---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: Debian update for rt2400, rt2500, and rt2570 SECUNIA ADVISORY ID: SA33699 VERIFY ADVISORY: http://secunia.com/advisories/33699/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/advisories/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/advisories/product/530/ DESCRIPTION: Debian has issued an update for rt2400, rt2500, and rt2570. This fixes a vulnerability, which can be exploited to cause a DoS (Denial of Service) or compromise a vulnerable system. For more information: SA33592 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Packages for rt2400: Source archives: http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620-4+etch1.diff.gz Size/MD5 checksum: 7714 8e2c4e3994e44d85fbeb2fa7008450e6 http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620.orig.tar.gz Size/MD5 checksum: 222661 333bf6d7fa81a6d78c72aad6a48e9bc3 http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620-4+etch1.dsc Size/MD5 checksum: 740 50541cf208cbf6ea4a1daa43fb3310e1 Architecture independent packages: http://security.debian.org/pool/updates/main/r/rt2400/rt2400-source_1.2.2+cvs20060620-4+etch1_all.deb Size/MD5 checksum: 173206 daa9749dbfce18e2b01dbd780d1ad72c amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620-4+etch1_amd64.deb Size/MD5 checksum: 99638 01755d0da49a73c9fab80ac6a1578e2e arm architecture (ARM) http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620-4+etch1_arm.deb Size/MD5 checksum: 118484 6175c5c6e0b4cd9b8debaa2a0b1c9b27 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620-4+etch1_hppa.deb Size/MD5 checksum: 107430 7dd595c837b5da5d4a82cf0ada0e2e5c i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620-4+etch1_i386.deb Size/MD5 checksum: 96342 4175c89f1225fa118df7e39dcf1802e4 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620-4+etch1_ia64.deb Size/MD5 checksum: 127374 3edfc63723ea340604b7506e8b914f11 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620-4+etch1_mips.deb Size/MD5 checksum: 98572 1d73f7d80336187bbd87640a8ad84938 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620-4+etch1_mipsel.deb Size/MD5 checksum: 97994 4106b884f5ebf8256c1e5be167388333 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620-4+etch1_powerpc.deb Size/MD5 checksum: 94938 f8674036f710a5614ff54bdc30b8cdb2 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620-4+etch1_s390.deb Size/MD5 checksum: 83772 e70417720e8afd4521279964cc36ecda sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/r/rt2400/rt2400_1.2.2+cvs20060620-4+etch1_sparc.deb Size/MD5 checksum: 91478 11d9a654f14f5385c03e874fd1f222f5 Packages for rt2500: Source archives: http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620.orig.tar.gz Size/MD5 checksum: 386980 83b8b9a091705c08d99268479f3b3b6a http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620-3+etch1.dsc Size/MD5 checksum: 741 a3eea1c14fa7e8f1d4782b4883a776a9 http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620-3+etch1.diff.gz Size/MD5 checksum: 22084 0c2d17d34652f8ec6b6aca06ab31a8cc Architecture independent packages: http://security.debian.org/pool/updates/main/r/rt2500/rt2500-source_1.1.0+cvs20060620-3+etch1_all.deb Size/MD5 checksum: 249304 919b5148aa8d66121c6426cd18f62acd amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620-3+etch1_amd64.deb Size/MD5 checksum: 113796 e5d30f0f2b49333de0aa11b85b2631e4 arm architecture (ARM) http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620-3+etch1_arm.deb Size/MD5 checksum: 139742 0e78f96d66b7c4f441dc6e8282c3ebad hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620-3+etch1_hppa.deb Size/MD5 checksum: 126244 4670c39b26f1fae2de0ddb897f0fcb6d i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620-3+etch1_i386.deb Size/MD5 checksum: 111508 d6023fa941e03e1668d4f677445f9293 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620-3+etch1_ia64.deb Size/MD5 checksum: 148124 7602e91c6fb3482b1d8e2a71cc783a67 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620-3+etch1_mips.deb Size/MD5 checksum: 114762 e9fe9e17287d1ef1d51f03e2cfc80f8a mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620-3+etch1_mipsel.deb Size/MD5 checksum: 113842 5194921501700ae59b038a6ed551bd97 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620-3+etch1_powerpc.deb Size/MD5 checksum: 111836 c61737ae5a3a6337f24d8fc0c8c42c4d s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620-3+etch1_s390.deb Size/MD5 checksum: 96484 c4a13741dd9b78672363953a94a49e71 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/r/rt2500/rt2500_1.1.0+cvs20060620-3+etch1_sparc.deb Size/MD5 checksum: 106934 b36a8b1de80914c0026e2eeb3e17ddc1 Packages for rt2570: Source archives: http://security.debian.org/pool/updates/main/r/rt2570/rt2570_1.1.0+cvs20060620-3+etch1.dsc Size/MD5 checksum: 664 457b00a7cf3d60bef559e9cdc442e036 http://security.debian.org/pool/updates/main/r/rt2570/rt2570_1.1.0+cvs20060620-3+etch1.diff.gz Size/MD5 checksum: 4958 20b48e5fb05d999bfc643a2bb0c7401f http://security.debian.org/pool/updates/main/r/rt2570/rt2570_1.1.0+cvs20060620.orig.tar.gz Size/MD5 checksum: 253367 f4131d670920a878b4d4a0f5d4d8b93a Architecture independent packages: http://security.debian.org/pool/updates/main/r/rt2570/rt2570-source_1.1.0+cvs20060620-3+etch1_all.deb Size/MD5 checksum: 252986 58a62ca3f7d3b1b49cfbe9aa02eabe7b -- Debian GNU/Linux unstable alias sid -- rt2400: Fixed in version 1.2.2+cvs20080623-3. rt2500: Fixed in version 1:1.1.0-b4+cvs20080623-3. rt2570: Fixed in version 1.1.0+cvs20080623-2. ORIGINAL ADVISORY: DSA-1712-1: http://lists.debian.org/debian-security-announce/2009/msg00020.html DSA-1713-1: http://lists.debian.org/debian-security-announce/2009/msg00021.html DSA-1714-1: http://lists.debian.org/debian-security-announce/2009/msg00022.html OTHER REFERENCES: SA33592: http://secunia.com/advisories/33592/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------