---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for libxml SECUNIA ADVISORY ID: SA36290 VERIFY ADVISORY: http://secunia.com/advisories/36290/ DESCRIPTION: Debian has issued an update for libxml. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA36207 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Debian (oldstable) Source archives: http://security.debian.org/pool/updates/main/libx/libxml/libxml_1.8.17-14+etch1.diff.gz Size/MD5 checksum: 366268 512cbc5adce12b54741cadd80e62eb7d http://security.debian.org/pool/updates/main/libx/libxml/libxml_1.8.17.orig.tar.gz Size/MD5 checksum: 1016403 b8f01e43e1e03dec37dfd6b4507a9568 http://security.debian.org/pool/updates/main/libx/libxml/libxml_1.8.17-14+etch1.dsc Size/MD5 checksum: 716 26bf8a9d037f583d4a9dc1dab5aa4792 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_alpha.deb Size/MD5 checksum: 429312 749dda70c33689b70d13469f6c3357ac http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_alpha.deb Size/MD5 checksum: 233288 02b88e80b91681e956cb4ab19acfeca6 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_amd64.deb Size/MD5 checksum: 223558 ceb0d44c5a6a50373af43359e83667e7 http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_amd64.deb Size/MD5 checksum: 383872 fc52303783696d53c20999a82e962bd7 arm architecture (ARM) http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_arm.deb Size/MD5 checksum: 356830 43860080fa42274a3d7ad649a6dea3fd http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_arm.deb Size/MD5 checksum: 197970 63134af5530d4ab6f1a41046136ea62d hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_hppa.deb Size/MD5 checksum: 429646 938ea12262d6fe02426a8d59f5242794 http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_hppa.deb Size/MD5 checksum: 240036 52f8f7e7c277f0b37fdba7e4b1609f19 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_i386.deb Size/MD5 checksum: 212762 b25bde43ee075fa743b1f037a43919b8 http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_i386.deb Size/MD5 checksum: 364460 0d3f3229b87c1b2d2ff614679d805600 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_ia64.deb Size/MD5 checksum: 498736 7fa5b542dcd264d899ea0b49cdf4ffdc http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_ia64.deb Size/MD5 checksum: 315918 7e2351fbb88e55dcabcd4bbca3bb26c0 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_mips.deb Size/MD5 checksum: 411816 f32a3c2d678a256691a7a6b300467eeb http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_mips.deb Size/MD5 checksum: 209842 603a443d76deb3bafea7e288f102d2bb mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_mipsel.deb Size/MD5 checksum: 408602 36e9600b0be7e846b4788cd475413858 http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_mipsel.deb Size/MD5 checksum: 210312 e78866fce8cdc8fd0854203a73f50a6e powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_powerpc.deb Size/MD5 checksum: 213862 5a6fde00e79c0ab8a873f0f0d2bfc028 http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_powerpc.deb Size/MD5 checksum: 388622 c93294decb6b25bb4c3fe43dc0fa25e2 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_s390.deb Size/MD5 checksum: 387402 43844dfcb0401e9fd1ac3d4c80281f83 http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_s390.deb Size/MD5 checksum: 226562 c9da4865e04f157ceacde8f59b040f28 ORIGINAL ADVISORY: DSA-1861-1: http://www.us.debian.org/security/2009/dsa-1861 OTHER REFERENCES: SA36207: http://secunia.com/advisories/36207/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------