TITLE: Debian update for openssl SECUNIA ADVISORY ID: SA17344 VERIFY ADVISORY: http://secunia.com/advisories/17344/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux 3.0 http://secunia.com/product/143/ DESCRIPTION: Debian has issued an update for openssl. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions. For more information: SA17151 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.0 alias woody -- See patch matrix in vendor advisory. Source archives: http://security.debian.org/pool/updates/main/o/openssl094/openssl094_0.9.4-6.woody.4.dsc Size/MD5 checksum: 624 2989b7b16a146a2f9a6ca52887bb2c3f http://security.debian.org/pool/updates/main/o/openssl094/openssl094_0.9.4-6.woody.4.diff.gz Size/MD5 checksum: 47116 a4db6a4e53d8f8703da86774768cb21c http://security.debian.org/pool/updates/main/o/openssl094/openssl094_0.9.4.orig.tar.gz Size/MD5 checksum: 1570392 72544daea16d6c99d656b95f77b01b2d Alpha architecture: http://security.debian.org/pool/updates/main/o/openssl094/libssl09_0.9.4-6.woody.4_alpha.deb Size/MD5 checksum: 445816 1eaa00c5cee084727d23a8169acdb705 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/o/openssl094/libssl09_0.9.4-6.woody.4_i386.deb Size/MD5 checksum: 358626 2d3f09ec2222ac497180a01facea470c PowerPC architecture: http://security.debian.org/pool/updates/main/o/openssl094/libssl09_0.9.4-6.woody.4_powerpc.deb Size/MD5 checksum: 378870 58d0d41fa2005b5d05f49c557023c466 -- Debian GNU/Linux 3.1 -- See patch matrix in vendor advisory. -- Debian GNU/Linux unstable alias sid -- See patch matrix in vendor advisory. ORIGINAL ADVISORY: http://www.debian.org/security/2005/dsa-875 OTHER REFERENCES: SA17151: http://secunia.com/advisories/17151/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------