Debian: New tuxpaint packages fix insecure temporary file creation

    Date27 Jan 2006
    CategoryDebian
    4276
    Posted ByJoe Shakespeare
    Javier Fern�ndez-Sanguino Pe�a from the Debian Security Audit project discovered that a script in tuxpaint, a paint program for young children, creates a temporary file in an insecure fashion.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 941-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                             Martin Schulze
    January 16th, 2006                      http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : tuxpaint
    Vulnerability  : insecure temporary file
    Problem type   : local
    Debian-specific: no
    CVE ID         : CVE-2005-3340
    
    Javier Fern�ndez-Sanguino Pe�a from the Debian Security Audit project
    discovered that a script in tuxpaint, a paint program for young
    children, creates a temporary file in an insecure fashion.
    
    The old stable distribution (woody) does not contain tuxpaint packages.
    
    For the stable distribution (sarge) this problem has been fixed in
    version 0.9.14-2sarge0.
    
    For the unstable distribution (sid) this problem has been fixed in
    version 0.9.15b-1.
    
    We recommend that you upgrade your tuxpaint package.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0.dsc
          Size/MD5 checksum:      749 33447b64d21e124dfbcab3626f0a2c09
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0.diff.gz
          Size/MD5 checksum:     6178 fe6d69b9df65fcb6c0f1015a39e6d715
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14.orig.tar.gz
          Size/MD5 checksum:  3208894 0b7522c1b3672d5c233f7bbc772c8dec
    
      Architecture independent components:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint-data_0.9.14-2sarge0_all.deb
          Size/MD5 checksum:  1093764 416ffee20dca7ba7926e30a71ae95ff3
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0_alpha.deb
          Size/MD5 checksum:   112732 9b588312a0b5936ea5bbe096aa726e9e
    
      AMD64 architecture:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0_amd64.deb
          Size/MD5 checksum:    96402 286c9839a2636dc2beb6df05d89cb290
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0_arm.deb
          Size/MD5 checksum:    98002 d68f2fff833108084d9d67b254dea638
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0_i386.deb
          Size/MD5 checksum:    94188 f27e07c2e34ead61b24f71dd3df2de51
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0_ia64.deb
          Size/MD5 checksum:   126116 217e59f14aad0e5acb6e139fc347d64c
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0_hppa.deb
          Size/MD5 checksum:   103696 8b61b78194383314d49d465033f5ceed
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0_m68k.deb
          Size/MD5 checksum:    86260 9734a7337a228519ea31b956ffd7e5f6
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0_mips.deb
          Size/MD5 checksum:   101286 c9d58ae06ad9d860df0af6987a4672ef
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0_mipsel.deb
          Size/MD5 checksum:   100346 464c3aa6e843687bdf425c9e8af9be19
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0_powerpc.deb
          Size/MD5 checksum:    99138 d6ce366eab028cf324155560d6705518
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0_s390.deb
          Size/MD5 checksum:    97318 5472aa0a7989222c510a7f68292d976f
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/t/tuxpaint/tuxpaint_0.9.14-2sarge0_sparc.deb
          Size/MD5 checksum:    94720 cc8cdaba526506d75f63f5e86a722cee
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"65","type":"x","order":"1","pct":57.52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.27,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.2,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.