Debian Security Advisory DSA 461-1 security@debian.org
http://www.debian.org/security/
Matt Zimmerman
March 11th, 2004 http://www.debian.org/security/faq
Package : calife
Vulnerability : buffer overflow
Problem-Type : local
Debian-specific: no
CVE Ids : CAN-2004-0188
Debian bug : 235157
Calife, a program which provides super user privileges to
specific users, was found to contain a buffer overflow related to
the getpass(3) library function. A local attacker could potentially
exploit this vulnerability, given knowledge of a local user’s
password and the presence of at least one entry in
/etc/calife.auth, to execute arbitrary code with root
privileges.
For the current stable distribution (woody) this problem has
been fixed in version 2.8.4c-1woody1.
For the unstable distribution (sid) this problem has been fixed
in version 2.8.6-1.
We recommend that you update your calife package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1.dsc
Size/MD5 checksum: 573 8def6850642ea48816f119986071c08c
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1.diff.gz
Size/MD5 checksum: 5929 787f026768175eedd4faa087468bf07e
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c.orig.tar.gz
Size/MD5 checksum: 67628 c78ff2bc3d3d42903d12b54e841a400f
Alpha architecture:
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_alpha.deb
Size/MD5 checksum: 24528 1f19f26e3739df4767249dc5f46dbde7
ARM architecture:
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_arm.deb
Size/MD5 checksum: 22086 fb858512bda4128cb6a7c5d73d3c7043
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_i386.deb
Size/MD5 checksum: 22446 03096dc8a5bd5b020fa6e6d27591d780
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_ia64.deb
Size/MD5 checksum: 26084 b77f33b501c0402c6882922431161ba3
HP Precision architecture:
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_hppa.deb
Size/MD5 checksum: 22922 620682272cbacd5dae78f2842555265c
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_m68k.deb
Size/MD5 checksum: 22208 7f904162126847bd6cdedb536321841f
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_mips.deb
Size/MD5 checksum: 22658 2b6f0cf00246471330f2297fd747d63b
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_mipsel.deb
Size/MD5 checksum: 22614 a5228887a678ff52d1a68e03df4d7f56
PowerPC architecture:
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_powerpc.deb
Size/MD5 checksum: 22698 efaddbb63bed475b34ed5188b06cf8b5
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_s390.deb
Size/MD5 checksum: 22928 5020310cf3c4800fde1f0a26b0ac0f3d
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/c/calife/calife_2.8.4c-1woody1_sparc.deb
Size/MD5 checksum: 24936 75c41bd8275d8be77d289ae4aaaea0d8
These files will probably be moved into the stable distribution
on its next revision.
Debian Security Advisory DSA 462-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
March 12th, 2004 http://www.debian.org/security/faq
Package : xitalk
Vulnerability : missing privilege release
Problem-Type : local
Debian-specific: no
CVE ID : CAN-2004-0151
Steve Kemp from the GNU/Linux audit project discovered a problem
in xitalk, a talk intercept utility for the X Window System. A
local user can exploit this problem and execute arbitrary commands
under the GID utmp. This could be used by an attacker to remove
traces from the utmp file.
For the stable distribution (woody) this problem has been fixed
in version 1.1.11-9.1woody1.
For the unstable distribution (sid) this problem will be fixed
soon.
We recommend that you upgrade your xitalk package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1.dsc
Size/MD5 checksum: 589 fa2f8c040bcbe93612e195f0aff8865a
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1.diff.gz
Size/MD5 checksum: 6036 d4c631b5fa0f209eb31fa5190e4bc694
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11.orig.tar.gz
Size/MD5 checksum: 174034 c9dd82bce840dd4743484e4a0b96091f
Alpha architecture:
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_alpha.deb
Size/MD5 checksum: 103962 3efc908657b62f8adaa3012d83e3ebe2
ARM architecture:
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_arm.deb
Size/MD5 checksum: 93884 af7543b585cdd3c7e02461b8fd379a16
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_i386.deb
Size/MD5 checksum: 90606 27ca59056944b7540ddf6c5a54f7ad8e
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_ia64.deb
Size/MD5 checksum: 113966 00f90fd68c62294bfdde61b2e9761889
HP Precision architecture:
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_hppa.deb
Size/MD5 checksum: 98970 cb2fada655f4dadf2f652fe0d05374cd
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_m68k.deb
Size/MD5 checksum: 89216 b6231ec3e5b5f1b98da3a20dbd3978f7
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_mips.deb
Size/MD5 checksum: 98160 5a191512003e04af8df188cd834e7c50
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_mipsel.deb
Size/MD5 checksum: 97920 1ccd7fc6517cfdf7aeab91845bf930ff
PowerPC architecture:
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_powerpc.deb
Size/MD5 checksum: 95748 6cf1cb1de4645b579328fa649cf7c9fe
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_s390.deb
Size/MD5 checksum: 94110 eb74a36ba2014ee215a95d96bbce2acb
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/x/xitalk/xitalk_1.1.11-9.1woody1_sparc.deb
Size/MD5 checksum: 100100 ae3d7a9acdc80160b9c6b3c044c2fe9f
These files will probably be moved into the stable distribution
on its next revision.
For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>