---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Learn more: http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: Debian update for gnome-peercast SECUNIA ADVISORY ID: SA30325 VERIFY ADVISORY: http://secunia.com/advisories/30325/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 4.0 http://secunia.com/product/13844/ DESCRIPTION: Debian has issued an update for gnome-peercast. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. For more information: SA30020 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4-1.1etch0.dsc Size/MD5 checksum: 956 e2d40d2cd79ac54cefb00a6fa9b747d2 http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4-1.1etch0.diff.gz Size/MD5 checksum: 3104 a17daf736115641d4ab3a6c41aa152c3 http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4.orig.tar.gz Size/MD5 checksum: 800116 e689715d8e70cdb0ce684ccce063a58f alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4-1.1etch0_alpha.deb Size/MD5 checksum: 296926 b1ebff0148fc69634eede7fffc114d51 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4-1.1etch0_amd64.deb Size/MD5 checksum: 257812 33d4c4fd7bed425a4cee0268e44dcc20 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4-1.1etch0_hppa.deb Size/MD5 checksum: 297822 e5795eb9b0d5d08d042825e05c04c0f7 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4-1.1etch0_i386.deb Size/MD5 checksum: 254172 a6e46c6422c8a76df706375cba85461e ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4-1.1etch0_ia64.deb Size/MD5 checksum: 346408 34f8ffc5f763a013ff5bc87832bdf77a mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4-1.1etch0_mips.deb Size/MD5 checksum: 285802 62e99808d3a9a015139500c92b595089 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4-1.1etch0_mipsel.deb Size/MD5 checksum: 284316 f84d8576550138d846b5f3e6790db54f powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4-1.1etch0_powerpc.deb Size/MD5 checksum: 270324 e83511effbc2f89183145dae92e27ecf s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4-1.1etch0_s390.deb Size/MD5 checksum: 260410 ac50ca3aa93414140f955f131fa050bc sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/g/gnome-peercast/gnome-peercast_0.5.4-1.1etch0_sparc.deb Size/MD5 checksum: 251018 5ff3b23b8ec68fa47ed19f8abafac669 -- Debian GNU/Linux unstable alias sid -- One issue has been fixed in version 0.5.4-1.2. Reportedly, the other vulnerability will be fixed soon. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/2008/msg00161.html OTHER REFERENCES: SA30020: http://secunia.com/advisories/30020/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------