New versions of termcap-compat fixes buffer overflow

    Date13 Dec 1999
    CategoryDebian
    3201
    Posted ByLinuxSecurity Advisories
    We have received a report that former versions of libtermcap contained an exploitable buffer overflow. Debian itself is not exploitable by this bug since termcap was abandoned in favour of terminfo long ago. However, if you have compiled your own programs using termcap or have installed third party programs that depend on libtermcap and run as root they are exploitable.
    We have received a report that former versions of libtermcap contained
    an exploitable buffer overflow.  Debian itself is not exploitable by
    this bug since termcap was abandoned in favour of terminfo long ago.
    However, if you have compiled your own programs using termcap or have
    installed third party programs that depend on libtermcap and run as
    root they are exploitable.
    
    We recommend you upgrade your termcap-compat package immediately.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    Debian GNU/Linux 2.1 alias slink
    --------------------------------
    
      Source archives:
    
        ftp://ftp.debian.org/debian/dists/slink-proposed-
    updates/termcap-compat_1.1.1.1.0slink1.dsc
          MD5 checksum: 7908da11deaaedd2963c0b30f2ae43ba
        ftp://ftp.debian.org/debian/dists/slink-proposed-
    updates/termcap-compat_1.1.1.1.0slink1.tar.gz
          MD5 checksum: bbdc7ff8e894b2e5512e3a078768f34e
    
      Sun Sparc architecture:
    
        ftp://ftp.debian.org/debian/dists/slink-
    proposed-updates/termcap-compat_1.1.1.1.0slink1_sparc.deb
          MD5 checksum: fcaa5b222c067c9d13e41fb5ac431fb5
    
      Intel architecture:
    
        ftp://ftp.debian.org/debian/dists/slink-
    proposed-updates/termcap-compat_1.1.1.1.0slink1_i386.deb
          MD5 checksum: bc4dac98011f885596c39b3f87233b54
    
      Motorola 680x0 architecture:
    
        ftp://ftp.debian.org/debian/dists/slink-
    proposed-updates/termcap-compat_1.1.1.1.0slink1_m68k.deb
          MD5 checksum: 09b3a9c3299124a00b7a1028815112b5
    
      Alpha architecture:
    
        ftp://ftp.debian.org/debian/dists/slink-
    proposed-updates/termcap-compat_1.1.1.1.0slink1_alpha.deb
          MD5 checksum: 6e0aba0b77244054989bb4967c2618d1
    
    
    Debian GNU/Linux unstable alias potato
    --------------------------------------
    
      Source archives:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/source/old
    libs/termcap-compat_1.1.1.1.1.dsc
          MD5 checksum: 62b7770c44b106c3465136e833fe05c7
        ftp://ftp.debian.org/debian/dists/unstable/main/source/
    oldlibs/termcap-compat_1.1.1.1.1.tar.gz
          MD5 checksum: 8d51094402d27a4c85577f843e862bc2
    
      Sun Sparc architecture:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-
    sparc/oldlibs/termcap-compat_1.1.1.1.1.deb
          MD5 checksum: ef9824ae7dd69336a7e9f5b02f4941c2
    
      Intel ia32 architecture:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-
    i386/oldlibs/termcap-compat_1.1.1.1.1.deb
          MD5 checksum: ed51dc0acb24fb2d42dddd151508fbd9
    
      Motorola 680x0 architecture:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-
    m68k/oldlibs/termcap-compat_1.1.1.1.1.deb
          MD5 checksum: 0fc2d11b40a8660289a8d390655f8764
    
      Alpha architecture:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-
    alpha/oldlibs/termcap-compat_1.1.1.1.1.deb
          MD5 checksum: dc748d1d659eb4ee518893560aec2730
    
      PowerPC architecture:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-
    powerpc/oldlibs/termcap-compat_1.1.1.1.1.deb
          MD5 checksum: d6171653bc20f5174023317359a54d2b
    
      ARM architecture:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-
    powerpc/oldlibs/termcap-compat_1.1.1.1.1.deb
          MD5 checksum: 7822bcb807cc192f603952882d4f185f
    
    
    For not yet released architectures please refer to the appropriate
    directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    --
    Debian GNU/Linux      .    Security Managers     .   This email address is being protected from spambots. You need JavaScript enabled to view it.
                  This email address is being protected from spambots. You need JavaScript enabled to view it.
      Christian Hudon     .     Wichert Akkerman     .     Martin Schulze
       .     .   
    
    

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.