[Full-disclosure] [USN-496-1] koffice vulnerability

2007-08-03 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-496-1August 03, 2007
koffice vulnerability
CVE-2007-3387
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  kword1:1.5.0-0ubuntu9.2

Ubuntu 6.10:
  kword1:1.5.2-0ubuntu2.2

Ubuntu 7.04:
  kword1:1.6.2-0ubuntu1.1

After a standard system upgrade you need to restart KWord to effect
the necessary changes.

Details follow:

Derek Noonburg discovered an integer overflow in the Xpdf function
StreamPredictor::StreamPredictor(). By importing a specially crafted
PDF file into KWord, this could be exploited to run arbitrary code
with the user's privileges.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.0-0ubuntu9.2.diff.gz
  Size/MD5:   300835 16c7582e14982568803321cea7a34f11

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.0-0ubuntu9.2.dsc
  Size/MD5: 1448 fdadcad8df27cd7b9fabdd6bf93c2243

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.0.orig.tar.gz
  Size/MD5: 41765094 096962d7a25ec9063510b9340f18f152

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio-data_1.5.0-0ubuntu9.2_all.deb
  Size/MD5:   681940 a41c0cf57dbb9e758fed02a7fd5f5f10

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-data_1.5.0-0ubuntu9.2_all.deb
  Size/MD5:   747852 4cb1bc23d7a67c0144d1dbe0943cf3f3

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-doc-html_1.5.0-0ubuntu9.2_all.deb
  Size/MD5:   464520 7cbc419080f709ec4d82f208b8ccb832

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-doc_1.5.0-0ubuntu9.2_all.deb
  Size/MD5: 88042092 e3e3f4a3f740d971bd6625d908fb972d

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.0-0ubuntu9.2_all.deb
  Size/MD5:24274 b09c7b32d679bf28f1fc15fbf9dbdfcf

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter-data_1.5.0-0ubuntu9.2_all.deb
  Size/MD5:  1893562 9ade0cb468aef115c13e84f6c1937a8d

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita-data_1.5.0-0ubuntu9.2_all.deb
  Size/MD5:  9816996 5b74ea5c2ebe28c7bafcb8e516d9ae56

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword-data_1.5.0-0ubuntu9.2_all.deb
  Size/MD5:  1590282 316855e7fac0273faf31af39bc0315b8

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5:  1053202 bbee94bb191ffbaac28ca90f3be56d6c

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5:  1305082 eae293a8a2d788021a24ba3205de73ba

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kexi_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5:  3097380 baad146bd7bb1537c508c5e0bf6bd8c2

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5:   419496 9a4920191a23268794d67dc7307c791d

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5:   609614 06a614654e282f4c94d9fed46adf0f1f

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dbg_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5: 52548050 a8d5edd29aa9e6d455cc2a6cdc97f7fc

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5:   360390 67c1c3923884b5c277cec42645edacd2

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5:  2565144 7650f9b98e7bff7116ec2199d3d97255

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5:   201256 813cc360b442cc3dcc9abe5d7787da80

http://security.ubuntu.com/ubuntu/pool/universe/k/koffice/kplato_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5:   919800 97ddb98f77504aa094086fcf68681432

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5:  1415034 1c1cb0c9fc2190c07b7501f67da49553

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5:  2914594 9fc42fec80237c0951c6dc899d5d5bf1

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.5.0-0ubuntu9.2_amd64.deb
  Size/MD5:  2461008 e395c28931e88395e8be151617ee11e4

http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.5.0-0ubuntu9.2_amd64.deb
  

[Full-disclosure] [USN-455-1] PHP vulnerabilities

2007-04-27 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-455-1 April 27, 2007
php5 vulnerabilities
CVE-2007-1375, CVE-2007-1376, CVE-2007-1380, CVE-2007-1484,
CVE-2007-1521, CVE-2007-1583, CVE-2007-1700, CVE-2007-1718,
CVE-2007-1824, CVE-2007-1887, CVE-2007-1888, CVE-2007-1900
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  libapache2-mod-php5  5.1.2-1ubuntu3.7
  php5-cgi 5.1.2-1ubuntu3.7
  php5-cli 5.1.2-1ubuntu3.7
  php5-sqlite  5.1.2-1ubuntu3.7

Ubuntu 6.10:
  libapache2-mod-php5  5.1.6-1ubuntu2.4
  php5-cgi 5.1.6-1ubuntu2.4
  php5-cli 5.1.6-1ubuntu2.4
  php5-sqlite  5.1.6-1ubuntu2.4

Ubuntu 7.04:
  libapache2-mod-php5  5.2.1-0ubuntu1.1
  php5-cgi 5.2.1-0ubuntu1.1
  php5-cli 5.2.1-0ubuntu1.1
  php5-sqlite  5.2.1-0ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Stefan Esser discovered multiple vulnerabilities in the Month of PHP
bugs.

The substr_compare() function did not sufficiently verify its length
argument. This might be exploited to read otherwise unaccessible
memory, which might lead to information disclosure. (CVE-2007-1375)

The shared memory (shmop) functions did not verify resource types,
thus they could be called with a wrong resource type that might
contain user supplied data. This could be exploited to read and write
arbitrary memory addresses of the PHP interpreter.  This issue does
not affect Ubuntu 7.04. (CVE-2007-1376)

The php_binary handler of the session extension was missing a boundary
check. When unserializing overly long variable names this could be
exploited to read up to 126 bytes of memory, which might lead to
information disclosure. (CVE-2007-1380)

The internal array_user_key_compare() function, as used for example by
the PHP function uksort(), incorrectly handled memory unreferencing of
its arguments. This could have been exploited to execute arbitrary
code with the privileges of the PHP interpreter, and thus
circumventing any disable_functions, open_basedir, or safe_mode
restrictions. (CVE-2007-1484)

The session_regenerate_id() function did not properly clean up the
former session identifier variable. This could be exploited to crash
the PHP interpreter, possibly also remotely. (CVE-2007-1521)

Under certain conditions the mb_parse_str() could cause the
register_globals configuration option to become permanently enabled.
This opened an attack vector for a large and common class of
vulnerabilities. (CVE-2007-1583)

The session extension did not set the correct reference count value
for the session variables. By unsetting _SESSION and HTTP_SESSION_VARS
(or tricking a PHP script into doing that) this could be exploited to
execute arbitrary code with the privileges of the PHP interpreter. This
issue does not affect Ubuntu 7.04.  (CVE-2007-1700)

The mail() function did not correctly escape control characters in
multiline email headers. This could be remotely exploited to inject
arbitrary email headers. (CVE-2007-1718)

The php_stream_filter_create() function had an off-by-one buffer
overflow in the handling of wildcards. This could be exploited to
remotely crash the PHP interpreter. This issue does not affect Ubuntu
7.04. (CVE-2007-1824)

When calling the  sqlite_udf_decode_binary() with special arguments, a
buffer overflow happened. Depending on the application this could be
locally or remotely exploited to execute arbitrary code with the
privileges of the PHP interpreter. (CVE-2007-1887 CVE-2007-1888)

The FILTER_VALIDATE_EMAIL filter extension used a wrong
regular expression that allowed injecting a newline character at the
end of the email string. This could be exploited to inject 
arbitrary email headers. This issue only affects Ubuntu 7.04.
(CVE-2007-1900)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.1.2-1ubuntu3.7.diff.gz
  Size/MD5:   117479 97145052f56b881e5bdcd933194a391d
http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.1.2-1ubuntu3.7.dsc
  Size/MD5: 1766 427fffd561dd912abb032c73db855677
http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.1.2.orig.tar.gz
  Size/MD5:  8064193 b5b6564e8c6a0d5bc1d2b4787480d792

  Architecture independent packages:



[Full-disclosure] [USN-454-1] PostgreSQL vulnerability

2007-04-27 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-454-1 April 26, 2007
postgresql-8.1, postgresql-8.2 vulnerability
CVE-2007-2138
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  postgresql-8.1   8.1.9-0ubuntu0.6.06

Ubuntu 6.10:
  postgresql-8.1   8.1.9-0ubuntu0.6.10

Ubuntu 7.04:
  postgresql-8.2   8.2.4-0ubuntu0.7.04

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

PostgreSQL did not handle the search_path configuration option in a
secure way for functions declared as SECURITY DEFINER. 

Previously, an attacker could override functions and operators used by
the security definer function to execute arbitrary SQL commands with
the privileges of the user who created the security definer function.
The updated version does not search the temporary table schema for
functions and operators any more.

Similarly, an attacker could put forged tables into the temporary
table schema to trick the security definer function into using
attacker defined data for processing. This was possible because the
temporary schema was always implicitly searched first before all other
entries in search_path. The updated version now supports explicit
placement of the temporary schema. Please see the HTML documentation
or the manual page for CREATE FUNCTION for details and an example
how to write security definer functions in a secure way.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.9-0ubuntu0.6.06.diff.gz
  Size/MD5:25680 c8dcb92c9d3e5059a235463f1e73d918

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.9-0ubuntu0.6.06.dsc
  Size/MD5: 1121 8be59c06b28d9c68161df198c3f70964

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.9.orig.tar.gz
  Size/MD5: 11422807 a77d87607ee8f264c7bc9581e9048bb2

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.9-0ubuntu0.6.06_all.deb
  Size/MD5:  1459666 bf5c81ac3954cbca6c1a966845e1eade

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:   158258 99703d2326077bd91a07c735fca4393f

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:   349862 aea8e61788ee4c824744be6927d57a66

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:   178980 f86abe6f9fb9c48f23d24e99d0398d74

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:   180374 3ff8b243c42ee96205075df99db336b6

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:   313812 76e05d5b34bed281fea1fff2bfb4f57f

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:   211962 aff8b24ae2b177df4654d2cfd5d44e38

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:  3234342 919d04b62e5994496530dcfdc72ae7af

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:   788204 903d63291b5ca11bd357ae671e14f79c

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:   619778 c5a061683a75292653ac9904b86f5a01

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:   174950 d9538ab098e6ac21ae42a7951e20d541

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:   169110 3374672bfb17259e75db1b240f521de4

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:   169198 5f573e64710d5e6514ee99e84391bd18

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.9-0ubuntu0.6.06_amd64.deb
  Size/MD5:   602154 89ac9e12d5e2ef0e85a4a64f725fe41f

  i386 architecture (x86 compatible Intel/AMD)



[Full-disclosure] [USN-453-2] rdesktop regression

2007-04-26 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-453-2 April 26, 2007
rdesktop regression
https://launchpad.net/bugs/104332
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  rdesktop 1.4.1-1.1ubuntu0.6.06

Ubuntu 6.10:
  rdesktop 1.4.1-1.1ubuntu0.6.10

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-453-1 provided an updated libx11 package to fix a security
vulnerability. This triggered an error in rdesktop so that it crashed
on startup. This update fixes the problem.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.06.diff.gz
  Size/MD5:11767 3b0afb1bdeee63391599a725fdcd4ded

http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.06.dsc
  Size/MD5:  648 30e95d4a2c8d71edf12ef992684a8dfe

http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1.orig.tar.gz
  Size/MD5:   218413 ce6b2369d633128ff00a2a8ae7c18ef8

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.06_amd64.deb
  Size/MD5:   111736 5d132e2fc201ff3fa5e8d45856b230bc

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.06_i386.deb
  Size/MD5:   100916 3a88d294358e5c6446c52d22a07b564c

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.06_powerpc.deb
  Size/MD5:   119442 878ccd8dfcf9eb10e9a1747fe4be8fdb

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.06_sparc.deb
  Size/MD5:   108146 759f8693ef44422dde20f7ea0f6996a4

Updated packages for Ubuntu 6.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.10.diff.gz
  Size/MD5:11766 816d50a1cd3069c9c482d27e04def3a1

http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.10.dsc
  Size/MD5:  648 97e92e04c71fabcc7e65d708a870660e

http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1.orig.tar.gz
  Size/MD5:   218413 ce6b2369d633128ff00a2a8ae7c18ef8

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.10_amd64.deb
  Size/MD5:   116906 7057e7d2f8ecdf54ede239298e6d8f89

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.10_i386.deb
  Size/MD5:   104828 eeb7a363602301690bd9faf7582a6fe8

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.10_powerpc.deb
  Size/MD5:   122984 87696d76d41f1cc76c77a1958d306e80

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.10_sparc.deb
  Size/MD5:   109380 c299593db906b4c4165d152f18da2bdf


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-416-2] nvidia-glx-config regression

2007-03-01 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-416-2 March 01, 2007
linux-restricted-modules-2.6.17 regression
https://launchpad.net/bugs/66908
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.10:
  nvidia-glx   2.6.17.7-11.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-416-1 fixed various vulnerabilities in the Linux kernel.
Unfortunately that update caused the 'nvidia-glx-config' script to not
work any more. The new version fixes the problem.

We apologize for the inconvenience.


Updated packages for Ubuntu 6.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17_2.6.17.7-11.2.diff.gz
  Size/MD5:89152 772068f013e18c8cd3bee371194fe2f5

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17_2.6.17.7-11.2.dsc
  Size/MD5: 2615 9da8b0a95647984a06ba93267b9e303b

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17_2.6.17.7.orig.tar.gz
  Size/MD5: 94289230 283efe66f46b478dea207dac92b7e4e2

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-common_2.6.17.7-11.2_all.deb
  Size/MD5:20236 6b55a402fa0930b7e8bb1c16aece8a30

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/avm-fritz-firmware-2.6.17-11_3.11+2.6.17.7-11.2_amd64.deb
  Size/MD5:   476830 0e741afd28ff59f6abdc931b67282dec

http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/avm-fritz-kernel-source_3.11+2.6.17.7-11.2_amd64.deb
  Size/MD5:  2130084 09090d30b6bcb16259d0344b5a852e1a

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/fglrx-control_8.28.8+2.6.17.7-11.2_amd64.deb
  Size/MD5:77616 34b12bc805e4c89b01feb00680ffc62e

http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/fglrx-kernel-source_8.28.8+2.6.17.7-11.2_amd64.deb
  Size/MD5:   547560 73ce80f54e6fdb6285601844b4ea5a0a

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17-11-generic_2.6.17.7-11.2_amd64.deb
  Size/MD5:  6652424 62054b3b0326325683edda4581d0a098

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nic-restricted-firmware-2.6.17-11-generic-di_2.6.17.7-11.2_amd64.udeb
  Size/MD5:   965680 83868530e04da7ea8d665fff5704273b

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nic-restricted-modules-2.6.17-11-generic-di_2.6.17.7-11.2_amd64.udeb
  Size/MD5:   319162 df364edff08fd7a853c9859813c0bd16

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nvidia-glx-dev_1.0.8776+2.6.17.7-11.2_amd64.deb
  Size/MD5:   168544 d39fdccbc31828b7e77323645c6c52c6

http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-glx-legacy-dev_1.0.7184+2.6.17.7-11.2_amd64.deb
  Size/MD5:   162460 3bdec676c86c1702905fc2fdf5067c8b

http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-glx-legacy_1.0.7184+2.6.17.7-11.2_amd64.deb
  Size/MD5:  6082324 342748fc5510ee9aec287c1c123ae527

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nvidia-glx_1.0.8776+2.6.17.7-11.2_amd64.deb
  Size/MD5:  7330700 95697ebe21eaac11ece6ae68e2ac280d

http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-kernel-source_1.0.8776+2.6.17.7-11.2_amd64.deb
  Size/MD5:  1755654 d206422ea23adf9594f9a116a1b098d1

http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-legacy-kernel-source_1.0.7184+2.6.17.7-11.2_amd64.deb
  Size/MD5:  1383588 fcf770d04fda771f5fb6329c20fe6c08

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/vmware-player-kernel-modules-2.6.17-11_2.6.17.7-11.2_amd64.deb
  Size/MD5:94200 d4eac639b80fe17067e299e7c02cb7dd

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/xorg-driver-fglrx-dev_7.1.0-8.28.8+2.6.17.7-11.2_amd64.deb
  Size/MD5:   133606 fdf47226d7ee7382f4d59d0f97284752


[Full-disclosure] [USN-428-1] Firefox vulnerabilities

2007-02-28 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-428-1  February 26, 2007
firefox vulnerabilities
CVE-2006-6077, CVE-2007-0008, CVE-2007-0009, CVE-2007-0775,
CVE-2007-0776, CVE-2007-0777, CVE-2007-0778, CVE-2007-0779,
CVE-2007-0780, CVE-2007-0800, CVE-2007-0981, CVE-2007-0995,
CVE-2007-0996, CVE-2007-1092
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  firefox  1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1

Ubuntu 6.06 LTS:
  firefox  1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1
  libnspr4 1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1
  libnss3  1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1

Ubuntu 6.10:
  firefox  2.0.0.2+0dfsg-0ubuntu0.6.10
  libnspr4 2.0.0.2+0dfsg-0ubuntu0.6.10
  libnss3  2.0.0.2+0dfsg-0ubuntu0.6.10

After a standard system upgrade you need to restart Firefox to effect
the necessary changes.

Details follow:

Several flaws have been found that could be used to perform Cross-site
scripting attacks. A malicious web site could exploit these to modify
the contents or steal confidential data (such as passwords) from other
opened web pages. (CVE-2006-6077, CVE-2007-0780, CVE-2007-0800,
CVE-2007-0981, CVE-2007-0995, CVE-2007-0996)

The SSLv2 protocol support in the NSS library did not sufficiently
check the validity of public keys presented with a SSL certificate. A
malicious SSL web site using SSLv2 could potentially exploit this to
execute arbitrary code with the user's privileges.  (CVE-2007-0008)

The SSLv2 protocol support in the NSS library did not sufficiently
verify the validity of client master keys presented in an SSL client
certificate. A remote attacker could exploit this to execute arbitrary
code in a server application that uses the NSS library.
(CVE-2007-0009)

Various flaws have been reported that could allow an attacker to
execute arbitrary code with user privileges by tricking the user into
opening a malicious web page. (CVE-2007-0775, CVE-2007-0776,
CVE-2007-0777, CVE-2007-1092)

Two web pages could collide in the disk cache with the result that
depending on order loaded the end of the longer document could be
appended to the shorter when the shorter one was reloaded from the
cache. It is possible a determined hacker could construct a targeted
attack to steal some sensitive data from a particular web page. The
potential victim would have to be already logged into the targeted
service (or be fooled into doing so) and then visit the malicious
site. (CVE-2007-0778)

David Eckel reported that browser UI elements--such as the host name
and security indicators--could be spoofed by using custom cursor
images and a specially crafted style sheet. (CVE-2007-0779)


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1.diff.gz
  Size/MD5:   176831 76744cf2123e13143408e37deb2311c0

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1.dsc
  Size/MD5: 1063 eac4c86acb16ad4cf85604e5cc9f441c

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10.orig.tar.gz
  Size/MD5: 44679183 d55d439c238064ddcedb8fabb6089ff2

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_all.deb
  Size/MD5:50314 d17e00b536378e1710c918f2b834e513

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_all.deb
  Size/MD5:51208 abdc905b5e3c31c05a427defdc9035bc

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb
  Size/MD5:  3167242 01f67e394a7b569df52fd02513712811

http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb
  Size/MD5:   217230 bc5d29d293abc4665c052c0fc76aef79

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb
  Size/MD5:83544 d7978eba50c0e82d4e3606240e38e3fa

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb
  Size/MD5: 10311286 4ea4f615c24ecceae90e7b432ddb5e4a

  i386 architecture (x86 compatible Intel/AMD)



[Full-disclosure] [USN-427-1] enigmail vulnerability

2007-02-23 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-427-1  February 23, 2007
enigmail vulnerability
CVE-2006-5877
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  mozilla-thunderbird-enigmail 2:0.94-0ubuntu0.5.10.1

Ubuntu 6.06 LTS:
  mozilla-thunderbird-enigmail 2:0.94-0ubuntu4.3

Ubuntu 6.10:
  mozilla-thunderbird-enigmail 2:0.94-0ubuntu5.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Mikhail Markin reported that enigmail incorrectly handled memory
allocations for certain large encrypted attachments. This caused
Thunderbird to crash and thus caused the entire message to be
inaccessible.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu0.5.10.1.diff.gz
  Size/MD5:21321 b0eeb33cd3ad124d5dcd85fa973e2b24

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu0.5.10.1.dsc
  Size/MD5:  789 83be65baac3f221d53d2110b0a281db4

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94.orig.tar.gz
  Size/MD5:  3126659 7e34cbe51f5a1faca2e26fa0edfd6a06

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu0.5.10.1_amd64.deb
  Size/MD5:   335130 b90450e4de41369479cf795de5a101aa

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu0.5.10.1_i386.deb
  Size/MD5:   323052 11bbca4c7075d5648bf8139b34fddb02

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu0.5.10.1_powerpc.deb
  Size/MD5:   326360 1aac040e085e45a526f694f43857716b

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu0.5.10.1_sparc.deb
  Size/MD5:   324980 65860eec2c6351b2003693a9853e819d

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu4.3.diff.gz
  Size/MD5:21266 08a7512c90738a1520b629a3c20f3c45

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu4.3.dsc
  Size/MD5:  779 50e740ba86d915bdc0d8d0de4b8a35c6

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94.orig.tar.gz
  Size/MD5:  3126659 7e34cbe51f5a1faca2e26fa0edfd6a06

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu4.3_amd64.deb
  Size/MD5:   335344 a6935d372bc7250ef4a095b4bd17c33e

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu4.3_i386.deb
  Size/MD5:   322976 2f6d9053595aca961da315dc6f7a163c

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu4.3_powerpc.deb
  Size/MD5:   326424 13194f6448975780085fb460f3eddee1

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu4.3_sparc.deb
  Size/MD5:   324770 fc10ecc608681c7ba72a1d55d4197d66

Updated packages for Ubuntu 6.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu5.1.diff.gz
  Size/MD5:21268 0bb2f26745f5ece5800d2598776187d4

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu5.1.dsc
  Size/MD5:  779 8d3b49530b67d0a92cb0209102a72f7d

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94.orig.tar.gz
  Size/MD5:  3126659 7e34cbe51f5a1faca2e26fa0edfd6a06

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu5.1_amd64.deb
  Size/MD5:   334880 7ac69a00d43457c1aa1e8b8d407c7a26

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu5.1_i386.deb
  Size/MD5:   324072 c916c764c6d6214a4ccc35894036c2e6

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu5.1_powerpc.deb
  Size/MD5:   

[Full-disclosure] [USN-424-1] PHP vulnerabilities

2007-02-21 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-424-1  February 21, 2007
php5 vulnerabilities
CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909,
CVE-2007-0910, CVE-2007-0988
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  libapache2-mod-php5  5.0.5-2ubuntu1.7
  php5-cgi 5.0.5-2ubuntu1.7
  php5-cli 5.0.5-2ubuntu1.7
  php5-common  5.0.5-2ubuntu1.7
  php5-odbc5.0.5-2ubuntu1.7

Ubuntu 6.06 LTS:
  libapache2-mod-php5  5.1.2-1ubuntu3.5
  php5-cgi 5.1.2-1ubuntu3.5
  php5-cli 5.1.2-1ubuntu3.5
  php5-common  5.1.2-1ubuntu3.5
  php5-odbc5.1.2-1ubuntu3.5

Ubuntu 6.10:
  libapache2-mod-php5  5.1.6-1ubuntu2.2
  php5-cgi 5.1.6-1ubuntu2.2
  php5-cli 5.1.6-1ubuntu2.2
  php5-common  5.1.6-1ubuntu2.2
  php5-odbc5.1.6-1ubuntu2.2

After a standard system upgrade you need to restart Apache or reboot
your computer to effect the necessary changes.

Details follow:

Multiple buffer overflows have been discovered in various PHP modules.
If a PHP application processes untrusted data with functions of the
session or zip module, or various string functions, a remote attacker
could exploit this to execute arbitrary code with the privileges of
the web server. (CVE-2007-0906)

The sapi_header_op() function had a buffer underflow that could be
exploited to crash the PHP interpreter. (CVE-2007-0907)

The wddx unserialization handler did not correctly check for some
buffer boundaries and had an uninitialized variable. By unserializing
untrusted data, this could be exploited to expose memory regions that
were not meant to be accessible. Depending on the PHP application this
could lead to disclosure of potentially sensitive information.
(CVE-2007-0908)

On 64 bit systems (the amd64 and sparc platforms), various print
functions and the odbc_result_all() were susceptible to a format
string vulnerability. A remote attacker could exploit this to execute
arbitrary code with the privileges of the web server. (CVE-2007-0909)

Under certain circumstances it was possible to overwrite superglobal
variables (like the HTTP GET/POST arrays) with crafted session data.
(CVE-2007-0910)

When unserializing untrusted data on 64-bit platforms the
zend_hash_init() function could be forced to enter an infinite loop,
consuming CPU resources, for a limited length of time, until the
script timeout alarm aborts the script. (CVE-2007-0988)


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.7.diff.gz
  Size/MD5:   116000 e86f9657167213b8990f391018b28e8e
http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.7.dsc
  Size/MD5: 1707 4eaf5e7ccc2304836f7c55a64857c145
http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5.orig.tar.gz
  Size/MD5:  6082082 ae36a2aa35cfaa58bdc5b9a525e6f451

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/php5/php-pear_5.0.5-2ubuntu1.7_all.deb
  Size/MD5:   173668 f6caf8c382ba778c934b7c3887915f61

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.7_all.deb
  Size/MD5: 1038 7c8598ce989a1c332b46e35612c91c75

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.0.5-2ubuntu1.7_amd64.deb
  Size/MD5:  2013456 c880acf90d178e1a9d98c057ed7249f6

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.0.5-2ubuntu1.7_amd64.deb
  Size/MD5:  3973284 d5e93a66ef95932b09def89eda235ee4

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.0.5-2ubuntu1.7_amd64.deb
  Size/MD5:  1997666 bf210464dcd8ed1741738eba04bcbc07

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.0.5-2ubuntu1.7_amd64.deb
  Size/MD5:   129448 cbee1361dde06ec76409ab4bbcd7aaa5

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.0.5-2ubuntu1.7_amd64.deb
  Size/MD5:24030 1aec1820973c2cf1dd07347d4d65c72c

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.0.5-2ubuntu1.7_amd64.deb
  Size/MD5:   218754 aa8e3985db053cfada200812f1261f57

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.0.5-2ubuntu1.7_amd64.deb
  

[Full-disclosure] [USN-417-3] PostgreSQL regression

2007-02-12 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-417-3  February 09, 2007
postgresql-8.1 regression
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  postgresql-8.1   8.1.8-0ubuntu6.06.1
  postgresql-client-8.18.1.8-0ubuntu6.06.1

Ubuntu 6.10:
  postgresql-8.1   8.1.8-0ubuntu6.10
  postgresql-client-8.18.1.8-0ubuntu6.10

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-417-2 fixed a severe regression in the PostgreSQL server that was
introduced in USN-417-1 and caused some valid queries to be aborted
with a type error. This update fixes a similar (but much less
prominent) error.

At the same time, PostgreSQL is updated to version 8.1.8, which fixes
a range of important bugs.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.8-0ubuntu6.06.1.diff.gz
  Size/MD5:25266 ada0de93d338e6fd238e90d9b2392e83

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.8-0ubuntu6.06.1.dsc
  Size/MD5: 1119 3ae022f39647a437f59bbb8bbeeda00b

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.8.orig.tar.gz
  Size/MD5: 11401827 6dc11fcd2c907f93d36f5fa3a1cefd19

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.8-0ubuntu6.06.1_all.deb
  Size/MD5:  1454258 12e6983fbdc99cb37c98132bdba74198

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:   156836 a86f07cfa05c30218c29e31d285e067e

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:   348720 9688bf15eef77984cd25172f66860657

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:   177490 42bdcdb23b1445cac250ebc92ac3caee

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:   178762 474c305612b8efc8faf7df21eea3205a

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:   311688 4e69b107064d625e061c5590b9ef83b9

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:   210468 6916fbd5f16c7ca901ba8e06b1d8500a

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:  3230076 b7d18bf6253b714ff82e311e44c0361c

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:   785898 6fb40aa8573bb642dc6e35ed21dc340f

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:   617656 31fd77725b3deb1d426f6cd48a9ffedf

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:   173578 53bc5a6d0be04caf35e24ba53233c27e

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:   167650 90b11a981bd7a6ff490f9685c60b61cb

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:   167764 c7429e3eb2526110744f99755b4d2b85

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.8-0ubuntu6.06.1_amd64.deb
  Size/MD5:   600356 16d93e175fb1bd0872d7398bb1dc77cd

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.8-0ubuntu6.06.1_i386.deb
  Size/MD5:   155756 a5429a64c62156c96e5f607c78008579

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.8-0ubuntu6.06.1_i386.deb
  Size/MD5:   339384 da8d9fad352819051198349ba7fbb997

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.8-0ubuntu6.06.1_i386.deb
  Size/MD5:   175258 f17f145f437d0754ac0f83047126021e

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.8-0ubuntu6.06.1_i386.deb
  Size/MD5:   176926 adb28d31cf67948756bbad89025397f8


[Full-disclosure] [USN-417-2] PostgreSQL 8.1 regression

2007-02-06 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-417-2  February 06, 2007
postgresql-8.1 regression
https://launchpad.net/bugs/83505
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  postgresql-8.1   8.1.4-0ubuntu1.3

Ubuntu 6.10:
  postgresql-8.1   8.1.4-7ubuntu0.3

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-417-1 fixed several vulnerabilities in the PostgreSQL server.
Unfortunately this update had a regression that caused some valid
queries to be aborted with a type error. This update corrects that
problem.

We apologize for the inconvenience.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.3.diff.gz
  Size/MD5:39703 e006b67020bb99233d2baece0b6e3a85

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.3.dsc
  Size/MD5: 1113 722212b9cc02c14060ae0c0d6c4bb91c

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4.orig.tar.gz
  Size/MD5: 11312643 c6554a0ef948ab2b18b617954e1788fe

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.4-0ubuntu1.3_all.deb
  Size/MD5:  1441808 3af306e6277ec3ceaca6d385781158c4

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:   152702 1e149852fbb65de0576d4310777c89e7

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:   344750 de2f1868e34eee5f01fe4b5fc81821f1

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:   173164 3d47cbd3d7fca9b399f0cec2f4f140d7

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:   175008 621159226bc9a97a8fa5dc5aba8c7469

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:   307840 f458c647e420437b9c27653b7bcc25f9

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:   206490 1c2b2ebd5a21aaa23b019ae0a96ee12c

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:  3221918 2fdf72f6169bbd4d8e9c41c6c0090e9d

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:   758576 2fc6e8b3a80336174991612aa1d52d87

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:   613056 cca9835801be9562cd9d5cfa7e57877b

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:   169450 86b965bee3d097c750b6b67e2e00bf99

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:   163604 367213e38ea347ad50365b522d8ced3a

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:   163662 b4bfd83ab5246020c7afa1525d5b3ee3

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.4-0ubuntu1.3_amd64.deb
  Size/MD5:   596170 fc4c2157ad22eca3bfdaa673559cd495

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-0ubuntu1.3_i386.deb
  Size/MD5:   151622 2c8f4a68925bb454846de884b4dd1b0f

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-0ubuntu1.3_i386.deb
  Size/MD5:   334810 5d6d089c404cf7ff6bc4172c7c66ec23

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-0ubuntu1.3_i386.deb
  Size/MD5:   170726 4fc67c0315d3267e7b1ae1a29f7bf45c

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-0ubuntu1.3_i386.deb
  Size/MD5:   173088 7badba2ae23aabafb22daaa568152e49

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.4-0ubuntu1.3_i386.deb
  Size/MD5:   296336 66d003ee55fecb70ba581029a81f09a1

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.4-0ubuntu1.3_i386.deb
  Size/MD5:   199810 

[Full-disclosure] [USN-417-1] PostgreSQL vulnerabilities

2007-02-05 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-417-1  February 05, 2007
postgresql-7.4/-8.0/-8.1 vulnerabilities
CVE-2007-0555, CVE-2007-0556
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  postgresql-7.4   1:7.4.8-17ubuntu1.4
  postgresql-8.0   8.0.3-15ubuntu2.3

Ubuntu 6.06 LTS:
  postgresql-8.1   8.1.4-0ubuntu1.2

Ubuntu 6.10:
  postgresql-8.1   8.1.4-7ubuntu0.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Jeff Trout discovered that the PostgreSQL server did not sufficiently
check data types of SQL function arguments in some cases. An
authenticated attacker could exploit this to crash the database server
or read out arbitrary locations in the server's memory, which could
allow retrieving database content the attacker should not be able to
see. (CVE-2007-0555)

Jeff Trout reported that the query planner did not verify that a table
was still compatible with a previously made query plan. By using ALTER
COLUMN TYPE during query execution, an attacker could exploit this to
read out arbitrary locations in the server's memory, which could allow
retrieving database content the attacker should not be able to see.
(CVE-2007-0556)


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/postgresql-7.4_7.4.8-17ubuntu1.4.diff.gz
  Size/MD5:61660 f0b8038e545f4cac15356c31e8a45d57

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/postgresql-7.4_7.4.8-17ubuntu1.4.dsc
  Size/MD5: 1038 7f3660a4b9f9e427f6acea9f475e1d31

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/postgresql-7.4_7.4.8.orig.tar.gz
  Size/MD5:  9947820 50ee979019622f8852444cfd67b58e7e

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/postgresql-8.0_8.0.3-15ubuntu2.3.diff.gz
  Size/MD5:68920 011160d5414c9a25bdf904484c6549a4

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/postgresql-8.0_8.0.3-15ubuntu2.3.dsc
  Size/MD5: 1115 972244c3e7fdba5d92963a757ab60d8b

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/postgresql-8.0_8.0.3.orig.tar.gz
  Size/MD5: 10786924 73c804e7e55dd916732ce6807cc13318

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/postgresql-doc-7.4_7.4.8-17ubuntu1.4_all.deb
  Size/MD5:  1062840 27ed7b68501e2b0bd549f7e671a1433a

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/postgresql-doc-8.0_8.0.3-15ubuntu2.3_all.deb
  Size/MD5:  1170106 56e437def51d06712e899fe95ff4c085

http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-7.4/postgresql-server-dev-7.4_7.4.8-17ubuntu1.4_all.deb
  Size/MD5:   423444 709e6862b1dd30176be73fe8e7b9feac

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/libecpg-compat2_8.0.3-15ubuntu2.3_amd64.deb
  Size/MD5:19312 a309220068cb4f004f98a48ff50d46b4

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/libecpg-dev_8.0.3-15ubuntu2.3_amd64.deb
  Size/MD5:   204278 7c92c4c12a4f8f83ecf62eb243ce4c9a

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/libecpg5_8.0.3-15ubuntu2.3_amd64.deb
  Size/MD5:38918 16e646bb44621e70428afd5c850e038c

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/libpgtypes2_8.0.3-15ubuntu2.3_amd64.deb
  Size/MD5:41548 d8443eb231abf71159c89b082fb17b54

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/libpq-dev_8.0.3-15ubuntu2.3_amd64.deb
  Size/MD5:   165732 26d8575709e4c8699c4ff6f5a29436c4

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/libpq3_7.4.8-17ubuntu1.4_amd64.deb
  Size/MD5:68958 857605f6bf5ca9ee19817cf0753ae9e9

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/libpq4_8.0.3-15ubuntu2.3_amd64.deb
  Size/MD5:72506 8c2ca61ed2e20f8336d3b1a70ddea82c

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/postgresql-7.4_7.4.8-17ubuntu1.4_amd64.deb
  Size/MD5:  2744164 c9f09ae5f20aa52bf4d01ea55ac3312c

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/postgresql-8.0_8.0.3-15ubuntu2.3_amd64.deb
  Size/MD5:  2985170 e1289e644e3ac33e067250784c6af317

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/postgresql-client-7.4_7.4.8-17ubuntu1.4_amd64.deb
  Size/MD5:   472818 3965c03011c50fec137eefb6ee1dc1d2


[Full-disclosure] [USN-407-1] libgtop2 vulnerability

2007-01-15 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-407-1   January 15, 2007
libgtop2 vulnerability
https://launchpad.net/bugs/79206
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  libgtop2-5   2.12.0-0ubuntu1.1

Ubuntu 6.06 LTS:
  libgtop2-7   2.14.1-0ubuntu1.1

Ubuntu 6.10:
  libgtop2-7   2.14.4-0ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Liu Qishuai discovered a buffer overflow in the /proc parsing routines
in libgtop. By creating and running a process in a specially crafted
long path and tricking an user into running gnome-system-monitor, an
attacker could exploit this to execute arbitrary code with the user's
privileges.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.12.0-0ubuntu1.1.diff.gz
  Size/MD5: 5556 791af1d912da088b5dbdbaf8aa37b20b

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.12.0-0ubuntu1.1.dsc
  Size/MD5: 1421 24db7b76b5aec3e8e061197535a203db

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.12.0.orig.tar.gz
  Size/MD5:  1039660 358b710c463b01ba58ef0b8fe6b23818

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_amd64.deb
  Size/MD5:59536 00690fbaa259fc912f510534157fe157

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_amd64.deb
  Size/MD5:99396 3aa6528a1bcf3371b7b7eb1ce9a5b92f

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_i386.deb
  Size/MD5:58386 9195d353c45adca3994a25022eae9a36

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_i386.deb
  Size/MD5:96894 d6ec48f3be35baeaaffb780c1cf5512a

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_powerpc.deb
  Size/MD5:60424 4f8c50214d838f77395e8c098284ba43

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_powerpc.deb
  Size/MD5:99330 1c587f04173e0c0addb0840b470783e6

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_sparc.deb
  Size/MD5:58068 4f8f39bab5f25b4539c21daf8f466852

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_sparc.deb
  Size/MD5:96764 28a224d481b8f6afd86e46378b719d0f

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.14.1-0ubuntu1.1.diff.gz
  Size/MD5: 6343 dbc3bc45b84f78f49633a92ad6993818

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.14.1-0ubuntu1.1.dsc
  Size/MD5: 1418 78cd77e17c3825e7118bc7fe12c71156

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.14.1.orig.tar.gz
  Size/MD5:   930295 84a7ac187e609594565bb6e731d21287

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_amd64.deb
  Size/MD5:62640 22fdd503710884583da14ba62a088759

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.14.1-0ubuntu1.1_amd64.deb
  Size/MD5:   102940 1205833458f90c9f641a9ec4acd99e61

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_i386.deb
  Size/MD5:61060 e1bab8b7cdcec2a6a56956b193bf4e07

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.14.1-0ubuntu1.1_i386.deb
  Size/MD5:   100084 e7d740a94cc1a2186ce0a6dfec492e8c

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_powerpc.deb
  Size/MD5:63616 4d22b62d6b16e9de6e56e684fbc18ff9

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.14.1-0ubuntu1.1_powerpc.deb
  Size/MD5:   102736 0b54b07153901282568b4913fbfc74d1

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_sparc.deb
  Size/MD5:60818 5cd7e26033bc1449f924de0a654dab3d

[Full-disclosure] [USN-408-1] krb5 vulnerability

2007-01-15 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-408-1   January 15, 2007
krb5 vulnerability
CVE-2006-6143
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  libkadm551.4.3-5ubuntu0.2
  libkrb53 1.4.3-5ubuntu0.2

Ubuntu 6.10:
  libkadm551.4.3-9ubuntu1.1
  libkrb53 1.4.3-9ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

The server-side portion of Kerberos' RPC library had a memory
management flaw which allowed users of that library to call a function
pointer located in unallocated memory. By doing specially crafted
calls to the kadmind server, a remote attacker could exploit this to
execute arbitrary code with root privileges on the target computer.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3-5ubuntu0.2.diff.gz
  Size/MD5:  1447550 546659a7ce8758c26c33d0241adb992d
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3-5ubuntu0.2.dsc
  Size/MD5:  848 ed669b2e38c5b3b6701401b99bbdb3cb
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3.orig.tar.gz
  Size/MD5:  7279788 43fe621ecb849a83ee014dfb856c54af

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5-doc_1.4.3-5ubuntu0.2_all.deb
  Size/MD5:   852734 748a61c88e96abcc2fd922acdafbd56c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:79686 a56316c071cbdae9f33b10166e204340

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:   222738 173b8846edc4d84b0880b293ebd819f8

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:59876 11c96393564f5422e884cda60671688d

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:   134570 c2fa98268d5c486988eae91040441720

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:84774 7dc407371c107d79c69ffe054f702ba7

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:67044 4a01011a78cf0c299df6b36384c0950b

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:   129430 2acabc3bcb9323fa28a69e306694a1ec

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:   190294 a4044fce177ca61f9b24ff9515443e5f

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:   768212 bba4e4f35f90a58177f14d35d9fccf1e

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:   425220 e16e7b2709af4fb8a88a0819cdfc1a40

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:71660 d38e87ecea34868e1dac394b9047c382

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:   186752 12424ad58c808a4867f0db0d014a34ec

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:53844 3aa5f6a9ae2cb49659a0577ea972d0af

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:   121068 9a1fcd42b91849f0a4ce3c1614c3dbb9

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:75438 9b264a66dff08d0206370a43058687d1

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:58204 6e89a58b9d435c6e1422537a18da2dc1

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:   118528 82f62332c5bae9177ce1f356b824279e

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:   165130 0968da19d0bdac05e716825ba045f5e5

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:   646560 89ccbd05cda4887245d7d5c5cd77d383


[Full-disclosure] [USN-409-1] ksirc vulnerability

2007-01-15 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-409-1   January 15, 2007
kdenetwork vulnerability
CVE-2006-6811
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  ksirc4:3.4.3-0ubuntu1.1

Ubuntu 6.06 LTS:
  ksirc4:3.5.2-0ubuntu6.3

Ubuntu 6.10:
  ksirc4:3.5.5-0ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Federico L. Bossi Bonin discovered a Denial of Service vulnerability
in ksirc. By sending a special response packet, a malicious IRC server
could crash ksirc.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork_3.4.3-0ubuntu1.1.diff.gz
  Size/MD5:   199853 38e7d4da32bf32366ad77d1ed2dac2f9

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork_3.4.3-0ubuntu1.1.dsc
  Size/MD5: 1287 88bf40bbc5e2de7b12af4747b1409686

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork_3.4.3.orig.tar.gz
  Size/MD5:  9355506 872318e6122f2649a6439eac09a43fd6

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kdenetwork-doc-html_3.4.3-0ubuntu1.1_all.deb
  Size/MD5:   206940 799a5f6dbe4070c26fa3ca5b14e0428b

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kdenetwork_3.4.3-0ubuntu1.1_all.deb
  Size/MD5:22006 208d7471b12dcf31b5f2923145b9ddf1

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/dcoprss_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:89204 8a6472bade8dd27c59c825226a04fa0d

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork-filesharing_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   652412 f92a4eb8d7427f3346b6c44bd1187aeb

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork-kfile-plugins_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:47282 4877f01ebdbdcd650325d925e6e13dd9

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kdict_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   285206 ca6223dc1eb27f55520e41a7199db45c

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kget_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   480902 745b3bcf769f6b11f9814735f26bc3a5

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/knewsticker_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   466406 c6effefe8530896cbcbf46ce448abf95

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kopete_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:  4780908 13da4a4da4f833a8fac9648342814fde

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kpf_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   205872 ccf96c3a72b44712da3e21773918c6c6

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kppp_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   702964 4c12822b0c367e5e9175f829c68bbc0e

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/krdc_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   513844 ded8952df6aace4e58d9a79fd329e398

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/krfb_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   957380 574e6b2ed94b85c32acfb0d55deb0a8f

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/ksirc_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   743316 b96b4daa892fe12056493f2e277ecb9a

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/ktalkd_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   144992 fcceb89ff85b3bbf1e76e4411e1c1a5e

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kwifimanager_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   209288 b0c1122c71104d9e519d191e937b4ff4

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/librss1-dev_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:31724 a4eb736ef5612b5e0b2136ce10abf7fc

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/librss1_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:55778 8dd173cf02cdcccf6c28c4ca7c73a968

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/lisa_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   207272 94d49a05ec85e67fdd45a74603234f3f

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/dcoprss_3.4.3-0ubuntu1.1_i386.deb
  Size/MD5:77334 776afc166f3662bf8ec04770a48f9095

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork-filesharing_3.4.3-0ubuntu1.1_i386.deb
  Size/MD5:   598730 

[Full-disclosure] [USN-380-2] avahi regression

2006-12-14 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-380-2  December 14, 2006
avahi regression
https://launchpad.net/bugs/72728
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  avahi-daemon 0.5.2-1ubuntu1.3

Ubuntu 6.06 LTS:
  avahi-daemon 0.6.10-0ubuntu3.3

Ubuntu 6.10:
  avahi-daemon 0.6.13-2ubuntu2.3

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-380-1 fixed a vulnerability in Avahi. However, if used with
Network manager, that version occasionally failed to resolve .local
DNS names until Avahi got restarted. This update fixes the problem.

