LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: kdelibs arbitrary program execution vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
Debian There is a vulnerability in the support for various network protocols via the KIO The implementation of the rlogin and protocol allows a carefully crafted URL in an HTML page, HTML email or other KIO-enabled application to execute arbitrary commands on the system using the victim's account on the vulnerable machine.

--------------------------------------------------------------------------
Debian Security Advisory DSA 204-1                     security@debian.org 
http://www.debian.org/security/                             Martin Schulze
December 5th, 2002                       http://www.debian.org/security/faq
--------------------------------------------------------------------------

Package        : kdelibs
Vulnerability  : arbitrary program execution
Problem-Type   : remote
Debian-specific: no
CVE Id         : CAN-2002-1281 CAN-2002-1282

The KDE team has discovered a vulnerability in the support for various
network protocols via the KIO The implementation of the rlogin and
protocol allows a carefully crafted URL in an HTML page, HTML email or
other KIO-enabled application to execute arbitrary commands on the
system using the victim's account on the vulnerable machine.

This problem has been fixed by disabling rlogin and telnet in version
2.2.2-13.woody.5 for the current stable distribution (woody) and in
version 2.2.2-14.1 for the unstable distribution (sid).  The old
stable distribution (potato) is not affected since it doesn't contain
KDE.

This problem has been fixed by disabling rlogin and telnet in version
2.2.2-13.woody.5 for the current stable distribution (woody).  The old
stable distribution (potato) is not affected since it doesn't contain
KDE.  A correction for the package in the unstable distribution (sid)
is not yet available.

We recommend that you upgrade your kdelibs3 package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
--------------------------------

  Source archives:

     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.5.dsc
      Size/MD5 checksum:     1353 a1ec9070e7c6001622ababe1e089175e
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.5.diff.gz
      Size/MD5 checksum:    38995 7b63146f3756571ffc7907d8b132e9ca
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2.orig.tar.gz
      Size/MD5 checksum:  6396699 7a9277a2e727821338f751855c2ce5d3

  Architecture independent components:

     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-doc_2.2.2-13.woody.5_all.deb
      Size/MD5 checksum:  2567164 7ed60fb2a8aab2fadaea284b55af4cf2

  Alpha architecture:

     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:   756862 d3e4c4f454a07dc6b67f4381647ada65
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:  7532352 5c527c94140518e8104488bd44dcce0b
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:   137728 ec53f88c8d5d30f8ed2fee79a13600f3
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:   201564 26f95b365102bf651d8aab5c01cc31e8
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:  1019242 80fffa496319f117c6c146e74db751ea
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:  1026754 954df79f21bb017ed37b5d7e750011a8
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:   197818 a8938d049986d826a55e233e065d5c97
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:   173658 b7b66df52c21b088f6c73072e09876ed
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:   176776 6d3df2f1c1b5b95b14b265cb1720f687
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_alpha.deb
      Size/MD5 checksum:    36824 fe05cccfe6f741cae8661c16ad602a39
  ARM architecture:

     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   743060 642cd5da473ad4c65a3026a7ab8dd6c2
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:  6588608 e3c0d0dce80d28f1353b94f89aed3e2f
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   103710 c2157b3663ab88253799dcd42ada2489
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   186158 146da175143651894e0a6a518515a071
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   649990 0a2579c8ca186404144b06aa5b1ec25f
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   653616 bafe8a3dce52bd60aada69c640328410
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   155068 aaa5d66938fc30ea0fc7e91aadbf300f
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   123938 f95f0e5b6dc4942c1c36e3c854b22b7e
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:   126866 30357103dcbedeb23b5a7919cadb6ea5
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_arm.deb
      Size/MD5 checksum:    36830 f637b3a84c59fb068e0968a95bbace2a

  Intel IA-32 architecture:

     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   742370 856ea8ef257aa0c5b52170ea06cd9172
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:  6618286 71423d876ab1240eb77a74ef5e892fa3
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   105142 e6141b8157a43cbe29d428c8c3ec7826
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   182496 c13b5948467ea42ca231ac1674d82369
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   623234 f61ebef22eb9585b258edf1dc308b09e
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   628078 461fd3bb1753d3b0910dfe2489e13d6b
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   154370 aa037a603985e0599e8fee6f4fb6b99f
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   122612 ed5b6d356d43c3baa9fc7cf2d1a38256
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:   125674 20027337f752ad92d1b11839fb4bac15
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_i386.deb
      Size/MD5 checksum:    36820 a8ff4c62fdd55a9402ffd380d1c7e0fd

  Intel IA-64 architecture:

     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:   767052 f75bf1deb9cfdcfd0d4748fa4f20fe9b
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:  8840908 9267b2f51a147e9da2cba01ac670306d
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:   152722 6973e65c0ab99349dbc22689a3945a1f
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:   256600 760018deea6bc388aa2827cbb6f30123
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:  1043688 e5797dfa91eed97c6541e72ddf6c9e22
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:  1047876 3b8eff39fe8b451aa93142c9119ff18b
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:   199002 8f7e1ba6237a356f2c6b8f89d2478f0b
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:   184484 34ea587f7f6b65f8ef7965abcaf883ac
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:   189636 add57bdfb33cb116eda79ee635dbd480
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_ia64.deb
      Size/MD5 checksum:    36824 b847467c3b290597424cd10b0b7d7976

