142 7e58124a7a5fe4f3484061760b7ae31d Motorola 680x0 architecture: http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_m68k.deb Size/MD5 checksum: 69256 28c63fd4df6cef9f61107486833b2391 Big endian MIPS architecture: http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_mips.deb Size/MD5 checksum: 81414 85b3b61aac7b519436b0807c74b6a454 Little endian MIPS architecture: http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_mipsel.deb Size/MD5 checksum: 81482 fe95e1e25a38927bf8f0d00b96175002 PowerPC architecture: http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_powerpc.deb Size/MD5 checksum: 77366 9b266ee5e580e116c8c8aac9c431c7d2 IBM S/390 architecture: http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_s390.deb Size/MD5 checksum: 75504 0e6e36ba663fe90246be243887588b5f Sun Sparc architecture: http://security.debian.org/pool/updates/non-free/z/zoo/zoo_2.10-9woody0_sparc.deb Size/MD5 checksum: 78076 723450123fbfce159e283fc050f1d648 -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0.dsc Size/MD5 checksum: 559 18ceb7390f4c0b6585363fa766919740 http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0.diff.gz Size/MD5 checksum: 8094 26b6614990ef9bb1148d3d21bdc6b8e9 http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10.orig.tar.gz Size/MD5 checksum: 172629 dca5f2cf71379a51ea1e66b25f1e0294 Alpha architecture: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_alpha.deb Size/MD5 checksum: 77732 3a423d0fe79fba46773d9b0dc9297bc2 AMD64 architecture: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_amd64.deb Size/MD5 checksum: 64852 b6a03b631dac2c925c5a12d97ba4edf3 ARM architecture: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_arm.deb Size/MD5 checksum: 62264 151f74479f713a9cfda24a992d1633ad Intel IA-32 architecture: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_i386.deb Size/MD5 checksum: 59796 1f15aac30cb8c74c5607c7a90b871dd7 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_ia64.deb Size/MD5 checksum: 85178 e9d753a1327b5f357438b8a0dd6728fa HP Precision architecture: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_hppa.deb Size/MD5 checksum: 68114 80b4ef98bef5ebb1e639878afe3b07e0 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_m68k.deb Size/MD5 checksum: 55814 e6ed85459200692340233756ae688339 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_mips.deb Size/MD5 checksum: 70240 b9ccb5f4b939bf9b8e27efbab3de82d6 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_mipsel.deb Size/MD5 checksum: 70394 4b515292106e987ea13b2dd447337814 PowerPC architecture: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_powerpc.deb Size/MD5 checksum: 63886 0fa7b5bd7468b49a6e83887fb027a0a8 IBM S/390 architecture: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_s390.deb Size/MD5 checksum: 64796 638e23c7e27ee59cb608a3ef1d8eafd4 Sun Sparc architecture: http://security.debian.org/pool/updates/main/z/zoo/zoo_2.10-11sarge0_sparc.deb Size/MD5 checksum: 60682 e1b1bd3d785f8b154533a48e7931d729 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.10-17. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00070.html OTHER REFERENCES: SA19002: http://secunia.com/advisories/19002/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------