-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1035-1 security@debian.org http://www.debian.org/security/ Steve Kemp April 15th, 2005 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : fcheck Vulnerability : insecure temporary file Problem type : local Debian-specific: yes CVE ID : CVE-2006-1753 Steve Kemp from the Debian Security Audit project discovered that a cronjob contained in fcheck, a file integrity checker, creates a temporary file in an insecure fashion. The old stable distribution (woody) is not affected by this problem. For the stable distribution (sarge) this problem has been fixed in version 2.7.59-7sarge1. For the unstable distribution (sid) this problem has been fixed in version 2.7.59-8 We recommend that you upgrade your fcheck package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/f/fcheck/fcheck_2.7.59-7sarge1.dsc Size/MD5 checksum: 584 54262b28cbd90e16c251c5bf2b980380 http://security.debian.org/pool/updates/main/f/fcheck/fcheck_2.7.59-7sarge1.diff.gz Size/MD5 checksum: 12765 f58245e36a86b48513042b450c7baf1a http://security.debian.org/pool/updates/main/f/fcheck/fcheck_2.7.59.orig.tar.gz Size/MD5 checksum: 32864 bdf767b294b4f706742fb96913df37f0 Architecture independent components: http://security.debian.org/pool/updates/main/f/fcheck/fcheck_2.7.59-7sarge1_all.deb Size/MD5 checksum: 33622 e89d891255c37bcdf38097b9344312c7 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEQNBDXm3vHE4uyloRAlUrAJ9Mh/jNzAEnO/qqRcShbRuNCoTLYgCfQit/ 1Y2eEB+rPMJuhxJanij0w0k= =yIKl -----END PGP SIGNATURE-----