We apologize for the inconvenience.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi_0.5.2-1ubuntu1.3.diff.gz
  Size/MD5: 5402 6988a88488201140d1941e18e9baf974

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi_0.5.2-1ubuntu1.3.dsc
  Size/MD5: 1151 c3edfa425968e2fd8053f37d8e06387a

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi_0.5.2.orig.tar.gz
  Size/MD5:   651504 dc7ce24ffaab251a2002bf1dfdbe256d

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi-utils_0.5.2-1ubuntu1.3_all.deb
  Size/MD5:15784 32a0566e13d26c2ac618aee8d6310f43

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-cil_0.5.2-1ubuntu1.3_all.deb
  Size/MD5:20748 ce2a400aa9d37b33d234d35fbd0765f5

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/python2.4-avahi_0.5.2-1ubuntu1.3_all.deb
  Size/MD5: 8964 56044882a59dbea82e50eb889ddab030

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi-daemon_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5:49074 2d1bfbec40fb0990e9d9c3e7f9a7d5d2

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi-dnsconfd_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5:15290 a43a4acb239c7da47baf1615c2d61b27

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-client-dev_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5:27972 182b8adf040f20589b883bf427fb0656

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-client1_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5:23102 c7e27c18c810ea439c8bb867ab5e8fda

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-common-dev_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5:31536 e0db12eff12ed67e75ae46aeecf14253

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-common0_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5:20540 e32a02c8e9c41ca46e86c24ae146afda

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-core-dev_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5:   104490 2633408fbbe5c64cab9d6c386580bf96

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-core1_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5:75398 14e59e657b680cdb009106679d91977f

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-glib-dev_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5:10038 b6a18e683e2c5aa1a187375a54b8e39a

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-glib0_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5:  109ddf7229ecc9ee684d75006fd7d71d

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-qt3-0_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5:11426 da757a2b37737aa22e5083d65d5fc14f

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-qt3-dev_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5:11708 210e14ee05911ed7fd52945010a5297f

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-qt4-0_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5: 9284 75a6ac74a009a60d9413e0fe9669c163

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-qt4-dev_0.5.2-1ubuntu1.3_amd64.deb
  Size/MD5: 9678 73fd48ec0f9ece9943c649faaacf7829

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi-daemon_0.5.2-1ubuntu1.3_i386.deb
  Size/MD5:45014 d48dae82e7556cf9af9307c7bce01941

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi-dnsconfd_0.5.2-1ubuntu1.3_i386.deb
  Size/MD5:14338 21402b49b74c7273191c57fc979de17e

http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-client-dev_0.5.2-1ubuntu1.3_i386.deb
  Size/MD5:24598 175251b828d8960c443a4c9f31b3888a


[Full-disclosure] [USN-375-1] PHP vulnerability

2006-11-02 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-375-1  November 02, 2006
php5 vulnerability
CVE-2006-5465
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  libapache2-mod-php5  5.0.5-2ubuntu1.6
  php5-cli 5.0.5-2ubuntu1.6

Ubuntu 6.06 LTS:
  libapache2-mod-php5  5.1.2-1ubuntu3.4
  php5-cli 5.1.2-1ubuntu3.4

Ubuntu 6.10:
  libapache2-mod-php5  5.1.6-1ubuntu2.1
  php5-cli 5.1.6-1ubuntu2.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Stefan Esser discovered two buffer overflows in the htmlentities() and
htmlspecialchars() functions. By supplying specially crafted input to
PHP applications which process that input with these functions, a
remote attacker could potentially exploit this to execute arbitrary
code with the privileges of the application. (CVE-2006-5465)

This update also fixes bugs in the chdir() and tempnam() functions,
which did not perform proper open_basedir checks. This could allow
local scripts to bypass intended restrictions.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.6.diff.gz
  Size/MD5:   112425 63a852d183b72a445768e054979af66e
http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.6.dsc
  Size/MD5: 1707 0286bd32528175488daa0189f97b1d75
http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5.orig.tar.gz
  Size/MD5:  6082082 ae36a2aa35cfaa58bdc5b9a525e6f451

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/php5/php-pear_5.0.5-2ubuntu1.6_all.deb
  Size/MD5:   173670 572a607668c6f5cd2029343bccc4cf2f

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.6_all.deb
  Size/MD5: 1038 c776023995d03e018198575b6393989c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:  2013148 7c1d4e4812bf88a200fb41829d519b36

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:  3972536 9d125c7504d9549ab43951cae8b221a9

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:  1997138 7ce36c97b659f9a89a1d5545e945cc03

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:   129032 6b8c7e3655e6b47700a7a9e85b5ec637

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:24022 ccc396ace095952fce2c9f351cb8c0fa

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:   218732 1f147e51c313f480fa21afff7710fa6d

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:35556 59d0bff85f86103d3ab8452e15ba6b3f

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:20660 f6590132e23072988585ca437684c475

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5: 8612 e9052b945f1c87e2dfa9b6538ce4768e

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:24468 c473297e7b15de48cdd8142e8bd03d42

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:29286 16537d4b9080f8a0b34e83427cec39ae

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:40072 392cdd68f2b97e0ad8d00e04c059a765

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5: 8090 702929f3a94280eb9f90e010cb0cfddd

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:14466 a5f8d8c2f30534a17d39840a50ad8a6a

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:28150 3d0f62ebf3ac0289a964bc75e18c3961

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:22216 a9faea6d24aa8aaf56736bea7d247842

http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.0.5-2ubuntu1.6_amd64.deb
  Size/MD5:41888 e1fe7c9087fca237a2b1cbf1ee48c97e


[Full-disclosure] [USN-372-1] imagemagick vulnerability

2006-11-01 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-372-1  November 01, 2006
imagemagick vulnerability
CVE-2006-5456
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libmagick6   6:6.0.6.2-2.1ubuntu1.5

Ubuntu 5.10:
  libmagick6   6:6.2.3.4-1ubuntu1.4

Ubuntu 6.06 LTS:
  libmagick9   6:6.2.4.5-0.6ubuntu0.3

Ubuntu 6.10:
  libmagick9   7:6.2.4.5.dfsg1-0.10ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

M. Joonas Pihlaja discovered that ImageMagick did not sufficiently
verify the validity of PALM and DCM images. When processing a
specially crafted image with an application that uses imagemagick,
this could be exploited to execute arbitrary code with the
application's privileges.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5.diff.gz
  Size/MD5:   144502 96cdc6266e29aa2ba91e09adc67a3c2a

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5.dsc
  Size/MD5:  899 6bb10253b54d9b68b99ab5e117d0bb86

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2.orig.tar.gz
  Size/MD5:  6824001 477a361ba0154cc2423726fab4a3f57c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5_amd64.deb
  Size/MD5:  1466726 30529972b274e75f686f38aab2e27e36

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.5_amd64.deb
  Size/MD5:   229236 13fa208a5cb5f6acdfd271836b39e2f0

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.5_amd64.deb
  Size/MD5:   164022 e4b7c3ed32275b45e7a982bc9be16710

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.5_amd64.deb
  Size/MD5:  1551474 6a6e325d036aa7369e42ea7bc60223b4

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.5_amd64.deb
  Size/MD5:  1195388 38967817dd23a96f6cbbe996c26d86bc

http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.5_amd64.deb
  Size/MD5:   232262 3ae7c25400744ee24260453e4a952406

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5_i386.deb
  Size/MD5:  1465348 e4330a298179425f3d88db6f308f6520

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.5_i386.deb
  Size/MD5:   209222 879366413a35554aed05bcf9f27f038b

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.5_i386.deb
  Size/MD5:   164516 21497849c6a53e77db86cf217ce5d81a

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.5_i386.deb
  Size/MD5:  1454216 12f86d30660e81477ead1ac3e4ed383c

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.5_i386.deb
  Size/MD5:  1140964 c289aa3e81f0d5106d2fd9d23ba1795e

http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.5_i386.deb
  Size/MD5:   232642 8b317e6dfe26d08b31bc536d2c083827

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5_powerpc.deb
  Size/MD5:  1472140 b3b445e1a7af2910ed9e7f8be844f909

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.5_powerpc.deb
  Size/MD5:   228208 99d28d5a4b541a032d52754eebe7aba9

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.5_powerpc.deb
  Size/MD5:   157202 e5553dbb2bf94dac87e16114652f029f

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.5_powerpc.deb
  Size/MD5:  1686432 ad415b90f40c1ab31e023f1df6adcb4e

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.5_powerpc.deb
  Size/MD5:  1170248 7a16caf06e3834dffccc4652cd302993

http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.5_powerpc.deb
  Size/MD5:   270978 caebe7cef826261b11fb068008ed60b9

Updated packages for Ubuntu 5.10:

  Source archives:



[Full-disclosure] [USN-369-2] postgresql-8.1 vulnerabilities

2006-11-01 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-369-2  November 01, 2006
postgresql-8.1 vulnerabilities
CVE-2006-5540, CVE-2006-5541, CVE-2006-5542
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.10:
  postgresql-8.1   8.1.4-7ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-369-1 fixed three minor PostgreSQL 8.1 vulnerabilities for Ubuntu 6.06 LTS.
This update provides the corresponding update for Ubuntu 6.10.

Original advisory details:

  Michael Fuhr discovered an incorrect type check when handling unknown
  literals. By attempting to coerce such a literal to the ANYARRAY type,
  a local authenticated attacker could cause a server crash. (CVE-2006-5541)
  
  Josh Drake and Alvaro Herrera reported a crash when using aggregate
  functions in UPDATE statements. A local authenticated attacker could
  exploit this to crash the server backend. This update disables this
  construct, since it is not very well defined and forbidden by the SQL
  standard. (CVE-2006-5540)
  
  Sergey Koposov discovered a flaw in the duration logging. This could
  cause a server crash under certain circumstances. (CVE-2006-5542)
  
  Please note that these flaws can usually not be exploited through web
  and other applications that use a database and are exposed to
  untrusted input, so these flaws do not pose a threat in usual setups.


Updated packages for Ubuntu 6.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-7ubuntu0.1.diff.gz
  Size/MD5:52401 af21a893e2947a1e467d5e98663031e7

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-7ubuntu0.1.dsc
  Size/MD5: 1176 04b8d59e5fdb061ebc2a0b1e86c4220d

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4.orig.tar.gz
  Size/MD5: 11312643 c6554a0ef948ab2b18b617954e1788fe

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.4-7ubuntu0.1_all.deb
  Size/MD5:  1442056 4263930dd4391fd81944a82c372f3cba

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:   152924 5fb69c85456514e2f78072efc3956ec0

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:   344912 a34d581ae43ce95f0758f3128d2c07e5

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:   173428 733938955a0112fb6fedc835f5456052

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:   175450 5412a17f17d49c3090cb7fcbcc136e7b

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:   312606 3b5e8a5d6cffa8b48f82575458503d22

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:   206680 559c766535f53918647783563d797582

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:  3256168 a0bbda514074cd42271529eb07e94ecd

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:   769328 3323f21f5fd11c660e74e0b2a3d480f6

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:   619156 08c3d6be3fa11d19eccdbb9986e659d4

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:   169362 d5cec1f551207e2e734bf6fab2317ef9

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:   163748 b99d7a9fafcfd3e8b616ef1f483c4da9

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:   164056 17bb99f0f7ab3edf2391271d64e0feda

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.4-7ubuntu0.1_amd64.deb
  Size/MD5:   596412 1d3f23de9e73e3f3c97b2532d7b4c5c8

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-7ubuntu0.1_i386.deb
  Size/MD5:   152234 5ec67e24a0c39547dd1a4594f43c9ba2


[Full-disclosure] [USN-369-1] PostgreSQL vulnerabilities

2006-10-24 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-369-1   October 24, 2006
postgresql-8.1 vulnerabilities
http://www.postgresql.org/about/news.664
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  postgresql-8.1   8.1.4-0ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Michael Fuhr discovered an incorrect type check when handling unknown
literals. By attempting to coerce such a literal to the ANYARRAY type,
a local authenticated attacker could cause a server crash.

Josh Drake and Alvaro Herrera reported a crash when using aggregate
functions in UPDATE statements. A local authenticated attacker could
exploit this to crash the server backend. This update disables this
construct, since it is not very well defined and forbidden by the SQL
standard.

Sergey Koposov discovered a flaw in the duration logging. This could
cause a server crash under certain circumstances.

Please note that these flaws can usually not be exploited through web
and other applications that use a database and are exposed to
untrusted input, so these flaws do not pose a threat in usual setups.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.1.diff.gz
  Size/MD5:27049 3275e9b9ba9270f02f6d71171b85b770

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.1.dsc
  Size/MD5: 1115 26f7be0a7abbf8d2dd43fcecb2e68c03

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4.orig.tar.gz
  Size/MD5: 11312643 c6554a0ef948ab2b18b617954e1788fe

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.4-0ubuntu1.1_all.deb
  Size/MD5:  1441006 6d07fb48179222edcddb101cfa38bdd0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:   151896 205c5bdfaa12cd1aa742f8a60175d53d

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:   343924 057a190fd02625da8233ea8c0bbffd6d

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:   172408 77edbd84b4aa4a01a47228f56d7ea964

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:   174232 00f4dbac0e143d9838d956369a506902

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:   307126 fa5f041925179d150007ca2c69cebad1

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:   205670 01d775b51f26406da91c6a520afe98dd

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:  3219066 e7194032e664f5ff0461a03daedb4b5e

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:   757916 68b70373e91ca1b8ba79c6af8903d79f

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:   612178 11c0024eeeaa10a493dc7a93fab4c8af

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:   168686 4481591c9c1546ac1e9c9469f72c01f9

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:   162830 3ecd7f7ce9d4557e2b5a1a10426f03e4

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:   162864 309430e8b0429106fe0e45c75367844c

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.4-0ubuntu1.1_amd64.deb
  Size/MD5:   595544 b11942b89fa3b2ad608647d8a98a2be0

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-0ubuntu1.1_i386.deb
  Size/MD5:   150812 4bac344dce1360a88d264f6a71872e69

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-0ubuntu1.1_i386.deb
  Size/MD5:   333798 1907cd200c5976e80af2bd729ea026ac

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-0ubuntu1.1_i386.deb
  Size/MD5:   169958 

[Full-disclosure] [USN-368-1] Qt vulnerability

2006-10-23 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-368-1   October 23, 2006
qt-x11-free vulnerability
CVE-2006-4811
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libqt3c102   3:3.3.3-7ubuntu3.1
  libqt3c102-mt3:3.3.3-7ubuntu3.1

Ubuntu 5.10:
  libqt3-mt3:3.3.4-8ubuntu5.1

Ubuntu 6.06 LTS:
  libqt3-mt3:3.3.6-1ubuntu6.1

After a standard system upgrade you need to restart your Desktop
session to effect the necessary changes.

Details follow:

An integer overflow was discovered in Qt's image loader. By processing
a specially crafted image with an application that uses this library
(like Konqueror), a remote attacker could exploit this to execute
arbitrary code with the application's privileges.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt-x11-free_3.3.3-7ubuntu3.1.diff.gz
  Size/MD5:62291 8b599a01d2de39b073be2a0bdb8c6475

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt-x11-free_3.3.3-7ubuntu3.1.dsc
  Size/MD5: 1816 1fdc71e7378ad7c52f29fde182246d2f

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt-x11-free_3.3.3.orig.tar.gz
  Size/MD5: 17358091 b0b98c938851d42a90632b990dca28c0

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3-i18n_3.3.3-7ubuntu3.1_all.deb
  Size/MD5:78412 3ea93ae55002054c58a4dc90f51329be

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt3-doc_3.3.3-7ubuntu3.1_all.deb
  Size/MD5:  5421764 68991f2833c99bd70c3c6a190ff0a6d9

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/qt3-examples_3.3.3-7ubuntu3.1_all.deb
  Size/MD5:  1552090 6e9316cd2766bcfbaeabc55b3445ad56

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3-compat-headers_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:33004 eefa43c5e3b24370a383a51b36727368

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3-dev_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:3 90e34db6cd69cde1e965e13cb55d5810

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3-headers_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:   348742 a952c8e7e1a2988b2621fb723404d47a

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3-mt-dev_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:44636 d3c926f39dcb2b932326bab7106859a8

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:45944 f3ed38fff143739feb15fc57c549b35a

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-mt-odbc_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:63988 54ff31515fe216ef4d157b4213584a12

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:52248 84314a527126a99fb5d4485ca17aeb63

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:   216308 41ae0886649734a7bbf05c9b40b6da44

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3c102-mt_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:  3110106 3b3d79bfb5e2a9fb6a05771cfeb13078

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-mysql_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:46056 75efaa38e659b6f640ba1d937124792d

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-odbc_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:64116 1a2c666f5ee47c8b3d485a07b2ed4e26

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-psql_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:52382 0633242d929de9b60a1620e5489f40d2

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-sqlite_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:   216424 44cd04f2b0d0d6d07c1fa69c3177c2f6

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3c102_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:  2996422 36942b9d4853b966ea2746ebaa091ab0

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt3-apps-dev_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:  2114746 2d8a767cfcd05c4de97e06f962b48890

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/qt3-assistant_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:   246458 133a70053ae29a1647565396adbaf415


[Full-disclosure] [USN-360-1] awstats vulnerabilities

2006-10-10 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-360-1   October 10, 2006
awstats vulnerabilities
CVE-2006-3681, CVE-2006-3682
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  awstats  6.3-1ubuntu0.4

Ubuntu 5.10:
  awstats  6.4-1ubuntu1.3

Ubuntu 6.06 LTS:
  awstats  6.5-1ubuntu1.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

awstats did not fully sanitize input, which was passed directly to the user's
browser, allowing for an XSS attack.  If a user was tricked into following a
specially crafted awstats URL, the user's authentication information could be
exposed for the domain where awstats was hosted.  (CVE-2006-3681)

awstats could display its installation path under certain conditions.
However, this might only become a concern if awstats is installed into
an user's home directory. (CVE-2006-3682)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.4.diff.gz
  Size/MD5:27234 dfd36e862db2211270ccfcda1b9f4d3a

http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.4.dsc
  Size/MD5:  595 967d4b14c6a5bb7e2c69c3843d15eb0a

http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3.orig.tar.gz
  Size/MD5:   938794 edb73007530a5800d53b9f1f90c88053

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.4_all.deb
  Size/MD5:   726704 52d471f9299e0bb5495c6e7db4fcc5fd

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.3.diff.gz
  Size/MD5:20294 23e7714e08623dd464a76b5d2618c9fa

http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.3.dsc
  Size/MD5:  595 e4ae507c9fc431a95b43fdc00f4a94e1

http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4.orig.tar.gz
  Size/MD5:   918435 056e6fb0c7351b17fe5bbbe0aa1297b1

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.3_all.deb
  Size/MD5:   728744 ca061e390d9ed9056bb58e14bd8bbece

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.5-1ubuntu1.2.diff.gz
  Size/MD5:20075 5bdc75b3b0ae69ee240430b254b529aa

http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.5-1ubuntu1.2.dsc
  Size/MD5:  777 67d418d1283962b1955fffe465ed5d2e

http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.5.orig.tar.gz
  Size/MD5:  1051780 aef00b2ff5c5413bd2a868299cabd69a

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.5-1ubuntu1.2_all.deb
  Size/MD5:   853276 6213e0f258c78ce25b73a1f7a0152f4e



signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-361-1] Mozilla vulnerabilities

2006-10-10 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-361-1   October 10, 2006
mozilla vulnerabilities
CVE-2006-2788, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807,
CVE-2006-3808, CVE-2006-3809, CVE-2006-3811, CVE-2006-4340,
CVE-2006-4565, CVE-2006-4568, CVE-2006-4570, CVE-2006-4571
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libnspr4 2:1.7.13-0ubuntu05.04.2
  libnss3  2:1.7.13-0ubuntu05.04.2
  mozilla-browser  2:1.7.13-0ubuntu05.04.2
  mozilla-mailnews 2:1.7.13-0ubuntu05.04.2
  mozilla-psm  2:1.7.13-0ubuntu05.04.2

Ubuntu 5.10:
  libnspr4 2:1.7.13-0ubuntu5.10.2
  libnss3  2:1.7.13-0ubuntu5.10.2
  mozilla-browser  2:1.7.13-0ubuntu5.10.2
  mozilla-mailnews 2:1.7.13-0ubuntu5.10.2
  mozilla-psm  2:1.7.13-0ubuntu5.10.2

After a standard system upgrade you need to restart Mozilla to effect
the necessary changes.

Details follow:

Various flaws have been reported that allow an attacker to execute
arbitrary code with user privileges by tricking the user into opening
a malicious URL. (CVE-2006-2788, CVE-2006-3805, CVE-2006-3806,
CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-4565,
CVE-2006-4568, CVE-2006-4571)

A bug was found in the script handler for automatic proxy
configuration. A malicious proxy could send scripts which could
execute arbitrary code with the user's privileges. (CVE-2006-3808)

The NSS library did not sufficiently check the padding of PKCS #1 v1.5
signatures if the exponent of the public key is 3 (which is widely
used for CAs). This could be exploited to forge valid signatures
without the need of the secret key. (CVE-2006-4340)

Georgi Guninski discovered that even with JavaScript disabled, a
malicous email could still execute JavaScript when the message is
viewed, replied to, or forwarded by putting the script in a remote XBL
file loaded by the message. (CVE-2006-4570)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13-0ubuntu05.04.2.diff.gz
  Size/MD5:   403767 ad89e14a1a7063ffd40c7966f66f63e6

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13-0ubuntu05.04.2.dsc
  Size/MD5: 1140 62f9aae0950ae23ab127ed0c608a6cd0

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13.orig.tar.gz
  Size/MD5: 38788839 db906560b5abe488286ad1edc21d52b6

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.13-0ubuntu05.04.2_amd64.deb
  Size/MD5:   168066 099a54a14163f7ffe0308530d7f513e8

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.13-0ubuntu05.04.2_amd64.deb
  Size/MD5:   142106 f8c747f219197d2fc62c7be7532dd09e

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.13-0ubuntu05.04.2_amd64.deb
  Size/MD5:   184956 80462134e344661ebcdb10668703c8cf

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.13-0ubuntu05.04.2_amd64.deb
  Size/MD5:   711066 2b27ce520e6e2c519145592da529d67c

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.13-0ubuntu05.04.2_amd64.deb
  Size/MD5: 10618640 187ac84d04bad5af52788263ce85516f

http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.13-0ubuntu05.04.2_amd64.deb
  Size/MD5:   403276 72d272889c297249f811744536aece56

http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.13-0ubuntu05.04.2_amd64.deb
  Size/MD5:   158328 1f81850675d5eb5df3c925b5b1b597ba

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.13-0ubuntu05.04.2_amd64.deb
  Size/MD5:  3352872 63a790924643bed33c08e1a461978462

http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.13-0ubuntu05.04.2_amd64.deb
  Size/MD5:   121184 1cd6cd71393fad002ac4835bd4d77bc9

http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.13-0ubuntu05.04.2_amd64.deb
  Size/MD5:   204162 87a317642b4ecce9677cd0ed24efab5a

http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.13-0ubuntu05.04.2_amd64.deb
  Size/MD5:  1935960 adb803a894fa3a15852d0733afc74d4c

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.13-0ubuntu05.04.2_amd64.deb
  Size/MD5:   204574 b3469c0df25b7aab832b7980141c5d37


[Full-disclosure] [USN-362-1] PHP vulnerabilities

2006-10-10 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-362-1   October 10, 2006
php4, php5 vulnerabilities
CVE-2006-4485, CVE-2006-4486, CVE-2006-4625, CVE-2006-4812
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libapache2-mod-php4  4:4.3.10-10ubuntu4.8
  php4-cgi 4:4.3.10-10ubuntu4.8
  php4-cli 4:4.3.10-10ubuntu4.8

Ubuntu 5.10:
  libapache2-mod-php5  5.0.5-2ubuntu1.5
  php5-cgi 5.0.5-2ubuntu1.5
  php5-cli 5.0.5-2ubuntu1.5

Ubuntu 6.06 LTS:
  libapache2-mod-php5  5.1.2-1ubuntu3.3
  php5-cgi 5.1.2-1ubuntu3.3
  php5-cli 5.1.2-1ubuntu3.3

After a standard system upgrade you need to restart Apache with

  sudo /etc/init.d/apache2 restart

to effect the necessary changes.

Details follow:

The stripos() function did not check for invalidly long or empty
haystack strings. In an application that uses this function on
arbitrary untrusted data this could be exploited to crash the PHP
interpreter. (CVE-2006-4485)

An integer overflow was discovered in the PHP memory allocation
handling.  On 64-bit platforms, the memory_limit setting was not
enforced correctly. A remote attacker could exploit this to cause a
Denial of Service attack through memory exhaustion. (CVE-2006-4486)

Maksymilian Arciemowicz discovered that security relevant
configuration options like open_basedir and safe_mode (which can be
configured in Apache's httpd.conf) could be bypassed and reset to
their default value in php.ini by using the ini_restore() function.
(CVE-2006-4625)

Stefan Esser discovered that the ecalloc() function in the Zend engine
did not check for integer overflows. This particularly affected the
unserialize() function. In applications which unserialize untrusted
user-defined data, this could be exploited to execute arbitrary code
with the application's privileges. (CVE-2006-4812)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.8.diff.gz
  Size/MD5:   284543 32ffb7a357a1eb784f5e883800fa3225

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.8.dsc
  Size/MD5: 1469 be67189cc38ba10051688c45ceaa
http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10.orig.tar.gz
  Size/MD5:  4892209 73f5d1f42e34efa534a09c6091b5a21e

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.8_all.deb
  Size/MD5: 1128 0f98df1af5a786b8cec1ff06118ea588

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.8_amd64.deb
  Size/MD5:  1657570 d63f46f7da773da61b1ae04e40394433

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.8_amd64.deb
  Size/MD5:  3275634 73b141ff9e4300acf3f07f4676d75c79

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.8_amd64.deb
  Size/MD5:  1647610 25d389aff7dd135ee6f22c758a1c5d16

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.8_amd64.deb
  Size/MD5:   168634 7803ecd2a0f92145900da1c0fa807d15

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.8_amd64.deb
  Size/MD5:   348234 3e36ef7e8141a466281e4ed655badb57

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.8_i386.deb
  Size/MD5:  1592994 b57510c7cbc231b88aa108168391cbfc

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.8_i386.deb
  Size/MD5:  3170396 27cc6bf74505a5698a270bbbf6d558f6

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.8_i386.deb
  Size/MD5:  1593204 0d6b614d915a537f51edf57ba5e7a694

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.8_i386.deb
  Size/MD5:   168628 c5e7e2259e01ffa4eacbe45e91495f99

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.8_i386.deb
  Size/MD5:   348256 ee78b8db7a144d3d18677adb636f0b2c

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.8_powerpc.deb
  Size/MD5:  1659228 4d37dd638c8cd017360816cc10a0fe25


[Full-disclosure] [USN-359-1] Python vulnerability

2006-10-06 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-359-1   October 06, 2006
python2.3, python2.4 vulnerability
CVE-2006-4980
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  python2.32.3.5-2ubuntu0.3
  python2.4-minimal2.4.1-0ubuntu0.2

Ubuntu 5.10:
  python2.32.3.5-8ubuntu0.2
  python2.4-minimal2.4.2-1ubuntu0.2

Ubuntu 6.06 LTS:
  python2.3-dbg2.3.5-9ubuntu1.2
  python2.4-minimal2.4.3-0ubuntu6

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Benjamin C. Wiley Sittler discovered that Python's repr() function did
not properly handle UTF-32/UCS-4 strings. If an application uses
repr() on arbitrary untrusted data, this could be exploited to execute
arbitrary code with the privileges of the python application.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/python2.3/python2.3_2.3.5-2ubuntu0.3.diff.gz
  Size/MD5:  2357500 bea365d1d6c98d54a2ba2c1300253cf9

http://security.ubuntu.com/ubuntu/pool/main/p/python2.3/python2.3_2.3.5-2ubuntu0.3.dsc
  Size/MD5: 1152 b8b1b1a1ff18ddb962f059fe836bb370

http://security.ubuntu.com/ubuntu/pool/main/p/python2.3/python2.3_2.3.5.orig.tar.gz
  Size/MD5:  8512566 9c35e5ca3c487e1c1f70f2fb1ccbfffe

http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4_2.4.1-0ubuntu0.2.diff.gz
  Size/MD5:  2601919 042484bbb7dc5a2e03d6997de0f2a398

http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4_2.4.1-0ubuntu0.2.dsc
  Size/MD5: 1141 1bcd362ffbac62716bb34a1dd2f043b4

http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4_2.4.1.orig.tar.gz
  Size/MD5:  9205762 0475655d5c6f7919fc977c42c1103af8

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/p/python2.3/idle-python2.3_2.3.5-2ubuntu0.3_all.deb
  Size/MD5:   235652 3dfdb7ae46bc14c8742c8cf771fe0ecb

http://security.ubuntu.com/ubuntu/pool/universe/p/python2.4/idle-python2.4_2.4.1-0ubuntu0.2_all.deb
  Size/MD5:   240584 809b8060bab7e3a588c48155fd412aee

http://security.ubuntu.com/ubuntu/pool/universe/p/python2.3/python2.3-doc_2.3.5-2ubuntu0.3_all.deb
  Size/MD5:  2860646 45e662a6c0422763329dc381db1b899e

http://security.ubuntu.com/ubuntu/pool/universe/p/python2.3/python2.3-examples_2.3.5-2ubuntu0.3_all.deb
  Size/MD5:   512962 19dd20632aa00a9d36958b3803129197

http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4-doc_2.4.1-0ubuntu0.2_all.deb
  Size/MD5:  3323478 7afd731df65520151337df8f1ca2bf9a

http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4-examples_2.4.1-0ubuntu0.2_all.deb
  Size/MD5:   579828 20a9f6a971ef3aa8d7618921bf296c5e

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/python2.3/python2.3-dev_2.3.5-2ubuntu0.3_amd64.deb
  Size/MD5:  1593658 e170994d3161032229e65c658c4b9833

http://security.ubuntu.com/ubuntu/pool/universe/p/python2.3/python2.3-gdbm_2.3.5-2ubuntu0.3_amd64.deb
  Size/MD5:27142 951c53e20261acf2e2ba07317f40aaac

http://security.ubuntu.com/ubuntu/pool/universe/p/python2.3/python2.3-mpz_2.3.5-2ubuntu0.3_amd64.deb
  Size/MD5:31942 9c4a3feae66a59b5de888d9fcfd35eeb

http://security.ubuntu.com/ubuntu/pool/main/p/python2.3/python2.3-tk_2.3.5-2ubuntu0.3_amd64.deb
  Size/MD5:   109776 8e675863b272dc7955e3f374f85349bd

http://security.ubuntu.com/ubuntu/pool/main/p/python2.3/python2.3_2.3.5-2ubuntu0.3_amd64.deb
  Size/MD5:  3035892 4334bd09aee4dcc02d87dacd2d87d6d9

http://security.ubuntu.com/ubuntu/pool/universe/p/python2.4/python2.4-dbg_2.4.1-0ubuntu0.2_amd64.deb
  Size/MD5:  4285084 f0efd6ba55308df0c4dd901262fe6789

http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4-dev_2.4.1-0ubuntu0.2_amd64.deb
  Size/MD5:  1682228 b5a23d40dc9b78aaae0c77911f74dfa7

http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4-gdbm_2.4.1-0ubuntu0.2_amd64.deb
  Size/MD5:28006 5abb3d105f9be8e876f1f4780450d08d

http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4-minimal_2.4.1-0ubuntu0.2_amd64.deb
  Size/MD5:   807100 9f3a8dce512745e3c0ed6e45066601e8

http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4-tk_2.4.1-0ubuntu0.2_amd64.deb
  Size/MD5:   111906 cb5f4ea87f55671f07169627df23bf50


[Full-disclosure] [USN-353-2] OpenSSL vulnerability

2006-10-04 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-353-2   October 04, 2006
openssl vulnerability
CVE-2006-2940
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libssl0.9.7  0.9.7e-3ubuntu0.6

Ubuntu 5.10:
  libssl0.9.7  0.9.7g-1ubuntu1.5

Ubuntu 6.06 LTS:
  libssl0.9.8  0.9.8a-7ubuntu0.3

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

USN-353-1 fixed several vulnerabilities in OpenSSL. However, Mark J
Cox noticed that the applied patch for CVE-2006-2940 was flawed. This
update corrects that patch.

For reference, this is the relevant part of the original advisory:

  Certain types of public key could take disproportionate amounts of
  time to process. The library now limits the maximum key exponent
  size to avoid Denial of Service attacks. (CVE-2006-2940)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.6.diff.gz
  Size/MD5:31740 97bbcc504a6a95a33dbbdc5cbd37229e

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.6.dsc
  Size/MD5:  645 6d09dca9825c7249d785a307b0425ae9

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e.orig.tar.gz
  Size/MD5:  3043231 a8777164bca38d84e5eb2b1535223474

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.6_amd64.udeb
  Size/MD5:   495260 fd92e08373a92041809218c214823b73

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.6_amd64.deb
  Size/MD5:  2694372 eb5ca3d700f0cc9212c41b6f734b4f88

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.6_amd64.deb
  Size/MD5:   770484 3ea407d9dade085833bbf317486b04c8

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.6_amd64.deb
  Size/MD5:   904306 ed9e6cd718227584e7ad53127c20792a

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.6_i386.udeb
  Size/MD5:   433546 a9c706c6822ac597b71ea68f39b222db

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.6_i386.deb
  Size/MD5:  2493948 adf386221e765a18e8a0c8e0d741f2b9

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.6_i386.deb
  Size/MD5:  2243670 e7d78553fcc4be0c6d78be9af286277d

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.6_i386.deb
  Size/MD5:   901660 dbbcff730990c1b5e499ea5ce73f13be

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.6_powerpc.udeb
  Size/MD5:   499482 19be15b0af113962bed13516f77f9de4

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.6_powerpc.deb
  Size/MD5:  2775178 33815f085aa8fe83ff6c7f6e0558c50b

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.6_powerpc.deb
  Size/MD5:   780064 d5d41d880620b041859716fa27647cf7

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.6_powerpc.deb
  Size/MD5:   908756 b70e6794f0761eefb77e0ecafe0a2e7f

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.5.diff.gz
  Size/MD5:32414 b229018d41456fea8a0a0cd07ed666ac

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.5.dsc
  Size/MD5:  657 f490ddbc922b8f99f7d76b8b4d9e7554

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g.orig.tar.gz
  Size/MD5:  3132217 991615f73338a571b6a1be7d74906934

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7g-1ubuntu1.5_amd64.udeb
  Size/MD5:   499082 8d5e5984dc233f31a5dbeea947608279

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7g-1ubuntu1.5_amd64.deb
  Size/MD5:  2700700 1fb82d9ef43428f64ee1ed77c9a84c3b

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7g-1ubuntu1.5_amd64.deb
  Size/MD5:   774050 a14cd3488b047eedd5c6a511d17d3848

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.5_amd64.deb
  Size/MD5:   913768 

[Full-disclosure] [USN-357-1] Mono vulnerability

2006-10-04 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-357-1   October 04, 2006
mono vulnerability
CVE-2006-5072
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  mono-classlib-1.01.1.8.3-1ubuntu2.1
  mono-classlib-2.01.1.8.3-1ubuntu2.1

Ubuntu 6.06 LTS:
  mono-classlib-1.01.1.13.6-0ubuntu3.1
  mono-classlib-2.01.1.13.6-0ubuntu3.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Sebastian Krahmer of the SuSE security team discovered that the
System.CodeDom.Compiler classes used temporary files in an insecure
way. This could allow a symbolic link attack to create or overwrite
arbitrary files with the privileges of the user invoking the program.
Under some circumstances, a local attacker could also exploit this to
inject arbitrary code into running Mono processes.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.8.3-1ubuntu2.1.diff.gz
  Size/MD5:37812 6e222e5c13002ceca8e1e5efd82036e0

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.8.3-1ubuntu2.1.dsc
  Size/MD5: 1020 605b25e63537ae93e630df34f8a7ae20
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.8.3.orig.tar.gz
  Size/MD5: 15348432 5aefdc915cbd6ed84834692f59b92080

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-assemblies-base_1.1.8.3-1ubuntu2.1_all.deb
  Size/MD5:36654 b8f7a5eee8121212b3b04aad24d2b244

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-classlib-1.0-dbg_1.1.8.3-1ubuntu2.1_all.deb
  Size/MD5:  3505034 621f1c7a211254305df73f51e4f13a4d

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-classlib-1.0_1.1.8.3-1ubuntu2.1_all.deb
  Size/MD5:  3837708 d71d24b2692563b1b693d2c12bfecee7

http://security.ubuntu.com/ubuntu/pool/universe/m/mono/mono-classlib-2.0-dbg_1.1.8.3-1ubuntu2.1_all.deb
  Size/MD5:  4022756 9fc1a800a4d1987b6d07c041f2466a87

http://security.ubuntu.com/ubuntu/pool/universe/m/mono/mono-classlib-2.0_1.1.8.3-1ubuntu2.1_all.deb
  Size/MD5:  4308358 6ecf87dfeb0e6842f4225f1073098cab

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-gac_1.1.8.3-1ubuntu2.1_all.deb
  Size/MD5:47462 eda8167aac2ccf64d249c75234f48be7

http://security.ubuntu.com/ubuntu/pool/universe/m/mono/mono-gmcs_1.1.8.3-1ubuntu2.1_all.deb
  Size/MD5:   629766 da95636cd70d27125a5d9370b26b7ead

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-mcs_1.1.8.3-1ubuntu2.1_all.deb
  Size/MD5:  1325110 a7fd2ef6b36717d2f326744e7730c601

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-dev_1.1.8.3-1ubuntu2.1_amd64.deb
  Size/MD5:  1058456 945f973f715f24adb4bc0df5c86a1c05

http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono0_1.1.8.3-1ubuntu2.1_amd64.deb
  Size/MD5:   804932 eb2ffc9e912807e8fa415101c3eff48a

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-common_1.1.8.3-1ubuntu2.1_amd64.deb
  Size/MD5:   128100 0e76abfc2c0c748a4d8a930306e293ca

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-devel_1.1.8.3-1ubuntu2.1_amd64.deb
  Size/MD5:36698 9438d7c7f63899f72cdec55d6834f711

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jay_1.1.8.3-1ubuntu2.1_amd64.deb
  Size/MD5:54668 f1b326f1a327694c545203e35afebfd7

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jit_1.1.8.3-1ubuntu2.1_amd64.deb
  Size/MD5:   669934 3f9b7d62bab94e98a290e16e2bd7342b

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-utils_1.1.8.3-1ubuntu2.1_amd64.deb
  Size/MD5:  1057068 6084bd8ec71f685f8fe8d832f6a76442

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.8.3-1ubuntu2.1_amd64.deb
  Size/MD5: 1168 3d3166c3360341775d9908d53890e4fc

