TITLE: Debian update for cfengine SECUNIA ADVISORY ID: SA17038 VERIFY ADVISORY: http://secunia.com/advisories/17038/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux 3.0 http://secunia.com/product/143/ DESCRIPTION: Debian has issued an update for cfengine. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. For more information: SA17037 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.0 alias woody -- Source archives: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1.dsc Size/MD5 checksum: 697 bb2e5be7b89c57f6c4cf1e3738ecd922 http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1.diff.gz Size/MD5 checksum: 38077 1ae76d1eb77ebd60a3333c062a1a7c31 http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3.orig.tar.gz Size/MD5 checksum: 867415 19079eafbee44e3d39308c086d4b539b Architecture independent components: http://security.debian.org/pool/updates/main/c/cfengine/cfengine-doc_1.6.3-9woody1_all.deb Size/MD5 checksum: 355562 ca9a13fab7548459c6084dc69d426aec Alpha architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1_alpha.deb Size/MD5 checksum: 405720 7b6364578e2eba666365e77e32507c4b ARM architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1_arm.deb Size/MD5 checksum: 339210 aa977174967f661d2f212f3433bf6788 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1_i386.deb Size/MD5 checksum: 303270 a64338d36f68b7935cfc5989c850cd5e Intel IA-64 architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1_ia64.deb Size/MD5 checksum: 493172 41bcf6762cf4837c8709be21cff9eb7f HP Precision architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1_hppa.deb Size/MD5 checksum: 386724 e9442e863083edcb1e487a6c5fe93352 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1_m68k.deb Size/MD5 checksum: 281060 d948916061d5e8efb533e3b77b77a0ab Big endian MIPS architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1_mips.deb Size/MD5 checksum: 363318 0bc37a72bb1f08f35a2b579484ffb573 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1_mipsel.deb Size/MD5 checksum: 361536 c2b6aa55d276d9b6ac74e78b8117f58c PowerPC architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1_powerpc.deb Size/MD5 checksum: 340640 d54511ed3ad4994ae81fa8f5d94bddd2 IBM S/390 architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1_s390.deb Size/MD5 checksum: 320202 4bfb085818e449b6a6a294d842fd93ce Sun Sparc architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.3-9woody1_sparc.deb Size/MD5 checksum: 348898 1a5bee66a3136dd0c7c81e389ea6d02c -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1.dsc Size/MD5 checksum: 688 0c5710c1edf3c6fdd6823d6db891d299 http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1.diff.gz Size/MD5 checksum: 102832 8a282e6d4dde8c710e02a544967c5fe6 http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5.orig.tar.gz Size/MD5 checksum: 880066 fc02d8d56433f32020c3030192cad66e Architecture independent components: http://security.debian.org/pool/updates/main/c/cfengine/cfengine-doc_1.6.5-1sarge1_all.deb Size/MD5 checksum: 385994 1081dd615fdd1cd5682599b5253936ba Alpha architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1_alpha.deb Size/MD5 checksum: 420810 2402bacaa76d7763c27589c85a399605 AMD64 architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1_amd64.deb Size/MD5 checksum: 353842 953d1eb46f2cce0aedfb78e5f988cc53 ARM architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1_arm.deb Size/MD5 checksum: 340160 83ed417663d90df0727a6a8c2606d11b Intel IA-32 architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1_i386.deb Size/MD5 checksum: 323384 18459b30d0c2c5044e6922abde4425ea Intel IA-64 architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1_ia64.deb Size/MD5 checksum: 488116 f7a1c07bf59ba6163a82fed6a27666c1 HP Precision architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1_hppa.deb Size/MD5 checksum: 373982 778d47c9a7bba6a52c34580e2885a4f0 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1_m68k.deb Size/MD5 checksum: 289354 a8c67ffa26a9453959be270dd6109a36 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1_mips.deb Size/MD5 checksum: 366596 5978436e06a6fb7ad82d7f9860d02614 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1_mipsel.deb Size/MD5 checksum: 365032 4914663ccd6d58abfac5ae149c2b75cb PowerPC architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1_powerpc.deb Size/MD5 checksum: 356614 a98b9bb1a97577472f350ae0f22bf37f IBM S/390 architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1_s390.deb Size/MD5 checksum: 346324 33ac8dfdaa2fcb7ddccf258f901b8531 Sun Sparc architecture: http://security.debian.org/pool/updates/main/c/cfengine/cfengine_1.6.5-1sarge1_sparc.deb Size/MD5 checksum: 338540 21169b41e6976910873d642a7acef495 -- Debian GNU/Linux unstable alias sid -- The vulnerability will reportedly be fixed soon. ORIGINAL ADVISORY: http://www.debian.org/security/2005/dsa-835 OTHER REFERENCES: SA17037: http://secunia.com/advisories/17037/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------