---------------------------------------------------------------------- Secunia is pleased to announce the release of the annual Secunia report for 2008. Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/ Stay Secure, Secunia ---------------------------------------------------------------------- TITLE: Debian update for mplayer SECUNIA ADVISORY ID: SA34845 VERIFY ADVISORY: http://secunia.com/advisories/34845/ DESCRIPTION: Debian has issued an update for mplayer. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. For more information: SA33136 SA33711 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1.orig.tar.gz Size/MD5 checksum: 10286260 815482129b79cb9390904b145c5def6c http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch7.dsc Size/MD5 checksum: 1273 e7c9ad9e2551b52efa5a3cdb8fd35d2c http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch7.diff.gz Size/MD5 checksum:84770 d76ad6ec6787686da78803aa1adf9059 Architecture independent packages: http://security.debian.org/pool/updates/main/m/mplayer/mplayer-doc_1.0~rc1-12etch7_all.deb Size/MD5 checksum:2044098 fd2f11f26dc0ec4ded4328e0b4d3e47e alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch7_alpha.deb Size/MD5 checksum:4708256 97d33072d97c242841e1c9667832e848 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch7_amd64.deb Size/MD5 checksum:4383304 372b7f9d647f686a158147e40c48a26f arm architecture (ARM) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch7_arm.deb Size/MD5 checksum:4327022 0b7f858f1f13d191f91b58637722a4f2 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch7_hppa.deb Size/MD5 checksum:4384738 38aea3a449804561c3534f252223f099 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch7_i386.deb Size/MD5 checksum:4423484 c28e0b6a9225b90959e694c81de4dd65 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch7_ia64.deb Size/MD5 checksum:5848864 90a731ea1de356a7c5271f6a482ec5bd mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch7_mips.deb Size/MD5 checksum:4275736 268a3dda134988405a5f7cf130623229 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch7_powerpc.deb Size/MD5 checksum:4342866 3a7287844bd9e5770d0cbc46dfe40d71 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch7_s390.deb Size/MD5 checksum:4167778 34aaa0f7f4e971061b043599fe4c948a sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch7_sparc.deb Size/MD5 checksum:4039612 63321e82e879daf54fa0ea022f6f657e ORIGINAL ADVISORY: DSA-1782-1: http://www.us.debian.org/security/2009/dsa-1782 OTHER REFERENCES: SA33136: http://secunia.com/advisories/33136/ SA33711: http://secunia.com/advisories/33711/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------