---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for gtetrinet SECUNIA ADVISORY ID: SA21704 VERIFY ADVISORY: http://secunia.com/advisories/21704/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for gtetrinet. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. For more information: SA21691 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2.dsc Size/MD5 checksum: 1458 f0e79e08b32da17b7fec81953058bfd6 http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2.diff.gz Size/MD5 checksum: 6536 8e5ec47971abaefe25c81eddbd08df03 http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8.orig.tar.gz Size/MD5 checksum: 513790 bff5b52ead863ac2ac859880abbab2c4 Alpha architecture: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2_alpha.deb Size/MD5 checksum: 305500 ada4429dedbe5c2a6481e2a0a7c2b8aa AMD64 architecture: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2_amd64.deb Size/MD5 checksum: 295034 657a0a323a479444ed04becdd494726d ARM architecture: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2_arm.deb Size/MD5 checksum: 289166 7fceb7b8fd84d2e4e4792222e1ea74bf Intel IA-32 architecture: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2_i386.deb Size/MD5 checksum: 291430 8e395773c184dfdb379342fc3805e9ce Intel IA-64 architecture: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2_ia64.deb Size/MD5 checksum: 316198 76659d5ee5072dfb30c58d9967239936 HP Precision architecture: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2_hppa.deb Size/MD5 checksum: 297686 c55008b4d7d679311a41a331cd3fc437 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2_m68k.deb Size/MD5 checksum: 284212 9b70187f40dac186929be12f38c900dc Big endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2_mips.deb Size/MD5 checksum: 291736 9a30091ac2ab35a65bb4f0689dca0705 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2_mipsel.deb Size/MD5 checksum: 290484 1fc68ebb2e3ea41326500e6394c41a6e PowerPC architecture: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2_powerpc.deb Size/MD5 checksum: 293458 8b005ce2049acc89205c9aa74dd3fc4f IBM S/390 architecture: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2_s390.deb Size/MD5 checksum: 295194 2fc0597edcad6cc1af5d7b08c734ae08 Sun Sparc architecture: http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.7.8-1sarge2_sparc.deb Size/MD5 checksum: 289322 e944d44ed1aa2e9ae32d9d8571affd33. -- Debian GNU/Linux unstable alias sid -- Fixed packages are reportedly available soon. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1163 OTHER REFERENCES: SA21691: http://secunia.com/advisories/21691/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------