[Full-Disclosure] [SECURITY] [DSA 518-1] New kdelibs packages fix URI handler vulnerabilities

debian-security-announce_at_lists.debian.org
Date: 06/14/04

  • Next message: Skip Duckwall: "[Full-Disclosure] linux kernel local crash seen on slashdot"
    To: full-disclosure@lists.netsys.com
    Date: Mon, 14 Jun 2004 15:29:31 +0200 (CEST)
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 518-1 security@debian.org
    http://www.debian.org/security/ Martin Schulze
    June 14th, 2004 http://www.debian.org/security/faq
    - --------------------------------------------------------------------------

    Package : kdelibs
    Vulnerability : unsanitised input
    Problem-Type : remote
    Debian-specific: no
    CVE ID : CAN-2004-0411

    iDEFENSE identified a vulnerability in the Opera web browser that
    could be used by remote attackers to create or truncate arbitrary
    files on the victims machine. The KDE team discovered that a similar
    vulnerability exists in KDE.

    A remote attacker could entice a user to open a carefully crafted
    telnet URI which may either create or truncate a file in the victims
    home directory. In KDE 3.2 and later versions the user is first
    explicitly asked to confirm the opening of the telnet URI.

    For the stable distribution (woody) this problem has been fixed in
    version 2.2.2-13.woody.10.

    We recommend that you upgrade your KDE libraries.

    Upgrade Instructions
    - --------------------

    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.

    If you are using the apt-get package manager, use the line for
    sources.list as given below:

    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages

    You may use an automated update by adding the resources from the
    footer to the proper configuration.

    Debian GNU/Linux 3.0 alias woody
    - --------------------------------

      Source archives:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.10.dsc
          Size/MD5 checksum: 1355 87b8870b059562d84f714463817558df
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.10.diff.gz
          Size/MD5 checksum: 58099 bb59b94d62d1bb27246963be8e136d57
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2.orig.tar.gz
          Size/MD5 checksum: 6396699 7a9277a2e727821338f751855c2ce5d3

      Architecture independent components:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-doc_2.2.2-13.woody.10_all.deb
          Size/MD5 checksum: 2564260 0f1630714b822c193bfdf710c60274f6

      Alpha architecture:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_alpha.deb
          Size/MD5 checksum: 757490 c9d07cba479a5bba3d6567eb1c54129d
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_alpha.deb
          Size/MD5 checksum: 7553390 abff91d8d50f756f788ba70d36ce2a02
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_alpha.deb
          Size/MD5 checksum: 137442 334acae5a3d0491511bfbae8e88bbf1f
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_alpha.deb
          Size/MD5 checksum: 202010 dea66d7e08d3fdeb2033b223a73871cb
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_alpha.deb
          Size/MD5 checksum: 1022340 50826efc1e71dd8c84c900bc5e458805
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_alpha.deb
          Size/MD5 checksum: 1029254 bbfcf86398ecaf7751ef8ac20b4e8deb
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_alpha.deb
          Size/MD5 checksum: 198246 b8f5ba1e60bc9f201798c6f463b38973
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_alpha.deb
          Size/MD5 checksum: 174696 b7d640daca300ea09645ac35e3a99d32
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_alpha.deb
          Size/MD5 checksum: 178164 1a6527f89f38ccad33dee8402a026955
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_alpha.deb
          Size/MD5 checksum: 37266 5fb0f3bb093183f808debd11e77abfcf

      ARM architecture:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_arm.deb
          Size/MD5 checksum: 743780 9c1e0839cf5a603d5b6eacd8644165fe
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_arm.deb
          Size/MD5 checksum: 6604906 b2001cc89feafed549dac4d3fe74bb8d
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_arm.deb
          Size/MD5 checksum: 104600 00b7481a711d88bcdb2702562fceace1
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_arm.deb
          Size/MD5 checksum: 186592 5deadb59a4dce5b7d1d1e9f97b065a73
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_arm.deb
          Size/MD5 checksum: 651780 bcd3e9e1b313c746ac213766144b282b
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_arm.deb
          Size/MD5 checksum: 655412 7c8be1eb3075a58b1a936377632150a3
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_arm.deb
          Size/MD5 checksum: 155638 9acc32815c0ab56b96dc1b61e58bf7a0
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_arm.deb
          Size/MD5 checksum: 124854 46f6c31a873407f537c06d7eaeb83e92
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_arm.deb
          Size/MD5 checksum: 127954 306c61a6dd1472eef43721ead361ddb3
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_arm.deb
          Size/MD5 checksum: 37262 19b68d71fa5c9e60baaa81368eab1a6c

