---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Ubuntu update for util-linux SECUNIA ADVISORY ID: SA16857 VERIFY ADVISORY: http://secunia.com/advisories/16857/ CRITICAL: Not critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Ubuntu Linux 4.10 http://secunia.com/product/4491/ Ubuntu Linux 5.04 http://secunia.com/product/5036/ DESCRIPTION: Ubuntu has issued an update for util-linux. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. For more information: SA16785 SOLUTION: Apply updated packages. -- Ubuntu 4.10 (Warty Warthog) -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12-7ubuntu6.1.diff.gz Size/MD5: 109678 0f53c5d6208be9e3cff6aeddc8c425a0 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12-7ubuntu6.1.dsc Size/MD5: 684 9eeee328200d97c7061c26f6282a8546 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12.orig.tar.gz Size/MD5: 1857871 997adf78b98d9d1c5db4f37ea982acff Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux-locales_2.12-7ubuntu6.1_all.deb Size/MD5: 1003200 ed3311f9aa0a7e56c23577d047c319fd amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/bsdutils_2.12-7ubuntu6.1_amd64.deb Size/MD5: 64334 6882395e415054b701c2e70bdb67ee0e http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/fdisk-udeb_2.12-7ubuntu6.1_amd64.udeb Size/MD5: 482704 f9a48c8a7375e9f8074c065aabdd6838 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/mount_2.12-7ubuntu6.1_amd64.deb Size/MD5: 141548 9eb9d95d01f993f448ad7ca939c111f4 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12-7ubuntu6.1_amd64.deb Size/MD5: 397282 ff8ef6b3bbd984d6dede6354541aaff7 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/bsdutils_2.12-7ubuntu6.1_i386.deb Size/MD5: 62742 f704e179423d77e77af3d00870fe8167 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/fdisk-udeb_2.12-7ubuntu6.1_i386.udeb Size/MD5: 474138 a8ca30bfa696161380b877670c4d9419 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/mount_2.12-7ubuntu6.1_i386.deb Size/MD5: 135724 00e352bc778a4dda0f03501c96f747ab http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12-7ubuntu6.1_i386.deb Size/MD5: 373882 a66f10929e0ccd92428499e2406e6b50 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/bsdutils_2.12-7ubuntu6.1_powerpc.deb Size/MD5: 63050 197f4dcd622e12c1e603a189dcb411d3 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/fdisk-udeb_2.12-7ubuntu6.1_powerpc.udeb Size/MD5: 487592 196015505a5781c9000686b0e3692d1f http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/mount_2.12-7ubuntu6.1_powerpc.deb Size/MD5: 137564 6844adb2e3b7e2688579d08db55a3bb0 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12-7ubuntu6.1_powerpc.deb Size/MD5: 399388 35f96a97db999cced0307bd0acb6897f -- Ubuntu 5.04 (Hoary Hedgehog) -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12p-2ubuntu2.1.dsc Size/MD5: 718 87d4453343f20f472d6c22f57f8f0024 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12p-2ubuntu2.2.diff.gz Size/MD5: 74592 09a577be3acfe5951136f6bcb969106b http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12p-2ubuntu2.2.dsc Size/MD5: 718 d3964d818741de394f6758e9b344d176 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12p.orig.tar.gz Size/MD5: 2001658 d47e820f6880c21c8b4c0c7e8a7376cc Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux-locales_2.12p-2ubuntu2.2_all.deb Size/MD5: 1071916 dc0eceabc84f3d65ce6360fbeb557d2c amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/bsdutils_2.12p-2ubuntu2.2_amd64.deb Size/MD5: 67510 587db10c31483770140574c96b088bb4 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/fdisk-udeb_2.12p-2ubuntu2.2_amd64.udeb Size/MD5: 550626 9ae6cb429953fc0540c854abaf2e6651 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/mount_2.12p-2ubuntu2.2_amd64.deb Size/MD5: 146380 a46a1901f8c9ec9bf9aa677f27bbc79c http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12p-2ubuntu2.2_amd64.deb Size/MD5: 401386 5ba3eb993cb8ea376d9570405c57730d i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/bsdutils_2.12p-2ubuntu2.2_i386.deb Size/MD5: 65744 e377676d6d4a1d7442b7eb4c79356dd4 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/fdisk-udeb_2.12p-2ubuntu2.2_i386.udeb Size/MD5: 541066 7045bd2f3ebdec339c4f4fc8d68bc9be http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/mount_2.12p-2ubuntu2.2_i386.deb Size/MD5: 140696 c5156a184a4d9fc45a80a3688ef10d89 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12p-2ubuntu2.2_i386.deb Size/MD5: 377960 ed0dd2a6803e2163aad3d13b15ca46e4 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/bsdutils_2.12p-2ubuntu2.2_powerpc.deb Size/MD5: 66254 75c8f28f2d50a2f27bcaf2808d7ae4f7 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/fdisk-udeb_2.12p-2ubuntu2.2_powerpc.udeb Size/MD5: 556402 e4a18ea0ff5552fa8c341e077cf87bdc http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/mount_2.12p-2ubuntu2.2_powerpc.deb Size/MD5: 147474 d03bf255994b756f8a80485ee28a3460 http://security.ubuntu.com/ubuntu/pool/main/u/util-linux/util-linux_2.12p-2ubuntu2.2_powerpc.deb Size/MD5: 406646 92f63f8884ae854e9f6f7c2f0d9df731 ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-184-1 OTHER REFERENCES: SA16785: http://secunia.com/advisories/16785/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------