---------------------------------------------------------------------- Want to join the Secunia Security Team? Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports. http://secunia.com/secunia_security_specialist/ ---------------------------------------------------------------------- TITLE: Debian update for pinball SECUNIA ADVISORY ID: SA20834 VERIFY ADVISORY: http://secunia.com/advisories/20834/ CRITICAL: Not critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for pinball. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. For more information: SA20778 SOLUTION: -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1.dsc Size/MD5 checksum: 811 17ac5604e5bb7e13b938d84012c6ea7c http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1.diff.gz Size/MD5 checksum: 320626 5473ae87027018899b08f12c34ddd538 http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1.orig.tar.gz Size/MD5 checksum: 6082982 f28e8f49e0db8e9491e4d9f0c13c36c6 Architecture independent components: http://security.debian.org/pool/updates/main/p/pinball/pinball-data_0.3.1-3sarge1_all.deb Size/MD5 checksum: 5542524 c586ed47103f89443cf32f57984ac95c Alpha architecture: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1_alpha.deb Size/MD5 checksum: 189898 6168d325d265c72da1007aaa83c7b9bd http://security.debian.org/pool/updates/main/p/pinball/pinball-dev_0.3.1-3sarge1_alpha.deb Size/MD5 checksum: 325654 caeae82e416a40ad943ff38ce8c5eb98 AMD64 architecture: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1_amd64.deb Size/MD5 checksum: 167050 af8664da7ef5e0d1fd1e1eb86e2a7fc1 http://security.debian.org/pool/updates/main/p/pinball/pinball-dev_0.3.1-3sarge1_amd64.deb Size/MD5 checksum: 242432 36c44eed9de2d48089e7c396e270c98e ARM architecture: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1_arm.deb Size/MD5 checksum: 193056 52d5e3fb06e529326ae361f739915169 http://security.debian.org/pool/updates/main/p/pinball/pinball-dev_0.3.1-3sarge1_arm.deb Size/MD5 checksum: 294198 4bc5b7e9d5b1cc0f0b90f91290cf0999 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1_i386.deb Size/MD5 checksum: 159576 b7fcaf42621d2c356de66c90ea19fab0 http://security.debian.org/pool/updates/main/p/pinball/pinball-dev_0.3.1-3sarge1_i386.deb Size/MD5 checksum: 219780 7a4877a175b976ca20d25040e0fcab11 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1_ia64.deb Size/MD5 checksum: 221146 717fb85a21f4bd4a535200a7420e16b9 http://security.debian.org/pool/updates/main/p/pinball/pinball-dev_0.3.1-3sarge1_ia64.deb Size/MD5 checksum: 315856 a9a8496a1d029a0d64afb00b0c5fd116 HP Precision architecture: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1_hppa.deb Size/MD5 checksum: 191708 e97c652fb430dbaeb5d367f196ea1ba0 http://security.debian.org/pool/updates/main/p/pinball/pinball-dev_0.3.1-3sarge1_hppa.deb Size/MD5 checksum: 300260 606404a0da99b9884229bee10849413e Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1_m68k.deb Size/MD5 checksum: 160442 1ff1dd9d285de6e7300f8e7eb027c766 http://security.debian.org/pool/updates/main/p/pinball/pinball-dev_0.3.1-3sarge1_m68k.deb Size/MD5 checksum: 223038 a7a4a5a997a05cf929b45529cd81942f Big endian MIPS architecture: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1_mips.deb Size/MD5 checksum: 166400 05f3ea274037ffb1a2b76fa5a802ff87 http://security.debian.org/pool/updates/main/p/pinball/pinball-dev_0.3.1-3sarge1_mips.deb Size/MD5 checksum: 263344 ab1b99a12b3be3151f84e94a6073b27f Little endian MIPS architecture: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1_mipsel.deb Size/MD5 checksum: 165114 5275bf21b63a2a2c30148d7a7a3aface http://security.debian.org/pool/updates/main/p/pinball/pinball-dev_0.3.1-3sarge1_mipsel.deb Size/MD5 checksum: 263394 f287e3ee0a11745580f175585112632b PowerPC architecture: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1_powerpc.deb Size/MD5 checksum: 170788 bb51f1dc4d1f9a5cd7b244111b61bb42 http://security.debian.org/pool/updates/main/p/pinball/pinball-dev_0.3.1-3sarge1_powerpc.deb Size/MD5 checksum: 245192 d390d54045f7ac70bf63164ba672a4d0 IBM S/390 architecture: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1_s390.deb Size/MD5 checksum: 152218 873670da1cc02dbe495c7254d4c5e316 http://security.debian.org/pool/updates/main/p/pinball/pinball-dev_0.3.1-3sarge1_s390.deb Size/MD5 checksum: 214592 074ea5085ed5c727b9e4fcf9ce0574c2 Sun Sparc architecture: http://security.debian.org/pool/updates/main/p/pinball/pinball_0.3.1-3sarge1_sparc.deb Size/MD5 checksum: 159116 43ba78279f91e1da5268c71af524b3ab http://security.debian.org/pool/updates/main/p/pinball/pinball-dev_0.3.1-3sarge1_sparc.deb Size/MD5 checksum: 233376 ec2531c5979bc0e6df6ec5f34d4d7d48 -- Debian GNU/Linux unstable alias sid -- Fixed in version 0.3.1-6. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1102 OTHER REFERENCES: SA20778: http://secunia.com/advisories/20778/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------