Linux Security
Linux Security
Linux Security

Debian: kdelibs fix backup file information leak DSA-804-1

Date 08 Sep 2005
Posted By LinuxSecurity Advisories
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 804-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
September 8th, 2005           
- --------------------------------------------------------------------------

Package        : kdelibs
Vulnerability  : insecure permissions
Problem-Type   : local
Debian-specific: no
CVE ID         : CAN-2005-1920

KDE developers have reported a vulnerability in the backup file
handling of Kate and Kwrite.  The backup files are created with
default permissions, even if the original file had more strict
permissions set.  This could disclose information unintendedly.

For the stable distribution (sarge) this problem has been fixed in
version 3.3.2-6.2.

For the unstable distribution (sid) these problems have been fixed in
version 3.4.1-1.

We recommend that you upgrade your kate package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:     1255 483c95e5daf87366aed15fc25d1f5cb0
      Size/MD5 checksum:   404164 7c221eb2cb7f110c4e6c0e124a72ead1
      Size/MD5 checksum: 18250342 04f10ddfa8bf9e359f391012806edc04

  Architecture independent components:
      Size/MD5 checksum:  7094348 a4ba83e80051d39338be12beeb6c6db7
      Size/MD5 checksum: 11533148 dfd0916af8c7a6f9250797d0582b026e
      Size/MD5 checksum:    27804 b09d44d53b16bbee369864a97f7a1a65

  Alpha architecture:
      Size/MD5 checksum:   995486 2c34cfea7388d0fddebb298d28208230
      Size/MD5 checksum:  9282802 8ff374e3fb8301721fae64795d105a25
      Size/MD5 checksum:  1245828 12902a2bc48712b8dc2078d504e93ce1

  AMD64 architecture:
      Size/MD5 checksum:   923202 2f294881d0f02bd5fb8150e970d4e92e
      Size/MD5 checksum:  8513542 c51108afe37b9627a0cf3b6be0bd1b1a
      Size/MD5 checksum:  1240540 c1d112b699ab6446589e3364501ea5e2

  ARM architecture:
      Size/MD5 checksum:   811038 6ab24a7d469012e6055dade8ad5776e3
      Size/MD5 checksum:  7594720 8522c2252a063b90a403a8332ff4e77a
      Size/MD5 checksum:  1239128 419560c0b5fbf685f96e603167bfbb85

  Intel IA-32 architecture:
      Size/MD5 checksum:   863944 f632bf601e9d365cfa328846b381d975
      Size/MD5 checksum:  8205918 5424c3b4cc9157af8c6397947925fedc
      Size/MD5 checksum:  1240090 58196248a56aa65666ea4f9b797e59b3

  Intel IA-64 architecture:
      Size/MD5 checksum:  1148720 a2699e42dbff841c5f76a4723bd2ab68
      Size/MD5 checksum: 10772880 4ed5ce9902a27e30beec5203cfc5383a
      Size/MD5 checksum:  1253362 08f1fdf4719e826bdbfc08ec7db96176

  HP Precision architecture:
      Size/MD5 checksum:   945552 80bba0f50f46cf3df8d4128babef70b6
      Size/MD5 checksum:  9305578 8a9dfcf80dd6933cf67315218213cbee
      Size/MD5 checksum:  1243438 467722d7eaed3a16e2a54af3591abc9a

  Motorola 680x0 architecture:
      Size/MD5 checksum:   837964 ccb138a26e097177edc77e518b9431ce
      Size/MD5 checksum:  7916544 fa76d9fe08d0f84b46365b980a52402a
      Size/MD5 checksum:  1237598 9bd963ab4e7f04135a3f33f90c944d4a

  Big endian MIPS architecture:
      Size/MD5 checksum:   876822 727b1bd6c50a8acf90740811dbfc316d
      Size/MD5 checksum:  7426328 da9a3aa25f8ccc04a1be6b65a1741d5b
      Size/MD5 checksum:  1238184 7a5e3a18453b67a5f959a39db973e597

  Little endian MIPS architecture:
      Size/MD5 checksum:   873134 343b7aa8020f606fdd158e21f007e652
      Size/MD5 checksum:  7298044 34c6038b2437b771c778eb7bc8c9ab83
      Size/MD5 checksum:  1238048 30537a2615302d85bc1fb40713bc3405

  PowerPC architecture:
      Size/MD5 checksum:   903792 c09601d486c2763fd09fcfb4fd5f09ad
      Size/MD5 checksum:  7922190 9b82276bacc75ae5853c639ca78957d6
      Size/MD5 checksum:  1242190 fb0894185ff11865d871ed9e724682f1

  IBM S/390 architecture:
      Size/MD5 checksum:   892444 9ef1bc507ee96a815fabfb7b2b417cd8
      Size/MD5 checksum:  8636302 82321ab6e9bfc4a1e472e3689eb1fb6f
      Size/MD5 checksum:  1239584 7f1460f0299a51fbb10dbeca8ee7af2f

  Sun Sparc architecture:
      Size/MD5 checksum:   825002 d8b9497e79340e9e6010f1093e2324c7
      Size/MD5 checksum:  7745946 7da1e6a7ab6a5db078923d0108c6f2ce
      Size/MD5 checksum:  1238828 6a9d2330a6596a12a6d23202ca079089

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"69","type":"x","order":"1","pct":75.82,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"14","type":"x","order":"2","pct":15.38,"resources":[]},{"id":"181","title":"Hardly ever","votes":"8","type":"x","order":"3","pct":8.79,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.