---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Learn more: http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: Debian update for mtr SECUNIA ADVISORY ID: SA30340 VERIFY ADVISORY: http://secunia.com/advisories/30340/ CRITICAL: Less critical IMPACT: System access WHERE: >From local network OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for mtr. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. For more information: SA30312 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1.diff.gz Size/MD5 checksum: 49648 1f32f54087c5cab59d13418277c33959 http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1.dsc Size/MD5 checksum: 594 4dae747ffc1de0170d2578b1b09261ed http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71.orig.tar.gz Size/MD5 checksum: 205442 8c1c9f5db2c599eea3b12bfed8b80618 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_alpha.deb Size/MD5 checksum: 42128 48a8e95d395b07e57852b0005e5225ff http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_alpha.deb Size/MD5 checksum: 57194 bd922b8c1a5891f71abbb4777faf4e63 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_amd64.deb Size/MD5 checksum: 52320 0d2aa3398184633044d21bdd70e23073 http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_amd64.deb Size/MD5 checksum: 37766 7513344c840d47a8dca23e1e51d6a0cc arm architecture (ARM) http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_arm.deb Size/MD5 checksum: 49510 a361681ebc93d48e24d7cca0086b6090 http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_arm.deb Size/MD5 checksum: 35560 69a3c71e6471813882c63e8201c34b80 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_hppa.deb Size/MD5 checksum: 54772 4c92f110415d9ef79b54fe91624d892c http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_hppa.deb Size/MD5 checksum: 39920 fff799aabfd4b1fbd313f6512e02f765 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_i386.deb Size/MD5 checksum: 34832 46c37b88fbaead1b97685aef100bdff3 http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_i386.deb Size/MD5 checksum: 49498 429bf4027e3adc7a6c65739972f3637e ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_ia64.deb Size/MD5 checksum: 51828 52fa9d983e98c382259f844869ce2a9c http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_ia64.deb Size/MD5 checksum: 68066 389cccac0ec00cbd3e1b32b8372f299b mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_mips.deb Size/MD5 checksum: 56592 a4706a9a26ded557a35179be774cc4c2 http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_mips.deb Size/MD5 checksum: 42158 40220a8cc23ea78e02e63899379d9211 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_mipsel.deb Size/MD5 checksum: 56468 e422aaae12583d2213208ea93bbf789b http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_mipsel.deb Size/MD5 checksum: 42014 8965536180263c10a21cd19f621c2f67 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_powerpc.deb Size/MD5 checksum: 39388 40bfc501ea9369f583d17094e5afe106 http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_powerpc.deb Size/MD5 checksum: 53204 084b6accfd9f629b940b3100329e9569 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_s390.deb Size/MD5 checksum: 38036 f4f59a3761e2bbc202471ad64f4aa479 http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_s390.deb Size/MD5 checksum: 52968 23670acdeae3170a5c9d9041b9785f32 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_sparc.deb Size/MD5 checksum: 49746 ccfde335d99f424062f5594160c7c584 http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_sparc.deb Size/MD5 checksum: 35560 0e8e7a514058ec63dc283d4bb13b67cb -- Debian GNU/Linux unstable alias sid -- Fixed in version 0.73-1. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/2008/msg00165.html OTHER REFERENCES: SA30312: http://secunia.com/advisories/30312/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------