---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for advi SECUNIA ADVISORY ID: SA37150 VERIFY ADVISORY: http://secunia.com/advisories/37150/ DESCRIPTION: Debian has issued an update for advi. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. The vulnerabilities are caused due to statically linking a vulnerable version of the camlimages library. For more information: SA37067 SOLUTION: Apply updated packages. -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0-13+lenny2.diff.gz Size/MD5 checksum: 51609 21aed220ab54cc689a7ef13e51f801d9 http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0-13+lenny2.dsc Size/MD5 checksum: 1655 b3702857e76699041f5313515c4ae59c http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0.orig.tar.gz Size/MD5 checksum: 11436152 da0e71cbc99a8def27873d4f3c756fa6 Architecture independent packages: http://security.debian.org/pool/updates/main/a/advi/advi-examples_1.6.0-13+lenny2_all.deb Size/MD5 checksum: 3896628 78cbd5f431332e48bd6f6838c71c4bd6 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0-13+lenny2_amd64.deb Size/MD5 checksum: 738554 ff1868ddb0510d02db84f2c2a3fcdd36 arm architecture (ARM) http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0-13+lenny2_arm.deb Size/MD5 checksum: 1315080 5abb37dd7194607f07b956826830e052 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0-13+lenny2_armel.deb Size/MD5 checksum: 1317700 76f406d64477573fee49c1403914f525 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0-13+lenny2_hppa.deb Size/MD5 checksum: 1328012 8d239035d7195a3da2d88a0ce1004df8 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0-13+lenny2_i386.deb Size/MD5 checksum: 873922 0ed738039c6877f8a98e462b7990e0fe ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0-13+lenny2_ia64.deb Size/MD5 checksum: 1366332 8113261f68b8ab1fa0a560cda28dddfb mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0-13+lenny2_mips.deb Size/MD5 checksum: 1319406 9108849fdeed00e2848511b4da97f405 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0-13+lenny2_mipsel.deb Size/MD5 checksum: 1317202 87f285d20318111851008f04698f17f0 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0-13+lenny2_powerpc.deb Size/MD5 checksum: 862788 260fba666be7c705daf8a4387692aff7 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/a/advi/advi_1.6.0-13+lenny2_sparc.deb Size/MD5 checksum: 851648 b60cb2ad932c4d094b595a57a632afb8 ORIGINAL ADVISORY: DSA-1912-2: http://lists.debian.org/debian-security-announce/2009/msg00238.html OTHER REFERENCES: SA37067: http://secunia.com/advisories/37067/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------