---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Debian update for gedit SECUNIA ADVISORY ID: SA15996 VERIFY ADVISORY: http://secunia.com/advisories/15996/ CRITICAL: Less critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for gedit. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. For more information: SA15454 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1.dsc Size/MD5 checksum: 1848 99c4beadcf902ee5857c7a3150f4d0ad http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1.diff.gz Size/MD5 checksum: 54443 96de2c7d0d757d867f46d36490e0ee92 http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3.orig.tar.gz Size/MD5 checksum: 4051445 cbbd5999141d6de932a0afdd55f1aa35 Architecture independent components: http://security.debian.org/pool/updates/main/g/gedit/gedit-common_2.8.3-4sarge1_all.deb Size/MD5 checksum: 1826070 d8519b91f1a8aeba351b1eca19c17712 http://security.debian.org/pool/updates/main/g/gedit/gedit-dev_2.8.3-4sarge1_all.deb Size/MD5 checksum: 44346 01d42b323e7ffdd2a6aba454996a5a48 Alpha architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_alpha.deb Size/MD5 checksum: 523608 1f183dc0960c8e9405953fb0946a1f8b ARM architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_arm.deb Size/MD5 checksum: 457332 476fc39b828ffcd2224f4ce65e71afcc Intel IA-32 architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_i386.deb Size/MD5 checksum: 470122 7162c0ac1f1a7ccd2a315d5b4f01f5d2 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_ia64.deb Size/MD5 checksum: 578896 85c408b6b41585ddb5d366a3d8ea8aea HP Precision architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_hppa.deb Size/MD5 checksum: 505246 2436f36b3b10b36e3af1688e420de02f Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_m68k.deb Size/MD5 checksum: 459142 d475046c385f0ebd06912d89671f89ef Big endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_mips.deb Size/MD5 checksum: 456504 4e3dbf6cf317c281cd5ddfd379bfa6c1 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_mipsel.deb Size/MD5 checksum: 455104 c466bd51b370e0bfe4a0133e9f31e87c PowerPC architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_powerpc.deb Size/MD5 checksum: 473552 7f15b8f11abb2cb017bdc8a9069f1940 IBM S/390 architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_s390.deb Size/MD5 checksum: 492994 d86d79670ebad24391213d3449db0dee Sun Sparc architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_sparc.deb Size/MD5 checksum: 462362 f24856c85dd4f7782a7377423392db70 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.10.3-1. ORIGINAL ADVISORY: http://www.debian.org/security/2005/dsa-753 OTHER REFERENCES: SA15454: http://secunia.com/advisories/15454/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------