[Full-disclosure] [USN-496-1] koffice vulnerability
=== Ubuntu Security Notice USN-496-1August 03, 2007 koffice vulnerability CVE-2007-3387 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 6.10 Ubuntu 7.04 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: kword1:1.5.0-0ubuntu9.2 Ubuntu 6.10: kword1:1.5.2-0ubuntu2.2 Ubuntu 7.04: kword1:1.6.2-0ubuntu1.1 After a standard system upgrade you need to restart KWord to effect the necessary changes. Details follow: Derek Noonburg discovered an integer overflow in the Xpdf function StreamPredictor::StreamPredictor(). By importing a specially crafted PDF file into KWord, this could be exploited to run arbitrary code with the user's privileges. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.0-0ubuntu9.2.diff.gz Size/MD5: 300835 16c7582e14982568803321cea7a34f11 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.0-0ubuntu9.2.dsc Size/MD5: 1448 fdadcad8df27cd7b9fabdd6bf93c2243 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.0.orig.tar.gz Size/MD5: 41765094 096962d7a25ec9063510b9340f18f152 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio-data_1.5.0-0ubuntu9.2_all.deb Size/MD5: 681940 a41c0cf57dbb9e758fed02a7fd5f5f10 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-data_1.5.0-0ubuntu9.2_all.deb Size/MD5: 747852 4cb1bc23d7a67c0144d1dbe0943cf3f3 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-doc-html_1.5.0-0ubuntu9.2_all.deb Size/MD5: 464520 7cbc419080f709ec4d82f208b8ccb832 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-doc_1.5.0-0ubuntu9.2_all.deb Size/MD5: 88042092 e3e3f4a3f740d971bd6625d908fb972d http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.0-0ubuntu9.2_all.deb Size/MD5:24274 b09c7b32d679bf28f1fc15fbf9dbdfcf http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter-data_1.5.0-0ubuntu9.2_all.deb Size/MD5: 1893562 9ade0cb468aef115c13e84f6c1937a8d http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita-data_1.5.0-0ubuntu9.2_all.deb Size/MD5: 9816996 5b74ea5c2ebe28c7bafcb8e516d9ae56 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword-data_1.5.0-0ubuntu9.2_all.deb Size/MD5: 1590282 316855e7fac0273faf31af39bc0315b8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 1053202 bbee94bb191ffbaac28ca90f3be56d6c http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 1305082 eae293a8a2d788021a24ba3205de73ba http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kexi_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 3097380 baad146bd7bb1537c508c5e0bf6bd8c2 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 419496 9a4920191a23268794d67dc7307c791d http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 609614 06a614654e282f4c94d9fed46adf0f1f http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dbg_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 52548050 a8d5edd29aa9e6d455cc2a6cdc97f7fc http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 360390 67c1c3923884b5c277cec42645edacd2 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 2565144 7650f9b98e7bff7116ec2199d3d97255 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 201256 813cc360b442cc3dcc9abe5d7787da80 http://security.ubuntu.com/ubuntu/pool/universe/k/koffice/kplato_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 919800 97ddb98f77504aa094086fcf68681432 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 1415034 1c1cb0c9fc2190c07b7501f67da49553 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 2914594 9fc42fec80237c0951c6dc899d5d5bf1 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.5.0-0ubuntu9.2_amd64.deb Size/MD5: 2461008 e395c28931e88395e8be151617ee11e4 http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.5.0-0ubuntu9.2_amd64.deb
[Full-disclosure] [USN-455-1] PHP vulnerabilities
=== Ubuntu Security Notice USN-455-1 April 27, 2007 php5 vulnerabilities CVE-2007-1375, CVE-2007-1376, CVE-2007-1380, CVE-2007-1484, CVE-2007-1521, CVE-2007-1583, CVE-2007-1700, CVE-2007-1718, CVE-2007-1824, CVE-2007-1887, CVE-2007-1888, CVE-2007-1900 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 6.10 Ubuntu 7.04 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: libapache2-mod-php5 5.1.2-1ubuntu3.7 php5-cgi 5.1.2-1ubuntu3.7 php5-cli 5.1.2-1ubuntu3.7 php5-sqlite 5.1.2-1ubuntu3.7 Ubuntu 6.10: libapache2-mod-php5 5.1.6-1ubuntu2.4 php5-cgi 5.1.6-1ubuntu2.4 php5-cli 5.1.6-1ubuntu2.4 php5-sqlite 5.1.6-1ubuntu2.4 Ubuntu 7.04: libapache2-mod-php5 5.2.1-0ubuntu1.1 php5-cgi 5.2.1-0ubuntu1.1 php5-cli 5.2.1-0ubuntu1.1 php5-sqlite 5.2.1-0ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Stefan Esser discovered multiple vulnerabilities in the Month of PHP bugs. The substr_compare() function did not sufficiently verify its length argument. This might be exploited to read otherwise unaccessible memory, which might lead to information disclosure. (CVE-2007-1375) The shared memory (shmop) functions did not verify resource types, thus they could be called with a wrong resource type that might contain user supplied data. This could be exploited to read and write arbitrary memory addresses of the PHP interpreter. This issue does not affect Ubuntu 7.04. (CVE-2007-1376) The php_binary handler of the session extension was missing a boundary check. When unserializing overly long variable names this could be exploited to read up to 126 bytes of memory, which might lead to information disclosure. (CVE-2007-1380) The internal array_user_key_compare() function, as used for example by the PHP function uksort(), incorrectly handled memory unreferencing of its arguments. This could have been exploited to execute arbitrary code with the privileges of the PHP interpreter, and thus circumventing any disable_functions, open_basedir, or safe_mode restrictions. (CVE-2007-1484) The session_regenerate_id() function did not properly clean up the former session identifier variable. This could be exploited to crash the PHP interpreter, possibly also remotely. (CVE-2007-1521) Under certain conditions the mb_parse_str() could cause the register_globals configuration option to become permanently enabled. This opened an attack vector for a large and common class of vulnerabilities. (CVE-2007-1583) The session extension did not set the correct reference count value for the session variables. By unsetting _SESSION and HTTP_SESSION_VARS (or tricking a PHP script into doing that) this could be exploited to execute arbitrary code with the privileges of the PHP interpreter. This issue does not affect Ubuntu 7.04. (CVE-2007-1700) The mail() function did not correctly escape control characters in multiline email headers. This could be remotely exploited to inject arbitrary email headers. (CVE-2007-1718) The php_stream_filter_create() function had an off-by-one buffer overflow in the handling of wildcards. This could be exploited to remotely crash the PHP interpreter. This issue does not affect Ubuntu 7.04. (CVE-2007-1824) When calling the sqlite_udf_decode_binary() with special arguments, a buffer overflow happened. Depending on the application this could be locally or remotely exploited to execute arbitrary code with the privileges of the PHP interpreter. (CVE-2007-1887 CVE-2007-1888) The FILTER_VALIDATE_EMAIL filter extension used a wrong regular expression that allowed injecting a newline character at the end of the email string. This could be exploited to inject arbitrary email headers. This issue only affects Ubuntu 7.04. (CVE-2007-1900) Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.1.2-1ubuntu3.7.diff.gz Size/MD5: 117479 97145052f56b881e5bdcd933194a391d http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.1.2-1ubuntu3.7.dsc Size/MD5: 1766 427fffd561dd912abb032c73db855677 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.1.2.orig.tar.gz Size/MD5: 8064193 b5b6564e8c6a0d5bc1d2b4787480d792 Architecture independent packages:
[Full-disclosure] [USN-454-1] PostgreSQL vulnerability
=== Ubuntu Security Notice USN-454-1 April 26, 2007 postgresql-8.1, postgresql-8.2 vulnerability CVE-2007-2138 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 6.10 Ubuntu 7.04 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: postgresql-8.1 8.1.9-0ubuntu0.6.06 Ubuntu 6.10: postgresql-8.1 8.1.9-0ubuntu0.6.10 Ubuntu 7.04: postgresql-8.2 8.2.4-0ubuntu0.7.04 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: PostgreSQL did not handle the search_path configuration option in a secure way for functions declared as SECURITY DEFINER. Previously, an attacker could override functions and operators used by the security definer function to execute arbitrary SQL commands with the privileges of the user who created the security definer function. The updated version does not search the temporary table schema for functions and operators any more. Similarly, an attacker could put forged tables into the temporary table schema to trick the security definer function into using attacker defined data for processing. This was possible because the temporary schema was always implicitly searched first before all other entries in search_path. The updated version now supports explicit placement of the temporary schema. Please see the HTML documentation or the manual page for CREATE FUNCTION for details and an example how to write security definer functions in a secure way. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.9-0ubuntu0.6.06.diff.gz Size/MD5:25680 c8dcb92c9d3e5059a235463f1e73d918 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.9-0ubuntu0.6.06.dsc Size/MD5: 1121 8be59c06b28d9c68161df198c3f70964 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.9.orig.tar.gz Size/MD5: 11422807 a77d87607ee8f264c7bc9581e9048bb2 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.9-0ubuntu0.6.06_all.deb Size/MD5: 1459666 bf5c81ac3954cbca6c1a966845e1eade amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 158258 99703d2326077bd91a07c735fca4393f http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 349862 aea8e61788ee4c824744be6927d57a66 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 178980 f86abe6f9fb9c48f23d24e99d0398d74 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 180374 3ff8b243c42ee96205075df99db336b6 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 313812 76e05d5b34bed281fea1fff2bfb4f57f http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 211962 aff8b24ae2b177df4654d2cfd5d44e38 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 3234342 919d04b62e5994496530dcfdc72ae7af http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 788204 903d63291b5ca11bd357ae671e14f79c http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 619778 c5a061683a75292653ac9904b86f5a01 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 174950 d9538ab098e6ac21ae42a7951e20d541 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 169110 3374672bfb17259e75db1b240f521de4 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 169198 5f573e64710d5e6514ee99e84391bd18 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.9-0ubuntu0.6.06_amd64.deb Size/MD5: 602154 89ac9e12d5e2ef0e85a4a64f725fe41f i386 architecture (x86 compatible Intel/AMD)
[Full-disclosure] [USN-453-2] rdesktop regression
=== Ubuntu Security Notice USN-453-2 April 26, 2007 rdesktop regression https://launchpad.net/bugs/104332 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: rdesktop 1.4.1-1.1ubuntu0.6.06 Ubuntu 6.10: rdesktop 1.4.1-1.1ubuntu0.6.10 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: USN-453-1 provided an updated libx11 package to fix a security vulnerability. This triggered an error in rdesktop so that it crashed on startup. This update fixes the problem. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.06.diff.gz Size/MD5:11767 3b0afb1bdeee63391599a725fdcd4ded http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.06.dsc Size/MD5: 648 30e95d4a2c8d71edf12ef992684a8dfe http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1.orig.tar.gz Size/MD5: 218413 ce6b2369d633128ff00a2a8ae7c18ef8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.06_amd64.deb Size/MD5: 111736 5d132e2fc201ff3fa5e8d45856b230bc i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.06_i386.deb Size/MD5: 100916 3a88d294358e5c6446c52d22a07b564c powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.06_powerpc.deb Size/MD5: 119442 878ccd8dfcf9eb10e9a1747fe4be8fdb sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.06_sparc.deb Size/MD5: 108146 759f8693ef44422dde20f7ea0f6996a4 Updated packages for Ubuntu 6.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.10.diff.gz Size/MD5:11766 816d50a1cd3069c9c482d27e04def3a1 http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.10.dsc Size/MD5: 648 97e92e04c71fabcc7e65d708a870660e http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1.orig.tar.gz Size/MD5: 218413 ce6b2369d633128ff00a2a8ae7c18ef8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.10_amd64.deb Size/MD5: 116906 7057e7d2f8ecdf54ede239298e6d8f89 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.10_i386.deb Size/MD5: 104828 eeb7a363602301690bd9faf7582a6fe8 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.10_powerpc.deb Size/MD5: 122984 87696d76d41f1cc76c77a1958d306e80 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/r/rdesktop/rdesktop_1.4.1-1.1ubuntu0.6.10_sparc.deb Size/MD5: 109380 c299593db906b4c4165d152f18da2bdf signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-416-2] nvidia-glx-config regression
=== Ubuntu Security Notice USN-416-2 March 01, 2007 linux-restricted-modules-2.6.17 regression https://launchpad.net/bugs/66908 === A security issue affects the following Ubuntu releases: Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.10: nvidia-glx 2.6.17.7-11.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: USN-416-1 fixed various vulnerabilities in the Linux kernel. Unfortunately that update caused the 'nvidia-glx-config' script to not work any more. The new version fixes the problem. We apologize for the inconvenience. Updated packages for Ubuntu 6.10: Source archives: http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17_2.6.17.7-11.2.diff.gz Size/MD5:89152 772068f013e18c8cd3bee371194fe2f5 http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17_2.6.17.7-11.2.dsc Size/MD5: 2615 9da8b0a95647984a06ba93267b9e303b http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17_2.6.17.7.orig.tar.gz Size/MD5: 94289230 283efe66f46b478dea207dac92b7e4e2 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-common_2.6.17.7-11.2_all.deb Size/MD5:20236 6b55a402fa0930b7e8bb1c16aece8a30 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/avm-fritz-firmware-2.6.17-11_3.11+2.6.17.7-11.2_amd64.deb Size/MD5: 476830 0e741afd28ff59f6abdc931b67282dec http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/avm-fritz-kernel-source_3.11+2.6.17.7-11.2_amd64.deb Size/MD5: 2130084 09090d30b6bcb16259d0344b5a852e1a http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/fglrx-control_8.28.8+2.6.17.7-11.2_amd64.deb Size/MD5:77616 34b12bc805e4c89b01feb00680ffc62e http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/fglrx-kernel-source_8.28.8+2.6.17.7-11.2_amd64.deb Size/MD5: 547560 73ce80f54e6fdb6285601844b4ea5a0a http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17-11-generic_2.6.17.7-11.2_amd64.deb Size/MD5: 6652424 62054b3b0326325683edda4581d0a098 http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nic-restricted-firmware-2.6.17-11-generic-di_2.6.17.7-11.2_amd64.udeb Size/MD5: 965680 83868530e04da7ea8d665fff5704273b http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nic-restricted-modules-2.6.17-11-generic-di_2.6.17.7-11.2_amd64.udeb Size/MD5: 319162 df364edff08fd7a853c9859813c0bd16 http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nvidia-glx-dev_1.0.8776+2.6.17.7-11.2_amd64.deb Size/MD5: 168544 d39fdccbc31828b7e77323645c6c52c6 http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-glx-legacy-dev_1.0.7184+2.6.17.7-11.2_amd64.deb Size/MD5: 162460 3bdec676c86c1702905fc2fdf5067c8b http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-glx-legacy_1.0.7184+2.6.17.7-11.2_amd64.deb Size/MD5: 6082324 342748fc5510ee9aec287c1c123ae527 http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nvidia-glx_1.0.8776+2.6.17.7-11.2_amd64.deb Size/MD5: 7330700 95697ebe21eaac11ece6ae68e2ac280d http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-kernel-source_1.0.8776+2.6.17.7-11.2_amd64.deb Size/MD5: 1755654 d206422ea23adf9594f9a116a1b098d1 http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-legacy-kernel-source_1.0.7184+2.6.17.7-11.2_amd64.deb Size/MD5: 1383588 fcf770d04fda771f5fb6329c20fe6c08 http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/vmware-player-kernel-modules-2.6.17-11_2.6.17.7-11.2_amd64.deb Size/MD5:94200 d4eac639b80fe17067e299e7c02cb7dd http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/xorg-driver-fglrx-dev_7.1.0-8.28.8+2.6.17.7-11.2_amd64.deb Size/MD5: 133606 fdf47226d7ee7382f4d59d0f97284752
[Full-disclosure] [USN-428-1] Firefox vulnerabilities
=== Ubuntu Security Notice USN-428-1 February 26, 2007 firefox vulnerabilities CVE-2006-6077, CVE-2007-0008, CVE-2007-0009, CVE-2007-0775, CVE-2007-0776, CVE-2007-0777, CVE-2007-0778, CVE-2007-0779, CVE-2007-0780, CVE-2007-0800, CVE-2007-0981, CVE-2007-0995, CVE-2007-0996, CVE-2007-1092 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: firefox 1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1 Ubuntu 6.06 LTS: firefox 1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1 libnspr4 1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1 libnss3 1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1 Ubuntu 6.10: firefox 2.0.0.2+0dfsg-0ubuntu0.6.10 libnspr4 2.0.0.2+0dfsg-0ubuntu0.6.10 libnss3 2.0.0.2+0dfsg-0ubuntu0.6.10 After a standard system upgrade you need to restart Firefox to effect the necessary changes. Details follow: Several flaws have been found that could be used to perform Cross-site scripting attacks. A malicious web site could exploit these to modify the contents or steal confidential data (such as passwords) from other opened web pages. (CVE-2006-6077, CVE-2007-0780, CVE-2007-0800, CVE-2007-0981, CVE-2007-0995, CVE-2007-0996) The SSLv2 protocol support in the NSS library did not sufficiently check the validity of public keys presented with a SSL certificate. A malicious SSL web site using SSLv2 could potentially exploit this to execute arbitrary code with the user's privileges. (CVE-2007-0008) The SSLv2 protocol support in the NSS library did not sufficiently verify the validity of client master keys presented in an SSL client certificate. A remote attacker could exploit this to execute arbitrary code in a server application that uses the NSS library. (CVE-2007-0009) Various flaws have been reported that could allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious web page. (CVE-2007-0775, CVE-2007-0776, CVE-2007-0777, CVE-2007-1092) Two web pages could collide in the disk cache with the result that depending on order loaded the end of the longer document could be appended to the shorter when the shorter one was reloaded from the cache. It is possible a determined hacker could construct a targeted attack to steal some sensitive data from a particular web page. The potential victim would have to be already logged into the targeted service (or be fooled into doing so) and then visit the malicious site. (CVE-2007-0778) David Eckel reported that browser UI elements--such as the host name and security indicators--could be spoofed by using custom cursor images and a specially crafted style sheet. (CVE-2007-0779) Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1.diff.gz Size/MD5: 176831 76744cf2123e13143408e37deb2311c0 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1.dsc Size/MD5: 1063 eac4c86acb16ad4cf85604e5cc9f441c http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10.orig.tar.gz Size/MD5: 44679183 d55d439c238064ddcedb8fabb6089ff2 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_all.deb Size/MD5:50314 d17e00b536378e1710c918f2b834e513 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_all.deb Size/MD5:51208 abdc905b5e3c31c05a427defdc9035bc amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb Size/MD5: 3167242 01f67e394a7b569df52fd02513712811 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb Size/MD5: 217230 bc5d29d293abc4665c052c0fc76aef79 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb Size/MD5:83544 d7978eba50c0e82d4e3606240e38e3fa http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb Size/MD5: 10311286 4ea4f615c24ecceae90e7b432ddb5e4a i386 architecture (x86 compatible Intel/AMD)
[Full-disclosure] [USN-427-1] enigmail vulnerability
=== Ubuntu Security Notice USN-427-1 February 23, 2007 enigmail vulnerability CVE-2006-5877 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: mozilla-thunderbird-enigmail 2:0.94-0ubuntu0.5.10.1 Ubuntu 6.06 LTS: mozilla-thunderbird-enigmail 2:0.94-0ubuntu4.3 Ubuntu 6.10: mozilla-thunderbird-enigmail 2:0.94-0ubuntu5.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Mikhail Markin reported that enigmail incorrectly handled memory allocations for certain large encrypted attachments. This caused Thunderbird to crash and thus caused the entire message to be inaccessible. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu0.5.10.1.diff.gz Size/MD5:21321 b0eeb33cd3ad124d5dcd85fa973e2b24 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu0.5.10.1.dsc Size/MD5: 789 83be65baac3f221d53d2110b0a281db4 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94.orig.tar.gz Size/MD5: 3126659 7e34cbe51f5a1faca2e26fa0edfd6a06 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu0.5.10.1_amd64.deb Size/MD5: 335130 b90450e4de41369479cf795de5a101aa i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu0.5.10.1_i386.deb Size/MD5: 323052 11bbca4c7075d5648bf8139b34fddb02 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu0.5.10.1_powerpc.deb Size/MD5: 326360 1aac040e085e45a526f694f43857716b sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu0.5.10.1_sparc.deb Size/MD5: 324980 65860eec2c6351b2003693a9853e819d Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu4.3.diff.gz Size/MD5:21266 08a7512c90738a1520b629a3c20f3c45 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu4.3.dsc Size/MD5: 779 50e740ba86d915bdc0d8d0de4b8a35c6 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94.orig.tar.gz Size/MD5: 3126659 7e34cbe51f5a1faca2e26fa0edfd6a06 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu4.3_amd64.deb Size/MD5: 335344 a6935d372bc7250ef4a095b4bd17c33e i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu4.3_i386.deb Size/MD5: 322976 2f6d9053595aca961da315dc6f7a163c powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu4.3_powerpc.deb Size/MD5: 326424 13194f6448975780085fb460f3eddee1 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu4.3_sparc.deb Size/MD5: 324770 fc10ecc608681c7ba72a1d55d4197d66 Updated packages for Ubuntu 6.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu5.1.diff.gz Size/MD5:21268 0bb2f26745f5ece5800d2598776187d4 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu5.1.dsc Size/MD5: 779 8d3b49530b67d0a92cb0209102a72f7d http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94.orig.tar.gz Size/MD5: 3126659 7e34cbe51f5a1faca2e26fa0edfd6a06 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu5.1_amd64.deb Size/MD5: 334880 7ac69a00d43457c1aa1e8b8d407c7a26 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu5.1_i386.deb Size/MD5: 324072 c916c764c6d6214a4ccc35894036c2e6 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu5.1_powerpc.deb Size/MD5:
[Full-disclosure] [USN-424-1] PHP vulnerabilities
=== Ubuntu Security Notice USN-424-1 February 21, 2007 php5 vulnerabilities CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-0988 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: libapache2-mod-php5 5.0.5-2ubuntu1.7 php5-cgi 5.0.5-2ubuntu1.7 php5-cli 5.0.5-2ubuntu1.7 php5-common 5.0.5-2ubuntu1.7 php5-odbc5.0.5-2ubuntu1.7 Ubuntu 6.06 LTS: libapache2-mod-php5 5.1.2-1ubuntu3.5 php5-cgi 5.1.2-1ubuntu3.5 php5-cli 5.1.2-1ubuntu3.5 php5-common 5.1.2-1ubuntu3.5 php5-odbc5.1.2-1ubuntu3.5 Ubuntu 6.10: libapache2-mod-php5 5.1.6-1ubuntu2.2 php5-cgi 5.1.6-1ubuntu2.2 php5-cli 5.1.6-1ubuntu2.2 php5-common 5.1.6-1ubuntu2.2 php5-odbc5.1.6-1ubuntu2.2 After a standard system upgrade you need to restart Apache or reboot your computer to effect the necessary changes. Details follow: Multiple buffer overflows have been discovered in various PHP modules. If a PHP application processes untrusted data with functions of the session or zip module, or various string functions, a remote attacker could exploit this to execute arbitrary code with the privileges of the web server. (CVE-2007-0906) The sapi_header_op() function had a buffer underflow that could be exploited to crash the PHP interpreter. (CVE-2007-0907) The wddx unserialization handler did not correctly check for some buffer boundaries and had an uninitialized variable. By unserializing untrusted data, this could be exploited to expose memory regions that were not meant to be accessible. Depending on the PHP application this could lead to disclosure of potentially sensitive information. (CVE-2007-0908) On 64 bit systems (the amd64 and sparc platforms), various print functions and the odbc_result_all() were susceptible to a format string vulnerability. A remote attacker could exploit this to execute arbitrary code with the privileges of the web server. (CVE-2007-0909) Under certain circumstances it was possible to overwrite superglobal variables (like the HTTP GET/POST arrays) with crafted session data. (CVE-2007-0910) When unserializing untrusted data on 64-bit platforms the zend_hash_init() function could be forced to enter an infinite loop, consuming CPU resources, for a limited length of time, until the script timeout alarm aborts the script. (CVE-2007-0988) Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.7.diff.gz Size/MD5: 116000 e86f9657167213b8990f391018b28e8e http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.7.dsc Size/MD5: 1707 4eaf5e7ccc2304836f7c55a64857c145 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5.orig.tar.gz Size/MD5: 6082082 ae36a2aa35cfaa58bdc5b9a525e6f451 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/php5/php-pear_5.0.5-2ubuntu1.7_all.deb Size/MD5: 173668 f6caf8c382ba778c934b7c3887915f61 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.7_all.deb Size/MD5: 1038 7c8598ce989a1c332b46e35612c91c75 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.0.5-2ubuntu1.7_amd64.deb Size/MD5: 2013456 c880acf90d178e1a9d98c057ed7249f6 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.0.5-2ubuntu1.7_amd64.deb Size/MD5: 3973284 d5e93a66ef95932b09def89eda235ee4 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.0.5-2ubuntu1.7_amd64.deb Size/MD5: 1997666 bf210464dcd8ed1741738eba04bcbc07 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.0.5-2ubuntu1.7_amd64.deb Size/MD5: 129448 cbee1361dde06ec76409ab4bbcd7aaa5 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.0.5-2ubuntu1.7_amd64.deb Size/MD5:24030 1aec1820973c2cf1dd07347d4d65c72c http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.0.5-2ubuntu1.7_amd64.deb Size/MD5: 218754 aa8e3985db053cfada200812f1261f57 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.0.5-2ubuntu1.7_amd64.deb
[Full-disclosure] [USN-417-3] PostgreSQL regression
=== Ubuntu Security Notice USN-417-3 February 09, 2007 postgresql-8.1 regression === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: postgresql-8.1 8.1.8-0ubuntu6.06.1 postgresql-client-8.18.1.8-0ubuntu6.06.1 Ubuntu 6.10: postgresql-8.1 8.1.8-0ubuntu6.10 postgresql-client-8.18.1.8-0ubuntu6.10 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: USN-417-2 fixed a severe regression in the PostgreSQL server that was introduced in USN-417-1 and caused some valid queries to be aborted with a type error. This update fixes a similar (but much less prominent) error. At the same time, PostgreSQL is updated to version 8.1.8, which fixes a range of important bugs. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.8-0ubuntu6.06.1.diff.gz Size/MD5:25266 ada0de93d338e6fd238e90d9b2392e83 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.8-0ubuntu6.06.1.dsc Size/MD5: 1119 3ae022f39647a437f59bbb8bbeeda00b http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.8.orig.tar.gz Size/MD5: 11401827 6dc11fcd2c907f93d36f5fa3a1cefd19 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.8-0ubuntu6.06.1_all.deb Size/MD5: 1454258 12e6983fbdc99cb37c98132bdba74198 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 156836 a86f07cfa05c30218c29e31d285e067e http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 348720 9688bf15eef77984cd25172f66860657 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 177490 42bdcdb23b1445cac250ebc92ac3caee http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 178762 474c305612b8efc8faf7df21eea3205a http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 311688 4e69b107064d625e061c5590b9ef83b9 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 210468 6916fbd5f16c7ca901ba8e06b1d8500a http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 3230076 b7d18bf6253b714ff82e311e44c0361c http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 785898 6fb40aa8573bb642dc6e35ed21dc340f http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 617656 31fd77725b3deb1d426f6cd48a9ffedf http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 173578 53bc5a6d0be04caf35e24ba53233c27e http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 167650 90b11a981bd7a6ff490f9685c60b61cb http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 167764 c7429e3eb2526110744f99755b4d2b85 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.8-0ubuntu6.06.1_amd64.deb Size/MD5: 600356 16d93e175fb1bd0872d7398bb1dc77cd i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.8-0ubuntu6.06.1_i386.deb Size/MD5: 155756 a5429a64c62156c96e5f607c78008579 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.8-0ubuntu6.06.1_i386.deb Size/MD5: 339384 da8d9fad352819051198349ba7fbb997 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.8-0ubuntu6.06.1_i386.deb Size/MD5: 175258 f17f145f437d0754ac0f83047126021e http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.8-0ubuntu6.06.1_i386.deb Size/MD5: 176926 adb28d31cf67948756bbad89025397f8
