what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 28101

Secunia Security Advisory 28101
Posted Dec 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for link-grammar. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 39a31211c69cd0dde682e4983f4763b39180e4771b55082202f87784ad717f43

Secunia Security Advisory 28101

Change Mirror Download


----------------------------------------------------------------------

2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.

Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

----------------------------------------------------------------------

TITLE:
Debian update for link-grammar

SECUNIA ADVISORY ID:
SA28101

VERIFY ADVISORY:
http://secunia.com/advisories/28101/

CRITICAL:
Moderately critical

IMPACT:
System access

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux 4.0
http://secunia.com/product/13844/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/

DESCRIPTION:
Debian has issued an update for link-grammar. This fixes a
vulnerability, which can be exploited by malicious people to
compromise a user's system.

For more information:
SA27300

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 4.0 alias etch --

Source archives:

http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2.orig.tar.gz
Size/MD5 checksum: 742163 798c165b7d7f26e60925c30515c45782
http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1.dsc
Size/MD5 checksum: 669 535a962c3aefbf92b3d09bd9355d3b57
http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1.diff.gz
Size/MD5 checksum: 8231 fa03dfbb7a2e0a47130c9f1385eb48d3

Architecture independent packages:

http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar-dictionaries-en_4.2.2-4etch1_all.deb
Size/MD5 checksum: 267530 52ef5d6278b5f8a5a0c0894b3d99235e

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4-dev_4.2.2-4etch1_alpha.deb
Size/MD5 checksum: 169386 f866bf37b179cf8f1c31f13b0ab9100a
http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1_alpha.deb
Size/MD5 checksum: 16666 14b288d946738d5eefed5dc50e84040f
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4_4.2.2-4etch1_alpha.deb
Size/MD5 checksum: 108456 826d5896c36850255bedfcc3b70a8ea1

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1_amd64.deb
Size/MD5 checksum: 16038 ea80489f9db4f247d5009bf435f40707
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4_4.2.2-4etch1_amd64.deb
Size/MD5 checksum: 95996 0851ea02bd3b4b600d68df09016915cf
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4-dev_4.2.2-4etch1_amd64.deb
Size/MD5 checksum: 127934 a43908000f552820cdcd2c1a7819f62f

arm architecture (ARM)

http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1_arm.deb
Size/MD5 checksum: 15074 5a881ae17e13efc9ae731b9f86d7a0ff
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4-dev_4.2.2-4etch1_arm.deb
Size/MD5 checksum: 110896 54d4534ce7a06ed675d9c4d2c957e519
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4_4.2.2-4etch1_arm.deb
Size/MD5 checksum: 87732 5dfce7e3245ab16bbab0f2325d462192

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1_hppa.deb
Size/MD5 checksum: 16202 3f8cbe2ab057f5d3b387c1e52e4e9e51
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4-dev_4.2.2-4etch1_hppa.deb
Size/MD5 checksum: 139488 2411aae738f8467e4180debc87b265ee
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4_4.2.2-4etch1_hppa.deb
Size/MD5 checksum: 104292 105899d1fa1a37a2690a6d3372572912

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1_i386.deb
Size/MD5 checksum: 15458 9b43845e6fdb26319c4dd3d88afe5fb4
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4_4.2.2-4etch1_i386.deb
Size/MD5 checksum: 89456 ffa178b41a336d1a9e11bca02a3d2232
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4-dev_4.2.2-4etch1_i386.deb
Size/MD5 checksum: 111356 50b911abcf134bffe48bd599b7c42050

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4-dev_4.2.2-4etch1_ia64.deb
Size/MD5 checksum: 190852 a4e0f03a7d7f6d2e463eda96f62205ab
http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1_ia64.deb
Size/MD5 checksum: 18526 ac56d42bb0e8d3922f0a57627a4c9ec0
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4_4.2.2-4etch1_ia64.deb
Size/MD5 checksum: 142350 3c8decefa958c50420aec4ec220feaec

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4-dev_4.2.2-4etch1_mips.deb
Size/MD5 checksum: 138736 443874945980a7625c0bbc29e29d8ffc
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4_4.2.2-4etch1_mips.deb
Size/MD5 checksum: 93814 a17d5189ae4289f0a0d7277ddcf23ecd
http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1_mips.deb
Size/MD5 checksum: 15892 d469f682c72fcb82aed2afa9c3f85f6e

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4-dev_4.2.2-4etch1_mipsel.deb
Size/MD5 checksum: 138978 56e715e3bba5245263e5ba35ae78276d
http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1_mipsel.deb
Size/MD5 checksum: 15874 1c56d7f76d827c9e7a9074ec3faab791
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4_4.2.2-4etch1_mipsel.deb
Size/MD5 checksum: 94188 a13cf0d9c8978b8bde4610fd0b58b791

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4_4.2.2-4etch1_powerpc.deb
Size/MD5 checksum: 94278 e4eaa7e42cae572c443d9863d6cc0ca4
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4-dev_4.2.2-4etch1_powerpc.deb
Size/MD5 checksum: 129248 e3cd1c0cc74d868f26f63881700e5ec5
http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1_powerpc.deb
Size/MD5 checksum: 15554 191ccfa13898e334792113b52dbe35c5

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4-dev_4.2.2-4etch1_s390.deb
Size/MD5 checksum: 124790 cda7a4e0b8ed670be66f10a867cf77e9
http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1_s390.deb
Size/MD5 checksum: 16248 9d356c1a11def3e93e166d0bd7f07b18
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4_4.2.2-4etch1_s390.deb
Size/MD5 checksum: 104892 1ed12c7feb9f4635702dd7e0e81ce173

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4-dev_4.2.2-4etch1_sparc.deb
Size/MD5 checksum: 117854 dfb8639578fbddf0e41ec5bb99bec976
http://security.debian.org/pool/updates/main/l/link-grammar/link-grammar_4.2.2-4etch1_sparc.deb
Size/MD5 checksum: 15262 da06736b13a0460c99f41827a98d0dc3
http://security.debian.org/pool/updates/main/l/link-grammar/liblink-grammar4_4.2.2-4etch1_sparc.deb
Size/MD5 checksum: 89930 24ddd7a5de3484626f89e8c5023243b3

-- Debian GNU/Linux unstable alias sid --

Fixed in version 4.2.5-1.

ORIGINAL ADVISORY:
http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00214.html

OTHER REFERENCES:
SA27300:
http://secunia.com/advisories/27300/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close