      Intel IA-32 architecture:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_i386.deb
          Size/MD5 checksum: 743050 9c445807ee91464fdc93b9455a640ce1
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_i386.deb
          Size/MD5 checksum: 6633628 c64514c4b153f05cb5f31cbac78df1d3
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_i386.deb
          Size/MD5 checksum: 106140 986d6c0a6ac507cf0f7d115f1cd27d74
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_i386.deb
          Size/MD5 checksum: 183070 383bd299b4a8f5dea97de0008da67e15
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_i386.deb
          Size/MD5 checksum: 625208 fa4200ad94f867dcff74045479a5fb01
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_i386.deb
          Size/MD5 checksum: 629530 83fbaf7ef69488eec164bd3c2eed2dab
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_i386.deb
          Size/MD5 checksum: 154996 57c079a635c53cf6d7766fd9ef87b196
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_i386.deb
          Size/MD5 checksum: 123514 0206fdd80e02e61bf43df9fb943b003e
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_i386.deb
          Size/MD5 checksum: 126598 1524775781195327f7f6910b96cf0f1e
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_i386.deb
          Size/MD5 checksum: 37272 c32ebb3072530d3fb7c5e3c9bbd2da66

      Intel IA-64 architecture:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_ia64.deb
          Size/MD5 checksum: 767846 929b0bbde81dc77c12e711471d369bc1
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_ia64.deb
          Size/MD5 checksum: 8858604 01b16b6657b890057ed429d4b0f4f4c9
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_ia64.deb
          Size/MD5 checksum: 153754 fe44def3095afc6ca3f8111f9779e3e7
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_ia64.deb
          Size/MD5 checksum: 257172 9d5797385e4d93f3c7c421967b6da854
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_ia64.deb
          Size/MD5 checksum: 1045474 93d585bb02e2c8ea290981917e94cb1a
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_ia64.deb
          Size/MD5 checksum: 1050908 176bedda9448f6fd915574810a972f74
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_ia64.deb
          Size/MD5 checksum: 199530 85f0d5fb9782f26b440747b8af0a4057
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_ia64.deb
          Size/MD5 checksum: 185576 dcd4d23c6764945fdc02eac951bd94ca
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_ia64.deb
          Size/MD5 checksum: 191076 d01c039b281958f56635ad42d546c721
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_ia64.deb
          Size/MD5 checksum: 37262 813759b175ae3073248271af22358aed

      HP Precision architecture:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_hppa.deb
          Size/MD5 checksum: 749834 5533364457c838022e779e8491796e13
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_hppa.deb
          Size/MD5 checksum: 7343994 180d8354d5b85a840cb121746b1ed6f2
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_hppa.deb
          Size/MD5 checksum: 117472 41daadd0675a083e5aa1462810ceea66
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_hppa.deb
          Size/MD5 checksum: 217966 f7f7323b81cc2e508a85874e3a267f15
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_hppa.deb
          Size/MD5 checksum: 1111642 50a400debfea7308d16d957b5399978e
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_hppa.deb
          Size/MD5 checksum: 1115416 8702cbc3c6d6491bcfd88676d8c8547a
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_hppa.deb
          Size/MD5 checksum: 207590 3f8db60bfd75043b5eb5b3ca8468ba56
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_hppa.deb
          Size/MD5 checksum: 172030 3a8d92c8bc6813526217c9d035c57996
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_hppa.deb
          Size/MD5 checksum: 176130 54891d1d923e2399e8bfbb324c8e1414
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_hppa.deb
          Size/MD5 checksum: 37264 c1c102ef9c44646973319221c13144a4

