---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Debian update for yarssr SECUNIA ADVISORY ID: SA28671 VERIFY ADVISORY: http://secunia.com/advisories/28671/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ DESCRIPTION: Debian has issued an update for yarssr. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. For more information: SA27454 SOLUTION: Apply updated packages. -- Debian 4.0 (stable) -- Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/y/yarssr/yarssr_0.2.2-1etch1.diff.gz Size/MD5 checksum: 6420 105059b6e1b31d82b77ae3bb2d788fa6 http://security.debian.org/pool/updates/main/y/yarssr/yarssr_0.2.2.orig.tar.gz Size/MD5 checksum: 21077 1825b214043c8d37fc8bad6935f0137a http://security.debian.org/pool/updates/main/y/yarssr/yarssr_0.2.2-1etch1.dsc Size/MD5 checksum: 584 83e4a6cb616defe9d78f55ef06d6379c Architecture independent packages: http://security.debian.org/pool/updates/main/y/yarssr/yarssr_0.2.2-1etch1_all.deb Size/MD5 checksum: 23498 d8bd255215bdb7042260997fb76741cd ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00039.html OTHER REFERENCES: SA27454: http://secunia.com/advisories/27454/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------