--- Begin Message ---
- From: Matt Zimmerman <mdz@debian.org>
- Subject: [SECURITY] [DSA-361-1] New kdelibs packages fix several vulnerabilities
- Date: Fri, 1 Aug 2003 18:46:14 -0400
- Content-disposition: inline
- List-archive: <http://lists.debian.org/debian-security-announce/>
- List-help: <mailto:debian-security-announce-request@lists.debian.org?subject=help>
- List-id: <debian-security-announce.lists.debian.org>
- List-post: <mailto:debian-security-announce@lists.debian.org>
- List-subscribe: <mailto:debian-security-announce-request@lists.debian.org?subject=subscribe>
- List-unsubscribe: <mailto:debian-security-announce-request@lists.debian.org?subject=unsubscribe>
- Old-return-path: <mdz@xxxxxxxxxxx>
- Priority: urgent
- Resent-date: Fri, 1 Aug 2003 17:46:20 -0500 (CDT)
- Resent-from: debian-security-announce@lists.debian.org
- Resent-message-id: <ejk1BB.A.a6H.72uK_@murphy>
- Resent-sender: debian-security-announce-request@lists.debian.org
- X-bogosity: No, tests=bogofilter, spamicity=0.000000, version=0.13.7.2
- X-debian: PGP check passed for security officers
- X-loop: debian-security-announce@lists.debian.org
- X-mailing-list: <debian-security-announce@lists.debian.org>
- X-original-to: kmuto@xxxxxxxxxxxxxxx
- X-spam-checker-version: SpamAssassin 2.55 (1.174.2.19-2003-05-19-exp)
- X-spam-level:
- X-spam-status: No, hits=-110.3 required=10.0 tests=BAYES_00,PGP_SIGNATURE,USER_AGENT_MUTT,USER_IN_WHITELIST, X_LOOP,X_MAILING_LIST autolearn=ham version=2.55
- X-virus-scanned: by amavisd-new-20030616-p3 (Debian) at topstudio.co.jp
- Message-id: <20030801224614.GD24128@xxxxxxxxx>
- User-agent: Mutt/1.5.4i
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 361-1 security@debian.org
http://www.debian.org/security/ Matt Zimmerman
August 1st, 2003 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : kdelibs
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE Ids : CAN-2003-0459, CAN-2003-0370
Two vulnerabilities were discovered in kdelibs:
- - CAN-2003-0459: KDE Konqueror for KDE 3.1.2 and earlier does not
remove authentication credentials from URLs of the
"user:password@host" form in the HTTP-Referer header, which could
allow remote web sites to steal the credentials for pages that link
to the sites.
- - CAN-2003-0370: Konqueror Embedded and KDE 2.2.2 and earlier does not
validate the Common Name (CN) field for X.509 Certificates, which
could allow remote attackers to spoof certificates via a
man-in-the-middle attack.
These vulnerabilities are described in the following security
advisories from KDE:
http://www.kde.org/info/security/advisory-20030729-1.txt
http://www.kde.org/info/security/advisory-20030602-1.txt
For the current stable distribution (woody) these problems have been
fixed in version 2.2.2-13.woody.8.
For the unstable distribution (sid) these problems have been fixed in
version 4:3.1.3-1.