      Motorola 680x0 architecture:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_m68k.deb
          Size/MD5 checksum: 740154 34334b1b1cfd0af3fdbc7a0af0e7d81a
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_m68k.deb
          Size/MD5 checksum: 6484358 dd8701833bbc5ee7276a3a7f01c5c6d7
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_m68k.deb
          Size/MD5 checksum: 103662 1c8614bd285f81b9589788dc5593e828
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_m68k.deb
          Size/MD5 checksum: 178582 76f1e09baa5b94fdd869360f2f599a8f
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_m68k.deb
          Size/MD5 checksum: 628806 6f076ef140375bebc2c0f9c827313152
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_m68k.deb
          Size/MD5 checksum: 633256 1c7073acd9b922a58770b5dc07457391
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_m68k.deb
          Size/MD5 checksum: 151148 06a1fb067ddf1e90b69e40c0e6bb84f0
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_m68k.deb
          Size/MD5 checksum: 120810 554f803f8e7fb226c7b481b8b813b062
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_m68k.deb
          Size/MD5 checksum: 123728 e13fc1738a349620749fda0291039012
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_m68k.deb
          Size/MD5 checksum: 37270 5441efdfb2ac25adcb640d9661a25ae5

      Big endian MIPS architecture:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_mips.deb
          Size/MD5 checksum: 740002 95603d551ec28eb4b5568bd946168870
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_mips.deb
          Size/MD5 checksum: 6283956 030e3b82ffa3780eee88fd332278c44f
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_mips.deb
          Size/MD5 checksum: 106946 a6827cc73cc17c178d718fcd341aae32
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_mips.deb
          Size/MD5 checksum: 161090 6f892c177e599484506a790c49de5ddd
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_mips.deb
          Size/MD5 checksum: 620950 4281404d5f49d56bc62fae2a75eb6bf6
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_mips.deb
          Size/MD5 checksum: 625202 15cda3e839440a8541639e6ccfcbc970
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_mips.deb
          Size/MD5 checksum: 175902 2d452895d537beb473263519fb19142f
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_mips.deb
          Size/MD5 checksum: 124324 384fa9eb4c7bae2a35996fc7160d63e4
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_mips.deb
          Size/MD5 checksum: 127348 20d7e1fa06224e04dbd28e3f776cdd7a
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_mips.deb
          Size/MD5 checksum: 37272 97460f9d8761ce1c3ec4a364e8161463

      Little endian MIPS architecture:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_mipsel.deb
          Size/MD5 checksum: 739328 3252fbb0235a5312bb7a05b5d957904e
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_mipsel.deb
          Size/MD5 checksum: 6190250 9f3ed8b49200705ea4aa0a1b6b2819e9
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_mipsel.deb
          Size/MD5 checksum: 105914 550af1757d0c1568de0e50f10be08753
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_mipsel.deb
          Size/MD5 checksum: 159316 8c07726937b3b67ab527c7812b478349
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_mipsel.deb
          Size/MD5 checksum: 613722 447caf99bc36251b550b6ac5e7f951be
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_mipsel.deb
          Size/MD5 checksum: 617374 4171afdd4c3d6f2208eb6b6ab4d30a6a
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_mipsel.deb
          Size/MD5 checksum: 175136 72d6de577aa3f9d78496aee0581f7cd5
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_mipsel.deb
          Size/MD5 checksum: 123348 d8e9c85fdae90e9c12d3e923a9f950f1
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_mipsel.deb
          Size/MD5 checksum: 126316 724600f85e61d361aa1911d3c87dda4e
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_mipsel.deb
          Size/MD5 checksum: 37268 7fc64112ff202468633e518e70c1aae9

