---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Learn more: http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: Debian update for kazehakase SECUNIA ADVISORY ID: SA30106 VERIFY ADVISORY: http://secunia.com/advisories/30106/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ DESCRIPTION: Debian has issued an update for kazehakase. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, and compromise a user's system. The vulnerabilities are caused due to the use of a vulnerable PCRE library. For more information: SA27543 SA27582 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch1.diff.gz Size/MD5 checksum: 29821 9ed08939091d62c63e28dd2448076879 http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2.orig.tar.gz Size/MD5 checksum: 1377901 439ba54dc27509a2ef518f0efc775acc http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch1.dsc Size/MD5 checksum: 812 59f2a6ef066de3819891e121b0111b8c alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch1_alpha.deb Size/MD5 checksum: 831296 01e7938bbf1336d0c6a8b96645f3e79f amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch1_amd64.deb Size/MD5 checksum: 785472 c3eaac04243b72ab3b64458b0052aa3a arm architecture (ARM) http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch1_arm.deb Size/MD5 checksum: 739870 5952c1fc0c8eaaa521262118d2172736 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch1_hppa.deb Size/MD5 checksum: 882844 470611add8502f4a341e8cdef4499f4a i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch1_i386.deb Size/MD5 checksum: 759278 c679e8a553436a11345bca1bc88df09f mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch1_mips.deb Size/MD5 checksum: 721080 2cbff04efc16533a2b54c779ed1f04db mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch1_mipsel.deb Size/MD5 checksum: 717176 12c4bbbd600c7d6161a3707634a6017d powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch1_powerpc.deb Size/MD5 checksum: 769382 6e14ed4f3a1fadc97f5996ff29601a8b s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch1_s390.deb Size/MD5 checksum: 798436 f956cf4e29625f8d324bc5b2fd7b2300 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch1_sparc.deb Size/MD5 checksum: 757522 befeaed6fcca5045fda96b8450522768 ORIGINAL ADVISORY: http://www.debian.org/security/2008/dsa-1570 OTHER REFERENCES: SA27543: http://secunia.com/advisories/27543/ SA27582: http://secunia.com/advisories/27582/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------