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-dev_1.1.8.3-1ubuntu2.1_i386.deb
  Size/MD5:   951222 dd9882797594ccc04b5dbb7e78c49756

http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono0_1.1.8.3-1ubuntu2.1_i386.deb
  Size/MD5:   726766 9610cca518cf9bd22e15a426d4a486c4

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-common_1.1.8.3-1ubuntu2.1_i386.deb
  Size/MD5:   127854 36c79ed35e3c4d0f16a5afb159315e45

http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-devel_1.1.8.3-1ubuntu2.1_i386.deb
  Size/MD5:36694 78011b14c0e993a71891b0a4388d262b


[Full-disclosure] [USN-355-1] openssh vulnerabilities

2006-10-02 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-355-1   October 02, 2006
openssh vulnerabilities
CVE-2006-4924, CVE-2006-5051
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  openssh-server   1:3.9p1-1ubuntu2.3

Ubuntu 5.10:
  openssh-server   1:4.1p1-7ubuntu4.2

Ubuntu 6.06 LTS:
  openssh-server   1:4.2p1-7ubuntu3.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Tavis Ormandy discovered that the SSH daemon did not properly handle
authentication packets with duplicated blocks. By sending specially
crafted packets, a remote attacker could exploit this to cause the ssh
daemon to drain all available CPU resources until the login grace time
expired. (CVE-2006-4924)

Mark Dowd discovered a race condition in the server's signal handling.
A remote attacker could exploit this to crash the server.
(CVE-2006-5051)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_3.9p1-1ubuntu2.3.diff.gz
  Size/MD5:   143243 ee5b491cf023e53b4991fe319da669aa

http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_3.9p1-1ubuntu2.3.dsc
  Size/MD5:  866 237dcc91dde3201ba0bc5b9372654708

http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_3.9p1.orig.tar.gz
  Size/MD5:   832804 530b1dcbfe7a4a4ce4959c0775b85a5a

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh_3.9p1-1ubuntu2.3_all.deb
  Size/MD5:31312 a25012353606283dbae09b56dc60f1bb

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_3.9p1-1ubuntu2.3_amd64.udeb
  Size/MD5:   166846 b0507203d786efa365cef305acc0b790

http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_3.9p1-1ubuntu2.3_amd64.deb
  Size/MD5:   544562 4464ce148432194666a3fd7fae5b884f

http://security.ubuntu.com/ubuntu/pool/universe/o/openssh/openssh-server-udeb_3.9p1-1ubuntu2.3_amd64.udeb
  Size/MD5:   179290 2774b437173889390312fab14a0d9edf

http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_3.9p1-1ubuntu2.3_amd64.deb
  Size/MD5:   279624 deb54b320447ab79b8d8fb351c04960d

http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_3.9p1-1ubuntu2.3_amd64.deb
  Size/MD5:62924 083fd0c899ed8c0c088f6f659d2fd017

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_3.9p1-1ubuntu2.3_i386.udeb
  Size/MD5:   139452 31deaca18b94b27d52c1870d86810db4

http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_3.9p1-1ubuntu2.3_i386.deb
  Size/MD5:   492810 8df816ca89945adc93e80d49f53aebe6

http://security.ubuntu.com/ubuntu/pool/universe/o/openssh/openssh-server-udeb_3.9p1-1ubuntu2.3_i386.udeb
  Size/MD5:   149160 632d59e71b6a3f5aab50e4cfd3842442

http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_3.9p1-1ubuntu2.3_i386.deb
  Size/MD5:   256218 5f9791afb335d57cd1a830c1e886ee08

http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_3.9p1-1ubuntu2.3_i386.deb
  Size/MD5:62512 9f21ce3a1134980ec47c1e99cf62ff61

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_3.9p1-1ubuntu2.3_powerpc.udeb
  Size/MD5:   159886 447da8535b3b4c0b85fefd44e01f4c4d

http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_3.9p1-1ubuntu2.3_powerpc.deb
  Size/MD5:   541254 8d16c7e18fef84ab8f6a435c8c988b93

http://security.ubuntu.com/ubuntu/pool/universe/o/openssh/openssh-server-udeb_3.9p1-1ubuntu2.3_powerpc.udeb
  Size/MD5:   163428 e0ca6e79f907c35e2c32e515b8e808dd

http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_3.9p1-1ubuntu2.3_powerpc.deb
  Size/MD5:   273640 c8e00fcbe413ac902ccc4dca508572f2

http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_3.9p1-1ubuntu2.3_powerpc.deb
  Size/MD5:64092 a88a46209fac664959c35b36fb93066e

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.1p1-7ubuntu4.2.diff.gz
  Size/MD5:   158624 fc0f2620cc3fc07ad4ea050b675e5f1b

http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.1p1-7ubuntu4.2.dsc
  Size/MD5:  971 cd61da4d0742c684aaf90b8390252818


[Full-disclosure] [USN-354-1] Firefox vulnerabilities

2006-10-02 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-354-1   October 02, 2006
firefox vulnerabilities
CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802,
CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807,
CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811,
CVE-2006-3812, CVE-2006-4253, CVE-2006-4340, CVE-2006-4565,
CVE-2006-4566, CVE-2006-4567, CVE-2006-4568, CVE-2006-4569,
CVE-2006-4571
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  firefox  1.5.dfsg+1.5.0.7-0ubuntu5.10.3
  firefox-dom-inspector1.5.dfsg+1.5.0.7-0ubuntu5.10.3
  firefox-gnome-support1.5.dfsg+1.5.0.7-0ubuntu5.10.3
  devhelp  0.10-1ubuntu2.1
  devhelp-common   0.10-1ubuntu2.1
  epiphany-browser 1.8.2-0ubuntu1.1
  epiphany-browser-dev 1.8.2-0ubuntu1.1
  gnome-app-install0+20051005.1
  libdevhelp-1-0   0.10-1ubuntu2.1
  libdevhelp-1-dev 0.10-1ubuntu2.1
  mozilla-firefox-locale-af-za 1.5-ubuntu5.10-1
  mozilla-firefox-locale-ast-es1.5-ubuntu5.10-1
  mozilla-firefox-locale-bg-bg 1.5-ubuntu5.10-1
  mozilla-firefox-locale-cs-cz 1.5-ubuntu5.10-1
  mozilla-firefox-locale-da-dk 1.5-ubuntu5.10-1
  mozilla-firefox-locale-de1.5-ubuntu5.10-1
  mozilla-firefox-locale-de-de 1.5-ubuntu5.10-1
  mozilla-firefox-locale-en-gb 1.5-ubuntu5.10-1
  mozilla-firefox-locale-es1.5-ubuntu5.10-1
  mozilla-firefox-locale-es-ar 1.5-ubuntu5.10-1
  mozilla-firefox-locale-es-es 1.5-ubuntu5.10-1
  mozilla-firefox-locale-fi-fi 1.5-ubuntu5.10-1
  mozilla-firefox-locale-fr1.5-ubuntu5.10-1
  mozilla-firefox-locale-fr-fr 1.5-ubuntu5.10-1
  mozilla-firefox-locale-ga-ie 1.5-ubuntu5.10-1
  mozilla-firefox-locale-gu-in 1.5-ubuntu5.10-1
  mozilla-firefox-locale-he-il 1.5-ubuntu5.10-1
  mozilla-firefox-locale-hu-hu 1.5-ubuntu5.10-1
  mozilla-firefox-locale-mk-mk 1.5-ubuntu5.10-1
  mozilla-firefox-locale-nl-nl 1.5-ubuntu5.10-1
  mozilla-firefox-locale-pa-in 1.5-ubuntu5.10-1
  mozilla-firefox-locale-pl1.5-ubuntu5.10-1
  mozilla-firefox-locale-pl-pl 1.5-ubuntu5.10-1
  mozilla-firefox-locale-pt-br 1.5-ubuntu5.10-1
  mozilla-firefox-locale-pt-pt 1.5-ubuntu5.10-1
  mozilla-firefox-locale-ro-ro 1.5-ubuntu5.10-1
  mozilla-firefox-locale-ru-ru 1.5-ubuntu5.10-1
  mozilla-firefox-locale-sl-si 1.5-ubuntu5.10-1
  mozilla-firefox-locale-sq-al 1.5-ubuntu5.10-1
  mozilla-firefox-locale-sv1.5-ubuntu5.10-1
  mozilla-firefox-locale-sv-se 1.5-ubuntu5.10-1
  mozilla-firefox-locale-tr-tr 1.5-ubuntu5.10-1
  mozilla-firefox-locale-xh-za 1.5-ubuntu5.10-1
  mozilla-firefox-locale-zh-cn 1.5-ubuntu5.10-1
  mozilla-firefox-locale-zh-tw 1.5-ubuntu5.10-1
  yelp 2.12.1-0ubuntu1.1

After a standard system upgrade you need to restart Firefox to effect
the necessary changes. Since the 1.0.x series of Firefox is not
supported any more, this update introduces the firefox 1.5 series into
Ubuntu 5.10. Please check whether all your extensions still work as
expected.

Details follow:

Various flaws have been reported that allow an attacker to execute
arbitrary code with user privileges by tricking the user into opening
a malicious URL. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801,
CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807,
CVE-2006-3809, CVE-2006-3811, CVE-2006-3812, CVE-2006-4253,
CVE-2006-4565, CVE-2006-4566, CVE-2006-4568, CVE-2006-4569
CVE-2006-4571)

Cross-site scripting vulnerabilities were found in the
XPCNativeWrapper() function and native DOM method handlers. A
malicious web site could exploit these to modify the contents or steal
confidential data (such as passwords) from other opened web pages.
(CVE-2006-3802, CVE-2006-3810)

A bug was found in the script handler for automatic proxy
configuration. A malicious proxy could send scripts which could
execute arbitrary code with the user's privileges. (CVE-2006-3808)

The NSS library did not sufficiently check the padding of PKCS #1 v1.5
signatures if the exponent of the public key is 3 (which is widely
used for CAs). This could be exploited to forge valid signatures
without the need of the secret key. 

[Full-disclosure] [USN-353-1] openssl vulnerabilities

2006-09-28 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-353-1 September 28, 2006
openssl vulnerabilities
CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4343
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libssl0.9.7  0.9.7e-3ubuntu0.4

Ubuntu 5.10:
  libssl0.9.7  0.9.7g-1ubuntu1.3

Ubuntu 6.06 LTS:
  libssl0.9.8  0.9.8a-7ubuntu0.2

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

Dr. Henson of the OpenSSL core team and Open Network Security
discovered a mishandled error condition in the ASN.1 parser. By
sending specially crafted packet data, a remote attacker could exploit
this to trigger an infinite loop, which would render the service
unusable and consume all available system memory. (CVE-2006-2937)

Certain types of public key could take disproportionate amounts of
time to process. The library now limits the maximum key exponent size
to avoid Denial of Service attacks. (CVE-2006-2940)

Tavis Ormandy and Will Drewry of the Google Security Team discovered a
buffer overflow in the SSL_get_shared_ciphers() function. By sending
specially crafted packets to applications that use this function (like
Exim, MySQL, or the openssl command line tool), a remote attacker
could exploit this to execute arbitrary code with the server's
privileges. (CVE-2006-3738)

Tavis Ormandy and Will Drewry of the Google Security Team reported
that the get_server_hello() function did not sufficiently check the
client's session certificate. This could be exploited to crash clients
by remote attackers sending specially crafted SSL responses.
(CVE-2006-4343)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.4.diff.gz
  Size/MD5:31608 073a299c1050059dddc16818fecd56c5

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.4.dsc
  Size/MD5:  645 eb30a98f7f176954987a8642bcda2ae7

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e.orig.tar.gz
  Size/MD5:  3043231 a8777164bca38d84e5eb2b1535223474

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.4_amd64.udeb
  Size/MD5:   495242 d51b7cb655f0cd4010160d7e8546da41

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.4_amd64.deb
  Size/MD5:  2694098 3c87855cd1a4a2bb12dd1fef0acdca78

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.4_amd64.deb
  Size/MD5:   770334 e0dff277aafa1f35fcc7995576374922

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.4_amd64.deb
  Size/MD5:   904128 70a46effaa0b51162f9d84c609bba596

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.4_i386.udeb
  Size/MD5:   433488 f1bd01ac7dd85f10cd5c32d6d78cb514

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.4_i386.deb
  Size/MD5:  2493770 5369e13ba790cecbff0854a0d173d11a

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.4_i386.deb
  Size/MD5:  2243328 62d80313f7ffdb047878a12687e5d689

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.4_i386.deb
  Size/MD5:   901520 3791cb1125bde1a315955023c777e2ae

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.4_powerpc.udeb
  Size/MD5:   499458 ec8af8b5ee0eaeb859a232e8a233b0dd

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.4_powerpc.deb
  Size/MD5:  2774934 15270e8e78df08a6b7b5be55dc3d6553

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.4_powerpc.deb
  Size/MD5:   779888 19a6e2d00d895845f556c44e044151f9

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.4_powerpc.deb
  Size/MD5:   908598 9b0fa35557f76a6b24de199e3323541c

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.3.diff.gz
  Size/MD5:32295 def7ac70ca1bc85e0c4ebbd4260a4461

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.3.dsc
  Size/MD5:  657 0b1769211fafefd21cc37c07a932a714


[Full-disclosure] [USN-352-1] Thunderbird vulnerabilities

2006-09-25 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-352-1 September 25, 2006
mozilla-thunderbird vulnerabilities
CVE-2006-4253, CVE-2006-4340, CVE-2006-4565, CVE-2006-4566,
CVE-2006-4567, CVE-2006-4570, CVE-2006-4571
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  mozilla-thunderbird  1.5.0.7-0ubuntu0.6.06

After a standard system upgrade you need to restart Thunderbird to
effect the necessary changes.

Details follow:

Various flaws have been reported that allow an attacker to execute
arbitrary code with user privileges by tricking the user into opening
a malicious email containing JavaScript. Please note that JavaScript
is disabled by default for emails, and it is not recommended to enable
it. (CVE-2006-4253, CVE-2006-4565, CVE-2006-4566, CVE-2006-4571)

The NSS library did not sufficiently check the padding of PKCS #1 v1.5
signatures if the exponent of the public key is 3 (which is widely
used for CAs). This could be exploited to forge valid signatures
without the need of the secret key. (CVE-2006-4340)

Jon Oberheide reported a way how a remote attacker could trick users
into downloading arbitrary extensions with circumventing the normal
SSL certificate check. The attacker would have to be in a position to
spoof the victim's DNS, causing them to connect to sites of the
attacker's choosing rather than the sites intended by the victim. If
they gained that control and the victim accepted the attacker's cert
for the Mozilla update site, then the next update check could be
hijacked and redirected to the attacker's site without
detection.  (CVE-2006-4567)

Georgi Guninski discovered that even with JavaScript disabled, a
malicous email could still execute JavaScript when the message is
viewed, replied to, or forwarded by putting the script in a remote XBL
file loaded by the message. (CVE-2006-4570)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.6.06.diff.gz
  Size/MD5:   454846 64c786b0c2886ff4a1cbb24fe4b76886

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.6.06.dsc
  Size/MD5:  962 2560649686a20166450e44098142e80b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.7-0ubuntu0.6.06_amd64.deb
  Size/MD5:  3528618 27f6a9eec39470b434459d291cb1fbe7

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.7-0ubuntu0.6.06_amd64.deb
  Size/MD5:   193760 86704efd60c8268803fc81d9b75e4342

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.7-0ubuntu0.6.06_amd64.deb
  Size/MD5:59010 12f13e9662d7073cb7983acb4d7f42df

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.6.06_amd64.deb
  Size/MD5: 11984618 4b1a19fe4c27ed9cd753674c0201e3d7

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.7-0ubuntu0.6.06_i386.deb
  Size/MD5:  3520394 ebda5194f4385d2349bbd8b43bc519e0

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.7-0ubuntu0.6.06_i386.deb
  Size/MD5:   187130 cd3ff598ead2861320571a96aefb0eda

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.7-0ubuntu0.6.06_i386.deb
  Size/MD5:54524 647bb673f71dadb2db6f8d7d1371f1ff

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.6.06_i386.deb
  Size/MD5: 10282888 0e6e3b82d902623916747a4048e23c46

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.7-0ubuntu0.6.06_powerpc.deb
  Size/MD5:  3525354 cf51bead4b7313430956751fbb878d94

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.7-0ubuntu0.6.06_powerpc.deb
  Size/MD5:   190474 713a352b045073a5ed9e0f2d1c125ebf

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.7-0ubuntu0.6.06_powerpc.deb
  Size/MD5:58132 e188bfb0240ab1ffe1eedb45ab8f7a65

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.6.06_powerpc.deb
  Size/MD5: 11553840 

[Full-disclosure] [USN-351-1] firefox vulnerabilities

2006-09-22 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-351-1 September 22, 2006
firefox vulnerabilities
CVE-2006-4253, CVE-2006-4340, CVE-2006-4565, CVE-2006-4566,
CVE-2006-4567, CVE-2006-4568, CVE-2006-4569, CVE-2006-4571
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  firefox  1.5.dfsg+1.5.0.7-ubuntu0.6.06
  libnss3  1.5.dfsg+1.5.0.7-ubuntu0.6.06

After a standard system upgrade you need to restart Firefox to effect
the necessary changes.

Please note that Firefox 1.0.8 in Ubuntu 5.10 and Ubuntu 5.04 are also
affected by these problems. Updates for these Ubuntu releases will be
delayed due to upstream dropping support for this Firefox version. We
strongly advise that you disable JavaScript to disable the attack
vectors for most vulnerabilities if you use one of these Ubuntu
versions. An update is currently in progress.

Details follow:

Various flaws have been reported that allow an attacker to execute
arbitrary code with user privileges by tricking the user into opening
a malicious web page containing JavaScript. (CVE-2006-4253,
CVE-2006-4565, CVE-2006-4566, CVE-2006-4568, CVE-2006-4569
CVE-2006-4571)

The NSS library did not sufficiently check the padding of PKCS #1 v1.5
signatures if the exponent of the public key is 3 (which is widely
used for CAs). This could be exploited to forge valid signatures
without the need of the secret key. (CVE-2006-4340)

Jon Oberheide reported a way how a remote attacker could trick users
into downloading arbitrary extensions with circumventing the normal
SSL certificate check. The attacker would have to be in a position to
spoof the victim's DNS, causing them to connect to sites of the
attacker's choosing rather than the sites intended by the victim. If
they gained that control and the victim accepted the attacker's cert
for the Mozilla update site, then the next update check could be
hijacked and redirected to the attacker's site without
detection.  (CVE-2006-4567)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.7-ubuntu0.6.06.diff.gz
  Size/MD5:   177969 b449a4273730b70a6364fc7977f32947

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.7-ubuntu0.6.06.dsc
  Size/MD5: 1113 f66f89a240cf04e424268682b18b274d

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.7.orig.tar.gz
  Size/MD5: 43116523 025ca9a48809d142dd4817e396157afa

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.7-ubuntu0.6.06_all.deb
  Size/MD5:49518 5e0b78c4ac74bee3eb1619bdb5e73dcf

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.7-ubuntu0.6.06_all.deb
  Size/MD5:50408 4301f74c782bedd5fdae77a8718c9e84

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb
  Size/MD5: 47330950 1a10494ee3d4d0a4194c9f2615648829

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb
  Size/MD5:  2798556 010d95da3e0f36228f7020f64a82d8db

http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb
  Size/MD5:   216456 d2e78ea968f19f7402c6e07f810ac523

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb
  Size/MD5:82684 19d45ae80a1c181dc6e3e6d4f9b13d0c

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb
  Size/MD5:  9413980 f7dc5d3650a940520ccb5be0cdad3f2b

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb
  Size/MD5:   219138 6eecd17ccbad3377599eb5247888d47f

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb
  Size/MD5:   162186 73136a6353d5e146bccc4f496f0dd9a1

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb
  Size/MD5:   236042 4d0185a1415e236448d9f80a33749710

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb
  Size/MD5:   757866 8278b72cad3ec0202ecae39c4fd2a354

  i386 architecture (x86 compatible Intel/AMD)



[Full-disclosure] [USN-350-1] Thunderbird vulnerabilities

2006-09-21 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-350-1 September 21, 2006
mozilla-thunderbird vulnerabilities
CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3804,
CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809,
CVE-2006-3810, CVE-2006-3811, CVE-2006-3812, CVE-2006-4253,
CVE-2006-4340, CVE-2006-4565, CVE-2006-4566, CVE-2006-4567,
CVE-2006-4570, CVE-2006-4571
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  mozilla-thunderbird  1.5.0.7-0ubuntu0.5.10
  mozilla-thunderbird-locale-ca1.5-ubuntu5.10
  mozilla-thunderbird-locale-de1.5-ubuntu5.10
  mozilla-thunderbird-locale-fr1.5-ubuntu5.10
  mozilla-thunderbird-locale-it1.5-ubuntu5.10
  mozilla-thunderbird-locale-nl1.5-ubuntu5.10
  mozilla-thunderbird-locale-pl1.5-ubuntu5.10
  mozilla-thunderbird-locale-uk1.5-ubuntu5.10
  mozilla-thunderbird-enigmail 2:0.94-0ubuntu0.5.10
  mozilla-thunderbird-inspector1.5.0.7-0ubuntu0.5.10
  mozilla-thunderbird-typeaheadfind1.5.0.7-0ubuntu0.5.10

After a standard system upgrade you need to restart Thunderbird to
effect the necessary changes.

Please note that Thunderbird 1.0.8 in Ubuntu 5.04 is also affected by
these problems. An update will be provided shortly.

Details follow:

This update upgrades Thunderbird from 1.0.8 to 1.5.0.7. This step was
necessary since the 1.0.x series is not supported by upstream any
more.

Various flaws have been reported that allow an attacker to execute
arbitrary code with user privileges by tricking the user into opening
a malicious email containing JavaScript. Please note that JavaScript
is disabled by default for emails, and it is not recommended to enable
it. (CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805,
CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3810,
CVE-2006-3811, CVE-2006-3812, CVE-2006-4253, CVE-2006-4565,
CVE-2006-4566, CVE-2006-4571)

A buffer overflow has been discovered in the handling of .vcard files.
By tricking a user into importing a malicious vcard into his contacts,
this could be exploited to execute arbitrary code with the user's
privileges.  (CVE-2006-3804)

The NSS library did not sufficiently check the padding of PKCS #1 v1.5
signatures if the exponent of the public key is 3 (which is widely
used for CAs). This could be exploited to forge valid signatures
without the need of the secret key. (CVE-2006-4340)

Jon Oberheide reported a way how a remote attacker could trick users
into downloading arbitrary extensions with circumventing the normal
SSL certificate check. The attacker would have to be in a position to
spoof the victim's DNS, causing them to connect to sites of the
attacker's choosing rather than the sites intended by the victim. If
they gained that control and the victim accepted the attacker's cert
for the Mozilla update site, then the next update check could be
hijacked and redirected to the attacker's site without detection.
(CVE-2006-4567)

Georgi Guninski discovered that even with JavaScript disabled, a
malicous email could still execute JavaScript when the message is
viewed, replied to, or forwarded by putting the script in a remote XBL
file loaded by the message. (CVE-2006-4570)

The enigmail plugin and the translation packages have been updated
to work with the new Thunderbird version.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.5.10.diff.gz
  Size/MD5:   451765 f226c2d1fb27ff7d1901563c0e7ae6aa

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.5.10.dsc
  Size/MD5:  960 33f4c6cf8f964b3bbf0cb7bf2a9b3a41

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7.orig.tar.gz
  Size/MD5: 35412353 4e43a174c53adf09382a4f959b86abe6

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu0.5.10.diff.gz
  Size/MD5:20864 3aee73c8c9d639372dc3f28a5f145324

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu0.5.10.dsc
  Size/MD5:  785 25206240fb199da5bbb5ab080600b0d5

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94.orig.tar.gz
  Size/MD5:  3126659 7e34cbe51f5a1faca2e26fa0edfd6a06

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird-locale-ca/mozilla-thunderbird-locale-ca_1.5-ubuntu5.10.dsc
  Size/MD5:  598 1d99f1f9e4dee5e65e3783a5f97dd263


[Full-disclosure] [USN-349-1] gzip vulnerabilities

2006-09-19 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-349-1 September 19, 2006
gzip vulnerabilities
CVE-2006-4334, CVE-2006-4335, CVE-2006-4336, CVE-2006-4337,
CVE-2006-4338
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  gzip 1.3.5-9ubuntu3.5

Ubuntu 5.10:
  gzip 1.3.5-11ubuntu2.1

Ubuntu 6.06 LTS:
  gzip 1.3.5-12ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Tavis Ormandy discovered that gzip did not sufficiently verify the
validity of gzip or compress archives while unpacking. By tricking an
user or automated system into unpacking a specially crafted compressed
file, this could be exploited to execute arbitrary code with the
user's privileges.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-9ubuntu3.5.diff.gz
  Size/MD5:61153 d63e10a794e5ea01f2accdbaf8bf3d80
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-9ubuntu3.5.dsc
  Size/MD5:  570 24976fc238f8e6614cc28cd3d2a6ddca
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5.orig.tar.gz
  Size/MD5:   331550 3d6c191dfd2bf307014b421c12dc8469

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-9ubuntu3.5_amd64.deb
  Size/MD5:75848 209e5949f27077a5111a0e48e1814e28

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-9ubuntu3.5_i386.deb
  Size/MD5:70672 bb8ecf2656df00adb2f73d7c58bfae16

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-9ubuntu3.5_powerpc.deb
  Size/MD5:77502 866b75307a0c11bba729754014d37cf2

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-11ubuntu2.1.diff.gz
  Size/MD5:61684 90455942d0fc30de77d0a7e03db7901d

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-11ubuntu2.1.dsc
  Size/MD5:  572 e6b726ade7eef11b0ec01a78709718ec
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5.orig.tar.gz
  Size/MD5:   331550 3d6c191dfd2bf307014b421c12dc8469

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-11ubuntu2.1_amd64.deb
  Size/MD5:76842 5afca3802f6380462aa81df1b71e03e6

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-11ubuntu2.1_i386.deb
  Size/MD5:71672 f84d912eb056ba6301d7972a1da6fbf0

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-11ubuntu2.1_powerpc.deb
  Size/MD5:78620 83dbc2b0f7ea1be86bdfd384b0a1a42e

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-11ubuntu2.1_sparc.deb
  Size/MD5:75866 0390a63c0774ae2661fab737371044f8

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.1.diff.gz
  Size/MD5:59646 2661380cbe7761cda97ca2282820a9be

http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.1.dsc
  Size/MD5:  574 200363f2ab018cea40c61cf9c98c705c
http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5.orig.tar.gz
  Size/MD5:   331550 3d6c191dfd2bf307014b421c12dc8469

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.1_amd64.deb
  Size/MD5:76470 5e9e2d325e742ce73c3c070e5d7856b3

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.1_i386.deb
  Size/MD5:71224 4c232bcc8218250455ec4d89eabaa7ea

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.1_powerpc.deb
  Size/MD5:78232 43b9c25f558df5037c5b798bd87a43ef

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.1_sparc.deb
  Size/MD5:74976 25095d566148ad95e3a7fd96c03f2122


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and 

[Full-disclosure] [USN-348-1] GnuTLS vulnerability

2006-09-18 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-348-1 September 18, 2006
gnutls11, gnutls12 vulnerability
CVE-2006-4790
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libgnutls11  1.0.16-13ubuntu0.3

Ubuntu 5.10:
  libgnutls11  1.0.16-13.1ubuntu1.2

Ubuntu 6.06 LTS:
  libgnutls11  1.0.16-14ubuntu1.1
  libgnutls12  1.2.9-2ubuntu1.1

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

The GnuTLS library did not sufficiently check the padding of PKCS #1
v1.5 signatures if the exponent of the public key is 3 (which is
widely used for CAs). This could be exploited to forge signatures
without the need of the secret key.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/gnutls11_1.0.16-13ubuntu0.3.diff.gz
  Size/MD5:   339767 c5bff2326fcb68ed0336e25449012068

http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/gnutls11_1.0.16-13ubuntu0.3.dsc
  Size/MD5:  830 c0793d93e9c5b93567099347fa446c72

http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/gnutls11_1.0.16.orig.tar.gz
  Size/MD5:  1504638 7b410fa3c563c7988e434a8c8671b3cd

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/gnutls-bin_1.0.16-13ubuntu0.3_amd64.deb
  Size/MD5:   217660 bba5c5e0d5f59354f6b3336367be937f

http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/libgnutls11-dbg_1.0.16-13ubuntu0.3_amd64.deb
  Size/MD5:   575482 a62525c690862f1b4927cc7f55173d3b

http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11-dev_1.0.16-13ubuntu0.3_amd64.deb
  Size/MD5:   392664 c78b8dbf6725d02e19da5707d3335124

http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11_1.0.16-13ubuntu0.3_amd64.deb
  Size/MD5:   327142 bb345c39bf9e7879432b566bf5e1a235

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/gnutls-bin_1.0.16-13ubuntu0.3_i386.deb
  Size/MD5:   203632 a467a4155ed992414884c86fc8120e5f

http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/libgnutls11-dbg_1.0.16-13ubuntu0.3_i386.deb
  Size/MD5:   555946 1ffdced169899150a35b540c373b1a0c

http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11-dev_1.0.16-13ubuntu0.3_i386.deb
  Size/MD5:   357486 1c936c849e2ec1b2f6432506a86a

http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11_1.0.16-13ubuntu0.3_i386.deb
  Size/MD5:   293636 02023e0e58310001f3ed4d4b31dacb27

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/gnutls-bin_1.0.16-13ubuntu0.3_powerpc.deb
  Size/MD5:   218566 3dfdc586e1df5663ab8edbb3735ec48c

http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/libgnutls11-dbg_1.0.16-13ubuntu0.3_powerpc.deb
  Size/MD5:  1416126 f51c3ede362394ec62ca07e345d2c4b7

http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11-dev_1.0.16-13ubuntu0.3_powerpc.deb
  Size/MD5:   389076 9904c61c7aae79e2d1700b33c92a371a

http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11_1.0.16-13ubuntu0.3_powerpc.deb
  Size/MD5:   299668 fac8cd974bcca326209e4c78eff25eac

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/gnutls11_1.0.16-13.1ubuntu1.2.diff.gz
  Size/MD5:   340309 49a5050c08af0f81729b45f5f3c8d22d

http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/gnutls11_1.0.16-13.1ubuntu1.2.dsc
  Size/MD5:  829 cbd5adc73119254f416328c52203502b

http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/gnutls11_1.0.16.orig.tar.gz
  Size/MD5:  1504638 7b410fa3c563c7988e434a8c8671b3cd

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/gnutls-bin_1.0.16-13.1ubuntu1.2_amd64.deb
  Size/MD5:   217668 1ed174a692537d419a0cfe8d126aee7e

http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/libgnutls11-dbg_1.0.16-13.1ubuntu1.2_amd64.deb
  Size/MD5:   501184 076e79bc654983d5980bd5ad1556db6a

http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11-dev_1.0.16-13.1ubuntu1.2_amd64.deb
  Size/MD5:   398968 d60fddde214fe3a9ba132f5aa31421f6

http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11_1.0.16-13.1ubuntu1.2_amd64.deb
  Size/MD5:   332338 

[Full-disclosure] [USN-346-2] Fixed linux-restricted-modules-2.6.15 for previous Linux kernel update

2006-09-14 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-346-2 September 14, 2006
linux-restricted-modules-2.6.15 regression fix
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  avm-fritz-firmware-2.6.15-26  2.6.15.11-4
  avm-fritz-kernel-source   2.6.15.11-4
  fglrx-control 2.6.15.11-4
  fglrx-kernel-source   2.6.15.11-4
  linux-restricted-modules-2.6.15-26-3862.6.15.11-4
  linux-restricted-modules-2.6.15-26-6862.6.15.11-4
  linux-restricted-modules-2.6.15-26-amd64-generic  2.6.15.11-4
  linux-restricted-modules-2.6.15-26-amd64-k8   2.6.15.11-4
  linux-restricted-modules-2.6.15-26-amd64-xeon 2.6.15.11-4
  nic-restricted-firmware-2.6.15-26-386-di  2.6.15.11-4
  nic-restricted-firmware-2.6.15-26-amd64-generic-di2.6.15.11-4
  nic-restricted-modules-2.6.15-26-386-di   2.6.15.11-4
  nic-restricted-modules-2.6.15-26-amd64-generic-di 2.6.15.11-4
  nvidia-glx2.6.15.11-4
  nvidia-glx-dev2.6.15.11-4
  nvidia-glx-legacy 2.6.15.11-4
  nvidia-glx-legacy-dev 2.6.15.11-4
  nvidia-kernel-source  2.6.15.11-4
  nvidia-legacy-kernel-source   2.6.15.11-4
  xorg-driver-fglrx 2.6.15.11-4
  xorg-driver-fglrx-dev 2.6.15.11-4

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

USN-346-1 provided an updated Linux kernel to fix several security
vulnerabilities. Unfortunately the update broke the binary 'nvidia'
driver from linux-restricted-modules. This update corrects this
problem. We apologize for the inconvenience.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11-4.diff.gz
  Size/MD5:87151 643e82286c057ba22dc6e206eb35bb29

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11-4.dsc
  Size/MD5: 3185 994d3417c1d9ec7eab79ea993cb37304

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11.orig.tar.gz
  Size/MD5: 97566445 8bb235f9119aed52797b057827756b8c

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-common_2.6.15.11-4_all.deb
  Size/MD5:17844 f05d3a7a38b1c45959d6d19972e9dd68

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-26_3.11+2.6.15.11-4_amd64.deb
  Size/MD5:   474964 3caecd039a65b40abbb7e0992dfacaef

http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.11-4_amd64.deb
  Size/MD5:  2404974 cb8229fe0f818d8a595c29d5d1d365be

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.11-4_amd64.deb
  Size/MD5:76148 dbbac55447617a2c29a5456bfb3ac956

http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.11-4_amd64.deb
  Size/MD5:   510394 79c3e8fd94f52f8803bc40587f07e2ac

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-amd64-generic_2.6.15.11-4_amd64.deb
  Size/MD5:  6861180 6c3497ef198fe4f983a8fb7d644345eb

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-amd64-k8_2.6.15.11-4_amd64.deb
  Size/MD5:  6860656 014f045a30ed2ebffe4a95958bddf933

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-amd64-xeon_2.6.15.11-4_amd64.deb
  Size/MD5:  6837510 a12bc36da1ba8df6f3b441c050c41f5c

http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-26-amd64-generic-di_2.6.15.11-4_amd64.udeb
  Size/MD5:   799514 38bdf455f45161a6bc1bca5012f7b0d4


[Full-disclosure] [USN-345-1] mailman vulnerabilities

2006-09-13 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-345-1 September 13, 2006
mailman vulnerabilities
CVE-2006-2941, CVE-2006-3636
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  mailman  2.1.5-7ubuntu0.3

Ubuntu 5.10:
  mailman  2.1.5-8ubuntu2.3

Ubuntu 6.06 LTS:
  mailman  2.1.5-9ubuntu4.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Steve Alexander discovered that mailman did not properly handle
attachments with special filenames. A remote user could exploit that
to stop mail delivery until the server administrator manually cleaned
these posts. (CVE-2006-2941)

Various cross-site scripting vulnerabilities have been reported by
Barry Warsaw. By using specially crafted email addresses, names, and
similar arbitrary user-defined strings, a remote attacker could
exploit this to run web script code in the list administrator's
web browser. (CVE-2006-3636)

URLs logged to the error log file are now checked for invalid
characters. Before, specially crafted URLs could inject arbitrary
messages into the log.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3.diff.gz
  Size/MD5:   122672 040be0e94a3463829deda6255b81914c

http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3.dsc
  Size/MD5:  669 6533900d800881c5e5e97661592fe9b1

http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5.orig.tar.gz
  Size/MD5:  5745912 f5f56f04747cd4aff67427e7a45631af

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3_amd64.deb
  Size/MD5:  6610396 9e485ddc61fea15ffaacebeb176bc924

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3_i386.deb
  Size/MD5:  6610126 7a76e92c25d14c439141c243f807ac59

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3_powerpc.deb
  Size/MD5:  6617368 a0c258a612fc19b87f756dfd1b2f5604

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3.diff.gz
  Size/MD5:   124569 edd592fdc5d979588cfa307d80f389ee

http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3.dsc
  Size/MD5:  626 52ca3b4a7132ed400701b33a9d1fa07c

http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5.orig.tar.gz
  Size/MD5:  5745912 f5f56f04747cd4aff67427e7a45631af

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_amd64.deb
  Size/MD5:  6611062 4808daed20ff5871d0878041dc65c278

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_i386.deb
  Size/MD5:  6610402 bae1a8798cc5518e204ac418d4108330

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_powerpc.deb
  Size/MD5:  6617772 c397e9d02be876896f4c519da2965dce

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_sparc.deb
  Size/MD5:  6616692 9714c5ffcedced686d5d2224f373f63a

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1.diff.gz
  Size/MD5:   228878 efe29915311336eea806f75a489ae876

http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1.dsc
  Size/MD5:  628 61d4ee8cb059d6073c845c63ab9428a3

http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5.orig.tar.gz
  Size/MD5:  5745912 f5f56f04747cd4aff67427e7a45631af

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_amd64.deb
  Size/MD5:  6612630 20c59f9de0ad456f476d9222deaf232f

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_i386.deb
  Size/MD5:  6612422 b22f69ab0ad00a70cc4cf9526521ae02

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_powerpc.deb
  

[Full-disclosure] [USN-342-1] PHP vulnerabilities

2006-09-07 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-342-1 September 07, 2006
php4, php5 vulnerabilities
CVE-2006-4020, CVE-2006-4481, CVE-2006-4482, CVE-2006-4484
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libapache2-mod-php4  4:4.3.10-10ubuntu4.7
  php4-cgi 4:4.3.10-10ubuntu4.7
  php4-cli 4:4.3.10-10ubuntu4.7

Ubuntu 5.10:
  libapache2-mod-php5  5.0.5-2ubuntu1.4
  php5-cgi 5.0.5-2ubuntu1.4
  php5-cli 5.0.5-2ubuntu1.4
  php5-curl5.0.5-2ubuntu1.4

Ubuntu 6.06 LTS:
  libapache2-mod-php5  5.1.2-1ubuntu3.2
  php5-cgi 5.1.2-1ubuntu3.2
  php5-cli 5.1.2-1ubuntu3.2
  php5-curl5.1.2-1ubuntu3.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

The sscanf() function did not properly check array boundaries. In
applications which use sscanf() with argument swapping, a remote attacker
could potentially exploit this to crash the affected web application
or even execute arbitrary code with the application's privileges.
(CVE-2006-4020)

The file_exists() and imap_reopen() functions did not perform
proper open_basedir and safe_mode checks which could allow local
scripts to bypass intended restrictions. (CVE-2006-4481)

On 64 bit systems the str_repeat() and wordwrap() functions did not
properly check buffer boundaries. Depending on the application, this
could potentially be exploited to execute arbitrary code with the
applications' privileges. This only affects the amd64 and sparc
platforms. (CVE-2006-4482)

A buffer overflow was discovered in the LWZReadByte_() function of the
GIF image file parser. By tricking a PHP application into processing a
specially crafted GIF image, a remote attacker could exploit this to
execute arbitrary code with the application's privileges.
(CVE-2006-4484)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.7.diff.gz
  Size/MD5:   284126 0abdbfaeed1f2c13a2b7d66318f8703e

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.7.dsc
  Size/MD5: 1469 d060d1a71470dc0d1f0f54fe7b9f836d
http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10.orig.tar.gz
  Size/MD5:  4892209 73f5d1f42e34efa534a09c6091b5a21e

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.7_all.deb
  Size/MD5: 1124 c51c049492e127ade6ec92dec791

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.7_amd64.deb
  Size/MD5:  1657512 98172a9808c72714a7c8ad832fdc82b0

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.7_amd64.deb
  Size/MD5:  3275218 bb27229bdc5a1179a0c1ecc549e5b461

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.7_amd64.deb
  Size/MD5:  1647578 cb7a09583ae5c004b5ff7defe600adec

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.7_amd64.deb
  Size/MD5:   168454 a37eeae412e43bf6c9eda82ee20c70bb

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.7_amd64.deb
  Size/MD5:   348246 e7d0e27e3a31610a5c0bc1c9b3e2ca2e

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.7_i386.deb
  Size/MD5:  1592874 3bf1f15c699a11ab5279808aa524bc70

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.7_i386.deb
  Size/MD5:  3170090 7d826eb3a251de6595e0008e3d3bb55f

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.7_i386.deb
  Size/MD5:  1592906 2cf679da9f5c2835bda27c8729298f28

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.7_i386.deb
  Size/MD5:   168450 245550bad855327f4c004b2708a1568f

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.7_i386.deb
  Size/MD5:   348246 091cc5ce8e015e9346140bd4bbfca1ae

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.7_powerpc.deb
  Size/MD5:  1658826 f4827b80ee504110f0ec0865f9a985fc


[Full-disclosure] [USN-343-1] bind9 vulnerabilities

2006-09-07 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-343-1 September 07, 2006
bind9 vulnerabilities
CVE-2006-4095, CVE-2006-4096
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  bind91:9.2.4-1ubuntu1.1

Ubuntu 5.10:
  bind91:9.3.1-2ubuntu1.1

Ubuntu 6.06 LTS:
  bind91:9.3.2-2ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

bind did not sufficiently verify particular requests and responses
from other name servers and users. By sending a specially crafted
packet, a remote attacker could exploit this to crash the name server.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9_9.2.4-1ubuntu1.1.diff.gz
  Size/MD5:91339 974f57903aa0403bc7973699848820de

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9_9.2.4-1ubuntu1.1.dsc
  Size/MD5:  746 196a4a6177368697c5bae6cd688ec40a
http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9_9.2.4.orig.tar.gz
  Size/MD5:  4564219 2ccbddbab59aedd6b8711b628b5472bd