[Full-disclosure] [USN-417-2] PostgreSQL 8.1 regression
=== Ubuntu Security Notice USN-417-2 February 06, 2007 postgresql-8.1 regression https://launchpad.net/bugs/83505 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: postgresql-8.1 8.1.4-0ubuntu1.3 Ubuntu 6.10: postgresql-8.1 8.1.4-7ubuntu0.3 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: USN-417-1 fixed several vulnerabilities in the PostgreSQL server. Unfortunately this update had a regression that caused some valid queries to be aborted with a type error. This update corrects that problem. We apologize for the inconvenience. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.3.diff.gz Size/MD5:39703 e006b67020bb99233d2baece0b6e3a85 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.3.dsc Size/MD5: 1113 722212b9cc02c14060ae0c0d6c4bb91c http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4.orig.tar.gz Size/MD5: 11312643 c6554a0ef948ab2b18b617954e1788fe Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.4-0ubuntu1.3_all.deb Size/MD5: 1441808 3af306e6277ec3ceaca6d385781158c4 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 152702 1e149852fbb65de0576d4310777c89e7 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 344750 de2f1868e34eee5f01fe4b5fc81821f1 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 173164 3d47cbd3d7fca9b399f0cec2f4f140d7 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 175008 621159226bc9a97a8fa5dc5aba8c7469 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 307840 f458c647e420437b9c27653b7bcc25f9 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 206490 1c2b2ebd5a21aaa23b019ae0a96ee12c http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 3221918 2fdf72f6169bbd4d8e9c41c6c0090e9d http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 758576 2fc6e8b3a80336174991612aa1d52d87 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 613056 cca9835801be9562cd9d5cfa7e57877b http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 169450 86b965bee3d097c750b6b67e2e00bf99 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 163604 367213e38ea347ad50365b522d8ced3a http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 163662 b4bfd83ab5246020c7afa1525d5b3ee3 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.4-0ubuntu1.3_amd64.deb Size/MD5: 596170 fc4c2157ad22eca3bfdaa673559cd495 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-0ubuntu1.3_i386.deb Size/MD5: 151622 2c8f4a68925bb454846de884b4dd1b0f http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-0ubuntu1.3_i386.deb Size/MD5: 334810 5d6d089c404cf7ff6bc4172c7c66ec23 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-0ubuntu1.3_i386.deb Size/MD5: 170726 4fc67c0315d3267e7b1ae1a29f7bf45c http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-0ubuntu1.3_i386.deb Size/MD5: 173088 7badba2ae23aabafb22daaa568152e49 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.4-0ubuntu1.3_i386.deb Size/MD5: 296336 66d003ee55fecb70ba581029a81f09a1 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.4-0ubuntu1.3_i386.deb Size/MD5: 199810
[Full-disclosure] [USN-417-1] PostgreSQL vulnerabilities
=== Ubuntu Security Notice USN-417-1 February 05, 2007 postgresql-7.4/-8.0/-8.1 vulnerabilities CVE-2007-0555, CVE-2007-0556 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: postgresql-7.4 1:7.4.8-17ubuntu1.4 postgresql-8.0 8.0.3-15ubuntu2.3 Ubuntu 6.06 LTS: postgresql-8.1 8.1.4-0ubuntu1.2 Ubuntu 6.10: postgresql-8.1 8.1.4-7ubuntu0.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Jeff Trout discovered that the PostgreSQL server did not sufficiently check data types of SQL function arguments in some cases. An authenticated attacker could exploit this to crash the database server or read out arbitrary locations in the server's memory, which could allow retrieving database content the attacker should not be able to see. (CVE-2007-0555) Jeff Trout reported that the query planner did not verify that a table was still compatible with a previously made query plan. By using ALTER COLUMN TYPE during query execution, an attacker could exploit this to read out arbitrary locations in the server's memory, which could allow retrieving database content the attacker should not be able to see. (CVE-2007-0556) Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/postgresql-7.4_7.4.8-17ubuntu1.4.diff.gz Size/MD5:61660 f0b8038e545f4cac15356c31e8a45d57 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/postgresql-7.4_7.4.8-17ubuntu1.4.dsc Size/MD5: 1038 7f3660a4b9f9e427f6acea9f475e1d31 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/postgresql-7.4_7.4.8.orig.tar.gz Size/MD5: 9947820 50ee979019622f8852444cfd67b58e7e http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/postgresql-8.0_8.0.3-15ubuntu2.3.diff.gz Size/MD5:68920 011160d5414c9a25bdf904484c6549a4 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/postgresql-8.0_8.0.3-15ubuntu2.3.dsc Size/MD5: 1115 972244c3e7fdba5d92963a757ab60d8b http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/postgresql-8.0_8.0.3.orig.tar.gz Size/MD5: 10786924 73c804e7e55dd916732ce6807cc13318 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/postgresql-doc-7.4_7.4.8-17ubuntu1.4_all.deb Size/MD5: 1062840 27ed7b68501e2b0bd549f7e671a1433a http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/postgresql-doc-8.0_8.0.3-15ubuntu2.3_all.deb Size/MD5: 1170106 56e437def51d06712e899fe95ff4c085 http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-7.4/postgresql-server-dev-7.4_7.4.8-17ubuntu1.4_all.deb Size/MD5: 423444 709e6862b1dd30176be73fe8e7b9feac amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/libecpg-compat2_8.0.3-15ubuntu2.3_amd64.deb Size/MD5:19312 a309220068cb4f004f98a48ff50d46b4 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/libecpg-dev_8.0.3-15ubuntu2.3_amd64.deb Size/MD5: 204278 7c92c4c12a4f8f83ecf62eb243ce4c9a http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/libecpg5_8.0.3-15ubuntu2.3_amd64.deb Size/MD5:38918 16e646bb44621e70428afd5c850e038c http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/libpgtypes2_8.0.3-15ubuntu2.3_amd64.deb Size/MD5:41548 d8443eb231abf71159c89b082fb17b54 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/libpq-dev_8.0.3-15ubuntu2.3_amd64.deb Size/MD5: 165732 26d8575709e4c8699c4ff6f5a29436c4 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/libpq3_7.4.8-17ubuntu1.4_amd64.deb Size/MD5:68958 857605f6bf5ca9ee19817cf0753ae9e9 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/libpq4_8.0.3-15ubuntu2.3_amd64.deb Size/MD5:72506 8c2ca61ed2e20f8336d3b1a70ddea82c http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/postgresql-7.4_7.4.8-17ubuntu1.4_amd64.deb Size/MD5: 2744164 c9f09ae5f20aa52bf4d01ea55ac3312c http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.0/postgresql-8.0_8.0.3-15ubuntu2.3_amd64.deb Size/MD5: 2985170 e1289e644e3ac33e067250784c6af317 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-7.4/postgresql-client-7.4_7.4.8-17ubuntu1.4_amd64.deb Size/MD5: 472818 3965c03011c50fec137eefb6ee1dc1d2
[Full-disclosure] [USN-407-1] libgtop2 vulnerability
=== Ubuntu Security Notice USN-407-1 January 15, 2007 libgtop2 vulnerability https://launchpad.net/bugs/79206 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: libgtop2-5 2.12.0-0ubuntu1.1 Ubuntu 6.06 LTS: libgtop2-7 2.14.1-0ubuntu1.1 Ubuntu 6.10: libgtop2-7 2.14.4-0ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Liu Qishuai discovered a buffer overflow in the /proc parsing routines in libgtop. By creating and running a process in a specially crafted long path and tricking an user into running gnome-system-monitor, an attacker could exploit this to execute arbitrary code with the user's privileges. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.12.0-0ubuntu1.1.diff.gz Size/MD5: 5556 791af1d912da088b5dbdbaf8aa37b20b http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.12.0-0ubuntu1.1.dsc Size/MD5: 1421 24db7b76b5aec3e8e061197535a203db http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.12.0.orig.tar.gz Size/MD5: 1039660 358b710c463b01ba58ef0b8fe6b23818 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_amd64.deb Size/MD5:59536 00690fbaa259fc912f510534157fe157 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_amd64.deb Size/MD5:99396 3aa6528a1bcf3371b7b7eb1ce9a5b92f i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_i386.deb Size/MD5:58386 9195d353c45adca3994a25022eae9a36 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_i386.deb Size/MD5:96894 d6ec48f3be35baeaaffb780c1cf5512a powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_powerpc.deb Size/MD5:60424 4f8c50214d838f77395e8c098284ba43 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_powerpc.deb Size/MD5:99330 1c587f04173e0c0addb0840b470783e6 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_sparc.deb Size/MD5:58068 4f8f39bab5f25b4539c21daf8f466852 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_sparc.deb Size/MD5:96764 28a224d481b8f6afd86e46378b719d0f Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.14.1-0ubuntu1.1.diff.gz Size/MD5: 6343 dbc3bc45b84f78f49633a92ad6993818 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.14.1-0ubuntu1.1.dsc Size/MD5: 1418 78cd77e17c3825e7118bc7fe12c71156 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.14.1.orig.tar.gz Size/MD5: 930295 84a7ac187e609594565bb6e731d21287 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_amd64.deb Size/MD5:62640 22fdd503710884583da14ba62a088759 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.14.1-0ubuntu1.1_amd64.deb Size/MD5: 102940 1205833458f90c9f641a9ec4acd99e61 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_i386.deb Size/MD5:61060 e1bab8b7cdcec2a6a56956b193bf4e07 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.14.1-0ubuntu1.1_i386.deb Size/MD5: 100084 e7d740a94cc1a2186ce0a6dfec492e8c powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_powerpc.deb Size/MD5:63616 4d22b62d6b16e9de6e56e684fbc18ff9 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.14.1-0ubuntu1.1_powerpc.deb Size/MD5: 102736 0b54b07153901282568b4913fbfc74d1 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_sparc.deb Size/MD5:60818 5cd7e26033bc1449f924de0a654dab3d
[Full-disclosure] [USN-408-1] krb5 vulnerability
=== Ubuntu Security Notice USN-408-1 January 15, 2007 krb5 vulnerability CVE-2006-6143 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: libkadm551.4.3-5ubuntu0.2 libkrb53 1.4.3-5ubuntu0.2 Ubuntu 6.10: libkadm551.4.3-9ubuntu1.1 libkrb53 1.4.3-9ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: The server-side portion of Kerberos' RPC library had a memory management flaw which allowed users of that library to call a function pointer located in unallocated memory. By doing specially crafted calls to the kadmind server, a remote attacker could exploit this to execute arbitrary code with root privileges on the target computer. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3-5ubuntu0.2.diff.gz Size/MD5: 1447550 546659a7ce8758c26c33d0241adb992d http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3-5ubuntu0.2.dsc Size/MD5: 848 ed669b2e38c5b3b6701401b99bbdb3cb http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3.orig.tar.gz Size/MD5: 7279788 43fe621ecb849a83ee014dfb856c54af Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5-doc_1.4.3-5ubuntu0.2_all.deb Size/MD5: 852734 748a61c88e96abcc2fd922acdafbd56c amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-5ubuntu0.2_amd64.deb Size/MD5:79686 a56316c071cbdae9f33b10166e204340 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-5ubuntu0.2_amd64.deb Size/MD5: 222738 173b8846edc4d84b0880b293ebd819f8 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-5ubuntu0.2_amd64.deb Size/MD5:59876 11c96393564f5422e884cda60671688d http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-5ubuntu0.2_amd64.deb Size/MD5: 134570 c2fa98268d5c486988eae91040441720 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-5ubuntu0.2_amd64.deb Size/MD5:84774 7dc407371c107d79c69ffe054f702ba7 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-5ubuntu0.2_amd64.deb Size/MD5:67044 4a01011a78cf0c299df6b36384c0950b http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-5ubuntu0.2_amd64.deb Size/MD5: 129430 2acabc3bcb9323fa28a69e306694a1ec http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-5ubuntu0.2_amd64.deb Size/MD5: 190294 a4044fce177ca61f9b24ff9515443e5f http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-5ubuntu0.2_amd64.deb Size/MD5: 768212 bba4e4f35f90a58177f14d35d9fccf1e http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.3-5ubuntu0.2_amd64.deb Size/MD5: 425220 e16e7b2709af4fb8a88a0819cdfc1a40 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-5ubuntu0.2_i386.deb Size/MD5:71660 d38e87ecea34868e1dac394b9047c382 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-5ubuntu0.2_i386.deb Size/MD5: 186752 12424ad58c808a4867f0db0d014a34ec http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-5ubuntu0.2_i386.deb Size/MD5:53844 3aa5f6a9ae2cb49659a0577ea972d0af http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-5ubuntu0.2_i386.deb Size/MD5: 121068 9a1fcd42b91849f0a4ce3c1614c3dbb9 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-5ubuntu0.2_i386.deb Size/MD5:75438 9b264a66dff08d0206370a43058687d1 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-5ubuntu0.2_i386.deb Size/MD5:58204 6e89a58b9d435c6e1422537a18da2dc1 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-5ubuntu0.2_i386.deb Size/MD5: 118528 82f62332c5bae9177ce1f356b824279e http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-5ubuntu0.2_i386.deb Size/MD5: 165130 0968da19d0bdac05e716825ba045f5e5 http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-5ubuntu0.2_i386.deb Size/MD5: 646560 89ccbd05cda4887245d7d5c5cd77d383
[Full-disclosure] [USN-409-1] ksirc vulnerability
=== Ubuntu Security Notice USN-409-1 January 15, 2007 kdenetwork vulnerability CVE-2006-6811 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: ksirc4:3.4.3-0ubuntu1.1 Ubuntu 6.06 LTS: ksirc4:3.5.2-0ubuntu6.3 Ubuntu 6.10: ksirc4:3.5.5-0ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Federico L. Bossi Bonin discovered a Denial of Service vulnerability in ksirc. By sending a special response packet, a malicious IRC server could crash ksirc. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork_3.4.3-0ubuntu1.1.diff.gz Size/MD5: 199853 38e7d4da32bf32366ad77d1ed2dac2f9 http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork_3.4.3-0ubuntu1.1.dsc Size/MD5: 1287 88bf40bbc5e2de7b12af4747b1409686 http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork_3.4.3.orig.tar.gz Size/MD5: 9355506 872318e6122f2649a6439eac09a43fd6 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kdenetwork-doc-html_3.4.3-0ubuntu1.1_all.deb Size/MD5: 206940 799a5f6dbe4070c26fa3ca5b14e0428b http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kdenetwork_3.4.3-0ubuntu1.1_all.deb Size/MD5:22006 208d7471b12dcf31b5f2923145b9ddf1 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/dcoprss_3.4.3-0ubuntu1.1_amd64.deb Size/MD5:89204 8a6472bade8dd27c59c825226a04fa0d http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork-filesharing_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 652412 f92a4eb8d7427f3346b6c44bd1187aeb http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork-kfile-plugins_3.4.3-0ubuntu1.1_amd64.deb Size/MD5:47282 4877f01ebdbdcd650325d925e6e13dd9 http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kdict_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 285206 ca6223dc1eb27f55520e41a7199db45c http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kget_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 480902 745b3bcf769f6b11f9814735f26bc3a5 http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/knewsticker_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 466406 c6effefe8530896cbcbf46ce448abf95 http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kopete_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 4780908 13da4a4da4f833a8fac9648342814fde http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kpf_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 205872 ccf96c3a72b44712da3e21773918c6c6 http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kppp_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 702964 4c12822b0c367e5e9175f829c68bbc0e http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/krdc_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 513844 ded8952df6aace4e58d9a79fd329e398 http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/krfb_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 957380 574e6b2ed94b85c32acfb0d55deb0a8f http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/ksirc_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 743316 b96b4daa892fe12056493f2e277ecb9a http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/ktalkd_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 144992 fcceb89ff85b3bbf1e76e4411e1c1a5e http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kwifimanager_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 209288 b0c1122c71104d9e519d191e937b4ff4 http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/librss1-dev_3.4.3-0ubuntu1.1_amd64.deb Size/MD5:31724 a4eb736ef5612b5e0b2136ce10abf7fc http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/librss1_3.4.3-0ubuntu1.1_amd64.deb Size/MD5:55778 8dd173cf02cdcccf6c28c4ca7c73a968 http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/lisa_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 207272 94d49a05ec85e67fdd45a74603234f3f i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/dcoprss_3.4.3-0ubuntu1.1_i386.deb Size/MD5:77334 776afc166f3662bf8ec04770a48f9095 http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork-filesharing_3.4.3-0ubuntu1.1_i386.deb Size/MD5: 598730
[Full-disclosure] [USN-380-2] avahi regression
=== Ubuntu Security Notice USN-380-2 December 14, 2006 avahi regression https://launchpad.net/bugs/72728 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: avahi-daemon 0.5.2-1ubuntu1.3 Ubuntu 6.06 LTS: avahi-daemon 0.6.10-0ubuntu3.3 Ubuntu 6.10: avahi-daemon 0.6.13-2ubuntu2.3 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: USN-380-1 fixed a vulnerability in Avahi. However, if used with Network manager, that version occasionally failed to resolve .local DNS names until Avahi got restarted. This update fixes the problem. We apologize for the inconvenience. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi_0.5.2-1ubuntu1.3.diff.gz Size/MD5: 5402 6988a88488201140d1941e18e9baf974 http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi_0.5.2-1ubuntu1.3.dsc Size/MD5: 1151 c3edfa425968e2fd8053f37d8e06387a http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi_0.5.2.orig.tar.gz Size/MD5: 651504 dc7ce24ffaab251a2002bf1dfdbe256d Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi-utils_0.5.2-1ubuntu1.3_all.deb Size/MD5:15784 32a0566e13d26c2ac618aee8d6310f43 http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-cil_0.5.2-1ubuntu1.3_all.deb Size/MD5:20748 ce2a400aa9d37b33d234d35fbd0765f5 http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/python2.4-avahi_0.5.2-1ubuntu1.3_all.deb Size/MD5: 8964 56044882a59dbea82e50eb889ddab030 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi-daemon_0.5.2-1ubuntu1.3_amd64.deb Size/MD5:49074 2d1bfbec40fb0990e9d9c3e7f9a7d5d2 http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi-dnsconfd_0.5.2-1ubuntu1.3_amd64.deb Size/MD5:15290 a43a4acb239c7da47baf1615c2d61b27 http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-client-dev_0.5.2-1ubuntu1.3_amd64.deb Size/MD5:27972 182b8adf040f20589b883bf427fb0656 http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-client1_0.5.2-1ubuntu1.3_amd64.deb Size/MD5:23102 c7e27c18c810ea439c8bb867ab5e8fda http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-common-dev_0.5.2-1ubuntu1.3_amd64.deb Size/MD5:31536 e0db12eff12ed67e75ae46aeecf14253 http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-common0_0.5.2-1ubuntu1.3_amd64.deb Size/MD5:20540 e32a02c8e9c41ca46e86c24ae146afda http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-core-dev_0.5.2-1ubuntu1.3_amd64.deb Size/MD5: 104490 2633408fbbe5c64cab9d6c386580bf96 http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-core1_0.5.2-1ubuntu1.3_amd64.deb Size/MD5:75398 14e59e657b680cdb009106679d91977f http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-glib-dev_0.5.2-1ubuntu1.3_amd64.deb Size/MD5:10038 b6a18e683e2c5aa1a187375a54b8e39a http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-glib0_0.5.2-1ubuntu1.3_amd64.deb Size/MD5: 109ddf7229ecc9ee684d75006fd7d71d http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-qt3-0_0.5.2-1ubuntu1.3_amd64.deb Size/MD5:11426 da757a2b37737aa22e5083d65d5fc14f http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-qt3-dev_0.5.2-1ubuntu1.3_amd64.deb Size/MD5:11708 210e14ee05911ed7fd52945010a5297f http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-qt4-0_0.5.2-1ubuntu1.3_amd64.deb Size/MD5: 9284 75a6ac74a009a60d9413e0fe9669c163 http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-qt4-dev_0.5.2-1ubuntu1.3_amd64.deb Size/MD5: 9678 73fd48ec0f9ece9943c649faaacf7829 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi-daemon_0.5.2-1ubuntu1.3_i386.deb Size/MD5:45014 d48dae82e7556cf9af9307c7bce01941 http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/avahi-dnsconfd_0.5.2-1ubuntu1.3_i386.deb Size/MD5:14338 21402b49b74c7273191c57fc979de17e http://security.ubuntu.com/ubuntu/pool/universe/a/avahi/libavahi-client-dev_0.5.2-1ubuntu1.3_i386.deb Size/MD5:24598 175251b828d8960c443a4c9f31b3888a
[Full-disclosure] [USN-375-1] PHP vulnerability
=== Ubuntu Security Notice USN-375-1 November 02, 2006 php5 vulnerability CVE-2006-5465 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: libapache2-mod-php5 5.0.5-2ubuntu1.6 php5-cli 5.0.5-2ubuntu1.6 Ubuntu 6.06 LTS: libapache2-mod-php5 5.1.2-1ubuntu3.4 php5-cli 5.1.2-1ubuntu3.4 Ubuntu 6.10: libapache2-mod-php5 5.1.6-1ubuntu2.1 php5-cli 5.1.6-1ubuntu2.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Stefan Esser discovered two buffer overflows in the htmlentities() and htmlspecialchars() functions. By supplying specially crafted input to PHP applications which process that input with these functions, a remote attacker could potentially exploit this to execute arbitrary code with the privileges of the application. (CVE-2006-5465) This update also fixes bugs in the chdir() and tempnam() functions, which did not perform proper open_basedir checks. This could allow local scripts to bypass intended restrictions. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.6.diff.gz Size/MD5: 112425 63a852d183b72a445768e054979af66e http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.6.dsc Size/MD5: 1707 0286bd32528175488daa0189f97b1d75 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5.orig.tar.gz Size/MD5: 6082082 ae36a2aa35cfaa58bdc5b9a525e6f451 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/php5/php-pear_5.0.5-2ubuntu1.6_all.deb Size/MD5: 173670 572a607668c6f5cd2029343bccc4cf2f http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.6_all.deb Size/MD5: 1038 c776023995d03e018198575b6393989c amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.0.5-2ubuntu1.6_amd64.deb Size/MD5: 2013148 7c1d4e4812bf88a200fb41829d519b36 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.0.5-2ubuntu1.6_amd64.deb Size/MD5: 3972536 9d125c7504d9549ab43951cae8b221a9 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.0.5-2ubuntu1.6_amd64.deb Size/MD5: 1997138 7ce36c97b659f9a89a1d5545e945cc03 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.0.5-2ubuntu1.6_amd64.deb Size/MD5: 129032 6b8c7e3655e6b47700a7a9e85b5ec637 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.0.5-2ubuntu1.6_amd64.deb Size/MD5:24022 ccc396ace095952fce2c9f351cb8c0fa http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.0.5-2ubuntu1.6_amd64.deb Size/MD5: 218732 1f147e51c313f480fa21afff7710fa6d http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.0.5-2ubuntu1.6_amd64.deb Size/MD5:35556 59d0bff85f86103d3ab8452e15ba6b3f http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.0.5-2ubuntu1.6_amd64.deb Size/MD5:20660 f6590132e23072988585ca437684c475 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.0.5-2ubuntu1.6_amd64.deb Size/MD5: 8612 e9052b945f1c87e2dfa9b6538ce4768e http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.0.5-2ubuntu1.6_amd64.deb Size/MD5:24468 c473297e7b15de48cdd8142e8bd03d42 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.0.5-2ubuntu1.6_amd64.deb Size/MD5:29286 16537d4b9080f8a0b34e83427cec39ae http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.0.5-2ubuntu1.6_amd64.deb Size/MD5:40072 392cdd68f2b97e0ad8d00e04c059a765 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.0.5-2ubuntu1.6_amd64.deb Size/MD5: 8090 702929f3a94280eb9f90e010cb0cfddd http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.0.5-2ubuntu1.6_amd64.deb Size/MD5:14466 a5f8d8c2f30534a17d39840a50ad8a6a http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.0.5-2ubuntu1.6_amd64.deb Size/MD5:28150 3d0f62ebf3ac0289a964bc75e18c3961 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.0.5-2ubuntu1.6_amd64.deb Size/MD5:22216 a9faea6d24aa8aaf56736bea7d247842 http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.0.5-2ubuntu1.6_amd64.deb Size/MD5:41888 e1fe7c9087fca237a2b1cbf1ee48c97e
[Full-disclosure] [USN-372-1] imagemagick vulnerability
=== Ubuntu Security Notice USN-372-1 November 01, 2006 imagemagick vulnerability CVE-2006-5456 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libmagick6 6:6.0.6.2-2.1ubuntu1.5 Ubuntu 5.10: libmagick6 6:6.2.3.4-1ubuntu1.4 Ubuntu 6.06 LTS: libmagick9 6:6.2.4.5-0.6ubuntu0.3 Ubuntu 6.10: libmagick9 7:6.2.4.5.dfsg1-0.10ubuntu0.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: M. Joonas Pihlaja discovered that ImageMagick did not sufficiently verify the validity of PALM and DCM images. When processing a specially crafted image with an application that uses imagemagick, this could be exploited to execute arbitrary code with the application's privileges. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5.diff.gz Size/MD5: 144502 96cdc6266e29aa2ba91e09adc67a3c2a http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5.dsc Size/MD5: 899 6bb10253b54d9b68b99ab5e117d0bb86 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2.orig.tar.gz Size/MD5: 6824001 477a361ba0154cc2423726fab4a3f57c amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5_amd64.deb Size/MD5: 1466726 30529972b274e75f686f38aab2e27e36 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.5_amd64.deb Size/MD5: 229236 13fa208a5cb5f6acdfd271836b39e2f0 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.5_amd64.deb Size/MD5: 164022 e4b7c3ed32275b45e7a982bc9be16710 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.5_amd64.deb Size/MD5: 1551474 6a6e325d036aa7369e42ea7bc60223b4 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.5_amd64.deb Size/MD5: 1195388 38967817dd23a96f6cbbe996c26d86bc http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.5_amd64.deb Size/MD5: 232262 3ae7c25400744ee24260453e4a952406 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5_i386.deb Size/MD5: 1465348 e4330a298179425f3d88db6f308f6520 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.5_i386.deb Size/MD5: 209222 879366413a35554aed05bcf9f27f038b http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.5_i386.deb Size/MD5: 164516 21497849c6a53e77db86cf217ce5d81a http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.5_i386.deb Size/MD5: 1454216 12f86d30660e81477ead1ac3e4ed383c http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.5_i386.deb Size/MD5: 1140964 c289aa3e81f0d5106d2fd9d23ba1795e http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.5_i386.deb Size/MD5: 232642 8b317e6dfe26d08b31bc536d2c083827 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5_powerpc.deb Size/MD5: 1472140 b3b445e1a7af2910ed9e7f8be844f909 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.5_powerpc.deb Size/MD5: 228208 99d28d5a4b541a032d52754eebe7aba9 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.5_powerpc.deb Size/MD5: 157202 e5553dbb2bf94dac87e16114652f029f http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.5_powerpc.deb Size/MD5: 1686432 ad415b90f40c1ab31e023f1df6adcb4e http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.5_powerpc.deb Size/MD5: 1170248 7a16caf06e3834dffccc4652cd302993 http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.5_powerpc.deb Size/MD5: 270978 caebe7cef826261b11fb068008ed60b9 Updated packages for Ubuntu 5.10: Source archives:
[Full-disclosure] [USN-369-2] postgresql-8.1 vulnerabilities
=== Ubuntu Security Notice USN-369-2 November 01, 2006 postgresql-8.1 vulnerabilities CVE-2006-5540, CVE-2006-5541, CVE-2006-5542 === A security issue affects the following Ubuntu releases: Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.10: postgresql-8.1 8.1.4-7ubuntu0.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: USN-369-1 fixed three minor PostgreSQL 8.1 vulnerabilities for Ubuntu 6.06 LTS. This update provides the corresponding update for Ubuntu 6.10. Original advisory details: Michael Fuhr discovered an incorrect type check when handling unknown literals. By attempting to coerce such a literal to the ANYARRAY type, a local authenticated attacker could cause a server crash. (CVE-2006-5541) Josh Drake and Alvaro Herrera reported a crash when using aggregate functions in UPDATE statements. A local authenticated attacker could exploit this to crash the server backend. This update disables this construct, since it is not very well defined and forbidden by the SQL standard. (CVE-2006-5540) Sergey Koposov discovered a flaw in the duration logging. This could cause a server crash under certain circumstances. (CVE-2006-5542) Please note that these flaws can usually not be exploited through web and other applications that use a database and are exposed to untrusted input, so these flaws do not pose a threat in usual setups. Updated packages for Ubuntu 6.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-7ubuntu0.1.diff.gz Size/MD5:52401 af21a893e2947a1e467d5e98663031e7 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-7ubuntu0.1.dsc Size/MD5: 1176 04b8d59e5fdb061ebc2a0b1e86c4220d http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4.orig.tar.gz Size/MD5: 11312643 c6554a0ef948ab2b18b617954e1788fe Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.4-7ubuntu0.1_all.deb Size/MD5: 1442056 4263930dd4391fd81944a82c372f3cba amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 152924 5fb69c85456514e2f78072efc3956ec0 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 344912 a34d581ae43ce95f0758f3128d2c07e5 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 173428 733938955a0112fb6fedc835f5456052 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 175450 5412a17f17d49c3090cb7fcbcc136e7b http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 312606 3b5e8a5d6cffa8b48f82575458503d22 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 206680 559c766535f53918647783563d797582 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 3256168 a0bbda514074cd42271529eb07e94ecd http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 769328 3323f21f5fd11c660e74e0b2a3d480f6 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 619156 08c3d6be3fa11d19eccdbb9986e659d4 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 169362 d5cec1f551207e2e734bf6fab2317ef9 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 163748 b99d7a9fafcfd3e8b616ef1f483c4da9 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 164056 17bb99f0f7ab3edf2391271d64e0feda http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.4-7ubuntu0.1_amd64.deb Size/MD5: 596412 1d3f23de9e73e3f3c97b2532d7b4c5c8 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-7ubuntu0.1_i386.deb Size/MD5: 152234 5ec67e24a0c39547dd1a4594f43c9ba2
[Full-disclosure] [USN-369-1] PostgreSQL vulnerabilities
=== Ubuntu Security Notice USN-369-1 October 24, 2006 postgresql-8.1 vulnerabilities http://www.postgresql.org/about/news.664 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: postgresql-8.1 8.1.4-0ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Michael Fuhr discovered an incorrect type check when handling unknown literals. By attempting to coerce such a literal to the ANYARRAY type, a local authenticated attacker could cause a server crash. Josh Drake and Alvaro Herrera reported a crash when using aggregate functions in UPDATE statements. A local authenticated attacker could exploit this to crash the server backend. This update disables this construct, since it is not very well defined and forbidden by the SQL standard. Sergey Koposov discovered a flaw in the duration logging. This could cause a server crash under certain circumstances. Please note that these flaws can usually not be exploited through web and other applications that use a database and are exposed to untrusted input, so these flaws do not pose a threat in usual setups. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.1.diff.gz Size/MD5:27049 3275e9b9ba9270f02f6d71171b85b770 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.1.dsc Size/MD5: 1115 26f7be0a7abbf8d2dd43fcecb2e68c03 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4.orig.tar.gz Size/MD5: 11312643 c6554a0ef948ab2b18b617954e1788fe Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.4-0ubuntu1.1_all.deb Size/MD5: 1441006 6d07fb48179222edcddb101cfa38bdd0 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 151896 205c5bdfaa12cd1aa742f8a60175d53d http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 343924 057a190fd02625da8233ea8c0bbffd6d http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 172408 77edbd84b4aa4a01a47228f56d7ea964 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 174232 00f4dbac0e143d9838d956369a506902 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 307126 fa5f041925179d150007ca2c69cebad1 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 205670 01d775b51f26406da91c6a520afe98dd http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 3219066 e7194032e664f5ff0461a03daedb4b5e http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 757916 68b70373e91ca1b8ba79c6af8903d79f http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 612178 11c0024eeeaa10a493dc7a93fab4c8af http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 168686 4481591c9c1546ac1e9c9469f72c01f9 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 162830 3ecd7f7ce9d4557e2b5a1a10426f03e4 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 162864 309430e8b0429106fe0e45c75367844c http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.4-0ubuntu1.1_amd64.deb Size/MD5: 595544 b11942b89fa3b2ad608647d8a98a2be0 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-0ubuntu1.1_i386.deb Size/MD5: 150812 4bac344dce1360a88d264f6a71872e69 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-0ubuntu1.1_i386.deb Size/MD5: 333798 1907cd200c5976e80af2bd729ea026ac http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-0ubuntu1.1_i386.deb Size/MD5: 169958
[Full-disclosure] [USN-368-1] Qt vulnerability
=== Ubuntu Security Notice USN-368-1 October 23, 2006 qt-x11-free vulnerability CVE-2006-4811 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libqt3c102 3:3.3.3-7ubuntu3.1 libqt3c102-mt3:3.3.3-7ubuntu3.1 Ubuntu 5.10: libqt3-mt3:3.3.4-8ubuntu5.1 Ubuntu 6.06 LTS: libqt3-mt3:3.3.6-1ubuntu6.1 After a standard system upgrade you need to restart your Desktop session to effect the necessary changes. Details follow: An integer overflow was discovered in Qt's image loader. By processing a specially crafted image with an application that uses this library (like Konqueror), a remote attacker could exploit this to execute arbitrary code with the application's privileges. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt-x11-free_3.3.3-7ubuntu3.1.diff.gz Size/MD5:62291 8b599a01d2de39b073be2a0bdb8c6475 http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt-x11-free_3.3.3-7ubuntu3.1.dsc Size/MD5: 1816 1fdc71e7378ad7c52f29fde182246d2f http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt-x11-free_3.3.3.orig.tar.gz Size/MD5: 17358091 b0b98c938851d42a90632b990dca28c0 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3-i18n_3.3.3-7ubuntu3.1_all.deb Size/MD5:78412 3ea93ae55002054c58a4dc90f51329be http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt3-doc_3.3.3-7ubuntu3.1_all.deb Size/MD5: 5421764 68991f2833c99bd70c3c6a190ff0a6d9 http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/qt3-examples_3.3.3-7ubuntu3.1_all.deb Size/MD5: 1552090 6e9316cd2766bcfbaeabc55b3445ad56 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3-compat-headers_3.3.3-7ubuntu3.1_amd64.deb Size/MD5:33004 eefa43c5e3b24370a383a51b36727368 http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3-dev_3.3.3-7ubuntu3.1_amd64.deb Size/MD5:3 90e34db6cd69cde1e965e13cb55d5810 http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3-headers_3.3.3-7ubuntu3.1_amd64.deb Size/MD5: 348742 a952c8e7e1a2988b2621fb723404d47a http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3-mt-dev_3.3.3-7ubuntu3.1_amd64.deb Size/MD5:44636 d3c926f39dcb2b932326bab7106859a8 http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.3-7ubuntu3.1_amd64.deb Size/MD5:45944 f3ed38fff143739feb15fc57c549b35a http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-mt-odbc_3.3.3-7ubuntu3.1_amd64.deb Size/MD5:63988 54ff31515fe216ef4d157b4213584a12 http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.3-7ubuntu3.1_amd64.deb Size/MD5:52248 84314a527126a99fb5d4485ca17aeb63 http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.3-7ubuntu3.1_amd64.deb Size/MD5: 216308 41ae0886649734a7bbf05c9b40b6da44 http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3c102-mt_3.3.3-7ubuntu3.1_amd64.deb Size/MD5: 3110106 3b3d79bfb5e2a9fb6a05771cfeb13078 http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-mysql_3.3.3-7ubuntu3.1_amd64.deb Size/MD5:46056 75efaa38e659b6f640ba1d937124792d http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-odbc_3.3.3-7ubuntu3.1_amd64.deb Size/MD5:64116 1a2c666f5ee47c8b3d485a07b2ed4e26 http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-psql_3.3.3-7ubuntu3.1_amd64.deb Size/MD5:52382 0633242d929de9b60a1620e5489f40d2 http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-sqlite_3.3.3-7ubuntu3.1_amd64.deb Size/MD5: 216424 44cd04f2b0d0d6d07c1fa69c3177c2f6 http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3c102_3.3.3-7ubuntu3.1_amd64.deb Size/MD5: 2996422 36942b9d4853b966ea2746ebaa091ab0 http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt3-apps-dev_3.3.3-7ubuntu3.1_amd64.deb Size/MD5: 2114746 2d8a767cfcd05c4de97e06f962b48890 http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/qt3-assistant_3.3.3-7ubuntu3.1_amd64.deb Size/MD5: 246458 133a70053ae29a1647565396adbaf415
[Full-disclosure] [USN-360-1] awstats vulnerabilities
=== Ubuntu Security Notice USN-360-1 October 10, 2006 awstats vulnerabilities CVE-2006-3681, CVE-2006-3682 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: awstats 6.3-1ubuntu0.4 Ubuntu 5.10: awstats 6.4-1ubuntu1.3 Ubuntu 6.06 LTS: awstats 6.5-1ubuntu1.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: awstats did not fully sanitize input, which was passed directly to the user's browser, allowing for an XSS attack. If a user was tricked into following a specially crafted awstats URL, the user's authentication information could be exposed for the domain where awstats was hosted. (CVE-2006-3681) awstats could display its installation path under certain conditions. However, this might only become a concern if awstats is installed into an user's home directory. (CVE-2006-3682) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.4.diff.gz Size/MD5:27234 dfd36e862db2211270ccfcda1b9f4d3a http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.4.dsc Size/MD5: 595 967d4b14c6a5bb7e2c69c3843d15eb0a http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3.orig.tar.gz Size/MD5: 938794 edb73007530a5800d53b9f1f90c88053 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.4_all.deb Size/MD5: 726704 52d471f9299e0bb5495c6e7db4fcc5fd Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.3.diff.gz Size/MD5:20294 23e7714e08623dd464a76b5d2618c9fa http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.3.dsc Size/MD5: 595 e4ae507c9fc431a95b43fdc00f4a94e1 http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4.orig.tar.gz Size/MD5: 918435 056e6fb0c7351b17fe5bbbe0aa1297b1 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.3_all.deb Size/MD5: 728744 ca061e390d9ed9056bb58e14bd8bbece Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.5-1ubuntu1.2.diff.gz Size/MD5:20075 5bdc75b3b0ae69ee240430b254b529aa http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.5-1ubuntu1.2.dsc Size/MD5: 777 67d418d1283962b1955fffe465ed5d2e http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.5.orig.tar.gz Size/MD5: 1051780 aef00b2ff5c5413bd2a868299cabd69a Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.5-1ubuntu1.2_all.deb Size/MD5: 853276 6213e0f258c78ce25b73a1f7a0152f4e signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-361-1] Mozilla vulnerabilities
=== Ubuntu Security Notice USN-361-1 October 10, 2006 mozilla vulnerabilities CVE-2006-2788, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3811, CVE-2006-4340, CVE-2006-4565, CVE-2006-4568, CVE-2006-4570, CVE-2006-4571 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libnspr4 2:1.7.13-0ubuntu05.04.2 libnss3 2:1.7.13-0ubuntu05.04.2 mozilla-browser 2:1.7.13-0ubuntu05.04.2 mozilla-mailnews 2:1.7.13-0ubuntu05.04.2 mozilla-psm 2:1.7.13-0ubuntu05.04.2 Ubuntu 5.10: libnspr4 2:1.7.13-0ubuntu5.10.2 libnss3 2:1.7.13-0ubuntu5.10.2 mozilla-browser 2:1.7.13-0ubuntu5.10.2 mozilla-mailnews 2:1.7.13-0ubuntu5.10.2 mozilla-psm 2:1.7.13-0ubuntu5.10.2 After a standard system upgrade you need to restart Mozilla to effect the necessary changes. Details follow: Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious URL. (CVE-2006-2788, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-4565, CVE-2006-4568, CVE-2006-4571) A bug was found in the script handler for automatic proxy configuration. A malicious proxy could send scripts which could execute arbitrary code with the user's privileges. (CVE-2006-3808) The NSS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge valid signatures without the need of the secret key. (CVE-2006-4340) Georgi Guninski discovered that even with JavaScript disabled, a malicous email could still execute JavaScript when the message is viewed, replied to, or forwarded by putting the script in a remote XBL file loaded by the message. (CVE-2006-4570) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13-0ubuntu05.04.2.diff.gz Size/MD5: 403767 ad89e14a1a7063ffd40c7966f66f63e6 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13-0ubuntu05.04.2.dsc Size/MD5: 1140 62f9aae0950ae23ab127ed0c608a6cd0 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13.orig.tar.gz Size/MD5: 38788839 db906560b5abe488286ad1edc21d52b6 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.13-0ubuntu05.04.2_amd64.deb Size/MD5: 168066 099a54a14163f7ffe0308530d7f513e8 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.13-0ubuntu05.04.2_amd64.deb Size/MD5: 142106 f8c747f219197d2fc62c7be7532dd09e http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.13-0ubuntu05.04.2_amd64.deb Size/MD5: 184956 80462134e344661ebcdb10668703c8cf http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.13-0ubuntu05.04.2_amd64.deb Size/MD5: 711066 2b27ce520e6e2c519145592da529d67c http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.13-0ubuntu05.04.2_amd64.deb Size/MD5: 10618640 187ac84d04bad5af52788263ce85516f http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.13-0ubuntu05.04.2_amd64.deb Size/MD5: 403276 72d272889c297249f811744536aece56 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.13-0ubuntu05.04.2_amd64.deb Size/MD5: 158328 1f81850675d5eb5df3c925b5b1b597ba http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.13-0ubuntu05.04.2_amd64.deb Size/MD5: 3352872 63a790924643bed33c08e1a461978462 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.13-0ubuntu05.04.2_amd64.deb Size/MD5: 121184 1cd6cd71393fad002ac4835bd4d77bc9 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.13-0ubuntu05.04.2_amd64.deb Size/MD5: 204162 87a317642b4ecce9677cd0ed24efab5a http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.13-0ubuntu05.04.2_amd64.deb Size/MD5: 1935960 adb803a894fa3a15852d0733afc74d4c http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.13-0ubuntu05.04.2_amd64.deb Size/MD5: 204574 b3469c0df25b7aab832b7980141c5d37
[Full-disclosure] [USN-362-1] PHP vulnerabilities
=== Ubuntu Security Notice USN-362-1 October 10, 2006 php4, php5 vulnerabilities CVE-2006-4485, CVE-2006-4486, CVE-2006-4625, CVE-2006-4812 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libapache2-mod-php4 4:4.3.10-10ubuntu4.8 php4-cgi 4:4.3.10-10ubuntu4.8 php4-cli 4:4.3.10-10ubuntu4.8 Ubuntu 5.10: libapache2-mod-php5 5.0.5-2ubuntu1.5 php5-cgi 5.0.5-2ubuntu1.5 php5-cli 5.0.5-2ubuntu1.5 Ubuntu 6.06 LTS: libapache2-mod-php5 5.1.2-1ubuntu3.3 php5-cgi 5.1.2-1ubuntu3.3 php5-cli 5.1.2-1ubuntu3.3 After a standard system upgrade you need to restart Apache with sudo /etc/init.d/apache2 restart to effect the necessary changes. Details follow: The stripos() function did not check for invalidly long or empty haystack strings. In an application that uses this function on arbitrary untrusted data this could be exploited to crash the PHP interpreter. (CVE-2006-4485) An integer overflow was discovered in the PHP memory allocation handling. On 64-bit platforms, the memory_limit setting was not enforced correctly. A remote attacker could exploit this to cause a Denial of Service attack through memory exhaustion. (CVE-2006-4486) Maksymilian Arciemowicz discovered that security relevant configuration options like open_basedir and safe_mode (which can be configured in Apache's httpd.conf) could be bypassed and reset to their default value in php.ini by using the ini_restore() function. (CVE-2006-4625) Stefan Esser discovered that the ecalloc() function in the Zend engine did not check for integer overflows. This particularly affected the unserialize() function. In applications which unserialize untrusted user-defined data, this could be exploited to execute arbitrary code with the application's privileges. (CVE-2006-4812) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.8.diff.gz Size/MD5: 284543 32ffb7a357a1eb784f5e883800fa3225 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.8.dsc Size/MD5: 1469 be67189cc38ba10051688c45ceaa http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10.orig.tar.gz Size/MD5: 4892209 73f5d1f42e34efa534a09c6091b5a21e Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.8_all.deb Size/MD5: 1128 0f98df1af5a786b8cec1ff06118ea588 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.8_amd64.deb Size/MD5: 1657570 d63f46f7da773da61b1ae04e40394433 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.8_amd64.deb Size/MD5: 3275634 73b141ff9e4300acf3f07f4676d75c79 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.8_amd64.deb Size/MD5: 1647610 25d389aff7dd135ee6f22c758a1c5d16 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.8_amd64.deb Size/MD5: 168634 7803ecd2a0f92145900da1c0fa807d15 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.8_amd64.deb Size/MD5: 348234 3e36ef7e8141a466281e4ed655badb57 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.8_i386.deb Size/MD5: 1592994 b57510c7cbc231b88aa108168391cbfc http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.8_i386.deb Size/MD5: 3170396 27cc6bf74505a5698a270bbbf6d558f6 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.8_i386.deb Size/MD5: 1593204 0d6b614d915a537f51edf57ba5e7a694 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.8_i386.deb Size/MD5: 168628 c5e7e2259e01ffa4eacbe45e91495f99 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.8_i386.deb Size/MD5: 348256 ee78b8db7a144d3d18677adb636f0b2c powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.8_powerpc.deb Size/MD5: 1659228 4d37dd638c8cd017360816cc10a0fe25
[Full-disclosure] [USN-359-1] Python vulnerability
=== Ubuntu Security Notice USN-359-1 October 06, 2006 python2.3, python2.4 vulnerability CVE-2006-4980 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: python2.32.3.5-2ubuntu0.3 python2.4-minimal2.4.1-0ubuntu0.2 Ubuntu 5.10: python2.32.3.5-8ubuntu0.2 python2.4-minimal2.4.2-1ubuntu0.2 Ubuntu 6.06 LTS: python2.3-dbg2.3.5-9ubuntu1.2 python2.4-minimal2.4.3-0ubuntu6 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Benjamin C. Wiley Sittler discovered that Python's repr() function did not properly handle UTF-32/UCS-4 strings. If an application uses repr() on arbitrary untrusted data, this could be exploited to execute arbitrary code with the privileges of the python application. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/python2.3/python2.3_2.3.5-2ubuntu0.3.diff.gz Size/MD5: 2357500 bea365d1d6c98d54a2ba2c1300253cf9 http://security.ubuntu.com/ubuntu/pool/main/p/python2.3/python2.3_2.3.5-2ubuntu0.3.dsc Size/MD5: 1152 b8b1b1a1ff18ddb962f059fe836bb370 http://security.ubuntu.com/ubuntu/pool/main/p/python2.3/python2.3_2.3.5.orig.tar.gz Size/MD5: 8512566 9c35e5ca3c487e1c1f70f2fb1ccbfffe http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4_2.4.1-0ubuntu0.2.diff.gz Size/MD5: 2601919 042484bbb7dc5a2e03d6997de0f2a398 http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4_2.4.1-0ubuntu0.2.dsc Size/MD5: 1141 1bcd362ffbac62716bb34a1dd2f043b4 http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4_2.4.1.orig.tar.gz Size/MD5: 9205762 0475655d5c6f7919fc977c42c1103af8 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/p/python2.3/idle-python2.3_2.3.5-2ubuntu0.3_all.deb Size/MD5: 235652 3dfdb7ae46bc14c8742c8cf771fe0ecb http://security.ubuntu.com/ubuntu/pool/universe/p/python2.4/idle-python2.4_2.4.1-0ubuntu0.2_all.deb Size/MD5: 240584 809b8060bab7e3a588c48155fd412aee http://security.ubuntu.com/ubuntu/pool/universe/p/python2.3/python2.3-doc_2.3.5-2ubuntu0.3_all.deb Size/MD5: 2860646 45e662a6c0422763329dc381db1b899e http://security.ubuntu.com/ubuntu/pool/universe/p/python2.3/python2.3-examples_2.3.5-2ubuntu0.3_all.deb Size/MD5: 512962 19dd20632aa00a9d36958b3803129197 http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4-doc_2.4.1-0ubuntu0.2_all.deb Size/MD5: 3323478 7afd731df65520151337df8f1ca2bf9a http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4-examples_2.4.1-0ubuntu0.2_all.deb Size/MD5: 579828 20a9f6a971ef3aa8d7618921bf296c5e amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/python2.3/python2.3-dev_2.3.5-2ubuntu0.3_amd64.deb Size/MD5: 1593658 e170994d3161032229e65c658c4b9833 http://security.ubuntu.com/ubuntu/pool/universe/p/python2.3/python2.3-gdbm_2.3.5-2ubuntu0.3_amd64.deb Size/MD5:27142 951c53e20261acf2e2ba07317f40aaac http://security.ubuntu.com/ubuntu/pool/universe/p/python2.3/python2.3-mpz_2.3.5-2ubuntu0.3_amd64.deb Size/MD5:31942 9c4a3feae66a59b5de888d9fcfd35eeb http://security.ubuntu.com/ubuntu/pool/main/p/python2.3/python2.3-tk_2.3.5-2ubuntu0.3_amd64.deb Size/MD5: 109776 8e675863b272dc7955e3f374f85349bd http://security.ubuntu.com/ubuntu/pool/main/p/python2.3/python2.3_2.3.5-2ubuntu0.3_amd64.deb Size/MD5: 3035892 4334bd09aee4dcc02d87dacd2d87d6d9 http://security.ubuntu.com/ubuntu/pool/universe/p/python2.4/python2.4-dbg_2.4.1-0ubuntu0.2_amd64.deb Size/MD5: 4285084 f0efd6ba55308df0c4dd901262fe6789 http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4-dev_2.4.1-0ubuntu0.2_amd64.deb Size/MD5: 1682228 b5a23d40dc9b78aaae0c77911f74dfa7 http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4-gdbm_2.4.1-0ubuntu0.2_amd64.deb Size/MD5:28006 5abb3d105f9be8e876f1f4780450d08d http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4-minimal_2.4.1-0ubuntu0.2_amd64.deb Size/MD5: 807100 9f3a8dce512745e3c0ed6e45066601e8 http://security.ubuntu.com/ubuntu/pool/main/p/python2.4/python2.4-tk_2.4.1-0ubuntu0.2_amd64.deb Size/MD5: 111906 cb5f4ea87f55671f07169627df23bf50
[Full-disclosure] [USN-353-2] OpenSSL vulnerability
=== Ubuntu Security Notice USN-353-2 October 04, 2006 openssl vulnerability CVE-2006-2940 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libssl0.9.7 0.9.7e-3ubuntu0.6 Ubuntu 5.10: libssl0.9.7 0.9.7g-1ubuntu1.5 Ubuntu 6.06 LTS: libssl0.9.8 0.9.8a-7ubuntu0.3 After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: USN-353-1 fixed several vulnerabilities in OpenSSL. However, Mark J Cox noticed that the applied patch for CVE-2006-2940 was flawed. This update corrects that patch. For reference, this is the relevant part of the original advisory: Certain types of public key could take disproportionate amounts of time to process. The library now limits the maximum key exponent size to avoid Denial of Service attacks. (CVE-2006-2940) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.6.diff.gz Size/MD5:31740 97bbcc504a6a95a33dbbdc5cbd37229e http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.6.dsc Size/MD5: 645 6d09dca9825c7249d785a307b0425ae9 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e.orig.tar.gz Size/MD5: 3043231 a8777164bca38d84e5eb2b1535223474 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.6_amd64.udeb Size/MD5: 495260 fd92e08373a92041809218c214823b73 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.6_amd64.deb Size/MD5: 2694372 eb5ca3d700f0cc9212c41b6f734b4f88 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.6_amd64.deb Size/MD5: 770484 3ea407d9dade085833bbf317486b04c8 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.6_amd64.deb Size/MD5: 904306 ed9e6cd718227584e7ad53127c20792a i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.6_i386.udeb Size/MD5: 433546 a9c706c6822ac597b71ea68f39b222db http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.6_i386.deb Size/MD5: 2493948 adf386221e765a18e8a0c8e0d741f2b9 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.6_i386.deb Size/MD5: 2243670 e7d78553fcc4be0c6d78be9af286277d http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.6_i386.deb Size/MD5: 901660 dbbcff730990c1b5e499ea5ce73f13be powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.6_powerpc.udeb Size/MD5: 499482 19be15b0af113962bed13516f77f9de4 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.6_powerpc.deb Size/MD5: 2775178 33815f085aa8fe83ff6c7f6e0558c50b http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.6_powerpc.deb Size/MD5: 780064 d5d41d880620b041859716fa27647cf7 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.6_powerpc.deb Size/MD5: 908756 b70e6794f0761eefb77e0ecafe0a2e7f Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.5.diff.gz Size/MD5:32414 b229018d41456fea8a0a0cd07ed666ac http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.5.dsc Size/MD5: 657 f490ddbc922b8f99f7d76b8b4d9e7554 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g.orig.tar.gz Size/MD5: 3132217 991615f73338a571b6a1be7d74906934 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7g-1ubuntu1.5_amd64.udeb Size/MD5: 499082 8d5e5984dc233f31a5dbeea947608279 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7g-1ubuntu1.5_amd64.deb Size/MD5: 2700700 1fb82d9ef43428f64ee1ed77c9a84c3b http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7g-1ubuntu1.5_amd64.deb Size/MD5: 774050 a14cd3488b047eedd5c6a511d17d3848 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.5_amd64.deb Size/MD5: 913768
[Full-disclosure] [USN-357-1] Mono vulnerability
