TITLE: Debian update for sash SECUNIA ADVISORY ID: SA19550 VERIFY ADVISORY: http://secunia.com/advisories/19550/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for sash. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to the use of a vulnerable version of zlib. For more information: SA15949 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1.dsc Size/MD5 checksum: 626 76b6e1da964b13f658be8d47cb86f549 http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1.diff.gz Size/MD5 checksum: 12884 31311a323d287e90fc009a2df0fd4cfa http://security.debian.org/pool/updates/main/s/sash/sash_3.7.orig.tar.gz Size/MD5 checksum: 50337 ee7c7ed5aad76599974d016a6f201ef4 Alpha architecture: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1_alpha.deb Size/MD5 checksum: 351674 0fb668feb016efc21047949391198358 AMD64 architecture: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1_amd64.deb Size/MD5 checksum: 319266 fd8cf5fac1897887967da5d847732a1d ARM architecture: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1_arm.deb Size/MD5 checksum: 275770 ac7639f8b71b102e6af2a8e80ab49160 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1_i386.deb Size/MD5 checksum: 277712 d15fd151bdcc9cb4bd0369d62a6f7275 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1_ia64.deb Size/MD5 checksum: 416856 f57b2aa2f43a79d7a3a79d7448365508 HP Precision architecture: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1_hppa.deb Size/MD5 checksum: 309870 00056dd6979b462d2e00dd8bc2b65c26 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1_m68k.deb Size/MD5 checksum: 236548 5f1788608ab337aa5a33e158d7aecade Big endian MIPS architecture: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1_mips.deb Size/MD5 checksum: 308406 db784c2fa118ba8a39b83c953b258b0f Little endian MIPS architecture: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1_mipsel.deb Size/MD5 checksum: 307280 6d62964036a56514f1cd31f8e9d36cfe PowerPC architecture: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1_powerpc.deb Size/MD5 checksum: 300344 d5a1c9f92acbfd515d0e183af808ca56 IBM S/390 architecture: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1_s390.deb Size/MD5 checksum: 289972 9772185159d49f7a613074faf922d428 Sun Sparc architecture: http://security.debian.org/pool/updates/main/s/sash/sash_3.7-5sarge1_sparc.deb Size/MD5 checksum: 283338 486946909f328f524d03a001dba83f47 -- Debian GNU/Linux unstable alias sid -- Fixed in version 3.7-6. ORIGINAL ADVISORY: http://www.debian.org/security/2006/dsa-1026 OTHER REFERENCES: SA15949: http://secunia.com/advisories/15949/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------