---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Debian update for tcpreen SECUNIA ADVISORY ID: SA28254 VERIFY ADVISORY: http://secunia.com/advisories/28254/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for tcpreen. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA28217 SOLUTION: Apply updated packages. -- Debian 4.0 (stable) -- Source archives: http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1.dsc Size/MD5 checksum:579 83c33a7131f3191048aba4b610e292ca http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3.orig.tar.gz Size/MD5 checksum: 232290 5600968d012f8353e4e0797d4c330393 http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1.diff.gz Size/MD5 checksum:26016 b1af9b7571c037713b123f33e5e79721 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_alpha.deb Size/MD5 checksum:44064 5dc26f1233f232305b7c8d2e2e2cb4ac amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_amd64.deb Size/MD5 checksum:42494 5cc27918abcac4a19eb661894005e963 arm architecture (ARM) http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_arm.deb Size/MD5 checksum:39378 10c0d8bd70154755e372318e39f10266 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_hppa.deb Size/MD5 checksum:43848 7039041a01ddcd25e74cfb6c025d3e6c i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_i386.deb Size/MD5 checksum:40274 bcd58bac3ae59767861a9fee6653e882 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_ia64.deb Size/MD5 checksum:48438 85ac614d61faa5a66d7e14efd5490daf mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_mips.deb Size/MD5 checksum:43610 9fb5942fc0d95e87c2a8e3964c30b8d7 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_mipsel.deb Size/MD5 checksum:43620 e9b81ad8b5e0f05501c264b5efd6ed7f powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_powerpc.deb Size/MD5 checksum:40848 43b0d65c0a8445d7d5880f87a5fbb005 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_s390.deb Size/MD5 checksum:41020 e4d80551b7ffe958f9ad7103b2973087 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_sparc.deb Size/MD5 checksum:39366 e897ed3d4b1d0b85225f88f8a0cc0990 -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.4.3-0.3. ORIGINAL ADVISORY: http://www.debian.org/security/2008/dsa-1443 OTHER REFERENCES: SA28217: http://secunia.com/advisories/28217/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------