=== Ubuntu Security Notice USN-357-1 October 04, 2006 mono vulnerability CVE-2006-5072 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: mono-classlib-1.01.1.8.3-1ubuntu2.1 mono-classlib-2.01.1.8.3-1ubuntu2.1 Ubuntu 6.06 LTS: mono-classlib-1.01.1.13.6-0ubuntu3.1 mono-classlib-2.01.1.13.6-0ubuntu3.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Sebastian Krahmer of the SuSE security team discovered that the System.CodeDom.Compiler classes used temporary files in an insecure way. This could allow a symbolic link attack to create or overwrite arbitrary files with the privileges of the user invoking the program. Under some circumstances, a local attacker could also exploit this to inject arbitrary code into running Mono processes. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.8.3-1ubuntu2.1.diff.gz Size/MD5:37812 6e222e5c13002ceca8e1e5efd82036e0 http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.8.3-1ubuntu2.1.dsc Size/MD5: 1020 605b25e63537ae93e630df34f8a7ae20 http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.8.3.orig.tar.gz Size/MD5: 15348432 5aefdc915cbd6ed84834692f59b92080 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-assemblies-base_1.1.8.3-1ubuntu2.1_all.deb Size/MD5:36654 b8f7a5eee8121212b3b04aad24d2b244 http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-classlib-1.0-dbg_1.1.8.3-1ubuntu2.1_all.deb Size/MD5: 3505034 621f1c7a211254305df73f51e4f13a4d http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-classlib-1.0_1.1.8.3-1ubuntu2.1_all.deb Size/MD5: 3837708 d71d24b2692563b1b693d2c12bfecee7 http://security.ubuntu.com/ubuntu/pool/universe/m/mono/mono-classlib-2.0-dbg_1.1.8.3-1ubuntu2.1_all.deb Size/MD5: 4022756 9fc1a800a4d1987b6d07c041f2466a87 http://security.ubuntu.com/ubuntu/pool/universe/m/mono/mono-classlib-2.0_1.1.8.3-1ubuntu2.1_all.deb Size/MD5: 4308358 6ecf87dfeb0e6842f4225f1073098cab http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-gac_1.1.8.3-1ubuntu2.1_all.deb Size/MD5:47462 eda8167aac2ccf64d249c75234f48be7 http://security.ubuntu.com/ubuntu/pool/universe/m/mono/mono-gmcs_1.1.8.3-1ubuntu2.1_all.deb Size/MD5: 629766 da95636cd70d27125a5d9370b26b7ead http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-mcs_1.1.8.3-1ubuntu2.1_all.deb Size/MD5: 1325110 a7fd2ef6b36717d2f326744e7730c601 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-dev_1.1.8.3-1ubuntu2.1_amd64.deb Size/MD5: 1058456 945f973f715f24adb4bc0df5c86a1c05 http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono0_1.1.8.3-1ubuntu2.1_amd64.deb Size/MD5: 804932 eb2ffc9e912807e8fa415101c3eff48a http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-common_1.1.8.3-1ubuntu2.1_amd64.deb Size/MD5: 128100 0e76abfc2c0c748a4d8a930306e293ca http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-devel_1.1.8.3-1ubuntu2.1_amd64.deb Size/MD5:36698 9438d7c7f63899f72cdec55d6834f711 http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jay_1.1.8.3-1ubuntu2.1_amd64.deb Size/MD5:54668 f1b326f1a327694c545203e35afebfd7 http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jit_1.1.8.3-1ubuntu2.1_amd64.deb Size/MD5: 669934 3f9b7d62bab94e98a290e16e2bd7342b http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-utils_1.1.8.3-1ubuntu2.1_amd64.deb Size/MD5: 1057068 6084bd8ec71f685f8fe8d832f6a76442 http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.8.3-1ubuntu2.1_amd64.deb Size/MD5: 1168 3d3166c3360341775d9908d53890e4fc i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-dev_1.1.8.3-1ubuntu2.1_i386.deb Size/MD5: 951222 dd9882797594ccc04b5dbb7e78c49756 http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono0_1.1.8.3-1ubuntu2.1_i386.deb Size/MD5: 726766 9610cca518cf9bd22e15a426d4a486c4 http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-common_1.1.8.3-1ubuntu2.1_i386.deb Size/MD5: 127854 36c79ed35e3c4d0f16a5afb159315e45 http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-devel_1.1.8.3-1ubuntu2.1_i386.deb Size/MD5:36694 78011b14c0e993a71891b0a4388d262b
[Full-disclosure] [USN-355-1] openssh vulnerabilities
=== Ubuntu Security Notice USN-355-1 October 02, 2006 openssh vulnerabilities CVE-2006-4924, CVE-2006-5051 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: openssh-server 1:3.9p1-1ubuntu2.3 Ubuntu 5.10: openssh-server 1:4.1p1-7ubuntu4.2 Ubuntu 6.06 LTS: openssh-server 1:4.2p1-7ubuntu3.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Tavis Ormandy discovered that the SSH daemon did not properly handle authentication packets with duplicated blocks. By sending specially crafted packets, a remote attacker could exploit this to cause the ssh daemon to drain all available CPU resources until the login grace time expired. (CVE-2006-4924) Mark Dowd discovered a race condition in the server's signal handling. A remote attacker could exploit this to crash the server. (CVE-2006-5051) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_3.9p1-1ubuntu2.3.diff.gz Size/MD5: 143243 ee5b491cf023e53b4991fe319da669aa http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_3.9p1-1ubuntu2.3.dsc Size/MD5: 866 237dcc91dde3201ba0bc5b9372654708 http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_3.9p1.orig.tar.gz Size/MD5: 832804 530b1dcbfe7a4a4ce4959c0775b85a5a Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh_3.9p1-1ubuntu2.3_all.deb Size/MD5:31312 a25012353606283dbae09b56dc60f1bb amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_3.9p1-1ubuntu2.3_amd64.udeb Size/MD5: 166846 b0507203d786efa365cef305acc0b790 http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_3.9p1-1ubuntu2.3_amd64.deb Size/MD5: 544562 4464ce148432194666a3fd7fae5b884f http://security.ubuntu.com/ubuntu/pool/universe/o/openssh/openssh-server-udeb_3.9p1-1ubuntu2.3_amd64.udeb Size/MD5: 179290 2774b437173889390312fab14a0d9edf http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_3.9p1-1ubuntu2.3_amd64.deb Size/MD5: 279624 deb54b320447ab79b8d8fb351c04960d http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_3.9p1-1ubuntu2.3_amd64.deb Size/MD5:62924 083fd0c899ed8c0c088f6f659d2fd017 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_3.9p1-1ubuntu2.3_i386.udeb Size/MD5: 139452 31deaca18b94b27d52c1870d86810db4 http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_3.9p1-1ubuntu2.3_i386.deb Size/MD5: 492810 8df816ca89945adc93e80d49f53aebe6 http://security.ubuntu.com/ubuntu/pool/universe/o/openssh/openssh-server-udeb_3.9p1-1ubuntu2.3_i386.udeb Size/MD5: 149160 632d59e71b6a3f5aab50e4cfd3842442 http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_3.9p1-1ubuntu2.3_i386.deb Size/MD5: 256218 5f9791afb335d57cd1a830c1e886ee08 http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_3.9p1-1ubuntu2.3_i386.deb Size/MD5:62512 9f21ce3a1134980ec47c1e99cf62ff61 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_3.9p1-1ubuntu2.3_powerpc.udeb Size/MD5: 159886 447da8535b3b4c0b85fefd44e01f4c4d http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_3.9p1-1ubuntu2.3_powerpc.deb Size/MD5: 541254 8d16c7e18fef84ab8f6a435c8c988b93 http://security.ubuntu.com/ubuntu/pool/universe/o/openssh/openssh-server-udeb_3.9p1-1ubuntu2.3_powerpc.udeb Size/MD5: 163428 e0ca6e79f907c35e2c32e515b8e808dd http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_3.9p1-1ubuntu2.3_powerpc.deb Size/MD5: 273640 c8e00fcbe413ac902ccc4dca508572f2 http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_3.9p1-1ubuntu2.3_powerpc.deb Size/MD5:64092 a88a46209fac664959c35b36fb93066e Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.1p1-7ubuntu4.2.diff.gz Size/MD5: 158624 fc0f2620cc3fc07ad4ea050b675e5f1b http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.1p1-7ubuntu4.2.dsc Size/MD5: 971 cd61da4d0742c684aaf90b8390252818
[Full-disclosure] [USN-354-1] Firefox vulnerabilities
=== Ubuntu Security Notice USN-354-1 October 02, 2006 firefox vulnerabilities CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812, CVE-2006-4253, CVE-2006-4340, CVE-2006-4565, CVE-2006-4566, CVE-2006-4567, CVE-2006-4568, CVE-2006-4569, CVE-2006-4571 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: firefox 1.5.dfsg+1.5.0.7-0ubuntu5.10.3 firefox-dom-inspector1.5.dfsg+1.5.0.7-0ubuntu5.10.3 firefox-gnome-support1.5.dfsg+1.5.0.7-0ubuntu5.10.3 devhelp 0.10-1ubuntu2.1 devhelp-common 0.10-1ubuntu2.1 epiphany-browser 1.8.2-0ubuntu1.1 epiphany-browser-dev 1.8.2-0ubuntu1.1 gnome-app-install0+20051005.1 libdevhelp-1-0 0.10-1ubuntu2.1 libdevhelp-1-dev 0.10-1ubuntu2.1 mozilla-firefox-locale-af-za 1.5-ubuntu5.10-1 mozilla-firefox-locale-ast-es1.5-ubuntu5.10-1 mozilla-firefox-locale-bg-bg 1.5-ubuntu5.10-1 mozilla-firefox-locale-cs-cz 1.5-ubuntu5.10-1 mozilla-firefox-locale-da-dk 1.5-ubuntu5.10-1 mozilla-firefox-locale-de1.5-ubuntu5.10-1 mozilla-firefox-locale-de-de 1.5-ubuntu5.10-1 mozilla-firefox-locale-en-gb 1.5-ubuntu5.10-1 mozilla-firefox-locale-es1.5-ubuntu5.10-1 mozilla-firefox-locale-es-ar 1.5-ubuntu5.10-1 mozilla-firefox-locale-es-es 1.5-ubuntu5.10-1 mozilla-firefox-locale-fi-fi 1.5-ubuntu5.10-1 mozilla-firefox-locale-fr1.5-ubuntu5.10-1 mozilla-firefox-locale-fr-fr 1.5-ubuntu5.10-1 mozilla-firefox-locale-ga-ie 1.5-ubuntu5.10-1 mozilla-firefox-locale-gu-in 1.5-ubuntu5.10-1 mozilla-firefox-locale-he-il 1.5-ubuntu5.10-1 mozilla-firefox-locale-hu-hu 1.5-ubuntu5.10-1 mozilla-firefox-locale-mk-mk 1.5-ubuntu5.10-1 mozilla-firefox-locale-nl-nl 1.5-ubuntu5.10-1 mozilla-firefox-locale-pa-in 1.5-ubuntu5.10-1 mozilla-firefox-locale-pl1.5-ubuntu5.10-1 mozilla-firefox-locale-pl-pl 1.5-ubuntu5.10-1 mozilla-firefox-locale-pt-br 1.5-ubuntu5.10-1 mozilla-firefox-locale-pt-pt 1.5-ubuntu5.10-1 mozilla-firefox-locale-ro-ro 1.5-ubuntu5.10-1 mozilla-firefox-locale-ru-ru 1.5-ubuntu5.10-1 mozilla-firefox-locale-sl-si 1.5-ubuntu5.10-1 mozilla-firefox-locale-sq-al 1.5-ubuntu5.10-1 mozilla-firefox-locale-sv1.5-ubuntu5.10-1 mozilla-firefox-locale-sv-se 1.5-ubuntu5.10-1 mozilla-firefox-locale-tr-tr 1.5-ubuntu5.10-1 mozilla-firefox-locale-xh-za 1.5-ubuntu5.10-1 mozilla-firefox-locale-zh-cn 1.5-ubuntu5.10-1 mozilla-firefox-locale-zh-tw 1.5-ubuntu5.10-1 yelp 2.12.1-0ubuntu1.1 After a standard system upgrade you need to restart Firefox to effect the necessary changes. Since the 1.0.x series of Firefox is not supported any more, this update introduces the firefox 1.5 series into Ubuntu 5.10. Please check whether all your extensions still work as expected. Details follow: Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious URL. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-3812, CVE-2006-4253, CVE-2006-4565, CVE-2006-4566, CVE-2006-4568, CVE-2006-4569 CVE-2006-4571) Cross-site scripting vulnerabilities were found in the XPCNativeWrapper() function and native DOM method handlers. A malicious web site could exploit these to modify the contents or steal confidential data (such as passwords) from other opened web pages. (CVE-2006-3802, CVE-2006-3810) A bug was found in the script handler for automatic proxy configuration. A malicious proxy could send scripts which could execute arbitrary code with the user's privileges. (CVE-2006-3808) The NSS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge valid signatures without the need of the secret key.
[Full-disclosure] [USN-353-1] openssl vulnerabilities
=== Ubuntu Security Notice USN-353-1 September 28, 2006 openssl vulnerabilities CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4343 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libssl0.9.7 0.9.7e-3ubuntu0.4 Ubuntu 5.10: libssl0.9.7 0.9.7g-1ubuntu1.3 Ubuntu 6.06 LTS: libssl0.9.8 0.9.8a-7ubuntu0.2 After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: Dr. Henson of the OpenSSL core team and Open Network Security discovered a mishandled error condition in the ASN.1 parser. By sending specially crafted packet data, a remote attacker could exploit this to trigger an infinite loop, which would render the service unusable and consume all available system memory. (CVE-2006-2937) Certain types of public key could take disproportionate amounts of time to process. The library now limits the maximum key exponent size to avoid Denial of Service attacks. (CVE-2006-2940) Tavis Ormandy and Will Drewry of the Google Security Team discovered a buffer overflow in the SSL_get_shared_ciphers() function. By sending specially crafted packets to applications that use this function (like Exim, MySQL, or the openssl command line tool), a remote attacker could exploit this to execute arbitrary code with the server's privileges. (CVE-2006-3738) Tavis Ormandy and Will Drewry of the Google Security Team reported that the get_server_hello() function did not sufficiently check the client's session certificate. This could be exploited to crash clients by remote attackers sending specially crafted SSL responses. (CVE-2006-4343) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.4.diff.gz Size/MD5:31608 073a299c1050059dddc16818fecd56c5 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.4.dsc Size/MD5: 645 eb30a98f7f176954987a8642bcda2ae7 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e.orig.tar.gz Size/MD5: 3043231 a8777164bca38d84e5eb2b1535223474 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.4_amd64.udeb Size/MD5: 495242 d51b7cb655f0cd4010160d7e8546da41 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.4_amd64.deb Size/MD5: 2694098 3c87855cd1a4a2bb12dd1fef0acdca78 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.4_amd64.deb Size/MD5: 770334 e0dff277aafa1f35fcc7995576374922 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.4_amd64.deb Size/MD5: 904128 70a46effaa0b51162f9d84c609bba596 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.4_i386.udeb Size/MD5: 433488 f1bd01ac7dd85f10cd5c32d6d78cb514 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.4_i386.deb Size/MD5: 2493770 5369e13ba790cecbff0854a0d173d11a http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.4_i386.deb Size/MD5: 2243328 62d80313f7ffdb047878a12687e5d689 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.4_i386.deb Size/MD5: 901520 3791cb1125bde1a315955023c777e2ae powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.4_powerpc.udeb Size/MD5: 499458 ec8af8b5ee0eaeb859a232e8a233b0dd http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.4_powerpc.deb Size/MD5: 2774934 15270e8e78df08a6b7b5be55dc3d6553 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.4_powerpc.deb Size/MD5: 779888 19a6e2d00d895845f556c44e044151f9 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.4_powerpc.deb Size/MD5: 908598 9b0fa35557f76a6b24de199e3323541c Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.3.diff.gz Size/MD5:32295 def7ac70ca1bc85e0c4ebbd4260a4461 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.3.dsc Size/MD5: 657 0b1769211fafefd21cc37c07a932a714
[Full-disclosure] [USN-352-1] Thunderbird vulnerabilities
=== Ubuntu Security Notice USN-352-1 September 25, 2006 mozilla-thunderbird vulnerabilities CVE-2006-4253, CVE-2006-4340, CVE-2006-4565, CVE-2006-4566, CVE-2006-4567, CVE-2006-4570, CVE-2006-4571 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: mozilla-thunderbird 1.5.0.7-0ubuntu0.6.06 After a standard system upgrade you need to restart Thunderbird to effect the necessary changes. Details follow: Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious email containing JavaScript. Please note that JavaScript is disabled by default for emails, and it is not recommended to enable it. (CVE-2006-4253, CVE-2006-4565, CVE-2006-4566, CVE-2006-4571) The NSS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge valid signatures without the need of the secret key. (CVE-2006-4340) Jon Oberheide reported a way how a remote attacker could trick users into downloading arbitrary extensions with circumventing the normal SSL certificate check. The attacker would have to be in a position to spoof the victim's DNS, causing them to connect to sites of the attacker's choosing rather than the sites intended by the victim. If they gained that control and the victim accepted the attacker's cert for the Mozilla update site, then the next update check could be hijacked and redirected to the attacker's site without detection. (CVE-2006-4567) Georgi Guninski discovered that even with JavaScript disabled, a malicous email could still execute JavaScript when the message is viewed, replied to, or forwarded by putting the script in a remote XBL file loaded by the message. (CVE-2006-4570) Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.6.06.diff.gz Size/MD5: 454846 64c786b0c2886ff4a1cbb24fe4b76886 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.6.06.dsc Size/MD5: 962 2560649686a20166450e44098142e80b amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.7-0ubuntu0.6.06_amd64.deb Size/MD5: 3528618 27f6a9eec39470b434459d291cb1fbe7 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.7-0ubuntu0.6.06_amd64.deb Size/MD5: 193760 86704efd60c8268803fc81d9b75e4342 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.7-0ubuntu0.6.06_amd64.deb Size/MD5:59010 12f13e9662d7073cb7983acb4d7f42df http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.6.06_amd64.deb Size/MD5: 11984618 4b1a19fe4c27ed9cd753674c0201e3d7 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.7-0ubuntu0.6.06_i386.deb Size/MD5: 3520394 ebda5194f4385d2349bbd8b43bc519e0 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.7-0ubuntu0.6.06_i386.deb Size/MD5: 187130 cd3ff598ead2861320571a96aefb0eda http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.7-0ubuntu0.6.06_i386.deb Size/MD5:54524 647bb673f71dadb2db6f8d7d1371f1ff http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.6.06_i386.deb Size/MD5: 10282888 0e6e3b82d902623916747a4048e23c46 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.7-0ubuntu0.6.06_powerpc.deb Size/MD5: 3525354 cf51bead4b7313430956751fbb878d94 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.7-0ubuntu0.6.06_powerpc.deb Size/MD5: 190474 713a352b045073a5ed9e0f2d1c125ebf http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.7-0ubuntu0.6.06_powerpc.deb Size/MD5:58132 e188bfb0240ab1ffe1eedb45ab8f7a65 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.6.06_powerpc.deb Size/MD5: 11553840
[Full-disclosure] [USN-351-1] firefox vulnerabilities
=== Ubuntu Security Notice USN-351-1 September 22, 2006 firefox vulnerabilities CVE-2006-4253, CVE-2006-4340, CVE-2006-4565, CVE-2006-4566, CVE-2006-4567, CVE-2006-4568, CVE-2006-4569, CVE-2006-4571 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: firefox 1.5.dfsg+1.5.0.7-ubuntu0.6.06 libnss3 1.5.dfsg+1.5.0.7-ubuntu0.6.06 After a standard system upgrade you need to restart Firefox to effect the necessary changes. Please note that Firefox 1.0.8 in Ubuntu 5.10 and Ubuntu 5.04 are also affected by these problems. Updates for these Ubuntu releases will be delayed due to upstream dropping support for this Firefox version. We strongly advise that you disable JavaScript to disable the attack vectors for most vulnerabilities if you use one of these Ubuntu versions. An update is currently in progress. Details follow: Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious web page containing JavaScript. (CVE-2006-4253, CVE-2006-4565, CVE-2006-4566, CVE-2006-4568, CVE-2006-4569 CVE-2006-4571) The NSS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge valid signatures without the need of the secret key. (CVE-2006-4340) Jon Oberheide reported a way how a remote attacker could trick users into downloading arbitrary extensions with circumventing the normal SSL certificate check. The attacker would have to be in a position to spoof the victim's DNS, causing them to connect to sites of the attacker's choosing rather than the sites intended by the victim. If they gained that control and the victim accepted the attacker's cert for the Mozilla update site, then the next update check could be hijacked and redirected to the attacker's site without detection. (CVE-2006-4567) Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.7-ubuntu0.6.06.diff.gz Size/MD5: 177969 b449a4273730b70a6364fc7977f32947 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.7-ubuntu0.6.06.dsc Size/MD5: 1113 f66f89a240cf04e424268682b18b274d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.7.orig.tar.gz Size/MD5: 43116523 025ca9a48809d142dd4817e396157afa Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.7-ubuntu0.6.06_all.deb Size/MD5:49518 5e0b78c4ac74bee3eb1619bdb5e73dcf http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.7-ubuntu0.6.06_all.deb Size/MD5:50408 4301f74c782bedd5fdae77a8718c9e84 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb Size/MD5: 47330950 1a10494ee3d4d0a4194c9f2615648829 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb Size/MD5: 2798556 010d95da3e0f36228f7020f64a82d8db http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb Size/MD5: 216456 d2e78ea968f19f7402c6e07f810ac523 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb Size/MD5:82684 19d45ae80a1c181dc6e3e6d4f9b13d0c http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb Size/MD5: 9413980 f7dc5d3650a940520ccb5be0cdad3f2b http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb Size/MD5: 219138 6eecd17ccbad3377599eb5247888d47f http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb Size/MD5: 162186 73136a6353d5e146bccc4f496f0dd9a1 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb Size/MD5: 236042 4d0185a1415e236448d9f80a33749710 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.7-ubuntu0.6.06_amd64.deb Size/MD5: 757866 8278b72cad3ec0202ecae39c4fd2a354 i386 architecture (x86 compatible Intel/AMD)
[Full-disclosure] [USN-350-1] Thunderbird vulnerabilities
=== Ubuntu Security Notice USN-350-1 September 21, 2006 mozilla-thunderbird vulnerabilities CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3804, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812, CVE-2006-4253, CVE-2006-4340, CVE-2006-4565, CVE-2006-4566, CVE-2006-4567, CVE-2006-4570, CVE-2006-4571 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: mozilla-thunderbird 1.5.0.7-0ubuntu0.5.10 mozilla-thunderbird-locale-ca1.5-ubuntu5.10 mozilla-thunderbird-locale-de1.5-ubuntu5.10 mozilla-thunderbird-locale-fr1.5-ubuntu5.10 mozilla-thunderbird-locale-it1.5-ubuntu5.10 mozilla-thunderbird-locale-nl1.5-ubuntu5.10 mozilla-thunderbird-locale-pl1.5-ubuntu5.10 mozilla-thunderbird-locale-uk1.5-ubuntu5.10 mozilla-thunderbird-enigmail 2:0.94-0ubuntu0.5.10 mozilla-thunderbird-inspector1.5.0.7-0ubuntu0.5.10 mozilla-thunderbird-typeaheadfind1.5.0.7-0ubuntu0.5.10 After a standard system upgrade you need to restart Thunderbird to effect the necessary changes. Please note that Thunderbird 1.0.8 in Ubuntu 5.04 is also affected by these problems. An update will be provided shortly. Details follow: This update upgrades Thunderbird from 1.0.8 to 1.5.0.7. This step was necessary since the 1.0.x series is not supported by upstream any more. Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious email containing JavaScript. Please note that JavaScript is disabled by default for emails, and it is not recommended to enable it. (CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812, CVE-2006-4253, CVE-2006-4565, CVE-2006-4566, CVE-2006-4571) A buffer overflow has been discovered in the handling of .vcard files. By tricking a user into importing a malicious vcard into his contacts, this could be exploited to execute arbitrary code with the user's privileges. (CVE-2006-3804) The NSS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge valid signatures without the need of the secret key. (CVE-2006-4340) Jon Oberheide reported a way how a remote attacker could trick users into downloading arbitrary extensions with circumventing the normal SSL certificate check. The attacker would have to be in a position to spoof the victim's DNS, causing them to connect to sites of the attacker's choosing rather than the sites intended by the victim. If they gained that control and the victim accepted the attacker's cert for the Mozilla update site, then the next update check could be hijacked and redirected to the attacker's site without detection. (CVE-2006-4567) Georgi Guninski discovered that even with JavaScript disabled, a malicous email could still execute JavaScript when the message is viewed, replied to, or forwarded by putting the script in a remote XBL file loaded by the message. (CVE-2006-4570) The enigmail plugin and the translation packages have been updated to work with the new Thunderbird version. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.5.10.diff.gz Size/MD5: 451765 f226c2d1fb27ff7d1901563c0e7ae6aa http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7-0ubuntu0.5.10.dsc Size/MD5: 960 33f4c6cf8f964b3bbf0cb7bf2a9b3a41 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.7.orig.tar.gz Size/MD5: 35412353 4e43a174c53adf09382a4f959b86abe6 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu0.5.10.diff.gz Size/MD5:20864 3aee73c8c9d639372dc3f28a5f145324 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu0.5.10.dsc Size/MD5: 785 25206240fb199da5bbb5ab080600b0d5 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94.orig.tar.gz Size/MD5: 3126659 7e34cbe51f5a1faca2e26fa0edfd6a06 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird-locale-ca/mozilla-thunderbird-locale-ca_1.5-ubuntu5.10.dsc Size/MD5: 598 1d99f1f9e4dee5e65e3783a5f97dd263
[Full-disclosure] [USN-349-1] gzip vulnerabilities
=== Ubuntu Security Notice USN-349-1 September 19, 2006 gzip vulnerabilities CVE-2006-4334, CVE-2006-4335, CVE-2006-4336, CVE-2006-4337, CVE-2006-4338 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: gzip 1.3.5-9ubuntu3.5 Ubuntu 5.10: gzip 1.3.5-11ubuntu2.1 Ubuntu 6.06 LTS: gzip 1.3.5-12ubuntu0.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Tavis Ormandy discovered that gzip did not sufficiently verify the validity of gzip or compress archives while unpacking. By tricking an user or automated system into unpacking a specially crafted compressed file, this could be exploited to execute arbitrary code with the user's privileges. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-9ubuntu3.5.diff.gz Size/MD5:61153 d63e10a794e5ea01f2accdbaf8bf3d80 http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-9ubuntu3.5.dsc Size/MD5: 570 24976fc238f8e6614cc28cd3d2a6ddca http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5.orig.tar.gz Size/MD5: 331550 3d6c191dfd2bf307014b421c12dc8469 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-9ubuntu3.5_amd64.deb Size/MD5:75848 209e5949f27077a5111a0e48e1814e28 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-9ubuntu3.5_i386.deb Size/MD5:70672 bb8ecf2656df00adb2f73d7c58bfae16 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-9ubuntu3.5_powerpc.deb Size/MD5:77502 866b75307a0c11bba729754014d37cf2 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-11ubuntu2.1.diff.gz Size/MD5:61684 90455942d0fc30de77d0a7e03db7901d http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-11ubuntu2.1.dsc Size/MD5: 572 e6b726ade7eef11b0ec01a78709718ec http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5.orig.tar.gz Size/MD5: 331550 3d6c191dfd2bf307014b421c12dc8469 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-11ubuntu2.1_amd64.deb Size/MD5:76842 5afca3802f6380462aa81df1b71e03e6 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-11ubuntu2.1_i386.deb Size/MD5:71672 f84d912eb056ba6301d7972a1da6fbf0 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-11ubuntu2.1_powerpc.deb Size/MD5:78620 83dbc2b0f7ea1be86bdfd384b0a1a42e sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-11ubuntu2.1_sparc.deb Size/MD5:75866 0390a63c0774ae2661fab737371044f8 Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.1.diff.gz Size/MD5:59646 2661380cbe7761cda97ca2282820a9be http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.1.dsc Size/MD5: 574 200363f2ab018cea40c61cf9c98c705c http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5.orig.tar.gz Size/MD5: 331550 3d6c191dfd2bf307014b421c12dc8469 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.1_amd64.deb Size/MD5:76470 5e9e2d325e742ce73c3c070e5d7856b3 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.1_i386.deb Size/MD5:71224 4c232bcc8218250455ec4d89eabaa7ea powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.1_powerpc.deb Size/MD5:78232 43b9c25f558df5037c5b798bd87a43ef sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/g/gzip/gzip_1.3.5-12ubuntu0.1_sparc.deb Size/MD5:74976 25095d566148ad95e3a7fd96c03f2122 signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
[Full-disclosure] [USN-348-1] GnuTLS vulnerability
