exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 17068

Secunia Security Advisory 17068
Posted Oct 6, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for arc. This fixes a security issue and a vulnerability, which can be exploited by malicious, local users to gain access to sensitive information and perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
systems | linux, debian
SHA-256 | 078e629baec609e1667fbb7bf4ef0a26cce894c750666f14e7d64a3a5a2ef65f

Secunia Security Advisory 17068

Change Mirror Download


TITLE:
Debian update for arc

SECUNIA ADVISORY ID:
SA17068

VERIFY ADVISORY:
http://secunia.com/advisories/17068/

CRITICAL:
Less critical

IMPACT:
Exposure of sensitive information, Privilege escalation

WHERE:
Local system

OPERATING SYSTEM:
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/

DESCRIPTION:
Debian has issued an update for arc. This fixes a security issue and
a vulnerability, which can be exploited by malicious, local users to
gain access to sensitive information and perform certain actions on a
vulnerable system with escalated privileges.

For more information:
SA16805

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1.dsc
Size/MD5 checksum: 552 4ebba22896668e091043fb909dd7f0b7
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1.diff.gz
Size/MD5 checksum: 3323 1c70a26064195b6664b296313c73cbc0
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l.orig.tar.gz
Size/MD5 checksum: 82134 f30654fbe80640f0219c33d0f2f64021

Alpha architecture:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_alpha.deb
Size/MD5 checksum: 67312 081b0a1573d4f3a2ce35e937200a56bd

AMD64 architecture:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_amd64.deb
Size/MD5 checksum: 60646 c8edb347de5f20d8f17a93bde98fc9fd

ARM architecture:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_arm.deb
Size/MD5 checksum: 57442 2ad784c9a055046c2e47990ae8155001

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_i386.deb
Size/MD5 checksum: 55506 f8c3fb1adb553abbcceabdeb5a3aea82

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_ia64.deb
Size/MD5 checksum: 73842 d70cebf9b47a8630692450476fe9062c

HP Precision architecture:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_hppa.deb
Size/MD5 checksum: 62028 a33d986f66f7ca3d5f582fbf495bb45f

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_m68k.deb
Size/MD5 checksum: 52462 51ad27d071bb88b938de56b58dbe6d0e

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_mips.deb
Size/MD5 checksum: 64456 6991489144d5381fe19b73edc104f7a3

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_mipsel.deb
Size/MD5 checksum: 64228 c0ba8aaac79f6547d13db04ba13b39bd

PowerPC architecture:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_powerpc.deb
Size/MD5 checksum: 60004 85870f99024711bdf1bc5ed32398ce07

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_s390.deb
Size/MD5 checksum: 60052 5adb2907170ef095d50daf397193cfa2

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_sparc.deb
Size/MD5 checksum: 57084 88ec040ae647afb844d1c98a4c7a77a7

-- Debian GNU/Linux unstable alias sid --

Fixed in version 5.21m-1.

ORIGINAL ADVISORY:
http://www.debian.org/security/2005/dsa-843

OTHER REFERENCES:
SA16805:
http://secunia.com/advisories/16805/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close