Debian: New libapache-auth-ldap packages fix arbitrary code execution
Summary
- --------------------------------------------------------------------------Debian Security Advisory DSA 952-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff January 23rd, 2006 http://www.debian.org/security/faq - --------------------------------------------------------------------------Package : libapache-auth-ldap Vulnerability : format string Problem-Type : remote Debian-specific: no CVE ID : CVE-2006-0150 "Seregorn" discovered a format string vulnerability in the logging function of libapache-auth-ldap, an LDAP authentication module for the Apache webserver, that can lead to the execution of arbitrary code. For the old stable distribution (woody) this problem has been fixed in version 1.6.0-3.1. For the stable distribution (sarge) this problem has been fixed in version 1.6.0-8.1 The unstable distribution (sid) does no longer contain libapache-auth-ldap. We recommend that you upgrade your libapache-auth-ldap package. Upgrade Instructions - --------------------wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: Size/MD5 checksum: 652 6ef1d9323674ef6a5f076b3b65ccf60e Size/MD5 checksum: 3927 e8197f2db55a7c9e570ee5f72bc3ff39 Size/MD5 checksum: 79058 de283639b40e3f359ad6e4a65cad1813 Alpha architecture: Size/MD5 checksum: 71528 46f26f6c68fa1e900e7c3b4b6f65e83c ARM architecture: Size/MD5 checksum: 69554 59ed4e025245a4b2397530f165d7a20e Intel IA-32 architecture: Size/MD5 checksum: 68958 1bded30a2554d58d8a856e61477b42ba Intel IA-64 architecture: Size/MD5 checksum: 75804 a7af3cc2e12376a386659e118064efb3 HP Precision architecture: Size/MD5 checksum: 71264 4ee43bc263b35ec2dd199bfde43d890d Motorola 680x0 architecture: Size/MD5 checksum: 69354 ade63074b9f3ff1c6f46ff19262ecf2d Big endian MIPS architecture: Size/MD5 checksum: 68724 2ffc67d01923a581918344100a8461ae Little endian MIPS architecture: Size/MD5 checksum: 68656 e69c65426f6d102e2da0fa204e8a3b59 PowerPC architecture: Size/MD5 checksum: 70020 920814cda6c57190e68160c087b76bea IBM S/390 architecture: Size/MD5 checksum: 69386 c74da92420df9b49c48f3bd6487d8579 Sun Sparc architecture: Size/MD5 checksum: 72126 6c28b218349faffe5a8789315b41d212 Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: Size/MD5 checksum: 672 823af0881e3fc9ecaaf4ec4de445a2a1 Size/MD5 checksum: 5015 f3d65a99091bb695e9cdeb6f27c28a1b Size/MD5 checksum: 79058 de283639b40e3f359ad6e4a65cad1813 Alpha architecture: Size/MD5 checksum: 71318 fd007ba23080c94b621351ea8d4c3e2d AMD64 architecture: Size/MD5 checksum: 70800 f056405e0dd083eba4e1a97ee972be10 ARM architecture: Size/MD5 checksum: 69298 a6475d8a98ca1687d30367b24fdcdee6 Intel IA-32 architecture: Size/MD5 checksum: 69192 ddce8c4e7958dac6dd637f210f3690ea Intel IA-64 architecture: Size/MD5 checksum: 74662 07480ce393dfe2c820cdfed1e09c3fad HP Precision architecture: Size/MD5 checksum: 71836 ffb117f0c3b8ca64181509172717441e Motorola 680x0 architecture: Size/MD5 checksum: 69592 2d2436f78415a7032b7724ffc94711f2 Big endian MIPS architecture: Size/MD5 checksum: 69240 93eeb7ec212188e9fc66a38100ae0fb2 Little endian MIPS architecture: Size/MD5 checksum: 69142 e5d3c43b616478ffea76c6708726436e PowerPC architecture: Size/MD5 checksum: 71252 81e2369976e82a79babf4efd10a9c903 IBM S/390 architecture: Size/MD5 checksum: 70750 3fef60cf062e9f28ef8d3a85ef43ca91 Sun Sparc architecture: Size/MD5 checksum: 69736 fe571fe5a8d149fd8a33e00e95ef9408 These files will probably be moved into the stable distribution on its next update. - ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.