---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for ctorrent SECUNIA ADVISORY ID: SA35499 VERIFY ADVISORY: http://secunia.com/advisories/35499/ DESCRIPTION: Debian has issued an update for ctorrent. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. For more information: SA34752 SOLUTION: Apply updated packages. -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1.diff.gz Size/MD5 checksum: 6427 a8eb130df614638863d1de39f80aeb3c http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1.dsc Size/MD5 checksum: 1132 2159a81d35c934811cc4b65a5d51c63e http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2.orig.tar.gz Size/MD5 checksum: 201651 8c4605ea3a1f6d09da593c25b5ab7dbd alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1_alpha.deb Size/MD5 checksum: 124858 5fce08bb15b4706ae4dc25c20a9da7b4 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1_amd64.deb Size/MD5 checksum: 112618 34ca707d68325c7b3939338d0b0ca7c2 arm architecture (ARM) http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1_arm.deb Size/MD5 checksum: 111212 8e4c1fa0ef849a48d3a87e5f68543520 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1_armel.deb Size/MD5 checksum: 109968 60648ec18a34e50b483fbbf3dacba958 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1_hppa.deb Size/MD5 checksum: 126318 e784df9d63ad73e20cc295f9afd3a436 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1_i386.deb Size/MD5 checksum: 107962 d17a52c0f1c4f78cb912159719eaca5d ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1_ia64.deb Size/MD5 checksum: 161648 179939230644da247cc342e8b2695df4 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1_mips.deb Size/MD5 checksum: 123522 efe46dd5e1f6604d01e4e9dccedae3d6 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1_mipsel.deb Size/MD5 checksum: 124204 5af9aa2d675d420684e78250663098a1 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1_powerpc.deb Size/MD5 checksum: 123882 ee2163a4290b1c617e5b0a90caa7b4c4 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1_s390.deb Size/MD5 checksum: 115012 fcb29b56a042601293a48ae9a406fc0b sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/c/ctorrent/ctorrent_1.3.4-dnh3.2-1+lenny1_sparc.deb Size/MD5 checksum: 111682 149c6237664380b0d6c6cb74a3006e0d ORIGINAL ADVISORY: DSA 1817-1: http://lists.debian.org/debian-security-announce/2009/msg00129.html OTHER REFERENCES: SA34752: http://secunia.com/advisories/34752/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------