TITLE: Debian update for arc SECUNIA ADVISORY ID: SA17068 VERIFY ADVISORY: http://secunia.com/advisories/17068/ CRITICAL: Less critical IMPACT: Exposure of sensitive information, Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for arc. This fixes a security issue and a vulnerability, which can be exploited by malicious, local users to gain access to sensitive information and perform certain actions on a vulnerable system with escalated privileges. For more information: SA16805 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1.dsc Size/MD5 checksum: 552 4ebba22896668e091043fb909dd7f0b7 http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1.diff.gz Size/MD5 checksum: 3323 1c70a26064195b6664b296313c73cbc0 http://security.debian.org/pool/updates/main/a/arc/arc_5.21l.orig.tar.gz Size/MD5 checksum: 82134 f30654fbe80640f0219c33d0f2f64021 Alpha architecture: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_alpha.deb Size/MD5 checksum: 67312 081b0a1573d4f3a2ce35e937200a56bd AMD64 architecture: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_amd64.deb Size/MD5 checksum: 60646 c8edb347de5f20d8f17a93bde98fc9fd ARM architecture: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_arm.deb Size/MD5 checksum: 57442 2ad784c9a055046c2e47990ae8155001 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_i386.deb Size/MD5 checksum: 55506 f8c3fb1adb553abbcceabdeb5a3aea82 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_ia64.deb Size/MD5 checksum: 73842 d70cebf9b47a8630692450476fe9062c HP Precision architecture: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_hppa.deb Size/MD5 checksum: 62028 a33d986f66f7ca3d5f582fbf495bb45f Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_m68k.deb Size/MD5 checksum: 52462 51ad27d071bb88b938de56b58dbe6d0e Big endian MIPS architecture: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_mips.deb Size/MD5 checksum: 64456 6991489144d5381fe19b73edc104f7a3 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_mipsel.deb Size/MD5 checksum: 64228 c0ba8aaac79f6547d13db04ba13b39bd PowerPC architecture: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_powerpc.deb Size/MD5 checksum: 60004 85870f99024711bdf1bc5ed32398ce07 IBM S/390 architecture: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_s390.deb Size/MD5 checksum: 60052 5adb2907170ef095d50daf397193cfa2 Sun Sparc architecture: http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_sparc.deb Size/MD5 checksum: 57084 88ec040ae647afb844d1c98a4c7a77a7 -- Debian GNU/Linux unstable alias sid -- Fixed in version 5.21m-1. ORIGINAL ADVISORY: http://www.debian.org/security/2005/dsa-843 OTHER REFERENCES: SA16805: http://secunia.com/advisories/16805/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------