lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <m1BZrWl-000ofCC__10960.1472541273$1087230723@finlandia.Infodrom.North.DE> Date: Mon, 14 Jun 2004 15:29:31 +0200 (CEST) From: joey@...odrom.org (Martin Schulze) To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 518-1] New kdelibs packages fix URI handler vulnerabilities -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 518-1 security@...ian.org http://www.debian.org/security/ Martin Schulze June 14th, 2004 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : kdelibs Vulnerability : unsanitised input Problem-Type : remote Debian-specific: no CVE ID : CAN-2004-0411 iDEFENSE identified a vulnerability in the Opera web browser that could be used by remote attackers to create or truncate arbitrary files on the victims machine. The KDE team discovered that a similar vulnerability exists in KDE. A remote attacker could entice a user to open a carefully crafted telnet URI which may either create or truncate a file in the victims home directory. In KDE 3.2 and later versions the user is first explicitly asked to confirm the opening of the telnet URI. For the stable distribution (woody) this problem has been fixed in version 2.2.2-13.woody.10. We recommend that you upgrade your KDE libraries. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.10.dsc Size/MD5 checksum: 1355 87b8870b059562d84f714463817558df http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.10.diff.gz Size/MD5 checksum: 58099 bb59b94d62d1bb27246963be8e136d57 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2.orig.tar.gz Size/MD5 checksum: 6396699 7a9277a2e727821338f751855c2ce5d3 Architecture independent components: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-doc_2.2.2-13.woody.10_all.deb Size/MD5 checksum: 2564260 0f1630714b822c193bfdf710c60274f6 Alpha architecture: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_alpha.deb Size/MD5 checksum: 757490 c9d07cba479a5bba3d6567eb1c54129d http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_alpha.deb Size/MD5 checksum: 7553390 abff91d8d50f756f788ba70d36ce2a02 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_alpha.deb Size/MD5 checksum: 137442 334acae5a3d0491511bfbae8e88bbf1f http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_alpha.deb Size/MD5 checksum: 202010 dea66d7e08d3fdeb2033b223a73871cb http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_alpha.deb Size/MD5 checksum: 1022340 50826efc1e71dd8c84c900bc5e458805 http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_alpha.deb Size/MD5 checksum: 1029254 bbfcf86398ecaf7751ef8ac20b4e8deb http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_alpha.deb Size/MD5 checksum: 198246 b8f5ba1e60bc9f201798c6f463b38973 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_alpha.deb Size/MD5 checksum: 174696 b7d640daca300ea09645ac35e3a99d32 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_alpha.deb Size/MD5 checksum: 178164 1a6527f89f38ccad33dee8402a026955 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_alpha.deb Size/MD5 checksum: 37266 5fb0f3bb093183f808debd11e77abfcf ARM architecture: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_arm.deb Size/MD5 checksum: 743780 9c1e0839cf5a603d5b6eacd8644165fe http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_arm.deb Size/MD5 checksum: 6604906 b2001cc89feafed549dac4d3fe74bb8d http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_arm.deb Size/MD5 checksum: 104600 00b7481a711d88bcdb2702562fceace1 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_arm.deb Size/MD5 checksum: 186592 5deadb59a4dce5b7d1d1e9f97b065a73 http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_arm.deb Size/MD5 checksum: 651780 bcd3e9e1b313c746ac213766144b282b http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_arm.deb Size/MD5 checksum: 655412 7c8be1eb3075a58b1a936377632150a3 http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_arm.deb Size/MD5 checksum: 155638 9acc32815c0ab56b96dc1b61e58bf7a0 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_arm.deb Size/MD5 checksum: 124854 46f6c31a873407f537c06d7eaeb83e92 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_arm.deb Size/MD5 checksum: 127954 306c61a6dd1472eef43721ead361ddb3 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_arm.deb Size/MD5 checksum: 37262 19b68d71fa5c9e60baaa81368eab1a6c Intel IA-32 architecture: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_i386.deb Size/MD5 checksum: 743050 9c445807ee91464fdc93b9455a640ce1 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_i386.deb Size/MD5 checksum: 6633628 c64514c4b153f05cb5f31cbac78df1d3 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_i386.deb Size/MD5 checksum: 106140 986d6c0a6ac507cf0f7d115f1cd27d74 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_i386.deb Size/MD5 checksum: 183070 383bd299b4a8f5dea97de0008da67e15 http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_i386.deb Size/MD5 checksum: 625208 fa4200ad94f867dcff74045479a5fb01 http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_i386.deb Size/MD5 checksum: 629530 83fbaf7ef69488eec164bd3c2eed2dab http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_i386.deb Size/MD5 checksum: 154996 57c079a635c53cf6d7766fd9ef87b196 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_i386.deb Size/MD5 checksum: 