---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: Debian update for jailer SECUNIA ADVISORY ID: SA32959 VERIFY ADVISORY: http://secunia.com/advisories/32959/ CRITICAL: Not critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/advisories/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/advisories/product/530/ DESCRIPTION: Debian has issued an update for jailer. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. For more information: SA32943 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/j/jailer/jailer_0.4-9+etch1.diff.gz Size/MD5 checksum: 27372 403ad34e153f4dbc14621b2bca464487 http://security.debian.org/pool/updates/main/j/jailer/jailer_0.4.orig.tar.gz Size/MD5 checksum: 27920 a6bead6286022c54e73bfe1f51e5e5f3 http://security.debian.org/pool/updates/main/j/jailer/jailer_0.4-9+etch1.dsc Size/MD5 checksum: 599 2a59c032c5da19b3443c0bd5c573a6e6 Architecture independent packages: http://security.debian.org/pool/updates/main/j/jailer/jailer_0.4-9+etch1_all.deb Size/MD5 checksum: 11688 8e042e660665df9b8657399ec3845cc8 -- Debian GNU/Linux unstable alias sid -- Fixed in version 0.4-10. ORIGINAL ADVISORY: DSA-1674-1: http://lists.debian.org/debian-security-announce/2008/msg00266.html OTHER REFERENCES: SA32943: http://secunia.com/advisories/32943/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------