TITLE: Debian update for libcrypt-cbc-perl SECUNIA ADVISORY ID: SA19187 VERIFY ADVISORY: http://secunia.com/advisories/19187/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for libcrypt-cbc-perl. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. For more information: SA18755 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/libc/libcrypt-cbc-perl/libcrypt-cbc-perl_2.12-1sarge1.dsc Size/MD5 checksum: 631 a30dd4cde44e3a484b28ad8fc1b67e38 http://security.debian.org/pool/updates/main/libc/libcrypt-cbc-perl/libcrypt-cbc-perl_2.12-1sarge1.diff.gz Size/MD5 checksum: 4165 8bb65642884ea281f83026f2d98c6146 http://security.debian.org/pool/updates/main/libc/libcrypt-cbc-perl/libcrypt-cbc-perl_2.12.orig.tar.gz Size/MD5 checksum: 11036 27842b8ab627681b4a322610ea6184b5 Architecture independent components: http://security.debian.org/pool/updates/main/libc/libcrypt-cbc-perl/libcrypt-cbc-perl_2.12-1sarge1_all.deb Size/MD5 checksum: 18162 d625af2e10974eaafb007d538a90ebad -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.17-1. ORIGINAL ADVISORY: http://www.debian.org/security/2006/dsa-996 OTHER REFERENCES: SA18755: http://secunia.com/advisories/18755/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------