TITLE: Debian update for fbi SECUNIA ADVISORY ID: SA20166 VERIFY ADVISORY: http://secunia.com/advisories/20166/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux 3.0 http://secunia.com/product/143/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for fbi. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. For more information: SA19559 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.0 alias woody -- Source archives: http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1.dsc Size/MD5 checksum: 559 4aa635f3124ac9e654ad25c11f9c1420 http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1.tar.gz Size/MD5 checksum: 58027 20831f12eaf6fd6f4faa928ad2d80428 Alpha architecture: http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1_alpha.deb Size/MD5 checksum: 49472 6004536fd8a9210c041bf7ab4570c254 ARM architecture: http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1_arm.deb Size/MD5 checksum: 40320 bd6d1d6addcd838e7d0d309b6f1b424a Intel IA-32 architecture: http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1_i386.deb Size/MD5 checksum: 37476 917af0dcaa790e71eef2d20d6766b472 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1_ia64.deb Size/MD5 checksum: 60846 8435e5bba35a1e2b82f52102dee7e255 HP Precision architecture: http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1_hppa.deb Size/MD5 checksum: 45078 e1343c5ab373022682ea9659c17642e1 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1_m68k.deb Size/MD5 checksum: 35324 3331d7b580216a5ba9590c936000b32c Big endian MIPS architecture: http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1_mips.deb Size/MD5 checksum: 43206 a9234c16f320296bd2167ee97a9c193d Little endian MIPS architecture: http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1_mipsel.deb Size/MD5 checksum: 43326 05850aa0862a75c0e9340ff3130b2e7a PowerPC architecture: http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1_powerpc.deb Size/MD5 checksum: 40652 52a8724735c368dad3a6cce4fe2e2986 IBM S/390 architecture: http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1_s390.deb Size/MD5 checksum: 40358 55e2c97bb3b6e84e65220b8e36fe8bd3 Sun Sparc architecture: http://security.debian.org/pool/updates/main/f/fbi/fbi_1.23woody1_sparc.deb Size/MD5 checksum: 38928 0e474d52aac9c49575e09c89cc160dc8 -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1.dsc Size/MD5 checksum: 735 af3db0f27d3d8bab9b8051dc497abaaa http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1.diff.gz Size/MD5 checksum: 4840 66b2f2ed2577ef905865b9c18409994e http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01.orig.tar.gz Size/MD5 checksum: 205822 7bf21eae612fd457155533a83ab075c2 Alpha architecture: http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge1_alpha.deb Size/MD5 checksum: 29496 597e1fb3a2a44a3e130e71ee14c7818a http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1_alpha.deb Size/MD5 checksum: 67638 6a60e3c72741d6e6667d6dc256284361 AMD64 architecture: http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge1_amd64.deb Size/MD5 checksum: 24474 b59a585d73a3c28060ad56a3aa7e7f0a http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1_amd64.deb Size/MD5 checksum: 57326 3e846d45b831c55f960792a033d4eafb ARM architecture: http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge1_arm.deb Size/MD5 checksum: 22440 6e70ab80e54f70b63a45a0476f883ff7 http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1_arm.deb Size/MD5 checksum: 51178 a53903ec2a00b07c5eaad8acbe91dd4e Intel IA-32 architecture: http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge1_i386.deb Size/MD5 checksum: 22644 c62296dbeb5e1aaee865595b6edd6f61 http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1_i386.deb Size/MD5 checksum: 52126 5e8ce488ccf3ae55e9e18586c3dcad7a Intel IA-64 architecture: http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge1_ia64.deb Size/MD5 checksum: 33838 39beccb7cb3e14c5432ca6c7c6aebaa8 http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1_ia64.deb Size/MD5 checksum: 79752 c4dcf30f9d03eea3c2b88744fdb7ecb4 HP Precision architecture: http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge1_hppa.deb Size/MD5 checksum: 26856 5e3917309718e88ba92acf987511f828 http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1_hppa.deb Size/MD5 checksum: 60152 9a87a9cf08571d7dde5105e44aac6b09 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge1_m68k.deb Size/MD5 checksum: 20692 5f02a36a487e20139fa44a6578734352 http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1_m68k.deb Size/MD5 checksum: 47274 99544f2a08a563cd49e873d76a4144bb Big endian MIPS architecture: http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge1_mips.deb Size/MD5 checksum: 25992 265989c07aae9d76a9d1413652d550a5 http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1_mips.deb Size/MD5 checksum: 59434 db2964812374a7e991da7d590dfa9da4 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge1_mipsel.deb Size/MD5 checksum: 26058 040e3d982d77cd40118f5249e1dcd996 http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1_mipsel.deb Size/MD5 checksum: 59166 6ad4d70a30f65b1784269b903ea8271a PowerPC architecture: http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge1_powerpc.deb Size/MD5 checksum: 25912 24f98eff47c2ec279c37ed8e678e087a http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1_powerpc.deb Size/MD5 checksum: 57236 ba603481f53226cfe797714014f2586f IBM S/390 architecture: http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge1_s390.deb Size/MD5 checksum: 24420 8e769aa578139330b6a1211d51cce264 http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1_s390.deb Size/MD5 checksum: 58016 ec38329e241e32e0a0bd00d114c1c65f Sun Sparc architecture: http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge1_sparc.deb Size/MD5 checksum: 23016 4e89f15043cf08dccc1b84175e632fc2 http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge1_sparc.deb Size/MD5 checksum: 52440 7adbfbe748f548614c2726265dc8f680 -- Debian GNU/Linux unstable alias sid -- The vulnerability will reportedly be fixed soon. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1068 OTHER REFERENCES: SA19559: http://secunia.com/advisories/19559/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------