TITLE: Debian update for inkscape SECUNIA ADVISORY ID: SA17882 VERIFY ADVISORY: http://secunia.com/advisories/17882/ CRITICAL: Moderately critical IMPACT: Privilege escalation, DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for inkscape. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and by malicious people to potentially compromise a user's system. For more information: SA16343 SA17651 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2.dsc Size/MD5 checksum: 889 8e20fa91e0d4cc48dad356842e279d43 http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2.diff.gz Size/MD5 checksum: 19542 16dc49a90ef6362eafb0f1185d1d3341 http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41.orig.tar.gz Size/MD5 checksum: 6090081 989a09d06e4db1ddfd00b8019a5dcd73 Alpha architecture: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_alpha.deb Size/MD5 checksum: 5976090 cd204ed15f1c5ab0603225d6b98c5b39 AMD64 architecture: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_amd64.deb Size/MD5 checksum: 5424440 2cab0898d7275fedb719e98ff1de05ea ARM architecture: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_arm.deb Size/MD5 checksum: 5413996 5b4fd5a1d97408108cc26e0990468d63 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_i386.deb Size/MD5 checksum: 5445836 435ce53091c87aeb6979d3b7c75a625e Intel IA-64 architecture: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_ia64.deb Size/MD5 checksum: 6580176 f855d6c9aca23aa045e4d0e391cd3e65 HP Precision architecture: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_hppa.deb Size/MD5 checksum: 5894380 f233719364af393e84eb3577c5bd3d90 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_m68k.deb Size/MD5 checksum: 5326010 d5a122f8852512d0eef1202fad73d970 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_mips.deb Size/MD5 checksum: 5768826 56ea6b35e2340861c4440aa650f2bd62 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_mipsel.deb Size/MD5 checksum: 5760476 3f2dc329f2cc5d1597c931a234900931 PowerPC architecture: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_powerpc.deb Size/MD5 checksum: 5573546 4310413071b8b30686aefb533c36c09a IBM S/390 architecture: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_s390.deb Size/MD5 checksum: 5280106 f892057ad430c49c47ad408ed8455c8a Sun Sparc architecture: http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_sparc.deb Size/MD5 checksum: 5350968 1654ffcb98846190a686440f43e691bd -- Debian GNU/Linux unstable alias sid -- Fixed in version 0.42.2+0.43pre1-1. ORIGINAL ADVISORY: http://www.debian.org/security/2005/dsa-916 OTHER REFERENCES: SA16343: http://secunia.com/advisories/16343/ SA17651: http://secunia.com/advisories/17651/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------