  HP Precision architecture:
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:   749222 e5e12778c69dda32cb67b813c42be97e
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:  7343384 9299c3753c990c452d6631d4dd60fcc5
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:   116592 d3726081a88dce52fd5aa676b0a9ac01
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:   217616 9549505ad4d7e3dffa317c4b9b6cc426
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:  1108956 5cbc942a5d0d436827310235b1000362
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:  1113992 fad426fb1cf9e01613b087f97c9615e8
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:   207056 c955a8b89a46649d4e78b5e83f1cb9c2
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:   170816 6ed76d7dc1f28fbe312d2c6ad6a0aabe
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:   174798 7ec367c97b14f66ef5f07bdaea2d28b7
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_hppa.deb
      Size/MD5 checksum:    36824 f4209e5fcc48b5b80474ebdc64f25fa9

  Motorola 680x0 architecture:

     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   739438 46981b23e029b2c6c25928c7f9c957d4
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:  6483766 ae36b5cb16f2dc1b9bb634f772b8b314
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   102824 50b2e85605a9b5aaf430d3a6d10d839f
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   178112 7f733bc0e562c221da603d7872c8386e
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   627000 9f50ab78b87eb746cede05e84f3faa25
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   631830 334e63417b32148aad5391b3409210c9
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   150716 78cd8c398896abac25752b571bbb8512
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   120018 b451bbcbff8eaa6e7237083495dff3f9
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:   122880 a3f000caf85b24dc539592f6f735f78a
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_m68k.deb
      Size/MD5 checksum:    36832 570ee43f827af3a06f4318d0cf8677ef

  Big endian MIPS architecture:

     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   739358 c1e26fa96fa64cb79b05617984f41132
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:  6282632 0898e2f917ca0125187ff70946bbaa9e
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   106066 afe5eb8897a20e127c08236929c4573b
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   160738 804db56f08820871423a626c7ae6c29b
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   619354 6059b8f383a76fce91332c4e14584702
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   623362 2fe6f722acda87d3f8ae90d8db90f6b0
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   175460 f037c9fbe2384fb20b2e09ca8ebddea2
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   123520 cd56731047f94cc909dd48b22ab5c7a5
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:   126568 4fd78d84bae710146dbebd7ec7ff4fb7
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_mips.deb
      Size/MD5 checksum:    36826 4fb2382a61989ea53a1fe585999d450d

  Little endian MIPS architecture:

     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   738574 ba185f4331b844f087a8019644a4903a
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:  6199152 2ee2cccc2a8b7b38268b670c354f783a
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   104184 2325939de91f789e763a8616498037a1
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   158756 e8d5f632c0de89b4af47b32c8cb903fe
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   611590 a02d2c34d25f95b46684a576870be65d
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   615408 9f145191e32e7edfdc7f4b10b5b45652
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   174636 ea24c0e312450f9297336cf5e5cb3e27
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   122294 610c48319971882ea7f0a30fe859fa36
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:   125318 5543a0658c5815f7f642a412c069e12f
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_mipsel.deb
      Size/MD5 checksum:    36828 662451c6985f6a41325cfc369e2f6825
  PowerPC architecture:

     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   740278 f0d3300e8631bb46024a7d96544b83f2
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:  6726214 7da69f8cff3d39d3fdc48278a675de7e
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   105182 0740d3058ca7c23dbe087ca78339bd81
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   182178 874c0ac930c20e9f36412b1c46635984
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   689280 b44f92eff69375efbf52b3409cb9a6c7
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   691890 2d3b196de92fdc9626d797483eee9a7b
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   153212 13af4c0b04167dd2fcf319d53bc27f99
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   126744 53f1efc823e175ac9aa180fd0744b0b1
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:   129722 fe5817e0103e5072e0943cd2678f7a05
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_powerpc.deb
      Size/MD5 checksum:    36828 5f1d44bafd12d1b700661323980eaddd

  IBM S/390 architecture:

     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   740652 0c6b1694824a0301003416b773aed786
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:  6663840 fd2f0c51dbcf6eb1887da9b27e8f9766
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   107604 c9e2d1f6c7f12984b6b3c98520318392
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   175006 78da302852c4ab4cb5feb456404bc449
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   630840 9ed83d7b7af82ce5071eb7519d8b620d
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   635574 0921608dcbafb817f1b320e81366d3b2
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   151038 c903c4c979e571f2f6c960276c242c2f
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   127150 9164e2c1149eb3444b32c9d9cbc98872
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:   130634 6e5e321437a831fa512a73d0e34e1d58
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_s390.deb
      Size/MD5 checksum:    36820 297891ce316721790777e072baaeb164


  Sun Sparc architecture:

     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   741148 47e7506bcadf5b2b40dab72f090e713a
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:  6579014 ebe1314e108c8bd8fd53007c21ab5ad7
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   116882 04423ecaa1a603632c7e04eb56f0e1a7
     http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   183938 0233342ad996dd1e3a8729620a0e5e2c
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   663014 1860e47b68a27e0de59e56f99e428ab7
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   667036 05b91c60935ec656d1d22dc50f7f3100
     http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   151406 9ca359ca3a7a059695de4bbe7d894cd7
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   127244 459377208beca073415844e2a545e8e8
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:   130322 baf7d657ef2ea56e54a9b33cb548cbb3
     http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.5_sparc.deb
      Size/MD5 checksum:    36820 c3fbedd62e204588446f10c12f281aa7


  These files will probably be moved into the stable distribution on
  its next revision.

Survey on the use of Debian GNU/Linux 2.2 alias potato: 
http://lists.debian.org/debian-devel-announce-0211/msg00001.html

---------------------------------------------------------------------------------
For apt-get: deb  http://security.debian.org/ stable/updates main
For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and  http://packages.debian.org/


 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.