=== Ubuntu Security Notice USN-348-1 September 18, 2006 gnutls11, gnutls12 vulnerability CVE-2006-4790 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libgnutls11 1.0.16-13ubuntu0.3 Ubuntu 5.10: libgnutls11 1.0.16-13.1ubuntu1.2 Ubuntu 6.06 LTS: libgnutls11 1.0.16-14ubuntu1.1 libgnutls12 1.2.9-2ubuntu1.1 After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: The GnuTLS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge signatures without the need of the secret key. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/gnutls11_1.0.16-13ubuntu0.3.diff.gz Size/MD5: 339767 c5bff2326fcb68ed0336e25449012068 http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/gnutls11_1.0.16-13ubuntu0.3.dsc Size/MD5: 830 c0793d93e9c5b93567099347fa446c72 http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/gnutls11_1.0.16.orig.tar.gz Size/MD5: 1504638 7b410fa3c563c7988e434a8c8671b3cd amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/gnutls-bin_1.0.16-13ubuntu0.3_amd64.deb Size/MD5: 217660 bba5c5e0d5f59354f6b3336367be937f http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/libgnutls11-dbg_1.0.16-13ubuntu0.3_amd64.deb Size/MD5: 575482 a62525c690862f1b4927cc7f55173d3b http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11-dev_1.0.16-13ubuntu0.3_amd64.deb Size/MD5: 392664 c78b8dbf6725d02e19da5707d3335124 http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11_1.0.16-13ubuntu0.3_amd64.deb Size/MD5: 327142 bb345c39bf9e7879432b566bf5e1a235 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/gnutls-bin_1.0.16-13ubuntu0.3_i386.deb Size/MD5: 203632 a467a4155ed992414884c86fc8120e5f http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/libgnutls11-dbg_1.0.16-13ubuntu0.3_i386.deb Size/MD5: 555946 1ffdced169899150a35b540c373b1a0c http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11-dev_1.0.16-13ubuntu0.3_i386.deb Size/MD5: 357486 1c936c849e2ec1b2f6432506a86a http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11_1.0.16-13ubuntu0.3_i386.deb Size/MD5: 293636 02023e0e58310001f3ed4d4b31dacb27 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/gnutls-bin_1.0.16-13ubuntu0.3_powerpc.deb Size/MD5: 218566 3dfdc586e1df5663ab8edbb3735ec48c http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/libgnutls11-dbg_1.0.16-13ubuntu0.3_powerpc.deb Size/MD5: 1416126 f51c3ede362394ec62ca07e345d2c4b7 http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11-dev_1.0.16-13ubuntu0.3_powerpc.deb Size/MD5: 389076 9904c61c7aae79e2d1700b33c92a371a http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11_1.0.16-13ubuntu0.3_powerpc.deb Size/MD5: 299668 fac8cd974bcca326209e4c78eff25eac Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/gnutls11_1.0.16-13.1ubuntu1.2.diff.gz Size/MD5: 340309 49a5050c08af0f81729b45f5f3c8d22d http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/gnutls11_1.0.16-13.1ubuntu1.2.dsc Size/MD5: 829 cbd5adc73119254f416328c52203502b http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/gnutls11_1.0.16.orig.tar.gz Size/MD5: 1504638 7b410fa3c563c7988e434a8c8671b3cd amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/gnutls-bin_1.0.16-13.1ubuntu1.2_amd64.deb Size/MD5: 217668 1ed174a692537d419a0cfe8d126aee7e http://security.ubuntu.com/ubuntu/pool/universe/g/gnutls11/libgnutls11-dbg_1.0.16-13.1ubuntu1.2_amd64.deb Size/MD5: 501184 076e79bc654983d5980bd5ad1556db6a http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11-dev_1.0.16-13.1ubuntu1.2_amd64.deb Size/MD5: 398968 d60fddde214fe3a9ba132f5aa31421f6 http://security.ubuntu.com/ubuntu/pool/main/g/gnutls11/libgnutls11_1.0.16-13.1ubuntu1.2_amd64.deb Size/MD5: 332338
[Full-disclosure] [USN-346-2] Fixed linux-restricted-modules-2.6.15 for previous Linux kernel update
=== Ubuntu Security Notice USN-346-2 September 14, 2006 linux-restricted-modules-2.6.15 regression fix === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: avm-fritz-firmware-2.6.15-26 2.6.15.11-4 avm-fritz-kernel-source 2.6.15.11-4 fglrx-control 2.6.15.11-4 fglrx-kernel-source 2.6.15.11-4 linux-restricted-modules-2.6.15-26-3862.6.15.11-4 linux-restricted-modules-2.6.15-26-6862.6.15.11-4 linux-restricted-modules-2.6.15-26-amd64-generic 2.6.15.11-4 linux-restricted-modules-2.6.15-26-amd64-k8 2.6.15.11-4 linux-restricted-modules-2.6.15-26-amd64-xeon 2.6.15.11-4 nic-restricted-firmware-2.6.15-26-386-di 2.6.15.11-4 nic-restricted-firmware-2.6.15-26-amd64-generic-di2.6.15.11-4 nic-restricted-modules-2.6.15-26-386-di 2.6.15.11-4 nic-restricted-modules-2.6.15-26-amd64-generic-di 2.6.15.11-4 nvidia-glx2.6.15.11-4 nvidia-glx-dev2.6.15.11-4 nvidia-glx-legacy 2.6.15.11-4 nvidia-glx-legacy-dev 2.6.15.11-4 nvidia-kernel-source 2.6.15.11-4 nvidia-legacy-kernel-source 2.6.15.11-4 xorg-driver-fglrx 2.6.15.11-4 xorg-driver-fglrx-dev 2.6.15.11-4 After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: USN-346-1 provided an updated Linux kernel to fix several security vulnerabilities. Unfortunately the update broke the binary 'nvidia' driver from linux-restricted-modules. This update corrects this problem. We apologize for the inconvenience. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11-4.diff.gz Size/MD5:87151 643e82286c057ba22dc6e206eb35bb29 http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11-4.dsc Size/MD5: 3185 994d3417c1d9ec7eab79ea993cb37304 http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11.orig.tar.gz Size/MD5: 97566445 8bb235f9119aed52797b057827756b8c Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-common_2.6.15.11-4_all.deb Size/MD5:17844 f05d3a7a38b1c45959d6d19972e9dd68 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-26_3.11+2.6.15.11-4_amd64.deb Size/MD5: 474964 3caecd039a65b40abbb7e0992dfacaef http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.11-4_amd64.deb Size/MD5: 2404974 cb8229fe0f818d8a595c29d5d1d365be http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.11-4_amd64.deb Size/MD5:76148 dbbac55447617a2c29a5456bfb3ac956 http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.11-4_amd64.deb Size/MD5: 510394 79c3e8fd94f52f8803bc40587f07e2ac http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-amd64-generic_2.6.15.11-4_amd64.deb Size/MD5: 6861180 6c3497ef198fe4f983a8fb7d644345eb http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-amd64-k8_2.6.15.11-4_amd64.deb Size/MD5: 6860656 014f045a30ed2ebffe4a95958bddf933 http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-amd64-xeon_2.6.15.11-4_amd64.deb Size/MD5: 6837510 a12bc36da1ba8df6f3b441c050c41f5c http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-26-amd64-generic-di_2.6.15.11-4_amd64.udeb Size/MD5: 799514 38bdf455f45161a6bc1bca5012f7b0d4
[Full-disclosure] [USN-345-1] mailman vulnerabilities
=== Ubuntu Security Notice USN-345-1 September 13, 2006 mailman vulnerabilities CVE-2006-2941, CVE-2006-3636 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: mailman 2.1.5-7ubuntu0.3 Ubuntu 5.10: mailman 2.1.5-8ubuntu2.3 Ubuntu 6.06 LTS: mailman 2.1.5-9ubuntu4.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Steve Alexander discovered that mailman did not properly handle attachments with special filenames. A remote user could exploit that to stop mail delivery until the server administrator manually cleaned these posts. (CVE-2006-2941) Various cross-site scripting vulnerabilities have been reported by Barry Warsaw. By using specially crafted email addresses, names, and similar arbitrary user-defined strings, a remote attacker could exploit this to run web script code in the list administrator's web browser. (CVE-2006-3636) URLs logged to the error log file are now checked for invalid characters. Before, specially crafted URLs could inject arbitrary messages into the log. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3.diff.gz Size/MD5: 122672 040be0e94a3463829deda6255b81914c http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3.dsc Size/MD5: 669 6533900d800881c5e5e97661592fe9b1 http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5.orig.tar.gz Size/MD5: 5745912 f5f56f04747cd4aff67427e7a45631af amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3_amd64.deb Size/MD5: 6610396 9e485ddc61fea15ffaacebeb176bc924 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3_i386.deb Size/MD5: 6610126 7a76e92c25d14c439141c243f807ac59 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3_powerpc.deb Size/MD5: 6617368 a0c258a612fc19b87f756dfd1b2f5604 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3.diff.gz Size/MD5: 124569 edd592fdc5d979588cfa307d80f389ee http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3.dsc Size/MD5: 626 52ca3b4a7132ed400701b33a9d1fa07c http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5.orig.tar.gz Size/MD5: 5745912 f5f56f04747cd4aff67427e7a45631af amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_amd64.deb Size/MD5: 6611062 4808daed20ff5871d0878041dc65c278 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_i386.deb Size/MD5: 6610402 bae1a8798cc5518e204ac418d4108330 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_powerpc.deb Size/MD5: 6617772 c397e9d02be876896f4c519da2965dce sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_sparc.deb Size/MD5: 6616692 9714c5ffcedced686d5d2224f373f63a Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1.diff.gz Size/MD5: 228878 efe29915311336eea806f75a489ae876 http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1.dsc Size/MD5: 628 61d4ee8cb059d6073c845c63ab9428a3 http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5.orig.tar.gz Size/MD5: 5745912 f5f56f04747cd4aff67427e7a45631af amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_amd64.deb Size/MD5: 6612630 20c59f9de0ad456f476d9222deaf232f i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_i386.deb Size/MD5: 6612422 b22f69ab0ad00a70cc4cf9526521ae02 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_powerpc.deb
[Full-disclosure] [USN-342-1] PHP vulnerabilities
=== Ubuntu Security Notice USN-342-1 September 07, 2006 php4, php5 vulnerabilities CVE-2006-4020, CVE-2006-4481, CVE-2006-4482, CVE-2006-4484 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libapache2-mod-php4 4:4.3.10-10ubuntu4.7 php4-cgi 4:4.3.10-10ubuntu4.7 php4-cli 4:4.3.10-10ubuntu4.7 Ubuntu 5.10: libapache2-mod-php5 5.0.5-2ubuntu1.4 php5-cgi 5.0.5-2ubuntu1.4 php5-cli 5.0.5-2ubuntu1.4 php5-curl5.0.5-2ubuntu1.4 Ubuntu 6.06 LTS: libapache2-mod-php5 5.1.2-1ubuntu3.2 php5-cgi 5.1.2-1ubuntu3.2 php5-cli 5.1.2-1ubuntu3.2 php5-curl5.1.2-1ubuntu3.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: The sscanf() function did not properly check array boundaries. In applications which use sscanf() with argument swapping, a remote attacker could potentially exploit this to crash the affected web application or even execute arbitrary code with the application's privileges. (CVE-2006-4020) The file_exists() and imap_reopen() functions did not perform proper open_basedir and safe_mode checks which could allow local scripts to bypass intended restrictions. (CVE-2006-4481) On 64 bit systems the str_repeat() and wordwrap() functions did not properly check buffer boundaries. Depending on the application, this could potentially be exploited to execute arbitrary code with the applications' privileges. This only affects the amd64 and sparc platforms. (CVE-2006-4482) A buffer overflow was discovered in the LWZReadByte_() function of the GIF image file parser. By tricking a PHP application into processing a specially crafted GIF image, a remote attacker could exploit this to execute arbitrary code with the application's privileges. (CVE-2006-4484) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.7.diff.gz Size/MD5: 284126 0abdbfaeed1f2c13a2b7d66318f8703e http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.7.dsc Size/MD5: 1469 d060d1a71470dc0d1f0f54fe7b9f836d http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10.orig.tar.gz Size/MD5: 4892209 73f5d1f42e34efa534a09c6091b5a21e Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.7_all.deb Size/MD5: 1124 c51c049492e127ade6ec92dec791 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.7_amd64.deb Size/MD5: 1657512 98172a9808c72714a7c8ad832fdc82b0 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.7_amd64.deb Size/MD5: 3275218 bb27229bdc5a1179a0c1ecc549e5b461 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.7_amd64.deb Size/MD5: 1647578 cb7a09583ae5c004b5ff7defe600adec http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.7_amd64.deb Size/MD5: 168454 a37eeae412e43bf6c9eda82ee20c70bb http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.7_amd64.deb Size/MD5: 348246 e7d0e27e3a31610a5c0bc1c9b3e2ca2e i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.7_i386.deb Size/MD5: 1592874 3bf1f15c699a11ab5279808aa524bc70 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.7_i386.deb Size/MD5: 3170090 7d826eb3a251de6595e0008e3d3bb55f http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.7_i386.deb Size/MD5: 1592906 2cf679da9f5c2835bda27c8729298f28 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.7_i386.deb Size/MD5: 168450 245550bad855327f4c004b2708a1568f http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.7_i386.deb Size/MD5: 348246 091cc5ce8e015e9346140bd4bbfca1ae powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.7_powerpc.deb Size/MD5: 1658826 f4827b80ee504110f0ec0865f9a985fc
[Full-disclosure] [USN-343-1] bind9 vulnerabilities
=== Ubuntu Security Notice USN-343-1 September 07, 2006 bind9 vulnerabilities CVE-2006-4095, CVE-2006-4096 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: bind91:9.2.4-1ubuntu1.1 Ubuntu 5.10: bind91:9.3.1-2ubuntu1.1 Ubuntu 6.06 LTS: bind91:9.3.2-2ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: bind did not sufficiently verify particular requests and responses from other name servers and users. By sending a specially crafted packet, a remote attacker could exploit this to crash the name server. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9_9.2.4-1ubuntu1.1.diff.gz Size/MD5:91339 974f57903aa0403bc7973699848820de http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9_9.2.4-1ubuntu1.1.dsc Size/MD5: 746 196a4a6177368697c5bae6cd688ec40a http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9_9.2.4.orig.tar.gz Size/MD5: 4564219 2ccbddbab59aedd6b8711b628b5472bd Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9-doc_9.2.4-1ubuntu1.1_all.deb Size/MD5: 157054 9de9c53dd907c72093eb3cac4cb58e57 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9-host_9.2.4-1ubuntu1.1_amd64.deb Size/MD5:96056 063da23c4db0704ea30230bc6acac904 http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9_9.2.4-1ubuntu1.1_amd64.deb Size/MD5: 288708 6de568eb1a0129b9ec03272f046daa79 http://security.ubuntu.com/ubuntu/pool/main/b/bind9/dnsutils_9.2.4-1ubuntu1.1_amd64.deb Size/MD5: 165266 fe32e19fb1131a10d0c76fa24a5d52a5 http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libbind-dev_9.2.4-1ubuntu1.1_amd64.deb Size/MD5: 1011062 01a15e46983f70d7a6c97feb0fcba428 http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libdns16_9.2.4-1ubuntu1.1_amd64.deb Size/MD5: 487588 297bdf5ac093517afc675ba96936543b http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libisc7_9.2.4-1ubuntu1.1_amd64.deb Size/MD5: 164744 b42d44fcf6a6ccc25be7dc46dd780598 http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libisccc0_9.2.4-1ubuntu1.1_amd64.deb Size/MD5:77878 3ecf75a5abf534c0030fd0df1dcbd43d http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libisccfg0_9.2.4-1ubuntu1.1_amd64.deb Size/MD5:93042 996063073313792e3f4fe3bcc457010a http://security.ubuntu.com/ubuntu/pool/main/b/bind9/liblwres1_9.2.4-1ubuntu1.1_amd64.deb Size/MD5:94182 309b54b2b1fa1090a590aeefa09da062 http://security.ubuntu.com/ubuntu/pool/universe/b/bind9/lwresd_9.2.4-1ubuntu1.1_amd64.deb Size/MD5: 189226 1d3523ecf7d91c2eebe9a79d0dd5fd66 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9-host_9.2.4-1ubuntu1.1_i386.deb Size/MD5:93288 4663e7341c739204ae08f9fef6429c4d http://security.ubuntu.com/ubuntu/pool/main/b/bind9/bind9_9.2.4-1ubuntu1.1_i386.deb Size/MD5: 272172 41032ad3488940d189b9de8411073431 http://security.ubuntu.com/ubuntu/pool/main/b/bind9/dnsutils_9.2.4-1ubuntu1.1_i386.deb Size/MD5: 156730 3c61b149b30b6d28d0e064523ba3e61b http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libbind-dev_9.2.4-1ubuntu1.1_i386.deb Size/MD5: 916978 409adc88bdad0659003dc8bba6d5e4fd http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libdns16_9.2.4-1ubuntu1.1_i386.deb Size/MD5: 439798 0e1b4183357f48d428f24ec20d66f23f http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libisc7_9.2.4-1ubuntu1.1_i386.deb Size/MD5: 149958 6080eeb1f250fa666070de7b401e9921 http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libisccc0_9.2.4-1ubuntu1.1_i386.deb Size/MD5:75924 09ebe034eb5164159666a1df11c6d28d http://security.ubuntu.com/ubuntu/pool/main/b/bind9/libisccfg0_9.2.4-1ubuntu1.1_i386.deb Size/MD5:88108 6230b87f8460a264a0e47828e1a0a2b2 http://security.ubuntu.com/ubuntu/pool/main/b/bind9/liblwres1_9.2.4-1ubuntu1.1_i386.deb Size/MD5:91150 ea258471da1cddba1bafb58a1002d800 http://security.ubuntu.com/ubuntu/pool/universe/b/bind9/lwresd_9.2.4-1ubuntu1.1_i386.deb Size/MD5: 179088 188ed5d72fc3bbbe8551a9a7448b4f98 powerpc architecture (Apple Macintosh G3/G4/G5)
[Full-disclosure] [USN-340-1] imagemagick vulnerabilities
=== Ubuntu Security Notice USN-340-1 September 06, 2006 imagemagick vulnerabilities CVE-2006-3743, CVE-2006-3744 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libmagick6 6:6.0.6.2-2.1ubuntu1.4 Ubuntu 5.10: libmagick6 6:6.2.3.4-1ubuntu1.3 Ubuntu 6.06 LTS: libmagick9 6:6.2.4.5-0.6ubuntu0.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Tavis Ormandy discovered several buffer overflows in imagemagick's Sun Raster and XCF (Gimp) image decoders. By tricking a user or automated system into processing a specially crafted image, this could be exploited to execute arbitrary code with the users' privileges. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.4.diff.gz Size/MD5: 143874 bd710b48cad9d3d0266fa4dcd5523a48 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.4.dsc Size/MD5: 899 e531cba19eb8e41c60e101cc6e79a486 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2.orig.tar.gz Size/MD5: 6824001 477a361ba0154cc2423726fab4a3f57c amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.4_amd64.deb Size/MD5: 1466542 7f9e75099eed68669d5784876ae6066b http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.4_amd64.deb Size/MD5: 229066 0db412e0a3bcf57d371eabbe1913fd24 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.4_amd64.deb Size/MD5: 163878 3134724644ad57be626b8ff613a4c835 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.4_amd64.deb Size/MD5: 1551292 62abe53d84248daa41b5c851a3497c7a http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.4_amd64.deb Size/MD5: 1195038 201931b29c9950dd1027bfe217be6462 http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.4_amd64.deb Size/MD5: 232130 b854f8b1de8e335d3e4e4d16ddce8cf8 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.4_i386.deb Size/MD5: 1465282 3c6d5443fe05ec3975766b03b3c763ef http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.4_i386.deb Size/MD5: 209096 eb535269e229ebfbd222bb956bdb7e6a http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.4_i386.deb Size/MD5: 164478 8dee42e92a08db66e02d7c6907fed68b http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.4_i386.deb Size/MD5: 1453974 fc61c840f10cebd266617dd8350d06a1 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.4_i386.deb Size/MD5: 1140640 e09d81a8c7816587cc3499043f4443cc http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.4_i386.deb Size/MD5: 232508 f1ab150d2419681e6766748ca7cdabeb powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.4_powerpc.deb Size/MD5: 1471972 ba92c6f99f9dbad7941cfe7904fc4c9d http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.4_powerpc.deb Size/MD5: 228064 8264660aa7e900a5b229211d2ab6fe95 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.4_powerpc.deb Size/MD5: 157060 4c490ebe8e9ea43b64c60fa4925b69c9 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.4_powerpc.deb Size/MD5: 1686208 3d22a7499735de8d09c52bdea473cfab http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.4_powerpc.deb Size/MD5: 1169978 9d3f855e0683a6e7769cdd532f8f3975 http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.4_powerpc.deb Size/MD5: 270880 5b8ea03a3203cb9d76cfe2b423e47464 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.3.diff.gz Size/MD5: 143292
[Full-disclosure] [USN-338-1] MySQL vulnerabilities
=== Ubuntu Security Notice USN-338-1 September 05, 2006 mysql-dfsg-5.0 vulnerabilities CVE-2006-4031, CVE-2006-4227 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: mysql-server-5.0 5.0.22-0ubuntu6.06.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Dmitri Lenev discovered that arguments of setuid SQL functions were evaluated in the security context of the functions' definer instead of its caller. An authenticated user with the privilege to call such a function could exploit this to execute arbitrary statements with the privileges of the definer of that function. (CVE-2006-4227) Peter Gulutzan reported a potentially confusing situation of the MERGE table engine. If an user creates a merge table, and the administrator later revokes privileges on the original table only (without changing the privileges on the merge table), that user still has access to the data by using the merge table. This is intended behaviour, but might be undesirable in some installations; this update introduces a new server option --skip-merge which disables the MERGE engine completely. (CVE-2006-4031) Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.2.diff.gz Size/MD5: 125369 93d8d0c3ad971109645ed33738dc4b17 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.2.dsc Size/MD5: 1106 541b253aea07ad5282f2684aba12eb69 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22.orig.tar.gz Size/MD5: 18446645 2b8f36364373461190126817ec872031 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.2_all.deb Size/MD5:36894 08567e0fbadc46d35ebfa27a31d5b994 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.2_all.deb Size/MD5:39392 2e1b0e1151521015f20a75389ca7dba0 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.2_all.deb Size/MD5:36902 ba9d9e6d9645f36f5ee61cd9208b3de0 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.2_amd64.deb Size/MD5: 6725782 c8551554b1374b163b8122d7e08a090a http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.2_amd64.deb Size/MD5: 1421776 343e99f256f53c37a9f6f9240a163594 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.2_amd64.deb Size/MD5: 6895702 757174f4891714e402bc31287c14b1cd http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.2_amd64.deb Size/MD5: 22491142 31641f7b65ecefcb92df5f8ad0f81e12 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.2_i386.deb Size/MD5: 6139348 adf444d4082a3a1526ae3fe78a8796a4 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.2_i386.deb Size/MD5: 1382302 31fae9b4b01ef036b1bdf12c71aceda3 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.2_i386.deb Size/MD5: 6277978 c4656f594891017951e79f6456802a69 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.2_i386.deb Size/MD5: 21347894 674e8c24a30c33fa5ec27b1633833995 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.2_powerpc.deb Size/MD5: 6883060 795ed1bf828a08d737ab7603021a5eeb http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.2_powerpc.deb Size/MD5: 1462086 72f42656fb322182ed0334a5b1b83a86 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.2_powerpc.deb Size/MD5: 6939654 a85d437e56dc649083a3f222cd8d7c1b http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.2_powerpc.deb Size/MD5: 22704258 c5fd77b7e16d6f32b7f4cc94a93a7d75 sparc architecture (Sun SPARC/UltraSPARC)
[Full-disclosure] [USN-339-1] OpenSSL vulnerability
=== Ubuntu Security Notice USN-339-1 September 05, 2006 openssl vulnerability CVE-2006-4339 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libssl0.9.7 0.9.7e-3ubuntu0.3 Ubuntu 5.10: libssl0.9.7 0.9.7g-1ubuntu1.2 Ubuntu 6.06 LTS: libssl0.9.8 0.9.8a-7ubuntu0.1 After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: Philip Mackenzie, Marius Schilder, Jason Waddle and Ben Laurie of Google Security discovered that the OpenSSL library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge signatures without the need of the secret key. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.3.diff.gz Size/MD5:29738 8ff4b43003645c9cc0340b7aeaa0e943 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.3.dsc Size/MD5: 645 f1d90d6945db3f52eb9e523cd2257cb3 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e.orig.tar.gz Size/MD5: 3043231 a8777164bca38d84e5eb2b1535223474 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.3_amd64.udeb Size/MD5: 495170 6ecb42d8f16500657a823c246d90f721 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.3_amd64.deb Size/MD5: 2693394 8554202ca8540221956438754ce83daa http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.3_amd64.deb Size/MD5: 769732 1924597de3a34f244d50812ce47e839f http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.3_amd64.deb Size/MD5: 903646 0da1a7985ac40c27bffd43effcdeb306 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.3_i386.udeb Size/MD5: 433284 3701e85ed202bc56684583e5cdcee090 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.3_i386.deb Size/MD5: 2492646 bbb95c47fede95c469d7fdef9faeedcf http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.3_i386.deb Size/MD5: 2241170 8f890db2ab8675adccb3e5f9e9129c97 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.3_i386.deb Size/MD5: 901102 f43171afd1211d5026a0241abbce7710 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.3_powerpc.udeb Size/MD5: 499392 6c4844845826d244a5062664d725d7f4 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.3_powerpc.deb Size/MD5: 2774414 f275ee27e93d2ddbdf7af62837512b4a http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.3_powerpc.deb Size/MD5: 779388 29c64dab8447a8a79c2b82e6aad0c900 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.3_powerpc.deb Size/MD5: 908166 34dc1579ba2d5543f841ca917c1f7f35 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.2.diff.gz Size/MD5:30435 9ad78dd2d10b6a32b2efa84aeedc1b28 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.2.dsc Size/MD5: 657 1d871efaeb3b5bafccb17ec8787ae57c http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g.orig.tar.gz Size/MD5: 3132217 991615f73338a571b6a1be7d74906934 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7g-1ubuntu1.2_amd64.udeb Size/MD5: 498836 bd128f07f8f4ff96c7a4ec0cd01a5a24 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7g-1ubuntu1.2_amd64.deb Size/MD5: 2699482 cdefd160fc10ae893743cff5bf872463 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7g-1ubuntu1.2_amd64.deb Size/MD5: 773202 41180b2c148cbee6a514ca07d9d8038c http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7g-1ubuntu1.2_amd64.deb Size/MD5: 913254 4d7d2b9debbe46c070628174e4359281 i386 architecture (x86 compatible Intel/AMD)
[Full-disclosure] [USN-337-1] imagemagick vulnerability
=== Ubuntu Security Notice USN-337-1August 16, 2006 imagemagick vulnerability CVE-2006-4144 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libmagick6 6:6.0.6.2-2.1ubuntu1.3 Ubuntu 5.10: libmagick6 6:6.2.3.4-1ubuntu1.2 Ubuntu 6.06 LTS: libmagick9 6:6.2.4.5-0.6ubuntu0.1 After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: Damian Put discovered a buffer overflow in imagemagick's SGI file format decoder. By tricking an user or automated system into processing a specially crafted SGI image, this could be exploited to execute arbitrary code with the user's privileges. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.3.diff.gz Size/MD5: 142677 fd571adfe56408f991b2c816017cf99a http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.3.dsc Size/MD5: 899 03499d79b2598188aeed4d675a781621 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2.orig.tar.gz Size/MD5: 6824001 477a361ba0154cc2423726fab4a3f57c amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.3_amd64.deb Size/MD5: 1466446 951c781851cb2023629084c320f27f31 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.3_amd64.deb Size/MD5: 228950 2ae0b0323dd8d49423ccc99d5293509f http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.3_amd64.deb Size/MD5: 163766 32b42d2a5886308665b81757e7cc9fea http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.3_amd64.deb Size/MD5: 1550996 b8c5784d2a408c51976a51efb64b91cb http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.3_amd64.deb Size/MD5: 1195008 3a44a8aa41e632c0165bb92417ec8e8e http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.3_amd64.deb Size/MD5: 231998 fb35a4c87a61fd940bad44e1ac252bc6 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.3_i386.deb Size/MD5: 1465132 ac647b62c6e5f9e34771c53ea4f95b3a http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.3_i386.deb Size/MD5: 209004 090e70f26210c13b757f22e92b4a7715 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.3_i386.deb Size/MD5: 16 028ef96e5345d9ff5076ffdca282f7cf http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.3_i386.deb Size/MD5: 1453742 f22685b0fa9c4a95c75c18e86da2f6f7 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.3_i386.deb Size/MD5: 1140388 23dee77028dcadda74f88e593f74667f http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.3_i386.deb Size/MD5: 232380 2069490a09127e7716e07db3388fcd5e powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.3_powerpc.deb Size/MD5: 1471902 e0e5b999a4855b1e68025ea1ae0ed6bd http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.3_powerpc.deb Size/MD5: 227950 c9b575d8457e3959ddba0dd10702c6c4 http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.3_powerpc.deb Size/MD5: 156916 de040332421f78eb8b9ce9990d9bef6e http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.3_powerpc.deb Size/MD5: 1685878 d5aebf65a7ae1e6281ccad831c0a7e4c http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.3_powerpc.deb Size/MD5: 1169788 b5defbd03f07d943029244120ae3c2d0 http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.3_powerpc.deb Size/MD5: 270738 60bc3332ec1b6c371e0fa38798968776 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.2.diff.gz Size/MD5: 142085
[Full-disclosure] [USN-334-1] krb5 vulnerabilities
