Debian alert: New kdlibs packages fix arbitrary program execution

Posted by dave on Dec 5, 2002 6:11 AM EDT
Mailing list
Mail this story
Print this story

The KDE team has discovered a vulnerability in the support for various network protocols via the KIO The implementation of the rlogin and protocol allows a carefully crafted URL in an HTML page, HTML email or other KIO-enabled application to execute arbitrary commands on the system using the victim's account on the vulnerable machine.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 204-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
December 5th, 2002                      http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : kdelibs
Vulnerability  : arbitrary program execution
Problem-Type   : remote
Debian-specific: no
CVE Id         : CAN-2002-1281 CAN-2002-1282

The KDE team has discovered a vulnerability in the support for various
network protocols via the KIO The implementation of the rlogin and
protocol allows a carefully crafted URL in an HTML page, HTML email or
other KIO-enabled application to execute arbitrary commands on the
system using the victim's account on the vulnerable machine.

This problem has been fixed by disabling rlogin and telnet in version
2.2.2-13.woody.5 for the current stable distribution (woody) and in
version 2.2.2-14.1 for the unstable distribution (sid).  The old
stable distribution (potato) is not affected since it doesn't contain
KDE.

This problem has been fixed by disabling rlogin and telnet in version
2.2.2-13.woody.5 for the current stable distribution (woody).  The old
stable distribution (potato) is not affected since it doesn't contain
KDE.  A correction for the package in the unstable distribution (sid)
is not yet available.

We recommend that you upgrade your kdelibs3 package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.5.dsc
      Size/MD5 checksum:     1353 a1ec9070e7c6001622ababe1e089175e
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.5.diff.gz
      Size/MD5 checksum:    38995 7b63146f3756571ffc7907d8b132e9ca
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2.orig.tar.gz
      Size/MD5 checksum:  6396699 7a9277a2e727821338f751855c2ce5d3

  Architecture independent components:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-doc_2.2.2-13.woody.5_all.deb
      Size/MD5 checksum:  2567164 7ed60fb2a8aab2fadaea284b55af4cf2

  Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:   756862 d3e4c4f454a07dc6b67f4381647ada65
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:  7532352 5c527c94140518e8104488bd44dcce0b
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:   137728 ec53f88c8d5d30f8ed2fee79a13600f3
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:   201564 26f95b365102bf651d8aab5c01cc31e8
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:  1019242 80fffa496319f117c6c146e74db751ea
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:  1026754 954df79f21bb017ed37b5d7e750011a8
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:   197818 a8938d049986d826a55e233e065d5c97
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:   173658 b7b66df52c21b088f6c73072e09876ed
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:   176776 6d3df2f1c1b5b95b14b265cb1720f687
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:    36824 fe05cccfe6f741cae8661c16ad602a39

  ARM architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   743060 642cd5da473ad4c65a3026a7ab8dd6c2
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:  6588608 e3c0d0dce80d28f1353b94f89aed3e2f
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   103710 c2157b3663ab88253799dcd42ada2489
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   186158 146da175143651894e0a6a518515a071
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   649990 0a2579c8ca186404144b06aa5b1ec25f
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   653616 bafe8a3dce52bd60aada69c640328410
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   155068 aaa5d66938fc30ea0fc7e91aadbf300f
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   123938 f95f0e5b6dc4942c1c36e3c854b22b7e
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   126866 30357103dcbedeb23b5a7919cadb6ea5
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:    36830 f637b3a84c59fb068e0968a95bbace2a

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   742370 856ea8ef257aa0c5b52170ea06cd9172
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:  6618286 71423d876ab1240eb77a74ef5e892fa3
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   105142 e6141b8157a43cbe29d428c8c3ec7826
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   182496 c13b5948467ea42ca231ac1674d82369
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   623234 f61ebef22eb9585b258edf1dc308b09e
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   628078 461fd3bb1753d3b0910dfe2489e13d6b
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   154370 aa037a603985e0599e8fee6f4fb6b99f
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   122612 ed5b6d356d43c3baa9fc7cf2d1a38256
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   125674 20027337f752ad92d1b11839fb4bac15
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:    36820 a8ff4c62fdd55a9402ffd380d1c7e0fd

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:   767052 f75bf1deb9cfdcfd0d4748fa4f20fe9b
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:  8840908 9267b2f51a147e9da2cba01ac670306d
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:   152722 6973e65c0ab99349dbc22689a3945a1f
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:   256600 760018deea6bc388aa2827cbb6f30123
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:  1043688 e5797dfa91eed97c6541e72ddf6c9e22
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:  1047876 3b8eff39fe8b451aa93142c9119ff18b
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:   199002 8f7e1ba6237a356f2c6b8f89d2478f0b
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:   184484 34ea587f7f6b65f8ef7965abcaf883ac
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:   189636 add57bdfb33cb116eda79ee635dbd480
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:    36824 b847467c3b290597424cd10b0b7d7976

