---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Debian update for syslog-ng SECUNIA ADVISORY ID: SA28483 VERIFY ADVISORY: http://secunia.com/advisories/28483/ CRITICAL: Less critical IMPACT: DoS WHERE: >From local network OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for syslog-ng. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA28118 SOLUTION: Apply updated packages. -- Debian 4.0 (stable) -- Source archives: http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1.dsc Size/MD5 checksum: 630 0c4d7f9fe291909962a6b5ef92eca5e4 http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0.orig.tar.gz Size/MD5 checksum: 346056 6ea55c647dcbd3d58a58b8d90f7ea300 http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1.diff.gz Size/MD5 checksum: 10487 a1411ff4c12a79a915ba7e27d9ce79ba alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_alpha.deb Size/MD5 checksum: 216072 c1eb157b2bd909ee23c7443b602b5446 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_amd64.deb Size/MD5 checksum: 199956 393ba6fe859eb97fea6bbe95fdafc54f arm architecture (ARM) http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_arm.deb Size/MD5 checksum: 182992 5566905c2821adc329617626eae19b5c hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_hppa.deb Size/MD5 checksum: 204112 c3d2f3d7f4878330f70cd7842c8e6bc1 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_i386.deb Size/MD5 checksum: 177118 cfe45722a293c23a72b6791f1ac30549 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_ia64.deb Size/MD5 checksum: 271682 fbd2a41a0d894a261ac44d5d6ed28208 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_mips.deb Size/MD5 checksum: 203130 92d7ec89d158491a80629f8a75a3f8cb mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_mipsel.deb Size/MD5 checksum: 203422 56cfd580b06ee59a92121cd8a17c52f3 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_powerpc.deb Size/MD5 checksum: 189374 01053f541ef4eb99dcfe7023e4f0e7fb s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_s390.deb Size/MD5 checksum: 201736 9921207160c7d67b7f0cf5b8571054c7 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_sparc.deb Size/MD5 checksum: 176494 327ce3c41678d0a54f4d37e97ef9d411 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.0.6-1. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00022.html OTHER REFERENCES: SA28118: http://secunia.com/advisories/28118/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------