Secunia Security Advisory - Debian has issued an update for arc. This fixes a security issue and a vulnerability, which can be exploited by malicious, local users to gain access to sensitive information and perform certain actions on a vulnerable system with escalated privileges.
078e629baec609e1667fbb7bf4ef0a26cce894c750666f14e7d64a3a5a2ef65f
TITLE:
Debian update for arc
SECUNIA ADVISORY ID:
SA17068
VERIFY ADVISORY:
http://secunia.com/advisories/17068/
CRITICAL:
Less critical
IMPACT:
Exposure of sensitive information, Privilege escalation
WHERE:
Local system
OPERATING SYSTEM:
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
DESCRIPTION:
Debian has issued an update for arc. This fixes a security issue and
a vulnerability, which can be exploited by malicious, local users to
gain access to sensitive information and perform certain actions on a
vulnerable system with escalated privileges.
For more information:
SA16805
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 3.1 alias sarge --
Source archives:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1.dsc
Size/MD5 checksum: 552 4ebba22896668e091043fb909dd7f0b7
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1.diff.gz
Size/MD5 checksum: 3323 1c70a26064195b6664b296313c73cbc0
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l.orig.tar.gz
Size/MD5 checksum: 82134 f30654fbe80640f0219c33d0f2f64021
Alpha architecture:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_alpha.deb
Size/MD5 checksum: 67312 081b0a1573d4f3a2ce35e937200a56bd
AMD64 architecture:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_amd64.deb
Size/MD5 checksum: 60646 c8edb347de5f20d8f17a93bde98fc9fd
ARM architecture:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_arm.deb
Size/MD5 checksum: 57442 2ad784c9a055046c2e47990ae8155001
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_i386.deb
Size/MD5 checksum: 55506 f8c3fb1adb553abbcceabdeb5a3aea82
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_ia64.deb
Size/MD5 checksum: 73842 d70cebf9b47a8630692450476fe9062c
HP Precision architecture:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_hppa.deb
Size/MD5 checksum: 62028 a33d986f66f7ca3d5f582fbf495bb45f
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_m68k.deb
Size/MD5 checksum: 52462 51ad27d071bb88b938de56b58dbe6d0e
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_mips.deb
Size/MD5 checksum: 64456 6991489144d5381fe19b73edc104f7a3
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_mipsel.deb
Size/MD5 checksum: 64228 c0ba8aaac79f6547d13db04ba13b39bd
PowerPC architecture:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_powerpc.deb
Size/MD5 checksum: 60004 85870f99024711bdf1bc5ed32398ce07
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_s390.deb
Size/MD5 checksum: 60052 5adb2907170ef095d50daf397193cfa2
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/a/arc/arc_5.21l-1sarge1_sparc.deb
Size/MD5 checksum: 57084 88ec040ae647afb844d1c98a4c7a77a7
-- Debian GNU/Linux unstable alias sid --
Fixed in version 5.21m-1.
ORIGINAL ADVISORY:
http://www.debian.org/security/2005/dsa-843
OTHER REFERENCES:
SA16805:
http://secunia.com/advisories/16805/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------