TITLE: Debian update for elog SECUNIA ADVISORY ID: SA18783 VERIFY ADVISORY: http://secunia.com/advisories/18783/ CRITICAL: Highly critical IMPACT: Security Bypass, Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for elog. This fixes some vulnerabilities and a security issue, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), bypass certain security restrictions, and potentially compromise a vulnerable system. For more information: SA18124 SA18533 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2.dsc Size/MD5 checksum: 581 ed02ecef4eb70c7344532b1a75f893bc http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2.diff.gz Size/MD5 checksum: 21652 ab45bff97bf2e7c42cd5ccca5a80103e http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558.orig.tar.gz Size/MD5 checksum: 538216 e05c9fdaa02692ce20c70a5fd2748fe3 Alpha architecture: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_alpha.deb Size/MD5 checksum: 555270 5cb3aba4fc1303a65984aab4acaf32da AMD64 architecture: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_amd64.deb Size/MD5 checksum: 511706 5e41b71ee6f3a42d5e7ac033b436c059 ARM architecture: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_arm.deb Size/MD5 checksum: 516094 95f2c045af860501a8e8bad54d0f6958 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_i386.deb Size/MD5 checksum: 513918 0dfe3628e07c5cea6f2609683104dbab Intel IA-64 architecture: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_ia64.deb Size/MD5 checksum: 597254 7f83bb7006849edf56411255e0b55e5f HP Precision architecture: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_hppa.deb Size/MD5 checksum: 543576 a09646d99c692e210164fb4a7f58c05a Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_m68k.deb Size/MD5 checksum: 482016 b92bbd85b3d1041cbf403070e4aa43c7 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_mips.deb Size/MD5 checksum: 521234 33f7d96179fa0b4bd7cd314a33c54e31 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_mipsel.deb Size/MD5 checksum: 524336 b30ef21a7a9a958839569cf548fffebb PowerPC architecture: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_powerpc.deb Size/MD5 checksum: 523540 823e5cb99e854a5ba0264259d7116deb IBM S/390 architecture: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_s390.deb Size/MD5 checksum: 514274 01f3ebd90422c9d94c109f60921c2634 Sun Sparc architecture: http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_sparc.deb Size/MD5 checksum: 518960 661427182cad6ca5a08663ffa505e4ef -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.6.1+r1642-1. CHANGELOG: http://www.debian.org/security/2006/dsa-967 OTHER REFERENCES: SA18124: http://secunia.com/advisories/18124/ SA18533: http://secunia.com/advisories/18533/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------