---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Debian update for libnss-ldap SECUNIA ADVISORY ID: SA28061 VERIFY ADVISORY: http://secunia.com/advisories/28061/ CRITICAL: Less critical IMPACT: Manipulation of data WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for nss-ldap. This fixes a security issue, which can be exploited by malicious persons to manipulate certain data. For more information: SA27670 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238.orig.tar.gz Size/MD5 checksum: 219945 97fd929b381329b972b3c3ddca5a4bbf http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1.diff.gz Size/MD5 checksum: 26236 c7191ee3845dc23ccf2712e78daed8f1 http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1.dsc Size/MD5 checksum: 681 3176fefa1d8d04afa9d3b458e40694a6 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_alpha.deb Size/MD5 checksum: 86756 30a9c1691dcec614e36fdea923ba3906 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_amd64.deb Size/MD5 checksum: 80218 18d9da468326040f466c10cac6f50734 arm architecture (ARM) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_arm.deb Size/MD5 checksum: 79216 adf473266dd1de600cc0360f697ec7d2 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_hppa.deb Size/MD5 checksum: 86324 f98ade45a20c5426ef30cb1290e34164 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_i386.deb Size/MD5 checksum: 78894 7bb744d57899867a0b1c326372de76ce ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_ia64.deb Size/MD5 checksum: 91930 d25cce59d45f8b8dc90b0fe3fcbf3ce0 m68k architecture (Motorola Mc680x0) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_m68k.deb Size/MD5 checksum: 76894 3c574bc294eb02c337664de43e814f7f mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_mips.deb Size/MD5 checksum: 80482 0e54d051dde87e3b7984650c47bc3b3e mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_mipsel.deb Size/MD5 checksum: 80594 9f3f4b5d6d7c9e6f84edd9ab40767e04 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_powerpc.deb Size/MD5 checksum: 81652 7ca152887a041fc3dc674a77e707d23f s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_s390.deb Size/MD5 checksum: 83806 eab2386a51d35e31a4dd7fd0ed832a6d sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_sparc.deb Size/MD5 checksum: 79224 7d2ec91b89037fd137e98d3640ba1bb4 -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1.diff.gz Size/MD5 checksum: 149322 04aa24732e69f40e5c3ab629b7e412d4 http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251.orig.tar.gz Size/MD5 checksum: 228931 a80718b3f7cf46f2579a26f9d6fbcd46 http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1.dsc Size/MD5 checksum: 683 007acb586d8bf61058c446a08aae4804 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_alpha.deb Size/MD5 checksum: 108812 1150911f5446d2bc7838fd3d9d56329d amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_amd64.deb Size/MD5 checksum: 105206 7f2e2292e5c213a4d59e0c7240a9ca7e arm architecture (ARM) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_arm.deb Size/MD5 checksum: 103946 bb4984bf517834f0278f00e8ba32a4ba hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_hppa.deb Size/MD5 checksum: 111288 2a7f758efdf03c296b2feea08205cdc7 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_i386.deb Size/MD5 checksum: 103732 0f29d1991d204b4a710e5f74bf056984 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_ia64.deb Size/MD5 checksum: 120362 e5649299793b90c3987305ac2212afad mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_mips.deb Size/MD5 checksum: 105148 1f42e34610dc974a6a5ff19a2dff1b24 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_mipsel.deb Size/MD5 checksum: 105360 af1ff4fd5a543b50f704a022798ebed0 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_powerpc.deb Size/MD5 checksum: 106458 13b702d831bde6e52507fdd466573122 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_s390.deb Size/MD5 checksum: 108466 10bc9129adbc56dd6c75569fc27a221c sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_sparc.deb Size/MD5 checksum: 103134 12c84546a715bca647b86943a226b361 -- Debian GNU/Linux unstable alias sid -- Fixed in version 256-1. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00211.html OTHER REFERENCES: SA27670: http://secunia.com/advisories/27670/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------