Linux Security
    Linux Security
    Linux Security

    Debian: New xtrlock packages fix authentication bypass

    Date 20 Jan 2005
    7667
    Posted By Joe Shakespeare
    A buffer overflow has been discovered in xtrlock, a minimal X display lock program which can be exploited by a malicious local attacker to crash the lock program and take over the desktop session.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 649-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                             Martin Schulze
    January 20th, 2005                      https://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : xtrlock
    Vulnerability  : buffer overflow
    Problem-Type   : local
    Debian-specific: no
    CVE ID         : CAN-2005-0079
    Debian Bug     : 278190 278191
    
    A buffer overflow has been discovered in xtrlock, a minimal X display
    lock program which can be exploited by a malicious local attacker to
    crash the lock program and take over the desktop session.
    
    For the stable distribution (woody) this problem has been fixed in
    version 2.0-6woody2.
    
    For the unstable distribution (sid) this problem has been fixed in
    version 2.0-9.
    
    We recommend that you upgrade your xtrlock package.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2.dsc
          Size/MD5 checksum:      500 d39ea1ae4ee66338786d018406065022
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2.tar.gz
          Size/MD5 checksum:     6977 6e6cfc0627bb74bd5014b550c2ea7a5f
    
      Alpha architecture:
    
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2_alpha.deb
          Size/MD5 checksum:     9604 d05e56b7856e770b1b43daaf43a0dc3d
    
      ARM architecture:
    
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2_arm.deb
          Size/MD5 checksum:     8604 f0d46d569f47ecb8a138c9f91be6cdc6
    
      Intel IA-32 architecture:
    
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2_i386.deb
          Size/MD5 checksum:     8730 63b6233b95553ffa59de4811c06a6502
    
      Intel IA-64 architecture:
    
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2_ia64.deb
          Size/MD5 checksum:    10104 ab12fc340b57cb3cbd58cbb0e6e1c188
    
      HP Precision architecture:
    
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2_hppa.deb
          Size/MD5 checksum:     8988 cd59712f225ec6d790ad608a8c0dac3a
    
      Motorola 680x0 architecture:
    
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2_m68k.deb
          Size/MD5 checksum:     8606 abac92671aefe845c7fd609668a9f367
    
      Big endian MIPS architecture:
    
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2_mips.deb
          Size/MD5 checksum:     8830 1a09a3a4e99e8c5f94a555ad8f9fc0c0
    
      Little endian MIPS architecture:
    
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2_mipsel.deb
          Size/MD5 checksum:     8828 7f56d17dd068abe7cb99a47f2e328fc9
    
      PowerPC architecture:
    
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2_powerpc.deb
          Size/MD5 checksum:     8636 cd7dfdba990035bc942e1c16844eefcd
    
      IBM S/390 architecture:
    
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2_s390.deb
          Size/MD5 checksum:     9128 f85ab602c4160b29bdb98170114b2368
    
      Sun Sparc architecture:
    
        https://security.debian.org/pool/updates/main/x/xtrlock/xtrlock_2.0-6woody2_sparc.deb
          Size/MD5 checksum:    11340 c5b11b174068e3b0ebc61aa5f6cf9412
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb https://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    Advisories

    LinuxSecurity Poll

    I agree with Linus Torvalds - Apple's new M1-powered laptops should run on Linux.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/45-i-agree-with-linus-torvalds-apple-s-new-m1-powered-laptops-should-run-on-linux?task=poll.vote&format=json
    45
    radio
    [{"id":"158","title":"True","votes":"12","type":"x","order":"1","pct":3.92,"resources":[]},{"id":"159","title":"False","votes":"294","type":"x","order":"2","pct":96.08,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    You have already voted for this poll.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.