[<prev] [next>] [day] [month] [year] [list]
Message-ID: <m1EDJn5-000ofnC@finlandia.Infodrom.North.DE>
Date: Thu Sep 8 11:47:30 2005
From: joey at infodrom.org (Martin Schulze)
Subject: [SECURITY] [DSA 804-1] New kdelibs packages fix
backup file information leak
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 804-1 security@...ian.org
http://www.debian.org/security/ Martin Schulze
September 8th, 2005 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : kdelibs
Vulnerability : insecure permissions
Problem-Type : local
Debian-specific: no
CVE ID : CAN-2005-1920
KDE developers have reported a vulnerability in the backup file
handling of Kate and Kwrite. The backup files are created with
default permissions, even if the original file had more strict
permissions set. This could disclose information unintendedly.
For the stable distribution (sarge) this problem has been fixed in
version 3.3.2-6.2.
For the unstable distribution (sid) these problems have been fixed in
version 3.4.1-1.
We recommend that you upgrade your kate package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_3.3.2-6.2.dsc
Size/MD5 checksum: 1255 483c95e5daf87366aed15fc25d1f5cb0
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_3.3.2-6.2.diff.gz
Size/MD5 checksum: 404164 7c221eb2cb7f110c4e6c0e124a72ead1
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_3.3.2.orig.tar.gz
Size/MD5 checksum: 18250342 04f10ddfa8bf9e359f391012806edc04
Architecture independent components:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-data_3.3.2-6.2_all.deb
Size/MD5 checksum: 7094348 a4ba83e80051d39338be12beeb6c6db7
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-doc_3.3.2-6.2_all.deb
Size/MD5 checksum: 11533148 dfd0916af8c7a6f9250797d0582b026e
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_3.3.2-6.2_all.deb
Size/MD5 checksum: 27804 b09d44d53b16bbee369864a97f7a1a65
Alpha architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-bin_3.3.2-6.2_alpha.deb
Size/MD5 checksum: 995486 2c34cfea7388d0fddebb298d28208230
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4_3.3.2-6.2_alpha.deb
Size/MD5 checksum: 9282802 8ff374e3fb8301721fae64795d105a25
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-dev_3.3.2-6.2_alpha.deb
Size/MD5 checksum: 1245828 12902a2bc48712b8dc2078d504e93ce1
AMD64 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-bin_3.3.2-6.2_amd64.deb
Size/MD5 checksum: 923202 2f294881d0f02bd5fb8150e970d4e92e
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4_3.3.2-6.2_amd64.deb
Size/MD5 checksum: 8513542 c51108afe37b9627a0cf3b6be0bd1b1a
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-dev_3.3.2-6.2_amd64.deb
Size/MD5 checksum: 1240540 c1d112b699ab6446589e3364501ea5e2
ARM architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-bin_3.3.2-6.2_arm.deb
Size/MD5 checksum: 811038 6ab24a7d469012e6055dade8ad5776e3
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4_3.3.2-6.2_arm.deb
Size/MD5 checksum: 7594720 8522c2252a063b90a403a8332ff4e77a
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-dev_3.3.2-6.2_arm.deb
Size/MD5 checksum: 1239128 419560c0b5fbf685f96e603167bfbb85
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-bin_3.3.2-6.2_i386.deb
Size/MD5 checksum: 863944 f632bf601e9d365cfa328846b381d975
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4_3.3.2-6.2_i386.deb
Size/MD5 checksum: 8205918 5424c3b4cc9157af8c6397947925fedc
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-dev_3.3.2-6.2_i386.deb
Size/MD5 checksum: 1240090 58196248a56aa65666ea4f9b797e59b3
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-bin_3.3.2-6.2_ia64.deb
Size/MD5 checksum: 1148720 a2699e42dbff841c5f76a4723bd2ab68
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4_3.3.2-6.2_ia64.deb
Size/MD5 checksum: 10772880 4ed5ce9902a27e30beec5203cfc5383a
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-dev_3.3.2-6.2_ia64.deb
Size/MD5 checksum: 1253362 08f1fdf4719e826bdbfc08ec7db96176
HP Precision architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-bin_3.3.2-6.2_hppa.deb
Size/MD5 checksum: 945552 80bba0f50f46cf3df8d4128babef70b6
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4_3.3.2-6.2_hppa.deb
Size/MD5 checksum: 9305578 8a9dfcf80dd6933cf67315218213cbee
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-dev_3.3.2-6.2_hppa.deb
Size/MD5 checksum: 1243438 467722d7eaed3a16e2a54af3591abc9a
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-bin_3.3.2-6.2_m68k.deb
Size/MD5 checksum: 837964 ccb138a26e097177edc77e518b9431ce
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4_3.3.2-6.2_m68k.deb
Size/MD5 checksum: 7916544 fa76d9fe08d0f84b46365b980a52402a
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-dev_3.3.2-6.2_m68k.deb
Size/MD5 checksum: 1237598 9bd963ab4e7f04135a3f33f90c944d4a
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-bin_3.3.2-6.2_mips.deb
Size/MD5 checksum: 876822 727b1bd6c50a8acf90740811dbfc316d
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4_3.3.2-6.2_mips.deb
Size/MD5 checksum: 7426328 da9a3aa25f8ccc04a1be6b65a1741d5b
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-dev_3.3.2-6.2_mips.deb
Size/MD5 checksum: 1238184 7a5e3a18453b67a5f959a39db973e597
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-bin_3.3.2-6.2_mipsel.deb
Size/MD5 checksum: 873134 343b7aa8020f606fdd158e21f007e652
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4_3.3.2-6.2_mipsel.deb
Size/MD5 checksum: 7298044 34c6038b2437b771c778eb7bc8c9ab83
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-dev_3.3.2-6.2_mipsel.deb
Size/MD5 checksum: 1238048 30537a2615302d85bc1fb40713bc3405
PowerPC architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-bin_3.3.2-6.2_powerpc.deb
Size/MD5 checksum: 903792 c09601d486c2763fd09fcfb4fd5f09ad
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4_3.3.2-6.2_powerpc.deb
Size/MD5 checksum: 7922190 9b82276bacc75ae5853c639ca78957d6
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-dev_3.3.2-6.2_powerpc.deb
Size/MD5 checksum: 1242190 fb0894185ff11865d871ed9e724682f1
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-bin_3.3.2-6.2_s390.deb
Size/MD5 checksum: 892444 9ef1bc507ee96a815fabfb7b2b417cd8
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4_3.3.2-6.2_s390.deb
Size/MD5 checksum: 8636302 82321ab6e9bfc4a1e472e3689eb1fb6f
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-dev_3.3.2-6.2_s390.deb
Size/MD5 checksum: 1239584 7f1460f0299a51fbb10dbeca8ee7af2f
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-bin_3.3.2-6.2_sparc.deb
Size/MD5 checksum: 825002 d8b9497e79340e9e6010f1093e2324c7
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4_3.3.2-6.2_sparc.deb
Size/MD5 checksum: 7745946 7da1e6a7ab6a5db078923d0108c6f2ce
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs4-dev_3.3.2-6.2_sparc.deb
Size/MD5 checksum: 1238828 6a9d2330a6596a12a6d23202ca079089
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFDIBSGW5ql+IAeqTIRAtU8AJ9t5BCMs0N5bdgpusP3AEVWRDYIjQCfSfF8
T/bdAstxqI5gau17gAxRiiU=
=x6Mi
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists