---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for mimetex SECUNIA ADVISORY ID: SA37146 VERIFY ADVISORY: http://secunia.com/advisories/37146/ DESCRIPTION: Debian has issued an update for mimetex. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information or compromise a vulnerable system. For more information: SA35752 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1.dsc Size/MD5 checksum: 584 4c4ac225a147438ea1bb7be1b0f65019 http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1.diff.gz Size/MD5 checksum: 5318 5d3a2a06fecf83d573c8cbb9c778ddf0 http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50.orig.tar.gz Size/MD5 checksum: 401817 cdda954fc3a436daa8345ecbfdb084c3 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1_alpha.deb Size/MD5 checksum: 154406 b525a79c4c6e92ebe5d6853261edb7d9 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1_amd64.deb Size/MD5 checksum: 151848 b01a4cf79985dbc98aa468b27355c005 arm architecture (ARM) http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1_arm.deb Size/MD5 checksum: 150546 8041ce35d9d2457999e217bd9ecff233 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1_hppa.deb Size/MD5 checksum: 148156 0f7d099d12f46f9c74a9d4863cacb676 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1_i386.deb Size/MD5 checksum: 143668 55db42c430e79ebd525679d72c8556f8 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1_ia64.deb Size/MD5 checksum: 188604 5f4c8c896998e82797bba6a0997d550c mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1_mips.deb Size/MD5 checksum: 155176 c080d72fef8acd63fa27b0a5cf7688bd mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1_mipsel.deb Size/MD5 checksum: 156068 96a3663cab62464f23ea747f679fbb57 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1_powerpc.deb Size/MD5 checksum: 145470 84ec68d2dcf0378f634f7cdc48c272d2 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1_s390.deb Size/MD5 checksum: 157512 493034d85d335c5c48358aac4fa5365f sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/m/mimetex/mimetex_1.50-1+etch1_sparc.deb Size/MD5 checksum: 146950 657d93204c670f44c337d85b5fa9a67b ORIGINAL ADVISORY: DSA-1917-1: http://www.us.debian.org/security/2009/dsa-1917 OTHER REFERENCES: SA35752: http://secunia.com/advisories/35752 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------