---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Debian update for libopenssl-ruby SECUNIA ADVISORY ID: SA27769 VERIFY ADVISORY: http://secunia.com/advisories/27769/ CRITICAL: Less critical IMPACT: Spoofing WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for libopenssl-ruby. This fixes some security issues, which can be exploited by malicious people to conduct spoofing attacks. For more information: SA26985 SOLUTION: Apply updated packages. -- Debian 3.1 (oldstable) -- Source archives: http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby_0.1.4a-1sarge1.diff.gz Size/MD5 checksum: 4416 25ee3170c96536d66cd8640474bebf85 http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby_0.1.4a.orig.tar.gz Size/MD5 checksum:84122 303d0473fdb1480a0936a5661d8ba8e3 http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby_0.1.4a-1sarge1.dsc Size/MD5 checksum:654 b1f510c66bbb4af526741c8d5911ffba alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_alpha.deb Size/MD5 checksum:99566 17d715cd50ba41f6c139844de72b50a0 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_amd64.deb Size/MD5 checksum:97832 3a57407b743683544483941f8739f276 arm architecture (ARM) http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_arm.deb Size/MD5 checksum:90504 80218918d52c9063de2679a0ef308350 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_hppa.deb Size/MD5 checksum: 102480 5b217e95e5acd0b41ef69f0fa373ed73 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_i386.deb Size/MD5 checksum:93628 6dd15a1fb32a3792811a7955083d835e ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_ia64.deb Size/MD5 checksum: 112496 8dd845a285ba4c46aa148d5e03e142cd m68k architecture (Motorola Mc680x0) http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_m68k.deb Size/MD5 checksum:94740 25df2cf97eb03a8f1a53c447cfdc7e73 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_mips.deb Size/MD5 checksum:83622 0637caea582cefd6994e9c1bfd105464 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_mipsel.deb Size/MD5 checksum:82978 a717ab31fb14a34d75c7209ba3ad0bda powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_powerpc.deb Size/MD5 checksum:91528 317a63aba89b5255f4bb8f2a3031d563 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_s390.deb Size/MD5 checksum:99954 578551946138e9b1cf38ff65dea29b53 ORIGINAL ADVISORY: http://www.us.debian.org/security/2007/dsa-1411 OTHER REFERENCES: SA26985: http://secunia.com/advisories/26985/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------