Debian Security Advisory: Correction: New version of splitvt releasedJan 23, 2001, 20:49 (0 Talkback[s])
(Other stories by Martin Schulze)
Date: Tue, 23 Jan 2001 20:04:27 +0100
Debian Security Advisory DSA-014-2 firstname.lastname@example.org http://www.debian.org/security/ Martin Schulze January 23, 2001
Package : splitvt Vulnerability : buffer overflow and format string attack Debian-specific: no This advisory is only a corrected security advisory for DSA 014-1 since I wasn't careful enough last night and files from an older advisory back from June 2000 slipped through. To keep confusion to a minimum this advisory contains all relevant URLs - and only these. It was reported recently that splitvt is vulnerable to numerous buffer overflow attack and a format string attack. An attacker was able to gain access to the tty group. We recommend you upgrade your splitvt package immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file.You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc architectures.
Intel ia32 architecture:
Motorola 680x0 architecture:
Sun Sparc architecture:
These files will be moved into ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
For apt-get: deb http://security.debian.org/