TITLE:
Debian update for elog

SECUNIA ADVISORY ID:
SA18783

VERIFY ADVISORY:
http://secunia.com/advisories/18783/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, Exposure of sensitive information, DoS, System
access

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
Debian GNU/Linux 3.1
http://secunia.com/product/5307/

DESCRIPTION:
Debian has issued an update for elog. This fixes some vulnerabilities
and a security issue, which can be exploited by malicious people to
disclose potentially sensitive information, cause a DoS (Denial of
Service), bypass certain security restrictions, and potentially
compromise a vulnerable system.

For more information:
SA18124
SA18533

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2.dsc
Size/MD5 checksum: 581 ed02ecef4eb70c7344532b1a75f893bc
http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2.diff.gz
Size/MD5 checksum: 21652 ab45bff97bf2e7c42cd5ccca5a80103e
http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558.orig.tar.gz
Size/MD5 checksum: 538216 e05c9fdaa02692ce20c70a5fd2748fe3

Alpha architecture:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_alpha.deb
Size/MD5 checksum: 555270 5cb3aba4fc1303a65984aab4acaf32da

AMD64 architecture:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_amd64.deb
Size/MD5 checksum: 511706 5e41b71ee6f3a42d5e7ac033b436c059

ARM architecture:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_arm.deb
Size/MD5 checksum: 516094 95f2c045af860501a8e8bad54d0f6958

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_i386.deb
Size/MD5 checksum: 513918 0dfe3628e07c5cea6f2609683104dbab

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_ia64.deb
Size/MD5 checksum: 597254 7f83bb7006849edf56411255e0b55e5f

HP Precision architecture:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_hppa.deb
Size/MD5 checksum: 543576 a09646d99c692e210164fb4a7f58c05a

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_m68k.deb
Size/MD5 checksum: 482016 b92bbd85b3d1041cbf403070e4aa43c7

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_mips.deb
Size/MD5 checksum: 521234 33f7d96179fa0b4bd7cd314a33c54e31

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_mipsel.deb
Size/MD5 checksum: 524336 b30ef21a7a9a958839569cf548fffebb

PowerPC architecture:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_powerpc.deb
Size/MD5 checksum: 523540 823e5cb99e854a5ba0264259d7116deb

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_s390.deb
Size/MD5 checksum: 514274 01f3ebd90422c9d94c109f60921c2634

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/e/elog/elog_2.5.7+r1558-4+sarge2_sparc.deb
Size/MD5 checksum: 518960 661427182cad6ca5a08663ffa505e4ef

-- Debian GNU/Linux unstable alias sid --

Fixed in version 2.6.1+r1642-1.

CHANGELOG:
http://www.debian.org/security/2006/dsa-967

OTHER REFERENCES:
SA18124:
http://secunia.com/advisories/18124/

SA18533:
http://secunia.com/advisories/18533/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------