---------------------------------------------------------------------- Did you know? Our assessment and impact rating along with detailed information such as exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Debian update for gst-plugins-bad0.10 SECUNIA ADVISORY ID: SA34136 VERIFY ADVISORY: http://secunia.com/advisories/34136/ DESCRIPTION: Debian has issued an update to gst-plugins-bad0.10. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise a vulnerable system. For more information: SA33650 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gst-plugins-bad0.10_0.10.3-3.1+etch1.dsc Size/MD5 checksum: 819 3a44313023fb5a930247b5b981e700ae http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gst-plugins-bad0.10_0.10.3.orig.tar.gz Size/MD5 checksum: 1377759 6d09962ac9ae6218932578ccc623407f http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gst-plugins-bad0.10_0.10.3-3.1+etch1.diff.gz Size/MD5 checksum: 9477 74cfd15f0e32f3b56509e648953fdec8 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_alpha.deb Size/MD5 checksum: 733630 5a57a10505b41e4c28bc4e0642f8650a amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_amd64.deb Size/MD5 checksum: 549878 cd0413ebf02e178ea27c5c8d16ad95fa arm architecture (ARM) http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_arm.deb Size/MD5 checksum: 561194 a0724a6cab918a8da823d7bf46443ef1 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_i386.deb Size/MD5 checksum: 552386 5925c3bdbbb3d1f498653ca201112ca0 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_ia64.deb Size/MD5 checksum: 832140 365297044bf80b32378e97fa3657f201 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_mips.deb Size/MD5 checksum: 619356 053cceaa42b6c38dc1cc1d64a8d3e7bd mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_mipsel.deb Size/MD5 checksum: 600068 09cf53d117f6c449664d96bba3e3fc9a powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_powerpc.deb Size/MD5 checksum: 600966 6a0e5ed57d4da5875040be8cc96345f5 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_s390.deb Size/MD5 checksum: 580644 1bdfe57a99a1b2398fe163421d97cc9d sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_sparc.deb Size/MD5 checksum: 576270 cbe44fa23352da55f24506ee60262bfd -- Debian GNU/Linux unstable alias sid -- Fixed in version 0.10.8-4.1 of gst-plugins-good0.10. ORIGINAL ADVISORY: DSA-1729-1: http://lists.debian.org/debian-security-announce/2009/msg00039.html OTHER REFERENCES: SA33650: http://secunia.com/advisories/33650/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------