---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for gzip SECUNIA ADVISORY ID: SA22034 VERIFY ADVISORY: http://secunia.com/advisories/22034/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an updated for gzip. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. For more information: SA21996 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.dsc Size/MD5 checksum: 566 b4ef2a9e595a17f8596fdefb1f4b9bf6 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.diff.gz Size/MD5 checksum: 60478 cd1bec47a01d72c800f3bac85dfcc5f3 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5.orig.tar.gz Size/MD5 checksum: 331550 3d6c191dfd2bf307014b421c12dc8469 Alpha architecture: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_alpha.deb Size/MD5 checksum: 83740 450c8d78aa9654ab651ac21115834432 AMD64 architecture: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_amd64.deb Size/MD5 checksum: 75370 cf8896b90d00dc8fce58ab1e88149674 ARM architecture: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_arm.deb Size/MD5 checksum: 76472 24b1723495120c89b9a1a55712fc557d HP Precision architecture: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_hppa.deb Size/MD5 checksum: 79586 9a2d72859917de0f8b269ea95f392b2b Intel IA-32 architecture: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_i386.deb Size/MD5 checksum: 71164 8267f1f753b0a2b380d149280b6e44bb Intel IA-64 architecture: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_ia64.deb Size/MD5 checksum: 91588 30b9aa547cfacc09cee832a9b7516b6e Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_m68k.deb Size/MD5 checksum: 69110 cf17c8d59a6204c2dce1828f2b1f24c6 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mips.deb Size/MD5 checksum: 79488 e2242db1fb6e1c589a67658f96ba7f27 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mipsel.deb Size/MD5 checksum: 79350 da63d665a88c29c6cf07b1ef3566ecd1 PowerPC architecture: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_powerpc.deb Size/MD5 checksum: 76948 12e742fd43b8325e89f3b96e0cdd89a6 IBM S/390 architecture: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_s390.deb Size/MD5 checksum: 77540 0e75950ede6c45a332eead6d71b7e7a2 Sun Sparc architecture: http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_sparc.deb Size/MD5 checksum: 74654 471feed410766674a72327e58702febd -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.3.5-15. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1181 OTHER REFERENCES: SA21996: http://secunia.com/advisories/21996/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------