The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 927-2 security@debian.org
http://www.debian.org/security/ Martin Schulze
December 29th, 2005 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : tkdiff
Vulnerability : insecure temporary file
Problem type : local
Debian-specific: no
CVE ID : CVE-2005-3343
The last update of tkdiff contained a programming error which is fixed
by this version. For completeness we're adding the original advisory
text:
Javier Fernández-Sanguino Peña from the Debian Security Audit
project discovered that tkdiff, a graphical side by side "diff"
utility, creates temporary files in an insecure fashion.
For the old stable distribution (woody) this problem has been fixed in
version 3.08-3woody1.
For the stable distribution (sarge) this problem has been fixed in
version 4.0.2-1sarge1.
For the unstable distribution (sid) this problem has been fixed in
version 4.0.2-4.
We recommend that you upgrade your tkdiff package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_3.08-3woody1.dsc
Size/MD5 checksum: 611 b3a3bab8a8e76710bd27bd971a134aba
http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_3.08-3woody1.diff.gz
Size/MD5 checksum: 3981 004d41ec8581fe3f2d906e8a4d2d7d57
http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_3.08.orig.tar.gz
Size/MD5 checksum: 63171 197e9bee9812a5698889c589efd9b1ee
Architecture independent components:
http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_3.08-3woody1_all.deb
Size/MD5 checksum: 67374 44439707205ac4c9ddb8f4f5a90803b8
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_4.0.2-1sarge1.dsc
Size/MD5 checksum: 571 e7f0e00f3690e6d068a8c99bf5580b63
http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_4.0.2-1sarge1.diff.gz
Size/MD5 checksum: 4337 a03c42f6a6187b0e0ad93ce0fab105c8
http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_4.0.2.orig.tar.gz
Size/MD5 checksum: 86258 c52f7d8d87ebe34fbba6b6bdf30f3c60
Architecture independent components:
http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_4.0.2-1sarge1_all.deb
Size/MD5 checksum: 85536 262e45adcc1e6c73d2f14727520e984d
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFDs5OkW5ql+IAeqTIRAnnHAJ4u5ooJ1+ZVxUpnmQeTDsX0GlfwlwCdHFpn
ge+ooCjoXMMrGesOQkdUi0E=
=xNMV
-----END PGP SIGNATURE-----