-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 822-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
September 29th, 2005 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : gtkdiskfree
Vulnerability : insecure temporary file creation
Problem type : local
Debian-specific: no
CVE ID : CAN-2005-2918
Eric Romang discovered that gtkdiskfree, a GNOME program that shows
free and used space on filesystems, creates a temporary file in an
insecure fashion.
The old stable distribution (woody) does not contain the gtkdiskfree
package.
For the stable distribution (sarge) this problem has been fixed in
version 1.9.3-4sarge1.
For the unstable distribution (sid) this problem will be fixed soon.
We recommend that you upgrade your gtkdiskfree package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1.dsc
Size/MD5 checksum: 621 0bd28c26695d9fccf914ab1e377909b2
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1.diff.gz
Size/MD5 checksum: 16542 ae45c717d4ae1b818444129e16c233cb
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3.orig.tar.gz
Size/MD5 checksum: 255601 66218fc425da0a2c42adfcb9914dd641
Alpha architecture:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1_alpha.deb
Size/MD5 checksum: 98940 1b26a54bae0be826495264be3b7b82e6
AMD64 architecture:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1_amd64.deb
Size/MD5 checksum: 94194 bfb1876fa331f1ae9cb0298c28ffe4c5
ARM architecture:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1_arm.deb
Size/MD5 checksum: 89044 1e857eadbbe706b8e225b2cb01d45490
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1_i386.deb
Size/MD5 checksum: 90816 d4acc02866f01c1a8b730f415bdb0336
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1_ia64.deb
Size/MD5 checksum: 104408 459cf724e9f5577d4fda6a789c9a90bb
HP Precision architecture:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1_hppa.deb
Size/MD5 checksum: 94946 7e14aaa69a7e846d77c96b84f9c5c025
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1_m68k.deb
Size/MD5 checksum: 88688 a9a9de28ad819007aa994944c20e523c
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1_mips.deb
Size/MD5 checksum: 90530 7e553dc962f250a16cfe10512c9b458c
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1_mipsel.deb
Size/MD5 checksum: 88680 2069bcc94c615cc7b7862469ad7f25eb
PowerPC architecture:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1_powerpc.deb
Size/MD5 checksum: 93076 8b4dc0bedd12247019212ece8466154d
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1_s390.deb
Size/MD5 checksum: 94662 ec49c801f4c1637e43324ff161ac58ea
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/g/gtkdiskfree/gtkdiskfree_1.9.3-4sarge1_sparc.deb
Size/MD5 checksum: 90310 d1bc24a8debc839678181bc842a5b047
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFDO5abW5ql+IAeqTIRAvvVAJ9DmUeiigWzSDY1vt8RHKkmDU8qVQCeI1Ii
z0PnEalA+Pw8PySQBvBuN8g=
=Uxx8
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
No comments:
Post a Comment