---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Debian update for tk8.4 SECUNIA ADVISORY ID: SA27801 VERIFY ADVISORY: http://secunia.com/advisories/27801/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for tk8.4. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. For more information: SA26942 SOLUTION: Apply updated packages. Note: Update packages for Debian GNU/Linux 3.1 alias sarge for the SPARC architecture will be released later. -- Debian 3.1 (oldstable) -- Source archives: http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1.diff.gz Size/MD5 checksum: 19132 8ded0a058cbe9140f905cbd769622d45 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9.orig.tar.gz Size/MD5 checksum: 3266500 1b64258abaf258e9a86f331d8de17a71 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1.dsc Size/MD5 checksum: 672 3a7de8981a9239e231c55486ee308de3 Architecture independent packages: http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-doc_8.4.9-1sarge1_all.deb Size/MD5 checksum: 775182 df1628c1fadebdf2ce7d4ab138a0dcca alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.9-1sarge1_alpha.deb Size/MD5 checksum: 940380 984e7d1787ea4bf5df7d05be8feaee31 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1_alpha.deb Size/MD5 checksum: 1031394 a68b8bd438ce30ad2899e893abbdf042 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1_amd64.deb Size/MD5 checksum: 976380 299c8fca87bdbe6a162edea32d44c38d http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.9-1sarge1_amd64.deb Size/MD5 checksum: 810012 3b83261ac52a6a630958969f8b68f044 arm architecture (ARM) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1_arm.deb Size/MD5 checksum: 945218 6f016ddd99884ffb1a7fa636d5c157fd http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.9-1sarge1_arm.deb Size/MD5 checksum: 823888 2c55586df75b8ce85b71f396aa511ce9 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.9-1sarge1_hppa.deb Size/MD5 checksum: 912732 100772a425baf8736ac2e59e11a111e4 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1_hppa.deb Size/MD5 checksum: 1046506 ac02d6ea5b9249cfc8d8bd3f7905dd03 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1_i386.deb Size/MD5 checksum: 956128 8508b0b84a8a8887903ee61096c85c39 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.9-1sarge1_i386.deb Size/MD5 checksum: 793304 9bc383580f29575f49035ec640595df4 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.9-1sarge1_ia64.deb Size/MD5 checksum: 1053280 c1684368d5bbdc14919cb11ad26bc726 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1_ia64.deb Size/MD5 checksum: 1182358 2a0c99c93455876bf42867bc83620b00 m68k architecture (Motorola Mc680x0) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1_m68k.deb Size/MD5 checksum: 909088 ccece33fe08dc605e03044dad3a43661 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.9-1sarge1_m68k.deb Size/MD5 checksum: 696326 0ab235f58988c18975e43089c3e10af0 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.9-1sarge1_mips.deb Size/MD5 checksum: 836414 48299e087ae5dc67625b27d7f0854e32 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1_mips.deb Size/MD5 checksum: 974766 f39594e6990da6263c3bdba7ee4aea86 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1_mipsel.deb Size/MD5 checksum: 971980 1c4ef565e11e47071ea107f141170512 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.9-1sarge1_mipsel.deb Size/MD5 checksum: 834546 4597a7304dd446b7925e2c063545624c powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.9-1sarge1_powerpc.deb Size/MD5 checksum: 809966 12bcccfa9063c8a62f0dd7057dfe8504 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1_powerpc.deb Size/MD5 checksum: 972248 f0bd560ab2cee8d267e9dbb9094058a3 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.9-1sarge1_s390.deb Size/MD5 checksum: 807346 ecd93447c67c3699fd208103d816978c http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.9-1sarge1_s390.deb Size/MD5 checksum: 979828 d1bac5275945a17ed5367dda901430f8 -- Debian (stable) -- Source archives: http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1.diff.gz Size/MD5 checksum: 21554 9ebdf19de1ed8568cd28c25eb972e2d3 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1.dsc Size/MD5 checksum: 673 61cb74d2fb34540869e30d14ea1e40d9 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12.orig.tar.gz Size/MD5 checksum: 3245547 316491cb82d898b434842353aed1f0d6 Architecture independent packages: http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-doc_8.4.12-1etch1_all.deb Size/MD5 checksum: 788108 6f9d55cb28c45666ae3b32df3c1ca795 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.12-1etch1_alpha.deb Size/MD5 checksum: 967902 85a3c359c59496341cec367587b900a0 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1_alpha.deb Size/MD5 checksum: 1050782 2fc3f31072e99d2353bbb8dccf96855e amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.12-1etch1_amd64.deb Size/MD5 checksum: 839242 de732d67838526d3226e8fde45371f03 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1_amd64.deb Size/MD5 checksum: 1008782 a7835d6d302380cce9d052ce84aa7bd5 arm architecture (ARM) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1_arm.deb Size/MD5 checksum: 971456 2a559e222eeaa8a98adbda09313d834d http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.12-1etch1_arm.deb Size/MD5 checksum: 793800 030853f33c20183d311aa847c36b1701 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.12-1etch1_hppa.deb Size/MD5 checksum: 931586 ce5bdcac2f3accf51c0f5c06ef3482fe http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1_hppa.deb Size/MD5 checksum: 1073338 f4e3cd09a5b8a06703831fe5854484bb i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.12-1etch1_i386.deb Size/MD5 checksum: 818374 4a7b6492c3442378f328f3eb0fe1601f http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1_i386.deb Size/MD5 checksum: 977082 87f0b6134d507238444463e55e38fec7 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1_ia64.deb Size/MD5 checksum: 1259516 20ddea5e9bcd3bb35763572e38c4361d http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.12-1etch1_ia64.deb Size/MD5 checksum: 1136186 9fc4e609f181584adf0236898ddf8f4c mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1_mips.deb Size/MD5 checksum: 1000718 3622d0943aae361891aedebf76d76ad8 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.12-1etch1_mips.deb Size/MD5 checksum: 876670 3d2c3888b2d52647f81c85a4deb756c0 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1_mipsel.deb Size/MD5 checksum: 999140 5012f47d29bd963cc8b3bb25015deba3 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.12-1etch1_mipsel.deb Size/MD5 checksum: 875762 541b3137f5bca84dcb5cb2e7cac949bf powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.12-1etch1_powerpc.deb Size/MD5 checksum: 807006 cd8b98b18b585b658812050315a0cb73 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1_powerpc.deb Size/MD5 checksum: 998832 f69d8b6c7ed360dcba77fada3d39ad3a s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.12-1etch1_s390.deb Size/MD5 checksum: 847076 c9fb6468ecd528584dadc67888f897ed http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1_s390.deb Size/MD5 checksum: 1016808 5eefee6032b8d4109796e68b78f16bd6 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4-dev_8.4.12-1etch1_sparc.deb Size/MD5 checksum: 826552 ba502e25a2a6c811ee609216d3483bf8 http://security.debian.org/pool/updates/main/t/tk8.4/tk8.4_8.4.12-1etch1_sparc.deb Size/MD5 checksum: 978866 aadde6fd7e0713a4c6d52f95c352382c ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00195.html OTHER REFERENCES: SA26942: http://secunia.com/advisories/26942/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------