---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Debian update for xfs SECUNIA ADVISORY ID: SA26282 VERIFY ADVISORY: http://secunia.com/advisories/26282/ CRITICAL: Not critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for xfs. This fixes a vulnerability, which can be exploited by malicious, local users to perform actions with escalated privileges. For more information: SA26056 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- There are no updated packages yet. Reportedly, these will be provided in an upcoming security update. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6.dsc Size/MD5 checksum: 794 938a05eb2b1638fc49b4d7101084c69b http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6.diff.gz Size/MD5 checksum: 28440 0eeacd5783c66b937eaa1dbde6145401 http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1.orig.tar.gz Size/MD5 checksum: 174623 32e8b6b24ec3d4c0de11d81061640cc2 Alpha architecture: http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6_alpha.deb Size/MD5 checksum: 75520 0becb7909f5d9df1621d1a8b153eab2b AMD64 architecture: http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6_amd64.deb Size/MD5 checksum: 65224 632e1a2416a91e079fe16f19f8c18f37 ARM architecture: http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6_arm.deb Size/MD5 checksum: 61330 41a50afe7ca54708028f8929ef9f62a8 HP Precision architecture: http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6_hppa.deb Size/MD5 checksum: 68312 31b1450c324283337298f0671491eddd Intel IA-32 architecture: http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6_i386.deb Size/MD5 checksum: 56856 40191532dd37541d09a9ff62bf9e6189 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6_ia64.deb Size/MD5 checksum: 97348 31aacc8828c1dc532db8d5b630de5f5c Big endian MIPS architecture: http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6_mips.deb Size/MD5 checksum: 69112 c0797a23074512e31edeef83a57817b5 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6_mipsel.deb Size/MD5 checksum: 69032 3a44f04fd9e3f4b84fd03889bcebeb56 PowerPC architecture: http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6_powerpc.deb Size/MD5 checksum: 64512 00d156e38ef0cf5f5257ae90cef496a2 IBM S/390 architecture: http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6_s390.deb Size/MD5 checksum: 67514 710d362f9183b98f817736e466c89d35 Sun Sparc architecture: http://security.debian.org/pool/updates/main/x/xfs/xfs_1.0.1-6_sparc.deb Size/MD5 checksum: 57382 8a32daa22fd7630ff4101e21a4cfaf7d -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.0.4-2. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00104.html OTHER REFERENCES: SA26056: http://secunia.com/advisories/26056/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------