We recommend that you update your kdelibs package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.8.dsc
Size/MD5 checksum: 1353 5c815a67ccb9603faa9a8eb966402221
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.8.diff.gz
Size/MD5 checksum: 56799 f193bbbbe086c4d721b1da897e245c5f
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2.orig.tar.gz
Size/MD5 checksum: 6396699 7a9277a2e727821338f751855c2ce5d3
Architecture independent components:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-doc_2.2.2-13.woody.8_all.deb
Size/MD5 checksum: 2564214 b05746e361304cc132ba11711b55f7a3
Alpha architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.8_alpha.deb
Size/MD5 checksum: 757264 fa6f0c3eb1c83241d85c1d893384a195
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.8_alpha.deb
Size/MD5 checksum: 7532294 15954f4cb9b69375d3cce2568712711a
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.8_alpha.deb
Size/MD5 checksum: 137266 3d40312c8cb68a694e9099943fcbe07a
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.8_alpha.deb
Size/MD5 checksum: 201840 f70cdcb31526bf907e4d1473be008b2a
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.8_alpha.deb
Size/MD5 checksum: 1022220 92a0bd302d8a032deea14f0a0a098ac1
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.8_alpha.deb
Size/MD5 checksum: 1029292 f323f737e7f004901968f3c55fcbe4f0
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.8_alpha.deb
Size/MD5 checksum: 198074 c93cd4e5e1d055cbc5ba21e6c0492991
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.8_alpha.deb
Size/MD5 checksum: 174586 a59200be90a136177d7ca2d2e95e755a
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.8_alpha.deb
Size/MD5 checksum: 177924 79f4eefc4d91fc4486cef938cc53c4da
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.8_alpha.deb
Size/MD5 checksum: 37100 6666a0f271a4b8419be5f0a3253c7d76
ARM architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.8_arm.deb
Size/MD5 checksum: 743528 80af5e2c904de9884538dd501324fd68
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.8_arm.deb
Size/MD5 checksum: 6589168 1a0c58d52d0f2ce47ccc949515ea8d11
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.8_arm.deb
Size/MD5 checksum: 104432 c0792835b59698a172f02d169e8f35ed
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.8_arm.deb
Size/MD5 checksum: 186426 0b4adc69f78802ae4785324a389af2ed
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.8_arm.deb
Size/MD5 checksum: 651612 263bd14c2e2efbcb046599ead20ccda7
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.8_arm.deb
Size/MD5 checksum: 655244 a218efa916ef08c4761ee37717ac28c4
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.8_arm.deb
Size/MD5 checksum: 155386 8b7213a904bffe4b586e3ef1a23272b3
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.8_arm.deb
Size/MD5 checksum: 124670 94011575cb718615027bd874f4d19782
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.8_arm.deb
Size/MD5 checksum: 127760 2c2b46294b71d0e58938f5c4dc677894
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.8_arm.deb
Size/MD5 checksum: 37106 53018863a02bbf8527219b57e64b8cf9
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.8_i386.deb
Size/MD5 checksum: 742862 d694169bd78c22556e7826e6743671ab
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.8_i386.deb
Size/MD5 checksum: 6618286 93a23c4e4b60c2d22751a1d4e5e3bd44
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.8_i386.deb
Size/MD5 checksum: 105992 93dbd645f4a1df07aa6dd59d15c78c06
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.8_i386.deb
Size/MD5 checksum: 182852 a40d3071a7ac0dda38f8cb6c7c16089d
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.8_i386.deb
Size/MD5 checksum: 625038 2eb65cf5e415b1cb4575dbd280913abf
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.8_i386.deb
Size/MD5 checksum: 629376 bd686dffac6f128bf148073dd7cc5b22
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.8_i386.deb
Size/MD5 checksum: 154760 3e1e8471787a474f6f28a2ac6f5650bc
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.8_i386.deb
Size/MD5 checksum: 123322 43c58d4502adbe3acbcde52bfb759e8e
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.8_i386.deb
Size/MD5 checksum: 126424 062e28ea18e9aa2a97175f39096862cb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.8_i386.deb
Size/MD5 checksum: 37102 bda10467f1b18c7484e4ac1aae586cd0
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.8_ia64.deb
Size/MD5 checksum: 767558 3ca9c93a1b628aba1c48f9512efb0450
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.8_ia64.deb
Size/MD5 checksum: 8841368 b5fff89ff6261d43781c8766aa5d7598
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.8_ia64.deb
Size/MD5 checksum: 153600 51e682a99dcdd400857f5837168ee701
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.8_ia64.deb
Size/MD5 checksum: 256878 bf044e843b5a7dd4739ceb11828bcda9
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.8_ia64.deb