=== Ubuntu Security Notice USN-334-1August 16, 2006 krb5 vulnerabilities CVE-2006-3083, CVE-2006-3084 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: krb5-clients 1.3.6-1ubuntu0.2 krb5-ftpd1.3.6-1ubuntu0.2 krb5-rsh-server 1.3.6-1ubuntu0.2 krb5-user1.3.6-1ubuntu0.2 Ubuntu 5.10: krb5-clients 1.3.6-4ubuntu0.1 krb5-ftpd1.3.6-4ubuntu0.1 krb5-rsh-server 1.3.6-4ubuntu0.1 krb5-user1.3.6-4ubuntu0.1 Ubuntu 6.06 LTS: krb5-clients 1.4.3-5ubuntu0.1 krb5-ftpd1.4.3-5ubuntu0.1 krb5-rsh-server 1.4.3-5ubuntu0.1 krb5-user1.4.3-5ubuntu0.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Michael Calmer and Marcus Meissner discovered that several krb5 tools did not check the return values from setuid() system calls. On systems that have configured user process limits, it may be possible for an attacker to cause setuid() to fail via resource starvation. In that situation, the tools will not reduce their privilege levels, and will continue operation as the root user. By default, Ubuntu does not ship with user process limits. Please note that these packages are not officially supported by Ubuntu (they are in the 'universe' component of the archive). Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.3.6-1ubuntu0.2.diff.gz Size/MD5: 664713 e5a4861877e15cb91f6dbf5935158137 http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.3.6-1ubuntu0.2.dsc Size/MD5: 788 edf046e890d05828180fceec79299544 http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.3.6.orig.tar.gz Size/MD5: 6526510 7974d0fc413802712998d5fc5eec2919 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5-doc_1.3.6-1ubuntu0.2_all.deb Size/MD5: 718394 62fe4ea415da1b040b8d2e82ebfca461 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.3.6-1ubuntu0.2_amd64.deb Size/MD5: 104526 f265e825f470f7d125e64ca67ab1baa4 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.3.6-1ubuntu0.2_amd64.deb Size/MD5: 216450 180d0ee16f7d82fb08cc33c9f57fae83 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.3.6-1ubuntu0.2_amd64.deb Size/MD5:56510 3b99157b1abf76ca65589b57367a9746 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.3.6-1ubuntu0.2_amd64.deb Size/MD5: 124206 51bb620898c55c8d4968baf7c915cf82 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.3.6-1ubuntu0.2_amd64.deb Size/MD5:82270 7354364f56ef0c9e3e2852f53aa77827 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.3.6-1ubuntu0.2_amd64.deb Size/MD5:63018 b4399bc4b714ced3315096b816243034 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.3.6-1ubuntu0.2_amd64.deb Size/MD5: 137248 37f64a3430eb404463252f5ddf310b9b http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.3.6-1ubuntu0.2_amd64.deb Size/MD5: 177112 a171ce80ad5fe539651ca1d44fcba049 http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.3.6-1ubuntu0.2_amd64.deb Size/MD5: 652010 095eb7be05716c7817a7062b010944d9 http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.3.6-1ubuntu0.2_amd64.deb Size/MD5: 368902 d25bcf5493f713f6c04f216b5d536633 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.3.6-1ubuntu0.2_i386.deb Size/MD5:92760 46dcc0c71e393f712accb32502f5fb27 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.3.6-1ubuntu0.2_i386.deb Size/MD5: 186370 f76907f8e22ea810797121db36ae5a98 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.3.6-1ubuntu0.2_i386.deb Size/MD5:51138 b0cb6e0d875dd5cbd4501f064ab6c996 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.3.6-1ubuntu0.2_i386.deb Size/MD5: 113422 7c5b2c8965b3a70256652f2a8e7b5de7
[Full-disclosure] [USN-335-1] heartbeat vulnerability
=== Ubuntu Security Notice USN-335-1August 16, 2006 heartbeat vulnerability CVE-2006-3121 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: heartbeat1.2.3-3ubuntu1.3 Ubuntu 5.10: heartbeat1.2.3-12ubuntu0.2 Ubuntu 6.06 LTS: heartbeat1.2.4-2ubuntu0.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Yan Rong Ge discovered that heartbeat did not sufficiently verify some packet input data, which could lead to an out-of-boundary memory access. A remote attacker could exploit this to crash the daemon (Denial of Service). Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.3.diff.gz Size/MD5: 246413 a32a59d76e061bd6bac2e5f6b52d429a http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.3.dsc Size/MD5: 847 75287cf172b2324fcb6146fb4f01872b http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3.orig.tar.gz Size/MD5: 1772513 9fd126e5dff51cc8c1eee223c252a4af Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/h/heartbeat/ldirectord_1.2.3-3ubuntu1.3_all.deb Size/MD5:44762 29cd137965c61243a58e48119fbc03b8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat-dev_1.2.3-3ubuntu1.3_amd64.deb Size/MD5: 125542 46aefd45f2ae5d7090083a1e6b3abc95 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.3_amd64.deb Size/MD5: 533186 8517f467bb79624846faf6e6aef90d37 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils-dev_1.2.3-3ubuntu1.3_amd64.deb Size/MD5:61188 55d3822a066db6ca026e73cc93757e2e http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils0_1.2.3-3ubuntu1.3_amd64.deb Size/MD5:51876 fb2c92a4afb0b98b825cc4090dce68ca http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith-dev_1.2.3-3ubuntu1.3_amd64.deb Size/MD5:29392 cf935431db7ad29b89510c15fcea7b85 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith0_1.2.3-3ubuntu1.3_amd64.deb Size/MD5:79636 6a8b6cd4849cef83a6da185271a11f40 http://security.ubuntu.com/ubuntu/pool/universe/h/heartbeat/stonith_1.2.3-3ubuntu1.3_amd64.deb Size/MD5:30374 abb1702cd5fc077f35db186e688afbce i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat-dev_1.2.3-3ubuntu1.3_i386.deb Size/MD5: 114930 01d5cf77762f6acdfbbecb07e37684a3 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.3_i386.deb Size/MD5: 489742 9043ef6e64721b9594e869d725c674e2 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils-dev_1.2.3-3ubuntu1.3_i386.deb Size/MD5:57322 cdd78ca9617f4eeb24777b58eb67a202 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils0_1.2.3-3ubuntu1.3_i386.deb Size/MD5:46834 8219c2942dd086c943c40faf9bfb389f http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith-dev_1.2.3-3ubuntu1.3_i386.deb Size/MD5:28940 a3814e2973e4609d64fe70e4a7f861eb http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith0_1.2.3-3ubuntu1.3_i386.deb Size/MD5:69350 db94b20cefcaebffab4eea67565b9649 http://security.ubuntu.com/ubuntu/pool/universe/h/heartbeat/stonith_1.2.3-3ubuntu1.3_i386.deb Size/MD5:29776 ccbcc61c7f92df0d171e065ff4204f73 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat-dev_1.2.3-3ubuntu1.3_powerpc.deb Size/MD5: 127004 b424f598b097fb156b536320ce170079 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.3_powerpc.deb Size/MD5: 557220 fc50aba3f599c50adbf0358a2b78c5f2 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils-dev_1.2.3-3ubuntu1.3_powerpc.deb Size/MD5:61250 05d241db1f4e3c99509d429d761a418a http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils0_1.2.3-3ubuntu1.3_powerpc.deb Size/MD5:52888 44bedf0db1b7eaec32e7c4c040a80fc8 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith-dev_1.2.3-3ubuntu1.3_powerpc.deb Size/MD5:29522 e89eb0728dc6b46cef2a4421872c20c9
[Full-disclosure] [USN-333-1] libwmf vulnerability
=== Ubuntu Security Notice USN-333-1August 09, 2006 libwmf vulnerability CVE-2006-3376 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libwmf0.2-7 0.2.8-1.1ubuntu0.1 Ubuntu 5.10: libwmf0.2-7 0.2.8.3-2ubuntu0.1 Ubuntu 6.06 LTS: libwmf0.2-7 0.2.8.3-3.1ubuntu0.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: An integer overflow was found in the handling of the MaxRecordSize field in the WMF header parser. By tricking a user into opening a specially crafted WMF image file with an application that uses this library, an attacker could exploit this to execute arbitrary code with the user's privileges. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf_0.2.8-1.1ubuntu0.1.diff.gz Size/MD5: 5304 e7805fbd610d936cfd64a4ad5529d604 http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf_0.2.8-1.1ubuntu0.1.dsc Size/MD5: 699 b38be3ecef264877a0a8aa57a3ef369f http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf_0.2.8.orig.tar.gz Size/MD5: 1620489 269fb225cd44f40cc877fb6c63706112 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-doc_0.2.8-1.1ubuntu0.1_all.deb Size/MD5: 271748 8ab9644a6b59216b32c4669b8fd1d08d amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/libw/libwmf/libwmf-bin_0.2.8-1.1ubuntu0.1_amd64.deb Size/MD5:20734 0423e72e4668c7c706e31591e751db7d http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-dev_0.2.8-1.1ubuntu0.1_amd64.deb Size/MD5: 204060 acfd872c6e935d9df25e055ceb4b1cf3 http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf0.2-7_0.2.8-1.1ubuntu0.1_amd64.deb Size/MD5: 174006 85eab7d6300451d9cb0a05f3b0b0955f i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/libw/libwmf/libwmf-bin_0.2.8-1.1ubuntu0.1_i386.deb Size/MD5:18732 ff99549d18b4f31a21522e042d87bba6 http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-dev_0.2.8-1.1ubuntu0.1_i386.deb Size/MD5: 19 0c037a6a429249d2e95f92152cce6233 http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf0.2-7_0.2.8-1.1ubuntu0.1_i386.deb Size/MD5: 164928 e8aa9895eedcf46955a21a5b7114895c powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/universe/libw/libwmf/libwmf-bin_0.2.8-1.1ubuntu0.1_powerpc.deb Size/MD5:25900 4018e7b12756dd292734e06641d9c215 http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-dev_0.2.8-1.1ubuntu0.1_powerpc.deb Size/MD5: 208320 8445f174ede961f90c0634e786d3d549 http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf0.2-7_0.2.8-1.1ubuntu0.1_powerpc.deb Size/MD5: 178750 b0db830818c196f815c0d26f161a7141 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf_0.2.8.3-2ubuntu0.1.diff.gz Size/MD5: 7142 f60eca63b5d87fdfb5fd70a20a799122 http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf_0.2.8.3-2ubuntu0.1.dsc Size/MD5: 788 4fab72640e6cbc31616d80e9ff1efb5d http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf_0.2.8.3.orig.tar.gz Size/MD5: 1737021 c7246bb724664189ade7895547387e6a Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-doc_0.2.8.3-2ubuntu0.1_all.deb Size/MD5: 271728 f1022f283d9cdd656521f8bd1f001337 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/libw/libwmf/libwmf-bin_0.2.8.3-2ubuntu0.1_amd64.deb Size/MD5:15452 6aacb2892e64bc40eaa73cce7bf6106a http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-dev_0.2.8.3-2ubuntu0.1_amd64.deb Size/MD5: 197976 d3006052733be31d47830d2f31d3cea8 http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2ubuntu0.1_amd64.deb Size/MD5: 174604 e96c6f24abd2c42103118329ac843dd2 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/libw/libwmf/libwmf-bin_0.2.8.3-2ubuntu0.1_i386.deb Size/MD5:13944 7a000303b7b8b9848dc84c448832462b http://security.ubuntu.com/ubuntu/pool/main/libw/libwmf/libwmf-dev_0.2.8.3-2ubuntu0.1_i386.deb Size/MD5:
[Full-disclosure] [USN-331-1] Linux kernel vulnerabilities
=== Ubuntu Security Notice USN-331-1August 03, 2006 linux-source-2.6.15 vulnerabilities CVE-2006-2934, CVE-2006-2935, CVE-2006-2936 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: linux-image-2.6.15-26-3862.6.15-26.46 linux-image-2.6.15-26-6862.6.15-26.46 linux-image-2.6.15-26-amd64-generic 2.6.15-26.46 linux-image-2.6.15-26-amd64-k8 2.6.15-26.46 linux-image-2.6.15-26-amd64-server 2.6.15-26.46 linux-image-2.6.15-26-amd64-xeon 2.6.15-26.46 linux-image-2.6.15-26-hppa32 2.6.15-26.46 linux-image-2.6.15-26-hppa32-smp 2.6.15-26.46 linux-image-2.6.15-26-hppa64 2.6.15-26.46 linux-image-2.6.15-26-hppa64-smp 2.6.15-26.46 linux-image-2.6.15-26-itanium2.6.15-26.46 linux-image-2.6.15-26-itanium-smp2.6.15-26.46 linux-image-2.6.15-26-k7 2.6.15-26.46 linux-image-2.6.15-26-mckinley 2.6.15-26.46 linux-image-2.6.15-26-mckinley-smp 2.6.15-26.46 linux-image-2.6.15-26-powerpc2.6.15-26.46 linux-image-2.6.15-26-powerpc-smp2.6.15-26.46 linux-image-2.6.15-26-powerpc64-smp 2.6.15-26.46 linux-image-2.6.15-26-server 2.6.15-26.46 linux-image-2.6.15-26-server-bigiron 2.6.15-26.46 linux-image-2.6.15-26-sparc642.6.15-26.46 linux-image-2.6.15-26-sparc64-smp2.6.15-26.46 After a standard system upgrade you need to reboot your computer to effect the necessary changes. Please note that Ubuntu 5.04 and 5.10 are also affected by these flaws. An update is in preparation and will be released shortly. Details follow: A Denial of service vulnerability was reported in iptables' SCTP conntrack module. On computers which use this iptables module, a remote attacker could expoit this to trigger a kernel crash. (CVE-2006-2934) A buffer overflow has been discovered in the dvd_read_bca() function. By inserting a specially crafted DVD, USB stick, or similar automatically mounted removable device, a local user could crash the machine or potentially even execute arbitrary code with full root privileges. (CVE-2006-2935) The ftdi_sio driver for serial USB ports did not limit the amount of pending data to be written. A local user could exploit this to drain all available kernel memory and thus render the system unusable. (CVE-2006-2936) Additionally, this update fixes a range of bugs. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.46.diff.gz Size/MD5: 2176265 7e58cd466b0806ef230dd7db1bb11410 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.46.dsc Size/MD5: 2379 d24f2db881c6169c9a1b8500ff413e5e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-26.46_all.deb Size/MD5: 5159244 4bf4e66f6217bfe273208d9d2b12d2b4 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-26.46_all.deb Size/MD5:88218 f9e5a58e908d0e64248e8a93df25cdda http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.46_all.deb Size/MD5: 44519570 d74769581d9cbcaf46cec3982078cc20 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb Size/MD5:22354 b46dd65aaa4f67a7b0c09c97ee669a88 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb Size/MD5:44766 b7d6d5a3ea9591159a386d50467a3209 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb Size/MD5: 2312 157bdcb2afb69c6ab737c911285634c8 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb Size/MD5:36194 7a7ee0ba8f86095feb78a043eea3fc03 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb Size/MD5: 102030 8e0629b9b7a003f6f6e5bfdf30a8684d
[Full-disclosure] [USN-332-1] gnupg vulnerability
=== Ubuntu Security Notice USN-332-1August 03, 2006 gnupg vulnerability CVE-2006-3746 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: gnupg1.2.5-3ubuntu5.5 Ubuntu 5.10: gnupg1.4.1-1ubuntu1.4 Ubuntu 6.06 LTS: gnupg1.4.2.2-1ubuntu2.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Evgeny Legerov discovered that gnupg did not sufficiently check the validity of the comment and a control field. Specially crafted GPG data could cause a buffer overflow. This could be exploited to execute arbitrary code with the user's privileges if an attacker can trick an user into processing a malicious encrypted/signed document with gnupg. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.5.diff.gz Size/MD5:67172 29ae368ce975c0ba45f5f8faab3544eb http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.5.dsc Size/MD5: 654 b77427b0e347fd51822fbded59629c39 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5.orig.tar.gz Size/MD5: 3645308 9109ff94f7a502acd915a6e61d28d98a amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.5_amd64.deb Size/MD5: 806304 ed9984ee4c43817ad4bfaac0318dacd2 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.2.5-3ubuntu5.5_amd64.udeb Size/MD5: 146492 1761ff0057e8c5fc1290bb6fea061fff i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.5_i386.deb Size/MD5: 750870 327780d0bc5b4492cfb2d91d81ce1e4d http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.2.5-3ubuntu5.5_i386.udeb Size/MD5: 121414 755b78879ae2ff649831bc4258ec9cd0 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.5_powerpc.deb Size/MD5: 806802 659c72a26c312d0a21dfca0ef8168dc1 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.2.5-3ubuntu5.5_powerpc.udeb Size/MD5: 135552 738c35bc6fce9b6c23a85bcd8e805d31 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.4.diff.gz Size/MD5:21517 ce1cea807240a851dc29c0ad1c8e3824 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.4.dsc Size/MD5: 684 75bea35501b917876414e63811e4724f http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1.orig.tar.gz Size/MD5: 4059170 1cc77c6943baaa711222e954bbd785e5 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.4_amd64.deb Size/MD5: 1136488 845e1771e0f8437a7d77b8ffcdc13b5a http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.4_amd64.udeb Size/MD5: 152266 3a4de994f65e12058b69eeb3940d8c9f i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.4_i386.deb Size/MD5: 1044632 f8da3941df01cced12e35fb0c4bf3e53 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.4_i386.udeb Size/MD5: 130694 3af2232b978645923226a0cb6714475d powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.4_powerpc.deb Size/MD5: 1119760 3a01f0ee2ba319d6d884b84f82b25f2d http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.4_powerpc.udeb Size/MD5: 140248 a61c84caeecffb3b3c3207b28a84e8ab sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.4_sparc.deb Size/MD5: 1064344 258595b36dd297f5100cc82f59717e54 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.4_sparc.udeb Size/MD5: 139584 58cc4a91254ea52878b4df2873ad22c2 Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.2.diff.gz Size/MD5:20451 b0c637087a904197f957c32b6364417d http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.2.dsc Size/MD5: 692 84098e8a7001961c8141eb8ea4f3dcde
[Full-disclosure] [USN-330-1] tiff vulnerabilities
=== Ubuntu Security Notice USN-330-1August 02, 2006 tiff vulnerabilities CVE-2006-3459, CVE-2006-3460, CVE-2006-3461, CVE-2006-3462, CVE-2006-3463, CVE-2006-3464, CVE-2006-3465 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libtiff4 3.6.1-5ubuntu0.6 Ubuntu 5.10: libtiff4 3.7.3-1ubuntu1.5 Ubuntu 6.06 LTS: libtiff4 3.7.4-1ubuntu3.2 After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: Tavis Ormandy discovered that the TIFF library did not sufficiently check handled images for validity. By tricking an user or an automated system into processing a specially crafted TIFF image, an attacker could exploit these weaknesses to execute arbitrary code with the target application's privileges. This library is used in many client and server applications, thus you should reboot your computer after the upgrade to ensure that all running programs use the new version of the library. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1-5ubuntu0.6.diff.gz Size/MD5:30691 49722c5266cd7abd26af4e2930806b9c http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1-5ubuntu0.6.dsc Size/MD5: 681 7ad4b09fd3ae17ac3469befee5a0bdbe http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1.orig.tar.gz Size/MD5: 848760 bd252167a20ac7910ab3bd2b3ee9e955 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.6_amd64.deb Size/MD5: 172866 61bd186e530802e933781ec95ecc75a9 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.6_amd64.deb Size/MD5: 459690 585475d89d429435077cf76a1ea26137 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.6_amd64.deb Size/MD5: 113776 4780d38316de3537a1b55ba45f2fe735 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.6_i386.deb Size/MD5: 155968 389e7151c6cea9cee5c4a5f95a13b77d http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.6_i386.deb Size/MD5: 441462 cb6274340b13def24594a42a90b68251 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.6_i386.deb Size/MD5: 104694 16b136cb563918fd5cbea35772af378a powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.6_powerpc.deb Size/MD5: 188188 6749e48524a1dae0a6ff5d7e3a2de413 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.6_powerpc.deb Size/MD5: 464676 6074afb200b1b839eb612e195a9cdfa7 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.6_powerpc.deb Size/MD5: 115188 956c9014eb02b96505808da786ad5a76 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3-1ubuntu1.5.diff.gz Size/MD5:17432 462f974440018758467c211ae4287a38 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3-1ubuntu1.5.dsc Size/MD5: 756 588e4e00764c879078155ea33e75ff09 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3.orig.tar.gz Size/MD5: 1268182 48fbef3d76a6253699f28f49c8f25a8b amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.3-1ubuntu1.5_amd64.deb Size/MD5:48612 4963d3463e3dc627d7587bddaa49141c http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.3-1ubuntu1.5_amd64.deb Size/MD5: 220048 34fbca2f7003642e99a2441ef83aabf7 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.3-1ubuntu1.5_amd64.deb Size/MD5: 282498 2b30fa42f5e443215af23faead443c9f http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.3-1ubuntu1.5_amd64.deb Size/MD5: 472892 1b3f3aa4f34d2afc75ecece36ff5af09 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.3-1ubuntu1.5_amd64.deb Size/MD5:43448 e60c1e20c08710c65445587d7735a231 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.3-1ubuntu1.5_i386.deb Size/MD5:48018 96eaa5eb44709bedeb613b9f1a22931a
[Full-disclosure] [USN-327-2] firefox regression
=== Ubuntu Security Notice USN-327-2August 01, 2006 firefox regression https://bugzilla.mozilla.org/show_bug.cgi?id=346167 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: firefox 1.5.dfsg+1.5.0.5-0ubuntu6.06.1 After a standard system upgrade you need to restart Firefox to effect the necessary changes. Details follow: USN-327-1 fixed several vulnerabilities in Firefox. Unfortunately the new version introduced a regression in the handling of streamed media. Embedded media which were linked with a scheme other than http:// did not work any more. This update fixes this regression. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.1.diff.gz Size/MD5: 175666 687919fcd46adfbb0d7178b5475305c1 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.1.dsc Size/MD5: 1113 e442234ffa0a54f87807c1288e47fa5d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5.orig.tar.gz Size/MD5: 44067762 749933c002e158576ec15782fc451e43 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_all.deb Size/MD5:49298 f514abb6f942165f1fc3d5374bbae15a http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_all.deb Size/MD5:50184 a7b0bf4028ede77740dc0662a827dcf0 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb Size/MD5: 47269380 3ad3fdf041a077e1fd691138bb9bfeb6 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb Size/MD5: 2796780 4d08389abd46a4cfb1ea417a8ad5fa3b http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb Size/MD5: 216230 e1d98cf540498d5fc02661a5486db16d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb Size/MD5:82448 5a283f508971dc233a454789387b4132 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb Size/MD5: 9400588 cf74b732b4ba49854c319c00d3d82a4b http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb Size/MD5: 218920 9c0d2ee7cf67eeb17e850fd730f3b8fb http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb Size/MD5: 161968 57e24fd2d917b17029289f334c04b17c http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb Size/MD5: 235846 b3a13148395af99060cd418e9a23705d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_amd64.deb Size/MD5: 757540 3c825373eeda432f0fe8fa4e97d00fec i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb Size/MD5: 43837564 d1bb1e8b82e23a0fbf07e57c56eed7af http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb Size/MD5: 2796780 49e77e98de42a21d531468df796e2296 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb Size/MD5: 209648 500f92b789dc30a7cce74e58c339bbdd http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb Size/MD5:74834 ec2db908691d504cf714a4c4ea5b411e http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb Size/MD5: 7916466 272500e32887186917f370dcc09661ee http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb Size/MD5: 218924 a80027c5868b295ee9e81d1244ec568e http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb Size/MD5: 146678 18754a6f6caa2d3e83114d6971f7ff3a http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06.1_i386.deb Size/MD5: 235800 0ebc9b9ddd1624df7351c888a9ad597f
[Full-disclosure] [USN-329-1] Thunderbird vulnerabilities
architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.5-0ubuntu0.6.06_powerpc.deb Size/MD5: 3522822 737c06d9578eb3c7ba429dbe42ede660 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu4.2_powerpc.deb Size/MD5: 326256 39da78e5f62652d94df1d9d095ae4cf7 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.5-0ubuntu0.6.06_powerpc.deb Size/MD5: 190340 0f62bc53b3dc4de8770dc76f2fb646a1 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.5-0ubuntu0.6.06_powerpc.deb Size/MD5:57998 2f9a1d04b2a8914d8e7c485ad3375a55 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.5-0ubuntu0.6.06_powerpc.deb Size/MD5: 11541936 144df67e5f39d8d91c8444b9c207d25c sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.5-0ubuntu0.6.06_sparc.deb Size/MD5: 3519436 a7d0f52ec3a703ff1518b0b0cf3de2c9 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.94-0ubuntu4.2_sparc.deb Size/MD5: 324596 9cd0b2ae81740e21ffa8c167638b852f http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.5-0ubuntu0.6.06_sparc.deb Size/MD5: 187786 64628494f9e7967da629f7a8308f5006 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.5-0ubuntu0.6.06_sparc.deb Size/MD5:55876 fd982c5e65b6b135f817eabd10775416 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.5-0ubuntu0.6.06_sparc.deb Size/MD5: 10744066 b057f688569d2fa53aac6257bed38128 - End forwarded message - -- Martin Pitthttp://www.piware.de Ubuntu Developer http://www.ubuntu.com Debian Developer http://www.debian.org In a world without walls and fences, who needs Windows and Gates? signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-324-1] freetype vulnerability
=== Ubuntu Security Notice USN-324-1 July 27, 2006 freetype vulnerability CVE-2006-3467 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libfreetype6 2.1.7-2.3ubuntu0.2 Ubuntu 5.10: libfreetype6 2.1.7-2.4ubuntu1.2 Ubuntu 6.06 LTS: libfreetype6 2.1.10-1ubuntu2.2 After a standard system upgrade you need to restart your session to effect the necessary changes. Details follow: An integer overflow has been discovered in the FreeType library. By tricking a user into installing and/or opening a specially crafted font file, these could be exploited to execute arbitrary code with the privileges of that user. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.3ubuntu0.2.diff.gz Size/MD5:55469 22d16c4f3ab2c4eab015dcc8f336ce99 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.3ubuntu0.2.dsc Size/MD5: 695 ec0bfc2c291757e9d30db54201946ba6 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7.orig.tar.gz Size/MD5: 1245623 991ff86e88b075ba363e876f4ea58680 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.3ubuntu0.2_amd64.deb Size/MD5:76246 1718a6f444257aeb573f019228311dd8 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.3ubuntu0.2_amd64.deb Size/MD5: 723688 8651fcec88e545b6bd41ead719c3524b http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.3ubuntu0.2_amd64.udeb Size/MD5: 238240 d75ec89b93e23495695d83cf04e106e7 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.3ubuntu0.2_amd64.deb Size/MD5: 389520 47f2467f64491f023fde169b2e1daac0 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.3ubuntu0.2_i386.deb Size/MD5:57074 b8dfc28165ef707d7ccff6f1ddcd78b7 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.3ubuntu0.2_i386.deb Size/MD5: 688166 272205d732d611ccc9059d746a0fec82 http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.3ubuntu0.2_i386.udeb Size/MD5: 208104 b5ff69244ebd5fafc405093f4c66257b http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.3ubuntu0.2_i386.deb Size/MD5: 358920 df695f8579c9cfced57946f1694a5971 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.3ubuntu0.2_powerpc.deb Size/MD5:81976 d32762739aa42a17e83e7782ea7593ab http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.3ubuntu0.2_powerpc.deb Size/MD5: 729990 7ac5ac91e87b2f7397dad7badfd8fe82 http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.3ubuntu0.2_powerpc.udeb Size/MD5: 227726 80e32a6fe3342931d40fa66fde70d1c5 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.3ubuntu0.2_powerpc.deb Size/MD5: 378686 5ec5252b14c13f9aafe0942c7200c3d7 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.4ubuntu1.2.diff.gz Size/MD5:56886 bfb6ddcd3ee0b1b2165d69242e8cf795 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.4ubuntu1.2.dsc Size/MD5: 695 ac8e7fbf7319163e1c1b80ddd39cd2b8 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7.orig.tar.gz Size/MD5: 1245623 991ff86e88b075ba363e876f4ea58680 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.4ubuntu1.2_amd64.deb Size/MD5:75538 f67d2e22c7b2273cd11354ec371f8874 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.4ubuntu1.2_amd64.deb Size/MD5: 722922 a127c57c8962185c2a4dc5143d8c76fc http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.4ubuntu1.2_amd64.udeb Size/MD5: 241766 e3d145f8588068d7cd8a2442ffe7f503 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.4ubuntu1.2_amd64.deb Size/MD5: 392870 ce6b8f293838423189e2192f763f22cd i386 architecture (x86 compatible Intel/AMD)
[Full-disclosure] [USN-325-1] ruby1.8 vulnerability
