Linux Security
Linux Security
Linux Security

New versions of termcap-compat fixes buffer overflow

Date 13 Dec 1999
3577
Posted By LinuxSecurity Advisories
We have received a report that former versions of libtermcap contained an exploitable buffer overflow. Debian itself is not exploitable by this bug since termcap was abandoned in favour of terminfo long ago. However, if you have compiled your own programs using termcap or have installed third party programs that depend on libtermcap and run as root they are exploitable.
We have received a report that former versions of libtermcap contained
an exploitable buffer overflow.  Debian itself is not exploitable by
this bug since termcap was abandoned in favour of terminfo long ago.
However, if you have compiled your own programs using termcap or have
installed third party programs that depend on libtermcap and run as
root they are exploitable.

We recommend you upgrade your termcap-compat package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.1 alias slink
--------------------------------

  Source archives:

    ftp://ftp.debian.org/debian/dists/slink-proposed-
updates/termcap-compat_1.1.1.1.0slink1.dsc
      MD5 checksum: 7908da11deaaedd2963c0b30f2ae43ba
    ftp://ftp.debian.org/debian/dists/slink-proposed-
updates/termcap-compat_1.1.1.1.0slink1.tar.gz
      MD5 checksum: bbdc7ff8e894b2e5512e3a078768f34e

  Sun Sparc architecture:

    ftp://ftp.debian.org/debian/dists/slink-
proposed-updates/termcap-compat_1.1.1.1.0slink1_sparc.deb
      MD5 checksum: fcaa5b222c067c9d13e41fb5ac431fb5

  Intel architecture:

    ftp://ftp.debian.org/debian/dists/slink-
proposed-updates/termcap-compat_1.1.1.1.0slink1_i386.deb
      MD5 checksum: bc4dac98011f885596c39b3f87233b54

  Motorola 680x0 architecture:

    ftp://ftp.debian.org/debian/dists/slink-
proposed-updates/termcap-compat_1.1.1.1.0slink1_m68k.deb
      MD5 checksum: 09b3a9c3299124a00b7a1028815112b5

  Alpha architecture:

    ftp://ftp.debian.org/debian/dists/slink-
proposed-updates/termcap-compat_1.1.1.1.0slink1_alpha.deb
      MD5 checksum: 6e0aba0b77244054989bb4967c2618d1


Debian GNU/Linux unstable alias potato
--------------------------------------

  Source archives:

    ftp://ftp.debian.org/debian/dists/unstable/main/source/old
libs/termcap-compat_1.1.1.1.1.dsc
      MD5 checksum: 62b7770c44b106c3465136e833fe05c7
    ftp://ftp.debian.org/debian/dists/unstable/main/source/
oldlibs/termcap-compat_1.1.1.1.1.tar.gz
      MD5 checksum: 8d51094402d27a4c85577f843e862bc2

  Sun Sparc architecture:

    ftp://ftp.debian.org/debian/dists/unstable/main/binary-
sparc/oldlibs/termcap-compat_1.1.1.1.1.deb
      MD5 checksum: ef9824ae7dd69336a7e9f5b02f4941c2

  Intel ia32 architecture:

    ftp://ftp.debian.org/debian/dists/unstable/main/binary-
i386/oldlibs/termcap-compat_1.1.1.1.1.deb
      MD5 checksum: ed51dc0acb24fb2d42dddd151508fbd9

  Motorola 680x0 architecture:

    ftp://ftp.debian.org/debian/dists/unstable/main/binary-
m68k/oldlibs/termcap-compat_1.1.1.1.1.deb
      MD5 checksum: 0fc2d11b40a8660289a8d390655f8764

  Alpha architecture:

    ftp://ftp.debian.org/debian/dists/unstable/main/binary-
alpha/oldlibs/termcap-compat_1.1.1.1.1.deb
      MD5 checksum: dc748d1d659eb4ee518893560aec2730

  PowerPC architecture:

    ftp://ftp.debian.org/debian/dists/unstable/main/binary-
powerpc/oldlibs/termcap-compat_1.1.1.1.1.deb
      MD5 checksum: d6171653bc20f5174023317359a54d2b

  ARM architecture:

    ftp://ftp.debian.org/debian/dists/unstable/main/binary-
powerpc/oldlibs/termcap-compat_1.1.1.1.1.deb
      MD5 checksum: 7822bcb807cc192f603952882d4f185f


For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

--
Debian GNU/Linux      .    Security Managers     .   This email address is being protected from spambots. You need JavaScript enabled to view it.
              This email address is being protected from spambots. You need JavaScript enabled to view it.
  Christian Hudon     .     Wichert Akkerman     .     Martin Schulze
   .     .   


Advisories

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"42","type":"x","order":"1","pct":84,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"4","type":"x","order":"2","pct":8,"resources":[]},{"id":"181","title":"Hardly ever","votes":"4","type":"x","order":"3","pct":8,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.