123514 0206fdd80e02e61bf43df9fb943b003e http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_i386.deb Size/MD5 checksum: 126598 1524775781195327f7f6910b96cf0f1e http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_i386.deb Size/MD5 checksum: 37272 c32ebb3072530d3fb7c5e3c9bbd2da66 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_ia64.deb Size/MD5 checksum: 767846 929b0bbde81dc77c12e711471d369bc1 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_ia64.deb Size/MD5 checksum: 8858604 01b16b6657b890057ed429d4b0f4f4c9 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_ia64.deb Size/MD5 checksum: 153754 fe44def3095afc6ca3f8111f9779e3e7 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_ia64.deb Size/MD5 checksum: 257172 9d5797385e4d93f3c7c421967b6da854 http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_ia64.deb Size/MD5 checksum: 1045474 93d585bb02e2c8ea290981917e94cb1a http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_ia64.deb Size/MD5 checksum: 1050908 176bedda9448f6fd915574810a972f74 http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_ia64.deb Size/MD5 checksum: 199530 85f0d5fb9782f26b440747b8af0a4057 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_ia64.deb Size/MD5 checksum: 185576 dcd4d23c6764945fdc02eac951bd94ca http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_ia64.deb Size/MD5 checksum: 191076 d01c039b281958f56635ad42d546c721 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_ia64.deb Size/MD5 checksum: 37262 813759b175ae3073248271af22358aed HP Precision architecture: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_hppa.deb Size/MD5 checksum: 749834 5533364457c838022e779e8491796e13 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_hppa.deb Size/MD5 checksum: 7343994 180d8354d5b85a840cb121746b1ed6f2 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_hppa.deb Size/MD5 checksum: 117472 41daadd0675a083e5aa1462810ceea66 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_hppa.deb Size/MD5 checksum: 217966 f7f7323b81cc2e508a85874e3a267f15 http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_hppa.deb Size/MD5 checksum: 1111642 50a400debfea7308d16d957b5399978e http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_hppa.deb Size/MD5 checksum: 1115416 8702cbc3c6d6491bcfd88676d8c8547a http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_hppa.deb Size/MD5 checksum: 207590 3f8db60bfd75043b5eb5b3ca8468ba56 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_hppa.deb Size/MD5 checksum: 172030 3a8d92c8bc6813526217c9d035c57996 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_hppa.deb Size/MD5 checksum: 176130 54891d1d923e2399e8bfbb324c8e1414 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_hppa.deb Size/MD5 checksum: 37264 c1c102ef9c44646973319221c13144a4 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_m68k.deb Size/MD5 checksum: 740154 34334b1b1cfd0af3fdbc7a0af0e7d81a http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_m68k.deb Size/MD5 checksum: 6484358 dd8701833bbc5ee7276a3a7f01c5c6d7 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_m68k.deb Size/MD5 checksum: 103662 1c8614bd285f81b9589788dc5593e828 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_m68k.deb Size/MD5 checksum: 178582 76f1e09baa5b94fdd869360f2f599a8f http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_m68k.deb Size/MD5 checksum: 628806 6f076ef140375bebc2c0f9c827313152 http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_m68k.deb Size/MD5 checksum: 633256 1c7073acd9b922a58770b5dc07457391 http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_m68k.deb Size/MD5 checksum: 151148 06a1fb067ddf1e90b69e40c0e6bb84f0 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_m68k.deb Size/MD5 checksum: 120810 554f803f8e7fb226c7b481b8b813b062 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_m68k.deb Size/MD5 checksum: 123728 e13fc1738a349620749fda0291039012 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_m68k.deb Size/MD5 checksum: 37270 5441efdfb2ac25adcb640d9661a25ae5 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_mips.deb Size/MD5 checksum: 740002 95603d551ec28eb4b5568bd946168870 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_mips.deb Size/MD5 checksum: 6283956 030e3b82ffa3780eee88fd332278c44f http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_mips.deb Size/MD5 checksum: 106946 a6827cc73cc17c178d718fcd341aae32 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_mips.deb Size/MD5 checksum: 161090 6f892c177e599484506a790c49de5ddd http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_mips.deb Size/MD5 checksum: 620950 4281404d5f49d56bc62fae2a75eb6bf6 http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_mips.deb Size/MD5 checksum: 625202 15cda3e839440a8541639e6ccfcbc970 http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_mips.deb Size/MD5 checksum: 175902 2d452895d537beb473263519fb19142f http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_mips.deb Size/MD5 checksum: 124324 384fa9eb4c7bae2a35996fc7160d63e4 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_mips.deb Size/MD5 checksum: 127348 20d7e1fa06224e04dbd28e3f776cdd7a http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_mips.deb Size/MD5 checksum: 37272 97460f9d8761ce1c3ec4a364e8161463 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_mipsel.deb