Debian Security Advisory
DSA-326-1 orville-write -- buffer overflows
- Date Reported:
- 19 Jun 2003
- Affected Packages:
- orville-write
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 7988.
In Mitre's CVE dictionary: CVE-2003-0441. - More information:
-
Orville Write, a replacement for the standard write(1) command, contains a number of buffer overflows. These could be exploited to gain either gid tty or root privileges, depending on the configuration selected when the package is installed.
For the stable distribution (woody) this problem has been fixed in version 2.53-4woody1.
The old stable distribution (potato) does not contain an orville-write package.
For the unstable distribution (sid) this problem will be fixed soon. See Debian bug report #170747.
We recommend that you update your orville-write package.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1.dsc
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1.diff.gz
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53.orig.tar.gz
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/o/orville-write/orville-write_2.53-4woody1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.