exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 38232

Secunia Security Advisory 38232
Posted Jan 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for gzip. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | c1922b5bde03911aac5a942a447baab33f04139e4c834b917d9b7a3bf6115493

Secunia Security Advisory 38232

Change Mirror Download
----------------------------------------------------------------------



Secunia integrated with Microsoft WSUS
http://secunia.com/blog/71/



----------------------------------------------------------------------

TITLE:
Ubuntu update for gzip

SECUNIA ADVISORY ID:
SA38232

VERIFY ADVISORY:
http://secunia.com/advisories/38232/

DESCRIPTION:
Ubuntu has issued an update for gzip. This fixes multiple
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) and potentially compromise a user's
system.

For more information:
SA38132
SA38220

SOLUTION:
Apply updated packages.

-- Ubuntu 6.06 LTS --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.3.diff.gz
Size/MD5: 60450 f776594c89517aee5199d730262c631a
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.3.dsc
Size/MD5: 580 57e2e736523ddca8eed471e37d95ba56
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5.orig.tar.gz
Size/MD5: 331550 3d6c191dfd2bf307014b421c12dc8469

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.3_amd64.deb
Size/MD5: 76784 382af29edab6956cb7e22d9038e7a0c6

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.3_i386.deb
Size/MD5: 71542 2dba95bc16563deca9cb2043716c0614

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.3_powerpc.deb
Size/MD5: 78570 14fca9db29e847da26a96d1b7eacc987

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.3_sparc.deb
Size/MD5: 75350 a32d045bff7a8b2eded7ca44a6c56a71

-- Ubuntu 8.04 LTS --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-3.2ubuntu0.1.diff.gz
Size/MD5: 21097 35ac77f9806cfaf89b44ad13f036ebb0
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-3.2ubuntu0.1.dsc
Size/MD5: 690 26bb99c8353a1cea7817da3ac5b72936
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12.orig.tar.gz
Size/MD5: 462169 b5bac2d21840ae077e0217bc5e4845b1

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-3.2ubuntu0.1_amd64.deb
Size/MD5: 105556 39a705cdad01d749880b1cc6d128cdbc

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-3.2ubuntu0.1_i386.deb
Size/MD5: 100940 e05abba2953254007df763fd017c99f7

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/g/gzip/gzip_1.3.12-3.2ubuntu0.1_lpia.deb
Size/MD5: 101502 bf3de26dd23cd7514f0d5b224219ac08

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/g/gzip/gzip_1.3.12-3.2ubuntu0.1_powerpc.deb
Size/MD5: 107674 aa414734d70182cfccd0ac02c8873ad2

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/g/gzip/gzip_1.3.12-3.2ubuntu0.1_sparc.deb
Size/MD5: 104294 bb4276c79332aac1f83a49fdaa347374

-- Ubuntu 8.10 --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.8.10.1.diff.gz
Size/MD5: 14889 2de284c09d34e03bcfa28cd23b4dc9bb
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.8.10.1.dsc
Size/MD5: 1094 4849b332ad6c9985cce9055552586bc2
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12.orig.tar.gz
Size/MD5: 462169 b5bac2d21840ae077e0217bc5e4845b1

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.8.10.1_amd64.deb
Size/MD5: 106498 d9d201515bae0a02ba0b4aa624c1bdfd

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.8.10.1_i386.deb
Size/MD5: 101904 4074fbe8d0b57b38718efca5e1d5b6ae

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.8.10.1_lpia.deb
Size/MD5: 102400 02c4cfb84517e6919817c7c647cc4fb1

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.8.10.1_powerpc.deb
Size/MD5: 108666 e1c040d3997a19719553d7696c66ce11

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.8.10.1_sparc.deb
Size/MD5: 105492 22015ce9386f9efcc9e6747cf454bfbb

-- Ubuntu 9.04 --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.9.04.1.diff.gz
Size/MD5: 14895 3490828be3af884992fc987b7c2f5b2b
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.9.04.1.dsc
Size/MD5: 1094 64319e2f975a269dbed1022c6dfef3cf
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12.orig.tar.gz
Size/MD5: 462169 b5bac2d21840ae077e0217bc5e4845b1

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.9.04.1_amd64.deb
Size/MD5: 106504 4572428e480bab4e70f3e37c7000ec03

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.9.04.1_i386.deb
Size/MD5: 101912 9ebe65aa9f52828d4dc119088f8b272f

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.9.04.1_lpia.deb
Size/MD5: 102432 03d12cec2b884662ba1dec7aad3dcd70

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.9.04.1_powerpc.deb
Size/MD5: 108672 4bf7e4175faf5ca41f66a8a039825b01

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/g/gzip/gzip_1.3.12-6ubuntu2.9.04.1_sparc.deb
Size/MD5: 105472 c672bd50726018ee46973bfc7bf048dd

-- Ubuntu 9.10 --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-8ubuntu1.1.diff.gz
Size/MD5: 15815 940f33cfc1386b5697b87cc1392e1bfd
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-8ubuntu1.1.dsc
Size/MD5: 1116 c8a32b46e7f0a68ce00749d69ed1ecfa
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12.orig.tar.gz
Size/MD5: 462169 b5bac2d21840ae077e0217bc5e4845b1

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-8ubuntu1.1_amd64.deb
Size/MD5: 107018 ade7350ccb5f830e190d069386d47db1

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.12-8ubuntu1.1_i386.deb
Size/MD5: 102242 ecd938e16f552d6b6cadfe319f87cb3f

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/g/gzip/gzip_1.3.12-8ubuntu1.1_lpia.deb
Size/MD5: 102672 055afc8fe249dc1ea52459d23e886b2f

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/g/gzip/gzip_1.3.12-8ubuntu1.1_powerpc.deb
Size/MD5: 108986 2ada6675566a5ef68ab42eb172de5a81

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/g/gzip/gzip_1.3.12-8ubuntu1.1_sparc.deb
Size/MD5: 106090 e2e1abe98864d65a73a7302b922f97b1

ORIGINAL ADVISORY:
USN-889-1:
http://www.ubuntu.com/usn/USN-889-1

OTHER REFERENCES:
SA38132:
http://secunia.com/advisories/38132/

SA38220:
http://secunia.com/advisories/38220/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close