=== Ubuntu Security Notice USN-325-1 July 27, 2006 ruby1.8 vulnerability CVE-2006-3694 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libruby1.8 1.8.1+1.8.2pre4-1ubuntu0.4 ruby1.8 1.8.1+1.8.2pre4-1ubuntu0.4 Ubuntu 5.10: libruby1.8 1.8.2-9ubuntu1.2 ruby1.8 1.8.2-9ubuntu1.2 Ubuntu 6.06 LTS: libruby1.8 1.8.4-1ubuntu1.1 ruby1.8 1.8.4-1ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: The alias function, certain directory operations, and regular expressions did not correctly implement safe levels. Depending on the application these flaws might allow attackers to bypass safe level restrictions and perform unintended operations. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4.diff.gz Size/MD5:35943 8bc7f03873488b5ba411faa7704bfb5c http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4.dsc Size/MD5: 1408 147b649550be4fc13a0ade3efc592ea6 http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.1+1.8.2pre4.orig.tar.gz Size/MD5: 3598517 1bf195093ed5279412f1047f70fafded Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/irb1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb Size/MD5: 149384 77b47cd028bb50976b9952cf798cb44b http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdrb-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb Size/MD5: 132148 a68132fb03500279404e95ab8be56e95 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/liberb-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb Size/MD5: 115970 1431edca2793e1582a71a0c331a3a086 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/librexml-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb Size/MD5: 169158 f854687a927f84fa23f0750952318f16 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libsoap-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb Size/MD5: 217756 62d040e30611cf6c5c20274a72bcec2c http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtest-unit-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb Size/MD5: 134918 91571960ed6b2b173ffe1e42d86960fe http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libwebrick-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb Size/MD5: 140426 92a1686826fd8e7822a9784dd2278837 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libxmlrpc-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb Size/MD5: 129898 b753eb69448986f6beed19912d65ed51 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/rdoc1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb Size/MD5: 216578 71ad64d4993083f7ed2d61a44b24e7b8 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ri1.8_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb Size/MD5: 441172 f6942ad673d322091d0003d1f4d01666 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-elisp_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb Size/MD5: 125626 4b863f01da97d59a17bb081a44d0d221 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-examples_1.8.1+1.8.2pre4-1ubuntu0.4_all.deb Size/MD5: 135164 a98ab744ecb448c4f4890c8f419ce9e7 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libbigdecimal-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_amd64.deb Size/MD5: 153212 318a99a71b7f2816ee74f8a9c0776c39 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libcurses-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_amd64.deb Size/MD5: 125694 c7a8c55acf413b5a13d0444ec5365ec5 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_amd64.deb Size/MD5: 118328 69cefa376aecf9acb219d1b51441c42b http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdl-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_amd64.deb Size/MD5: 152166 f6e7a2cccaed6c80d33f3b9612605e42 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_amd64.deb Size/MD5: 119880 231c330121a586d5e57396128cf277ca http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libiconv-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.4_amd64.deb Size/MD5: 113820 a322db798a82177cfd8224614384b571
[Full-disclosure] [USN-326-1] heartbeat vulnerability
=== Ubuntu Security Notice USN-326-1 July 27, 2006 heartbeat vulnerability CVE-2006-3815 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: heartbeat1.2.3-3ubuntu1.2 Ubuntu 5.10: heartbeat1.2.3-12ubuntu0.1 Ubuntu 6.06 LTS: heartbeat1.2.4-2ubuntu0.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Yan Rong Ge discovered that heartbeat did not set proper permissions for an allocated shared memory segment. A local attacker could exploit this to render the heartbeat service unavailable (Denial of Service). Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.2.diff.gz Size/MD5: 246093 3ec140cdfd4b1366ebc80949929a1e53 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.2.dsc Size/MD5: 847 756f89385ad79532421877d21f2dc5ab http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3.orig.tar.gz Size/MD5: 1772513 9fd126e5dff51cc8c1eee223c252a4af Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/h/heartbeat/ldirectord_1.2.3-3ubuntu1.2_all.deb Size/MD5:44696 a30cdadd183ab0648dac48a3a12e55aa amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat-dev_1.2.3-3ubuntu1.2_amd64.deb Size/MD5: 125424 12f22ff5c4bbe7a8d430fd7f1c0eb061 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.2_amd64.deb Size/MD5: 533132 26e72b2a4f97b7e2e103be2aff53e1a0 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils-dev_1.2.3-3ubuntu1.2_amd64.deb Size/MD5:61124 ab240db5ab465c9d4c1b05b22ac67b90 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils0_1.2.3-3ubuntu1.2_amd64.deb Size/MD5:51812 4da42c1ca980eb62d2aa7905bab30227 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith-dev_1.2.3-3ubuntu1.2_amd64.deb Size/MD5:29280 68a090e862161255bf30b5564839dcf0 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith0_1.2.3-3ubuntu1.2_amd64.deb Size/MD5:79580 13581bf67cc41797f6209c7e9ac8522f http://security.ubuntu.com/ubuntu/pool/universe/h/heartbeat/stonith_1.2.3-3ubuntu1.2_amd64.deb Size/MD5:30306 d6c71a534f3d90724a1e9aa2bf878d19 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat-dev_1.2.3-3ubuntu1.2_i386.deb Size/MD5: 114864 2450cddfab1fb927ebaa058d79f672d4 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.2_i386.deb Size/MD5: 489662 e01b9cd2f15f109a7827fa7fcc95def2 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils-dev_1.2.3-3ubuntu1.2_i386.deb Size/MD5:57264 e2e160e1afd3192ed1b02dc02d8bb423 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils0_1.2.3-3ubuntu1.2_i386.deb Size/MD5:46772 1f9b32a6694da698c5b7dd471ae8e611 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith-dev_1.2.3-3ubuntu1.2_i386.deb Size/MD5:28866 61a9b5a8e7a05a269627f2fd996c36da http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith0_1.2.3-3ubuntu1.2_i386.deb Size/MD5:69270 1c92e784e1be5912a0b3fc11a4cf3517 http://security.ubuntu.com/ubuntu/pool/universe/h/heartbeat/stonith_1.2.3-3ubuntu1.2_i386.deb Size/MD5:29704 1f5ad3c81122f0b93dac7552f889d953 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat-dev_1.2.3-3ubuntu1.2_powerpc.deb Size/MD5: 126936 d80eca2b83b8c4b4b5a5af854d1a6824 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/heartbeat_1.2.3-3ubuntu1.2_powerpc.deb Size/MD5: 557100 5170ed8f4bad84fc13baba34cf925f78 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils-dev_1.2.3-3ubuntu1.2_powerpc.deb Size/MD5:61186 bac65215be030e0181fb51aaf673b27c http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libpils0_1.2.3-3ubuntu1.2_powerpc.deb Size/MD5:52820 8af7fd485f7a546aa266a83f14022a89 http://security.ubuntu.com/ubuntu/pool/main/h/heartbeat/libstonith-dev_1.2.3-3ubuntu1.2_powerpc.deb Size/MD5:29450 b0264aea8ccf20b743d6ef4291f35b78
[Full-disclosure] [USN-327-1] firefox vulnerabilities
=== Ubuntu Security Notice USN-327-1 July 27, 2006 firefox vulnerabilities CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: firefox 1.5.dfsg+1.5.0.5-0ubuntu6.06 After a standard system upgrade you need to restart Firefox to effect the necessary changes. Please note that Firefox 1.0.8 in Ubuntu 5.10 and Ubuntu 5.04 are also affected by these problems. Updates for these Ubuntu releases will be delayed due to upstream dropping support for this Firefox version. We strongly advise that you disable JavaScript to disable the attack vectors for most vulnerabilities if you use one of these Ubuntu versions. Details follow: Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious URL. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-3812) cross-site scripting vulnerabilities were found in the XPCNativeWrapper() function and native DOM method handlers. A malicious web site could exploit these to modify the contents or steal confidential data (such as passwords) from other opened web pages. (CVE-2006-3802, CVE-2006-3810) A bug was found in the script handler for automatic proxy configuration. A malicious proxy could send scripts which could execute arbitrary code with the user's privileges. (CVE-2006-3808) Please see http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox for technical details of these vulnerabilities. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.diff.gz Size/MD5: 174602 7be6f5862219ac4cf44f05733f372f2b http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.dsc Size/MD5: 1109 252d6acf45b009008a6bc88166e2632f http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5.orig.tar.gz Size/MD5: 44067762 749933c002e158576ec15782fc451e43 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb Size/MD5:49190 850dd650e7f876dd539e605d9b3026c8 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb Size/MD5:50078 c1fa4a40187d9c5b58bd049edb00ce54 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 47269292 167aadc3f03b4e1b7cb9ed826e672983 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 2796768 b54592d0bd736f6ee12a90987771bc59 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 216136 79fa6c69ffb0dd6037e56d1ba538ff64 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5:82358 e2e026d582a7b5352cee4453cef0fe45 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 9400544 a9d0b804a4374dc636bb79968a2bce5c http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 218822 a09476caea7d8d73d6a2f534bd494493 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 161876 0e0e65348dba8167b4891b173baa8f0d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 235746 064fc1434a315f857ee92f60fd49d772 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 757458 bd6a5e28e05a04a5deca731ab29f70e4 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb Size/MD5: 43837610 a7e4a535262f8a5d5cb0ace7ed785237 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb Size/MD5:
[Full-disclosure] [USN-328-1] Apache vulnerability
=== Ubuntu Security Notice USN-328-1 July 27, 2006 apache2 vulnerability CVE-2006-3747 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: apache2-mpm-perchild 2.0.53-5ubuntu5.6 apache2-mpm-prefork 2.0.53-5ubuntu5.6 apache2-mpm-threadpool 2.0.53-5ubuntu5.6 apache2-mpm-worker 2.0.53-5ubuntu5.6 Ubuntu 5.10: apache2-mpm-perchild 2.0.54-5ubuntu4.1 apache2-mpm-prefork 2.0.54-5ubuntu4.1 apache2-mpm-threadpool 2.0.54-5ubuntu4.1 apache2-mpm-worker 2.0.54-5ubuntu4.1 Ubuntu 6.06 LTS: apache2-mpm-perchild 2.0.55-4ubuntu2.1 apache2-mpm-prefork 2.0.55-4ubuntu2.1 apache2-mpm-worker 2.0.55-4ubuntu2.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Mark Dowd discovered an off-by-one buffer overflow in the mod_rewrite module's ldap scheme handling. On systems which activate RewriteEngine on, a remote attacker could exploit certain rewrite rules to crash Apache, or potentially even execute arbitrary code (this has not been verified). RewriteEngine on is disabled by default. Systems which have this directive disabled are not affected at all. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.53-5ubuntu5.6.diff.gz Size/MD5: 109849 b9346454def0a9b0ed83e5c31e5715d1 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.53-5ubuntu5.6.dsc Size/MD5: 1159 a4def08b6aff949a8503606f49614bfd http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.53.orig.tar.gz Size/MD5: 6925351 40507bf19919334f07355eda2df017e5 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.0.53-5ubuntu5.6_all.deb Size/MD5: 3578948 9c1bfb6108268f5438673aa522459e9e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-threadpool_2.0.53-5ubuntu5.6_all.deb Size/MD5:34364 8a61625863e9135f4ad5bcf4d6b5cb7b amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.53-5ubuntu5.6_amd64.deb Size/MD5: 826722 d3cbadc06958f8247345bcf851047f06 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.53-5ubuntu5.6_amd64.deb Size/MD5: 221644 5759cbbf3cbeffcf796967de7ed1edf6 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.53-5ubuntu5.6_amd64.deb Size/MD5: 217284 a65b171976c4575530fc6e8f06f48822 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.53-5ubuntu5.6_amd64.deb Size/MD5: 220692 f39e9387d0fde69d26530f1340ebd2b4 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.53-5ubuntu5.6_amd64.deb Size/MD5: 168046 692d290a85d73e77b8ca6657fc71cc09 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.53-5ubuntu5.6_amd64.deb Size/MD5: 168822 f2677841cd39b26c9262b18752cc4f68 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.53-5ubuntu5.6_amd64.deb Size/MD5:93502 1cd458dd0ad1c5e6190eef8115066061 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.53-5ubuntu5.6_amd64.deb Size/MD5:34294 4405aaf5e8d6d5ba6ae43cefba440323 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.53-5ubuntu5.6_amd64.deb Size/MD5: 279670 bee6e2360d03837a9f474f4519a2b449 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.53-5ubuntu5.6_amd64.deb Size/MD5: 138178 2f74d6f152fc98202903688b30185c77 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.53-5ubuntu5.6_i386.deb Size/MD5: 789726 fd570ca5737770335853e2f4e5f260b5 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.53-5ubuntu5.6_i386.deb Size/MD5: 201924 1a4dae1a8a9c6ef8ce9732d06e4fddf6 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.53-5ubuntu5.6_i386.deb Size/MD5: 197692 e8c111bd39f8911463aabda812946282 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.53-5ubuntu5.6_i386.deb Size/MD5: 201118 ac29377492d905679525927368fc9735
[Full-disclosure] [USN-297-3] Thunderbird vulnerabilities
=== Ubuntu Security Notice USN-297-3 July 26, 2006 mozilla-thunderbird vulnerabilities CVE-2006-2775, CVE-2006-2776, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2781, CVE-2006-2783, CVE-2006-2784, CVE-2006-2787 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: mozilla-thunderbird 1.0.8-0ubuntu05.04.1 Ubuntu 5.10: mozilla-thunderbird 1.0.8-0ubuntu05.10.2 After a standard system upgrade you need to restart Thunderbird to effect the necessary changes. Details follow: USN-297-1 fixed several vulnerabilities in Thunderbird for the Ubuntu 6.06 LTS release. This update provides the corresponding fixes for Ubuntu 5.04 and Ubuntu 5.10. For reference, these are the details of the original USN: Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL. A malicious web site could exploit this to execute arbitrary code with the privileges of the user. (MFSA 2006-35, CVE-2006-2775) Paul Nickerson discovered that content-defined setters on an object prototype were getting called by privileged UI code. It was demonstrated that this could be exploited to run arbitrary web script with full user privileges (MFSA 2006-37, CVE-2006-2776). Mikolaj Habryn discovered a buffer overflow in the crypto.signText() function. By sending an email with malicious JavaScript to an user, and that user enabled JavaScript in Thunderbird (which is not the default and not recommended), this could potentially be exploited to execute arbitrary code with the user's privileges. (MFSA 2006-38, CVE-2006-2778) The Mozilla developer team discovered several bugs that lead to crashes with memory corruption. These might be exploitable by malicious web sites to execute arbitrary code with the privileges of the user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780) Masatoshi Kimura discovered a memory corruption (double-free) when processing a large VCard with invalid base64 characters in it. By sending a maliciously crafted set of VCards to a user, this could potentially be exploited to execute arbitrary code with the user's privileges. (MFSA 2006-40, CVE-2006-2781) Masatoshi Kimura found a way to bypass web input sanitizers which filter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)' characters into the HTML code (e. g. 'scr[BOM]ipt'), these filters might not recognize the tags anymore; however, Thunderbird would still execute them since BOM markers are filtered out before processing a mail containing JavaScript. (MFSA 2006-42, CVE-2006-2783) Kazuho Oku discovered various ways to perform HTTP response smuggling when used with certain proxy servers. Due to different interpretation of nonstandard HTTP headers in Thunderbird and the proxy server, a malicious HTML email can exploit this to send back two responses to one request. The second response could be used to steal login cookies or other sensitive data from another opened web site. (MFSA 2006-33, CVE-2006-2786) It was discovered that JavaScript run via EvalInSandbox() can escape the sandbox. Malicious scripts received in emails containing JavaScript could use these privileges to execute arbitrary code with the user's privileges. (MFSA 2006-31, CVE-2006-2787) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04.1.diff.gz Size/MD5:98300 a4dffa1705bd280224188e7bbc7781dd http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04.1.dsc Size/MD5: 946 7eebd4d62af685dd0ce74d5ff741c92c http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8.orig.tar.gz Size/MD5: 32849510 ae345f1b722d8f3a977af4fd358d27b0 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.04.1_amd64.deb Size/MD5: 3347854 519c296b742dc6e6d5c308b0b6c5a433 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.04.1_amd64.deb Size/MD5: 145244 9a8d5c4ade62afdb187022df1b188099 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.04.1_amd64.deb Size/MD5:27718 aa28f71d2133d0810bbf166d86c68dc7
[Full-disclosure] [USN-296-2] Firefox vulnerabilities
=== Ubuntu Security Notice USN-296-2 July 25, 2006 firefox, mozilla-firefox vulnerabilities CVE-2006-2775, CVE-2006-2776, CVE-2006-2777, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2782, CVE-2006-2783, CVE-2006-2784, CVE-2006-2785, CVE-2006-2786, CVE-2006-2787 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: mozilla-firefox 1.0.8-0ubuntu5.04.1 Ubuntu 5.10: firefox 1.0.8-0ubuntu5.10.1 After a standard system upgrade you need to restart Firefox to effect the necessary changes. Details follow: USN-296-1 fixed several vulnerabilities in Firefox for the Ubuntu 6.06 LTS release. This update provides the corresponding fixes for Ubuntu 5.04 and Ubuntu 5.10. For reference, these are the details of the original USN: Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL. A malicious web site could exploit this to execute arbitrary code with the privileges of the user. (MFSA 2006-35, CVE-2006-2775) Paul Nickerson discovered that content-defined setters on an object prototype were getting called by privileged UI code. It was demonstrated that this could be exploited to run arbitrary web script with full user privileges (MFSA 2006-37, CVE-2006-2776). A similar attack was discovered by moz_bug_r_a4 that leveraged SelectionObject notifications that were called in privileged context. (MFSA 2006-43, CVE-2006-2777) Mikolaj Habryn discovered a buffer overflow in the crypto.signText() function. By tricking a user to visit a site with an SSL certificate with specially crafted optional Certificate Authority name arguments, this could potentially be exploited to execute arbitrary code with the user's privileges. (MFSA 2006-38, CVE-2006-2778) The Mozilla developer team discovered several bugs that lead to crashes with memory corruption. These might be exploitable by malicious web sites to execute arbitrary code with the privileges of the user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780, CVE-2006-2788) Chuck McAuley reported that the fix for CVE-2006-1729 (file stealing by changing input type) was not sufficient to prevent all variants of exploitation. (MFSA 2006-41, CVE-2006-2782) Masatoshi Kimura found a way to bypass web input sanitizers which filter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)' characters into the HTML code (e. g. 'scr[BOM]ipt'), these filters might not recognize the tags anymore; however, Firefox would still execute them since BOM markers are filtered out before processing the page. (MFSA 2006-42, CVE-2006-2783) Paul Nickerson noticed that the fix for CVE-2005-0752 (JavaScript privilege escalation on the plugins page) was not sufficient to prevent all variants of exploitation. (MFSA 2006-36, CVE-2006-2784) Paul Nickerson demonstrated that if an attacker could convince a user to right-click on a broken image and choose View Image from the context menu then he could get JavaScript to run on a site of the attacker's choosing. This could be used to steal login cookies or other confidential information from the target site. (MFSA 2006-34, CVE-2006-2785) Kazuho Oku discovered various ways to perform HTTP response smuggling when used with certain proxy servers. Due to different interpretation of nonstandard HTTP headers in Firefox and the proxy server, a malicious web site can exploit this to send back two responses to one request. The second response could be used to steal login cookies or other sensitive data from another opened web site. (MFSA 2006-33, CVE-2006-2786) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-firefox/mozilla-firefox_1.0.8-0ubuntu5.04.1.diff.gz Size/MD5: 824134 dcdb07a69073007d24bafca99044b67f http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-firefox/mozilla-firefox_1.0.8-0ubuntu5.04.1.dsc Size/MD5: 1064 fec5050f2d3a55468ffa489df440e07a http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-firefox/mozilla-firefox_1.0.8.orig.tar.gz Size/MD5: 41545571 74feb5a7af741bc5e24f1a622ce698c8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-firefox/mozilla-firefox-dev_1.0.8-0ubuntu5.04.1_amd64.deb Size/MD5: 2634972 29670d8ce13ce01319c4dfa0009c943c http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.8-0ubuntu5.04.1_amd64.deb Size/MD5: 159452
[Full-disclosure] [USN-323-1] mozilla vulnerabilities
=== Ubuntu Security Notice USN-323-1 July 25, 2006 mozilla vulnerabilities CVE-2006-2775, CVE-2006-2776, CVE-2006-2777, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2781, CVE-2006-2782, CVE-2006-2783, CVE-2006-2784, CVE-2006-2785, CVE-2006-2786, CVE-2006-2787 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: mozilla-browser 2:1.7.13-0ubuntu05.04.1 mozilla-mailnews 2:1.7.13-0ubuntu05.04.1 mozilla-psm 2:1.7.13-0ubuntu05.04.1 Ubuntu 5.10: mozilla-browser 2:1.7.13-0ubuntu5.10.1 mozilla-mailnews 2:1.7.13-0ubuntu5.10.1 mozilla-psm 2:1.7.13-0ubuntu5.10.1 After a standard system upgrade you need to restart Mozilla to effect the necessary changes. Details follow: Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL. A malicious web site could exploit this to execute arbitrary code with the privileges of the user. (MFSA 2006-35, CVE-2006-2775) Paul Nickerson discovered that content-defined setters on an object prototype were getting called by privileged UI code. It was demonstrated that this could be exploited to run arbitrary web script with full user privileges (MFSA 2006-37, CVE-2006-2776). A similar attack was discovered by moz_bug_r_a4 that leveraged SelectionObject notifications that were called in privileged context. (MFSA 2006-43, CVE-2006-2777) Mikolaj Habryn discovered a buffer overflow in the crypto.signText() function. By tricking a user to visit a site with an SSL certificate with specially crafted optional Certificate Authority name arguments, this could potentially be exploited to execute arbitrary code with the user's privileges. (MFSA 2006-38, CVE-2006-2778) The Mozilla developer team discovered several bugs that lead to crashes with memory corruption. These might be exploitable by malicious web sites to execute arbitrary code with the privileges of the user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780) Masatoshi Kimura discovered a memory corruption (double-free) when processing a large VCard with invalid base64 characters in it. By sending a maliciously crafted set of VCards to a user, this could potentially be exploited to execute arbitrary code with the user's privileges. (MFSA 2006-40, CVE-2006-2781) Chuck McAuley reported that the fix for CVE-2006-1729 (file stealing by changing input type) was not sufficient to prevent all variants of exploitation. (MFSA 2006-41, CVE-2006-2782) Masatoshi Kimura found a way to bypass web input sanitizers which filter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)' characters into the HTML code (e. g. 'scr[BOM]ipt'), these filters might not recognize the tags anymore; however, Mozilla would still execute them since BOM markers are filtered out before processing the page. (MFSA 2006-42, CVE-2006-2783) Paul Nickerson noticed that the fix for CVE-2005-0752 (JavaScript privilege escalation on the plugins page) was not sufficient to prevent all variants of exploitation. (MFSA 2006-36, CVE-2006-2784) Paul Nickerson demonstrated that if an attacker could convince a user to right-click on a broken image and choose View Image from the context menu then he could get JavaScript to run on a site of the attacker's choosing. This could be used to steal login cookies or other confidential information from the target site. (MFSA 2006-34, CVE-2006-2785) Kazuho Oku discovered various ways to perform HTTP response smuggling when used with certain proxy servers. Due to different interpretation of nonstandard HTTP headers in Mozilla and the proxy server, a malicious web site can exploit this to send back two responses to one request. The second response could be used to steal login cookies or other sensitive data from another opened web site. (MFSA 2006-33, CVE-2006-2786) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13-0ubuntu05.04.1.diff.gz Size/MD5: 337800 2db7b990124c6c1c1b8e9672ca5d6513 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13-0ubuntu05.04.1.dsc Size/MD5: 1140 dff39e5ce49d9743de85eec224192a32 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13.orig.tar.gz Size/MD5: 38788839 db906560b5abe488286ad1edc21d52b6 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.13-0ubuntu05.04.1_amd64.deb Size/MD5: 168074
[Full-disclosure] [USN-322-1] Konqueror vulnerability
=== Ubuntu Security Notice USN-322-1 July 24, 2006 kdelibs vulnerability CVE-2006-3672 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: kdelibs 4:3.4.0-0ubuntu3.6 Ubuntu 5.10: kdelibs 4:3.4.3-0ubuntu2.1 Ubuntu 6.06 LTS: kdelibs 4:3.5.2-0ubuntu18.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: A Denial of Service vulnerability has been reported in the replaceChild() method in KDE's DOM handler. A malicious remote web page could exploit this to cause Konqueror to crash. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0-0ubuntu3.6.diff.gz Size/MD5: 359009 80e19fdd5fc4e09de50e0abc08dbdc64 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0-0ubuntu3.6.dsc Size/MD5: 1334 8e9db12a120c7d9aa45ce4a89748150c http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0.orig.tar.gz Size/MD5: 20024253 471740de13cfed37d35eb180fc1b9b38 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.4.0-0ubuntu3.6_all.deb Size/MD5: 8013322 0f58397ee85bc8e94222bd887e3e3ed8 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.4.0-0ubuntu3.6_all.deb Size/MD5: 12073276 d64b80c5e3f2761a1fee42c4ac61aceb http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0-0ubuntu3.6_all.deb Size/MD5:20560 b926d8254eae60a6dfc2f2383c749e8b amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.0-0ubuntu3.6_amd64.deb Size/MD5: 921980 3b24d216d30e42fe76f114af2ef79e23 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.0-0ubuntu3.6_amd64.deb Size/MD5: 1303886 02fdf7d27c3b4191041e1f1ba65dbec3 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4_3.4.0-0ubuntu3.6_amd64.deb Size/MD5: 8970482 e4d884c6087a940ed951975ecaf70a16 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.0-0ubuntu3.6_i386.deb Size/MD5: 839684 a51679f1f9d6b0819f1aeaff2929cdb8 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.0-0ubuntu3.6_i386.deb Size/MD5: 1301354 d5a5d6777bac0d83976ee5d2514a5e36 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4_3.4.0-0ubuntu3.6_i386.deb Size/MD5: 8397572 e536bdbc12511bec8e8adcf755d10369 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.0-0ubuntu3.6_powerpc.deb Size/MD5: 904730 5eb02eab700a7844b86ed5337f202f57 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.0-0ubuntu3.6_powerpc.deb Size/MD5: 1304646 7bc4878395c8c57f20642fb76f0cf0f2 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4_3.4.0-0ubuntu3.6_powerpc.deb Size/MD5: 8368206 920ad16060f913092914e2de01bbf533 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.1.diff.gz Size/MD5: 328824 90ae45cf60a62394b61877f0b8829bb7 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.1.dsc Size/MD5: 1523 ce890db0541122c30d10b77ce8d65871 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3.orig.tar.gz Size/MD5: 19981388 36e7a8320bd95760b41c4849da170100 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.4.3-0ubuntu2.1_all.deb Size/MD5: 6969950 9e99951cfed9d47e7a6aa15c4bc8b2a6 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.4.3-0ubuntu2.1_all.deb Size/MD5: 29296526 6bbe20ef6d29c14fda945f62465cba72 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.1_all.deb Size/MD5:30588 32c58feabf9a01d39f0d320f515c47b4 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.1_amd64.deb Size/MD5: 926460 4d3048c061d7ff0bac8fce46b5a36dbd http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.1_amd64.deb Size/MD5: 1308904 acee80a54853c4c5f20fd103c33624bf
