---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Debian update for libsoup SECUNIA ADVISORY ID: SA23770 VERIFY ADVISORY: http://secunia.com/advisories/23770/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for libsoup. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA23734 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup_2.2.3-2sarge1.dsc Size/MD5 checksum: 679 adbad6fcde3be4be01c8eac2da55c712 http://security.debian.org/pool/updates/main/libs/libsoup/libsoup_2.2.3-2sarge1.diff.gz Size/MD5 checksum: 77637 62b8b84a032e79802788ac8fad2a8b1a http://security.debian.org/pool/updates/main/libs/libsoup/libsoup_2.2.3.orig.tar.gz Size/MD5 checksum: 479599 1c3e8c05a702340f9170d30a370a7344 Architecture independent components: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-doc_2.2.3-2sarge1_all.deb Size/MD5 checksum: 89712 28de5acce82f292d53488316d4d21f47 Alpha architecture: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_alpha.deb Size/MD5 checksum: 121006 63acdee0902aef63cd9de5234ba4c75f http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_alpha.deb Size/MD5 checksum: 179700 cae14f17a787681ffd64af595df4320a AMD64 architecture: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_amd64.deb Size/MD5 checksum: 109672 d36f765bcd4bf336f9dfd3efa93aca01 http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_amd64.deb Size/MD5 checksum: 137628 48e8ae141d696f82c38a8e4464da7624 ARM architecture: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_arm.deb Size/MD5 checksum: 100968 2a51612277c7fb122d7244729bdabc3c http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_arm.deb Size/MD5 checksum: 134098 213cfe1f767b22eb8baedaf7dae4e705 HP Precision architecture: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_hppa.deb Size/MD5 checksum: 118582 4a28fbaff712a41026027e46477b2db4 http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_hppa.deb Size/MD5 checksum: 150680 0a5331f409f1255a7afe2136a7b75efa Intel IA-32 architecture: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_i386.deb Size/MD5 checksum: 103256 cc59e5bfe0236843a9f035e21084472e http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_i386.deb Size/MD5 checksum: 124718 1a9f5949d15ee315df06dd7d4f030bad Intel IA-64 architecture: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_ia64.deb Size/MD5 checksum: 137120 3036044195764214e74f6e94e557f373 http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_ia64.deb Size/MD5 checksum: 180256 48c1f4958dd773f963228874cf3b0493 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_m68k.deb Size/MD5 checksum: 104094 ca8ef51bd4f5622530fb246818b9bd38 http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_m68k.deb Size/MD5 checksum: 119564 1400d2fdaa1416454a4bd1a6260064d4 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_mips.deb Size/MD5 checksum: 102578 5cc6cb77f78a633b718111b01cd1ac56 http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_mips.deb Size/MD5 checksum: 145276 89f3fbf38a9a3a6c23d2c7c403a25e35 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_mipsel.deb Size/MD5 checksum: 102560 5f8c1dc2888c63b5fb7cbc7e765227a1 http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_mipsel.deb Size/MD5 checksum: 145232 1ab42e08c45e37a8c42db91eb0d05582 PowerPC architecture: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_powerpc.deb Size/MD5 checksum: 106390 57dc0f86443250f7160202c3514f8e5e http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_powerpc.deb Size/MD5 checksum: 139376 25103bd1d805b97fc9d524602afce1ea IBM S/390 architecture: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_s390.deb Size/MD5 checksum: 115614 2e5422ec386daf008dd8d8c8af725366 http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_s390.deb Size/MD5 checksum: 138072 2d692116c7e50dde248f58b85d9ebdfd Sun Sparc architecture: http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-7_2.2.3-2sarge1_sparc.deb Size/MD5 checksum: 105966 da20be0e50755c15ead7dca8a7327ecc http://security.debian.org/pool/updates/main/libs/libsoup/libsoup2.2-dev_2.2.3-2sarge1_sparc.deb Size/MD5 checksum: 131482 2622023dd2bc6508aeb6a200ba904260 -- Debian GNU/Linux unstable alias sid -- Fixed in 2.2.98-2. ORIGINAL ADVISORY: http://www.debian.org/security/2007/dsa-1248 OTHER REFERENCES: SA23734: http://secunia.com/advisories/21615/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------