LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
New versions of termcap-compat fixes buffer overflow Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
Debian We have received a report that former versions of libtermcap contained an exploitable buffer overflow. Debian itself is not exploitable by this bug since termcap was abandoned in favour of terminfo long ago. However, if you have compiled your own programs using termcap or have installed third party programs that depend on libtermcap and run as root they are exploitable.
We have received a report that former versions of libtermcap contained
an exploitable buffer overflow.  Debian itself is not exploitable by
this bug since termcap was abandoned in favour of terminfo long ago.
However, if you have compiled your own programs using termcap or have
installed third party programs that depend on libtermcap and run as
root they are exploitable.

We recommend you upgrade your termcap-compat package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.1 alias slink
--------------------------------

  Source archives:

    ftp://ftp.debian.org/debian/dists/slink-proposed-
updates/termcap-compat_1.1.1.1.0slink1.dsc
      MD5 checksum: 7908da11deaaedd2963c0b30f2ae43ba
    ftp://ftp.debian.org/debian/dists/slink-proposed-
updates/termcap-compat_1.1.1.1.0slink1.tar.gz
      MD5 checksum: bbdc7ff8e894b2e5512e3a078768f34e

  Sun Sparc architecture:

    ftp://ftp.debian.org/debian/dists/slink-
proposed-updates/termcap-compat_1.1.1.1.0slink1_sparc.deb
      MD5 checksum: fcaa5b222c067c9d13e41fb5ac431fb5

  Intel architecture:

    ftp://ftp.debian.org/debian/dists/slink-
proposed-updates/termcap-compat_1.1.1.1.0slink1_i386.deb
      MD5 checksum: bc4dac98011f885596c39b3f87233b54

  Motorola 680x0 architecture:

    ftp://ftp.debian.org/debian/dists/slink-
proposed-updates/termcap-compat_1.1.1.1.0slink1_m68k.deb
      MD5 checksum: 09b3a9c3299124a00b7a1028815112b5

  Alpha architecture:

    ftp://ftp.debian.org/debian/dists/slink-
proposed-updates/termcap-compat_1.1.1.1.0slink1_alpha.deb
      MD5 checksum: 6e0aba0b77244054989bb4967c2618d1


Debian GNU/Linux unstable alias potato
--------------------------------------

  Source archives:

    ftp://ftp.debian.org/debian/dists/unstable/main/source/old
libs/termcap-compat_1.1.1.1.1.dsc
      MD5 checksum: 62b7770c44b106c3465136e833fe05c7
    ftp://ftp.debian.org/debian/dists/unstable/main/source/
oldlibs/termcap-compat_1.1.1.1.1.tar.gz
      MD5 checksum: 8d51094402d27a4c85577f843e862bc2

  Sun Sparc architecture:

    ftp://ftp.debian.org/debian/dists/unstable/main/binary-
sparc/oldlibs/termcap-compat_1.1.1.1.1.deb
      MD5 checksum: ef9824ae7dd69336a7e9f5b02f4941c2

  Intel ia32 architecture:

    ftp://ftp.debian.org/debian/dists/unstable/main/binary-
i386/oldlibs/termcap-compat_1.1.1.1.1.deb
      MD5 checksum: ed51dc0acb24fb2d42dddd151508fbd9

  Motorola 680x0 architecture:

    ftp://ftp.debian.org/debian/dists/unstable/main/binary-
m68k/oldlibs/termcap-compat_1.1.1.1.1.deb
      MD5 checksum: 0fc2d11b40a8660289a8d390655f8764

  Alpha architecture:

    ftp://ftp.debian.org/debian/dists/unstable/main/binary-
alpha/oldlibs/termcap-compat_1.1.1.1.1.deb
      MD5 checksum: dc748d1d659eb4ee518893560aec2730

  PowerPC architecture:

    ftp://ftp.debian.org/debian/dists/unstable/main/binary-
powerpc/oldlibs/termcap-compat_1.1.1.1.1.deb
      MD5 checksum: d6171653bc20f5174023317359a54d2b

  ARM architecture:

    ftp://ftp.debian.org/debian/dists/unstable/main/binary-
powerpc/oldlibs/termcap-compat_1.1.1.1.1.deb
      MD5 checksum: 7822bcb807cc192f603952882d4f185f


For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

--
Debian GNU/Linux      .    Security Managers     .   security@debian.org
              debian-security-announce@lists.debian.org
  Christian Hudon     .     Wichert Akkerman     .     Martin Schulze
   .     .   


 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.