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9-doc_9.2.4-1ubuntu1.1_all.deb
  Size/MD5:   157054 9de9c53dd907c72093eb3cac4cb58e57

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9-host_9.2.4-1ubuntu1.1_amd64.deb
  Size/MD5:96056 063da23c4db0704ea30230bc6acac904

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9_9.2.4-1ubuntu1.1_amd64.deb
  Size/MD5:   288708 6de568eb1a0129b9ec03272f046daa79

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/dnsutils_9.2.4-1ubuntu1.1_amd64.deb
  Size/MD5:   165266 fe32e19fb1131a10d0c76fa24a5d52a5

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libbind-dev_9.2.4-1ubuntu1.1_amd64.deb
  Size/MD5:  1011062 01a15e46983f70d7a6c97feb0fcba428

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libdns16_9.2.4-1ubuntu1.1_amd64.deb
  Size/MD5:   487588 297bdf5ac093517afc675ba96936543b

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libisc7_9.2.4-1ubuntu1.1_amd64.deb
  Size/MD5:   164744 b42d44fcf6a6ccc25be7dc46dd780598

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libisccc0_9.2.4-1ubuntu1.1_amd64.deb
  Size/MD5:77878 3ecf75a5abf534c0030fd0df1dcbd43d

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libisccfg0_9.2.4-1ubuntu1.1_amd64.deb
  Size/MD5:93042 996063073313792e3f4fe3bcc457010a

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/liblwres1_9.2.4-1ubuntu1.1_amd64.deb
  Size/MD5:94182 309b54b2b1fa1090a590aeefa09da062

http://security.ubuntu.com/ubuntu/pool/universe/b/bind9/lwresd_9.2.4-1ubuntu1.1_amd64.deb
  Size/MD5:   189226 1d3523ecf7d91c2eebe9a79d0dd5fd66

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9-host_9.2.4-1ubuntu1.1_i386.deb
  Size/MD5:93288 4663e7341c739204ae08f9fef6429c4d

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9_9.2.4-1ubuntu1.1_i386.deb
  Size/MD5:   272172 41032ad3488940d189b9de8411073431

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/dnsutils_9.2.4-1ubuntu1.1_i386.deb
  Size/MD5:   156730 3c61b149b30b6d28d0e064523ba3e61b

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libbind-dev_9.2.4-1ubuntu1.1_i386.deb
  Size/MD5:   916978 409adc88bdad0659003dc8bba6d5e4fd

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libdns16_9.2.4-1ubuntu1.1_i386.deb
  Size/MD5:   439798 0e1b4183357f48d428f24ec20d66f23f

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libisc7_9.2.4-1ubuntu1.1_i386.deb
  Size/MD5:   149958 6080eeb1f250fa666070de7b401e9921

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libisccc0_9.2.4-1ubuntu1.1_i386.deb
  Size/MD5:75924 09ebe034eb5164159666a1df11c6d28d

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libisccfg0_9.2.4-1ubuntu1.1_i386.deb
  Size/MD5:88108 6230b87f8460a264a0e47828e1a0a2b2

http://security.ubuntu.com/ubuntu/pool/main/b/bind9/liblwres1_9.2.4-1ubuntu1.1_i386.deb
  Size/MD5:91150 ea258471da1cddba1bafb58a1002d800

http://security.ubuntu.com/ubuntu/pool/universe/b/bind9/lwresd_9.2.4-1ubuntu1.1_i386.deb
  Size/MD5:   179088 188ed5d72fc3bbbe8551a9a7448b4f98

  powerpc architecture (Apple Macintosh G3/G4/G5)



[Full-disclosure] [USN-340-1] imagemagick vulnerabilities

2006-09-06 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-340-1 September 06, 2006
imagemagick vulnerabilities
CVE-2006-3743, CVE-2006-3744
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libmagick6   6:6.0.6.2-2.1ubuntu1.4

Ubuntu 5.10:
  libmagick6   6:6.2.3.4-1ubuntu1.3

Ubuntu 6.06 LTS:
  libmagick9   6:6.2.4.5-0.6ubuntu0.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Tavis Ormandy discovered several buffer overflows in imagemagick's Sun
Raster and XCF (Gimp) image decoders. By tricking a user or automated
system into processing a specially crafted image, this could be
exploited to execute arbitrary code with the users' privileges.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.4.diff.gz
  Size/MD5:   143874 bd710b48cad9d3d0266fa4dcd5523a48

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.4.dsc
  Size/MD5:  899 e531cba19eb8e41c60e101cc6e79a486

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2.orig.tar.gz
  Size/MD5:  6824001 477a361ba0154cc2423726fab4a3f57c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.4_amd64.deb
  Size/MD5:  1466542 7f9e75099eed68669d5784876ae6066b

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.4_amd64.deb
  Size/MD5:   229066 0db412e0a3bcf57d371eabbe1913fd24

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.4_amd64.deb
  Size/MD5:   163878 3134724644ad57be626b8ff613a4c835

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.4_amd64.deb
  Size/MD5:  1551292 62abe53d84248daa41b5c851a3497c7a

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.4_amd64.deb
  Size/MD5:  1195038 201931b29c9950dd1027bfe217be6462

http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.4_amd64.deb
  Size/MD5:   232130 b854f8b1de8e335d3e4e4d16ddce8cf8

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.4_i386.deb
  Size/MD5:  1465282 3c6d5443fe05ec3975766b03b3c763ef

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.4_i386.deb
  Size/MD5:   209096 eb535269e229ebfbd222bb956bdb7e6a

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.4_i386.deb
  Size/MD5:   164478 8dee42e92a08db66e02d7c6907fed68b

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.4_i386.deb
  Size/MD5:  1453974 fc61c840f10cebd266617dd8350d06a1

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.4_i386.deb
  Size/MD5:  1140640 e09d81a8c7816587cc3499043f4443cc

http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.4_i386.deb
  Size/MD5:   232508 f1ab150d2419681e6766748ca7cdabeb

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.4_powerpc.deb
  Size/MD5:  1471972 ba92c6f99f9dbad7941cfe7904fc4c9d

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.4_powerpc.deb
  Size/MD5:   228064 8264660aa7e900a5b229211d2ab6fe95

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.4_powerpc.deb
  Size/MD5:   157060 4c490ebe8e9ea43b64c60fa4925b69c9

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.4_powerpc.deb
  Size/MD5:  1686208 3d22a7499735de8d09c52bdea473cfab

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.4_powerpc.deb
  Size/MD5:  1169978 9d3f855e0683a6e7769cdd532f8f3975

http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.4_powerpc.deb
  Size/MD5:   270880 5b8ea03a3203cb9d76cfe2b423e47464

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.3.diff.gz
  Size/MD5:   143292 

[Full-disclosure] [USN-338-1] MySQL vulnerabilities

2006-09-05 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-338-1 September 05, 2006
mysql-dfsg-5.0 vulnerabilities
CVE-2006-4031, CVE-2006-4227
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  mysql-server-5.0 5.0.22-0ubuntu6.06.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Dmitri Lenev discovered that arguments of setuid SQL functions were
evaluated in the security context of the functions' definer instead of
its caller. An authenticated user with the privilege to call such a
function could exploit this to execute arbitrary statements with the
privileges of the definer of that function. (CVE-2006-4227)

Peter Gulutzan reported a potentially confusing situation of the MERGE
table engine. If an user creates a merge table, and the administrator
later revokes privileges on the original table only (without changing
the privileges on the merge table), that user still has access to the
data by using the merge table. This is intended behaviour, but might
be undesirable in some installations; this update introduces a new
server option --skip-merge which disables the MERGE engine
completely. (CVE-2006-4031)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.2.diff.gz
  Size/MD5:   125369 93d8d0c3ad971109645ed33738dc4b17

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.2.dsc
  Size/MD5: 1106 541b253aea07ad5282f2684aba12eb69

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22.orig.tar.gz
  Size/MD5: 18446645 2b8f36364373461190126817ec872031

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.2_all.deb
  Size/MD5:36894 08567e0fbadc46d35ebfa27a31d5b994

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.2_all.deb
  Size/MD5:39392 2e1b0e1151521015f20a75389ca7dba0

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.2_all.deb
  Size/MD5:36902 ba9d9e6d9645f36f5ee61cd9208b3de0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.2_amd64.deb
  Size/MD5:  6725782 c8551554b1374b163b8122d7e08a090a

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.2_amd64.deb
  Size/MD5:  1421776 343e99f256f53c37a9f6f9240a163594

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.2_amd64.deb
  Size/MD5:  6895702 757174f4891714e402bc31287c14b1cd

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.2_amd64.deb
  Size/MD5: 22491142 31641f7b65ecefcb92df5f8ad0f81e12

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.2_i386.deb
  Size/MD5:  6139348 adf444d4082a3a1526ae3fe78a8796a4

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.2_i386.deb
  Size/MD5:  1382302 31fae9b4b01ef036b1bdf12c71aceda3

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.2_i386.deb
  Size/MD5:  6277978 c4656f594891017951e79f6456802a69

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.2_i386.deb
  Size/MD5: 21347894 674e8c24a30c33fa5ec27b1633833995

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.2_powerpc.deb
  Size/MD5:  6883060 795ed1bf828a08d737ab7603021a5eeb

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.2_powerpc.deb
  Size/MD5:  1462086 72f42656fb322182ed0334a5b1b83a86

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.2_powerpc.deb
  Size/MD5:  6939654 a85d437e56dc649083a3f222cd8d7c1b

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.2_powerpc.deb
  Size/MD5: 22704258 c5fd77b7e16d6f32b7f4cc94a93a7d75

  sparc architecture (Sun SPARC/UltraSPARC)



[Full-disclosure] [USN-339-1] OpenSSL vulnerability

2006-09-05 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-339-1 September 05, 2006
openssl vulnerability
CVE-2006-4339
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libssl0.9.7  0.9.7e-3ubuntu0.3

Ubuntu 5.10:
  libssl0.9.7  0.9.7g-1ubuntu1.2

Ubuntu 6.06 LTS:
  libssl0.9.8  0.9.8a-7ubuntu0.1

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

Philip Mackenzie, Marius Schilder, Jason Waddle and Ben Laurie of
Google Security discovered that the OpenSSL library did not
sufficiently check the padding of PKCS #1 v1.5 signatures if the
exponent of the public key is 3 (which is widely used for CAs). This
could be exploited to forge signatures without the need of the secret
key.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.3.diff.gz
  Size/MD5:29738 8ff4b43003645c9cc0340b7aeaa0e943

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.3.dsc
  Size/MD5:  645 f1d90d6945db3f52eb9e523cd2257cb3

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e.orig.tar.gz
  Size/MD5:  3043231 a8777164bca38d84e5eb2b1535223474

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.3_amd64.udeb
  Size/MD5:   495170 6ecb42d8f16500657a823c246d90f721

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.3_amd64.deb
  Size/MD5:  2693394 8554202ca8540221956438754ce83daa

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.3_amd64.deb
  Size/MD5:   769732 1924597de3a34f244d50812ce47e839f

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.3_amd64.deb
  Size/MD5:   903646 0da1a7985ac40c27bffd43effcdeb306

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.3_i386.udeb
  Size/MD5:   433284 3701e85ed202bc56684583e5cdcee090

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.3_i386.deb
  Size/MD5:  2492646 bbb95c47fede95c469d7fdef9faeedcf

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.3_i386.deb
  Size/MD5:  2241170 8f890db2ab8675adccb3e5f9e9129c97

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.3_i386.deb
  Size/MD5:   901102 f43171afd1211d5026a0241abbce7710

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.3_powerpc.udeb
  Size/MD5:   499392 6c4844845826d244a5062664d725d7f4

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.3_powerpc.deb
  Size/MD5:  2774414 f275ee27e93d2ddbdf7af62837512b4a

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.3_powerpc.deb
  Size/MD5:   779388 29c64dab8447a8a79c2b82e6aad0c900

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.3_powerpc.deb
  Size/MD5:   908166 34dc1579ba2d5543f841ca917c1f7f35

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.2.diff.gz
  Size/MD5:30435 9ad78dd2d10b6a32b2efa84aeedc1b28

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.2.dsc
  Size/MD5:  657 1d871efaeb3b5bafccb17ec8787ae57c

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g.orig.tar.gz
  Size/MD5:  3132217 991615f73338a571b6a1be7d74906934

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7g-1ubuntu1.2_amd64.udeb
  Size/MD5:   498836 bd128f07f8f4ff96c7a4ec0cd01a5a24

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7g-1ubuntu1.2_amd64.deb
  Size/MD5:  2699482 cdefd160fc10ae893743cff5bf872463

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7g-1ubuntu1.2_amd64.deb
  Size/MD5:   773202 41180b2c148cbee6a514ca07d9d8038c

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.2_amd64.deb
  Size/MD5:   913254 4d7d2b9debbe46c070628174e4359281

  i386 architecture (x86 compatible Intel/AMD)



[Full-disclosure] [USN-337-1] imagemagick vulnerability

2006-08-17 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-337-1August 16, 2006
imagemagick vulnerability
CVE-2006-4144
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libmagick6   6:6.0.6.2-2.1ubuntu1.3

Ubuntu 5.10:
  libmagick6   6:6.2.3.4-1ubuntu1.2

Ubuntu 6.06 LTS:
  libmagick9   6:6.2.4.5-0.6ubuntu0.1

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

Damian Put discovered a buffer overflow in imagemagick's SGI file
format decoder. By tricking an user or automated system into
processing a specially crafted SGI image, this could be exploited to
execute arbitrary code with the user's privileges.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.3.diff.gz
  Size/MD5:   142677 fd571adfe56408f991b2c816017cf99a

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.3.dsc
  Size/MD5:  899 03499d79b2598188aeed4d675a781621

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2.orig.tar.gz
  Size/MD5:  6824001 477a361ba0154cc2423726fab4a3f57c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.3_amd64.deb
  Size/MD5:  1466446 951c781851cb2023629084c320f27f31

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.3_amd64.deb
  Size/MD5:   228950 2ae0b0323dd8d49423ccc99d5293509f

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.3_amd64.deb
  Size/MD5:   163766 32b42d2a5886308665b81757e7cc9fea

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.3_amd64.deb
  Size/MD5:  1550996 b8c5784d2a408c51976a51efb64b91cb

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.3_amd64.deb
  Size/MD5:  1195008 3a44a8aa41e632c0165bb92417ec8e8e

http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.3_amd64.deb
  Size/MD5:   231998 fb35a4c87a61fd940bad44e1ac252bc6

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.3_i386.deb
  Size/MD5:  1465132 ac647b62c6e5f9e34771c53ea4f95b3a

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.3_i386.deb
  Size/MD5:   209004 090e70f26210c13b757f22e92b4a7715

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.3_i386.deb
  Size/MD5:   16 028ef96e5345d9ff5076ffdca282f7cf

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.3_i386.deb
  Size/MD5:  1453742 f22685b0fa9c4a95c75c18e86da2f6f7

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.3_i386.deb
  Size/MD5:  1140388 23dee77028dcadda74f88e593f74667f

http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.3_i386.deb
  Size/MD5:   232380 2069490a09127e7716e07db3388fcd5e

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.3_powerpc.deb
  Size/MD5:  1471902 e0e5b999a4855b1e68025ea1ae0ed6bd

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.3_powerpc.deb
  Size/MD5:   227950 c9b575d8457e3959ddba0dd10702c6c4

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.3_powerpc.deb
  Size/MD5:   156916 de040332421f78eb8b9ce9990d9bef6e

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.3_powerpc.deb
  Size/MD5:  1685878 d5aebf65a7ae1e6281ccad831c0a7e4c

http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.3_powerpc.deb
  Size/MD5:  1169788 b5defbd03f07d943029244120ae3c2d0

http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.3_powerpc.deb
  Size/MD5:   270738 60bc3332ec1b6c371e0fa38798968776

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.2.diff.gz
  Size/MD5:   142085 

[Full-disclosure] [USN-334-1] krb5 vulnerabilities

2006-08-16 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-334-1August 16, 2006
krb5 vulnerabilities
CVE-2006-3083, CVE-2006-3084
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  krb5-clients 1.3.6-1ubuntu0.2
  krb5-ftpd1.3.6-1ubuntu0.2
  krb5-rsh-server  1.3.6-1ubuntu0.2
  krb5-user1.3.6-1ubuntu0.2

Ubuntu 5.10:
  krb5-clients 1.3.6-4ubuntu0.1
  krb5-ftpd1.3.6-4ubuntu0.1
  krb5-rsh-server  1.3.6-4ubuntu0.1
  krb5-user1.3.6-4ubuntu0.1

Ubuntu 6.06 LTS:
  krb5-clients 1.4.3-5ubuntu0.1
  krb5-ftpd1.4.3-5ubuntu0.1
  krb5-rsh-server  1.4.3-5ubuntu0.1
  krb5-user1.4.3-5ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Michael Calmer and Marcus Meissner discovered that several krb5 tools 
did not check the return values from setuid() system calls.  On systems 
that have configured user process limits, it may be possible for an 
attacker to cause setuid() to fail via resource starvation.  In that 
situation, the tools will not reduce their privilege levels, and will 
continue operation as the root user.

By default, Ubuntu does not ship with user process limits.

Please note that these packages are not officially supported by Ubuntu
(they are in the 'universe' component of the archive).


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.3.6-1ubuntu0.2.diff.gz
  Size/MD5:   664713 e5a4861877e15cb91f6dbf5935158137
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.3.6-1ubuntu0.2.dsc
  Size/MD5:  788 edf046e890d05828180fceec79299544
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.3.6.orig.tar.gz
  Size/MD5:  6526510 7974d0fc413802712998d5fc5eec2919

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5-doc_1.3.6-1ubuntu0.2_all.deb
  Size/MD5:   718394 62fe4ea415da1b040b8d2e82ebfca461

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.3.6-1ubuntu0.2_amd64.deb
  Size/MD5:   104526 f265e825f470f7d125e64ca67ab1baa4

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.3.6-1ubuntu0.2_amd64.deb
  Size/MD5:   216450 180d0ee16f7d82fb08cc33c9f57fae83

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.3.6-1ubuntu0.2_amd64.deb
  Size/MD5:56510 3b99157b1abf76ca65589b57367a9746

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.3.6-1ubuntu0.2_amd64.deb
  Size/MD5:   124206 51bb620898c55c8d4968baf7c915cf82

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.3.6-1ubuntu0.2_amd64.deb
  Size/MD5:82270 7354364f56ef0c9e3e2852f53aa77827

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.3.6-1ubuntu0.2_amd64.deb
  Size/MD5:63018 b4399bc4b714ced3315096b816243034

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.3.6-1ubuntu0.2_amd64.deb
  Size/MD5:   137248 37f64a3430eb404463252f5ddf310b9b

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.3.6-1ubuntu0.2_amd64.deb
  Size/MD5:   177112 a171ce80ad5fe539651ca1d44fcba049

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.3.6-1ubuntu0.2_amd64.deb
  Size/MD5:   652010 095eb7be05716c7817a7062b010944d9

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.3.6-1ubuntu0.2_amd64.deb
  Size/MD5:   368902 d25bcf5493f713f6c04f216b5d536633

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.3.6-1ubuntu0.2_i386.deb
  Size/MD5:92760 46dcc0c71e393f712accb32502f5fb27

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.3.6-1ubuntu0.2_i386.deb
  Size/MD5:   186370 f76907f8e22ea810797121db36ae5a98

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.3.6-1ubuntu0.2_i386.deb
  Size/MD5:51138 b0cb6e0d875dd5cbd4501f064ab6c996

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.3.6-1ubuntu0.2_i386.deb
  Size/MD5:   113422 7c5b2c8965b3a70256652f2a8e7b5de7


[Full-disclosure] [USN-335-1] heartbeat vulnerability

2006-08-16 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-335-1August 16, 2006
heartbeat vulnerability
CVE-2006-3121
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  heartbeat1.2.3-3ubuntu1.3

Ubuntu 5.10:
  heartbeat1.2.3-12ubuntu0.2

Ubuntu 6.06 LTS:
  heartbeat1.2.4-2ubuntu0.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Yan Rong Ge discovered that heartbeat did not sufficiently verify some
packet input data, which could lead to an out-of-boundary memory
access. A remote attacker could exploit this to crash the daemon
(Denial of Service).


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.3.diff.gz
  Size/MD5:   246413 a32a59d76e061bd6bac2e5f6b52d429a

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.3.dsc
  Size/MD5:  847 75287cf172b2324fcb6146fb4f01872b

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3.orig.tar.gz
  Size/MD5:  1772513 9fd126e5dff51cc8c1eee223c252a4af

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/h/heartbeat/ldirectord_1.2.3-3ubuntu1.3_all.deb
  Size/MD5:44762 29cd137965c61243a58e48119fbc03b8

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat-dev_1.2.3-3ubuntu1.3_amd64.deb
  Size/MD5:   125542 46aefd45f2ae5d7090083a1e6b3abc95

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.3_amd64.deb
  Size/MD5:   533186 8517f467bb79624846faf6e6aef90d37

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils-dev_1.2.3-3ubuntu1.3_amd64.deb
  Size/MD5:61188 55d3822a066db6ca026e73cc93757e2e

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils0_1.2.3-3ubuntu1.3_amd64.deb
  Size/MD5:51876 fb2c92a4afb0b98b825cc4090dce68ca

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith-dev_1.2.3-3ubuntu1.3_amd64.deb
  Size/MD5:29392 cf935431db7ad29b89510c15fcea7b85

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith0_1.2.3-3ubuntu1.3_amd64.deb
  Size/MD5:79636 6a8b6cd4849cef83a6da185271a11f40

http://security.ubuntu.com/ubuntu/pool/universe/h/heartbeat/stonith_1.2.3-3ubuntu1.3_amd64.deb
  Size/MD5:30374 abb1702cd5fc077f35db186e688afbce

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat-dev_1.2.3-3ubuntu1.3_i386.deb
  Size/MD5:   114930 01d5cf77762f6acdfbbecb07e37684a3

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.3_i386.deb
  Size/MD5:   489742 9043ef6e64721b9594e869d725c674e2

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils-dev_1.2.3-3ubuntu1.3_i386.deb
  Size/MD5:57322 cdd78ca9617f4eeb24777b58eb67a202

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils0_1.2.3-3ubuntu1.3_i386.deb
  Size/MD5:46834 8219c2942dd086c943c40faf9bfb389f

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith-dev_1.2.3-3ubuntu1.3_i386.deb
  Size/MD5:28940 a3814e2973e4609d64fe70e4a7f861eb

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith0_1.2.3-3ubuntu1.3_i386.deb
  Size/MD5:69350 db94b20cefcaebffab4eea67565b9649

http://security.ubuntu.com/ubuntu/pool/universe/h/heartbeat/stonith_1.2.3-3ubuntu1.3_i386.deb
  Size/MD5:29776 ccbcc61c7f92df0d171e065ff4204f73

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat-dev_1.2.3-3ubuntu1.3_powerpc.deb
  Size/MD5:   127004 b424f598b097fb156b536320ce170079

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.3_powerpc.deb
  Size/MD5:   557220 fc50aba3f599c50adbf0358a2b78c5f2

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils-dev_1.2.3-3ubuntu1.3_powerpc.deb
  Size/MD5:61250 05d241db1f4e3c99509d429d761a418a

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils0_1.2.3-3ubuntu1.3_powerpc.deb
  Size/MD5:52888 44bedf0db1b7eaec32e7c4c040a80fc8

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith-dev_1.2.3-3ubuntu1.3_powerpc.deb
  Size/MD5:29522 e89eb0728dc6b46cef2a4421872c20c9


[Full-disclosure] [USN-333-1] libwmf vulnerability

2006-08-09 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-333-1August 09, 2006
libwmf vulnerability
CVE-2006-3376
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libwmf0.2-7  0.2.8-1.1ubuntu0.1

Ubuntu 5.10:
  libwmf0.2-7  0.2.8.3-2ubuntu0.1

Ubuntu 6.06 LTS:
  libwmf0.2-7  0.2.8.3-3.1ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

An integer overflow was found in the handling of the MaxRecordSize
field in the WMF header parser. By tricking a user into opening a
specially crafted WMF image file with an application that uses this
library, an attacker could exploit this to execute arbitrary code with
the user's privileges.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf_0.2.8-1.1ubuntu0.1.diff.gz
  Size/MD5: 5304 e7805fbd610d936cfd64a4ad5529d604

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf_0.2.8-1.1ubuntu0.1.dsc
  Size/MD5:  699 b38be3ecef264877a0a8aa57a3ef369f

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf_0.2.8.orig.tar.gz
  Size/MD5:  1620489 269fb225cd44f40cc877fb6c63706112

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-doc_0.2.8-1.1ubuntu0.1_all.deb
  Size/MD5:   271748 8ab9644a6b59216b32c4669b8fd1d08d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/libw/libwmf/libwmf-bin_0.2.8-1.1ubuntu0.1_amd64.deb
  Size/MD5:20734 0423e72e4668c7c706e31591e751db7d

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-dev_0.2.8-1.1ubuntu0.1_amd64.deb
  Size/MD5:   204060 acfd872c6e935d9df25e055ceb4b1cf3

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf0.2-7_0.2.8-1.1ubuntu0.1_amd64.deb
  Size/MD5:   174006 85eab7d6300451d9cb0a05f3b0b0955f

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/libw/libwmf/libwmf-bin_0.2.8-1.1ubuntu0.1_i386.deb
  Size/MD5:18732 ff99549d18b4f31a21522e042d87bba6

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-dev_0.2.8-1.1ubuntu0.1_i386.deb
  Size/MD5:   19 0c037a6a429249d2e95f92152cce6233

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf0.2-7_0.2.8-1.1ubuntu0.1_i386.deb
  Size/MD5:   164928 e8aa9895eedcf46955a21a5b7114895c

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/universe/libw/libwmf/libwmf-bin_0.2.8-1.1ubuntu0.1_powerpc.deb
  Size/MD5:25900 4018e7b12756dd292734e06641d9c215

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-dev_0.2.8-1.1ubuntu0.1_powerpc.deb
  Size/MD5:   208320 8445f174ede961f90c0634e786d3d549

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf0.2-7_0.2.8-1.1ubuntu0.1_powerpc.deb
  Size/MD5:   178750 b0db830818c196f815c0d26f161a7141

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf_0.2.8.3-2ubuntu0.1.diff.gz
  Size/MD5: 7142 f60eca63b5d87fdfb5fd70a20a799122

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf_0.2.8.3-2ubuntu0.1.dsc
  Size/MD5:  788 4fab72640e6cbc31616d80e9ff1efb5d

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf_0.2.8.3.orig.tar.gz
  Size/MD5:  1737021 c7246bb724664189ade7895547387e6a

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-doc_0.2.8.3-2ubuntu0.1_all.deb
  Size/MD5:   271728 f1022f283d9cdd656521f8bd1f001337

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/libw/libwmf/libwmf-bin_0.2.8.3-2ubuntu0.1_amd64.deb
  Size/MD5:15452 6aacb2892e64bc40eaa73cce7bf6106a

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-dev_0.2.8.3-2ubuntu0.1_amd64.deb
  Size/MD5:   197976 d3006052733be31d47830d2f31d3cea8

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2ubuntu0.1_amd64.deb
  Size/MD5:   174604 e96c6f24abd2c42103118329ac843dd2

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/libw/libwmf/libwmf-bin_0.2.8.3-2ubuntu0.1_i386.deb
  Size/MD5:13944 7a000303b7b8b9848dc84c448832462b

http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-dev_0.2.8.3-2ubuntu0.1_i386.deb
  Size/MD5:  

[Full-disclosure] [USN-331-1] Linux kernel vulnerabilities

2006-08-03 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-331-1August 03, 2006
linux-source-2.6.15 vulnerabilities
CVE-2006-2934, CVE-2006-2935, CVE-2006-2936
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  linux-image-2.6.15-26-3862.6.15-26.46
  linux-image-2.6.15-26-6862.6.15-26.46
  linux-image-2.6.15-26-amd64-generic  2.6.15-26.46
  linux-image-2.6.15-26-amd64-k8   2.6.15-26.46
  linux-image-2.6.15-26-amd64-server   2.6.15-26.46
  linux-image-2.6.15-26-amd64-xeon 2.6.15-26.46
  linux-image-2.6.15-26-hppa32 2.6.15-26.46
  linux-image-2.6.15-26-hppa32-smp 2.6.15-26.46
  linux-image-2.6.15-26-hppa64 2.6.15-26.46
  linux-image-2.6.15-26-hppa64-smp 2.6.15-26.46
  linux-image-2.6.15-26-itanium2.6.15-26.46
  linux-image-2.6.15-26-itanium-smp2.6.15-26.46
  linux-image-2.6.15-26-k7 2.6.15-26.46
  linux-image-2.6.15-26-mckinley   2.6.15-26.46
  linux-image-2.6.15-26-mckinley-smp   2.6.15-26.46
  linux-image-2.6.15-26-powerpc2.6.15-26.46
  linux-image-2.6.15-26-powerpc-smp2.6.15-26.46
  linux-image-2.6.15-26-powerpc64-smp  2.6.15-26.46
  linux-image-2.6.15-26-server 2.6.15-26.46
  linux-image-2.6.15-26-server-bigiron 2.6.15-26.46
  linux-image-2.6.15-26-sparc642.6.15-26.46
  linux-image-2.6.15-26-sparc64-smp2.6.15-26.46

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Please note that Ubuntu 5.04 and 5.10 are also affected by these
flaws. An update is in preparation and will be released shortly.

Details follow:

A Denial of service vulnerability was reported in iptables' SCTP
conntrack module. On computers which use this iptables module, a
remote attacker could expoit this to trigger a kernel crash.
(CVE-2006-2934)

A buffer overflow has been discovered in the dvd_read_bca() function.
By inserting a specially crafted DVD, USB stick, or similar
automatically mounted removable device, a local user could crash the
machine or potentially even execute arbitrary code with full root
privileges. (CVE-2006-2935)

The ftdi_sio driver for serial USB ports did not limit the amount of
pending data to be written. A local user could exploit this to drain
all available kernel memory and thus render the system unusable.
(CVE-2006-2936)

Additionally, this update fixes a range of bugs.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.46.diff.gz
  Size/MD5:  2176265 7e58cd466b0806ef230dd7db1bb11410

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.46.dsc
  Size/MD5: 2379 d24f2db881c6169c9a1b8500ff413e5e

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz
  Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-26.46_all.deb
  Size/MD5:  5159244 4bf4e66f6217bfe273208d9d2b12d2b4

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-26.46_all.deb
  Size/MD5:88218 f9e5a58e908d0e64248e8a93df25cdda

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.46_all.deb
  Size/MD5: 44519570 d74769581d9cbcaf46cec3982078cc20

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
  Size/MD5:22354 b46dd65aaa4f67a7b0c09c97ee669a88

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
  Size/MD5:44766 b7d6d5a3ea9591159a386d50467a3209

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
  Size/MD5: 2312 157bdcb2afb69c6ab737c911285634c8

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
  Size/MD5:36194 7a7ee0ba8f86095feb78a043eea3fc03

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
  Size/MD5:   102030 8e0629b9b7a003f6f6e5bfdf30a8684d


[Full-disclosure] [USN-332-1] gnupg vulnerability

2006-08-03 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-332-1August 03, 2006
gnupg vulnerability
CVE-2006-3746
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  gnupg1.2.5-3ubuntu5.5

Ubuntu 5.10:
  gnupg1.4.1-1ubuntu1.4

Ubuntu 6.06 LTS:
  gnupg1.4.2.2-1ubuntu2.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Evgeny Legerov discovered that gnupg did not sufficiently check the
validity of the comment and a control field. Specially crafted GPG
data could cause a buffer overflow. This could be exploited to execute
arbitrary code with the user's privileges if an attacker can trick an
user into processing a malicious encrypted/signed document with gnupg.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.5.diff.gz
  Size/MD5:67172 29ae368ce975c0ba45f5f8faab3544eb

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.5.dsc
  Size/MD5:  654 b77427b0e347fd51822fbded59629c39
http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5.orig.tar.gz
  Size/MD5:  3645308 9109ff94f7a502acd915a6e61d28d98a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.5_amd64.deb
  Size/MD5:   806304 ed9984ee4c43817ad4bfaac0318dacd2

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.2.5-3ubuntu5.5_amd64.udeb
  Size/MD5:   146492 1761ff0057e8c5fc1290bb6fea061fff

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.5_i386.deb
  Size/MD5:   750870 327780d0bc5b4492cfb2d91d81ce1e4d

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.2.5-3ubuntu5.5_i386.udeb
  Size/MD5:   121414 755b78879ae2ff649831bc4258ec9cd0

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.5_powerpc.deb
  Size/MD5:   806802 659c72a26c312d0a21dfca0ef8168dc1

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.2.5-3ubuntu5.5_powerpc.udeb
  Size/MD5:   135552 738c35bc6fce9b6c23a85bcd8e805d31

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.4.diff.gz
  Size/MD5:21517 ce1cea807240a851dc29c0ad1c8e3824

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.4.dsc
  Size/MD5:  684 75bea35501b917876414e63811e4724f
http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1.orig.tar.gz
  Size/MD5:  4059170 1cc77c6943baaa711222e954bbd785e5

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.4_amd64.deb
  Size/MD5:  1136488 845e1771e0f8437a7d77b8ffcdc13b5a

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.4_amd64.udeb
  Size/MD5:   152266 3a4de994f65e12058b69eeb3940d8c9f

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.4_i386.deb
  Size/MD5:  1044632 f8da3941df01cced12e35fb0c4bf3e53

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.4_i386.udeb
  Size/MD5:   130694 3af2232b978645923226a0cb6714475d

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.4_powerpc.deb
  Size/MD5:  1119760 3a01f0ee2ba319d6d884b84f82b25f2d

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.4_powerpc.udeb
  Size/MD5:   140248 a61c84caeecffb3b3c3207b28a84e8ab

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.4_sparc.deb
  Size/MD5:  1064344 258595b36dd297f5100cc82f59717e54

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.4_sparc.udeb
  Size/MD5:   139584 58cc4a91254ea52878b4df2873ad22c2

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.2.diff.gz
  Size/MD5:20451 b0c637087a904197f957c32b6364417d

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.2.dsc
  Size/MD5:  692 84098e8a7001961c8141eb8ea4f3dcde


[Full-disclosure] [USN-330-1] tiff vulnerabilities

2006-08-02 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-330-1August 02, 2006
tiff vulnerabilities
CVE-2006-3459, CVE-2006-3460, CVE-2006-3461, CVE-2006-3462,
CVE-2006-3463, CVE-2006-3464, CVE-2006-3465
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libtiff4 3.6.1-5ubuntu0.6

Ubuntu 5.10:
  libtiff4 3.7.3-1ubuntu1.5

Ubuntu 6.06 LTS:
  libtiff4 3.7.4-1ubuntu3.2

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

Tavis Ormandy discovered that the TIFF library did not sufficiently
check handled images for validity. By tricking an user or an automated
system into processing a specially crafted TIFF image, an attacker
could exploit these weaknesses to execute arbitrary code with the
target application's privileges.

This library is used in many client and server applications, thus you
should reboot your computer after the upgrade to ensure that all
running programs use the new version of the library.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1-5ubuntu0.6.diff.gz
  Size/MD5:30691 49722c5266cd7abd26af4e2930806b9c
http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1-5ubuntu0.6.dsc
  Size/MD5:  681 7ad4b09fd3ae17ac3469befee5a0bdbe
http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1.orig.tar.gz
  Size/MD5:   848760 bd252167a20ac7910ab3bd2b3ee9e955

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.6_amd64.deb
  Size/MD5:   172866 61bd186e530802e933781ec95ecc75a9

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.6_amd64.deb
  Size/MD5:   459690 585475d89d429435077cf76a1ea26137

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.6_amd64.deb
  Size/MD5:   113776 4780d38316de3537a1b55ba45f2fe735

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.6_i386.deb
  Size/MD5:   155968 389e7151c6cea9cee5c4a5f95a13b77d

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.6_i386.deb
  Size/MD5:   441462 cb6274340b13def24594a42a90b68251

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.6_i386.deb
  Size/MD5:   104694 16b136cb563918fd5cbea35772af378a

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.6_powerpc.deb
  Size/MD5:   188188 6749e48524a1dae0a6ff5d7e3a2de413

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.6_powerpc.deb
  Size/MD5:   464676 6074afb200b1b839eb612e195a9cdfa7

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.6_powerpc.deb
  Size/MD5:   115188 956c9014eb02b96505808da786ad5a76

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3-1ubuntu1.5.diff.gz
  Size/MD5:17432 462f974440018758467c211ae4287a38
http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3-1ubuntu1.5.dsc
  Size/MD5:  756 588e4e00764c879078155ea33e75ff09
http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3.orig.tar.gz
  Size/MD5:  1268182 48fbef3d76a6253699f28f49c8f25a8b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.3-1ubuntu1.5_amd64.deb
  Size/MD5:48612 4963d3463e3dc627d7587bddaa49141c

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.3-1ubuntu1.5_amd64.deb
  Size/MD5:   220048 34fbca2f7003642e99a2441ef83aabf7

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.3-1ubuntu1.5_amd64.deb
  Size/MD5:   282498 2b30fa42f5e443215af23faead443c9f

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.3-1ubuntu1.5_amd64.deb
  Size/MD5:   472892 1b3f3aa4f34d2afc75ecece36ff5af09

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.3-1ubuntu1.5_amd64.deb
  Size/MD5:43448 e60c1e20c08710c65445587d7735a231

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.3-1ubuntu1.5_i386.deb
  Size/MD5:48018 96eaa5eb44709bedeb613b9f1a22931a


[Full-disclosure] [USN-327-2] firefox regression

2006-08-01 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-327-2August 01, 2006
firefox regression
https://bugzilla.mozilla.org/show_bug.cgi?id=346167
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  firefox  1.5.dfsg+1.5.0.5-0ubuntu6.06.1

After a standard system upgrade you need to restart Firefox to effect
the necessary changes.

Details follow:

USN-327-1 fixed several vulnerabilities in Firefox. Unfortunately the
new version introduced a regression in the handling of streamed media.
Embedded media which were linked with a scheme other than http:// did
not work any more. This update fixes this regression.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.1.diff.gz
  Size/MD5:   175666 687919fcd46adfbb0d7178b5475305c1

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.1.dsc
  Size/MD5: 1113 e442234ffa0a54f87807c1288e47fa5d

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5.orig.tar.gz
  Size/MD5: 44067762 749933c002e158576ec15782fc451e43

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_all.deb
  Size/MD5:49298 f514abb6f942165f1fc3d5374bbae15a

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_all.deb
  Size/MD5:50184 a7b0bf4028ede77740dc0662a827dcf0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb
  Size/MD5: 47269380 3ad3fdf041a077e1fd691138bb9bfeb6

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb
  Size/MD5:  2796780 4d08389abd46a4cfb1ea417a8ad5fa3b

http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb
  Size/MD5:   216230 e1d98cf540498d5fc02661a5486db16d

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb
  Size/MD5:82448 5a283f508971dc233a454789387b4132

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb
  Size/MD5:  9400588 cf74b732b4ba49854c319c00d3d82a4b

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb
  Size/MD5:   218920 9c0d2ee7cf67eeb17e850fd730f3b8fb

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb
  Size/MD5:   161968 57e24fd2d917b17029289f334c04b17c

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb
  Size/MD5:   235846 b3a13148395af99060cd418e9a23705d

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb
  Size/MD5:   757540 3c825373eeda432f0fe8fa4e97d00fec

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb
  Size/MD5: 43837564 d1bb1e8b82e23a0fbf07e57c56eed7af

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb
  Size/MD5:  2796780 49e77e98de42a21d531468df796e2296

http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb
  Size/MD5:   209648 500f92b789dc30a7cce74e58c339bbdd

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb
  Size/MD5:74834 ec2db908691d504cf714a4c4ea5b411e

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb
  Size/MD5:  7916466 272500e32887186917f370dcc09661ee

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb
  Size/MD5:   218924 a80027c5868b295ee9e81d1244ec568e

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb
  Size/MD5:   146678 18754a6f6caa2d3e83114d6971f7ff3a

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb
  Size/MD5:   235800 0ebc9b9ddd1624df7351c888a9ad597f


[Full-disclosure] [USN-329-1] Thunderbird vulnerabilities

2006-07-28 Thread Martin Pitt
 architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.5-0ubuntu0.6.06_powerpc.deb
  Size/MD5:  3522822 737c06d9578eb3c7ba429dbe42ede660

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu4.2_powerpc.deb
  Size/MD5:   326256 39da78e5f62652d94df1d9d095ae4cf7

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.5-0ubuntu0.6.06_powerpc.deb
  Size/MD5:   190340 0f62bc53b3dc4de8770dc76f2fb646a1

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.5-0ubuntu0.6.06_powerpc.deb
  Size/MD5:57998 2f9a1d04b2a8914d8e7c485ad3375a55

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.5-0ubuntu0.6.06_powerpc.deb
  Size/MD5: 11541936 144df67e5f39d8d91c8444b9c207d25c

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.5-0ubuntu0.6.06_sparc.deb
  Size/MD5:  3519436 a7d0f52ec3a703ff1518b0b0cf3de2c9

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu4.2_sparc.deb
  Size/MD5:   324596 9cd0b2ae81740e21ffa8c167638b852f

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.5-0ubuntu0.6.06_sparc.deb
  Size/MD5:   187786 64628494f9e7967da629f7a8308f5006

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.5-0ubuntu0.6.06_sparc.deb
  Size/MD5:55876 fd982c5e65b6b135f817eabd10775416

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.5-0ubuntu0.6.06_sparc.deb
  Size/MD5: 10744066 b057f688569d2fa53aac6257bed38128

- End forwarded message -

-- 
Martin Pitthttp://www.piware.de
Ubuntu Developer   http://www.ubuntu.com
Debian Developer   http://www.debian.org

In a world without walls and fences, who needs Windows and Gates?