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:   749222 e5e12778c69dda32cb67b813c42be97e
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:  7343384 9299c3753c990c452d6631d4dd60fcc5
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:   116592 d3726081a88dce52fd5aa676b0a9ac01
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:   217616 9549505ad4d7e3dffa317c4b9b6cc426
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:  1108956 5cbc942a5d0d436827310235b1000362
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:  1113992 fad426fb1cf9e01613b087f97c9615e8
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:   207056 c955a8b89a46649d4e78b5e83f1cb9c2
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:   170816 6ed76d7dc1f28fbe312d2c6ad6a0aabe
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:   174798 7ec367c97b14f66ef5f07bdaea2d28b7
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:    36824 f4209e5fcc48b5b80474ebdc64f25fa9

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   739438 46981b23e029b2c6c25928c7f9c957d4
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:  6483766 ae36b5cb16f2dc1b9bb634f772b8b314
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   102824 50b2e85605a9b5aaf430d3a6d10d839f
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   178112 7f733bc0e562c221da603d7872c8386e
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   627000 9f50ab78b87eb746cede05e84f3faa25
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   631830 334e63417b32148aad5391b3409210c9
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   150716 78cd8c398896abac25752b571bbb8512
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   120018 b451bbcbff8eaa6e7237083495dff3f9
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   122880 a3f000caf85b24dc539592f6f735f78a
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:    36832 570ee43f827af3a06f4318d0cf8677ef

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   739358 c1e26fa96fa64cb79b05617984f41132
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:  6282632 0898e2f917ca0125187ff70946bbaa9e
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   106066 afe5eb8897a20e127c08236929c4573b
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   160738 804db56f08820871423a626c7ae6c29b
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   619354 6059b8f383a76fce91332c4e14584702
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   623362 2fe6f722acda87d3f8ae90d8db90f6b0
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   175460 f037c9fbe2384fb20b2e09ca8ebddea2
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   123520 cd56731047f94cc909dd48b22ab5c7a5
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   126568 4fd78d84bae710146dbebd7ec7ff4fb7
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:    36826 4fb2382a61989ea53a1fe585999d450d

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   738574 ba185f4331b844f087a8019644a4903a
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:  6199152 2ee2cccc2a8b7b38268b670c354f783a
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   104184 2325939de91f789e763a8616498037a1
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   158756 e8d5f632c0de89b4af47b32c8cb903fe
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   611590 a02d2c34d25f95b46684a576870be65d
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   615408 9f145191e32e7edfdc7f4b10b5b45652
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   174636 ea24c0e312450f9297336cf5e5cb3e27
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   122294 610c48319971882ea7f0a30fe859fa36
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   125318 5543a0658c5815f7f642a412c069e12f
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:    36828 662451c6985f6a41325cfc369e2f6825

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   740278 f0d3300e8631bb46024a7d96544b83f2
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:  6726214 7da69f8cff3d39d3fdc48278a675de7e
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   105182 0740d3058ca7c23dbe087ca78339bd81
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   182178 874c0ac930c20e9f36412b1c46635984
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   689280 b44f92eff69375efbf52b3409cb9a6c7
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   691890 2d3b196de92fdc9626d797483eee9a7b
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   153212 13af4c0b04167dd2fcf319d53bc27f99
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   126744 53f1efc823e175ac9aa180fd0744b0b1
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   129722 fe5817e0103e5072e0943cd2678f7a05
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:    36828 5f1d44bafd12d1b700661323980eaddd

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   740652 0c6b1694824a0301003416b773aed786
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:  6663840 fd2f0c51dbcf6eb1887da9b27e8f9766
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   107604 c9e2d1f6c7f12984b6b3c98520318392
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   175006 78da302852c4ab4cb5feb456404bc449
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   630840 9ed83d7b7af82ce5071eb7519d8b620d
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   635574 0921608dcbafb817f1b320e81366d3b2
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   151038 c903c4c979e571f2f6c960276c242c2f
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   127150 9164e2c1149eb3444b32c9d9cbc98872
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   130634 6e5e321437a831fa512a73d0e34e1d58
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:    36820 297891ce316721790777e072baaeb164

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   741148 47e7506bcadf5b2b40dab72f090e713a
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:  6579014 ebe1314e108c8bd8fd53007c21ab5ad7
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   116882 04423ecaa1a603632c7e04eb56f0e1a7
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   183938 0233342ad996dd1e3a8729620a0e5e2c
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   663014 1860e47b68a27e0de59e56f99e428ab7
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   667036 05b91c60935ec656d1d22dc50f7f3100
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   151406 9ca359ca3a7a059695de4bbe7d894cd7
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   127244 459377208beca073415844e2a545e8e8
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   130322 baf7d657ef2ea56e54a9b33cb548cbb3
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:    36820 c3fbedd62e204588446f10c12f281aa7


  These files will probably be moved into the stable distribution on
  its next revision.

Survey on the use of Debian GNU/Linux 2.2 alias potato:
http://lists.debian.org/debian-devel-announce-0211/msg00001.html

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE972yOW5ql+IAeqTIRAinXAJ4qeURoMh7Hfli4EvKK4YEN1sbLvACgqFvZ
+YAt7T/vMotKyR6KVFMLB1A=
=JW+f
-----END PGP SIGNATURE-----


  Nav
» Read more about: Story Type: Security; Groups: Debian

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.