---------------------------------------------------------------------- Secunia customers receive relevant and filtered advisories. Delivery is done via different channels including SMS, Email, Web, and https based XML feed. http://corporate.secunia.com/trial/38/request/ ---------------------------------------------------------------------- TITLE: Debian update for man-db SECUNIA ADVISORY ID: SA24828 VERIFY ADVISORY: http://secunia.com/advisories/24828/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for man-db. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. For more information: SA24801 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2.orig.tar.gz Size/MD5 checksum: 730134 15855f899a76aa302c83ffec81526ab4 http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1.dsc Size/MD5 checksum: 673 add0d09882262adb0cbbde6845af0fbb http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1.diff.gz Size/MD5 checksum: 104832 c5befcaee1865b8582d7bbe8ac21f537 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1_alpha.deb Size/MD5 checksum: 641194 92131ea27cf1f17fcdaaea36accfa930 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1_amd64.deb Size/MD5 checksum: 607660 464ca88aca62d8cd8ee84072993ce0f7 arm architecture (ARM) http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1_arm.deb Size/MD5 checksum: 559372 1d5563046ce831b2b7088caa044694de hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1_hppa.deb Size/MD5 checksum: 609530 efa1144900b1ee014dd93eb5fb1bf223 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1_i386.deb Size/MD5 checksum: 579774 feb44785cde0c8f64cd22f35aa674ab8 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1_ia64.deb Size/MD5 checksum: 687208 1400e1e708ec327de4517557de51eca3 m68k architecture (Motorola Mc680x0) http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1_m68k.deb Size/MD5 checksum: 544688 d9bd8753aeaf7ceaa7ff29903085ca33 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1_mips.deb Size/MD5 checksum: 609644 b8cc5d9b03e70a2bf671983a31d858ba mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1_mipsel.deb Size/MD5 checksum: 611036 6e3cf522a309f851111ce579d1985c83 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1_powerpc.deb Size/MD5 checksum: 602320 05dac7703f16fde62ecf61f07e8ecf97 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1_s390.deb Size/MD5 checksum: 600014 a9d162c3c25869260895ada582042e95 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/m/man-db/man-db_2.4.2-21sarge1_sparc.deb Size/MD5 checksum: 574580 ee5ab4089c0ff87d3f976f82b4e01c27 -- Debian GNU/Linux 4.0 alias etch and unstable alias sid -- Fixed in version 2.4.3-5. ORIGINAL ADVISORY: http://www.debian.org/security/2007/dsa-1278 OTHER REFERENCES: SA24801: http://secunia.com/advisories/24801/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------