Size/MD5 checksum: 1045290 70bc69ea7ddd37b6971a83099e87cd15
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.8_ia64.deb
Size/MD5 checksum: 1050638 a1f471af126b41976f951680ee76ffb8
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.8_ia64.deb
Size/MD5 checksum: 199370 857ba011cd3a08d9124040da8ec6da14
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.8_ia64.deb
Size/MD5 checksum: 185444 e5220a9bb8ad3798c31a5990a7857b78
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.8_ia64.deb
Size/MD5 checksum: 190906 51eb58ce68471eb4c69a31fecda3c4d8
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.8_ia64.deb
Size/MD5 checksum: 37096 541900e17a8c8029f45fca6696ddb028
HP Precision architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.8_hppa.deb
Size/MD5 checksum: 749598 6851da3fa2542f371f2f0e75da214aa2
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.8_hppa.deb
Size/MD5 checksum: 7343564 b0183421a4fd5ac77d0dde735e86ba6c
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.8_hppa.deb
Size/MD5 checksum: 117306 67ba5d8cea098f5e41040fd0e72b5b02
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.8_hppa.deb
Size/MD5 checksum: 217796 837e91368600cc315d838b6395ea33c1
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.8_hppa.deb
Size/MD5 checksum: 1111424 36e98fa4aae1dcbc922f19e64f866053
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.8_hppa.deb
Size/MD5 checksum: 1115322 9b08a77ed1bad67d30069413d2e0fe30
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.8_hppa.deb
Size/MD5 checksum: 207342 0eab8c26829e938578d9034f4e1e2d46
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.8_hppa.deb
Size/MD5 checksum: 171824 4752bcacbe1907803d70790119fdcc60
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.8_hppa.deb
Size/MD5 checksum: 175920 6d390d3f27e2ee266ee1c35f5c6ed4d4
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.8_hppa.deb
Size/MD5 checksum: 37102 2b13f6b456878bfc80aec171bbd25c38
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.8_m68k.deb
Size/MD5 checksum: 739972 fd777221ccb53ea896b867fe0ef3caef
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.8_m68k.deb
Size/MD5 checksum: 6483984 48c7ce7a820cd2edd220e064e9c06eef
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.8_m68k.deb
Size/MD5 checksum: 103526 467cbbfa84eedec93c9ae401b0901706
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.8_m68k.deb
Size/MD5 checksum: 178436 b9f9f61bdaf437e0257fd17f004b5a65
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.8_m68k.deb
Size/MD5 checksum: 628656 ca0418d695f53e38621d3226370fe6fc
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.8_m68k.deb
Size/MD5 checksum: 633070 ef87665402f954b01ce11ed52702108e
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.8_m68k.deb
Size/MD5 checksum: 151010 cf006ab6d66435ff7ad023f3f14f8800
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.8_m68k.deb
Size/MD5 checksum: 120656 263d7d1be4bfe02281fb05ff9e692e70
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.8_m68k.deb
Size/MD5 checksum: 123560 f600fefbaa24632d3b3a9c9dbfd85ead
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.8_m68k.deb
Size/MD5 checksum: 37122 dbc0802db996370b8f614f8753e70889
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.8_mips.deb
Size/MD5 checksum: 739784 70629cb3e43480fe50b30eb5322c9612
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.8_mips.deb
Size/MD5 checksum: 6283246 4ee744d88e2a93cc62dfbfc651cfe09c
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.8_mips.deb
Size/MD5 checksum: 106762 b6addf954e89ccd8e29ecf345c64d8d2
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.8_mips.deb
Size/MD5 checksum: 160934 346c6e12177f10b4298f114e5b2b1bd3
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.8_mips.deb
Size/MD5 checksum: 620766 f7049ef8edb1eaca7438dc1cfeedffc3
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.8_mips.deb
Size/MD5 checksum: 624932 fe0372bc4f888e003d09caf7f10120a0
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.8_mips.deb
Size/MD5 checksum: 175704 ba9cf46f91e5a5d14e23d1c5094ddfdd
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.8_mips.deb
Size/MD5 checksum: 124128 813bcadaa332e9aa789d310721d7d8c3
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.8_mips.deb
Size/MD5 checksum: 127166 f49ad75dea8beebafc09ee9ed17cc6ff
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.8_mips.deb
Size/MD5 checksum: 37108 28faaa11ff5480773306c3f6178ea11a
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.8_mipsel.deb
Size/MD5 checksum: 739092 3d10cade157a3f4bde0602f64b0ff300
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.8_mipsel.deb
Size/MD5 checksum: 6189916 75c94121e9b8d379f1df07d203f29cd3
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.8_mipsel.deb
Size/MD5 checksum: 105754 b27b868206dbbd749313ddd037d125ef
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.8_mipsel.deb
