---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for libmodplug SECUNIA ADVISORY ID: SA36158 VERIFY ADVISORY: http://secunia.com/advisories/36158/ DESCRIPTION: Debian has issued an update for libmodplug. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. For more information: SA34797 SA34927 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug_0.7.orig.tar.gz Size/MD5 checksum: 329398 b6e7412f90cdd4a27a2dd3de94909905 http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug_0.7-5.2+etch1.diff.gz Size/MD5 checksum: 8039 bbab9bd58551171e2e06667a34c142c6 http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug_0.7-5.2+etch1.dsc Size/MD5 checksum:639 d1038e62643d55d6f828cf35b79de0b8 Architecture independent packages: http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug-dev_0.7-5.2+etch1_all.deb Size/MD5 checksum:22662 4f1054f141eed8596aef8c3ee9cb53e0 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_alpha.deb Size/MD5 checksum: 164658 66dcec99183876eb3d51ef21f94074c3 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_amd64.deb Size/MD5 checksum: 116020 51d8c8c88ca40f4bb84db1e19212d22f arm architecture (ARM) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_arm.deb Size/MD5 checksum: 128564 abea81a9204331d379d19266ae9c2ce4 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_hppa.deb Size/MD5 checksum: 140852 e7123f04da964f983c470e0e8b45541f i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_i386.deb Size/MD5 checksum: 118570 3daea649fff6afd586e038c2e1adefbf ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_ia64.deb Size/MD5 checksum: 193278 66a63c49a06104bfb6e2a433b3965cd6 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_mips.deb Size/MD5 checksum: 128172 437a45a7f44be2ef5d0427a8d48ca3a3 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_mipsel.deb Size/MD5 checksum: 126328 b1e89e5a36757efa0872218ef65aac97 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_powerpc.deb Size/MD5 checksum: 125400 3832485316da7189f10a92ee9a5b9631 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_s390.deb Size/MD5 checksum: 128602 ea7389863995e8c6637aaff4a1451449 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_sparc.deb Size/MD5 checksum: 123960 19482ae9a363ee1c4eace02781bbdf16 -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug_0.8.4-1+lenny1.dsc Size/MD5 checksum: 1060 a36f490b6a4e963775577e175b23dd59 http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug_0.8.4-1+lenny1.diff.gz Size/MD5 checksum: 8031 d8e0a3b87cf946c99641103741f47e35 http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug_0.8.4.orig.tar.gz Size/MD5 checksum: 510758 091bd1168a524a4f36fc61f95209e7e4 Architecture independent packages: http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug-dev_0.8.4-1+lenny1_all.deb Size/MD5 checksum:24776 553b9aa5cddc17736613b981924c3022 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_alpha.deb Size/MD5 checksum: 253172 d4531bd79e7073ac5910d7bb0afed53b amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_amd64.deb Size/MD5 checksum: 173448 f78dd0d43b1dfcc5f7fbce292bfbf4fb arm architecture (ARM) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_arm.deb Size/MD5 checksum: 186076 af4e4880d2a5fe3173f7ecad4a4f6e10 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_armel.deb Size/MD5 checksum: 182470 3ebd0c108b3a223e46996f54a12a5067 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_i386.deb Size/MD5 checksum: 171752 6b198e2b26666d92c59bac1eaf6dfd04 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_ia64.deb Size/MD5 checksum: 321748 9d771a479ddb9cc4338a47617c21e4aa mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_mips.deb Size/MD5 checksum: 186890 6d44ee961d8c5e2b4477a6ff12111b99 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_mipsel.deb Size/MD5 checksum: 185528 96d30ac3d8a55068e9ad2d065f3831ba powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_powerpc.deb Size/MD5 checksum: 187332 f0151664a380507749527c06f398ba63 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_s390.deb Size/MD5 checksum: 190242 fe35d852302407bbfb538c09d213790b sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_sparc.deb Size/MD5 checksum: 187802 b54d03502f1c783431c3ee8cfc03274c ORIGINAL ADVISORY: DSA-1850-1: http://www.us.debian.org/security/2009/dsa-1850 OTHER REFERENCES: SA34797: http://secunia.com/advisories/34797/ SA34927: http://secunia.com/advisories/34927/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------