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-324-1] freetype vulnerability

2006-07-27 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-324-1  July 27, 2006
freetype vulnerability
CVE-2006-3467
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libfreetype6 2.1.7-2.3ubuntu0.2

Ubuntu 5.10:
  libfreetype6 2.1.7-2.4ubuntu1.2

Ubuntu 6.06 LTS:
  libfreetype6 2.1.10-1ubuntu2.2

After a standard system upgrade you need to restart your session to
effect the necessary changes.

Details follow:

An integer overflow has been discovered in the FreeType library. By
tricking a user into installing and/or opening a specially crafted
font file, these could be exploited to execute arbitrary code with the
privileges of that user.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.3ubuntu0.2.diff.gz
  Size/MD5:55469 22d16c4f3ab2c4eab015dcc8f336ce99

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.3ubuntu0.2.dsc
  Size/MD5:  695 ec0bfc2c291757e9d30db54201946ba6

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7.orig.tar.gz
  Size/MD5:  1245623 991ff86e88b075ba363e876f4ea58680

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.3ubuntu0.2_amd64.deb
  Size/MD5:76246 1718a6f444257aeb573f019228311dd8

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.3ubuntu0.2_amd64.deb
  Size/MD5:   723688 8651fcec88e545b6bd41ead719c3524b

http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.3ubuntu0.2_amd64.udeb
  Size/MD5:   238240 d75ec89b93e23495695d83cf04e106e7

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.3ubuntu0.2_amd64.deb
  Size/MD5:   389520 47f2467f64491f023fde169b2e1daac0

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.3ubuntu0.2_i386.deb
  Size/MD5:57074 b8dfc28165ef707d7ccff6f1ddcd78b7

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.3ubuntu0.2_i386.deb
  Size/MD5:   688166 272205d732d611ccc9059d746a0fec82

http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.3ubuntu0.2_i386.udeb
  Size/MD5:   208104 b5ff69244ebd5fafc405093f4c66257b

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.3ubuntu0.2_i386.deb
  Size/MD5:   358920 df695f8579c9cfced57946f1694a5971

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.3ubuntu0.2_powerpc.deb
  Size/MD5:81976 d32762739aa42a17e83e7782ea7593ab

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.3ubuntu0.2_powerpc.deb
  Size/MD5:   729990 7ac5ac91e87b2f7397dad7badfd8fe82

http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.3ubuntu0.2_powerpc.udeb
  Size/MD5:   227726 80e32a6fe3342931d40fa66fde70d1c5

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.3ubuntu0.2_powerpc.deb
  Size/MD5:   378686 5ec5252b14c13f9aafe0942c7200c3d7

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.4ubuntu1.2.diff.gz
  Size/MD5:56886 bfb6ddcd3ee0b1b2165d69242e8cf795

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.4ubuntu1.2.dsc
  Size/MD5:  695 ac8e7fbf7319163e1c1b80ddd39cd2b8

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7.orig.tar.gz
  Size/MD5:  1245623 991ff86e88b075ba363e876f4ea58680

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.4ubuntu1.2_amd64.deb
  Size/MD5:75538 f67d2e22c7b2273cd11354ec371f8874

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.4ubuntu1.2_amd64.deb
  Size/MD5:   722922 a127c57c8962185c2a4dc5143d8c76fc

http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.4ubuntu1.2_amd64.udeb
  Size/MD5:   241766 e3d145f8588068d7cd8a2442ffe7f503

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.4ubuntu1.2_amd64.deb
  Size/MD5:   392870 ce6b8f293838423189e2192f763f22cd

  i386 architecture (x86 compatible Intel/AMD)

  

[Full-disclosure] [USN-325-1] ruby1.8 vulnerability

2006-07-27 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-325-1  July 27, 2006
ruby1.8 vulnerability
CVE-2006-3694
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libruby1.8   1.8.1+1.8.2pre4-1ubuntu0.4
  ruby1.8  1.8.1+1.8.2pre4-1ubuntu0.4

Ubuntu 5.10:
  libruby1.8   1.8.2-9ubuntu1.2
  ruby1.8  1.8.2-9ubuntu1.2

Ubuntu 6.06 LTS:
  libruby1.8   1.8.4-1ubuntu1.1
  ruby1.8  1.8.4-1ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

The alias function, certain directory operations, and regular
expressions did not correctly implement safe levels. Depending on the
application these flaws might allow attackers to bypass safe level
restrictions and perform unintended operations.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4.diff.gz
  Size/MD5:35943 8bc7f03873488b5ba411faa7704bfb5c

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4.dsc
  Size/MD5: 1408 147b649550be4fc13a0ade3efc592ea6

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.1+1.8.2pre4.orig.tar.gz
  Size/MD5:  3598517 1bf195093ed5279412f1047f70fafded

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/irb1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb
  Size/MD5:   149384 77b47cd028bb50976b9952cf798cb44b

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdrb-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb
  Size/MD5:   132148 a68132fb03500279404e95ab8be56e95

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/liberb-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb
  Size/MD5:   115970 1431edca2793e1582a71a0c331a3a086

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/librexml-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb
  Size/MD5:   169158 f854687a927f84fa23f0750952318f16

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libsoap-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb
  Size/MD5:   217756 62d040e30611cf6c5c20274a72bcec2c

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtest-unit-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb
  Size/MD5:   134918 91571960ed6b2b173ffe1e42d86960fe

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libwebrick-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb
  Size/MD5:   140426 92a1686826fd8e7822a9784dd2278837

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libxmlrpc-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb
  Size/MD5:   129898 b753eb69448986f6beed19912d65ed51

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/rdoc1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb
  Size/MD5:   216578 71ad64d4993083f7ed2d61a44b24e7b8

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ri1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb
  Size/MD5:   441172 f6942ad673d322091d0003d1f4d01666

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-elisp_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb
  Size/MD5:   125626 4b863f01da97d59a17bb081a44d0d221

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-examples_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb
  Size/MD5:   135164 a98ab744ecb448c4f4890c8f419ce9e7

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libbigdecimal-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_amd64.deb
  Size/MD5:   153212 318a99a71b7f2816ee74f8a9c0776c39

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libcurses-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_amd64.deb
  Size/MD5:   125694 c7a8c55acf413b5a13d0444ec5365ec5

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_amd64.deb
  Size/MD5:   118328 69cefa376aecf9acb219d1b51441c42b

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdl-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_amd64.deb
  Size/MD5:   152166 f6e7a2cccaed6c80d33f3b9612605e42

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_amd64.deb
  Size/MD5:   119880 231c330121a586d5e57396128cf277ca

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libiconv-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_amd64.deb
  Size/MD5:   113820 a322db798a82177cfd8224614384b571


[Full-disclosure] [USN-326-1] heartbeat vulnerability

2006-07-27 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-326-1  July 27, 2006
heartbeat vulnerability
CVE-2006-3815
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  heartbeat1.2.3-3ubuntu1.2

Ubuntu 5.10:
  heartbeat1.2.3-12ubuntu0.1

Ubuntu 6.06 LTS:
  heartbeat1.2.4-2ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Yan Rong Ge discovered that heartbeat did not set proper permissions
for an allocated shared memory segment. A local attacker could exploit
this to render the heartbeat service unavailable (Denial of
Service).


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.2.diff.gz
  Size/MD5:   246093 3ec140cdfd4b1366ebc80949929a1e53

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.2.dsc
  Size/MD5:  847 756f89385ad79532421877d21f2dc5ab

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3.orig.tar.gz
  Size/MD5:  1772513 9fd126e5dff51cc8c1eee223c252a4af

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/h/heartbeat/ldirectord_1.2.3-3ubuntu1.2_all.deb
  Size/MD5:44696 a30cdadd183ab0648dac48a3a12e55aa

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat-dev_1.2.3-3ubuntu1.2_amd64.deb
  Size/MD5:   125424 12f22ff5c4bbe7a8d430fd7f1c0eb061

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.2_amd64.deb
  Size/MD5:   533132 26e72b2a4f97b7e2e103be2aff53e1a0

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils-dev_1.2.3-3ubuntu1.2_amd64.deb
  Size/MD5:61124 ab240db5ab465c9d4c1b05b22ac67b90

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils0_1.2.3-3ubuntu1.2_amd64.deb
  Size/MD5:51812 4da42c1ca980eb62d2aa7905bab30227

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith-dev_1.2.3-3ubuntu1.2_amd64.deb
  Size/MD5:29280 68a090e862161255bf30b5564839dcf0

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith0_1.2.3-3ubuntu1.2_amd64.deb
  Size/MD5:79580 13581bf67cc41797f6209c7e9ac8522f

http://security.ubuntu.com/ubuntu/pool/universe/h/heartbeat/stonith_1.2.3-3ubuntu1.2_amd64.deb
  Size/MD5:30306 d6c71a534f3d90724a1e9aa2bf878d19

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat-dev_1.2.3-3ubuntu1.2_i386.deb
  Size/MD5:   114864 2450cddfab1fb927ebaa058d79f672d4

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.2_i386.deb
  Size/MD5:   489662 e01b9cd2f15f109a7827fa7fcc95def2

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils-dev_1.2.3-3ubuntu1.2_i386.deb
  Size/MD5:57264 e2e160e1afd3192ed1b02dc02d8bb423

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils0_1.2.3-3ubuntu1.2_i386.deb
  Size/MD5:46772 1f9b32a6694da698c5b7dd471ae8e611

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith-dev_1.2.3-3ubuntu1.2_i386.deb
  Size/MD5:28866 61a9b5a8e7a05a269627f2fd996c36da

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith0_1.2.3-3ubuntu1.2_i386.deb
  Size/MD5:69270 1c92e784e1be5912a0b3fc11a4cf3517

http://security.ubuntu.com/ubuntu/pool/universe/h/heartbeat/stonith_1.2.3-3ubuntu1.2_i386.deb
  Size/MD5:29704 1f5ad3c81122f0b93dac7552f889d953

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat-dev_1.2.3-3ubuntu1.2_powerpc.deb
  Size/MD5:   126936 d80eca2b83b8c4b4b5a5af854d1a6824

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.2_powerpc.deb
  Size/MD5:   557100 5170ed8f4bad84fc13baba34cf925f78

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils-dev_1.2.3-3ubuntu1.2_powerpc.deb
  Size/MD5:61186 bac65215be030e0181fb51aaf673b27c

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils0_1.2.3-3ubuntu1.2_powerpc.deb
  Size/MD5:52820 8af7fd485f7a546aa266a83f14022a89

http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith-dev_1.2.3-3ubuntu1.2_powerpc.deb
  Size/MD5:29450 b0264aea8ccf20b743d6ef4291f35b78


[Full-disclosure] [USN-327-1] firefox vulnerabilities

2006-07-27 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-327-1  July 27, 2006
firefox vulnerabilities
CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802,
CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807,
CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811,
CVE-2006-3812
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  firefox  1.5.dfsg+1.5.0.5-0ubuntu6.06

After a standard system upgrade you need to restart Firefox to effect
the necessary changes.

Please note that Firefox 1.0.8 in Ubuntu 5.10 and Ubuntu 5.04 are also
affected by these problems. Updates for these Ubuntu releases will be
delayed due to upstream dropping support for this Firefox version. We
strongly advise that you disable JavaScript to disable the attack
vectors for most vulnerabilities if you use one of these Ubuntu
versions.

Details follow:

Various flaws have been reported that allow an attacker to execute
arbitrary code with user privileges by tricking the user into opening
a malicious URL. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801,
CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807,
CVE-2006-3809, CVE-2006-3811, CVE-2006-3812)

cross-site scripting vulnerabilities were found in the
XPCNativeWrapper() function and native DOM method handlers. A
malicious web site could exploit these to modify the contents or steal
confidential data (such as passwords) from other opened web pages.
(CVE-2006-3802, CVE-2006-3810)

A bug was found in the script handler for automatic proxy
configuration. A malicious proxy could send scripts which could
execute arbitrary code with the user's privileges. (CVE-2006-3808)

Please see 

  http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox

for technical details of these vulnerabilities.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.diff.gz
  Size/MD5:   174602 7be6f5862219ac4cf44f05733f372f2b

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.dsc
  Size/MD5: 1109 252d6acf45b009008a6bc88166e2632f

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5.orig.tar.gz
  Size/MD5: 44067762 749933c002e158576ec15782fc451e43

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb
  Size/MD5:49190 850dd650e7f876dd539e605d9b3026c8

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb
  Size/MD5:50078 c1fa4a40187d9c5b58bd049edb00ce54

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
  Size/MD5: 47269292 167aadc3f03b4e1b7cb9ed826e672983

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
  Size/MD5:  2796768 b54592d0bd736f6ee12a90987771bc59

http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
  Size/MD5:   216136 79fa6c69ffb0dd6037e56d1ba538ff64

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
  Size/MD5:82358 e2e026d582a7b5352cee4453cef0fe45

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
  Size/MD5:  9400544 a9d0b804a4374dc636bb79968a2bce5c

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
  Size/MD5:   218822 a09476caea7d8d73d6a2f534bd494493

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
  Size/MD5:   161876 0e0e65348dba8167b4891b173baa8f0d

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
  Size/MD5:   235746 064fc1434a315f857ee92f60fd49d772

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
  Size/MD5:   757458 bd6a5e28e05a04a5deca731ab29f70e4

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
  Size/MD5: 43837610 a7e4a535262f8a5d5cb0ace7ed785237

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
  Size/MD5: 

[Full-disclosure] [USN-328-1] Apache vulnerability

2006-07-27 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-328-1  July 27, 2006
apache2 vulnerability
CVE-2006-3747
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  apache2-mpm-perchild 2.0.53-5ubuntu5.6
  apache2-mpm-prefork  2.0.53-5ubuntu5.6
  apache2-mpm-threadpool   2.0.53-5ubuntu5.6
  apache2-mpm-worker   2.0.53-5ubuntu5.6

Ubuntu 5.10:
  apache2-mpm-perchild 2.0.54-5ubuntu4.1
  apache2-mpm-prefork  2.0.54-5ubuntu4.1
  apache2-mpm-threadpool   2.0.54-5ubuntu4.1
  apache2-mpm-worker   2.0.54-5ubuntu4.1

Ubuntu 6.06 LTS:
  apache2-mpm-perchild 2.0.55-4ubuntu2.1
  apache2-mpm-prefork  2.0.55-4ubuntu2.1
  apache2-mpm-worker   2.0.55-4ubuntu2.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Mark Dowd discovered an off-by-one buffer overflow in the mod_rewrite
module's ldap scheme handling. On systems which activate
RewriteEngine on,  a remote attacker could exploit certain rewrite
rules to crash Apache, or potentially even execute arbitrary code
(this has not been verified).

RewriteEngine on is disabled by default. Systems which have this
directive disabled are not affected at all.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.53-5ubuntu5.6.diff.gz
  Size/MD5:   109849 b9346454def0a9b0ed83e5c31e5715d1

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.53-5ubuntu5.6.dsc
  Size/MD5: 1159 a4def08b6aff949a8503606f49614bfd

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.53.orig.tar.gz
  Size/MD5:  6925351 40507bf19919334f07355eda2df017e5

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.0.53-5ubuntu5.6_all.deb
  Size/MD5:  3578948 9c1bfb6108268f5438673aa522459e9e

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-threadpool_2.0.53-5ubuntu5.6_all.deb
  Size/MD5:34364 8a61625863e9135f4ad5bcf4d6b5cb7b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.53-5ubuntu5.6_amd64.deb
  Size/MD5:   826722 d3cbadc06958f8247345bcf851047f06

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.53-5ubuntu5.6_amd64.deb
  Size/MD5:   221644 5759cbbf3cbeffcf796967de7ed1edf6

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.53-5ubuntu5.6_amd64.deb
  Size/MD5:   217284 a65b171976c4575530fc6e8f06f48822

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.53-5ubuntu5.6_amd64.deb
  Size/MD5:   220692 f39e9387d0fde69d26530f1340ebd2b4

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.53-5ubuntu5.6_amd64.deb
  Size/MD5:   168046 692d290a85d73e77b8ca6657fc71cc09

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.53-5ubuntu5.6_amd64.deb
  Size/MD5:   168822 f2677841cd39b26c9262b18752cc4f68

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.53-5ubuntu5.6_amd64.deb
  Size/MD5:93502 1cd458dd0ad1c5e6190eef8115066061

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.53-5ubuntu5.6_amd64.deb
  Size/MD5:34294 4405aaf5e8d6d5ba6ae43cefba440323

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.53-5ubuntu5.6_amd64.deb
  Size/MD5:   279670 bee6e2360d03837a9f474f4519a2b449

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.53-5ubuntu5.6_amd64.deb
  Size/MD5:   138178 2f74d6f152fc98202903688b30185c77

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.53-5ubuntu5.6_i386.deb
  Size/MD5:   789726 fd570ca5737770335853e2f4e5f260b5

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.53-5ubuntu5.6_i386.deb
  Size/MD5:   201924 1a4dae1a8a9c6ef8ce9732d06e4fddf6

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.53-5ubuntu5.6_i386.deb
  Size/MD5:   197692 e8c111bd39f8911463aabda812946282

http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.53-5ubuntu5.6_i386.deb
  Size/MD5:   201118 ac29377492d905679525927368fc9735


[Full-disclosure] [USN-297-3] Thunderbird vulnerabilities

2006-07-26 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-297-3  July 26, 2006
mozilla-thunderbird vulnerabilities
CVE-2006-2775, CVE-2006-2776, CVE-2006-2778, CVE-2006-2779,
CVE-2006-2780, CVE-2006-2781, CVE-2006-2783, CVE-2006-2784,
CVE-2006-2787
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  mozilla-thunderbird  1.0.8-0ubuntu05.04.1

Ubuntu 5.10:
  mozilla-thunderbird  1.0.8-0ubuntu05.10.2

After a standard system upgrade you need to restart Thunderbird to
effect the necessary changes.

Details follow:

USN-297-1 fixed several vulnerabilities in Thunderbird for the Ubuntu
6.06 LTS release. This update provides the corresponding fixes for
Ubuntu 5.04 and Ubuntu 5.10.

For reference, these are the details of the original USN:

  Jonas Sicking discovered that under some circumstances persisted XUL
  attributes are associated with the wrong URL. A malicious web site
  could exploit this to execute arbitrary code with the privileges of
  the user. (MFSA 2006-35, CVE-2006-2775)

  Paul Nickerson discovered that content-defined setters on an object
  prototype were getting called by privileged UI code. It was
  demonstrated that this could be exploited to run arbitrary web
  script with full user privileges (MFSA 2006-37, CVE-2006-2776).

  Mikolaj Habryn discovered a buffer overflow in the crypto.signText()
  function. By sending an email with malicious JavaScript to an user,
  and that user enabled JavaScript in Thunderbird (which is not the
  default and not recommended), this could potentially be exploited to
  execute arbitrary code with the user's privileges. (MFSA 2006-38,
  CVE-2006-2778)

  The Mozilla developer team discovered several bugs that lead to
  crashes with memory corruption. These might be exploitable by
  malicious web sites to execute arbitrary code with the privileges of
  the user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780)

  Masatoshi Kimura discovered a memory corruption (double-free) when
  processing a large VCard with invalid base64 characters in it. By
  sending a maliciously crafted set of VCards to a user, this could
  potentially be exploited to execute arbitrary code with the user's
  privileges. (MFSA 2006-40, CVE-2006-2781)

  Masatoshi Kimura found a way to bypass web input sanitizers which
  filter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)'
  characters into the HTML code (e. g. 'scr[BOM]ipt'), these filters
  might not recognize the tags anymore; however, Thunderbird would
  still execute them since BOM markers are filtered out before
  processing a mail containing JavaScript. (MFSA 2006-42,
  CVE-2006-2783)

  Kazuho Oku discovered various ways to perform HTTP response
  smuggling when used with certain proxy servers. Due to different
  interpretation of nonstandard HTTP headers in Thunderbird and the
  proxy server, a malicious HTML email can exploit this to send back
  two responses to one request. The second response could be used to
  steal login cookies or other sensitive data from another opened web
  site. (MFSA 2006-33, CVE-2006-2786)

  It was discovered that JavaScript run via EvalInSandbox() can escape
  the sandbox. Malicious scripts received in emails containing
  JavaScript could use these privileges to execute arbitrary code with
  the user's privileges. (MFSA 2006-31, CVE-2006-2787)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04.1.diff.gz
  Size/MD5:98300 a4dffa1705bd280224188e7bbc7781dd

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04.1.dsc
  Size/MD5:  946 7eebd4d62af685dd0ce74d5ff741c92c

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8.orig.tar.gz
  Size/MD5: 32849510 ae345f1b722d8f3a977af4fd358d27b0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.04.1_amd64.deb
  Size/MD5:  3347854 519c296b742dc6e6d5c308b0b6c5a433

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.04.1_amd64.deb
  Size/MD5:   145244 9a8d5c4ade62afdb187022df1b188099

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.04.1_amd64.deb
  Size/MD5:27718 aa28f71d2133d0810bbf166d86c68dc7


[Full-disclosure] [USN-296-2] Firefox vulnerabilities

2006-07-25 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-296-2  July 25, 2006
firefox, mozilla-firefox vulnerabilities
CVE-2006-2775, CVE-2006-2776, CVE-2006-2777, CVE-2006-2778,
CVE-2006-2779, CVE-2006-2780, CVE-2006-2782, CVE-2006-2783,
CVE-2006-2784, CVE-2006-2785, CVE-2006-2786, CVE-2006-2787
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  mozilla-firefox  1.0.8-0ubuntu5.04.1

Ubuntu 5.10:
  firefox  1.0.8-0ubuntu5.10.1

After a standard system upgrade you need to restart Firefox to effect
the necessary changes.

Details follow:

USN-296-1 fixed several vulnerabilities in Firefox for the Ubuntu 6.06
LTS release. This update provides the corresponding fixes for Ubuntu
5.04 and Ubuntu 5.10.

For reference, these are the details of the original USN:

  Jonas Sicking discovered that under some circumstances persisted XUL
  attributes are associated with the wrong URL. A malicious web site
  could exploit this to execute arbitrary code with the privileges of
  the user. (MFSA 2006-35, CVE-2006-2775)
  
  Paul Nickerson discovered that content-defined setters on an object
  prototype were getting called by privileged UI code. It was
  demonstrated that this could be exploited to run arbitrary web script
  with full user privileges (MFSA 2006-37, CVE-2006-2776). A similar
  attack was discovered by moz_bug_r_a4 that leveraged SelectionObject
  notifications that were called in privileged context. (MFSA 2006-43,
  CVE-2006-2777)
  
  Mikolaj Habryn discovered a buffer overflow in the crypto.signText()
  function. By tricking a user to visit a site with an SSL certificate
  with specially crafted optional Certificate Authority name
  arguments, this could potentially be exploited to execute arbitrary
  code with the user's privileges. (MFSA 2006-38, CVE-2006-2778)
  
  The Mozilla developer team discovered several bugs that lead to
  crashes with memory corruption. These might be exploitable by
  malicious web sites to execute arbitrary code with the privileges of
  the user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780, CVE-2006-2788)
  
  Chuck McAuley reported that the fix for CVE-2006-1729 (file stealing
  by changing input type) was not sufficient to prevent all variants of
  exploitation. (MFSA 2006-41, CVE-2006-2782)
  
  Masatoshi Kimura found a way to bypass web input sanitizers which
  filter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)'
  characters into the HTML code (e. g. 'scr[BOM]ipt'), these filters
  might not recognize the tags anymore; however, Firefox would still
  execute them since BOM markers are filtered out before processing the
  page. (MFSA 2006-42, CVE-2006-2783)
  
  Paul Nickerson noticed that the fix for CVE-2005-0752 (JavaScript
  privilege escalation on the plugins page) was not sufficient to
  prevent all variants of exploitation. (MFSA 2006-36, CVE-2006-2784)
  
  Paul Nickerson demonstrated that if an attacker could convince a user
  to right-click on a broken image and choose View Image from the
  context menu then he could get JavaScript to run on a site of the
  attacker's choosing. This could be used to steal login cookies or
  other confidential information from the target site. (MFSA 2006-34,
  CVE-2006-2785)
  
  Kazuho Oku discovered various ways to perform HTTP response smuggling
  when used with certain proxy servers. Due to different interpretation
  of nonstandard HTTP headers in Firefox and the proxy server, a
  malicious web site can exploit this to send back two responses to one
  request. The second response could be used to steal login cookies or
  other sensitive data from another opened web site. (MFSA 2006-33,
  CVE-2006-2786)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-firefox/mozilla-firefox_1.0.8-0ubuntu5.04.1.diff.gz
  Size/MD5:   824134 dcdb07a69073007d24bafca99044b67f

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-firefox/mozilla-firefox_1.0.8-0ubuntu5.04.1.dsc
  Size/MD5: 1064 fec5050f2d3a55468ffa489df440e07a

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-firefox/mozilla-firefox_1.0.8.orig.tar.gz
  Size/MD5: 41545571 74feb5a7af741bc5e24f1a622ce698c8

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-firefox/mozilla-firefox-dev_1.0.8-0ubuntu5.04.1_amd64.deb
  Size/MD5:  2634972 29670d8ce13ce01319c4dfa0009c943c

http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.8-0ubuntu5.04.1_amd64.deb
  Size/MD5:   159452 

[Full-disclosure] [USN-323-1] mozilla vulnerabilities

2006-07-25 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-323-1  July 25, 2006
mozilla vulnerabilities
CVE-2006-2775, CVE-2006-2776, CVE-2006-2777, CVE-2006-2778,
CVE-2006-2779, CVE-2006-2780, CVE-2006-2781, CVE-2006-2782,
CVE-2006-2783, CVE-2006-2784, CVE-2006-2785, CVE-2006-2786,
CVE-2006-2787
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  mozilla-browser  2:1.7.13-0ubuntu05.04.1
  mozilla-mailnews 2:1.7.13-0ubuntu05.04.1
  mozilla-psm  2:1.7.13-0ubuntu05.04.1

Ubuntu 5.10:
  mozilla-browser  2:1.7.13-0ubuntu5.10.1
  mozilla-mailnews 2:1.7.13-0ubuntu5.10.1
  mozilla-psm  2:1.7.13-0ubuntu5.10.1

After a standard system upgrade you need to restart Mozilla to effect
the necessary changes.

Details follow:

Jonas Sicking discovered that under some circumstances persisted XUL
attributes are associated with the wrong URL. A malicious web site
could exploit this to execute arbitrary code with the privileges of
the user. (MFSA 2006-35, CVE-2006-2775)

Paul Nickerson discovered that content-defined setters on an object
prototype were getting called by privileged UI code. It was
demonstrated that this could be exploited to run arbitrary web script
with full user privileges (MFSA 2006-37, CVE-2006-2776). A similar
attack was discovered by moz_bug_r_a4 that leveraged SelectionObject
notifications that were called in privileged context. (MFSA 2006-43,
CVE-2006-2777)

Mikolaj Habryn discovered a buffer overflow in the crypto.signText()
function. By tricking a user to visit a site with an SSL certificate
with specially crafted optional Certificate Authority name
arguments, this could potentially be exploited to execute arbitrary
code with the user's privileges. (MFSA 2006-38, CVE-2006-2778)

The Mozilla developer team discovered several bugs that lead to
crashes with memory corruption. These might be exploitable by
malicious web sites to execute arbitrary code with the privileges of
the user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780)

Masatoshi Kimura discovered a memory corruption (double-free) when
processing a large VCard with invalid base64 characters in it. By
sending a maliciously crafted set of VCards to a user, this could
potentially be exploited to execute arbitrary code with the user's
privileges. (MFSA 2006-40, CVE-2006-2781)

Chuck McAuley reported that the fix for CVE-2006-1729 (file stealing
by changing input type) was not sufficient to prevent all variants of
exploitation. (MFSA 2006-41, CVE-2006-2782)

Masatoshi Kimura found a way to bypass web input sanitizers which
filter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)'
characters into the HTML code (e. g. 'scr[BOM]ipt'), these filters
might not recognize the tags anymore; however, Mozilla would still
execute them since BOM markers are filtered out before processing the
page. (MFSA 2006-42, CVE-2006-2783)

Paul Nickerson noticed that the fix for CVE-2005-0752 (JavaScript
privilege escalation on the plugins page) was not sufficient to
prevent all variants of exploitation. (MFSA 2006-36, CVE-2006-2784)

Paul Nickerson demonstrated that if an attacker could convince a user
to right-click on a broken image and choose View Image from the
context menu then he could get JavaScript to run on a site of the
attacker's choosing. This could be used to steal login cookies or
other confidential information from the target site. (MFSA 2006-34,
CVE-2006-2785)

Kazuho Oku discovered various ways to perform HTTP response smuggling
when used with certain proxy servers. Due to different interpretation
of nonstandard HTTP headers in Mozilla and the proxy server, a
malicious web site can exploit this to send back two responses to one
request. The second response could be used to steal login cookies or
other sensitive data from another opened web site. (MFSA 2006-33,
CVE-2006-2786)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13-0ubuntu05.04.1.diff.gz
  Size/MD5:   337800 2db7b990124c6c1c1b8e9672ca5d6513

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13-0ubuntu05.04.1.dsc
  Size/MD5: 1140 dff39e5ce49d9743de85eec224192a32

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13.orig.tar.gz
  Size/MD5: 38788839 db906560b5abe488286ad1edc21d52b6

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.13-0ubuntu05.04.1_amd64.deb
  Size/MD5:   168074 

[Full-disclosure] [USN-322-1] Konqueror vulnerability

2006-07-24 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-322-1  July 24, 2006
kdelibs vulnerability
CVE-2006-3672
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  kdelibs  4:3.4.0-0ubuntu3.6

Ubuntu 5.10:
  kdelibs  4:3.4.3-0ubuntu2.1

Ubuntu 6.06 LTS:
  kdelibs  4:3.5.2-0ubuntu18.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

A Denial of Service vulnerability has been reported in the replaceChild()
method in KDE's DOM handler. A malicious remote web page could exploit
this to cause Konqueror to crash.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0-0ubuntu3.6.diff.gz
  Size/MD5:   359009 80e19fdd5fc4e09de50e0abc08dbdc64

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0-0ubuntu3.6.dsc
  Size/MD5: 1334 8e9db12a120c7d9aa45ce4a89748150c

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0.orig.tar.gz
  Size/MD5: 20024253 471740de13cfed37d35eb180fc1b9b38

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.4.0-0ubuntu3.6_all.deb
  Size/MD5:  8013322 0f58397ee85bc8e94222bd887e3e3ed8

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.4.0-0ubuntu3.6_all.deb
  Size/MD5: 12073276 d64b80c5e3f2761a1fee42c4ac61aceb

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0-0ubuntu3.6_all.deb
  Size/MD5:20560 b926d8254eae60a6dfc2f2383c749e8b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.0-0ubuntu3.6_amd64.deb
  Size/MD5:   921980 3b24d216d30e42fe76f114af2ef79e23

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.0-0ubuntu3.6_amd64.deb
  Size/MD5:  1303886 02fdf7d27c3b4191041e1f1ba65dbec3

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4_3.4.0-0ubuntu3.6_amd64.deb
  Size/MD5:  8970482 e4d884c6087a940ed951975ecaf70a16

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.0-0ubuntu3.6_i386.deb
  Size/MD5:   839684 a51679f1f9d6b0819f1aeaff2929cdb8

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.0-0ubuntu3.6_i386.deb
  Size/MD5:  1301354 d5a5d6777bac0d83976ee5d2514a5e36

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4_3.4.0-0ubuntu3.6_i386.deb
  Size/MD5:  8397572 e536bdbc12511bec8e8adcf755d10369

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.0-0ubuntu3.6_powerpc.deb
  Size/MD5:   904730 5eb02eab700a7844b86ed5337f202f57

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.0-0ubuntu3.6_powerpc.deb
  Size/MD5:  1304646 7bc4878395c8c57f20642fb76f0cf0f2

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4_3.4.0-0ubuntu3.6_powerpc.deb
  Size/MD5:  8368206 920ad16060f913092914e2de01bbf533

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.1.diff.gz
  Size/MD5:   328824 90ae45cf60a62394b61877f0b8829bb7

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.1.dsc
  Size/MD5: 1523 ce890db0541122c30d10b77ce8d65871

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3.orig.tar.gz
  Size/MD5: 19981388 36e7a8320bd95760b41c4849da170100

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.4.3-0ubuntu2.1_all.deb
  Size/MD5:  6969950 9e99951cfed9d47e7a6aa15c4bc8b2a6

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.4.3-0ubuntu2.1_all.deb
  Size/MD5: 29296526 6bbe20ef6d29c14fda945f62465cba72

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.1_all.deb
  Size/MD5:30588 32c58feabf9a01d39f0d320f515c47b4

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.1_amd64.deb
  Size/MD5:   926460 4d3048c061d7ff0bac8fce46b5a36dbd

http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.1_amd64.deb
  Size/MD5:  1308904 acee80a54853c4c5f20fd103c33624bf


[Full-disclosure] [USN-321-1] mysql-dfsg-4.1 vulnerability

2006-07-21 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-321-1  July 21, 2006
mysql-dfsg-4.1 vulnerability
CVE-2006-3469
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  mysql-server-4.1 4.1.12-1ubuntu3.7

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Jean-David Maillefer discovered a format string bug in the
date_format() function's error reporting. By calling the function with
invalid arguments, an authenticated user could exploit this to crash
the server.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.7.diff.gz
  Size/MD5:   165177 e3f4a9d6d9803befbba2532addd92b71

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.7.dsc
  Size/MD5: 1024 33020e3d005bd77d484f34abecf1c177

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12.orig.tar.gz
  Size/MD5: 15921909 c7b83a19bd8a4f42d5d64c239d05121f

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.12-1ubuntu3.7_all.deb
  Size/MD5:36830 d60762f789e3bd2b4fd3a456d3f73930

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.7_amd64.deb
  Size/MD5:  5831474 bced6d17845dc9588a089d49f02d55b0

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.7_amd64.deb
  Size/MD5:  1540694 af1be52eddc78528ecd022434171906e

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.7_amd64.deb
  Size/MD5:   898462 d45442957f383440bd191f930b443547

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.7_amd64.deb
  Size/MD5: 18433692 e071ef9ab926bfb5140a40c26c3ed78f

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.7_i386.deb
  Size/MD5:  5348328 8fd1aadc67f3377de8d9d938fed7c165

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.7_i386.deb
  Size/MD5:  1475476 c5258fbb58cb8cb9723a7ffa4284d0f1

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.7_i386.deb
  Size/MD5:   866460 42d1d8b4841a60bd8579e393b18dbe3f

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.7_i386.deb
  Size/MD5: 17336370 e535ca52af75dd467f68e26b6a9d5e27

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.7_powerpc.deb
  Size/MD5:  6069400 36169591c90ee3417371a958cadc7b71

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.7_powerpc.deb
  Size/MD5:  1549166 901ef463598f28da3cfac186a66558da

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.7_powerpc.deb
  Size/MD5:   937712 1e8b6a06c6b3dfba1e99a7781da0a66c

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.7_powerpc.deb
  Size/MD5: 18523422 69e4c4a92cd298cfc3e60a7b907b3529


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-313-2] OpenOffice.org vulnerabilities

2006-07-19 Thread Martin Pitt
===
Ubuntu Security Notice USN-313-2  July 19, 2006
openoffice.org2-amd64, openoffice.org2 vulnerabilities
CVE-2006-2198, CVE-2006-2199, CVE-2006-3117
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  openoffice.org2-common 1.9.129-0.1ubuntu4.1
  openoffice.org2-core   1.9.129-0.1ubuntu4.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-313-1 fixed several vulnerabilities in OpenOffice for Ubuntu 5.04 and
Ubuntu 6.06 LTS. This followup advisory provides the corresponding
update for Ubuntu 5.10.

For reference, these are the details of the original USN:

  It was possible to embed Basic macros in documents in a way that
  OpenOffice.org would not ask for confirmation about executing them. By
  tricking a user into opening a malicious document, this could be
  exploited to run arbitrary Basic code (including local file access and
  modification) with the user's privileges. (CVE-2006-2198)
  
  A flaw was discovered in the Java sandbox which allowed Java applets
  to break out of the sandbox and execute code without restrictions.  By
  tricking a user into opening a malicious document, this could be
  exploited to run arbitrary code with the user's privileges. This
  update disables Java applets for OpenOffice.org, since it is not
  generally possible to guarantee the sandbox restrictions.
  (CVE-2006-2199)
  
  A buffer overflow has been found in the XML parser. By tricking a user
  into opening a specially crafted XML file with OpenOffice.org, this
  could be exploited to execute arbitrary code with the user's
  privileges. (CVE-2006-3117)


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-amd64_1.9.129-0.1ubuntu4.1-1.diff.gz
  Size/MD5:30102 940d431dbc93185558bfe215f0d1bd31

http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-amd64_1.9.129-0.1ubuntu4.1-1.dsc
  Size/MD5:  934 46517c65ab2797905ae5fc54e18f093a

http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-amd64_1.9.129-0.1ubuntu4.1.orig.tar.gz
  Size/MD5: 280390449 8fc86346a5ca070fd41cc35ccf0db891

http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2_1.9.129-0.1ubuntu4.1.diff.gz
  Size/MD5: 42651040 7eb1530f373880579e0b4f882d6f37d4

http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2_1.9.129-0.1ubuntu4.1.dsc
  Size/MD5: 2747 1df80499afc5fe76f527f67baede96aa

http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2_1.9.129.orig.tar.gz
  Size/MD5: 193239182 ca8c3fd5718fc31343abef213cb4df8d

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2-common_1.9.129-0.1ubuntu4.1_all.deb
  Size/MD5: 22894532 9ceea05764f1f3c7c7fb6e9ba4cced06

http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2-dev-doc_1.9.129-0.1ubuntu4.1_all.deb
  Size/MD5:  4783358 d90c33a8f7d46ecb032e0b79a966cde0

http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2-java-common_1.9.129-0.1ubuntu4.1_all.deb
  Size/MD5:  2792520 8ff58905701deb746209f38d59e50fbe

http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2-l10n-en-us_1.9.129-0.1ubuntu4.1_all.deb
  Size/MD5:   588148 232eea25965ee05eb60579ec0c6680cf

http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/ttf-opensymbol_1.9.129-0.1ubuntu4.1_all.deb
  Size/MD5:   145466 62a12f481a92cce78f521a2afeb60f42

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-base_1.9.129-0.1ubuntu4.1-1_amd64.deb
  Size/MD5:  2768862 e2e037a15d5aa56e0f5bde9300d78a7a

http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-calc_1.9.129-0.1ubuntu4.1-1_amd64.deb
  Size/MD5:  3514372 0df198e3a69f04746605f52239b252b3

http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-core_1.9.129-0.1ubuntu4.1-1_amd64.deb
  Size/MD5: 31007052 9bb773b5d9f762546389c33c410821a1

http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-draw_1.9.129-0.1ubuntu4.1-1_amd64.deb
  Size/MD5:  1749028 06ad64a99ba5cddf8375b2a2a83bade0

http://security.ubuntu.com/ubuntu/pool/universe/o/openoffice.org2-amd64/openoffice.org2-filter-so52_1.9.129-0.1ubuntu4.1-1_amd64.deb
  Size/MD5:27834 

[Full-disclosure] [USN-320-1] PHP vulnerabilities

2006-07-19 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-320-1  July 19, 2006
php4, php5 vulnerabilities
CVE-2006-0996, CVE-2006-1490, CVE-2006-1494, CVE-2006-1608,
CVE-2006-1990, CVE-2006-1991, CVE-2006-2563, CVE-2006-2660,
CVE-2006-3011, CVE-2006-3016, CVE-2006-3018
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libapache2-mod-php4  4:4.3.10-10ubuntu4.5
  php4-cgi 4:4.3.10-10ubuntu4.5
  php4-cli 4:4.3.10-10ubuntu4.5

Ubuntu 5.10:
  libapache2-mod-php5  5.0.5-2ubuntu1.3
  php5-cgi 5.0.5-2ubuntu1.3
  php5-cli 5.0.5-2ubuntu1.3
  php5-curl5.0.5-2ubuntu1.3

Ubuntu 6.06 LTS:
  libapache2-mod-php5  5.1.2-1ubuntu3.1
  php5-cgi 5.1.2-1ubuntu3.1
  php5-cli 5.1.2-1ubuntu3.1
  php5-curl5.1.2-1ubuntu3.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

The phpinfo() PHP function did not properly sanitize long strings. A
remote attacker could use this to perform cross-site scripting attacks
against sites that have publicly-available PHP scripts that call
phpinfo(). Please note that it is not recommended to publicly expose
phpinfo(). (CVE-2006-0996)

An information disclosure has been reported in the
html_entity_decode() function. A script which uses this function to
process arbitrary user-supplied input could be exploited to expose a
random part of memory, which could potentially reveal sensitive data.
(CVE-2006-1490)

The wordwrap() function did not sufficiently check the validity of the
'break' argument. An attacker who could control the string passed to
the 'break' parameter could cause a heap overflow; however, this
should not happen in practical applications. (CVE-2006-1990)

The substr_compare() function did not sufficiently check the validity
of the 'offset' argument. A script which passes untrusted user-defined
values to this parameter could be exploited to crash the PHP
interpreter. (CVE-2006-1991)

In certain situations, using unset() to delete a hash entry could
cause the deletion of the wrong element, which would leave the
specified variable defined. This could potentially cause information
disclosure in security-relevant operations. (CVE-2006-3017)

In certain situations the session module attempted to close a data
file twice, which led to memory corruption. This could potentially be
exploited to crash the PHP interpreter, though that could not be
verified. (CVE-2006-3018)

This update also fixes various bugs which allowed local scripts
to bypass open_basedir and 'safe mode' restrictions by passing special
arguments to tempnam() (CVE-2006-1494, CVE-2006-2660), copy()
(CVE-2006-1608), the curl module (CVE-2006-2563), or error_log()
(CVE-2006-3011).


