---------------------------------------------------------------------- Use WSUS to deploy 3rd party patches Public BETA http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: Debian update for kvm SECUNIA ADVISORY ID: SA38901 VERIFY ADVISORY: http://secunia.com/advisories/38901/ DESCRIPTION: Debian has issued an update for kvm. This fixes some vulnerabilities, which can be exploited by malicious, local users in a KVM guest to cause a DoS (Denial of Service) and potentially gain escalated privileges. For more information: SA38405 SA38499 SOLUTION: Apply updated packages. -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/k/kvm/kvm_72+dfsg-5~lenny5.dsc Size/MD5 checksum: 1341 14718fcd8584519702b567233d31abd6 http://security.debian.org/pool/updates/main/k/kvm/kvm_72+dfsg.orig.tar.gz Size/MD5 checksum: 3250251 899a66ae2ea94e994e06f637e1afef4a http://security.debian.org/pool/updates/main/k/kvm/kvm_72+dfsg-5~lenny5.diff.gz Size/MD5 checksum: 51204 40d0b0ba8df5fbd8cfc0c837b0da4db2 Architecture independent packages: http://security.debian.org/pool/updates/main/k/kvm/kvm-source_72+dfsg-5~lenny5_all.deb Size/MD5 checksum: 159990 7a50d4ad7242107fa3443fcf6a30197d amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/k/kvm/kvm_72+dfsg-5~lenny5_amd64.deb Size/MD5 checksum: 1110560 df3bcd5f384fc054863dac9947f60ddb i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/k/kvm/kvm_72+dfsg-5~lenny5_i386.deb Size/MD5 checksum: 1034558 4f74cdb89f87634ef7c44c2a2d488a1a ORIGINAL ADVISORY: DSA-2010-1: http://lists.debian.org/debian-security-announce/2010/msg00050.html OTHER REFERENCES: SA38405: http://secunia.com/advisories/38405/ SA38499: http://secunia.com/advisories/38499/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------