---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: Debian update for devil SECUNIA ADVISORY ID: SA33801 VERIFY ADVISORY: http://secunia.com/advisories/33801/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/advisories/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/advisories/product/530/ DESCRIPTION: Debian has issued an update devil. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library. For more information: SA33470 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/d/devil/devil_1.6.7-5+etch1.dsc Size/MD5 checksum: 784 00a9a200619160d990ed2a2deeb4238d http://security.debian.org/pool/updates/main/d/devil/devil_1.6.7-5+etch1.diff.gz Size/MD5 checksum: 8379 414a516d9fef38921dbd538d78adcac0 http://security.debian.org/pool/updates/main/d/devil/devil_1.6.7.orig.tar.gz Size/MD5 checksum: 3013312 0d0c3842196d85c4e24bedabcd84f626 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/d/devil/libdevil1c2_1.6.7-5+etch1_alpha.deb Size/MD5 checksum: 372974 ee2e6a0b9c8df07f1824762d551e042a http://security.debian.org/pool/updates/main/d/devil/libdevil-dev_1.6.7-5+etch1_alpha.deb Size/MD5 checksum: 477468 51486ac6ff1b4cd5e7240f310873a7b4 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/d/devil/libdevil-dev_1.6.7-5+etch1_amd64.deb Size/MD5 checksum: 320946 7a851f7411b600951c6f933008b514c9 http://security.debian.org/pool/updates/main/d/devil/libdevil1c2_1.6.7-5+etch1_amd64.deb Size/MD5 checksum: 271718 0a202d4d921a1a00a82b3f6f9976e1b6 arm architecture (ARM) http://security.debian.org/pool/updates/main/d/devil/libdevil-dev_1.6.7-5+etch1_arm.deb Size/MD5 checksum: 297386 fb284b115a2d299e59facbfa903130aa http://security.debian.org/pool/updates/main/d/devil/libdevil1c2_1.6.7-5+etch1_arm.deb Size/MD5 checksum: 264932 39a535af14195508964c9ca1775c3132 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/d/devil/libdevil-dev_1.6.7-5+etch1_hppa.deb Size/MD5 checksum: 410562 e34d8590f7c2e05d6cf02a118c211655 http://security.debian.org/pool/updates/main/d/devil/libdevil1c2_1.6.7-5+etch1_hppa.deb Size/MD5 checksum: 347448 d21505b2fde524a40ee31f0efa12970a i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/d/devil/libdevil1c2_1.6.7-5+etch1_i386.deb Size/MD5 checksum: 252798 aca0fc8776489aba07f6a6a103fb52f9 http://security.debian.org/pool/updates/main/d/devil/libdevil-dev_1.6.7-5+etch1_i386.deb Size/MD5 checksum: 286098 1f1bfc9efdd189ea5b430a50ca281cca ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/d/devil/libdevil1c2_1.6.7-5+etch1_ia64.deb Size/MD5 checksum: 481276 ad48301776addd355e4ffa46374c84d7 http://security.debian.org/pool/updates/main/d/devil/libdevil-dev_1.6.7-5+etch1_ia64.deb Size/MD5 checksum: 552778 bd8f6164f68262a7cce113ca541660ef mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/d/devil/libdevil-dev_1.6.7-5+etch1_mips.deb Size/MD5 checksum: 377338 0ce969cf88ed85d64c03211eb2268794 http://security.debian.org/pool/updates/main/d/devil/libdevil1c2_1.6.7-5+etch1_mips.deb Size/MD5 checksum: 301428 8c80a1520fe67db9f79ebcb12570bebc mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/d/devil/libdevil-dev_1.6.7-5+etch1_mipsel.deb Size/MD5 checksum: 376332 4c9b8f756eabdd857d9a17d6a74f9b1c http://security.debian.org/pool/updates/main/d/devil/libdevil1c2_1.6.7-5+etch1_mipsel.deb Size/MD5 checksum: 302362 ae2dd9e16b1ef239ce1779e16bb89d3e powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/d/devil/libdevil-dev_1.6.7-5+etch1_powerpc.deb Size/MD5 checksum: 368536 e3b1f038afadaffb44ac17a78cb57f15 http://security.debian.org/pool/updates/main/d/devil/libdevil1c2_1.6.7-5+etch1_powerpc.deb Size/MD5 checksum: 294498 129bc064f6920f5847a539b42e262e2f s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/d/devil/libdevil-dev_1.6.7-5+etch1_s390.deb Size/MD5 checksum: 310166 a4e8bfb5603d45fe62e678ac8b2affb8 http://security.debian.org/pool/updates/main/d/devil/libdevil1c2_1.6.7-5+etch1_s390.deb Size/MD5 checksum: 290248 fc76306188733c38b307662e3105cc70 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/d/devil/libdevil1c2_1.6.7-5+etch1_sparc.deb Size/MD5 checksum: 276480 1387371202c1c4d72288ba07db4dc20b http://security.debian.org/pool/updates/main/d/devil/libdevil-dev_1.6.7-5+etch1_sparc.deb Size/MD5 checksum: 329950 50da6f88bfeec78c9a98173a5e254730 -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.7.5-4 ORIGINAL ADVISORY: DSA 1717-1: http://lists.debian.org/debian-security-announce/2009/msg00026.html OTHER REFERENCES: SA33470: http://secunia.com/advisories/33470/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------