---

Debian GNU/Linux Advisories: calife, xitalk


Debian Security Advisory DSA 461-1 security@debian.org
http://www.debian.org/security/
Matt Zimmerman
March 11th, 2004 http://www.debian.org/security/faq


Package : calife
Vulnerability : buffer overflow
Problem-Type : local
Debian-specific: no
CVE Ids : CAN-2004-0188
Debian bug : 235157

Calife, a program which provides super user privileges to
specific users, was found to contain a buffer overflow related to
the getpass(3) library function. A local attacker could potentially
exploit this vulnerability, given knowledge of a local user’s
password and the presence of at least one entry in
/etc/calife.auth, to execute arbitrary code with root
privileges.

For the current stable distribution (woody) this problem has
been fixed in version 2.8.4c-1woody1.

For the unstable distribution (sid) this problem has been fixed
in version 2.8.6-1.

We recommend that you update your calife package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:


http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1.dsc

Size/MD5 checksum: 573 8def6850642ea48816f119986071c08c

http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1.diff.gz

Size/MD5 checksum: 5929 787f026768175eedd4faa087468bf07e

http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c.orig.tar.gz

Size/MD5 checksum: 67628 c78ff2bc3d3d42903d12b54e841a400f

Alpha architecture:


http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_alpha.deb

Size/MD5 checksum: 24528 1f19f26e3739df4767249dc5f46dbde7

ARM architecture:


http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_arm.deb

Size/MD5 checksum: 22086 fb858512bda4128cb6a7c5d73d3c7043

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_i386.deb

Size/MD5 checksum: 22446 03096dc8a5bd5b020fa6e6d27591d780

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_ia64.deb

Size/MD5 checksum: 26084 b77f33b501c0402c6882922431161ba3

HP Precision architecture:


http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_hppa.deb

Size/MD5 checksum: 22922 620682272cbacd5dae78f2842555265c

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_m68k.deb

Size/MD5 checksum: 22208 7f904162126847bd6cdedb536321841f

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_mips.deb

Size/MD5 checksum: 22658 2b6f0cf00246471330f2297fd747d63b

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_mipsel.deb

Size/MD5 checksum: 22614 a5228887a678ff52d1a68e03df4d7f56

PowerPC architecture:


http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_powerpc.deb

Size/MD5 checksum: 22698 efaddbb63bed475b34ed5188b06cf8b5

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_s390.deb

Size/MD5 checksum: 22928 5020310cf3c4800fde1f0a26b0ac0f3d

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_sparc.deb

Size/MD5 checksum: 24936 75c41bd8275d8be77d289ae4aaaea0d8

These files will probably be moved into the stable distribution
on its next revision.


Debian Security Advisory DSA 462-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
March 12th, 2004 http://www.debian.org/security/faq


Package : xitalk
Vulnerability : missing privilege release
Problem-Type : local
Debian-specific: no
CVE ID : CAN-2004-0151

Steve Kemp from the GNU/Linux audit project discovered a problem
in xitalk, a talk intercept utility for the X Window System. A
local user can exploit this problem and execute arbitrary commands
under the GID utmp. This could be used by an attacker to remove
traces from the utmp file.

For the stable distribution (woody) this problem has been fixed
in version 1.1.11-9.1woody1.

For the unstable distribution (sid) this problem will be fixed
soon.

We recommend that you upgrade your xitalk package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:


http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1.dsc

Size/MD5 checksum: 589 fa2f8c040bcbe93612e195f0aff8865a

http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1.diff.gz

Size/MD5 checksum: 6036 d4c631b5fa0f209eb31fa5190e4bc694

http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11.orig.tar.gz

Size/MD5 checksum: 174034 c9dd82bce840dd4743484e4a0b96091f

Alpha architecture:


http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_alpha.deb

Size/MD5 checksum: 103962 3efc908657b62f8adaa3012d83e3ebe2

ARM architecture:


http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_arm.deb

Size/MD5 checksum: 93884 af7543b585cdd3c7e02461b8fd379a16

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_i386.deb

Size/MD5 checksum: 90606 27ca59056944b7540ddf6c5a54f7ad8e

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_ia64.deb

Size/MD5 checksum: 113966 00f90fd68c62294bfdde61b2e9761889

HP Precision architecture:


http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_hppa.deb

Size/MD5 checksum: 98970 cb2fada655f4dadf2f652fe0d05374cd

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_m68k.deb

Size/MD5 checksum: 89216 b6231ec3e5b5f1b98da3a20dbd3978f7

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_mips.deb

Size/MD5 checksum: 98160 5a191512003e04af8df188cd834e7c50

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_mipsel.deb

Size/MD5 checksum: 97920 1ccd7fc6517cfdf7aeab91845bf930ff

PowerPC architecture:


http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_powerpc.deb

Size/MD5 checksum: 95748 6cf1cb1de4645b579328fa649cf7c9fe

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_s390.deb

Size/MD5 checksum: 94110 eb74a36ba2014ee215a95d96bbce2acb

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_sparc.deb

Size/MD5 checksum: 100100 ae3d7a9acdc80160b9c6b3c044c2fe9f

These files will probably be moved into the stable distribution
on its next revision.


For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis