TITLE: Ubuntu update for noweb SECUNIA ADVISORY ID: SA18967 VERIFY ADVISORY: http://secunia.com/advisories/18967/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Ubuntu Linux 4.10 http://secunia.com/product/4491/ Ubuntu Linux 5.04 http://secunia.com/product/5036/ Ubuntu Linux 5.10 http://secunia.com/product/6606/ DESCRIPTION: Ubuntu has issued an update for noweb. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. For more information: SA18809 SOLUTION: Apply updated packages. -- Ubuntu 4.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/n/noweb/noweb_2.10c-3ubuntu1.1.diff.gz Size/MD5: 11262 c97d1934407598134e7da5d53b4c625a http://security.ubuntu.com/ubuntu/pool/main/n/noweb/noweb_2.10c-3ubuntu1.1.dsc Size/MD5: 629 a21c779c23311c40353fee565971f7dd http://security.ubuntu.com/ubuntu/pool/main/n/noweb/noweb_2.10c.orig.tar.gz Size/MD5: 712332 30bbacf1fb2a402410e5ad2fb600d9fc amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/n/noweb/nowebm_2.10c-3ubuntu1.1_amd64.deb Size/MD5: 535460 2d35850c7436ec5e1c452098ab8f2f26 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/n/noweb/nowebm_2.10c-3ubuntu1.1_i386.deb Size/MD5: 518536 7b89ab418e72de19d81aed9d1dc8aefa powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/n/noweb/nowebm_2.10c-3ubuntu1.1_powerpc.deb Size/MD5: 522740 f5b23a14a7600e91788a6803e1453861 -- Ubuntu 5.04 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/n/noweb/noweb_2.10c-3.1ubuntu5.04.1.diff.gz Size/MD5: 11276 d692bce20df8c6e0fb64013daf7bc9e5 http://security.ubuntu.com/ubuntu/pool/main/n/noweb/noweb_2.10c-3.1ubuntu5.04.1.dsc Size/MD5: 639 6b6781615241f3d07db34b4ed951eab4 http://security.ubuntu.com/ubuntu/pool/main/n/noweb/noweb_2.10c.orig.tar.gz Size/MD5: 712332 30bbacf1fb2a402410e5ad2fb600d9fc amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/n/noweb/nowebm_2.10c-3.1ubuntu5.04.1_amd64.deb Size/MD5: 535570 7ed60a1bfce4de9db2b6f6ca24f7544d i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/n/noweb/nowebm_2.10c-3.1ubuntu5.04.1_i386.deb Size/MD5: 518652 973b9b6459bc21f645725f4c5013500f powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/n/noweb/nowebm_2.10c-3.1ubuntu5.04.1_powerpc.deb Size/MD5: 522804 70fd183b24ea9c8d77ca8eb65172924f -- Ubuntu 5.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/n/noweb/noweb_2.10c-3.1ubuntu5.10.1.diff.gz Size/MD5: 11275 8b1c3749cd3fc5f0f5bb0909d1db527c http://security.ubuntu.com/ubuntu/pool/main/n/noweb/noweb_2.10c-3.1ubuntu5.10.1.dsc Size/MD5: 639 3f37d4a988691727bdc9452e459ccc46 http://security.ubuntu.com/ubuntu/pool/main/n/noweb/noweb_2.10c.orig.tar.gz Size/MD5: 712332 30bbacf1fb2a402410e5ad2fb600d9fc amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/n/noweb/nowebm_2.10c-3.1ubuntu5.10.1_amd64.deb Size/MD5: 535562 8ce18eceec28b3bb1165156e17d06f10 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/n/noweb/nowebm_2.10c-3.1ubuntu5.10.1_i386.deb Size/MD5: 519066 5d22ae6879e674ba5dba97a10957e6c7 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/n/noweb/nowebm_2.10c-3.1ubuntu5.10.1_powerpc.deb Size/MD5: 522756 2ea6685d6400fc111cf093f01b7a4b39 ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-254-1 OTHER REFERENCES: SA18809: http://secunia.com/advisories/18809/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------