---------------------------------------------------------------------- Public Beta of CSI and WSUS Integration http://secunia.com/blog/74 ---------------------------------------------------------------------- TITLE: Debian update for polipo SECUNIA ADVISORY ID: SA38647 VERIFY ADVISORY: http://secunia.com/advisories/38647/ DESCRIPTION: Debian has issued an update for polipo. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA37607 SOLUTION: Apply updated packages. -- Debian GNU/Linux 5.0 alias lenny (stable) -- Source archives: http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1.dsc Size/MD5 checksum: 1042 4bb50ed5472fcd6b264cb89816586bbe http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1.diff.gz Size/MD5 checksum: 13430 4cc90f3327e4018c56b4e140cbcb2f46 http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4.orig.tar.gz Size/MD5 checksum: 180487 defdce7f8002ca68705b6c2c36c4d096 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1_alpha.deb Size/MD5 checksum: 220166 1a352d494225a07a9073681be4bac47c amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1_amd64.deb Size/MD5 checksum: 203454 381798d0cb7c64fc221bee69eb8b6a55 arm architecture (ARM) http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1_arm.deb Size/MD5 checksum: 201570 935d8f17f67c30c2910e057021d2c917 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1_armel.deb Size/MD5 checksum: 203706 99e563f18c123c3ca6508acdfd7f61f1 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1_hppa.deb Size/MD5 checksum: 211750 41caee7138a21b342d9821e0d098298c i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1_i386.deb Size/MD5 checksum: 191848 33af29a3f9e091dd6437fc3f3bfccab9 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1_ia64.deb Size/MD5 checksum: 266176 0643774c9cdd1386f66ca090b303a369 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1_mips.deb Size/MD5 checksum: 209536 5df3adcad12bccd7135a3fc9fb224af0 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1_mipsel.deb Size/MD5 checksum: 209834 4961e97e904853264a1bd03fbb767abd powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1_powerpc.deb Size/MD5 checksum: 199224 6ebb7bd7a1cb453650efee37cb742506 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1_s390.deb Size/MD5 checksum: 209310 642204b4effb7d2e801147bdb5581ac1 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/p/polipo/polipo_1.0.4-1+lenny1_sparc.deb Size/MD5 checksum: 198238 1e9c3cb3e6818f3f72f5aa4ab247da65 ORIGINAL ADVISORY: DSA-2002-1: http://lists.debian.org/debian-security-announce/2010/msg00042.html OTHER REFERENCES: SA37607: http://secunia.com/advisories/37607/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------