---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for slash SECUNIA ADVISORY ID: SA31691 VERIFY ADVISORY: http://secunia.com/advisories/31691/ CRITICAL: Less critical IMPACT: Cross Site Scripting, Manipulation of data WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for slash. This fixes some vulnerabilities, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks. For more information: SA30551 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1.dsc Size/MD5 checksum: 954 70b86d7e0c6f4d70e6ecc1e027739be5 http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6.orig.tar.gz Size/MD5 checksum: 584128 a9886e1e08e47e0db4f3ba3e750102ff http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1.diff.gz Size/MD5 checksum: 21622 2b23a32433e9b168b09ad43e0fd1d160 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1_alpha.deb Size/MD5 checksum: 591940 9e38837b0a8f3cc1d3459dacc58c23c6 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1_amd64.deb Size/MD5 checksum: 588970 e81e95ed88e082dc56cd10b3770c4360 arm architecture (ARM) http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1_arm.deb Size/MD5 checksum: 589446 925a97d085854e35f4e9bd678b99454e hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1_hppa.deb Size/MD5 checksum: 594236 702a6635658253ad1c5c69169174dcfc i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1_i386.deb Size/MD5 checksum: 587830 005ed926fe7595e45d2780c37bd6d09f ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1_ia64.deb Size/MD5 checksum: 589356 a75d5d65a4499f1d9278df08849959ce mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1_mips.deb Size/MD5 checksum: 586112 a2b1336b77de1682ae764c3e05a5950e mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1_mipsel.deb Size/MD5 checksum: 587726 25c8ea639b4aa9c924e26ab33e5d59d6 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1_powerpc.deb Size/MD5 checksum: 590880 71de67c5a29a3c3122f74570ea090435 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1_s390.deb Size/MD5 checksum: 587744 c4809262d63d3449c41e8816b2a8cea1 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/s/slash/slash_2.2.6-8etch1_sparc.deb Size/MD5 checksum: 588014 8ef8f770f5f22f9473133f382fd7bb18 -- Debian GNU/Linux unstable alias sid -- Reportedly, the package will be removed soon. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/2008/msg00222.html OTHER REFERENCES: SA30551: http://secunia.com/advisories/30551/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------