---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Learn more: http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: Debian update for blender SECUNIA ADVISORY ID: SA30097 VERIFY ADVISORY: http://secunia.com/advisories/30097/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for blender. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. For more information: SA29818 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1.dsc Size/MD5 checksum: 1124 2304ad7948f44a1c087e8906f9a676bd http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1.diff.gz Size/MD5 checksum:29617 79175d7996d5e0ea9a981b5c0cdac8ad http://security.debian.org/pool/updates/main/b/blender/blender_2.42a.orig.tar.gz Size/MD5 checksum: 12295244 3d60b7ebe0dea47da12744fe2462d96c alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_alpha.deb Size/MD5 checksum:7062442 57776aac61b9871dcf66da61be6be9f5 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_amd64.deb Size/MD5 checksum:6354226 78f6f086e2a2598fb0b40d861a203dfe arm architecture (ARM) http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_arm.deb Size/MD5 checksum:6559778 cea3f23a01a0147b43698494a893effd hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_hppa.deb Size/MD5 checksum:7243926 233690a809c3f39aa742697705e17429 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_i386.deb Size/MD5 checksum:6303940 57ead1737c28b69c2a82fd29bb41e814 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_ia64.deb Size/MD5 checksum:8875392 2d30aa1cd1838e96a4551df38fc7fdf5 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_mips.deb Size/MD5 checksum:6187970 9684782927a3d39931d19575dd194bda mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_mipsel.deb Size/MD5 checksum:6119168 bdd46a3989ed69a645cf53f4cf526f47 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_powerpc.deb Size/MD5 checksum:6536610 8cca411968cbabba698b5938bd486f81 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_s390.deb Size/MD5 checksum:6447592 91f556b6e00439aae903ce9cd63dc14c sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_sparc.deb Size/MD5 checksum:6421798 f5855fdef3d8ca0b896d4720b9ef4651 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.45-5. ORIGINAL ADVISORY: http://www.us.debian.org/security/2008/dsa-1567 OTHER REFERENCES: SA29818: http://secunia.com/advisories/29818/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------