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.5.diff.gz
  Size/MD5:   281888 6b2f9b14e6b17fd16b39fc992370c700

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.5.dsc
  Size/MD5: 1469 e107321f5a864fec29aba0ddc4557bda
http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10.orig.tar.gz
  Size/MD5:  4892209 73f5d1f42e34efa534a09c6091b5a21e

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.5_all.deb
  Size/MD5: 1128 e68858ad284ff509a9a7ba6004cd85b3

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.5_amd64.deb
  Size/MD5:  1657574 00032fa4aca5c15403f290cae27bfe38

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.5_amd64.deb
  Size/MD5:  3275318 be667056767f298619d7c48d73f22c00

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.5_amd64.deb
  Size/MD5:  1647612 d615fd92ad1609108ec1e877ce748ade

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.5_amd64.deb
  Size/MD5:   168182 ad4bd0b977814c2c3379235d76cf2ed2

http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.5_amd64.deb
  Size/MD5:   348270 03f94109b0ea8c73d8d88e50e10efede

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.5_i386.deb
  Size/MD5:  1592870 

[Full-disclosure] [USN-317-1] zope2.8 vulnerability

2006-07-13 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-317-1  July 13, 2006
zope2.8 vulnerability
CVE-2006-3458
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  zope2.8  2.8.1-5ubuntu0.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Zope did not deactivate the 'raw' command when exposing
RestructuredText functionalities to untrusted users. A remote user
with the privilege of editing Zope webpages with RestructuredText
could exploit this to expose arbitrary files that can be read with the
privileges of the Zope server.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1-5ubuntu0.2.diff.gz
  Size/MD5:13282 2eb94321cd899b8a270205d63d922cc0

http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1-5ubuntu0.2.dsc
  Size/MD5:  826 1014a9617f2404bb2a812c2f5755e106

http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1.orig.tar.gz
  Size/MD5:  5343921 0ec441a35175bb8d8c557b7d3c63f6f6

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8-sandbox_2.8.1-5ubuntu0.2_all.deb
  Size/MD5:18638 352dfb3302c6b8c6e39f3b5067124975

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1-5ubuntu0.2_amd64.deb
  Size/MD5:  5521472 f0ad0cb3f4f5d31bca8dc4df67efef80

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1-5ubuntu0.2_i386.deb
  Size/MD5:  5463698 22c8680d3649ae19e90c41224b5fbb3b

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1-5ubuntu0.2_powerpc.deb
  Size/MD5:  5551806 074782e4b777904545647f39ca52cc0f

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1-5ubuntu0.2_sparc.deb
  Size/MD5:  5478804 4a7978b8921b0789d75857d893d706c9


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-318-1] libtunepimp vulnerability

2006-07-13 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-318-1  July 13, 2006
libtunepimp vulnerability
http://bugs.musicbrainz.org/ticket/1764
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libtunepimp2 0.3.0-2ubuntu5.1

Ubuntu 5.10:
  libtunepimp2c2   0.3.0-2ubuntu7.1

Ubuntu 6.06 LTS:
  libtunepimp2c2a  0.3.0-9.1ubuntu3.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Kevin Kofler discovered several buffer overflows in the tag parser. By
tricking a user into opening a specially crafted tagged multimedia
file (such as .ogg or .mp3 music) with an application that uses
libtunepimp, this could be exploited to execute arbitrary code with
the user's privileges. 

This particularly affects the KDE applications 'Amarok' and 'Juk'.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp_0.3.0-2ubuntu5.1.diff.gz
  Size/MD5: 6871 816d083ad0010b6ba3f4c2c027ffe4c8

http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp_0.3.0-2ubuntu5.1.dsc
  Size/MD5: 1016 0bb89c217e868b97c8ecece58d70d521

http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp_0.3.0.orig.tar.gz
  Size/MD5:   524889 f1f506914150c4917ec730f847ad4709

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp-bin_0.3.0-2ubuntu5.1_amd64.deb
  Size/MD5:24124 2bafeba28a4e75afc24b9d84ca89e4a4

http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/libtunepimp-perl_0.3.0-2ubuntu5.1_amd64.deb
  Size/MD5:65002 f6d69554dc0d49e9b43a8a86d3ad1595

http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp2-dev_0.3.0-2ubuntu5.1_amd64.deb
  Size/MD5:   307302 524eec25e6670177cef5f3923ca13bcb

http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp2_0.3.0-2ubuntu5.1_amd64.deb
  Size/MD5:   166714 65cc3f239ff8a2e4b71d9681c7a399d4

http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/python-tunepimp_0.3.0-2ubuntu5.1_amd64.deb
  Size/MD5: 7620 8efc67adb855d09ee6163296d2a5dcc8

http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/python2.3-tunepimp_0.3.0-2ubuntu5.1_amd64.deb
  Size/MD5:35906 fabd759fc946dc8da916ac4aea98344c

http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/python2.4-tunepimp_0.3.0-2ubuntu5.1_amd64.deb
  Size/MD5:35906 ad81916e88a3041a29aa1d0b0381f807

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp-bin_0.3.0-2ubuntu5.1_i386.deb
  Size/MD5:22554 3796f87627d72b6e9459242d51275418

http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/libtunepimp-perl_0.3.0-2ubuntu5.1_i386.deb
  Size/MD5:64308 b05b230b572574f70c70ac2c4b78ab47

http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp2-dev_0.3.0-2ubuntu5.1_i386.deb
  Size/MD5:   288084 861c09351e62091f262d0672398bfca3

http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp2_0.3.0-2ubuntu5.1_i386.deb
  Size/MD5:   168370 1e4ec2f407fa1a2798b8e65f2779318b

http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/python-tunepimp_0.3.0-2ubuntu5.1_i386.deb
  Size/MD5: 7604 8b3fd4594225291e6104fc6ae7648308

http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/python2.3-tunepimp_0.3.0-2ubuntu5.1_i386.deb
  Size/MD5:32092 dcce42ec71c9b3b5fba324e7ad8bc064

http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/python2.4-tunepimp_0.3.0-2ubuntu5.1_i386.deb
  Size/MD5:32096 0244dc6403cc8f581d010cc049cc9772

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp-bin_0.3.0-2ubuntu5.1_powerpc.deb
  Size/MD5:25668 d1b3b88f7ea94faa390ac8a818a5b40a

http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/libtunepimp-perl_0.3.0-2ubuntu5.1_powerpc.deb
  Size/MD5:65456 de067b822941a684b151eacd1627800a

http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp2-dev_0.3.0-2ubuntu5.1_powerpc.deb
  Size/MD5:   310288 ee373226566ebdd026d85339c6194f68

http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp2_0.3.0-2ubuntu5.1_powerpc.deb
  Size/MD5:   161658 e57125bd48dc6fb43a729f42024d9acf


[Full-disclosure] [USN-316-1] installer vulnerability

2006-07-12 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-316-1  July 12, 2006
Installer vulnerability
https://launchpad.net/bugs/48350
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  passwd   1:4.0.13-7ubuntu3.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Iwan Pieterse discovered that, if you select Go Back at the final
message displayed by the alternate or server CD installer (Installation
complete) and then continue with the installation from the installer's
main menu, the root password is left blank rather than locked. This was
due to an error while clearing out the root password from the
installer's memory to avoid possible information leaks.

Installations from the alternate or server CDs when the user selected
Continue when the Installation complete message was first displayed
are not affected by this bug. Installations from the desktop CD are not
affected by this bug at all.

When you upgrade your passwd package to the newest version, it will
detect this condition and lock the root password if it was previously
blank. The next point release of Ubuntu 6.06 LTS will include a
corrected installer.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13-7ubuntu3.2.diff.gz
  Size/MD5:   204800 1b29e1615364944d98ea95498d6058b8

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13-7ubuntu3.2.dsc
  Size/MD5:  885 8ccf50d026fa2c4cffe85330f0d0985a

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13.orig.tar.gz
  Size/MD5:  1622557 034fab52e187e63cb52f153bb7f304c8

http://security.ubuntu.com/ubuntu/pool/main/u/user-setup/user-setup_1.1ubuntu4.dsc
  Size/MD5:  678 544762def71fb062b6d6f5484a4d7c45

http://security.ubuntu.com/ubuntu/pool/main/u/user-setup/user-setup_1.1ubuntu4.tar.gz
  Size/MD5:98334 f8d648ce6a9a007740b0e175b92385eb

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/u/user-setup/user-setup-udeb_1.1ubuntu4_all.udeb
  Size/MD5:79418 4ec2af1d5e09f129d486c142575f4081

http://security.ubuntu.com/ubuntu/pool/main/u/user-setup/user-setup_1.1ubuntu4_all.deb
  Size/MD5:   161864 bc876d6099a323cebd2ffc94df41db06

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.2_amd64.deb
  Size/MD5:   249450 bfdba1450cbe14f6c71f5d9dee5df9b3

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.2_amd64.deb
  Size/MD5:   683510 547ad48ac45f6f11cacbd268f42b152a

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.2_i386.deb
  Size/MD5:   240938 8500a4c2ab53f11b3fb8cb7fb4e00c78

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.2_i386.deb
  Size/MD5:   616346 a29d90e0ae7c7c70cbeffcbfba6bf04e

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.2_powerpc.deb
  Size/MD5:   251380 bd408187e20f19222e2b4fefe8706552

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.2_powerpc.deb
  Size/MD5:   665158 4975fe8598b4a8adc98fabcee1b4cb8e

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.2_sparc.deb
  Size/MD5:   239930 85dde4bfa6d09491338f70efe9d6d336

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.2_sparc.deb
  Size/MD5:   620124 b0fcdadde2568b1a8324e2500718a18b


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-314-1] samba vulnerability

2006-07-12 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-314-1  July 12, 2006
samba vulnerability
CVE-2006-3403
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  samba3.0.10-1ubuntu3.1

Ubuntu 5.10:
  samba3.0.14a-6ubuntu1.1

Ubuntu 6.06 LTS:
  samba3.0.22-1ubuntu3.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

The Samba security team reported a Denial of Service vulnerability in
the handling of information about active connections. In certain
circumstances an attacker could continually increase the memory usage
of the  smbd process by issuing a large number of share connection
requests. By draining all available memory, this could be exploited to
render the remote Samba server unusable.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.10-1ubuntu3.1.diff.gz
  Size/MD5:   107580 f41e99280b44e47c1e1a0c86a56c66de

http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.10-1ubuntu3.1.dsc
  Size/MD5:  978 d516ac96d66dbda1388e861ec8220ee7
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.10.orig.tar.gz
  Size/MD5: 15176926 b19fd86d3c11a1b43f75a5988cd9ceeb

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.0.10-1ubuntu3.1_all.deb
  Size/MD5: 11676712 55beda5b448bd6ef999d76a8e75ad3aa

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/s/samba/libpam-smbpass_3.0.10-1ubuntu3.1_amd64.deb
  Size/MD5:   372670 7e7a00d1458113ae03ab9ceef1c33f92

http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.10-1ubuntu3.1_amd64.deb
  Size/MD5:   780744 a9e481451b19277676fe825118b6097b

http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.10-1ubuntu3.1_amd64.deb
  Size/MD5:   590090 8d76d3c3b1215b421a09ad40714ae533

http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.10-1ubuntu3.1_amd64.deb
  Size/MD5:  5070312 35dfb5c2e732296d16c242af7d1386e7

http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.10-1ubuntu3.1_amd64.deb
  Size/MD5:  2150094 835196ef9aeac4f16356522cb2d6b493

http://security.ubuntu.com/ubuntu/pool/universe/s/samba/samba-dbg_3.0.10-1ubuntu3.1_amd64.deb
  Size/MD5:  6390788 5b4cb573a5813c12dbca92895612306e

http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.10-1ubuntu3.1_amd64.deb
  Size/MD5:  2733990 311b65f9c3d9bcfbae6cf527a7101081

http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.10-1ubuntu3.1_amd64.deb
  Size/MD5:  2813560 a5fdc57b8c3f39a1599685971196cb1f

http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.10-1ubuntu3.1_amd64.deb
  Size/MD5:   403878 39ed8078277f923e533f01c62d96981a

http://security.ubuntu.com/ubuntu/pool/universe/s/samba/swat_3.0.10-1ubuntu3.1_amd64.deb
  Size/MD5:  4062114 94d4663ac08126eae60227429a8e1143

http://security.ubuntu.com/ubuntu/pool/universe/s/samba/winbind_3.0.10-1ubuntu3.1_amd64.deb
  Size/MD5:  1623058 83d1e2d9b57331a14d50d1a5fd231aff

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/s/samba/libpam-smbpass_3.0.10-1ubuntu3.1_i386.deb
  Size/MD5:   329214 0a57f5b7ec5c9d426a1a5d0306a0ee72

http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.10-1ubuntu3.1_i386.deb
  Size/MD5:   704546 84d98ae1dd41a8161ad8ea097dbc8a4e

http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.10-1ubuntu3.1_i386.deb
  Size/MD5:   523310 59e49f6c871b85bf6cb04ee4b264bd39

http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.10-1ubuntu3.1_i386.deb
  Size/MD5:  4464594 10ded0e61a32f344633d25eb5c6f55a3

http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.10-1ubuntu3.1_i386.deb
  Size/MD5:  1887970 19f0177cbc0cbcdc795c6fb742512152

http://security.ubuntu.com/ubuntu/pool/universe/s/samba/samba-dbg_3.0.10-1ubuntu3.1_i386.deb
  Size/MD5:  6543900 7920120df8ae6d539965c199c07d1604

http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.10-1ubuntu3.1_i386.deb
  Size/MD5:  2355884 d309130e0783d153dc891a9a6a5ecaf3

http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.10-1ubuntu3.1_i386.deb
  Size/MD5:  2394052 5aa3665da0c4e601c98bceae300d6873


[Full-disclosure] [USN-312-1] gimp vulnerability

2006-07-10 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-312-1  July 10, 2006
gimp vulnerability
CVE-2006-3404
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  gimp   2.2.2-1ubuntu5.1
  libgimp2.0 2.2.2-1ubuntu5.1

Ubuntu 5.10:
  gimp   2.2.8-2ubuntu6.1
  libgimp2.0 2.2.8-2ubuntu6.1

Ubuntu 6.06 LTS:
  gimp   2.2.11-1ubuntu3.1
  libgimp2.0 2.2.11-1ubuntu3.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Henning Makholm discovered that gimp did not sufficiently validate the
'num_axes' parameter in XCF files. By tricking a user into opening a
specially crafted XCF file with Gimp, an attacker could exploit this
to execute arbitrary code with the user's privileges.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1.diff.gz
  Size/MD5:25366 1c89e7a4876c8922baf9c3be9cce72b9
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1.dsc
  Size/MD5: 1053 41cbd27c48207a245d8486d37c3bea44
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2.orig.tar.gz
  Size/MD5: 20151209 eccbe0b2438be095222a6723e57c51a3

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-data_2.2.2-1ubuntu5.1_all.deb
  Size/MD5:  2057404 4d2655688e65317c1cce1f7938c415b3

http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp1.2_2.2.2-1ubuntu5.1_all.deb
  Size/MD5:23028 c55d030036cc817eba07f15a31cd2ab9

http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-doc_2.2.2-1ubuntu5.1_all.deb
  Size/MD5:   516766 2bddbe64aae9009428e16f40ff0ac92c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.2-1ubuntu5.1_amd64.deb
  Size/MD5:34686 1491899331d67c323414df5625b378ad

http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.2-1ubuntu5.1_amd64.deb
  Size/MD5:   114452 c0d1e1ea2cb6ec1ed06b6327a91e5da6

http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.2-1ubuntu5.1_amd64.deb
  Size/MD5:34686 c3726bb2cf00dc202439253ab8e5f47f

http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1_amd64.deb
  Size/MD5:  3138104 4cbd06980a263a956eaf2ed8a61fae14

http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.2-1ubuntu5.1_amd64.deb
  Size/MD5:90072 e876c374828beb7951d8d1bb6323ef00

http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.2-1ubuntu5.1_amd64.deb
  Size/MD5:   434012 4ef7e7e58e45d192a8877747c432efdf

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.2-1ubuntu5.1_i386.deb
  Size/MD5:33386 e3249682facaedc43430c2a02f55be4f

http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.2-1ubuntu5.1_i386.deb
  Size/MD5:   108648 883b24c54ef4fec71777d601eca58b64

http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.2-1ubuntu5.1_i386.deb
  Size/MD5:33806 ff701d78ebb13b876ea4651a00e06dce

http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1_i386.deb
  Size/MD5:  2822064 333aba3cca28c59606ef01e688a98fdc

http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.2-1ubuntu5.1_i386.deb
  Size/MD5:90074 13fa37935cb5334bd13406119f326bee

http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.2-1ubuntu5.1_i386.deb
  Size/MD5:   404102 a9812964cf7257f5ae9609a95efb6a0f

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.2-1ubuntu5.1_powerpc.deb
  Size/MD5:34918 d46155c0c3ec7e265972c27156255595

http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.2-1ubuntu5.1_powerpc.deb
  Size/MD5:   110434 d0c4290c8a30db183db627df47b901ce

http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.2-1ubuntu5.1_powerpc.deb
  Size/MD5:35606 c8f11092c804ba676de10fb0ee0206e5

http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1_powerpc.deb
  Size/MD5:  3208564 ee4badf2b0ccaebd84dabeb123f5e98a

http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.2-1ubuntu5.1_powerpc.deb
  Size/MD5:90100 073cc2a24d7be2923c1a1750661bbc9e


[Full-disclosure] [USN-308-1] shadow vulnerability

2006-07-05 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-308-1  July 05, 2006
shadow vulnerability
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  passwd 1:4.0.3-30.7ubuntu16.1

Ubuntu 5.10:
  passwd 1:4.0.3-37ubuntu10

Ubuntu 6.06 LTS:
  passwd 1:4.0.13-7ubuntu3.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Ilja van Sprundel discovered that passwd, when called with the -f, -g,
or -s option, did not check the result of the setuid() call. On
systems that configure PAM limits for the maximum number of user
processes, a local attacker could exploit this to execute chfn,
gpasswd, or chsh with root privileges.

This does not affect the default configuration of Ubuntu.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-30.7ubuntu16.1.diff.gz
  Size/MD5:  1161448 adba4705f1491691a39f471ffc92c09b

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-30.7ubuntu16.1.dsc
  Size/MD5:  786 f3f8c3843a16523e8b09bc73c664646e

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3.orig.tar.gz
  Size/MD5:  1045704 b52dfb2e5e8d9a4a2aae0ca1b266c513

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/initial-passwd-udeb_4.0.3-30.7ubuntu16.1_all.udeb
  Size/MD5:67204 433e3ad008f269d3879b4b36e863b6b0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-30.7ubuntu16.1_amd64.deb
  Size/MD5:   172388 1ae1307fe20ec93ee5cda9674bff7d31

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-30.7ubuntu16.1_amd64.deb
  Size/MD5:   591158 07c3c7e5326d116619376f750191881c

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-30.7ubuntu16.1_i386.deb
  Size/MD5:   162780 d65e55fb3fd9a6d8c58a8f0117a0b63d

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-30.7ubuntu16.1_i386.deb
  Size/MD5:   513386 93d96b05b65825f12aa0c43c9a4c07ee

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-30.7ubuntu16.1_powerpc.deb
  Size/MD5:   171348 0f3c8f157ac3b1717334521587cede0d

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-30.7ubuntu16.1_powerpc.deb
  Size/MD5:   558434 91148b7d12fc0a405ecc6009fddb8915

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-37ubuntu10.diff.gz
  Size/MD5:  1070307 8b2fb08f4314b8a5d7d0228e516d254e

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-37ubuntu10.dsc
  Size/MD5:  877 dcd588a15b6a706215191df0b1aa91d7

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3.orig.tar.gz
  Size/MD5:  1045704 b52dfb2e5e8d9a4a2aae0ca1b266c513

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/initial-passwd-udeb_4.0.3-37ubuntu10_all.udeb
  Size/MD5: 1828 82abf8eb28a61b8fbe00c0c85b85099a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu10_amd64.deb
  Size/MD5:   180932 2cdc5bc553c305ad71601eab30d91ecc

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu10_amd64.deb
  Size/MD5:   590358 afa8b5c3552db22b12ce6ed3ac16dc7e

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu10_i386.deb
  Size/MD5:   172160 573cb37f61f18087fc2e42ee1e0a8c3a

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu10_i386.deb
  Size/MD5:   515976 0fb3906bfd5a1c9992a34119460161d6

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu10_powerpc.deb
  Size/MD5:   180218 d71a7d3615c0433e9c9c360316d45619

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu10_powerpc.deb
  Size/MD5:   568772 e3599c6460d3fa76c141948e0dd0647f

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu10_sparc.deb
  Size/MD5:   173624 ed7f31e26778d7b90825a8047dd132e9

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu10_sparc.deb
  Size/MD5:   525696 

[Full-disclosure] [USN-309-1] libmms vulnerability

2006-07-05 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-309-1  July 05, 2006
libmms vulnerability
CVE-2006-2200
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  libmms00.1-0ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Several buffer overflows were found in libmms. By tricking a user into
opening a specially crafted remote multimedia stream with an
application using libmms, a remote attacker could overwrite an
arbitrary memory portion with zeros, thereby crashing the program.

In Ubuntu 5.10, this affects the GStreamer MMS plugin
(gstreamer0.8-mms). Other Ubuntu releases do not support this library.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms_0.1-0ubuntu1.1.diff.gz
  Size/MD5: 4933 76da674c4ce46f604acb09b473f72f1d

http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms_0.1-0ubuntu1.1.dsc
  Size/MD5:  607 3f7b2613ed4bda8a5d943141aa85d2d5

http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms_0.1.orig.tar.gz
  Size/MD5:   317089 ebd88537af9875265e41ee65603ecd1a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms-dev_0.1-0ubuntu1.1_amd64.deb
  Size/MD5:19656 5f4757ce0808238ce09df147b0a16251

http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms0_0.1-0ubuntu1.1_amd64.deb
  Size/MD5:16042 bd2e57f384bad19a121b3d93c6ff7ec8

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms-dev_0.1-0ubuntu1.1_i386.deb
  Size/MD5:18078 30ea92c953e77a62cea90060c5ffe195

http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms0_0.1-0ubuntu1.1_i386.deb
  Size/MD5:14840 645668e9bf1b15cd3e7993bc8e66c6bd

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms-dev_0.1-0ubuntu1.1_powerpc.deb
  Size/MD5:20206 ee2b12725fce1f2eb94a4fbf6e10

http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms0_0.1-0ubuntu1.1_powerpc.deb
  Size/MD5:17700 013e1564d0aa094eddf28ae0723e264b

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms-dev_0.1-0ubuntu1.1_sparc.deb
  Size/MD5:19894 b0e5d23a750dad2a0e2fa528e4ba9e02

http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms0_0.1-0ubuntu1.1_sparc.deb
  Size/MD5:16176 3246a55286c83b1ff2b3a6fc47ee4241


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-307-1] mutt vulnerability

2006-06-28 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-307-1  June 28, 2006
mutt vulnerability
http://secunia.com/advisories/20810
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  mutt   1.5.6-20040907+2ubuntu0.1

Ubuntu 5.10:
  mutt   1.5.9-2ubuntu1.1

Ubuntu 6.06 LTS:
  mutt   1.5.11-3ubuntu2.1

After a standard system upgrade you need to restart mutt to effect the
necessary changes.

Details follow:

TAKAHASHI Tamotsu discovered that mutt's IMAP backend did not
sufficiently check the validity of namespace strings. If an user
connects to a malicious IMAP server, that server could exploit this to
crash mutt or even execute arbitrary code with the privileges of the
mutt user.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.6-20040907+2ubuntu0.1.diff.gz
  Size/MD5:   416375 64e6905e87d3b10d59f920b24baba212

http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.6-20040907+2ubuntu0.1.dsc
  Size/MD5:  794 90d6fdf6ed6ed8066217424251b5f70c
http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.6.orig.tar.gz
  Size/MD5:  2908273 1df09da057a96ef35c4d347779c314a9

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.6-20040907+2ubuntu0.1_amd64.deb
  Size/MD5:   710852 41183be381c5ba75a1a370e1af65b0c2

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.6-20040907+2ubuntu0.1_i386.deb
  Size/MD5:   669278 03cc903858ad0243209209ab9de628e1

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.6-20040907+2ubuntu0.1_powerpc.deb
  Size/MD5:   715092 3506f6ca75eb05c61e3842a089d0e0a0

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.1.diff.gz
  Size/MD5:93197 655e867ac1e488c5ab37088a2bfb6c08
http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.1.dsc
  Size/MD5:  781 b4b263c27a300e31e649f93fad8ebeb6
http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9.orig.tar.gz
  Size/MD5:  3033253 587dd1d8f44361b73b82ef64eb30c3a0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.1_amd64.deb
  Size/MD5:   730970 43ff1cfac57392b942729e74fa469598

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.1_i386.deb
  Size/MD5:   679380 a5230b99c9384aceaa5afb074369386a

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.1_powerpc.deb
  Size/MD5:   724474 ea2ecb5f204eb66b9ecfb8de8e36e4e8

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.1.diff.gz
  Size/MD5:   416978 5580d195c109c523948a28b967f6f9fb

http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.1.dsc
  Size/MD5:  751 d1b22f97bb807fb6d4f81f735b3f1a66
http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11.orig.tar.gz
  Size/MD5:  3187076 30f165fdfaf474521a640f1f3886069a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.1_amd64.deb
  Size/MD5:   960128 2ce3a523e12f5e1493381f36f00cd189

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.1_i386.deb
  Size/MD5:   907296 da20b1b549edee817d1b1c87e6d13537

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.1_powerpc.deb
  Size/MD5:   956104 a331b93132b08dbac6bcdf5fc125e5c4

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.1_sparc.deb
  Size/MD5:   924652 37de7b45c27daae34f8c96114cc2536b



signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-305-1] OpenLDAP vulnerability

2006-06-27 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-305-1  June 27, 2006
openldap2, openldap2.2 vulnerability
CVE-2006-2754
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  slapd  2.1.30-3ubuntu3.2

Ubuntu 5.10:
  slapd  2.2.26-3ubuntu0.1

Ubuntu 6.06 LTS:
  slapd  2.2.26-5ubuntu2.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

When processing overly long host names in OpenLDAP's slurpd replication
server, a buffer overflow caused slurpd to crash.

If an attacker manages to inject a specially crafted host name into
slurpd, this might also be exploited to execute arbitrary code with
slurpd's privileges; however, since slurpd is usually set up to
replicate only trusted machines, this should not be exploitable in
normal cases.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/openldap2_2.1.30-3ubuntu3.2.diff.gz
  Size/MD5:   117693 811feb51c50318d90b2f8d3955bd2cd4

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/openldap2_2.1.30-3ubuntu3.2.dsc
  Size/MD5:  988 772bf522a7b5211787dc7272ea0b71cb

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/openldap2_2.1.30.orig.tar.gz
  Size/MD5:  2044673 e2ae8148c4bed07d7a70edd930bdc403

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libslapd2-dev_2.1.30-3ubuntu3.2_all.deb
  Size/MD5:72546 3fe7d6a3e99f1d49d049127af41a8334

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/ldap-utils_2.1.30-3ubuntu3.2_amd64.deb
  Size/MD5:   126502 b78a3e1a2d62ba78ca38842ba9c7b05a

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libldap2-dev_2.1.30-3ubuntu3.2_amd64.deb
  Size/MD5:   361334 2d589dc600e42bc19024170fcb728d39

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libldap2_2.1.30-3ubuntu3.2_amd64.deb
  Size/MD5:   309204 c13675910f7c21bb3e723592c6e495f2

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/slapd_2.1.30-3ubuntu3.2_amd64.deb
  Size/MD5:  1088128 a3b2230434033fd0070d643b3c09c1d4

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/ldap-utils_2.1.30-3ubuntu3.2_i386.deb
  Size/MD5:   110870 7cbb5b6f1ba2118946c6811076b701fa

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libldap2-dev_2.1.30-3ubuntu3.2_i386.deb
  Size/MD5:   318170 8dab1fcba483d48cac5bcda3b0c4a58c

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libldap2_2.1.30-3ubuntu3.2_i386.deb
  Size/MD5:   284732 301a45c6f09a37332ea5a7b184e8c176

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/slapd_2.1.30-3ubuntu3.2_i386.deb
  Size/MD5:   979438 ff72cd74acd311e16307286b6c598130

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/ldap-utils_2.1.30-3ubuntu3.2_powerpc.deb
  Size/MD5:   129774 2b223fe63713e7f4cfbdb434b251d69e

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libldap2-dev_2.1.30-3ubuntu3.2_powerpc.deb
  Size/MD5:   373308 bb5106479b3f3928f8eaf247a2c9af01

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libldap2_2.1.30-3ubuntu3.2_powerpc.deb
  Size/MD5:   302964 73c3c1603cd8a00e4a49f6486676ecb6

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/slapd_2.1.30-3ubuntu3.2_powerpc.deb
  Size/MD5:  1058408 e483f9a6ecbee4aee2dd196b399e15ed

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/o/openldap2.2/openldap2.2_2.2.26-3ubuntu0.1.diff.gz
  Size/MD5:   495731 9e5ff179d3930bba207a013a9361f5b0

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2.2/openldap2.2_2.2.26-3ubuntu0.1.dsc
  Size/MD5: 1020 23742091bec8567bf0dfc5326657fb12

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2.2/openldap2.2_2.2.26.orig.tar.gz
  Size/MD5:  2626629 afc8700b5738da863b30208e1d3e9de8

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/o/openldap2.2/ldap-utils_2.2.26-3ubuntu0.1_amd64.deb
  Size/MD5:   129756 57ed4fbea2a6c2b0de87878fc81417da

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2.2/libldap-2.2-7_2.2.26-3ubuntu0.1_amd64.deb
  Size/MD5:   164128 6e18cf1741f0b0dd7ab88279b052a1a3

http://security.ubuntu.com/ubuntu/pool/main/o/openldap2.2/slapd_2.2.26-3ubuntu0.1_amd64.deb
  Size/MD5:   954370 

[Full-disclosure] [USN-306-1] MySQL 4.1 vulnerability

2006-06-27 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-306-1  June 27, 2006
mysql-dfsg-4.1 vulnerability
CVE-2006-3081
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  mysql-server-4.1   4.1.12-1ubuntu3.6

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

MySQL did not correctly handle NULL as the second argument to the
str_to_date() function. An authenticated user could exploit this to
crash the server.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.6.diff.gz
  Size/MD5:   164878 463c3768464221d0825dbf8fd153432e

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.6.dsc
  Size/MD5: 1024 5e533d4f9d9fd83c67d4119a39625e2c

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12.orig.tar.gz
  Size/MD5: 15921909 c7b83a19bd8a4f42d5d64c239d05121f

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.12-1ubuntu3.6_all.deb
  Size/MD5:36742 b96636b4d38a0f45cd5607f26018101a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.6_amd64.deb
  Size/MD5:  5831370 d23061f89f903c9808b6768dd6d92335

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.6_amd64.deb
  Size/MD5:  1540608 ff3bdbcec7d80ee656fff71318db5f9a

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.6_amd64.deb
  Size/MD5:   898350 2dbf1c511e23d4d0134979b7ec660264

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.6_amd64.deb
  Size/MD5: 18433714 158ce4bd992fe64a8695687e82d2ef94

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.6_i386.deb
  Size/MD5:  5348044 41d20999de86b8f7983f62b756212cd1

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.6_i386.deb
  Size/MD5:  1475378 3057a66edc7863f8695d03aec050d0f5

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.6_i386.deb
  Size/MD5:   866354 8c84ad0649a119fd0370d33756a9c1cb

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.6_i386.deb
  Size/MD5: 17336250 b1bc484bceaf8a4debdbb1d58d637dd0

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.6_powerpc.deb
  Size/MD5:  6069148 7d5d032fb8f0bed0c3efa6911578854c

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.6_powerpc.deb
  Size/MD5:  1549044 be30993f7e8f207d99f11b43282b5f00

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.6_powerpc.deb
  Size/MD5:   937622 fb4802c64825f7e4127bbd15b656d214

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.6_powerpc.deb
  Size/MD5: 18523392 31b331faba3c77b55e126b84d24ce223


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-304-1] gnupg vulnerability

2006-06-26 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-304-1  June 26, 2006
gnupg vulnerability
CVE-2006-3082
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  gnupg  1.2.5-3ubuntu5.4

Ubuntu 5.10:
  gnupg  1.4.1-1ubuntu1.3

Ubuntu 6.06 LTS:
  gnupg  1.4.2.2-1ubuntu2.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Evgeny Legerov discovered that GnuPG did not sufficiently check overly
large user ID packets. Specially crafted user IDs caused a buffer
overflow. By tricking an user or remote automated system into
processing a malicous GnuPG message, an attacker could exploit this to
crash GnuPG or possibly even execute arbitrary code.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.4.diff.gz
  Size/MD5:66657 258c3a5166f20a0859a3137a0154e661

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.4.dsc
  Size/MD5:  654 7d0e00dfc3d9c8008fa863ad082a8244
http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5.orig.tar.gz
  Size/MD5:  3645308 9109ff94f7a502acd915a6e61d28d98a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.4_amd64.deb
  Size/MD5:   805972 eb80d914280ca0d14e518c2517303fca

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.2.5-3ubuntu5.4_amd64.udeb
  Size/MD5:   146410 b1fe302ef21bb1b2a861dca1648671c8

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.4_i386.deb
  Size/MD5:   750660 f7799aacd286de91cf1590d47f092fbf

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.2.5-3ubuntu5.4_i386.udeb
  Size/MD5:   121398 d3908ec7b4a400c372a88790cd5c

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.4_powerpc.deb
  Size/MD5:   806578 76656bbbce1e59dee14a07c4d06c9169

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.2.5-3ubuntu5.4_powerpc.udeb
  Size/MD5:   135516 57192001042e37f1597cbe8d4cc96397

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.3.diff.gz
  Size/MD5:21031 d2e00314a6319c80e40af374299b3cdb

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.3.dsc
  Size/MD5:  684 65b8ffc1c7f51d2920496eddadfb1236
http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1.orig.tar.gz
  Size/MD5:  4059170 1cc77c6943baaa711222e954bbd785e5

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.3_amd64.deb
  Size/MD5:  1136302 5b871cea504e1b520ac61ee0ace19452

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.3_amd64.udeb
  Size/MD5:   152178 97622cf5abc3f4923281d08536f816c0

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.3_i386.deb
  Size/MD5:  1044392 30c94fae4dbc994eed85d226b226a938

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.3_i386.udeb
  Size/MD5:   130644 216ff1f2393a2dd5bf5c814a5f33ae9f

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.3_powerpc.deb
  Size/MD5:  1119498 67ad3b4a3254334e85bd659e24a65bea

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.3_powerpc.udeb
  Size/MD5:   140162 38a01b4e3f447f6cd340d6d17b714180

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.3_sparc.deb
  Size/MD5:  1064176 4e4e2671d46f266792d6693208bd5b34

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.3_sparc.udeb
  Size/MD5:   139584 9d840a2108b3d999e8b0ad620a262f69

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.1.diff.gz
  Size/MD5:19943 a04a4bdf67d9e86d15c8b89312b455e5

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.1.dsc
  Size/MD5:  692 90847403acb4d359f8b75ad345985b9d

http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2.orig.tar.gz
  

[Full-disclosure] [USN-303-1] MySQL vulnerability

2006-06-16 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-303-1  June 16, 2006
mysql-dfsg-4.1, mysql-dfsg-5.0 vulnerability
CVE-2006-2753
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  libmysqlclient14   4.1.12-1ubuntu3.5
  mysql-server-4.1   4.1.12-1ubuntu3.5

Ubuntu 6.06 LTS:
  libmysqlclient15off5.0.22-0ubuntu6.06
  mysql-server-5.0   5.0.22-0ubuntu6.06

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

An SQL injection vulnerability has been discovered when using less
popular multibyte encodings (such as SJIS, or BIG5) which contain
valid multibyte characters that end with the byte 0x5c (the
representation of the backslash character \ in ASCII). 

Many client libraries and applications use the non-standard, but
popular way of escaping the ' character by replacing all
occurences of it with \'. If a client application uses one of the
affected encodings and does not interpret multibyte characters, and an
attacker supplies a specially crafted byte sequence as an input string
parameter, this escaping method would then produce a validly-encoded
character and an excess ' character which would end the string.
All subsequent characters would then be interpreted as SQL code, so
the attacker could execute arbitrary SQL commands.

The updated packages fix the mysql_real_escape_string() function to
escape quote characters in a safe way. If you use third-party software
which uses an ad-hoc method of string escaping, you should convert
them to use mysql_real_escape_string() instead, or at least use the
standard SQL method of escaping  ' with  ''.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.5.diff.gz
  Size/MD5:   164408 5397489739ab8a6fa1e2d7571ae16ca2

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.5.dsc
  Size/MD5: 1024 22dc09e63f2b4127c80c059bd6153c04

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12.orig.tar.gz
  Size/MD5: 15921909 c7b83a19bd8a4f42d5d64c239d05121f

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.12-1ubuntu3.5_all.deb
  Size/MD5:36658 8445340ee40a549040a29f7f89fa6055

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.5_amd64.deb
  Size/MD5:  5831402 04b5f068cace48115f03eaa2945ba4f7

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.5_amd64.deb
  Size/MD5:  1540532 52379ea5384399887a5044e2dc70a362

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.5_amd64.deb
  Size/MD5:   898266 102c1f4e3a52f002c0072639a38fd1f1

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.5_amd64.deb
  Size/MD5: 18433534 0b59eb84f010a37866855db11bc212d4

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.5_i386.deb
  Size/MD5:  5347970 10e3a08014562d78a92c78f9473606ad

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.5_i386.deb
  Size/MD5:  1475306 fe18f1652d49ce4f1f01f1fb41293ee0

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.5_i386.deb
  Size/MD5:   866276 c4620364312b32767f4b8c93ca85ea6a

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.5_i386.deb
  Size/MD5: 17336092 c0a7e15a536c68f101d711faca79acd0

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.5_powerpc.deb
  Size/MD5:  6069036 84fe04fd9e556e03a5f8017b0287056e

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.5_powerpc.deb
  Size/MD5:  1548894 042a41167cffb3aa116ceca7b144c04a

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.5_powerpc.deb
  Size/MD5:   937510 b42029e8720887a9414a1e5affdfa2bf

http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.5_powerpc.deb
  Size/MD5: 18523172 687d56f3e0ea63af4bc5d972849e7019

  sparc architecture 

[Full-disclosure] [USN-297-2] Thunderbird extensions update for recent security update

2006-06-15 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-297-2  June 15, 2006
mozilla-thunderbird, thunderbird-quickfile updates
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  mozilla-thunderbird-inspector 1.5.0.4-0ubuntu6.06.1
  mozilla-thunderbird-typeaheadfind 1.5.0.4-0ubuntu6.06.1
  thunderbird-quickfile 0.15-0ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-297-1 fixed some security vulnerabilities in Thunderbird. This
update provides new versions of packaged extensions which work with
the current Thunderbird version.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.1.diff.gz
  Size/MD5:   454261 c63c59380c972f4b4dc998a512aa6b3e

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.1.dsc
  Size/MD5:  962 85cc9ee64d60ad3ef8992479646d9ff3

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4.orig.tar.gz
  Size/MD5: 35231284 243305d4d6723a45fcb1028caa3abca6

http://security.ubuntu.com/ubuntu/pool/universe/t/thunderbird-quickfile/thunderbird-quickfile_0.15-0ubuntu1.1.diff.gz
  Size/MD5:10126 03cd2c65730b98d600f4adaf20a6ecdd

http://security.ubuntu.com/ubuntu/pool/universe/t/thunderbird-quickfile/thunderbird-quickfile_0.15-0ubuntu1.1.dsc
  Size/MD5:  666 689f253ea9090b6ac40f48a544717ab4

http://security.ubuntu.com/ubuntu/pool/universe/t/thunderbird-quickfile/thunderbird-quickfile_0.15.orig.tar.gz
  Size/MD5:17269 8713f601ad35032cae30519eec2d06a4

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/t/thunderbird-quickfile/thunderbird-quickfile_0.15-0ubuntu1.1_all.deb
  Size/MD5:18896 d4b7eaca55d1aceed4b1f84046552b0d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.4-0ubuntu6.06.1_amd64.deb
  Size/MD5:  3524638 2b842f2ae5785be8fbb7d563f371c018

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.4-0ubuntu6.06.1_amd64.deb
  Size/MD5:   193284 78b4f24eb45219c53fc4869e2ed1fcba

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.4-0ubuntu6.06.1_amd64.deb
  Size/MD5:58508 656649e2e1a4d07a1d6c33fccc7cd81d

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.1_amd64.deb
  Size/MD5: 11962550 a28e55f6d1d77192124d9dabd2a26db6

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.4-0ubuntu6.06.1_i386.deb
  Size/MD5:  3516874 4ac8fab207c26aae9935ccbac736bb4b

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.4-0ubuntu6.06.1_i386.deb
  Size/MD5:   186664 55d63936c5fbc8161c6cb9b76e11

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.4-0ubuntu6.06.1_i386.deb
  Size/MD5:54026 f588502ac5e7818405b611ca656efadd

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.1_i386.deb
  Size/MD5: 10269508 9b54f2f3413fd3980f8aee5a5ff51e80

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.4-0ubuntu6.06.1_powerpc.deb
  Size/MD5:  3521666 7ecd880e86a3ec94cd52f6551786c068

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.4-0ubuntu6.06.1_powerpc.deb
  Size/MD5:   190002 2dbb9232a43b6e094cf1a1265ccda5f1

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.4-0ubuntu6.06.1_powerpc.deb
  Size/MD5:57606 40b9debb92d3a0711e3c7e8a1ce07f2f

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.1_powerpc.deb
  Size/MD5: 11536310 d8f9698d5e5e20694d6812a605941d20


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-297-1] Thunderbird vulnerabilities

2006-06-14 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-297-1  June 13, 2006
mozilla-thunderbird vulnerabilities
CVE-2006-2775, CVE-2006-2776, CVE-2006-2778, CVE-2006-2779,
CVE-2006-2780, CVE-2006-2781, CVE-2006-2783, CVE-2006-2786,
CVE-2006-2787
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  mozilla-thunderbird1.5.0.4-0ubuntu6.06
  mozilla-thunderbird-enigmail   2:0.94-0ubuntu4.1

After a standard system upgrade you need to restart Thunderbird to
effect the necessary changes.

