We have received a report that former versions of libtermcap contained an exploitable buffer overflow. Debian itself is not exploitable by this bug since termcap was abandoned in favour of terminfo long ago. However, if you have compiled your own programs using termcap or have installed third party programs that depend on libtermcap and run as root they are exploitable. We recommend you upgrade your termcap-compat package immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.1 alias slink -------------------------------- Source archives: ftp://ftp.debian.org/debian/dists/slink-proposed-updates/termcap-compat_1.1.1.1.0slink1.dsc MD5 checksum: 7908da11deaaedd2963c0b30f2ae43ba ftp://ftp.debian.org/debian/dists/slink-proposed-updates/termcap-compat_1.1.1.1.0slink1.tar.gz MD5 checksum: bbdc7ff8e894b2e5512e3a078768f34e Sun Sparc architecture: ftp://ftp.debian.org/debian/dists/slink-proposed-updates/termcap-compat_1.1.1.1.0slink1_sparc.deb MD5 checksum: fcaa5b222c067c9d13e41fb5ac431fb5 Intel architecture: ftp://ftp.debian.org/debian/dists/slink-proposed-updates/termcap-compat_1.1.1.1.0slink1_i386.deb MD5 checksum: bc4dac98011f885596c39b3f87233b54 Motorola 680x0 architecture: ftp://ftp.debian.org/debian/dists/slink-proposed-updates/termcap-compat_1.1.1.1.0slink1_m68k.deb MD5 checksum: 09b3a9c3299124a00b7a1028815112b5 Alpha architecture: ftp://ftp.debian.org/debian/dists/slink-proposed-updates/termcap-compat_1.1.1.1.0slink1_alpha.deb MD5 checksum: 6e0aba0b77244054989bb4967c2618d1 Debian GNU/Linux unstable alias potato -------------------------------------- Source archives: ftp://ftp.debian.org/debian/dists/unstable/main/source/oldlibs/termcap-compat_1.1.1.1.1.dsc MD5 checksum: 62b7770c44b106c3465136e833fe05c7 ftp://ftp.debian.org/debian/dists/unstable/main/source/oldlibs/termcap-compat_1.1.1.1.1.tar.gz MD5 checksum: 8d51094402d27a4c85577f843e862bc2 Sun Sparc architecture: ftp://ftp.debian.org/debian/dists/unstable/main/binary-sparc/oldlibs/termcap-compat_1.1.1.1.1.deb MD5 checksum: ef9824ae7dd69336a7e9f5b02f4941c2 Intel ia32 architecture: ftp://ftp.debian.org/debian/dists/unstable/main/binary-i386/oldlibs/termcap-compat_1.1.1.1.1.deb MD5 checksum: ed51dc0acb24fb2d42dddd151508fbd9 Motorola 680x0 architecture: ftp://ftp.debian.org/debian/dists/unstable/main/binary-m68k/oldlibs/termcap-compat_1.1.1.1.1.deb MD5 checksum: 0fc2d11b40a8660289a8d390655f8764 Alpha architecture: ftp://ftp.debian.org/debian/dists/unstable/main/binary-alpha/oldlibs/termcap-compat_1.1.1.1.1.deb MD5 checksum: dc748d1d659eb4ee518893560aec2730 PowerPC architecture: ftp://ftp.debian.org/debian/dists/unstable/main/binary-powerpc/oldlibs/termcap-compat_1.1.1.1.1.deb MD5 checksum: d6171653bc20f5174023317359a54d2b ARM architecture: ftp://ftp.debian.org/debian/dists/unstable/main/binary-powerpc/oldlibs/termcap-compat_1.1.1.1.1.deb MD5 checksum: 7822bcb807cc192f603952882d4f185f For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ . -- Debian GNU/Linux . Security Managers . security@debian.org debian-security-announce@lists.debian.org Christian Hudon . Wichert Akkerman . Martin Schulze <chrish@debian.org> . <wakkerma@debian.org> . <joey@debian.org>
Attachment:
pgpz5_0VP3t6X.pgp
Description: PGP signature