Size/MD5 checksum: 159154 4dcc6e9fa704f7e9397f14ccc46ce2ad
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.8_mipsel.deb
Size/MD5 checksum: 613612 020928718d250e5c92d4be96a58596fd
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.8_mipsel.deb
Size/MD5 checksum: 617226 276481a73f6a22407a77154cec8136a9
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.8_mipsel.deb
Size/MD5 checksum: 174976 96f38b7225ae2b5024aa0011dc29ac5b
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.8_mipsel.deb
Size/MD5 checksum: 123152 4a6cf2f5fcea212b268812f17f680294
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.8_mipsel.deb
Size/MD5 checksum: 126146 738a00cff0c87ce1480040a1d90fe483
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.8_mipsel.deb
Size/MD5 checksum: 37104 7f54ce8415003d0b717c929b41e8bad8
PowerPC architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.8_powerpc.deb
Size/MD5 checksum: 740724 b5e1f0c81b55701ec79a9a74c9dc80c8
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.8_powerpc.deb
Size/MD5 checksum: 6726456 50193f6730f043cfd61165791a41e1b1
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.8_powerpc.deb
Size/MD5 checksum: 105866 7e721119d8c731ff17a0ece3fedf5838
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.8_powerpc.deb
Size/MD5 checksum: 182522 9dac0701f1f480965806fff1fa35c33f
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.8_powerpc.deb
Size/MD5 checksum: 691038 e8e31893f2385221b509e151bd01bcd2
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.8_powerpc.deb
Size/MD5 checksum: 694430 cb1a09d7d22fb1ecec69e7a69c57eaf2
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.8_powerpc.deb
Size/MD5 checksum: 153674 6817250ad139553026bd59854803ce6b
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.8_powerpc.deb
Size/MD5 checksum: 127468 97fd8d4981c703f3af03e55b3e76645a
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.8_powerpc.deb
Size/MD5 checksum: 130392 fc5c70dc535fb40e96df88d65d9b2e30
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.8_powerpc.deb
Size/MD5 checksum: 37102 11ea385aa94147a7ce7361e5bd16c926
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.8_s390.deb
Size/MD5 checksum: 742222 e43b2f96fab3f2eb8799c8fbdc8cad0b
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.8_s390.deb
Size/MD5 checksum: 6739634 08cfb20b521e6846e04bf9355c7b991a
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.8_s390.deb
Size/MD5 checksum: 110408 ca03d603ad2a470b3a894aeabeec73f0
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.8_s390.deb
Size/MD5 checksum: 176894 d674123f0e6efe0b670f1df90b9b9ec8
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.8_s390.deb
Size/MD5 checksum: 642158 6f35ad2827c5cf446332afbf7264c50c
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.8_s390.deb
Size/MD5 checksum: 647300 6644e9c73c6a88098c46c1b29bf4e256
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.8_s390.deb
Size/MD5 checksum: 151336 592491f74265d1615083dc4c4ed7fea4
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.8_s390.deb
Size/MD5 checksum: 129832 99e927cb9e8c491fe537703c948face8
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.8_s390.deb
Size/MD5 checksum: 133278 0461b7e0b431a64474761d14fab9b6c6
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.8_s390.deb
Size/MD5 checksum: 37102 1de42b75170ef39d77d9bfd2d2c93f16
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.8_sparc.deb
Size/MD5 checksum: 741602 9b61a934c926ac5ab90043657909dcec
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.8_sparc.deb
Size/MD5 checksum: 6579790 514509d90e66037d93549877676d99d4
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.8_sparc.deb
Size/MD5 checksum: 117708 222910767eec7164764adf2856a90bf4
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.8_sparc.deb
Size/MD5 checksum: 184168 4e8e05b489008521946733c36d04609d
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.8_sparc.deb
Size/MD5 checksum: 664932 97915d1d4130f1c44e46bc3efca40c35
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.8_sparc.deb
Size/MD5 checksum: 668836 365123943821fc1d37f45cfe8e2d30d2
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.8_sparc.deb
Size/MD5 checksum: 151726 fc9c49b87ddf7febf3a7d6590b6a6291
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.8_sparc.deb
Size/MD5 checksum: 128616 a79698355c109b2b57bcfb38f2198826
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.8_sparc.deb
Size/MD5 checksum: 131324 1af4d019b27ee38bb14d131a8cae6681
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.8_sparc.deb
Size/MD5 checksum: 37104 7d5b21e1c2b4299a915e1044eb93ef21
These files will probably be moved into the stable distribution on
its next revision.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQE/Ku1qArxCt0PiXR4RAiqxAKCofMwjHi8iSyjF0hr/vmGMSfqi5QCgrg0A
Sx3yrS+dvPH/8pOcNfhzgig=
=b7RA
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
--- End Message ---