      PowerPC architecture:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_powerpc.deb
          Size/MD5 checksum: 740986 41cea661cd4070e8d43dece1170012e3
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_powerpc.deb
          Size/MD5 checksum: 6742504 2f4aced08b35a414a519ff2aa91b3369
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_powerpc.deb
          Size/MD5 checksum: 106056 c4a8375d0de793dbbe5b41b6caac5775
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_powerpc.deb
          Size/MD5 checksum: 182706 0ac8e1e9be7c1a854e8657860da70362
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_powerpc.deb
          Size/MD5 checksum: 691206 4ce83759c74d334b0d2632e02c3d22d5
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_powerpc.deb
          Size/MD5 checksum: 694750 cb53c58a97b97050cc913ea34bbeba88
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_powerpc.deb
          Size/MD5 checksum: 153906 58353224e77af68451de988da027601c
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_powerpc.deb
          Size/MD5 checksum: 127652 a8583bb02d402d7ee84e19fc5a296ae1
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_powerpc.deb
          Size/MD5 checksum: 130570 8ff764183bc10393c519d32010a2740a
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_powerpc.deb
          Size/MD5 checksum: 37270 8bf7e12f339a6a0d5edcecb77cc62387

      IBM S/390 architecture:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_s390.deb
          Size/MD5 checksum: 742460 5dadec865a235d3c3b5e7c523e7a086c
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_s390.deb
          Size/MD5 checksum: 6740810 a630cdced6335ec84e1ae7beec2a2dfe
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_s390.deb
          Size/MD5 checksum: 110572 4005956b9bbeef2a9e48af41dc067048
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_s390.deb
          Size/MD5 checksum: 177074 cb2bfd52bddeadfd1f6fbeb07847c34f
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_s390.deb
          Size/MD5 checksum: 642356 5ca40da62dc632ccf15275e656bcf524
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_s390.deb
          Size/MD5 checksum: 647464 1e4c0afa42102137bf11784182c69e90
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_s390.deb
          Size/MD5 checksum: 151514 211ded8862398d80034a21b8c617ac2f
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_s390.deb
          Size/MD5 checksum: 130008 e282906341eff69eb564c0985c2dbc5e
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_s390.deb
          Size/MD5 checksum: 133444 ee2c9794ccb325cb19510b49fc9305c7
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_s390.deb
          Size/MD5 checksum: 37268 bcb46494bc7476bb77c477758c36d529

      Sun Sparc architecture:

        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_sparc.deb
          Size/MD5 checksum: 741822 e4e2ebb01ace0e9656190a58c55cc3f1
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_sparc.deb
          Size/MD5 checksum: 6579034 b476ac0725a3be1382763eff7473321f
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_sparc.deb
          Size/MD5 checksum: 117862 fe309530038fc010ef5cfb5652a5bafd
        http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_sparc.deb
          Size/MD5 checksum: 184300 eca4eae95ef96ef4fcd5cb019f95a65d
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_sparc.deb
          Size/MD5 checksum: 665080 56f13b02e4e6402cde72ef78cf8bc6ed
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_sparc.deb
          Size/MD5 checksum: 668940 415d841382a2276232afda5c11cdc7db
        http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_sparc.deb
          Size/MD5 checksum: 151884 196dd2c39fb7ab3f338b9116d957ba4f
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_sparc.deb
          Size/MD5 checksum: 128768 e9b7c833dfd3ac050f427187934a2ab4
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_sparc.deb
          Size/MD5 checksum: 131488 40d5ee36215ce9dd69718948bd163428
        http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_sparc.deb
          Size/MD5 checksum: 37266 e71969fefab5a015e5d652f3680baef5

      These files will probably be moved into the stable distribution on
      its next update.

    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: debian-security-announce@lists.debian.org
    Package info: `apt-cache show <pkg>' and http://packages.debian.org/>

    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.4 (GNU/Linux)

    iD8DBQFAzag7W5ql+IAeqTIRAtQ3AKCWeRFmZxve1ekiGmkgxZfilVOqHACeMBEV
    RxmU60zhhiS+/5lco5kfEOg=
    =4+nj
    -----END PGP SIGNATURE-----

    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter:
    http://lists.netsys.com/full-disclosure-charter.html


  • Next message: Skip Duckwall: "[Full-Disclosure] linux kernel local crash seen on slashdot"

    Relevant Pages