- ------------------------------------------------------------------------ Debian Security Advisory DSA-1786-1 security@debian.org https://www.debian.org/security/ Steffen Joeris May 02, 2009 https://www.debian.org/security/faq - ------------------------------------------------------------------------ Package : acpid Vulnerability : denial of service Problem type : remote Debian-specific: no CVE Id : CVE-2009-0798 It was discovered that acpid, a daemon for delivering ACPI events, is prone to a denial of service attack by opening a large number of UNIX sockets, which are not closed properly. For the stable distribution (lenny), this problem has been fixed in version 1.0.8-1lenny1. For the oldstable distribution (etch), this problem has been fixed in version 1.0.4-5etch1. For the testing distribution (squeeze) and the unstable distribution (sid), this problem has been fixed in version 1.0.10-1. We recommend that you upgrade your acpid packages. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - ------------------------------- Debian (oldstable) - ------------------ Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: Size/MD5 checksum: 23416 3aff94e92186e99ed5fd6dcee2db7c74 Size/MD5 checksum: 623 5bdf431edd68f502a269c3ed93023416 Size/MD5 checksum: 12446 97300b3586c815e0954b8dbd4eea7aa2 amd64 architecture (AMD x86_64 (AMD64)) Size/MD5 checksum: 28616 626f43fa08946939e3d44092c30e8538 i386 architecture (Intel ia32) Size/MD5 checksum: 25372 7c0e2c68816e6ddb5d1e2ac0ae7f5580 ia64 architecture (Intel ia64) Size/MD5 checksum: 33650 e12d65573422a71a5529587543601146 Debian GNU/Linux 5.0 alias lenny - -------------------------------- Debian (stable) - --------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: Size/MD5 checksum: 18689 bad776513fe975f1d028d605be805be3 Size/MD5 checksum: 1289 6f9dc2ce42fbcd28d217f0208cdfd566 Size/MD5 checksum: 25308 ee48ff966292ec517ba83b37dd0a3256 amd64 architecture (AMD x86_64 (AMD64)) Size/MD5 checksum: 37898 27be010a11b42cf1a92cced7f09dfc8b i386 architecture (Intel ia32) Size/MD5 checksum: 35596 4638a7439832ecdc869e592c6066ea4b ia64 architecture (Intel ia64) Size/MD5 checksum: 42846 1046165b9c0cdcdb9021375179279b2d These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb https://security.debian.org/ stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show' and https://packages.debian.org/