---------------------------------------------------------------------- Are you missing: SECUNIA ADVISORY ID: Critical: Impact: Where: within the advisory below? This is now part of the Secunia commercial solutions. Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Debian update for qemu SECUNIA ADVISORY ID: SA35031 VERIFY ADVISORY: http://secunia.com/advisories/35031/ DESCRIPTION: Debian has issued an update for qemu. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions. For more information: SA25073 SA30111 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/q/qemu/qemu_0.8.2-4etch3.diff.gz Size/MD5 checksum: 67363 9770edb5cd197a444e9daad2f0439823 http://security.debian.org/pool/updates/main/q/qemu/qemu_0.8.2-4etch3.dsc Size/MD5 checksum: 1122 b7d65acdf5cdc3332b3a7a5100c4586d amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/q/qemu/qemu_0.8.2-4etch3_amd64.deb Size/MD5 checksum: 3700070 f2ba0f4f44c56f943e7f49a660284b3e i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/q/qemu/qemu_0.8.2-4etch3_i386.deb Size/MD5 checksum: 3676468 cf0babcf03c61381fea0d7f30a06e44f -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1.orig.tar.gz Size/MD5 checksum: 2392515 937c34632a59e12ba7b55054419bbe7d http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1.diff.gz Size/MD5 checksum: 80162 f5d593dcea9ec54a148c76a3883fa537 http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1.dsc Size/MD5 checksum: 1638 1c8e6db187f4b58e5655f2b06581b56f amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1_amd64.deb Size/MD5 checksum: 11030660 02d39005c7b486f1d3541875052435d0 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1_i386.deb Size/MD5 checksum: 10560190 d037ea7864b2c1d2bffe0738c56b042d powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1_powerpc.deb Size/MD5 checksum: 10193596 40cfcd624e20d717e4ee0ce2655e5463 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1_sparc.deb Size/MD5 checksum: 15700104 51cb77dee407b1c7ae7e3938a7e9c576 ORIGINAL ADVISORY: DSA-1799-1: http://lists.debian.org/debian-security-announce/2009/msg00110.html OTHER REFERENCES: SA25073: http://secunia.com/advisories/25073/ SA30111: http://secunia.com/advisories/30111/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------