---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Debian update for splitvt SECUNIA ADVISORY ID: SA29064 VERIFY ADVISORY: http://secunia.com/advisories/29064/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for splitvt. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. For more information: SA29080 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/s/splitvt/splitvt_1.6.5-9etch1.dsc Size/MD5 checksum:602 38c5d340fe95abbd78edfa806618fce8 http://security.debian.org/pool/updates/main/s/splitvt/splitvt_1.6.5-9etch1.diff.gz Size/MD5 checksum:10746 ea95a61da623237d715e5b1fdce9e92a alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/s/splitvt/splitvt_1.6.5-9etch1_alpha.deb Size/MD5 checksum:41314 06622ad249f48ee2009f03ef1b4ba1ad amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/s/splitvt/splitvt_1.6.5-9etch1_amd64.deb Size/MD5 checksum:37754 dd591bff5b03378ab225dbf41648e037 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/s/splitvt/splitvt_1.6.5-9etch1_hppa.deb Size/MD5 checksum:38398 f9c5dc35197dcd1b8a2843a29c200bbb i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/s/splitvt/splitvt_1.6.5-9etch1_i386.deb Size/MD5 checksum:34754 70d76970fb5017197c78861c4d070cab ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/s/splitvt/splitvt_1.6.5-9etch1_ia64.deb Size/MD5 checksum:50166 d2328ca3f1d1114cc9a2497d59e0ff9a mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/s/splitvt/splitvt_1.6.5-9etch1_mips.deb Size/MD5 checksum:39434 3205ddfd371fd0edd5175333a5c94c1b powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/s/splitvt/splitvt_1.6.5-9etch1_powerpc.deb Size/MD5 checksum:37800 7c8d9c7f20e4a4fc92531f0a5cd7bb26 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/s/splitvt/splitvt_1.6.5-9etch1_s390.deb Size/MD5 checksum:37854 9c39d0109f6600022862c3ee6d1fb0c8 -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.6.6-4. ORIGINAL ADVISORY: http://www.us.debian.org/security/2008/dsa-1500 OTHER REFERENCES: SA29080: http://secunia.com/advisories/29080/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------