[SECURITY] New version of zgv fixes buffer overflows

1998-11-23T00:00:00
ID DEBIAN:92BE9EFB9A2D57ECEFCEA43D786D305F:D9918
Type debian
Reporter Debian
Modified 1998-11-23T00:00:00

Description

We have received reports that the zgv package is vulnerable to buffer overflows.

We recommend you upgrade your zgv package immediately.

wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

Debian GNU/Linux 2.0 alias hamm

This version of Debian was released only for the Intel and the Motorola 68xxx architecture.

Source archives:

ftp://ftp.debian.org/debian/dists/proposed-updates/zgv_2.8-4.1.diff.gz

MD5 checksum: 4b27423a723fa47058a859c2c634484d

ftp://ftp.debian.org/debian/dists/proposed-updates/zgv_2.8-4.1.dsc

MD5 checksum: 7e5a171873f54b469888d959fa478ac0

ftp://ftp.debian.org/debian/dists/hamm/main/source/graphics/zgv_2.8.orig.tar.gz

MD5 checksum: b2421d03a98cc1af9df57a15630f0740

Intel architecture:

ftp://ftp.debian.org/debian/dists/proposed-updates/zgv_2.8-4.1_i386.deb

MD5 checksum: 2434197a4f36e8ae25d5886819554843

Motorola 68xxx architecture:

The zgv package is not available for this architecture.

These files will be moved into ftp://ftp.debian.org/debian/dists/hamm/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

-- Debian GNU/Linux . Security Managers . security@debian.org debian-security-announce@lists.debian.org Christian Hudon . Wichert Akkerman . Martin Schulze <chrish@debian.org> . <wakkerma@debian.org> . <joey@debian.org>