Linux Security
    Linux Security
    Linux Security

    Debian: splitvt local root exploit

    Date 05 Jun 2000
    2756
    Posted By LinuxSecurity Advisories
    The version of splitvt distributed in Debian GNU/Linux 2.1, the frozen (potato) and unstable (woody) distributions, is vulnerable to a local buffer overflow.
    -----BEGIN PGP SIGNED MESSAGE-----
    
    - ------------------------------------------------------------------------
    Debian Security Advisory                             This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                         Wichert Akkerman
    June  5, 2000
    - ------------------------------------------------------------------------
    
    
    Package: splitvt
    Vulnerability: local root exploit
    Debian-specific: no
    
    This is an update to the previous splitvt advisory. The previous release
    had incorrrect addresses for the updates for Debian GNU/Linux potato.
    
    
    The version of splitvt distributed in Debian GNU/Linux 2.1 (a.k.a. slink),
    as well as in the frozen (potato) and unstable (woody) distributions, is
    vulnerable to a local buffer overflow.  This could be exploited to give a
    shell running as root.
    
    This has been fixed in versions 1.6.3-7.0slink1 and 1.6.3-7.1, and we
    recommend that you update your splitvt package immediately.
    
    
    Debian GNU/Linux 2.1 alias slink
    - - --------------------------------
    
      This version of Debian was released only for Intel ia32, the Motorola
      680x0, the Alpha, and the Sun Sparc architecture.
    
      Source archives:
        https://security.debian.org/dists/stable/updates/source/splitvt_1.6.3-7.0slink1.diff.gz
          MD5 checksum: 883b177488cb1618e757169c383ef563
        https://security.debian.org/dists/stable/updates/source/splitvt_1.6.3-7.0slink1.dsc
          MD5 checksum: 73b1d7633a59d0b34aefd38409ceaa8e
        https://security.debian.org/dists/stable/updates/source/splitvt_1.6.3.orig.tar.gz
          MD5 checksum: e95e166145ec51d2a9d80aa6472f9f98
    
      Alpha architecture:
        https://security.debian.org/dists/stable/updates/binary-alpha/splitvt_1.6.3-7.0slink1_alpha.deb
          MD5 checksum: 52ed7478ad363584cd9f21577abd0365
    
      Intel ia32 architecture:
        https://security.debian.org/dists/stable/updates/binary-i386/splitvt_1.6.3-7.0slink1_i386.deb
          MD5 checksum: 3531a6ec3009862cd4a3c671a0fa2204
    
      Motorola 680x0 architecture:
        https://security.debian.org/dists/stable/updates/binary-m68k/splitvt_1.6.3-7.0slink1_m68k.deb
          MD5 checksum: 467646eef73e0285a4ef5d3d2aaa0939
    
      Sun Sparc architecture:
        https://security.debian.org/dists/stable/updates/binary-sparc/splitvt_1.6.3-7.0slink1_sparc.deb
          MD5 checksum: 0913b4bdbf5a66f915068322f1f133be
    
    Debian 2.2 alias potato
    - - -----------------------
    
      This version of Debian is not yet released.  Fixes are currently available
      for Intel ia32 and the Sun Sparc architecture.  Fixes for other
      architectures will be available soon.
    
      Source archives:
        https://security.debian.org/dists/potato/updates/main/source/splitvt_1.6.3-7.1.diff.gz
          MD5 checksum: 158e4c37b56d09e4fb7e6d4a1eda6551
        https://security.debian.org/dists/potato/updates/main/source/splitvt_1.6.3-7.1.dsc
          MD5 checksum: c7924da369529b09acf6a7234ec07c08
        https://security.debian.org/dists/potato/updates/main/source/splitvt_1.6.3.orig.tar.gz
          MD5 checksum: e95e166145ec51d2a9d80aa6472f9f98
    
      Intel ia32 architecture:
        https://security.debian.org/dists/potato/updates/main/binary-i386/splitvt_1.6.3-7.1_i386.deb
          MD5 checksum: d814d49f46f8108590554abc8ed79737
    
      Sun Sparc architecture:
        https://security.debian.org/dists/potato/updates/main/binary-sparc/splitvt_1.6.3-7.1_sparc.deb
          MD5 checksum: 4197c4e30fe5e9f48187ba8df3526c7b
    
    Debian Unstable alias woody
    - - ---------------------------
    
      A fix will be available in the unstable archive soon.
    
    - - ----------------------------------------------------------------------------
    For apt-get: deb https://security.debian.org/ stable updates
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    - -- 
    - ----------------------------------------------------------------------------
    For apt-get: deb https://security.debian.org/ stable updates
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3ia
    Charset: noconv
    
    iQB1AwUBOTwg8KjZR/ntlUftAQGWwQL/ckQ3GN6bw9+wV/MM0Cm3pxsoXanARrmy
    g3Aj3yMPGGFuYS/IXhmtVV2PuPnDvOnrWUVek5xsWdT5oI+yWHsUFCzeIvtWxyrB
    ol6FtqVEawKm5uoqQXG1MffKuTzL4VAk
    =9w+C
    -----END PGP SIGNATURE-----
    

    Advisories

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/49-tis-the-season-of-giving-how-have-you-given-back-to-the-open-source-community?task=poll.vote&format=json
    49
    radio
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.