TITLE: Debian update for libapache2-mod-auth-pgsql SECUNIA ADVISORY ID: SA18397 VERIFY ADVISORY: http://secunia.com/advisories/18397/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for libapache2-mod-auth-pgsql. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. For more information: SA18304 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0.dsc Size/MD5 checksum: 718 64320b302321622c1007810e18f6559a http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0.diff.gz Size/MD5 checksum: 5031 400a8ca9689409375c56eafe38a957a7 http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1.orig.tar.gz Size/MD5 checksum: 15928 e2c032df0cd7e4a46381dcf6e488efe9 Alpha architecture: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_alpha.deb Size/MD5 checksum: 20410 4e2c27c73a6ca3ca70713e31842c01ca AMD64 architecture: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_amd64.deb Size/MD5 checksum: 20040 9b542446b7336c88c2ffabdad730b74f ARM architecture: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_arm.deb Size/MD5 checksum: 18806 fcf3a9529b0b2af5a67237360c60f554 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_i386.deb Size/MD5 checksum: 19406 f869e108de0839dcdcc2ee9459a8848d Intel IA-64 architecture: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_ia64.deb Size/MD5 checksum: 22282 018e612149c4d4a2cb139ee91b972cae HP Precision architecture: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_hppa.deb Size/MD5 checksum: 20686 dc84765b12cb57c7c2b68d9f875d8f07 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_m68k.deb Size/MD5 checksum: 18944 ab3c2f517273d868d8dd3fcf9b78ea0a Big endian MIPS architecture: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_mips.deb Size/MD5 checksum: 18884 cfed58fc3dd4bc0e7b635f048b9ef317 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_mipsel.deb Size/MD5 checksum: 18860 dc5b1b912b0fcf62d2a8edc7a5a9fa52 PowerPC architecture: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_powerpc.deb Size/MD5 checksum: 20710 bdc297d45748433b2adcd3ac962612a3 IBM S/390 architecture: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_s390.deb Size/MD5 checksum: 19840 798db337084461ee60239274cf89f4e0 Sun Sparc architecture: http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_sparc.deb Size/MD5 checksum: 19006 6cd6c8809599feec59df63281adcfd7b -- Debian GNU/Linux unstable alias sid -- The vulnerability will reportedly be fixed shortly. ORIGINAL ADVISORY: http://www.debian.org/security/2006/dsa-935 OTHER REFERENCES: SA18304: http://secunia.com/advisories/18304/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------