Secunia Security Advisory - Debian has issued an update for ldm. This fixes a security issue, which can be exploited by malicious people to disclose sensitive information.
067b47e519870296b45c664f293b26f6f0c4d4ce3d07a35279a77a1cd911d37c
----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
1 day left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.
Learn more / Download (instant access):
http://secunia.com/network_software_inspector_2/
----------------------------------------------------------------------
TITLE:
Debian update for ldm
SECUNIA ADVISORY ID:
SA29959
VERIFY ADVISORY:
http://secunia.com/advisories/29959/
CRITICAL:
Less critical
IMPACT:
Exposure of system information, Exposure of sensitive information
WHERE:
>From local network
OPERATING SYSTEM:
Debian GNU/Linux 4.0
http://secunia.com/product/13844/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
DESCRIPTION:
Debian has issued an update for ldm. This fixes a security issue,
which can be exploited by malicious people to disclose sensitive
information.
The security issue is caused due to improper access restrictions
being set when establishing X11 forwarding sessions. This can be
exploited to connect to the X server running on an affected LTSP
client and e.g. grab keyboard input.
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 4.0 alias etch --
Source archives:
http://security.debian.org/pool/updates/main/l/ltsp/ltsp_0.99debian11+etch1.tar.gz
Size/MD5 checksum: 183019 c97fa50f7a30f213742be6466a7817fc
http://security.debian.org/pool/updates/main/l/ltsp/ltsp_0.99debian11+etch1.dsc
Size/MD5 checksum: 1243 c8d0f83f26c580a9fcf5079d303c1958
Architecture independent packages:
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-server-standalone_0.99debian11+etch1_all.deb
Size/MD5 checksum:22346 edf27d69321dc6db44cb252719aad12b
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client-builder_0.99debian11+etch1_all.udeb
Size/MD5 checksum: 2278 bd0856196c64cfcabc1c0f47808b5f4c
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-server_0.99debian11+etch1_all.deb
Size/MD5 checksum:53332 70be96c089a449a543cfb678e55a0f1e
http://security.debian.org/pool/updates/main/l/ltsp/ldm_0.99debian11+etch1_all.deb
Size/MD5 checksum: 116452 51fa6e495db54926e77aa7f62a251dff
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_alpha.deb
Size/MD5 checksum:50686 145f4579f02af33e644674b0a2ecff67
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_amd64.deb
Size/MD5 checksum:50638 9ea8d9f916b011a9f5379ed31f8a7cc7
arm architecture (ARM)
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_arm.deb
Size/MD5 checksum:49608 8c1b8f8908b2099c8f97946144dd7ca0
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_hppa.deb
Size/MD5 checksum:50448 08ca2c9cdc6bc5a274bb7114495e0e7d
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_i386.deb
Size/MD5 checksum:49302 b20a0740d53c1c6aeffdab69b2bb14bf
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_ia64.deb
Size/MD5 checksum:55934 b614ff92f4cb3dcea9329ea219f77a60
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_mips.deb
Size/MD5 checksum:50166 298ad47e264bf2b3e3b69fd52f772df1
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_mipsel.deb
Size/MD5 checksum:50914 770ee6fa07216c0a2a0da7922d820ea7
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_powerpc.deb
Size/MD5 checksum:50602 3b30a76ae56aedbfdc67c2bd975eefd6
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_s390.deb
Size/MD5 checksum:51558 9c2f6986508538205f6e5d937a9bc8d7
-- Debian GNU/Linux unstable alias sid --
Fixed in version 2:0.1~bzr20080308-1.
PROVIDED AND/OR DISCOVERED BY:
Reported by Christian Herzog in a Debian bug report.
ORIGINAL ADVISORY:
http://www.us.debian.org/security/2008/dsa-1561
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------