Size/MD5 checksum: 739328 3252fbb0235a5312bb7a05b5d957904e http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_mipsel.deb Size/MD5 checksum: 6190250 9f3ed8b49200705ea4aa0a1b6b2819e9 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_mipsel.deb Size/MD5 checksum: 105914 550af1757d0c1568de0e50f10be08753 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_mipsel.deb Size/MD5 checksum: 159316 8c07726937b3b67ab527c7812b478349 http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_mipsel.deb Size/MD5 checksum: 613722 447caf99bc36251b550b6ac5e7f951be http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_mipsel.deb Size/MD5 checksum: 617374 4171afdd4c3d6f2208eb6b6ab4d30a6a http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_mipsel.deb Size/MD5 checksum: 175136 72d6de577aa3f9d78496aee0581f7cd5 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_mipsel.deb Size/MD5 checksum: 123348 d8e9c85fdae90e9c12d3e923a9f950f1 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_mipsel.deb Size/MD5 checksum: 126316 724600f85e61d361aa1911d3c87dda4e http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_mipsel.deb Size/MD5 checksum: 37268 7fc64112ff202468633e518e70c1aae9 PowerPC architecture: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_powerpc.deb Size/MD5 checksum: 740986 41cea661cd4070e8d43dece1170012e3 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_powerpc.deb Size/MD5 checksum: 6742504 2f4aced08b35a414a519ff2aa91b3369 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_powerpc.deb Size/MD5 checksum: 106056 c4a8375d0de793dbbe5b41b6caac5775 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_powerpc.deb Size/MD5 checksum: 182706 0ac8e1e9be7c1a854e8657860da70362 http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_powerpc.deb Size/MD5 checksum: 691206 4ce83759c74d334b0d2632e02c3d22d5 http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_powerpc.deb Size/MD5 checksum: 694750 cb53c58a97b97050cc913ea34bbeba88 http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_powerpc.deb Size/MD5 checksum: 153906 58353224e77af68451de988da027601c http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_powerpc.deb Size/MD5 checksum: 127652 a8583bb02d402d7ee84e19fc5a296ae1 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_powerpc.deb Size/MD5 checksum: 130570 8ff764183bc10393c519d32010a2740a http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_powerpc.deb Size/MD5 checksum: 37270 8bf7e12f339a6a0d5edcecb77cc62387 IBM S/390 architecture: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_s390.deb Size/MD5 checksum: 742460 5dadec865a235d3c3b5e7c523e7a086c http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_s390.deb Size/MD5 checksum: 6740810 a630cdced6335ec84e1ae7beec2a2dfe http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_s390.deb Size/MD5 checksum: 110572 4005956b9bbeef2a9e48af41dc067048 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_s390.deb Size/MD5 checksum: 177074 cb2bfd52bddeadfd1f6fbeb07847c34f http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_s390.deb Size/MD5 checksum: 642356 5ca40da62dc632ccf15275e656bcf524 http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_s390.deb Size/MD5 checksum: 647464 1e4c0afa42102137bf11784182c69e90 http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_s390.deb Size/MD5 checksum: 151514 211ded8862398d80034a21b8c617ac2f http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_s390.deb Size/MD5 checksum: 130008 e282906341eff69eb564c0985c2dbc5e http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_s390.deb Size/MD5 checksum: 133444 ee2c9794ccb325cb19510b49fc9305c7 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_s390.deb Size/MD5 checksum: 37268 bcb46494bc7476bb77c477758c36d529 Sun Sparc architecture: http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_sparc.deb Size/MD5 checksum: 741822 e4e2ebb01ace0e9656190a58c55cc3f1 http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_sparc.deb Size/MD5 checksum: 6579034 b476ac0725a3be1382763eff7473321f http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_sparc.deb Size/MD5 checksum: 117862 fe309530038fc010ef5cfb5652a5bafd http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_sparc.deb Size/MD5 checksum: 184300 eca4eae95ef96ef4fcd5cb019f95a65d http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_sparc.deb Size/MD5 checksum: 665080 56f13b02e4e6402cde72ef78cf8bc6ed http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_sparc.deb Size/MD5 checksum: 668940 415d841382a2276232afda5c11cdc7db http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_sparc.deb Size/MD5 checksum: 151884 196dd2c39fb7ab3f338b9116d957ba4f http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_sparc.deb Size/MD5 checksum: 128768 e9b7c833dfd3ac050f427187934a2ab4 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_sparc.deb Size/MD5 checksum: 131488 40d5ee36215ce9dd69718948bd163428 http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_sparc.deb Size/MD5 checksum: 37266 e71969fefab5a015e5d652f3680baef5 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@...ts.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFAzag7W5ql+IAeqTIRAtQ3AKCWeRFmZxve1ekiGmkgxZfilVOqHACeMBEV RxmU60zhhiS+/5lco5kfEOg= =4+nj -----END PGP SIGNATURE-----