---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Debian update for exiv2 SECUNIA ADVISORY ID: SA28610 VERIFY ADVISORY: http://secunia.com/advisories/28610/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ DESCRIPTION: Debian has issued an update for exiv2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. For more information: SA28132 SOLUTION: Apply updated packages. -- Debian (stable) -- Source archives: http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5.diff.gz Size/MD5 checksum: 31515 ff0fc3ef64872fbb591f7258620f5f0b http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5.dsc Size/MD5 checksum: 660 ed1b77214142dfedc6c6d88d475987d9 http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10.orig.tar.gz Size/MD5 checksum: 2053756 5af2256fb9895d9331684e8c1865b956 Architecture independent packages: http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-doc_0.10-1.5_all.deb Size/MD5 checksum: 1471716 ba3233f1b9cf71d3bf45ce0790942af9 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_alpha.deb Size/MD5 checksum: 82506 a1c6311554e0301f3e5707ce45b12c44 http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_alpha.deb Size/MD5 checksum: 315770 08a274e26723b6644121a77718650df8 http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_alpha.deb Size/MD5 checksum: 716946 65bd53cad7fe49bd5a8b52c18845531d amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_amd64.deb Size/MD5 checksum: 75710 214d62419a4da25d2c43119992adc1b8 http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_amd64.deb Size/MD5 checksum: 546036 b1d63a71e00c934d14f3263d626466a2 http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_amd64.deb Size/MD5 checksum: 282494 0b963505e15fc126583c08b4d6a8671e arm architecture (ARM) http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_arm.deb Size/MD5 checksum: 88084 05fbc6853bc2517e58e587bc2e45942c http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_arm.deb Size/MD5 checksum: 311516 12a1dbbc1dc560187fec31152836831e http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_arm.deb Size/MD5 checksum: 552870 9e6da478b70cac4cd297c1a2efe8713f hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_hppa.deb Size/MD5 checksum: 642320 b55a5e8930f4e4fec0e1b83fd2f8d9f8 http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_hppa.deb Size/MD5 checksum: 349652 520fcd26a32bcb915f1221a7cc09d342 http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_hppa.deb Size/MD5 checksum: 82724 643c5f109ad8b0b1e4f2d9ee35cf8283 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_i386.deb Size/MD5 checksum: 75758 33830c83524ab3ea4fb72ed5fad9889a http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_i386.deb Size/MD5 checksum: 509668 5871ee4d12d7833b55434a0bd2c78804 http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_i386.deb Size/MD5 checksum: 283882 32dc3334472467a5642b3ebf70d73f83 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_ia64.deb Size/MD5 checksum: 730890 47ae5bab36a976e9d4c9d20c7e059e06 http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_ia64.deb Size/MD5 checksum: 95450 1a14407cb292d2a7991a34434d971878 http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_ia64.deb Size/MD5 checksum: 368756 4c9297fa105c67af45b7971f0b00c299 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_mips.deb Size/MD5 checksum: 271654 811dc70c015b27cdcc94bad7147a0fa4 http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_mips.deb Size/MD5 checksum: 586988 fbd433a7f7369be1cff39f9d79b1395e http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_mips.deb Size/MD5 checksum: 73684 beaaf91359bb0b3d0f3a22a1cade1505 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_mipsel.deb Size/MD5 checksum: 583038 de9ddb262ef8f49e0512119206ef63b0 http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_mipsel.deb Size/MD5 checksum: 73176 f5d016a0b5e2ec60ef2e2d3446e363b3 http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_mipsel.deb Size/MD5 checksum: 267776 68fa9f26c0c3fbbda74bd6139e332615 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_powerpc.deb Size/MD5 checksum: 296440 a306748aafa37fa4d7874f817520f71f http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_powerpc.deb Size/MD5 checksum: 569730 cbf10c6a2166a27406dee3e151ec498b http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_powerpc.deb Size/MD5 checksum: 76080 dd8f0bfdddf9896fa21dd455a8c30052 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_s390.deb Size/MD5 checksum: 70088 6a1550294fdf218741ca998c621825b5 http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_s390.deb Size/MD5 checksum: 534022 d2b1f2455e02e16a300f0478c4b40779 http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_s390.deb Size/MD5 checksum: 288842 2134f38671787dd40a582deda5771824 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_sparc.deb Size/MD5 checksum: 306884 0cff748083910cd2359765fef3d3b6e0 http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_sparc.deb Size/MD5 checksum: 511544 97c2efefdb8d3067d88b82763e7eba6e http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_sparc.deb Size/MD5 checksum: 73494 89d72b486036f6bfabde2cbfc1c16986 ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00036.html OTHER REFERENCES: SA28132: http://secunia.com/advisories/28132/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------