Please note that Thunderbird 1.0.8 in Ubuntu 5.10 and Ubuntu 5.04 are
also affected by these problems. Updates for these Ubuntu releases
will be delayed due to upstream dropping support for this Thunderbird
version. We strongly advise that you disable JavaScript to disable the
attack vectors for most vulnerabilities if you use one of these Ubuntu
versions.

Details follow:

Jonas Sicking discovered that under some circumstances persisted XUL
attributes are associated with the wrong URL. A malicious web site
could exploit this to execute arbitrary code with the privileges of
the user. (MFSA 2006-35, CVE-2006-2775)

Paul Nickerson discovered that content-defined setters on an object
prototype were getting called by privileged UI code. It was
demonstrated that this could be exploited to run arbitrary web script
with full user privileges (MFSA 2006-37, CVE-2006-2776).

Mikolaj Habryn discovered a buffer overflow in the crypto.signText()
function. By sending an email with malicious JavaScript to an user,
and that user enabled JavaScript in Thunderbird (which is not the
default and not recommended), this could potentially be exploited to
execute arbitrary code with the user's privileges. (MFSA 2006-38,
CVE-2006-2778)

The Mozilla developer team discovered several bugs that lead to
crashes with memory corruption. These might be exploitable by
malicious web sites to execute arbitrary code with the privileges of
the user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780)

Masatoshi Kimura discovered a memory corruption (double-free) when
processing a large VCard with invalid base64 characters in it. By
sending a maliciously crafted set of VCards to a user, this could
potentially be exploited to execute arbitrary code with the user's
privileges. (MFSA 2006-40, CVE-2006-2781)

Masatoshi Kimura found a way to bypass web input sanitizers which
filter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)'
characters into the HTML code (e. g. 'scr[BOM]ipt'), these filters
might not recognize the tags anymore; however, Thunderbird would still
execute them since BOM markers are filtered out before processing a
mail containing JavaScript. (MFSA 2006-42, CVE-2006-2783)

Kazuho Oku discovered various ways to perform HTTP response smuggling
when used with certain proxy servers. Due to different interpretation
of nonstandard HTTP headers in Thunderbird and the proxy server, a
malicious HTML email can exploit this to send back two responses to one
request. The second response could be used to steal login cookies or
other sensitive data from another opened web site. (MFSA 2006-33,
CVE-2006-2786)

It was discovered that JavaScript run via EvalInSandbox() can escape
the sandbox. Malicious scripts received in emails containing
JavaScript could use these privileges to execute arbitrary code with
the user's privileges. (MFSA 2006-31, CVE-2006-2787)

The enigmail plugin has been updated to work with the new
Thunderbird version.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.diff.gz
  Size/MD5:   454199 909966693eff8a078ba864ad117ce739

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.dsc
  Size/MD5:  958 e4f852b4bab77b9623cc341c20bc09d9

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4.orig.tar.gz
  Size/MD5: 35231284 243305d4d6723a45fcb1028caa3abca6

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu4.1.diff.gz
  Size/MD5:20665 cdfe87eb65540f718072e34e02934992

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu4.1.dsc
  Size/MD5:  782 8fb6b5df3c43f49a66ccf53ba5668b30

http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94.orig.tar.gz
  Size/MD5:  3126659 7e34cbe51f5a1faca2e26fa0edfd6a06

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.4-0ubuntu6.06_amd64.deb
  

[Full-disclosure] [USN-288-4] dovecot regression fix

2006-06-14 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-288-4  June 13, 2006
dovecot regression
https://launchpad.net/bugs/49601
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  dovecot-common 1.0.beta3-3ubuntu5.2
  dovecot-imapd  1.0.beta3-3ubuntu5.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-288-3 fixed a vulnerability in dovecot. Unfortunately the Ubuntu
6.06 update had a regression which caused authentication using a MySQL
database to not work any more. This update fixes this again.

We apologize for the inconvenience.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_1.0.beta3-3ubuntu5.2.diff.gz
  Size/MD5:   467460 6721c3917554e5383eff0d3d759393d5

http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_1.0.beta3-3ubuntu5.2.dsc
  Size/MD5:  869 0f74b95d1df45200b3d51cb5764810a8

http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_1.0.beta3.orig.tar.gz
  Size/MD5:  1360574 5418f9f7fe99e4f10bb82d9fe504138a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.beta3-3ubuntu5.2_amd64.deb
  Size/MD5:   962458 24260c2d9be324071aef41db2d826504

http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.beta3-3ubuntu5.2_amd64.deb
  Size/MD5:   532464 b64008d2dd30299f0b70c2c34b3e92c0

http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.beta3-3ubuntu5.2_amd64.deb
  Size/MD5:   500614 10f84f165e8ade71ba000cc58573a0da

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.beta3-3ubuntu5.2_i386.deb
  Size/MD5:   838384 5f2b8dea89b9d219388a80d33a324129

http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.beta3-3ubuntu5.2_i386.deb
  Size/MD5:   485658 41cc4e3627b97756eaa2212ef72828c9

http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.beta3-3ubuntu5.2_i386.deb
  Size/MD5:   456374 7a146a5435886b5bf63b49ea13fa76b4

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.beta3-3ubuntu5.2_powerpc.deb
  Size/MD5:   940784 50a122950e2f40511c001924b6926254

http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.beta3-3ubuntu5.2_powerpc.deb
  Size/MD5:   526264 b7b0db3dc64507d906893dd434389c4d

http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.beta3-3ubuntu5.2_powerpc.deb
  Size/MD5:   493950 7a52a6532ed3e5ff02417e59860b7c29


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-298-1] libgd2 vulnerability

2006-06-14 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-298-1  June 13, 2006
libgd2 vulnerability
CVE-2006-2906
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libgd2-noxpm   2.0.33-1.1ubuntu1.5.04
  libgd2-xpm 2.0.33-1.1ubuntu1.5.04

Ubuntu 5.10:
  libgd2-noxpm   2.0.33-1.1ubuntu1.5.10
  libgd2-xpm 2.0.33-1.1ubuntu1.5.10

Ubuntu 6.06 LTS:
  libgd2-noxpm   2.0.33-2ubuntu5.1
  libgd2-xpm 2.0.33-2ubuntu5.1

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

Xavier Roche discovered that libgd's function for reading GIF image
data did not sufficiently verify its validity. Specially crafted GIF
images could cause an infinite loop which used up all available CPU
resources. Since libgd is often used in PHP and Perl web applications,
this could lead to a remote Denial of Service vulnerability.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-1.1ubuntu1.5.04.diff.gz
  Size/MD5:   259535 85c0f13b7f7ba029f629311c29708a0e

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-1.1ubuntu1.5.04.dsc
  Size/MD5:  897 6e3fa540918cab2297fbdd77f87ea6c6

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33.orig.tar.gz
  Size/MD5:   587617 be0a6d326cd8567e736fbc75df0a5c45

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-dev_2.0.33-1.1ubuntu1.5.04_all.deb
  Size/MD5:   128566 741f8358ae222a0ff9ff3e679e50e508

http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd2_2.0.33-1.1ubuntu1.5.04_all.deb
  Size/MD5:   128546 d1fd6ab0661d2cfeaca8dfd2cf2b4c29

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-1.1ubuntu1.5.04_amd64.deb
  Size/MD5:   142554 fc8552468de8c3ff44249eb8bd4f84a0

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1ubuntu1.5.04_amd64.deb
  Size/MD5:   338004 8abf135ee9e18ebd575dc5c8af7458db

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1ubuntu1.5.04_amd64.deb
  Size/MD5:   197030 d8836969867424381f0bd1c9e201bc8c

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1ubuntu1.5.04_amd64.deb
  Size/MD5:   340906 81be91de25d223b9dfb3aeb7a4cbcece

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-1.1ubuntu1.5.04_amd64.deb
  Size/MD5:   199468 aca7a9bb0dd0b286eba82014d3cbb0b8

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-1.1ubuntu1.5.04_i386.deb
  Size/MD5:   141060 71c2e67f310a0641b83f73c801174f76

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1ubuntu1.5.04_i386.deb
  Size/MD5:   329156 ee26bcd67da3925975e38fc73a26c71e

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1ubuntu1.5.04_i386.deb
  Size/MD5:   190724 98e8381effd02adcbc4358cf6890a882

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1ubuntu1.5.04_i386.deb
  Size/MD5:   330550 54689d29b260877e48c80d824cd384fe

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-1.1ubuntu1.5.04_i386.deb
  Size/MD5:   193258 53e97869e636c7ff19a03123bb50cf69

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-1.1ubuntu1.5.04_powerpc.deb
  Size/MD5:   150322 d47b3079e9403f954932b30b59ce2dc0

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1ubuntu1.5.04_powerpc.deb
  Size/MD5:   341558 0b936726f765f2a43b76c128d9dbd1e1

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1ubuntu1.5.04_powerpc.deb
  Size/MD5:   198802 cc4bdacf9c062630aa0abe0f603c21d7

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1ubuntu1.5.04_powerpc.deb
  Size/MD5:   344204 36df75287c80b2bfe6ce6e055e316686

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-1.1ubuntu1.5.04_powerpc.deb
  Size/MD5:   200872 4986d671d0f86482e77fe8bfa9aa8570

Updated packages for Ubuntu 5.10:

  Source archives:



[Full-disclosure] [USN-299-1] dhcdbd vulnerability

2006-06-14 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-299-1  June 13, 2006
dhcdbd vulnerability
https://launchpad.net/bugs/49104
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  dhcdbd 1.10-0ubuntu11.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Florian Hackenberger discovered a memory corruption bug in dhcdbd (the
NetworkManager daemon for processing DHCP operations). Invalid DHCP
responses crashed dhcdbd, which caused NetworkManager to not work any
more.

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/d/dhcdbd/dhcdbd_1.10-0ubuntu11.1.diff.gz
  Size/MD5: 5760 6f361c05e336353ac3552c9bc248319d

http://security.ubuntu.com/ubuntu/pool/main/d/dhcdbd/dhcdbd_1.10-0ubuntu11.1.dsc
  Size/MD5:  608 e267063fb19c930c18f4484e4c7fe861
http://security.ubuntu.com/ubuntu/pool/main/d/dhcdbd/dhcdbd_1.10.orig.tar.gz
  Size/MD5:70160 d54941e97507bfdd2458839591e1fd60

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/d/dhcdbd/dhcdbd_1.10-0ubuntu11.1_amd64.deb
  Size/MD5:49386 bf512d561eba57cc5f74e97be95fcc06

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/d/dhcdbd/dhcdbd_1.10-0ubuntu11.1_i386.deb
  Size/MD5:43042 631f10b839b26e1423a21ceedbeb3cab

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/d/dhcdbd/dhcdbd_1.10-0ubuntu11.1_powerpc.deb
  Size/MD5:47644 43937e8d74230cdc3cf902917a4f4a0f


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-300-1] wv2 vulnerability

2006-06-14 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-300-1  June 14, 2006
wv2 vulnerability
CVE-2006-2197
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libwv2-1   0.2.2-1ubuntu1.1
  libwv2-dev 0.2.2-1ubuntu1.1

Ubuntu 5.10:
  libwv2-1c2 0.2.2-1ubuntu2.1
  libwv2-dev 0.2.2-1ubuntu2.1

Ubuntu 6.06 LTS:
  libwv2-1c2 0.2.2-5ubuntu0.1
  libwv2-dev 0.2.2-5ubuntu0.1

After a standard system upgrade you need to restart KWord to effect
the necessary changes.

Details follow:

libwv2 did not sufficiently check the validity of its input. Certain
invalid Word documents caused a buffer overflow. By tricking a user
into opening a specially crafted Word file with an application that
uses libwv2, this could be exploited to execute arbitrary code with
the user's privileges.

The only packaged application using this library is KWord.

Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/wv2_0.2.2-1ubuntu1.1.diff.gz
  Size/MD5:16104 63df0ae571a2b6aeec69f9cb2373d1b9

http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/wv2_0.2.2-1ubuntu1.1.dsc
  Size/MD5:  661 b65ca0f07e82728296575737442c23b5
http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/wv2_0.2.2.orig.tar.gz
  Size/MD5:   855198 45fdc6df614f91e94d3b978dd8414e3b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/libwv2-1_0.2.2-1ubuntu1.1_amd64.deb
  Size/MD5:   243364 6e29b4a9882dce4dffc6d946e0957ca6

http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/libwv2-dev_0.2.2-1ubuntu1.1_amd64.deb
  Size/MD5:   183310 5e2b9cbb4f2548b48f0c1c5d34d08c20

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/libwv2-1_0.2.2-1ubuntu1.1_i386.deb
  Size/MD5:   232014 af559c86604bf323dadafbf44159125e

http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/libwv2-dev_0.2.2-1ubuntu1.1_i386.deb
  Size/MD5:   183308 bdb2ca946ba0689ac262c0b907f5fc64

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/libwv2-1_0.2.2-1ubuntu1.1_powerpc.deb
  Size/MD5:   221856 a2a7149c998191c373bf9cf3ec312f30

http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/libwv2-dev_0.2.2-1ubuntu1.1_powerpc.deb
  Size/MD5:   183312 afa93e9c16613bcd9afee555e5a922cd

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/w/wv2/wv2_0.2.2-1ubuntu2.1.diff.gz
  Size/MD5:16170 7a07243952babcbc99fd59d82290d348
http://security.ubuntu.com/ubuntu/pool/main/w/wv2/wv2_0.2.2-1ubuntu2.1.dsc
  Size/MD5:  663 293e081bc9ae957ae7dcdcd559f09d05
http://security.ubuntu.com/ubuntu/pool/main/w/wv2/wv2_0.2.2.orig.tar.gz
  Size/MD5:   855198 45fdc6df614f91e94d3b978dd8414e3b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/w/wv2/libwv2-1c2_0.2.2-1ubuntu2.1_amd64.deb
  Size/MD5:   272274 a9b18398d4266768b0232e0f0441a55d

http://security.ubuntu.com/ubuntu/pool/main/w/wv2/libwv2-dev_0.2.2-1ubuntu2.1_amd64.deb
  Size/MD5:   183332 e897aac4010b63ae4fd8c5dc5de9a8aa

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/w/wv2/libwv2-1c2_0.2.2-1ubuntu2.1_i386.deb
  Size/MD5:   240956 9fec9a49d9cdbe447a37cea80cce0ef5

http://security.ubuntu.com/ubuntu/pool/main/w/wv2/libwv2-dev_0.2.2-1ubuntu2.1_i386.deb
  Size/MD5:   183328 4b48ad49dff6c4c236c0323387a2232c

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/w/wv2/libwv2-1c2_0.2.2-1ubuntu2.1_powerpc.deb
  Size/MD5:   244644 73b01188d26474efa183eef9cbdaa4d2

http://security.ubuntu.com/ubuntu/pool/main/w/wv2/libwv2-dev_0.2.2-1ubuntu2.1_powerpc.deb
  Size/MD5:   183338 e3adfe6108ae54a24dca635965ec6828

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/w/wv2/wv2_0.2.2-5ubuntu0.1.diff.gz
  Size/MD5:   711482 de2a0a853439ae46d3946d5b51e3bb41
http://security.ubuntu.com/ubuntu/pool/main/w/wv2/wv2_0.2.2-5ubuntu0.1.dsc
  Size/MD5:  816 bcfd690cd308fa1cbd4bb87b6fc0714a
http://security.ubuntu.com/ubuntu/pool/main/w/wv2/wv2_0.2.2.orig.tar.gz
  Size/MD5:   855198 45fdc6df614f91e94d3b978dd8414e3b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)



[Full-disclosure] [USN-301-1] kdm vulnerability

2006-06-14 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-301-1  June 14, 2006
kdebase vulnerability
CVE-2006-2449
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  kdm4:3.4.0-0ubuntu18.3

Ubuntu 5.10:
  kdm4:3.4.3-0ubuntu7

Ubuntu 6.06 LTS:
  kdm4:3.5.2-0ubuntu27

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Ludwig Nussel discovered that kdm managed the ~/.dmrc file in an
insecure way. By performing a symlink attack, a local user could
exploit this to read arbitrary files on the system, like private files
of other users, /etc/shadow, and similarly sensitive data.

Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.0-0ubuntu18.3.diff.gz
  Size/MD5:   189940 e438b29d3f1d6aa5eba23a66db0cb73c

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.0-0ubuntu18.3.dsc
  Size/MD5: 1622 fe4317d23fded7349420082dbdfe6011

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.0.orig.tar.gz
  Size/MD5: 26947670 31334d21606078a1f1eab1c3a25317e9

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-data_3.4.0-0ubuntu18.3_all.deb
  Size/MD5:  4609190 bec4425639d4eaffeb7701e791e8aa36

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-doc_3.4.0-0ubuntu18.3_all.deb
  Size/MD5:  1084806 686cea67b31fcbe95eafabb4ca07a271

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.0-0ubuntu18.3_all.deb
  Size/MD5:22270 5a36a1b6724fb9657bf4764f7d65d126

http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase/xfonts-konsole_3.4.0-0ubuntu18.3_all.deb
  Size/MD5:38168 92671967a67838d37112766397c56358

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kappfinder_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:   245484 85c67d8bd907d9ea1826a94690e89993

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kate_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:   654568 145ce29e15e283daa64fb09cfa70d239

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kcontrol_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:  7957814 277ab5dd8c5f1180336da92cdf7d2be0

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-bin_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:  1153030 772de41db9421d79b844f92820185eb8

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-dev_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:61226 ecfaa369e4d60993b39d7ffa23cb1b51

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-kio-plugins_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:   807912 6e40af9f21f2cc39e1b1d5524536abbe

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdepasswd_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:   227242 67264f24b4c7d8d50db81beef16e

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdeprint_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:  1100448 8114ce60f71f1f718ea566ca12143879

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdesktop_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:   740256 9b9b18314d3388e4d85a5c960aeb35ec

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdm_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:   671020 c029ee377d2e5f8c3d44282c2fdcb235

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kfind_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:   185904 93359b04094c97310efc680327d21b83

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/khelpcenter_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:  1784496 20cda592949f1c31fd9513f82a5da15a

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kicker_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:  1805922 f6802bffc8088a8b47d5d5275c15016a

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/klipper_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:   245470 678c227f14ed6323d3091a83f7a33ba7

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kmenuedit_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:   207036 9ccc5cf4cf116d9ce4bff3e6706ce2cc

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror-nsplugins_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:   135464 060a9cb2af2364fba0141f8ac9bf03fb

http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror_3.4.0-0ubuntu18.3_amd64.deb
  Size/MD5:  2081958 3f8dad170e937186fea8a20cd7aa844e


[Full-disclosure] [USN-288-2] PostgreSQL server/client vulnerabilities

2006-06-09 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-288-2  June 09, 2006
postgresql-8.1 vulnerabilities
CVE-2006-2313, CVE-2006-2314
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  libpq-dev  8.1.4-0ubuntu1
  libpq4 8.1.4-0ubuntu1
  postgresql-8.1 8.1.4-0ubuntu1
  postgresql-client-8.1  8.1.4-0ubuntu1
  postgresql-contrib-8.1 8.1.4-0ubuntu1

After a standard system upgrade you need to restart all services that
use PostgreSQL to effect the necessary changes. If you can afford it,
rebooting the computer is the easiest way of ensuring that all running
services use the updated client library.

Details follow:

USN-288-1 fixed two vulnerabilities in Ubuntu 5.04 and Ubuntu 5.10.
This update fixes the same vulnerabilities for Ubuntu 6.06 LTS.

For reference, these are the details of the original USN:

  CVE-2006-2313:
Akio Ishida and Yasuo Ohgaki discovered a weakness in the handling of
invalidly-encoded multibyte text data. If a client application
processed untrusted input without respecting its encoding and applied
standard string escaping techniques (such as replacing a single quote
' with \' or ''), the PostgreSQL server could interpret the
resulting string in a way that allowed an attacker to inject arbitrary
SQL commands into the resulting SQL query. The PostgreSQL server has
been modified to reject such invalidly encoded strings now, which
completely fixes the problem for some 'safe' multibyte encodings like
UTF-8.
  
  CVE-2006-2314:
However, there are some less popular and client-only multibyte
encodings (such as SJIS, BIG5, GBK, GB18030, and UHC) which contain
valid multibyte characters that end with the byte 0x5c, which is the
representation of the backslash character \ in ASCII. Many client
libraries and applications use the non-standard, but popular way of
escaping the ' character by replacing all occurences of it with
\'. If a client application uses one of the affected encodings and
does not interpret multibyte characters, and an attacker supplies a
specially crafted byte sequence as an input string parameter, this
escaping method would then produce a validly-encoded character and
an excess ' character which would end the string. All subsequent
characters would then be interpreted as SQL code, so the attacker
could execute arbitrary SQL commands.
  
To fix this vulnerability end-to-end, client-side applications must
be fixed to properly interpret multibyte encodings and use ''
instead of \'. However, as a precautionary measure, the sequence
\' is now regarded as invalid when one of the affected client
encodings is in use. If you depend on the previous behaviour, you
can restore it by setting 'backslash_quote = on' in postgresql.conf.
However, please be aware that this could render you vulnerable
again.
  
This issue does not affect you if you only use single-byte (like
SQL_ASCII or the ISO-8859-X family) or unaffected multibyte (like
UTF-8) encodings.
  
  Please see http://www.postgresql.org/docs/techdocs.50 for further
  details.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.diff.gz
  Size/MD5:23774 50475bf9e83adaa54956b32fbeedbdca

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.dsc
  Size/MD5:  e1b77d64f44d3293f650b126ff624565

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4.orig.tar.gz
  Size/MD5: 11312643 c6554a0ef948ab2b18b617954e1788fe

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.4-0ubuntu1_all.deb
  Size/MD5:  1440630 81de1288298a0b1540b995db84d639db

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-0ubuntu1_amd64.deb
  Size/MD5:   151534 1a2d7dbbb8be5b9c8a5839a9602ca654

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-0ubuntu1_amd64.deb
  Size/MD5:   343524 06e9895e5575d0abdc2d90c504d0f60c

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-0ubuntu1_amd64.deb
  Size/MD5:   172050 6d8c0db031695b43daedf1ba0ccf1db4

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-0ubuntu1_amd64.deb
  Size/MD5:   173882 4df3a6b067ac6979ac5520d0413bc493


[Full-disclosure] [USN-293-1] gdm vulnerability

2006-06-09 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-293-1  June 09, 2006
gdm vulnerability
CVE-2006-2452
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  gdm2.8.0.5-0ubuntu1.2

Ubuntu 6.06 LTS:
  gdm2.14.6-0ubuntu2.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

If the admin configured a gdm theme that provided an user list, any
user could activate the gdm setup program by first choosing the setup
option from the menu, clicking on the user list and entering his own
(instead of root's) password. This allowed normal users to configure
potentially dangerous features like remote or automatic login.

Please note that this does not affect a default Ubuntu installation,
since the default theme does not provide an user list. In Ubuntu 6.06
you additionally have to have the ConfigAvailable setting enabled in
gdm.conf to be vulnerable (it is disabled by default).

Ubuntu 5.04 is not affected by this flaw.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.2.diff.gz
  Size/MD5:67128 33be1f0d249e20f26a71853429faecef
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.2.dsc
  Size/MD5:  820 a27629124864eceb8b7bde6d3bc5fce9
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5.orig.tar.gz
  Size/MD5:  4226618 349b76492113ab814f2732d4ce3a49c2

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.2_amd64.deb
  Size/MD5:  1618282 de5b62fce24232a5f46c930cd719740d

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.2_i386.deb
  Size/MD5:  1559904 34f918ecf92c03d0ab4befa70d735670

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.2_powerpc.deb
  Size/MD5:  1571650 2a8967304c094d4a0e79a0c9018fff4d

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.14.6-0ubuntu2.1.diff.gz
  Size/MD5:75736 c0235a8f490d5b383b07365d7643da5e
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.14.6-0ubuntu2.1.dsc
  Size/MD5:  885 670690837f6ee2692adfea92d71dd901
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.14.6.orig.tar.gz
  Size/MD5:  4681313 6e0e99eb405a9a8e04ff81122723aae5

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.14.6-0ubuntu2.1_amd64.deb
  Size/MD5:  1779088 d9c3c3cf9c4aebe8f797fafbd8f8e135

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.14.6-0ubuntu2.1_i386.deb
  Size/MD5:  1714272 78f75e07fc5950e5f61c80ca0188ebaf

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.14.6-0ubuntu2.1_powerpc.deb
  Size/MD5:  1762968 38d342e8408ad7cd6c613b8aa82e6458



signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-288-3] PostgreSQL client vulnerabilities

2006-06-09 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-288-3  June 09, 2006
dovecot, exim4, postfix vulnerabilities
CVE-2006-2314, CVE-2006-2753
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  dovecot-common 0.99.13-3ubuntu0.1
  exim4-daemon-heavy 4.34-10ubuntu0.1
  postfix-pgsql  2.1.5-9ubuntu3.1

Ubuntu 5.10:
  dovecot-common 0.99.14-1ubuntu1.1
  exim4-daemon-heavy 4.52-1ubuntu0.1
  postfix-pgsql  2.2.4-1ubuntu2.1

Ubuntu 6.06 LTS:
  dovecot-common 1.0.beta3-3ubuntu5.1
  exim4-daemon-heavy 4.60-3ubuntu3.1
  postfix-pgsql  2.2.10-1ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-288-1 described a PostgreSQL client vulnerability in the way 
the ' character is escaped in SQL queries. It was determined that
the PostgreSQL backends of Exim, Dovecot, and Postfix used this unsafe
escaping method.

For reference, these are the details of the original USN:

  CVE-2006-2313:
Akio Ishida and Yasuo Ohgaki discovered a weakness in the handling of
invalidly-encoded multibyte text data. If a client application
processed untrusted input without respecting its encoding and applied
standard string escaping techniques (such as replacing a single quote
' with \' or ''), the PostgreSQL server could interpret the
resulting string in a way that allowed an attacker to inject arbitrary
SQL commands into the resulting SQL query. The PostgreSQL server has
been modified to reject such invalidly encoded strings now, which
completely fixes the problem for some 'safe' multibyte encodings like
UTF-8.

  CVE-2006-2314:
However, there are some less popular and client-only multibyte
encodings (such as SJIS, BIG5, GBK, GB18030, and UHC) which contain
valid multibyte characters that end with the byte 0x5c, which is the
representation of the backslash character \ in ASCII. Many client
libraries and applications use the non-standard, but popular way of
escaping the ' character by replacing all occurences of it with
\'. If a client application uses one of the affected encodings and
does not interpret multibyte characters, and an attacker supplies a
specially crafted byte sequence as an input string parameter, this
escaping method would then produce a validly-encoded character and
an excess ' character which would end the string. All subsequent
characters would then be interpreted as SQL code, so the attacker
could execute arbitrary SQL commands.

To fix this vulnerability end-to-end, client-side applications must
be fixed to properly interpret multibyte encodings and use ''
instead of \'. However, as a precautionary measure, the sequence
\' is now regarded as invalid when one of the affected client
encodings is in use. If you depend on the previous behaviour, you
can restore it by setting 'backslash_quote = on' in postgresql.conf.
However, please be aware that this could render you vulnerable
again.

This issue does not affect you if you only use single-byte (like
SQL_ASCII or the ISO-8859-X family) or unaffected multibyte (like
UTF-8) encodings.

  Please see http://www.postgresql.org/docs/techdocs.50 for further
  details.

Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_0.99.13-3ubuntu0.1.diff.gz
  Size/MD5:25404 3c04c4209d088672d44274173375bbae

http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_0.99.13-3ubuntu0.1.dsc
  Size/MD5:  766 62f4a67113049644ff4ba1fe64186644

http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_0.99.13.orig.tar.gz
  Size/MD5:   867787 a84896c4236232b843972370e3730729

http://security.ubuntu.com/ubuntu/pool/main/e/exim4/exim4_4.34-10ubuntu0.1.diff.gz
  Size/MD5:   543118 eac768b2342855381a06668e0b9092b5

http://security.ubuntu.com/ubuntu/pool/main/e/exim4/exim4_4.34-10ubuntu0.1.dsc
  Size/MD5: 1093 cec092fdddee02a57f057adced2fc2b3
http://security.ubuntu.com/ubuntu/pool/main/e/exim4/exim4_4.34.orig.tar.gz
  Size/MD5:  1717473 acdf7117f18b71702d4da284b1263275

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.1.5-9ubuntu3.1.diff.gz
  Size/MD5:   461692 f88e13bc7a3bd0a7f21d4038c6ab1ba6

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.1.5-9ubuntu3.1.dsc
  Size/MD5:  870 9f52b77f7d9e17750e1b3fe83ea07495


[Full-disclosure] [USN-294-1] courier vulnerability

2006-06-09 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-294-1  June 09, 2006
courier vulnerability
CVE-2006-2659
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  courier-mta0.47-3ubuntu1.5

Ubuntu 5.10:
  courier-mta0.47-3ubuntu7.2

Ubuntu 6.06 LTS:
  courier-mta0.47-13ubuntu5.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

A Denial of Service vulnerability has been found in the function for
encoding email addresses. Addresses containing a '=' before the '@'
character caused the Courier to hang in an endless loop, rendering the
service unusable.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier_0.47-3ubuntu1.5.diff.gz
  Size/MD5:   108704 54427ae8946f3393309424c67b434294

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier_0.47-3ubuntu1.5.dsc
  Size/MD5: 1204 0740cd77bb282a9a6446b0ce0de80419

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier_0.47.orig.tar.gz
  Size/MD5:  6350808 361a84e497148ce557c150d3576ec24b

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-doc_0.47-3ubuntu1.5_all.deb
  Size/MD5:   370652 20507345daea36580119b02989159a76

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-authdaemon_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:62548 d157fe17cf5bc242082644b0e19434e4

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authmysql_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:57162 9a7094e1805c06a0c5e592a003f4dd30

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authpostgresql_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:57350 4a586bac446463116f8a752df108d3b2

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-base_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:   257282 659d6931e7f25352b88a6bffa1be6bba

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-faxmail_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:28864 38b62157bdbca607c2db3d1866db4cd5

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap-ssl_3.0.8-3ubuntu1.5_amd64.deb
  Size/MD5:21404 b9a740d1a5e4a366449711cb8472a291

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap_3.0.8-3ubuntu1.5_amd64.deb
  Size/MD5:   950548 c1ae151418e74a11af6930f9b733a5f9

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-ldap_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:74292 d67ac6f6e8df175cc1eb877a766d9f10

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-maildrop_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:   942804 23c26b6c2f9d69a3baaf77bc9f8cf5c7

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mlm_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:   122864 b72a7fe87d9458ec172fabe33cb0aa0f

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta-ssl_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:19486 2f0fc3d9f7ddd934d0224ab7085cac9a

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:  2157504 6a4f4624f1b01e3c2b4a11ed45370b44

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-pcp_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:6 7b8e381af3f0ec2a0d92895e3e7079cb

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop-ssl_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:21202 80c2075c5f9eff0e42d58cd05c5fae3a

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:   423242 217a9fcf78949204f8666e3d1ad0d179

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-ssl_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:   195810 82539a6e475e5d83652274e6b4379d0e

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-webadmin_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:34538 8d78c981468e57c927f593f0b1580c4e

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/sqwebmail_0.47-3ubuntu1.5_amd64.deb
  Size/MD5:   798170 3ac5a00717db529f057ce0da2cefa0ca

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-authdaemon_0.47-3ubuntu1.5_i386.deb
  Size/MD5:56302 d74f86a962af5e41b3248cbb02f5dbbf

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authmysql_0.47-3ubuntu1.5_i386.deb
  Size/MD5:52212 

[Full-disclosure] [USN-295-1] xine-lib vulnerability

2006-06-09 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-295-1  June 09, 2006
xine-lib vulnerability
CVE-2006-2802
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libxine1   1.0-1ubuntu3.7

Ubuntu 5.10:
  libxine1c2 1.0.1-1ubuntu10.3

Ubuntu 6.06 LTS:
  libxine-main1  1.1.1+ubuntu2-7.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.
XXX OR XXX
After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

Federico L. Bossi Bonin discovered a buffer overflow in the HTTP input
module. By tricking an user into opening a malicious remote media
location, a remote attacker could exploit this to crash Xine library
frontends (like totem-xine, gxine, or xine-ui) and possibly even
execute arbitrary code with the user's privileges.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0-1ubuntu3.7.diff.gz
  Size/MD5: 4636 5cc6919bd457df6beae53e9a84e9e503

http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0-1ubuntu3.7.dsc
  Size/MD5: 1070 1a862dac447d52ecfb8bcdcbb24cf5de

http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0.orig.tar.gz
  Size/MD5:  7384258 96e5195c366064e7778af44c3e71f43a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0-1ubuntu3.7_amd64.deb
  Size/MD5:   106846 edbbcd4d032bb0e3ff692ac7138fe2fb

http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1_1.0-1ubuntu3.7_amd64.deb
  Size/MD5:  3567510 0d1ba9ac491e5482d82acb2f776f21bb

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0-1ubuntu3.7_i386.deb
  Size/MD5:   106822 86c3f51b3200996f96131c8c53c67506

http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1_1.0-1ubuntu3.7_i386.deb
  Size/MD5:  3750458 eff585a1e98695ae4146cd97c7560fcf

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0-1ubuntu3.7_powerpc.deb
  Size/MD5:   106850 9097246c8357d5a04139bcee0ddbb7b8

http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1_1.0-1ubuntu3.7_powerpc.deb
  Size/MD5:  3925536 8d2576a78270fb2806a18e011a18921a

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0.1-1ubuntu10.3.diff.gz
  Size/MD5: 9453 2a3b01a6d858e8623a89e5cce831d392

http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0.1-1ubuntu10.3.dsc
  Size/MD5: 1186 47fb3762575e25d037c3e6ba2d3d6744

http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0.1.orig.tar.gz
  Size/MD5:  7774954 9be804b337c6c3a2e202c5a7237cb0f8

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0.1-1ubuntu10.3_amd64.deb
  Size/MD5:   108858 8081b6beb283dfefeda7aa0a81d5008e

http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1c2_1.0.1-1ubuntu10.3_amd64.deb
  Size/MD5:  3611122 99e0979785b3c7c7001d33ddd5e8bb96

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0.1-1ubuntu10.3_i386.deb
  Size/MD5:   108864 7dfd068cc168dcc55993d70277901b3d

http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1c2_1.0.1-1ubuntu10.3_i386.deb
  Size/MD5:  4004210 156188682cd24dbfa922b94d66d2dd63

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0.1-1ubuntu10.3_powerpc.deb
  Size/MD5:   108866 1489e831ed6bb874756e0f2f4a44ecca

http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1c2_1.0.1-1ubuntu10.3_powerpc.deb
  Size/MD5:  3849668 6fdbbe888f1c7ee821af81e16352d61b

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.1.1+ubuntu2-7.1.diff.gz
  Size/MD5:17494 e751ca0a9c5b41b7c4027bef6ace5c06

http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.1.1+ubuntu2-7.1.dsc
  Size/MD5: 1115 6bce2e7e1451f9466a8b18592622257b

http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.1.1+ubuntu2.orig.tar.gz
  Size/MD5:  6099365 5d0f3988e4d95f6af6f3caf2130ee992

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)



[Full-disclosure] [USN-289-1] tiff vulnerabilities

2006-06-08 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-289-1  June 08, 2006
tiff vulnerabilities
CVE-2006-2193, CVE-2006-2656
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libtiff-tools  3.6.1-5ubuntu0.5

Ubuntu 5.10:
  libtiff-tools  3.7.3-1ubuntu1.4

Ubuntu 6.06 LTS:
  libtiff-tools  3.7.4-1ubuntu3.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

A buffer overflow has been found in the tiff2pdf utility. By tricking
an user into processing a specially crafted TIF file with tiff2pdf,
this could potentially be exploited to execute arbitrary code with the
privileges of the user. (CVE-2006-2193)

A. Alejandro Hernández discovered a buffer overflow in the tiffsplit
utility. By calling tiffsplit with specially crafted long arguments,
an user can execute arbitrary code.  If tiffsplit is used in e. g.  a
web-based frontend or similar automated system, this could lead to
remote arbitary code execution with the privileges of that system. (In
normal interactive command line usage this is not a vulnerability.)
(CVE-2006-2656)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1-5ubuntu0.5.diff.gz
  Size/MD5:26319 e6f75f611b9c77ce07cb2cf513f654ad
http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1-5ubuntu0.5.dsc
  Size/MD5:  681 57c2c112da454d86f49d8bf2e8e16d9b
http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1.orig.tar.gz
  Size/MD5:   848760 bd252167a20ac7910ab3bd2b3ee9e955

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.5_amd64.deb
  Size/MD5:   172880 e890e7578915c4613cd7a74b184445bd

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.5_amd64.deb
  Size/MD5:   459208 8817f18ad3ae963b4a74c716cf7bf0b8

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.5_amd64.deb
  Size/MD5:   112968 5646656fd78c0ff663866e74977bf78e

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.5_i386.deb
  Size/MD5:   155968 27e009d03b6a5d9a93eabde478dc9b1c

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.5_i386.deb
  Size/MD5:   440508 f484f7e00cb7240a9c6f860ec5de9ade

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.5_i386.deb
  Size/MD5:   103886 0388682d81cc301ef2b83a4f4438a05c

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.5_powerpc.deb
  Size/MD5:   188188 6316125bd4d1a540957aa0cc9c60fa8d

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.5_powerpc.deb
  Size/MD5:   463674 8f080f57ffc4cb3a0f116ce7c353c381

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.5_powerpc.deb
  Size/MD5:   114370 971a6be7879aaf5d92b55951b7cdd141

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3-1ubuntu1.4.diff.gz
  Size/MD5:11378 17db8270668b8b0eefceb0d27e14bd11
http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3-1ubuntu1.4.dsc
  Size/MD5:  756 218a54ab0966c1b6204b27343b916093
http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3.orig.tar.gz
  Size/MD5:  1268182 48fbef3d76a6253699f28f49c8f25a8b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.3-1ubuntu1.4_amd64.deb
  Size/MD5:48184 eed2ddb6187b1717db2de95dbc590ec6

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.3-1ubuntu1.4_amd64.deb
  Size/MD5:   219688 79d9cf71f16a3a95c54b481bca648eab

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.3-1ubuntu1.4_amd64.deb
  Size/MD5:   281702 b5b1b261be7c047c3be3eeb2f8398b8a

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.3-1ubuntu1.4_amd64.deb
  Size/MD5:   472142 9cac886846d30589b05802fcc6e01f67

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.3-1ubuntu1.4_amd64.deb
  Size/MD5:43014 1b71df913359a6b0bdd8d6ebb3e33d7a

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.3-1ubuntu1.4_i386.deb
  Size/MD5:47562 

[Full-disclosure] [USN-291-1] FreeType vulnerabilities

2006-06-08 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-291-1  June 08, 2006
freetype vulnerabilities
CVE-2006-0747, CVE-2006-1861, CVE-2006-2493, CVE-2006-2661
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libfreetype6   2.1.7-2.3ubuntu0.1

Ubuntu 5.10:
  libfreetype6   2.1.7-2.4ubuntu1.1

Ubuntu 6.06 LTS:
  libfreetype6   2.1.10-1ubuntu2.1

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

Several integer overflows have been discovered in the FreeType
library. By tricking a user into installing and/or opening a specially
crafted font file, these could be exploited to execute arbitrary code
with the privileges of that user.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.3ubuntu0.1.diff.gz
  Size/MD5:55085 0be8f928fd34db525db66f8cd07f79e2

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.3ubuntu0.1.dsc
  Size/MD5:  695 55710d777fdc8cee093e4eb17d03b8e4

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7.orig.tar.gz
  Size/MD5:  1245623 991ff86e88b075ba363e876f4ea58680

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.3ubuntu0.1_amd64.deb
  Size/MD5:76248 654defa84e451a720843e160d9e0ad4b

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.3ubuntu0.1_amd64.deb
  Size/MD5:   723698 ac752c537fcd86b0e15366f75237c8c4

http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.3ubuntu0.1_amd64.udeb
  Size/MD5:   238246 7bcc9b311d84ac923693484563415fc0

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.3ubuntu0.1_amd64.deb
  Size/MD5:   389494 0c1c61803010adc6ac4303e0ed34cab4

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.3ubuntu0.1_i386.deb
  Size/MD5:57070 96143b6b668cdf1301a1f0d8cb935f38

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.3ubuntu0.1_i386.deb
  Size/MD5:   688162 c16278b396bc6a3932e6488f6a4302d6

http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.3ubuntu0.1_i386.udeb
  Size/MD5:   208092 ce4669a078ce4c5cd25e53e372fbc0f2

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.3ubuntu0.1_i386.deb
  Size/MD5:   358818 1e05d62b7c8fd3ed25ce9590289038b7

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.3ubuntu0.1_powerpc.deb
  Size/MD5:81974 261cb107a20048a653b7363e5e763095

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.3ubuntu0.1_powerpc.deb
  Size/MD5:   730026 45f7603197520093383be1bc4ef71768

http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.3ubuntu0.1_powerpc.udeb
  Size/MD5:   227736 82ba5fdb752f1e14a168356eb58040d4

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.3ubuntu0.1_powerpc.deb
  Size/MD5:   378628 560ddb84ab50151db4950def5ca94f20

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.4ubuntu1.1.diff.gz
  Size/MD5:56497 c0d09dab367b91d60391bfbe1614a751

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.4ubuntu1.1.dsc
  Size/MD5:  695 baa464576ecff8f71180b69c43f3d3d7

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7.orig.tar.gz
  Size/MD5:  1245623 991ff86e88b075ba363e876f4ea58680

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.4ubuntu1.1_amd64.deb
  Size/MD5:75536 763397ace4438b17c1d553e742164392

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.4ubuntu1.1_amd64.deb
  Size/MD5:   722918 ab4ac77fc4c341c5b9e3e5d8b7cd03ad

http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.4ubuntu1.1_amd64.udeb
  Size/MD5:   241670 71a3a0944b74daf49d428096258481d4

http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.4ubuntu1.1_amd64.deb
  Size/MD5:   392814 ac0b9929a7839fe770b81d8934811f91

  i386 architecture (x86 

[Full-disclosure] [USN-287-1] Nagios vulnerability

2006-05-29 Thread Martin Pitt
===
Ubuntu Security Notice USN-287-1   May 29, 2006
nagios vulnerability
CVE-2006-2489
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

nagios-common

The problem can be corrected by upgrading the affected package to
version 2:1.3-0+pre6ubuntu0.2 (for Ubuntu 5.04), or
2:1.3-cvs.20050402-4ubuntu3.2 (for Ubuntu 5.10).  In general, a
standard system upgrade is sufficient to effect the necessary changes.

