---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for smarty SECUNIA ADVISORY ID: SA37140 VERIFY ADVISORY: http://secunia.com/advisories/37140/ DESCRIPTION: Debian has issued an update for smarty. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions. For more information: SA32329 SA35072 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/s/smarty/smarty_2.6.14-1etch2.dsc Size/MD5 checksum: 958 f061c466cef93df89e677aeb72101910 http://security.debian.org/pool/updates/main/s/smarty/smarty_2.6.14.orig.tar.gz Size/MD5 checksum: 144986 9186796ddbc29191306338dea9d632a0 http://security.debian.org/pool/updates/main/s/smarty/smarty_2.6.14-1etch2.diff.gz Size/MD5 checksum: 4290 0ef9a669c127818f5ff084e2829738e9 Architecture independent packages: http://security.debian.org/pool/updates/main/s/smarty/smarty_2.6.14-1etch2_all.deb Size/MD5 checksum: 183300 d0ac954aad344f20b5933b09593b2968 -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/s/smarty/smarty_2.6.20-1.2.dsc Size/MD5 checksum: 1409 f280e2733ef52ff621891f99b26386f3 http://security.debian.org/pool/updates/main/s/smarty/smarty_2.6.20-1.2.diff.gz Size/MD5 checksum: 4876 4d729d18d7efe68e1ce3023149436c01 http://security.debian.org/pool/updates/main/s/smarty/smarty_2.6.20.orig.tar.gz Size/MD5 checksum: 158091 35f405b2418a26a895302a2ce5bf89d2 Architecture independent packages: http://security.debian.org/pool/updates/main/s/smarty/smarty_2.6.20-1.2_all.deb Size/MD5 checksum: 204412 1e8e85b298b97176359dd15731e0dc88 ORIGINAL ADVISORY: DSA-1919-1: http://www.us.debian.org/security/2009/dsa-1919 OTHER REFERENCES: SA32329: http://secunia.com/advisories/32329/ SA35072: http://secunia.com/advisories/35072/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------