Secunia Security Advisory - Debian has issued an update for resmgr. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.
a2f688deec4eb3bc2179d57a382caecde16acde7ce7ca922070ed96e93906d3a
TITLE:
Debian update for resmgr
SECUNIA ADVISORY ID:
SA19898
VERIFY ADVISORY:
http://secunia.com/advisories/19898/
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
Local system
OPERATING SYSTEM:
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
DESCRIPTION:
Debian has issued an update for resmgr. This fixes a security issue,
which can be exploited by malicious, local users to bypass certain
security restrictions.
For more information:
SA19887
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 3.1 alias sarge --
Source archives:
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2.dsc
Size/MD5 checksum: 614 9b90463431b3893f727ff080df0a5239
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2.diff.gz
Size/MD5 checksum: 7976 52d70d8e9684ab80719d806d9088d067
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0.orig.tar.gz
Size/MD5 checksum: 40970 c5d77b35fc30a7bead00ea2951c19a2f
Alpha architecture:
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr-dev_1.0-2sarge2_alpha.deb
Size/MD5 checksum: 4428 f20cb82298535193b9629c4811251192
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr1_1.0-2sarge2_alpha.deb
Size/MD5 checksum: 8870 d0c6a5a4f04fa2258280cb4b6d60c0c9
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2_alpha.deb
Size/MD5 checksum: 36690 efb631c58b56a16c40d1a3152e9d4f8f
AMD64 architecture:
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr-dev_1.0-2sarge2_amd64.deb
Size/MD5 checksum: 4422 0ca68e35b937773dfa3b89dd8945281b
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr1_1.0-2sarge2_amd64.deb
Size/MD5 checksum: 8194 0317c1c3ed93bd13aebe521949d4fda5
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2_amd64.deb
Size/MD5 checksum: 33304 2275f781d337907b87ad31d0779d1a0c
ARM architecture:
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr-dev_1.0-2sarge2_arm.deb
Size/MD5 checksum: 4428 13adf84fa226c83cf36ddc7014a413b8
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr1_1.0-2sarge2_arm.deb
Size/MD5 checksum: 7058 8d0e935b6ca4425174490e7523bb86ab
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2_arm.deb
Size/MD5 checksum: 29328 21f2b68f8dc44be7b4304f66f3d080ae
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr-dev_1.0-2sarge2_i386.deb
Size/MD5 checksum: 4422 852f6d951e3ed2fd4e8740e2bc8b1fa6
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr1_1.0-2sarge2_i386.deb
Size/MD5 checksum: 25906 0f7831ec7b0382a6962cbddecfa2ef5c
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2_i386.deb
Size/MD5 checksum: 41224 d6df916c394f4c826b4d9e75434a261a
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr-dev_1.0-2sarge2_ia64.deb
Size/MD5 checksum: 4414 39ad0549329d2dd0810d580c65629012
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr1_1.0-2sarge2_ia64.deb
Size/MD5 checksum: 10196 031bad7b1ba99e6b7e337b7f506321c3
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2_ia64.deb
Size/MD5 checksum: 41210 47ba589e9bf7ee09769447dd759dbc0e
HP Precision architecture:
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr-dev_1.0-2sarge2_hppa.deb
Size/MD5 checksum: 4436 4f9e59f8941fd2160002dfaac94ae756
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr1_1.0-2sarge2_hppa.deb
Size/MD5 checksum: 8676 8a92ed14b17e608d4607b626af2948f4
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2_hppa.deb
Size/MD5 checksum: 33612 2dbb5089a1e6a6bcd8a202687ab2c826
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr-dev_1.0-2sarge2_m68k.deb
Size/MD5 checksum: 4444 752f2adf6c0c977de1a346d8326ceea4
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr1_1.0-2sarge2_m68k.deb
Size/MD5 checksum: 7238 1674a58df5be5d7d7a46dd8eca880b0d
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2_m68k.deb
Size/MD5 checksum: 28882 5c65ca27ee2816344da1a0e9289a9414
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr-dev_1.0-2sarge2_mips.deb
Size/MD5 checksum: 4434 49b9292653d918bf6f94809322d8fb48
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr1_1.0-2sarge2_mips.deb
Size/MD5 checksum: 7778 5246faae2986c92f6edf9b0cb518ed85
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2_mips.deb
Size/MD5 checksum: 34712 4817872f485e1b6c402caa019bf3fa62
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr-dev_1.0-2sarge2_mipsel.deb
Size/MD5 checksum: 4432 c783ce5980d7d0b22aa1c69a66d89456
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr1_1.0-2sarge2_mipsel.deb
Size/MD5 checksum: 7814 a5226c77b764b2c79b32211a67a0580e
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2_mipsel.deb
Size/MD5 checksum: 34668 00efd90689cce6b0874622a32ad687cd
PowerPC architecture:
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr-dev_1.0-2sarge2_powerpc.deb
Size/MD5 checksum: 4442 2cb12a62b99ee151de15f62b01cd3cdb
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr1_1.0-2sarge2_powerpc.deb
Size/MD5 checksum: 9474 4d7589e21c6604b0915cdcb13f64d66b
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2_powerpc.deb
Size/MD5 checksum: 36228 c7bb76f8eb7e08c1db19eb2b061e9a01
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr-dev_1.0-2sarge2_s390.deb
Size/MD5 checksum: 4428 1f49b31b45334df4f298c96ce35b9b7d
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr1_1.0-2sarge2_s390.deb
Size/MD5 checksum: 8302 6065fe66f9b5a41bbf6e7d23b4090d32
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2_s390.deb
Size/MD5 checksum: 33282 b3b1443b323c144c8f72e0b37f70546d
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr-dev_1.0-2sarge2_sparc.deb
Size/MD5 checksum: 4434 27815a5a67681abf7ac81c6998de4c73
http://security.debian.org/pool/updates/main/r/resmgr/libresmgr1_1.0-2sarge2_sparc.deb
Size/MD5 checksum: 7296 9974ef49ba0e43ab99d4892876a66f0d
http://security.debian.org/pool/updates/main/r/resmgr/resmgr_1.0-2sarge2_sparc.deb
Size/MD5 checksum: 29564 b7255b27b8ea036030ffe9487b8da09d
-- Debian GNU/Linux unstable alias sid --
Fixed in version 1.0-4..
ORIGINAL ADVISORY:
http://www.us.debian.org/security/2006/dsa-1047
OTHER REFERENCES:
SA19887:
http://secunia.com/advisories/19887/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------