Details follow:

The nagios CGI scripts did not sufficiently check the validity of the
HTTP Content-Length attribute. By sending a specially crafted HTTP
request with an invalidly large Content-Length value to the Nagios
server, a remote attacker could exploit this to execute arbitrary code
with web server privileges.

Please note that the Apache 2 web server already checks for valid
Content-Length values, so installations using Apache 2 (the only web
server officially supported in Ubuntu) are not vulnerable to this
flaw.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-0+pre6ubuntu0.2.diff.gz
  Size/MD5:80449 1af54c94d8119c7838dd5daed1e50c9b

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-0+pre6ubuntu0.2.dsc
  Size/MD5: 1010 7ce12d54ea17c24c898346995397e069
http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3.orig.tar.gz
  Size/MD5:  1625322 414d70e5269d5b8d7c21bf3ee129309f

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-common_1.3-0+pre6ubuntu0.2_all.deb
  Size/MD5:  1213320 bb517ad62a0b4515b677fffa556086f9

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-0+pre6ubuntu0.2_amd64.deb
  Size/MD5:   994506 a5115aa68e435a3727f066addedb20c7

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-0+pre6ubuntu0.2_amd64.deb
  Size/MD5:  1006602 29d2add2204db681b02c6345bb23c8ee

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-0+pre6ubuntu0.2_amd64.deb
  Size/MD5:   976218 026ea6069f7e240c501e40cc45d995a4

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-0+pre6ubuntu0.2_i386.deb
  Size/MD5:   872622 88340a6009fa9ca6e19d1d83967d47d0

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-0+pre6ubuntu0.2_i386.deb
  Size/MD5:   882350 26502350bfee23fbf3bba4297d4f73c1

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-0+pre6ubuntu0.2_i386.deb
  Size/MD5:   857930 f8f30305908113a31559f24d11d6d36d

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-0+pre6ubuntu0.2_powerpc.deb
  Size/MD5:  1003054 5710e195a858bd6e425e302dc1e8268b

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-0+pre6ubuntu0.2_powerpc.deb
  Size/MD5:  1010828 585a23296ea4a6e29141fa6cc8c6c39e

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-0+pre6ubuntu0.2_powerpc.deb
  Size/MD5:   970178 bcf95bae9783327b461f6c06dcfd6edb

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-cvs.20050402-4ubuntu3.2.diff.gz
  Size/MD5:73095 6415cb60826aacb697b6d5e8e2ce2987

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-cvs.20050402-4ubuntu3.2.dsc
  Size/MD5: 1039 40c86a1a990d82fa0c5608ad6d73c0d5

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-cvs.20050402.orig.tar.gz
  Size/MD5:  1621251 0f92b7b8e705411b7881d3650cbb5d56

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-common_1.3-cvs.20050402-4ubuntu3.2_all.deb
  Size/MD5:  1221338 8242fbb490a4f669f3f06eddb2b6439e

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-cvs.20050402-4ubuntu3.2_amd64.deb
  Size/MD5:  1030086 4833dee00a8e7dd04469fcda70184cf6

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-cvs.20050402-4ubuntu3.2_amd64.deb
  Size/MD5:  1041982 bfe2bee8ee08e6e45cce8bf905736e3b

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-cvs.20050402-4ubuntu3.2_amd64.deb
  Size/MD5:  1025714 c3f7679dd7e03cc7ef91178bb8943af1

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-cvs.20050402-4ubuntu3.2_i386.deb
  Size/MD5:   879066 4c9e26642676ae206c90cd68b44ec538


[Full-disclosure] [USN-286-1] Dia vulnerabilities

2006-05-24 Thread Martin Pitt
===
Ubuntu Security Notice USN-286-1   May 24, 2006
dia vulnerabilities
CVE-2006-2453, CVE-2006-2480
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

dia
dia-gnome

The problem can be corrected by upgrading the affected package to
version 0.94.0-5ubuntu1.3 (for Ubuntu 5.04), or 0.94.0-11ubuntu1.2
(for Ubuntu 5.10).  After doing a standard system upgrade you need to
restart dia to effect the necessary changes.

Details follow:

Several format string vulnerabilities have been discovered in dia. By
tricking a user into opening a specially crafted dia file, or a
file with a specially crafted name, this could be exploited to execute
arbitrary code with the user's privileges.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia_0.94.0-5ubuntu1.3.diff.gz
  Size/MD5:17086 d5771a080f9fab65abe39fa461b0be3f
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia_0.94.0-5ubuntu1.3.dsc
  Size/MD5: 1408 dfca9d13543432df3ff0b89dd87694ad
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia_0.94.0.orig.tar.gz
  Size/MD5:  5241128 d2afdc10f55df29314250d98dbfd7a79

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-common_0.94.0-5ubuntu1.3_all.deb
  Size/MD5:  2148748 fc6799fd655d1417c1c382992dd28ab1

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-5ubuntu1.3_amd64.deb
  Size/MD5:   194954 2912894e6aa809b200c0435475a02009

http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-5ubuntu1.3_amd64.deb
  Size/MD5:   659674 b318e38937352a027afd3772621566f9

http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-5ubuntu1.3_amd64.deb
  Size/MD5:   193266 cd0496cef2874ef740abafe9f28d53ec

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-5ubuntu1.3_i386.deb
  Size/MD5:   176988 e9b27d3c32f4c683f9a0878f74b04df5

http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-5ubuntu1.3_i386.deb
  Size/MD5:   580590 60aa194372a368dad6c15b096c74a3f4

http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-5ubuntu1.3_i386.deb
  Size/MD5:   175510 c8bdfa25f8d165aa319b91dcdaa10004

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-5ubuntu1.3_powerpc.deb
  Size/MD5:   184652 a2616015be8f766ed36ba7a0fe6f1fa0

http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-5ubuntu1.3_powerpc.deb
  Size/MD5:   675104 bca6250681070c0045dba899f6f11707

http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-5ubuntu1.3_powerpc.deb
  Size/MD5:   183176 38213309ad4f232332aa62b47c2286df

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia_0.94.0-11ubuntu1.2.diff.gz
  Size/MD5:32541 a71619e0d5df51e905a68328c54c01d9
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia_0.94.0-11ubuntu1.2.dsc
  Size/MD5: 1423 8d3d29b9e45d9d53f690a15643e72e96
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia_0.94.0.orig.tar.gz
  Size/MD5:  5241128 d2afdc10f55df29314250d98dbfd7a79

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-common_0.94.0-11ubuntu1.2_all.deb
  Size/MD5:  2148928 ed8976d604e4929c85c8e9bab40406f0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-11ubuntu1.2_amd64.deb
  Size/MD5:   194656 6a830bb38a1720bd19f12e96074a9418

http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-11ubuntu1.2_amd64.deb
  Size/MD5:   659118 e831effa3a3d9b2990e4b2c3f7b9d46a

http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-11ubuntu1.2_amd64.deb
  Size/MD5:   193170 e7ac00a876bb8e24691a8fa3933ab0f5

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-11ubuntu1.2_i386.deb
  Size/MD5:   171796 6ea1f835eb7c4315084190e8f628b6ec

http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-11ubuntu1.2_i386.deb
  Size/MD5:   549270 44d546e86e6c81936c1ab278a71f2ebc

http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-11ubuntu1.2_i386.deb
  Size/MD5:   170448 e342deec10cef78f9f83fd8e691392d0

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-11ubuntu1.2_powerpc.deb
  Size/MD5:   185366 b2d487e8a89ace311fc5b9ed29088c92


[Full-disclosure] [USN-285-1] awstats vulnerability

2006-05-23 Thread Martin Pitt
===
Ubuntu Security Notice USN-285-1   May 23, 2006
awstats vulnerability
CVE-2006-2237
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

awstats

The problem can be corrected by upgrading the affected package to
version 6.3-1ubuntu0.2 (for Ubuntu 5.04), or 6.4-1ubuntu1.1 (for
Ubuntu 5.10).  In general, a standard system upgrade is sufficient to
effect the necessary changes.

Details follow:

AWStats did not properly sanitize the 'migrate' CGI parameter.  If the
update of the stats via web front-end is allowed, a remote attacker
could execute arbitrary commands on the server with the privileges of
the AWStats server.

This does not affect AWStats installations which only build static
pages.

Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.2.diff.gz
  Size/MD5:25306 1f013ca8aaad65d8f3ae148e194b3551

http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.2.dsc
  Size/MD5:  595 46a103a327e1f1bad3876927c7e66198

http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3.orig.tar.gz
  Size/MD5:   938794 edb73007530a5800d53b9f1f90c88053

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.2_all.deb
  Size/MD5:   726430 728ee50f468a4cf3693a32b98c94b455

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.1.diff.gz
  Size/MD5:18541 e186b842fbd2d4d97b65eacf7c9c1295

http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.1.dsc
  Size/MD5:  595 c5784c2c1bfa002abbfa77d936bc2da5

http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4.orig.tar.gz
  Size/MD5:   918435 056e6fb0c7351b17fe5bbbe0aa1297b1

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.1_all.deb
  Size/MD5:   728490 60ca39a436e3a21a838560db5d8a5f3b


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-274-2] MySQL vulnerability

2006-05-15 Thread Martin Pitt
===
Ubuntu Security Notice USN-274-2   May 15, 2006
mysql-dfsg vulnerability
CVE-2006-0903
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

mysql-server

The problem can be corrected by upgrading the affected package to
version 4.0.23-3ubuntu2.4 (for Ubuntu 5.04), or 4.0.24-10ubuntu2.3
(for Ubuntu 5.10).  In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

USN-274-1 fixed a logging bypass in the MySQL server. Unfortunately it
was determined that the original update was not sufficient to
completely fix the vulnerability, thus another update is necessary. We
apologize for the inconvenience.

For reference, these are the details of the original USN:

  A logging bypass was discovered in the MySQL query parser. A local
  attacker could exploit this by inserting NUL characters into query
  strings (even into comments), which would cause the query to be
  logged incompletely.

  This only affects you if you enabled the 'log' parameter in the
  MySQL configuration.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23-3ubuntu2.4.diff.gz
  Size/MD5:   347218 5bf62963f2439449d17429b974dc954e

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23-3ubuntu2.4.dsc
  Size/MD5:  891 cf807937ea7cb09d1717c562c355e2cd

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23.orig.tar.gz
  Size/MD5:  9814467 5eec8f66ed48c6ff92e73161651a492b

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-common_4.0.23-3ubuntu2.4_all.deb
  Size/MD5:32366 1a3bd9d864cae3bfa1987f859b5624aa

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.4_amd64.deb
  Size/MD5:  2867226 cee7c90e2a0fd2ab3d17ba1b25b74f0d

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.4_amd64.deb
  Size/MD5:   307670 e7fea674e9dcad07d491e70f80aefa77

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.23-3ubuntu2.4_amd64.deb
  Size/MD5:   431800 6b87ceedfa25337da77b1cb0f461526e

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.23-3ubuntu2.4_amd64.deb
  Size/MD5:  3629366 3ae34465083080e3bf9d620f8cb8cb02

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.4_i386.deb
  Size/MD5:  2827210 8efa7c02567c9728cd915d3c40e5a197

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.4_i386.deb
  Size/MD5:   290266 d922e809d77b6b5dc3b4ed0b60aab4ca

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.23-3ubuntu2.4_i386.deb
  Size/MD5:   405024 b44e2e31c97d7e53fe0c165c8857dae2

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.23-3ubuntu2.4_i386.deb
  Size/MD5:  3538020 3b77c2725479cf9167f0015ab6c84217

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.4_powerpc.deb
  Size/MD5:  3181320 b9a3a84b59e90cebc93f0a19cc63c9ef

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.4_powerpc.deb
  Size/MD5:   313258 cbcdd0d05906c05ff730b1b75d04c860

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.23-3ubuntu2.4_powerpc.deb
  Size/MD5:   462556 3b7b56ceb6c3698ab404080a0692f5ec

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.23-3ubuntu2.4_powerpc.deb
  Size/MD5:  3840116 63049c52217853f785162ba6d54f133d

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.24-10ubuntu2.3.diff.gz
  Size/MD5:99812 d274d44f9970d8b2489f2a70b033f77a

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.24-10ubuntu2.3.dsc
  Size/MD5:  966 2f2a9b55283f1d634dce18e558d92ba3

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.24.orig.tar.gz
  Size/MD5:  9923794 aed8f335795a359f32492159e3edfaa3

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-common_4.0.24-10ubuntu2.3_all.deb
  Size/MD5:35028 a2a4b01f8de78f0489b2fb1563cb5f7a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10ubuntu2.3_amd64.deb
  

[Full-disclosure] [USN-284-1] Quagga vulnerabilities

2006-05-15 Thread Martin Pitt
===
Ubuntu Security Notice USN-284-1   May 15, 2006
quagga vulnerabilities
CVE-2006-2223, CVE-2006-2224, CVE-2006-2276
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

quagga

The problem can be corrected by upgrading the affected package to
version 0.97.3-1ubuntu1.1 (for Ubuntu 5.04), or 0.99.1-1ubuntu1.1 (for
Ubuntu 5.10).  In general, a standard system upgrade is sufficient to
effect the necessary changes.

Details follow:

Paul Jakma discovered that Quagga's ripd daemon did not properly
handle authentication of RIPv1 requests. If the RIPv1 protocol had
been disabled, or authentication for RIPv2 had been enabled, ripd
still replied to RIPv1 requests, which could lead to information
disclosure. (CVE-2006-2223)

Paul Jakma also noticed that ripd accepted unauthenticated RIPv1
response packets if RIPv2 was configured to require authentication and
both protocols were allowed. A remote attacker could exploit this to
inject arbitrary routes. (CVE-2006-2224)

Fredrik Widell discovered that Quagga did not properly handle certain
invalid 'sh ip bgp' commands. By sending special commands to Quagga, a
remote attacker with telnet access to the Quagga server could exploit
this to trigger an endless loop in the daemon (Denial of Service).
(CVE-2006-2276)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.97.3-1ubuntu1.1.diff.gz
  Size/MD5:38413 eda4c03884896ba450f16ee70f8c082a

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.97.3-1ubuntu1.1.dsc
  Size/MD5:  714 22a7196923c807617fcd995c01c340b1

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.97.3.orig.tar.gz
  Size/MD5:  1964834 9015a5c61b22dc4e51b07fdc9bdadfd1

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.97.3-1ubuntu1.1_all.deb
  Size/MD5:   477692 15527f6d3580a5327a31a6244cfc78f7

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.97.3-1ubuntu1.1_amd64.deb
  Size/MD5:  1345612 75b7044e62475f2b4b6bf4a2c682f681

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.97.3-1ubuntu1.1_i386.deb
  Size/MD5:  1124086 9ff534e9d6a717b340d448b486f5a8de

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.97.3-1ubuntu1.1_powerpc.deb
  Size/MD5:  1245250 acaa9feaf12f20e42407d25103b698bd

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.1-1ubuntu1.1.diff.gz
  Size/MD5:27760 5577e4835dca7dce5d857ca843c43358

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.1-1ubuntu1.1.dsc
  Size/MD5:  722 f2690f9ed75e966362870c591e4e5a72

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.1.orig.tar.gz
  Size/MD5:  2107583 afd8c23a32050be76e55c28ec9dcff73

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.1-1ubuntu1.1_all.deb
  Size/MD5:   580362 af8e02b1ef292dc9e883a24b644d3e3f

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.1-1ubuntu1.1_amd64.deb
  Size/MD5:  1418614 6d36f2bc13d16f87d8bed040dfdfcc0d

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.1-1ubuntu1.1_i386.deb
  Size/MD5:  1204568 39d90181e76908dabf23d4bee37c220e


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-282-1] Nagios vulnerability

2006-05-08 Thread Martin Pitt
===
Ubuntu Security Notice USN-282-1   May 08, 2006
nagios vulnerability
CVE-2006-2162
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

nagios-common

The problem can be corrected by upgrading the affected package to
version 2:1.3-0+pre6ubuntu0.1 (for Ubuntu 5.04), or
2:1.3-cvs.20050402-4ubuntu3.1 (for Ubuntu 5.10).  In general, a
standard system upgrade is sufficient to effect the necessary changes.

Details follow:

The nagios CGI scripts did not sufficiently check the validity of the
HTTP Content-Length attribute. By sending a specially crafted HTTP
request with a negative Content-Length value to the Nagios server, a
remote attacker could exploit this to execute arbitrary code with web
server privileges.

Please note that the Apache 2 web server already checks for valid
Content-Length values, so installations using Apache 2 (the only web
server officially supported in Ubuntu) are not vulnerable to this
flaw.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-0+pre6ubuntu0.1.diff.gz
  Size/MD5:80281 7d71114ea6d8e11edb79133235e94951

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-0+pre6ubuntu0.1.dsc
  Size/MD5: 1010 611221f65f55763d607bd18754f5b46e
http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3.orig.tar.gz
  Size/MD5:  1625322 414d70e5269d5b8d7c21bf3ee129309f

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-common_1.3-0+pre6ubuntu0.1_all.deb
  Size/MD5:  1213184 aef209a60989887c5e4828f8c6e5ed22

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-0+pre6ubuntu0.1_amd64.deb
  Size/MD5:   994148 caee3765a8cb8826cbfb83b6a80a93aa

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-0+pre6ubuntu0.1_amd64.deb
  Size/MD5:  1006218 331626a1400801648faa72261f72bc0f

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-0+pre6ubuntu0.1_amd64.deb
  Size/MD5:   975952 83b6c5a302ed299866fa717020c30d68

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-0+pre6ubuntu0.1_i386.deb
  Size/MD5:   872306 fcb37a47f0eff94a77d1a1e30205aeec

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-0+pre6ubuntu0.1_i386.deb
  Size/MD5:   882042 08b7590825e1d97807445e11859fb487

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-0+pre6ubuntu0.1_i386.deb
  Size/MD5:   857596 0feedae7fd082a9b566bdc52c2a69794

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-0+pre6ubuntu0.1_powerpc.deb
  Size/MD5:  1002618 f7267c0a908b37119bd1cc75a82f691a

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-0+pre6ubuntu0.1_powerpc.deb
  Size/MD5:  1010332 cd4882a8adaf882be52ca06c03a9f009

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-0+pre6ubuntu0.1_powerpc.deb
  Size/MD5:   969694 61692fa210eac3be4acc0ec31db859df

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-cvs.20050402-4ubuntu3.1.diff.gz
  Size/MD5:72940 45eb9bb3f5d319ee26e54911766c3329

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-cvs.20050402-4ubuntu3.1.dsc
  Size/MD5: 1039 38ccfb2a73283d3407b9fe60533f98ff

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-cvs.20050402.orig.tar.gz
  Size/MD5:  1621251 0f92b7b8e705411b7881d3650cbb5d56

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-common_1.3-cvs.20050402-4ubuntu3.1_all.deb
  Size/MD5:  1221180 8d5b4df9c227530749020ffb466ff2f2

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-cvs.20050402-4ubuntu3.1_amd64.deb
  Size/MD5:  1029868 c8d76916a6910a2cbfe3ff1ba6ac5719

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-cvs.20050402-4ubuntu3.1_amd64.deb
  Size/MD5:  1041510 623c9b4b2e3ab693c9993ede121488a7

http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-cvs.20050402-4ubuntu3.1_amd64.deb
  Size/MD5:  1025400 d37f7806f75fecda7f4b3d63491e0939

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-cvs.20050402-4ubuntu3.1_i386.deb
  Size/MD5:   878928 9ee514d4b91119f3ba6bfc6c1f62fbea


[Full-disclosure] [USN-283-1] MySQL vulnerabilities

2006-05-08 Thread Martin Pitt
===
Ubuntu Security Notice USN-283-1   May 08, 2006
mysql-dfsg-4.1, mysql-dfsg vulnerabilities
CVE-2006-1516, CVE-2006-1517
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

mysql-server
mysql-server-4.1

The problem can be corrected by upgrading the affected package to
version 4.0.23-3ubuntu2.3 (for Ubuntu 5.04), 4.0.24-10ubuntu2.2
(mysql-server for Ubuntu 5.10), or 4.1.12-1ubuntu3.3 (mysql-server-4.1
for Ubuntu 5.10).  In general, a standard system upgrade is sufficient
to effect the necessary changes.

Details follow:

Stefano Di Paola discovered an information leak in the login packet
parser. By sending a specially crafted malformed login packet, a
remote attacker could exploit this to read a random piece of memory,
which could potentially reveal sensitive data. (CVE-2006-1516)

Stefano Di Paola also found a similar information leak in the parser
for the COM_TABLE_DUMP request. (CVE-2006-1517)


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23-3ubuntu2.3.diff.gz
  Size/MD5:   345474 a03d04b6232f33905f239248035f3c38

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23-3ubuntu2.3.dsc
  Size/MD5:  891 f45ff763a72c15171cad1162886f35de

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23.orig.tar.gz
  Size/MD5:  9814467 5eec8f66ed48c6ff92e73161651a492b

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-common_4.0.23-3ubuntu2.3_all.deb
  Size/MD5:32208 36fa86a1832df41a6371ab247a13

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.3_amd64.deb
  Size/MD5:  2866464 bd0a5bcdee56e03cbecb27753e0f9f96

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.3_amd64.deb
  Size/MD5:   307028 3de11414c948eb5ba7cdd0a83eeb96f7

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.23-3ubuntu2.3_amd64.deb
  Size/MD5:   431620 d90f664ce975be92b926fd5b9d2429ab

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.23-3ubuntu2.3_amd64.deb
  Size/MD5:  3628942 9596aa1a65337b9b9dbf642c0bd9794d

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.3_i386.deb
  Size/MD5:  2826196 0762c6d6057e91dae14ade788b45afba

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.3_i386.deb
  Size/MD5:   289722 1a4a652c075dcab324c7e4f3f6384d1f

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.23-3ubuntu2.3_i386.deb
  Size/MD5:   404788 e6dcfc067fbae77ce3421a8d8dfdf8cc

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.23-3ubuntu2.3_i386.deb
  Size/MD5:  3537800 ca606ecc15afb3cce2c295aa1f9ab344

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.3_powerpc.deb
  Size/MD5:  3179856 dce3423162923cfc56b1ac6b79e07e07

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.3_powerpc.deb
  Size/MD5:   312632 8cfae324093e3ea018d539d1183133d2

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.23-3ubuntu2.3_powerpc.deb
  Size/MD5:   462406 96c5db41bc684ebc7754145b52beea3e

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.23-3ubuntu2.3_powerpc.deb
  Size/MD5:  3839416 0268c71659e4c1cbaa07a88051a4db56


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.3.diff.gz
  Size/MD5:   162244 fddf1e4d87d56438a65315e3df406b49

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.3.dsc
  Size/MD5: 1024 adf2851ddc2685c8071330f3d6587ddf

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12.orig.tar.gz
  Size/MD5: 15921909 c7b83a19bd8a4f42d5d64c239d05121f

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.24-10ubuntu2.2.diff.gz
  Size/MD5:98632 35543de80b68e132078805f930c22cc3

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.24-10ubuntu2.2.dsc
  Size/MD5:  964 a3306800e3fb87b1ba6425e1675a1c70

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.24.orig.tar.gz
  Size/MD5:  9923794 aed8f335795a359f32492159e3edfaa3

  

[Full-disclosure] [USN-277-1] TIFF library vulnerabilities

2006-05-03 Thread Martin Pitt
===
Ubuntu Security Notice USN-277-1   May 03, 2006
tiff vulnerabilities
CVE-2006-2024, CVE-2006-2025, CVE-2006-2026, CVE-2006-2120
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

libtiff4

The problem can be corrected by upgrading the affected package to
version 3.6.1-5ubuntu0.3 (for Ubuntu 5.04), or 3.7.3-1ubuntu1.1 (for
Ubuntu 5.10). After a standard system upgrade you need to reboot your
computer to effect the necessary changes, since this library is used
by many client and server applications.

Details follow:

Tavis Ormandy and Andrey Kiselev discovered that libtiff did not
sufficiently verify the validity of TIFF files. By tricking an user
into opening a specially crafted TIFF file with any application that
uses libtiff, an attacker could exploit this to crash the application
or even execute arbitrary code with the application's privileges.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1-5ubuntu0.3.diff.gz
  Size/MD5:25844 bf3bb894195ad17e5c860daf0b52e1ce
http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1-5ubuntu0.3.dsc
  Size/MD5:  681 7ca48c0c729b1ed1eaf448c8f25f3fd9
http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1.orig.tar.gz
  Size/MD5:   848760 bd252167a20ac7910ab3bd2b3ee9e955

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.3_amd64.deb
  Size/MD5:   172968 2ffca24fa53dc7bfb5c5901e193a104c

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.3_amd64.deb
  Size/MD5:   459186 3bb686188917d73793abc5f812d388b9

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.3_amd64.deb
  Size/MD5:   112794 309519051cbeac5ee4970c17c95f873f

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.3_i386.deb
  Size/MD5:   155950 dd997be32c7b3379260bf9f9ff9576c8

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.3_i386.deb
  Size/MD5:   440500 16622a398c014cf6035494e0ff29d660

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.3_i386.deb
  Size/MD5:   103712 fe939d6535627e0fc713fb43fefa399e

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.3_powerpc.deb
  Size/MD5:   188176 88838f14d7d5da36f1f403f4c0a39b66

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.3_powerpc.deb
  Size/MD5:   463658 3aa8bf134de05702211eafa321b06503

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.3_powerpc.deb
  Size/MD5:   114124 de1c205214d625b875ae75c18c18078a

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3-1ubuntu1.1.diff.gz
  Size/MD5:10710 2bd5f0ece5925350446d84ee8189e071
http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3-1ubuntu1.1.dsc
  Size/MD5:  756 6189550944c0b45fc86c910ed0dbcf26
http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3.orig.tar.gz
  Size/MD5:  1268182 48fbef3d76a6253699f28f49c8f25a8b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.3-1ubuntu1.1_amd64.deb
  Size/MD5:47954 af59fddd16097f942f3e0e30191d28d0

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.3-1ubuntu1.1_amd64.deb
  Size/MD5:   219564 3ed70fe840906f3f2a1c3911a7361e29

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.3-1ubuntu1.1_amd64.deb
  Size/MD5:   281560 1e221cf189548ff8d6e5d1493800c05d

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.3-1ubuntu1.1_amd64.deb
  Size/MD5:   471914 5736f410bb8db26c4249a4921491be9a

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.3-1ubuntu1.1_amd64.deb
  Size/MD5:42792 139dc849797a3d1075afb782d6bd6c70

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.3-1ubuntu1.1_i386.deb
  Size/MD5:47346 5eddb50954c66c612b7f3512782dda0f

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.3-1ubuntu1.1_i386.deb
  Size/MD5:   204506 18fdd790464fad763946019e3eacf08d

http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.3-1ubuntu1.1_i386.deb
  Size/MD5:   258138 7034f05b5208a7e12d08f0f0f617c267


[Full-disclosure] [USN-278-1] gdm vulnerability

2006-05-03 Thread Martin Pitt
===
Ubuntu Security Notice USN-278-1   May 03, 2006
gdm vulnerabilitiy
CVE-2006-1057
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

gdm

The problem can be corrected by upgrading the affected package to
version 2.6.0.7-0ubuntu7.1 (for Ubuntu 5.04) or 2.8.0.5-0ubuntu1.1
(for Ubuntu 5.10).  In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

Marcus Meissner discovered a race condition in gdm's handling of the
~/.ICEauthority file permissions. A local attacker could exploit this
to become the owner of an arbitrary file in the system. When getting
control over automatically executed scripts (like cron jobs), the
attacker could eventually leverage this flaw to execute arbitrary
commands with root privileges.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1.diff.gz
  Size/MD5:68630 07276634f63f6cf6e3d3946661cf2939
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1.dsc
  Size/MD5:  787 6e666f8da0735aee929c25a9818dd53a
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7.orig.tar.gz
  Size/MD5:  5594495 50254890d9fbbec6b2d3455d4343f6e0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1_amd64.deb
  Size/MD5:  1382686 716ba56c1177162685a7198b46a28667

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1_i386.deb
  Size/MD5:  1343230 9bb1a76e6d0a8658f49ce787f6a66606

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1_powerpc.deb
  Size/MD5:  1379750 bcaec993d57ce53221c920245495d3b8

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1.diff.gz
  Size/MD5:65777 3181d42210c694ab595840f1359d5735
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1.dsc
  Size/MD5:  820 0165df3317618487e8d39e60b5174c83
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5.orig.tar.gz
  Size/MD5:  4226618 349b76492113ab814f2732d4ce3a49c2

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1_amd64.deb
  Size/MD5:  1618080 7aa6c967d046d2876e577975e5c6759f

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1_i386.deb
  Size/MD5:  1559770 3dc875b89062d5572b2b2e84a8354434

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1_powerpc.deb
  Size/MD5:  1571404 1ca7c072d5460d694af449719f2abc57


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-279-1] libnasl/nessus vulnerability

2006-05-03 Thread Martin Pitt
===
Ubuntu Security Notice USN-279-1   May 03, 2006
libnasl vulnerability
CVE-2006-2093
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

libnasl2

The problem can be corrected by upgrading the affected package to
version 2.2.3-1ubuntu0.1 (libnasl-dev and libnasl2) and
2.2.4-1ubuntu0.1 (libnasl-dev and libnasl2). After a standard system
upgrade you need to restart nessusd to effect the necessary changes.

Details follow:

Jayesh KS discovered that the nasl_split() function in the NASL
(Nessus Attack Scripting Language) library did not check for a
zero-length separator argument, which lead to an invalid memory
allocation. This library is primarily used in the Nessus security
scanner; a remote attacker could exploit this vulnerability to cause
the Nessus daemon to crash.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.3-1ubuntu0.1.diff.gz
  Size/MD5:   325024 934e559032064bdbfaf178e0e64b347d

http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.3-1ubuntu0.1.dsc
  Size/MD5:  758 3326827ac8f9245a9188222ac517224d

http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.3.orig.tar.gz
  Size/MD5:   360918 ee66b86f0a808c9eb1e1756490e5c067

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.3-1ubuntu0.1_amd64.deb
  Size/MD5:   334004 81c12b0e563175c9add90f462d55c46d

http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.3-1ubuntu0.1_amd64.deb
  Size/MD5:   101580 63413de59bcc9efe8cacbcc34380df67

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.3-1ubuntu0.1_i386.deb
  Size/MD5:   312834 8c0bfa1daf1854ef200cc9bb4e50a54c

http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.3-1ubuntu0.1_i386.deb
  Size/MD5:95840 4d8e2c1a91d8fc991f2fd1716b8583cb

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.3-1ubuntu0.1_powerpc.deb
  Size/MD5:   338600 33be5486ddf9ca014d27bf77281200f0

http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.3-1ubuntu0.1_powerpc.deb
  Size/MD5:99624 98dcfe611e5029dc619caf72dfd4da86

Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.4-1ubuntu0.1.diff.gz
  Size/MD5:   325052 1a6cb2d4eba535bf7d04c86e28753fce

http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.4-1ubuntu0.1.dsc
  Size/MD5:  758 77166e15fa4998fccb44c731649318b9

http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.4.orig.tar.gz
  Size/MD5:   361551 47de3e86725b5f54f5752233a4bc1ea8

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.4-1ubuntu0.1_amd64.deb
  Size/MD5:   342848 312e410daa37b832a4462c0fd43a256e

http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.4-1ubuntu0.1_amd64.deb
  Size/MD5:   105872 17131088c3fcf03c61ff48c1068de163

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.4-1ubuntu0.1_i386.deb
  Size/MD5:   314346 3e306ca23afe7008bc7fb1e0864763fa

http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.4-1ubuntu0.1_i386.deb
  Size/MD5:96150 dc30810ccc3d00679da3f081517ada1d

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.4-1ubuntu0.1_powerpc.deb
  Size/MD5:   344788 fa5ead6eae23d5811973691236068b5a

http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.4-1ubuntu0.1_powerpc.deb
  Size/MD5:   102438 25bf747848d3cec7561298f198ffa1f5


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-274-1] MySQL vulnerability

2006-04-27 Thread Martin Pitt
===
Ubuntu Security Notice USN-274-1 April 27, 2006
mysql-dfsg vulnerability
CVE-2006-0903
===

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

mysql-server

The problem can be corrected by upgrading the affected package to
version 4.0.20-2ubuntu1.7 (for Ubuntu 4.10), 4.0.23-3ubuntu2.2 (for
Ubuntu 5.04), or 4.0.24-10ubuntu2.1 (for Ubuntu 5.10). In general, a
standard system upgrade is sufficient to effect the necessary changes.

Details follow:

A logging bypass was discovered in the MySQL query parser. A local
attacker could exploit this by inserting NUL characters into query
strings (even into comments), which would cause the query to be logged
incompletely.

This only affects you if you enabled the 'log' parameter in the MySQL
configuration.


Updated packages for Ubuntu 4.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.20-2ubuntu1.7.diff.gz
  Size/MD5:   176824 f214253e4c2a6ffcfd949bc19410ee6b

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.20-2ubuntu1.7.dsc
  Size/MD5:  894 19ef051a7994a4faea9b248c12dc44b5

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.20.orig.tar.gz
  Size/MD5:  9760117 f092867f6df2f50b34b8065312b9fb2b

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-common_4.0.20-2ubuntu1.7_all.deb
  Size/MD5:25144 b28d3fdc01b8d8194d0388d8d48a257d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient-dev_4.0.20-2ubuntu1.7_amd64.deb
  Size/MD5:  2811182 c4111aec963f9a495b261b299e449c2e

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.20-2ubuntu1.7_amd64.deb
  Size/MD5:   305220 8f6653a1152af3624e68a759a2893827

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.20-2ubuntu1.7_amd64.deb
  Size/MD5:   423266 f5702114938059a53d531535caaad7f5

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.20-2ubuntu1.7_amd64.deb
  Size/MD5:  3578122 92a1b9e4c8d874dffc09ebf5fb13e72b

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient-dev_4.0.20-2ubuntu1.7_i386.deb
  Size/MD5:  2774718 6b2c35f99be213bfc34133995e611f46

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.20-2ubuntu1.7_i386.deb
  Size/MD5:   288162 61879cbc26a9b7dbb27c6c842546458d

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.20-2ubuntu1.7_i386.deb
  Size/MD5:   397264 612dc9f1b1149a2af49b0a2aa157e009

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.20-2ubuntu1.7_i386.deb
  Size/MD5:  3487310 47ecf2e29f3dbe465dfd990ba80c36eb

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient-dev_4.0.20-2ubuntu1.7_powerpc.deb
  Size/MD5:  3110894 81feb50003ee69b7e93b809b8c0bfc39

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.20-2ubuntu1.7_powerpc.deb
  Size/MD5:   308852 a8fe34e726d5302deb751838ef8ccb06

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.20-2ubuntu1.7_powerpc.deb
  Size/MD5:   452684 52bfacf4b50418cc8d30fdde7679eab4

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.20-2ubuntu1.7_powerpc.deb
  Size/MD5:  3770820 3c992663d03b4b9f548207e7dddb2749

Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23-3ubuntu2.2.diff.gz
  Size/MD5:   343725 a2b298ae7189d19d610096bd509ce596

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23-3ubuntu2.2.dsc
  Size/MD5:  891 b92cb6c84451811ccf7bd7c2a56c50b4

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23.orig.tar.gz
  Size/MD5:  9814467 5eec8f66ed48c6ff92e73161651a492b

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-common_4.0.23-3ubuntu2.2_all.deb
  Size/MD5:31990 2d6d3941ca77a34d4fe04919aac8cbc7

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.2_amd64.deb
  Size/MD5:  2866184 3b5f0aa334fc9e1fa7056cf210f94fd2

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.2_amd64.deb
  Size/MD5:   306820 e2917d28d803a34a4c72da0fbba151d3


[Full-disclosure] [USN-275-1] Mozilla vulnerabilities

2006-04-27 Thread Martin Pitt
===
Ubuntu Security Notice USN-275-1 April 27, 2006
mozilla vulnerabilities
CVE-2005-4134, CVE-2006-0292, CVE-2006-0296, CVE-2006-0748,
CVE-2006-0749, CVE-2006-1727, CVE-2006-1728, CVE-2006-1729,
CVE-2006-1730, CVE-2006-1731, CVE-2006-1732, CVE-2006-1733,
CVE-2006-1734, CVE-2006-1735, CVE-2006-1736, CVE-2006-1737,
CVE-2006-1738, CVE-2006-1739, CVE-2006-1740, CVE-2006-1741,
CVE-2006-1742, CVE-2006-1790
===

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

mozilla-browser
mozilla-mailnews
mozilla-psm

The problem can be corrected by upgrading the affected package to
version 2:1.7.13-0ubuntu04.10 (for Ubuntu 4.10), 2:1.7.13-0ubuntu05.04
(for Ubuntu 5.04), and 2:1.7.13-0ubuntu5.10 (for Ubuntu 5.10). After a
standard system upgrade you need to restart Mozilla to effect the
necessary changes.

Details follow:

Web pages with extremely long titles caused subsequent launches of
Mozilla browser to hang for up to a few minutes, or caused Mozilla to
crash on computers with insufficient memory. (CVE-2005-4134)

Igor Bukanov discovered that the JavaScript engine did not properly
declare some temporary variables. Under some rare circumstances, a
malicious website could exploit this to execute arbitrary code with
the privileges of the user. (CVE-2006-0292, CVE-2006-1742)

The function XULDocument.persist() did not sufficiently validate the
names of attributes. An attacker could exploit this to inject
arbitrary XML code into the file 'localstore.rdf', which is read and
evaluated at startup. This could include JavaScript commands that
would be run with the user's privileges. (CVE-2006-0296)

Due to a flaw in the HTML tag parser a specific sequence of HTML tags
caused memory corruption. A malicious web site could exploit this to
crash the browser or even execute arbitrary code with the user's
privileges. (CVE-2006-0748)

An invalid ordering of table-related tags caused Mozilla to use a
negative array index. A malicious website could exploit this to
execute arbitrary code with the privileges of the user.
(CVE-2006-0749)

Georgi Guninski discovered that embedded XBL scripts of web sites
could escalate their (normally reduced) privileges to get full
privileges of the user if that page is viewed with Print Preview.
(CVE-2006-1727)

The crypto.generateCRMFRequest() function had a flaw which could be
exploited to run arbitrary code with the user's privileges.
(CVE-2006-1728)

Claus Jørgensen and Jesse Ruderman discovered that a text input box
could be pre-filled with a filename and then turned into a file-upload
control with the contents intact. A malicious web site could exploit
this to read any local file the user has read privileges for.
(CVE-2006-1729)

An integer overflow was detected in the handling of the CSS property
letter-spacing. A malicious web site could exploit this to run
arbitrary code with the user's privileges. (CVE-2006-1730)

The methods valueOf.call() and .valueOf.apply() returned an object
whose privileges were not properly confined to those of the caller,
which made them vulnerable to cross-site scripting attacks. A
malicious web site could exploit this to modify the contents or steal
confidential data (such as passwords) from other opened web pages.
(CVE-2006-1731) The window.controllers array variable (CVE-2006-1732)
and event handlers (CVE-2006-1741) were vulnerable to a similar attack. 

The privileged built-in XBL bindings were not fully protected from web
content and could be accessed by calling valueOf.call() and
valueOf.apply() on a method of that binding. A malicious web site
could exploit this to run arbitrary JavaScript code with the user's
privileges. (CVE-2006-1733)

It was possible to use the Object.watch() method to access an internal
function object (the clone parent). A malicious web site could
exploit this to execute arbitrary JavaScript code with the user's
privileges. (CVE-2006-1734)

By calling the XBL.method.eval() method in a special way it was
possible to create JavaScript functions that would get compiled with
the wrong privileges. A malicious web site could exploit this to
execute arbitrary JavaScript code with the user's privileges.
(CVE-2006-1735)

Michael Krax discovered that by layering a transparent image link to
an executable on top of a visible (and presumably desirable) image a
malicious site could fool the user to right-click and choose Save
image as... from the context menu, which would download the
executable instead of the image. (CVE-2006-1736)

Several crashes have been fixed which could be triggered by web sites
and involve memory corruption. These could potentially be exploited to
execute arbitrary code with the user's privileges. (CVE-2006-1737,
CVE-2006-1738, CVE-2006-1739, CVE-2006-1790)

If the user has turned 

  1   2   3   >