what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 28538

Secunia Security Advisory 28538
Posted Jan 22, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for scponly. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, debian
SHA-256 | 90940cb08d20b8f2aeb81e1e326b2aba5b218c5766bd703b59088295786522a8

Secunia Security Advisory 28538

Change Mirror Download

----------------------------------------------------------------------

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.

Download and test it today:
https://psi.secunia.com/

Read more about this new version:
https://psi.secunia.com/?page=changelog

----------------------------------------------------------------------

TITLE:
Debian update for scponly

SECUNIA ADVISORY ID:
SA28538

VERIFY ADVISORY:
http://secunia.com/advisories/28538/

CRITICAL:
Less critical

IMPACT:
Security Bypass

WHERE:
Local system

OPERATING SYSTEM:
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux 4.0
http://secunia.com/product/13844/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/

DESCRIPTION:
Debian has issued an update for scponly. This fixes a security issue,
which can be exploited by malicious, local users to bypass certain
security restrictions.

For more information:
SA28123

SOLUTION:
Apply updated packages.

-- Debian 3.1 (oldstable) --

Source archives:

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0.orig.tar.gz
Size/MD5 checksum: 85053 1706732945996865ed0cccd440b64fc1
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2.diff.gz
Size/MD5 checksum: 27490 380ea78eb602749989c8031a4f916c79
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2.dsc
Size/MD5 checksum: 892 f37d3236975bdb6742eba5ac788c40c2

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_alpha.deb
Size/MD5 checksum: 31322 c4d3637ba9ab71b2a05e1633de4abae4

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_amd64.deb
Size/MD5 checksum: 30228 05493720ebd6da8ea4b44d7fc98b3337

arm architecture (ARM)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_arm.deb
Size/MD5 checksum: 28806 2e38b46c8da8a2f118da64fb8d099ebd

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_hppa.deb
Size/MD5 checksum: 30170 44b3383c7f63172f63791b99784e67a8

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_i386.deb
Size/MD5 checksum: 29322 62413a011d04721bb4b6f9a3d9496e27

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_ia64.deb
Size/MD5 checksum: 33034 c0673fdff69d062fc32231d3f3221405

m68k architecture (Motorola Mc680x0)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_m68k.deb
Size/MD5 checksum: 29002 b060925bb242e68612a358860e53db0b

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_mips.deb
Size/MD5 checksum: 38442 4ae4a933ef2cd0bf527590af79a48065

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_mipsel.deb
Size/MD5 checksum: 38390 e89fd088bfe33f2af1b2b4ca44c11ba7

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_powerpc.deb
Size/MD5 checksum: 29704 5a6676d270e93eea5265354d907f7cbe

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_s390.deb
Size/MD5 checksum: 29958 54f012f9d6b8eb9153458a5b9e2fba34

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_sparc.deb
Size/MD5 checksum: 29270 66aba25ee7275478105d2c586920516a

-- Debian 4.0 (stable) --

Source archives:

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1.diff.gz
Size/MD5 checksum: 28528 a588cb9138820d73f16bc81ffc4f8e20
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1.dsc
Size/MD5 checksum: 890 c02dfefb7289fcb09e9ac83d7cf78655
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6.orig.tar.gz
Size/MD5 checksum: 96578 0425cb868cadd026851238452f1db907

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_alpha.deb
Size/MD5 checksum: 35464 acdec90eeea809b0cac14ad16d9914a3

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_amd64.deb
Size/MD5 checksum: 34214 2bb425113107e4e471c15685333f1a0a

arm architecture (ARM)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_arm.deb
Size/MD5 checksum: 32754 68e9b0b7c579679728c403af931a1510

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_hppa.deb
Size/MD5 checksum: 34442 2c41c2878777dce6c6b8ad3f1f1cb6a7

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_i386.deb
Size/MD5 checksum: 33384 5a05d1d731bf0e53962f117cc0addd12

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_ia64.deb
Size/MD5 checksum: 49088 872ff6eaeb1ff894c1b1f50f7091f6e4

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_mips.deb
Size/MD5 checksum: 34758 02c6727db7a546147423840d22c47f12

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_mipsel.deb
Size/MD5 checksum: 34808 c89ffd2236d752ac270fb5ba62cd8e62

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_powerpc.deb
Size/MD5 checksum: 33922 a4d6e0e689699638523de2754075a42e

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_s390.deb
Size/MD5 checksum: 34176 5109fa87cfffb72f46e287e88d3b7a55

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_sparc.deb
Size/MD5 checksum: 33322 42f50ca1d1d836fa4c80137a57ed66f1

-- Debian GNU/Linux unstable alias sid --

Reportedly, new packages will be available soon.

ORIGINAL ADVISORY:
http://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00034.html

OTHER REFERENCES:
SA28123:
http://secunia.com/advisories/28123/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close