[SECURITY] New version of zgv fixes buffer overflows

ID DEBIAN:1A2DBBC749F907F4E4E4B4165E6F4F2F:D9918
Type debian
Reporter Debian
Modified 1998-11-23T04:35:32


We have received reports that the zgv package is vulnerable to buffer overflows.

We recommend you upgrade your zgv package immediately.

wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

Debian GNU/Linux 2.0 alias hamm

This version of Debian was released only for the Intel and the Motorola 68xxx architecture.

Source archives:


MD5 checksum: 4b27423a723fa47058a859c2c634484d


MD5 checksum: 7e5a171873f54b469888d959fa478ac0


MD5 checksum: b2421d03a98cc1af9df57a15630f0740

Intel architecture:


MD5 checksum: 2434197a4f36e8ae25d5886819554843

Motorola 68xxx architecture:

The zgv package is not available for this architecture.

These files will be moved into ftp://ftp.debian.org/debian/dists/hamm/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

-- Debian GNU/Linux . Security Managers . security@debian.org debian-security-announce@lists.debian.org Christian Hudon . Wichert Akkerman . Martin Schulze <chrish@debian.org> . <wakkerma@debian.org> . <joey@debian.org> Attachment: pgp55gDNkC1Wv.pgp Description: PGP signature