Linux Security
    Linux Security
    Linux Security

    Debian: New tkdiff packages fix insecure temporary file creation

    Date 28 Dec 2005
    Posted By Joe Shakespeare
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 927-2                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    December 29th, 2005           
    - --------------------------------------------------------------------------
    Package        : tkdiff
    Vulnerability  : insecure temporary file
    Problem type   : local
    Debian-specific: no
    CVE ID         : CVE-2005-3343
    The last update of tkdiff contained a programming error which is fixed
    by this version.  For completeness we're adding the original advisory
        Javier Fern�ndez-Sanguino Pe�a from the Debian Security Audit
        project discovered that tkdiff, a graphical side by side "diff"
        utility, creates temporary files in an insecure fashion.
    For the old stable distribution (woody) this problem has been fixed in
    version 3.08-3woody1.
    For the stable distribution (sarge) this problem has been fixed in
    version 4.0.2-1sarge1.
    For the unstable distribution (sid) this problem has been fixed in
    version 4.0.2-4.
    We recommend that you upgrade your tkdiff package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      611 b3a3bab8a8e76710bd27bd971a134aba
          Size/MD5 checksum:     3981 004d41ec8581fe3f2d906e8a4d2d7d57
          Size/MD5 checksum:    63171 197e9bee9812a5698889c589efd9b1ee
      Architecture independent components:
          Size/MD5 checksum:    67374 44439707205ac4c9ddb8f4f5a90803b8
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      571 e7f0e00f3690e6d068a8c99bf5580b63
          Size/MD5 checksum:     4337 a03c42f6a6187b0e0ad93ce0fab105c8
          Size/MD5 checksum:    86258 c52f7d8d87ebe34fbba6b6bdf30f3c60
      Architecture independent components:
          Size/MD5 checksum:    85536 262e45adcc1e6c73d2f14727520e984d
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    Which is the best secure Linux distro for pentesting?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"174","title":"Kali Linux","votes":"15","type":"x","order":"1","pct":57.69,"resources":[]},{"id":"175","title":"Parrot OS","votes":"10","type":"x","order":"2","pct":38.46,"resources":[]},{"id":"176","title":"BlackArch Linux","votes":"1","type":"x","order":"3","pct":3.85,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.