---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Debian update for wml SECUNIA ADVISORY ID: SA28829 VERIFY ADVISORY: http://secunia.com/advisories/28829/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ DESCRIPTION: Debian has issued an update for wml. This fixes some security issues, which can be exploited by malicious, local users to perform certain actions with escalated privileges. For more information: SA28856 SOLUTION: Apply updated packages. -- Debian 4.0 (stable) -- Source archives: http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11-1etch1.dsc Size/MD5 checksum:656 3c12d2b00552d3db815957c01c73b2cf http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11.orig.tar.gz Size/MD5 checksum:3115230 a26feebf4e59e9a6940f54c69dde05b5 http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11-1etch1.diff.gz Size/MD5 checksum:24577 3242a88ced8598120cf6aba2bf9f69c4 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11-1etch1_alpha.deb Size/MD5 checksum: 453998 29f9f2cffcd5becc205ba36a988a216f amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11-1etch1_amd64.deb Size/MD5 checksum: 452700 88033d2e3347e9b94061826b7856cdb0 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11-1etch1_hppa.deb Size/MD5 checksum: 454656 5dd770e936b54880605d9d8c5c639d10 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11-1etch1_i386.deb Size/MD5 checksum: 451672 be10fe25928ce83aadf119d98eb5cd43 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11-1etch1_ia64.deb Size/MD5 checksum: 458406 c153522ee017b612f57a40b2e87787cb mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11-1etch1_mips.deb Size/MD5 checksum: 450848 8dc62d7f99bf8a7e55b4ebf825cc8500 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11-1etch1_mipsel.deb Size/MD5 checksum: 449418 32d7a95ff9c4a184fe7f23f1e8a1cea3 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11-1etch1_powerpc.deb Size/MD5 checksum: 452594 65e04ee9b968599ec772c95c7c24ee41 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11-1etch1_s390.deb Size/MD5 checksum: 451058 dbbcea5a32cdcd5e6a0407665270fdd6 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/w/wml/wml_2.0.11-1etch1_sparc.deb Size/MD5 checksum: 450772 297e44c330a2acc9c4829b46f53f1004 ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00054.html OTHER REFERENCES: SA28856: http://secunia.com/advisories/28856/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------