---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Debian update for reprepro SECUNIA ADVISORY ID: SA27334 VERIFY ADVISORY: http://secunia.com/advisories/27334/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for reprepro. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. For more information: SA26678 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1.dsc Size/MD5 checksum: 934 a9e32d707c054a2835e49b11d84abe79 http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1.diff.gz Size/MD5 checksum: 6837 478f94313599732c8f8defa8ec7c2e60 http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1.orig.tar.gz Size/MD5 checksum: 294938 8f171568b73b258bcf2e83a424c741c6 Alpha architecture: http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1_alpha.deb Size/MD5 checksum: 233240 cd1298547400c3dcdbae69213c7a116d AMD64 architecture: http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1_amd64.deb Size/MD5 checksum: 219738 4e0e51365740d3a9d7c2262c58c51ad9 ARM architecture: http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1_arm.deb Size/MD5 checksum: 200764 2713c4a6f8160eff1df1aacb9c73a037 HP Precision architecture: http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1_hppa.deb Size/MD5 checksum: 222708 e21a90fb3e6461fb3bcd35f7e940aaea Intel IA-32 architecture: http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1_i386.deb Size/MD5 checksum: 207614 e7d5520eeccc12e4fe3269fad2dfc114 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1_ia64.deb Size/MD5 checksum: 305744 372b85433ec8ffee768645cf017b8493 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1_mips.deb Size/MD5 checksum: 215216 2d0a2442cbdd5a11413545e7aecf3ba0 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1_mipsel.deb Size/MD5 checksum: 216124 fea785909c963b3ed18e6f15e51bda23 PowerPC architecture: http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1_powerpc.deb Size/MD5 checksum: 214286 4bafb8847d749ed05a0b9195db582cf7 IBM S/390 architecture: http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1_s390.deb Size/MD5 checksum: 214650 fa8bcb55f53290e2be693b29f6a28e33 Sun Sparc architecture: http://security.debian.org/pool/updates/main/r/reprepro/reprepro_1.3.1+1-1_sparc.deb Size/MD5 checksum: 200260 d2ffde092084998af9cd887d5e06c12b -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.2.4-1. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00170.html OTHER REFERENCES: SA26678: http://secunia.com/advisories/26678/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------