---------------------------------------------------------------------- Did you know? Our assessment and impact rating along with detailed information such as exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Debian update for mldonkey SECUNIA ADVISORY ID: SA34306 VERIFY ADVISORY: http://secunia.com/advisories/34306/ DESCRIPTION: Debian has issued an update for mldonkey. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information For more information: SA34008 SOLUTION: Apply updated packages. -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey_2.9.5-2+lenny1.dsc Size/MD5 checksum: 1894 80d8a01209691f1ab695073a77bf671a http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey_2.9.5.orig.tar.gz Size/MD5 checksum: 3346730 280207370693e16ae51d4a3b28d6424e http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey_2.9.5-2+lenny1.diff.gz Size/MD5 checksum: 141220 515bfab6892fc58b4a46fc0b26a1fd72 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-gui_2.9.5-2+lenny1_alpha.deb Size/MD5 checksum: 2950652 d344e8130032020b12862ff2c4b973d1 http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-server_2.9.5-2+lenny1_alpha.deb Size/MD5 checksum: 2123122 0e0b5b4aa226a5447e84154666cd3880 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-server_2.9.5-2+lenny1_amd64.deb Size/MD5 checksum: 2693524 eee55c6718a61403aedfeb2ff4fdc285 http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-gui_2.9.5-2+lenny1_amd64.deb Size/MD5 checksum: 3945406 ed6496fb59f045cf00191d627ebe35fd arm architecture (ARM) http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-gui_2.9.5-2+lenny1_arm.deb Size/MD5 checksum: 2807094 4f979e8cf35a3f6fcbe67aa623bad40d http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-server_2.9.5-2+lenny1_arm.deb Size/MD5 checksum: 2022926 d707587954b43a950f3d9bd944876cab armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-server_2.9.5-2+lenny1_armel.deb Size/MD5 checksum: 2008824 6c96ac0d574ed19b006e165a4e9cb344 http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-gui_2.9.5-2+lenny1_armel.deb Size/MD5 checksum: 2817946 c6f55245d4aa3151b9bc22237239f357 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-server_2.9.5-2+lenny1_hppa.deb Size/MD5 checksum: 2114000 47a512a8de09ab95d1d91b007accbf7e http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-gui_2.9.5-2+lenny1_hppa.deb Size/MD5 checksum: 2889248 029f2ab69fd534512cca380396dc952b i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-gui_2.9.5-2+lenny1_i386.deb Size/MD5 checksum: 3683876 8ce12ce87061b61d7e4cb5c67dc963a9 http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-server_2.9.5-2+lenny1_i386.deb Size/MD5 checksum: 2501302 4341f0bf5e24ce5422931c0ab108f32f ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-server_2.9.5-2+lenny1_ia64.deb Size/MD5 checksum: 2163096 174b9b0a75831066f21055198ecd4d31 http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-gui_2.9.5-2+lenny1_ia64.deb Size/MD5 checksum: 3000352 6e78f5ceccac87e2b15e169c0acee411 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-server_2.9.5-2+lenny1_mips.deb Size/MD5 checksum: 2136466 7cf59869940cc4d6afd9b873f391a5c2 http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-gui_2.9.5-2+lenny1_mips.deb Size/MD5 checksum: 2869464 265d5e3c6a74202ecef638300c6e8397 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-gui_2.9.5-2+lenny1_mipsel.deb Size/MD5 checksum: 2846658 009ac5c09b749eb9a000fddbd5ac8433 http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-server_2.9.5-2+lenny1_mipsel.deb Size/MD5 checksum: 2106860 bc87908cae2094944ed5502e6b821609 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-server_2.9.5-2+lenny1_powerpc.deb Size/MD5 checksum: 2928596 f1015d4d46ceab971d0acf93a75aab0a http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-gui_2.9.5-2+lenny1_powerpc.deb Size/MD5 checksum: 4279076 2f10a109630f7cc6dc5813507a006bc3 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-server_2.9.5-2+lenny1_s390.deb Size/MD5 checksum: 2076138 32d816b48fae49b535821ea350e6bada http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-gui_2.9.5-2+lenny1_s390.deb Size/MD5 checksum: 2999080 e1535e41938c76dc4fb6f441fb89473a sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-server_2.9.5-2+lenny1_sparc.deb Size/MD5 checksum: 2870322 34a2b0276e6bb38f1cb11bb0769a18b1 http://security.debian.org/pool/updates/main/m/mldonkey/mldonkey-gui_2.9.5-2+lenny1_sparc.deb Size/MD5 checksum: 4232002 5d2e6e79eb759ad3290c513e6767bb51 -- Debian GNU/Linux unstable alias sid -- This problem will reportedly be fixed soon ORIGINAL ADVISORY: DSA-1739-1: http://lists.debian.org/debian-security-announce/2009/msg00049.html OTHER REFERENCES: SA34008: http://secunia.com/advisories/34008/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------