---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Debian update for gv SECUNIA ADVISORY ID: SA23006 VERIFY ADVISORY: http://secunia.com/advisories/23006/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for gv. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. For more information: SA22787 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1.dsc Size/MD5 checksum: 562 a6882dd7ad872c388de651464046bff1 http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1.diff.gz Size/MD5 checksum: 30773 0b08b9588e0a4d58e6a13ef3f857a8ba http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1.orig.tar.gz Size/MD5 checksum: 453921 ace080d647b70f46fca7946e9543b79e Alpha architecture: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1_alpha.deb Size/MD5 checksum: 204990 cf6a9a52c90e53226eb62ce0f0d02a44 AMD64 architecture: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1_amd64.deb Size/MD5 checksum: 178114 3f878b28ab56953616cfa7819c6208d8 ARM architecture: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1_arm.deb Size/MD5 checksum: 171660 7f395714932a4fa16547b69887060a75 HP Precision architecture: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1_hppa.deb Size/MD5 checksum: 183576 ff1d8233c688b444990ab658ad0adb7a Intel IA-32 architecture: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1_i386.deb Size/MD5 checksum: 169100 46ed76270774df9900d24b96b0f29474 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1_ia64.deb Size/MD5 checksum: 236388 468fe6518efd6064a76cc9796f99463d Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1_m68k.deb Size/MD5 checksum: 152714 0518e0f6514317ae178bee63ac317b56 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1_mips.deb Size/MD5 checksum: 188450 64fbd5940f027516477cad9ac43150b6 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1_mipsel.deb Size/MD5 checksum: 187810 68fc3c4ecafea90c976aef7c680e9d62 PowerPC architecture: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1_powerpc.deb Size/MD5 checksum: 178918 6c315fbf5b3b9523afc02cbf4425cae8 IBM S/390 architecture: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1_s390.deb Size/MD5 checksum: 176388 b04e21f014181006e2a94704e034d5ac Sun Sparc architecture: http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge1_sparc.deb Size/MD5 checksum: 166532 23225642be076f7be8de287e00bb5735 -- Debian GNU/Linux unstable alias sid -- The vulnerability has been fixed in version 3.6.2-2. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1214 OTHER REFERENCES: SA22787: http://secunia.com/advisories/22787/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------