-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 927-2 security@debian.org http://www.debian.org/security/ Martin Schulze December 29th, 2005 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : tkdiff Vulnerability : insecure temporary file Problem type : local Debian-specific: no CVE ID : CVE-2005-3343 The last update of tkdiff contained a programming error which is fixed by this version. For completeness we're adding the original advisory text: Javier Fernández-Sanguino Peña from the Debian Security Audit project discovered that tkdiff, a graphical side by side "diff" utility, creates temporary files in an insecure fashion. For the old stable distribution (woody) this problem has been fixed in version 3.08-3woody1. For the stable distribution (sarge) this problem has been fixed in version 4.0.2-1sarge1. For the unstable distribution (sid) this problem has been fixed in version 4.0.2-4. We recommend that you upgrade your tkdiff package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_3.08-3woody1.dsc Size/MD5 checksum: 611 b3a3bab8a8e76710bd27bd971a134aba http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_3.08-3woody1.diff.gz Size/MD5 checksum: 3981 004d41ec8581fe3f2d906e8a4d2d7d57 http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_3.08.orig.tar.gz Size/MD5 checksum: 63171 197e9bee9812a5698889c589efd9b1ee Architecture independent components: http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_3.08-3woody1_all.deb Size/MD5 checksum: 67374 44439707205ac4c9ddb8f4f5a90803b8 Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_4.0.2-1sarge1.dsc Size/MD5 checksum: 571 e7f0e00f3690e6d068a8c99bf5580b63 http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_4.0.2-1sarge1.diff.gz Size/MD5 checksum: 4337 a03c42f6a6187b0e0ad93ce0fab105c8 http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_4.0.2.orig.tar.gz Size/MD5 checksum: 86258 c52f7d8d87ebe34fbba6b6bdf30f3c60 Architecture independent components: http://security.debian.org/pool/updates/main/t/tkdiff/tkdiff_4.0.2-1sarge1_all.deb Size/MD5 checksum: 85536 262e45adcc1e6c73d2f14727520e984d These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDs5OkW5ql+IAeqTIRAnnHAJ4u5ooJ1+ZVxUpnmQeTDsX0GlfwlwCdHFpn ge+ooCjoXMMrGesOQkdUi0E= =xNMV -----END PGP SIGNATURE-----