User: Password:
Subscribe / Log in / New account

Debian alert DSA-1149-1 (ncompress)

From: (Martin Schulze)
To: (Debian Security Announcements)
Subject:  [SECURITY] [DSA 1149-1] New ncompress packages fix potential code execution
Date:  Thu, 10 Aug 2006 07:33:16 +0200 (CEST)

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1149-1 Martin Schulze August 10th, 2006 - -------------------------------------------------------------------------- Package : ncompress Vulnerability : buffer underflow Problem type : local (remote) Debian-specific: no CVE ID : CVE-2006-1168 Tavis Ormandy from the Google Security Team discovered a missing boundary check in ncompress, the original Lempel-Ziv compress and uncompress programs, which allows a specially crafted datastream to underflow a buffer with attacker controlled data. For the stable distribution (sarge) this problem has been fixed in version 4.2.4-15sarge2. For the unstable distribution (sid) this problem has been fixed in version 4.2.4-15sarge2. We recommend that you upgrade your ncompress package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: Size/MD5 checksum: 591 8fa14e666180e8a37491dcd33114dbff Size/MD5 checksum: 8124 1b7aa0d3079f334202df5d1c77e0f9bf Size/MD5 checksum: 31765 7ef0d51aee53b6cd5c6aefe637491281 Alpha architecture: Size/MD5 checksum: 24370 72b955790079338f98afd62c49644897 AMD64 architecture: Size/MD5 checksum: 22924 58d6732c316a9317171c97e74e2cbe44 ARM architecture: Size/MD5 checksum: 22522 3ec1cfdab5e4811ca5246a11b94b244d Intel IA-32 architecture: Size/MD5 checksum: 22158 a875189b26255c72ad2ec532c23eef05 Intel IA-64 architecture: Size/MD5 checksum: 26442 ef71240d1b7b4a699b5f817a46f7ead9 HP Precision architecture: Size/MD5 checksum: 24484 51c63bab7d53aa3392e268aec4d271ab Motorola 680x0 architecture: Size/MD5 checksum: 21536 2cf5bbb67a3f32db857c75a2d352f47a Big endian MIPS architecture: Size/MD5 checksum: 23878 a71db49787837da587552030045c73c1 Little endian MIPS architecture: Size/MD5 checksum: 23822 22ad68863b79b4bdf5302141be22deb6 PowerPC architecture: Size/MD5 checksum: 22912 bafe112da108e4b66d64342b55ac4a47 IBM S/390 architecture: Size/MD5 checksum: 22958 a8f180c5182ab1040746e66dfa99a6e1 Sun Sparc architecture: Size/MD5 checksum: 22532 db6aed643f82c6a0c0bdfded603d97be These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: Package info: `apt-cache show <pkg>' and<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFE2sUbW5ql+IAeqTIRAtWPAJ9uT1SODfKinzWORoDT4L+Y5o+P6ACfTdce O16Pi4c2wgq4693Ir5wG0mU= =hR4S -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to with a subject of "unsubscribe". Trouble? Contact

(Log in to post comments)

Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds