---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_vacancies/ Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/ ---------------------------------------------------------------------- TITLE: Debian update for lookup-el SECUNIA ADVISORY ID: SA24590 VERIFY ADVISORY: http://secunia.com/advisories/24590/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for lookup-el. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. For more information: SA24377 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/l/lookup-el/lookup-el_1.4-3sarge1.dsc Size/MD5 checksum: 585 2daf45b112f1b688658faf610308962e http://security.debian.org/pool/updates/main/l/lookup-el/lookup-el_1.4-3sarge1.diff.gz Size/MD5 checksum: 7115 f27e58e4ea0df6b08e808624a8fcb4e2 http://security.debian.org/pool/updates/main/l/lookup-el/lookup-el_1.4.orig.tar.gz Size/MD5 checksum: 349751 05d12aa8921969b449a6f2a47bb00247 Architecture independent components: http://security.debian.org/pool/updates/main/l/lookup-el/lookup-el_1.4-3sarge1_all.deb Size/MD5 checksum: 228002 30c9393256c1029e3742892e3bc16a6f -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.4-5. ORIGINAL ADVISORY: http://www.us.debian.org/security/2007/dsa-1269 OTHER REFERENCES: SA24377: http://secunia.com/advisories/24377/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------