[Full-disclosure] [USN-321-1] mysql-dfsg-4.1 vulnerability
=== Ubuntu Security Notice USN-321-1 July 21, 2006 mysql-dfsg-4.1 vulnerability CVE-2006-3469 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: mysql-server-4.1 4.1.12-1ubuntu3.7 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Jean-David Maillefer discovered a format string bug in the date_format() function's error reporting. By calling the function with invalid arguments, an authenticated user could exploit this to crash the server. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.7.diff.gz Size/MD5: 165177 e3f4a9d6d9803befbba2532addd92b71 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.7.dsc Size/MD5: 1024 33020e3d005bd77d484f34abecf1c177 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12.orig.tar.gz Size/MD5: 15921909 c7b83a19bd8a4f42d5d64c239d05121f Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.12-1ubuntu3.7_all.deb Size/MD5:36830 d60762f789e3bd2b4fd3a456d3f73930 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.7_amd64.deb Size/MD5: 5831474 bced6d17845dc9588a089d49f02d55b0 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.7_amd64.deb Size/MD5: 1540694 af1be52eddc78528ecd022434171906e http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.7_amd64.deb Size/MD5: 898462 d45442957f383440bd191f930b443547 http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.7_amd64.deb Size/MD5: 18433692 e071ef9ab926bfb5140a40c26c3ed78f i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.7_i386.deb Size/MD5: 5348328 8fd1aadc67f3377de8d9d938fed7c165 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.7_i386.deb Size/MD5: 1475476 c5258fbb58cb8cb9723a7ffa4284d0f1 http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.7_i386.deb Size/MD5: 866460 42d1d8b4841a60bd8579e393b18dbe3f http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.7_i386.deb Size/MD5: 17336370 e535ca52af75dd467f68e26b6a9d5e27 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.7_powerpc.deb Size/MD5: 6069400 36169591c90ee3417371a958cadc7b71 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.7_powerpc.deb Size/MD5: 1549166 901ef463598f28da3cfac186a66558da http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.7_powerpc.deb Size/MD5: 937712 1e8b6a06c6b3dfba1e99a7781da0a66c http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.7_powerpc.deb Size/MD5: 18523422 69e4c4a92cd298cfc3e60a7b907b3529 signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-313-2] OpenOffice.org vulnerabilities
=== Ubuntu Security Notice USN-313-2 July 19, 2006 openoffice.org2-amd64, openoffice.org2 vulnerabilities CVE-2006-2198, CVE-2006-2199, CVE-2006-3117 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: openoffice.org2-common 1.9.129-0.1ubuntu4.1 openoffice.org2-core 1.9.129-0.1ubuntu4.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: USN-313-1 fixed several vulnerabilities in OpenOffice for Ubuntu 5.04 and Ubuntu 6.06 LTS. This followup advisory provides the corresponding update for Ubuntu 5.10. For reference, these are the details of the original USN: It was possible to embed Basic macros in documents in a way that OpenOffice.org would not ask for confirmation about executing them. By tricking a user into opening a malicious document, this could be exploited to run arbitrary Basic code (including local file access and modification) with the user's privileges. (CVE-2006-2198) A flaw was discovered in the Java sandbox which allowed Java applets to break out of the sandbox and execute code without restrictions. By tricking a user into opening a malicious document, this could be exploited to run arbitrary code with the user's privileges. This update disables Java applets for OpenOffice.org, since it is not generally possible to guarantee the sandbox restrictions. (CVE-2006-2199) A buffer overflow has been found in the XML parser. By tricking a user into opening a specially crafted XML file with OpenOffice.org, this could be exploited to execute arbitrary code with the user's privileges. (CVE-2006-3117) Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-amd64_1.9.129-0.1ubuntu4.1-1.diff.gz Size/MD5:30102 940d431dbc93185558bfe215f0d1bd31 http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-amd64_1.9.129-0.1ubuntu4.1-1.dsc Size/MD5: 934 46517c65ab2797905ae5fc54e18f093a http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-amd64_1.9.129-0.1ubuntu4.1.orig.tar.gz Size/MD5: 280390449 8fc86346a5ca070fd41cc35ccf0db891 http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2_1.9.129-0.1ubuntu4.1.diff.gz Size/MD5: 42651040 7eb1530f373880579e0b4f882d6f37d4 http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2_1.9.129-0.1ubuntu4.1.dsc Size/MD5: 2747 1df80499afc5fe76f527f67baede96aa http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2_1.9.129.orig.tar.gz Size/MD5: 193239182 ca8c3fd5718fc31343abef213cb4df8d Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2-common_1.9.129-0.1ubuntu4.1_all.deb Size/MD5: 22894532 9ceea05764f1f3c7c7fb6e9ba4cced06 http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2-dev-doc_1.9.129-0.1ubuntu4.1_all.deb Size/MD5: 4783358 d90c33a8f7d46ecb032e0b79a966cde0 http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2-java-common_1.9.129-0.1ubuntu4.1_all.deb Size/MD5: 2792520 8ff58905701deb746209f38d59e50fbe http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/openoffice.org2-l10n-en-us_1.9.129-0.1ubuntu4.1_all.deb Size/MD5: 588148 232eea25965ee05eb60579ec0c6680cf http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2/ttf-opensymbol_1.9.129-0.1ubuntu4.1_all.deb Size/MD5: 145466 62a12f481a92cce78f521a2afeb60f42 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-base_1.9.129-0.1ubuntu4.1-1_amd64.deb Size/MD5: 2768862 e2e037a15d5aa56e0f5bde9300d78a7a http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-calc_1.9.129-0.1ubuntu4.1-1_amd64.deb Size/MD5: 3514372 0df198e3a69f04746605f52239b252b3 http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-core_1.9.129-0.1ubuntu4.1-1_amd64.deb Size/MD5: 31007052 9bb773b5d9f762546389c33c410821a1 http://security.ubuntu.com/ubuntu/pool/main/o/openoffice.org2-amd64/openoffice.org2-draw_1.9.129-0.1ubuntu4.1-1_amd64.deb Size/MD5: 1749028 06ad64a99ba5cddf8375b2a2a83bade0 http://security.ubuntu.com/ubuntu/pool/universe/o/openoffice.org2-amd64/openoffice.org2-filter-so52_1.9.129-0.1ubuntu4.1-1_amd64.deb Size/MD5:27834
[Full-disclosure] [USN-320-1] PHP vulnerabilities
=== Ubuntu Security Notice USN-320-1 July 19, 2006 php4, php5 vulnerabilities CVE-2006-0996, CVE-2006-1490, CVE-2006-1494, CVE-2006-1608, CVE-2006-1990, CVE-2006-1991, CVE-2006-2563, CVE-2006-2660, CVE-2006-3011, CVE-2006-3016, CVE-2006-3018 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libapache2-mod-php4 4:4.3.10-10ubuntu4.5 php4-cgi 4:4.3.10-10ubuntu4.5 php4-cli 4:4.3.10-10ubuntu4.5 Ubuntu 5.10: libapache2-mod-php5 5.0.5-2ubuntu1.3 php5-cgi 5.0.5-2ubuntu1.3 php5-cli 5.0.5-2ubuntu1.3 php5-curl5.0.5-2ubuntu1.3 Ubuntu 6.06 LTS: libapache2-mod-php5 5.1.2-1ubuntu3.1 php5-cgi 5.1.2-1ubuntu3.1 php5-cli 5.1.2-1ubuntu3.1 php5-curl5.1.2-1ubuntu3.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: The phpinfo() PHP function did not properly sanitize long strings. A remote attacker could use this to perform cross-site scripting attacks against sites that have publicly-available PHP scripts that call phpinfo(). Please note that it is not recommended to publicly expose phpinfo(). (CVE-2006-0996) An information disclosure has been reported in the html_entity_decode() function. A script which uses this function to process arbitrary user-supplied input could be exploited to expose a random part of memory, which could potentially reveal sensitive data. (CVE-2006-1490) The wordwrap() function did not sufficiently check the validity of the 'break' argument. An attacker who could control the string passed to the 'break' parameter could cause a heap overflow; however, this should not happen in practical applications. (CVE-2006-1990) The substr_compare() function did not sufficiently check the validity of the 'offset' argument. A script which passes untrusted user-defined values to this parameter could be exploited to crash the PHP interpreter. (CVE-2006-1991) In certain situations, using unset() to delete a hash entry could cause the deletion of the wrong element, which would leave the specified variable defined. This could potentially cause information disclosure in security-relevant operations. (CVE-2006-3017) In certain situations the session module attempted to close a data file twice, which led to memory corruption. This could potentially be exploited to crash the PHP interpreter, though that could not be verified. (CVE-2006-3018) This update also fixes various bugs which allowed local scripts to bypass open_basedir and 'safe mode' restrictions by passing special arguments to tempnam() (CVE-2006-1494, CVE-2006-2660), copy() (CVE-2006-1608), the curl module (CVE-2006-2563), or error_log() (CVE-2006-3011). Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.5.diff.gz Size/MD5: 281888 6b2f9b14e6b17fd16b39fc992370c700 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.5.dsc Size/MD5: 1469 e107321f5a864fec29aba0ddc4557bda http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10.orig.tar.gz Size/MD5: 4892209 73f5d1f42e34efa534a09c6091b5a21e Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.5_all.deb Size/MD5: 1128 e68858ad284ff509a9a7ba6004cd85b3 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.5_amd64.deb Size/MD5: 1657574 00032fa4aca5c15403f290cae27bfe38 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.5_amd64.deb Size/MD5: 3275318 be667056767f298619d7c48d73f22c00 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.5_amd64.deb Size/MD5: 1647612 d615fd92ad1609108ec1e877ce748ade http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.5_amd64.deb Size/MD5: 168182 ad4bd0b977814c2c3379235d76cf2ed2 http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.5_amd64.deb Size/MD5: 348270 03f94109b0ea8c73d8d88e50e10efede i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.5_i386.deb Size/MD5: 1592870
[Full-disclosure] [USN-317-1] zope2.8 vulnerability
=== Ubuntu Security Notice USN-317-1 July 13, 2006 zope2.8 vulnerability CVE-2006-3458 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: zope2.8 2.8.1-5ubuntu0.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Zope did not deactivate the 'raw' command when exposing RestructuredText functionalities to untrusted users. A remote user with the privilege of editing Zope webpages with RestructuredText could exploit this to expose arbitrary files that can be read with the privileges of the Zope server. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1-5ubuntu0.2.diff.gz Size/MD5:13282 2eb94321cd899b8a270205d63d922cc0 http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1-5ubuntu0.2.dsc Size/MD5: 826 1014a9617f2404bb2a812c2f5755e106 http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1.orig.tar.gz Size/MD5: 5343921 0ec441a35175bb8d8c557b7d3c63f6f6 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8-sandbox_2.8.1-5ubuntu0.2_all.deb Size/MD5:18638 352dfb3302c6b8c6e39f3b5067124975 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1-5ubuntu0.2_amd64.deb Size/MD5: 5521472 f0ad0cb3f4f5d31bca8dc4df67efef80 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1-5ubuntu0.2_i386.deb Size/MD5: 5463698 22c8680d3649ae19e90c41224b5fbb3b powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1-5ubuntu0.2_powerpc.deb Size/MD5: 5551806 074782e4b777904545647f39ca52cc0f sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/z/zope2.8/zope2.8_2.8.1-5ubuntu0.2_sparc.deb Size/MD5: 5478804 4a7978b8921b0789d75857d893d706c9 signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-318-1] libtunepimp vulnerability
=== Ubuntu Security Notice USN-318-1 July 13, 2006 libtunepimp vulnerability http://bugs.musicbrainz.org/ticket/1764 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libtunepimp2 0.3.0-2ubuntu5.1 Ubuntu 5.10: libtunepimp2c2 0.3.0-2ubuntu7.1 Ubuntu 6.06 LTS: libtunepimp2c2a 0.3.0-9.1ubuntu3.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Kevin Kofler discovered several buffer overflows in the tag parser. By tricking a user into opening a specially crafted tagged multimedia file (such as .ogg or .mp3 music) with an application that uses libtunepimp, this could be exploited to execute arbitrary code with the user's privileges. This particularly affects the KDE applications 'Amarok' and 'Juk'. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp_0.3.0-2ubuntu5.1.diff.gz Size/MD5: 6871 816d083ad0010b6ba3f4c2c027ffe4c8 http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp_0.3.0-2ubuntu5.1.dsc Size/MD5: 1016 0bb89c217e868b97c8ecece58d70d521 http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp_0.3.0.orig.tar.gz Size/MD5: 524889 f1f506914150c4917ec730f847ad4709 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp-bin_0.3.0-2ubuntu5.1_amd64.deb Size/MD5:24124 2bafeba28a4e75afc24b9d84ca89e4a4 http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/libtunepimp-perl_0.3.0-2ubuntu5.1_amd64.deb Size/MD5:65002 f6d69554dc0d49e9b43a8a86d3ad1595 http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp2-dev_0.3.0-2ubuntu5.1_amd64.deb Size/MD5: 307302 524eec25e6670177cef5f3923ca13bcb http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp2_0.3.0-2ubuntu5.1_amd64.deb Size/MD5: 166714 65cc3f239ff8a2e4b71d9681c7a399d4 http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/python-tunepimp_0.3.0-2ubuntu5.1_amd64.deb Size/MD5: 7620 8efc67adb855d09ee6163296d2a5dcc8 http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/python2.3-tunepimp_0.3.0-2ubuntu5.1_amd64.deb Size/MD5:35906 fabd759fc946dc8da916ac4aea98344c http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/python2.4-tunepimp_0.3.0-2ubuntu5.1_amd64.deb Size/MD5:35906 ad81916e88a3041a29aa1d0b0381f807 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp-bin_0.3.0-2ubuntu5.1_i386.deb Size/MD5:22554 3796f87627d72b6e9459242d51275418 http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/libtunepimp-perl_0.3.0-2ubuntu5.1_i386.deb Size/MD5:64308 b05b230b572574f70c70ac2c4b78ab47 http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp2-dev_0.3.0-2ubuntu5.1_i386.deb Size/MD5: 288084 861c09351e62091f262d0672398bfca3 http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp2_0.3.0-2ubuntu5.1_i386.deb Size/MD5: 168370 1e4ec2f407fa1a2798b8e65f2779318b http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/python-tunepimp_0.3.0-2ubuntu5.1_i386.deb Size/MD5: 7604 8b3fd4594225291e6104fc6ae7648308 http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/python2.3-tunepimp_0.3.0-2ubuntu5.1_i386.deb Size/MD5:32092 dcce42ec71c9b3b5fba324e7ad8bc064 http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/python2.4-tunepimp_0.3.0-2ubuntu5.1_i386.deb Size/MD5:32096 0244dc6403cc8f581d010cc049cc9772 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp-bin_0.3.0-2ubuntu5.1_powerpc.deb Size/MD5:25668 d1b3b88f7ea94faa390ac8a818a5b40a http://security.ubuntu.com/ubuntu/pool/universe/libt/libtunepimp/libtunepimp-perl_0.3.0-2ubuntu5.1_powerpc.deb Size/MD5:65456 de067b822941a684b151eacd1627800a http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp2-dev_0.3.0-2ubuntu5.1_powerpc.deb Size/MD5: 310288 ee373226566ebdd026d85339c6194f68 http://security.ubuntu.com/ubuntu/pool/main/libt/libtunepimp/libtunepimp2_0.3.0-2ubuntu5.1_powerpc.deb Size/MD5: 161658 e57125bd48dc6fb43a729f42024d9acf
[Full-disclosure] [USN-316-1] installer vulnerability
=== Ubuntu Security Notice USN-316-1 July 12, 2006 Installer vulnerability https://launchpad.net/bugs/48350 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: passwd 1:4.0.13-7ubuntu3.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Iwan Pieterse discovered that, if you select Go Back at the final message displayed by the alternate or server CD installer (Installation complete) and then continue with the installation from the installer's main menu, the root password is left blank rather than locked. This was due to an error while clearing out the root password from the installer's memory to avoid possible information leaks. Installations from the alternate or server CDs when the user selected Continue when the Installation complete message was first displayed are not affected by this bug. Installations from the desktop CD are not affected by this bug at all. When you upgrade your passwd package to the newest version, it will detect this condition and lock the root password if it was previously blank. The next point release of Ubuntu 6.06 LTS will include a corrected installer. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13-7ubuntu3.2.diff.gz Size/MD5: 204800 1b29e1615364944d98ea95498d6058b8 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13-7ubuntu3.2.dsc Size/MD5: 885 8ccf50d026fa2c4cffe85330f0d0985a http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13.orig.tar.gz Size/MD5: 1622557 034fab52e187e63cb52f153bb7f304c8 http://security.ubuntu.com/ubuntu/pool/main/u/user-setup/user-setup_1.1ubuntu4.dsc Size/MD5: 678 544762def71fb062b6d6f5484a4d7c45 http://security.ubuntu.com/ubuntu/pool/main/u/user-setup/user-setup_1.1ubuntu4.tar.gz Size/MD5:98334 f8d648ce6a9a007740b0e175b92385eb Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/u/user-setup/user-setup-udeb_1.1ubuntu4_all.udeb Size/MD5:79418 4ec2af1d5e09f129d486c142575f4081 http://security.ubuntu.com/ubuntu/pool/main/u/user-setup/user-setup_1.1ubuntu4_all.deb Size/MD5: 161864 bc876d6099a323cebd2ffc94df41db06 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.2_amd64.deb Size/MD5: 249450 bfdba1450cbe14f6c71f5d9dee5df9b3 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.2_amd64.deb Size/MD5: 683510 547ad48ac45f6f11cacbd268f42b152a i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.2_i386.deb Size/MD5: 240938 8500a4c2ab53f11b3fb8cb7fb4e00c78 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.2_i386.deb Size/MD5: 616346 a29d90e0ae7c7c70cbeffcbfba6bf04e powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.2_powerpc.deb Size/MD5: 251380 bd408187e20f19222e2b4fefe8706552 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.2_powerpc.deb Size/MD5: 665158 4975fe8598b4a8adc98fabcee1b4cb8e sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.2_sparc.deb Size/MD5: 239930 85dde4bfa6d09491338f70efe9d6d336 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.2_sparc.deb Size/MD5: 620124 b0fcdadde2568b1a8324e2500718a18b signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-314-1] samba vulnerability
=== Ubuntu Security Notice USN-314-1 July 12, 2006 samba vulnerability CVE-2006-3403 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: samba3.0.10-1ubuntu3.1 Ubuntu 5.10: samba3.0.14a-6ubuntu1.1 Ubuntu 6.06 LTS: samba3.0.22-1ubuntu3.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: The Samba security team reported a Denial of Service vulnerability in the handling of information about active connections. In certain circumstances an attacker could continually increase the memory usage of the smbd process by issuing a large number of share connection requests. By draining all available memory, this could be exploited to render the remote Samba server unusable. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.10-1ubuntu3.1.diff.gz Size/MD5: 107580 f41e99280b44e47c1e1a0c86a56c66de http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.10-1ubuntu3.1.dsc Size/MD5: 978 d516ac96d66dbda1388e861ec8220ee7 http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.10.orig.tar.gz Size/MD5: 15176926 b19fd86d3c11a1b43f75a5988cd9ceeb Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.0.10-1ubuntu3.1_all.deb Size/MD5: 11676712 55beda5b448bd6ef999d76a8e75ad3aa amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/s/samba/libpam-smbpass_3.0.10-1ubuntu3.1_amd64.deb Size/MD5: 372670 7e7a00d1458113ae03ab9ceef1c33f92 http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.10-1ubuntu3.1_amd64.deb Size/MD5: 780744 a9e481451b19277676fe825118b6097b http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.10-1ubuntu3.1_amd64.deb Size/MD5: 590090 8d76d3c3b1215b421a09ad40714ae533 http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.10-1ubuntu3.1_amd64.deb Size/MD5: 5070312 35dfb5c2e732296d16c242af7d1386e7 http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.10-1ubuntu3.1_amd64.deb Size/MD5: 2150094 835196ef9aeac4f16356522cb2d6b493 http://security.ubuntu.com/ubuntu/pool/universe/s/samba/samba-dbg_3.0.10-1ubuntu3.1_amd64.deb Size/MD5: 6390788 5b4cb573a5813c12dbca92895612306e http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.10-1ubuntu3.1_amd64.deb Size/MD5: 2733990 311b65f9c3d9bcfbae6cf527a7101081 http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.10-1ubuntu3.1_amd64.deb Size/MD5: 2813560 a5fdc57b8c3f39a1599685971196cb1f http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.10-1ubuntu3.1_amd64.deb Size/MD5: 403878 39ed8078277f923e533f01c62d96981a http://security.ubuntu.com/ubuntu/pool/universe/s/samba/swat_3.0.10-1ubuntu3.1_amd64.deb Size/MD5: 4062114 94d4663ac08126eae60227429a8e1143 http://security.ubuntu.com/ubuntu/pool/universe/s/samba/winbind_3.0.10-1ubuntu3.1_amd64.deb Size/MD5: 1623058 83d1e2d9b57331a14d50d1a5fd231aff i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/s/samba/libpam-smbpass_3.0.10-1ubuntu3.1_i386.deb Size/MD5: 329214 0a57f5b7ec5c9d426a1a5d0306a0ee72 http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.10-1ubuntu3.1_i386.deb Size/MD5: 704546 84d98ae1dd41a8161ad8ea097dbc8a4e http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.10-1ubuntu3.1_i386.deb Size/MD5: 523310 59e49f6c871b85bf6cb04ee4b264bd39 http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.10-1ubuntu3.1_i386.deb Size/MD5: 4464594 10ded0e61a32f344633d25eb5c6f55a3 http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.10-1ubuntu3.1_i386.deb Size/MD5: 1887970 19f0177cbc0cbcdc795c6fb742512152 http://security.ubuntu.com/ubuntu/pool/universe/s/samba/samba-dbg_3.0.10-1ubuntu3.1_i386.deb Size/MD5: 6543900 7920120df8ae6d539965c199c07d1604 http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.10-1ubuntu3.1_i386.deb Size/MD5: 2355884 d309130e0783d153dc891a9a6a5ecaf3 http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.10-1ubuntu3.1_i386.deb Size/MD5: 2394052 5aa3665da0c4e601c98bceae300d6873
[Full-disclosure] [USN-312-1] gimp vulnerability
=== Ubuntu Security Notice USN-312-1 July 10, 2006 gimp vulnerability CVE-2006-3404 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: gimp 2.2.2-1ubuntu5.1 libgimp2.0 2.2.2-1ubuntu5.1 Ubuntu 5.10: gimp 2.2.8-2ubuntu6.1 libgimp2.0 2.2.8-2ubuntu6.1 Ubuntu 6.06 LTS: gimp 2.2.11-1ubuntu3.1 libgimp2.0 2.2.11-1ubuntu3.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Henning Makholm discovered that gimp did not sufficiently validate the 'num_axes' parameter in XCF files. By tricking a user into opening a specially crafted XCF file with Gimp, an attacker could exploit this to execute arbitrary code with the user's privileges. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1.diff.gz Size/MD5:25366 1c89e7a4876c8922baf9c3be9cce72b9 http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1.dsc Size/MD5: 1053 41cbd27c48207a245d8486d37c3bea44 http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2.orig.tar.gz Size/MD5: 20151209 eccbe0b2438be095222a6723e57c51a3 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-data_2.2.2-1ubuntu5.1_all.deb Size/MD5: 2057404 4d2655688e65317c1cce1f7938c415b3 http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp1.2_2.2.2-1ubuntu5.1_all.deb Size/MD5:23028 c55d030036cc817eba07f15a31cd2ab9 http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-doc_2.2.2-1ubuntu5.1_all.deb Size/MD5: 516766 2bddbe64aae9009428e16f40ff0ac92c amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.2-1ubuntu5.1_amd64.deb Size/MD5:34686 1491899331d67c323414df5625b378ad http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.2-1ubuntu5.1_amd64.deb Size/MD5: 114452 c0d1e1ea2cb6ec1ed06b6327a91e5da6 http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.2-1ubuntu5.1_amd64.deb Size/MD5:34686 c3726bb2cf00dc202439253ab8e5f47f http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1_amd64.deb Size/MD5: 3138104 4cbd06980a263a956eaf2ed8a61fae14 http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.2-1ubuntu5.1_amd64.deb Size/MD5:90072 e876c374828beb7951d8d1bb6323ef00 http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.2-1ubuntu5.1_amd64.deb Size/MD5: 434012 4ef7e7e58e45d192a8877747c432efdf i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.2-1ubuntu5.1_i386.deb Size/MD5:33386 e3249682facaedc43430c2a02f55be4f http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.2-1ubuntu5.1_i386.deb Size/MD5: 108648 883b24c54ef4fec71777d601eca58b64 http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.2-1ubuntu5.1_i386.deb Size/MD5:33806 ff701d78ebb13b876ea4651a00e06dce http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1_i386.deb Size/MD5: 2822064 333aba3cca28c59606ef01e688a98fdc http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.2-1ubuntu5.1_i386.deb Size/MD5:90074 13fa37935cb5334bd13406119f326bee http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.2-1ubuntu5.1_i386.deb Size/MD5: 404102 a9812964cf7257f5ae9609a95efb6a0f powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.2-1ubuntu5.1_powerpc.deb Size/MD5:34918 d46155c0c3ec7e265972c27156255595 http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.2-1ubuntu5.1_powerpc.deb Size/MD5: 110434 d0c4290c8a30db183db627df47b901ce http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.2-1ubuntu5.1_powerpc.deb Size/MD5:35606 c8f11092c804ba676de10fb0ee0206e5 http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1_powerpc.deb Size/MD5: 3208564 ee4badf2b0ccaebd84dabeb123f5e98a http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.2-1ubuntu5.1_powerpc.deb Size/MD5:90100 073cc2a24d7be2923c1a1750661bbc9e
[Full-disclosure] [USN-308-1] shadow vulnerability
=== Ubuntu Security Notice USN-308-1 July 05, 2006 shadow vulnerability === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: passwd 1:4.0.3-30.7ubuntu16.1 Ubuntu 5.10: passwd 1:4.0.3-37ubuntu10 Ubuntu 6.06 LTS: passwd 1:4.0.13-7ubuntu3.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Ilja van Sprundel discovered that passwd, when called with the -f, -g, or -s option, did not check the result of the setuid() call. On systems that configure PAM limits for the maximum number of user processes, a local attacker could exploit this to execute chfn, gpasswd, or chsh with root privileges. This does not affect the default configuration of Ubuntu. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-30.7ubuntu16.1.diff.gz Size/MD5: 1161448 adba4705f1491691a39f471ffc92c09b http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-30.7ubuntu16.1.dsc Size/MD5: 786 f3f8c3843a16523e8b09bc73c664646e http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3.orig.tar.gz Size/MD5: 1045704 b52dfb2e5e8d9a4a2aae0ca1b266c513 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/s/shadow/initial-passwd-udeb_4.0.3-30.7ubuntu16.1_all.udeb Size/MD5:67204 433e3ad008f269d3879b4b36e863b6b0 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-30.7ubuntu16.1_amd64.deb Size/MD5: 172388 1ae1307fe20ec93ee5cda9674bff7d31 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-30.7ubuntu16.1_amd64.deb Size/MD5: 591158 07c3c7e5326d116619376f750191881c i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-30.7ubuntu16.1_i386.deb Size/MD5: 162780 d65e55fb3fd9a6d8c58a8f0117a0b63d http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-30.7ubuntu16.1_i386.deb Size/MD5: 513386 93d96b05b65825f12aa0c43c9a4c07ee powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-30.7ubuntu16.1_powerpc.deb Size/MD5: 171348 0f3c8f157ac3b1717334521587cede0d http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-30.7ubuntu16.1_powerpc.deb Size/MD5: 558434 91148b7d12fc0a405ecc6009fddb8915 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-37ubuntu10.diff.gz Size/MD5: 1070307 8b2fb08f4314b8a5d7d0228e516d254e http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-37ubuntu10.dsc Size/MD5: 877 dcd588a15b6a706215191df0b1aa91d7 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3.orig.tar.gz Size/MD5: 1045704 b52dfb2e5e8d9a4a2aae0ca1b266c513 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/s/shadow/initial-passwd-udeb_4.0.3-37ubuntu10_all.udeb Size/MD5: 1828 82abf8eb28a61b8fbe00c0c85b85099a amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu10_amd64.deb Size/MD5: 180932 2cdc5bc553c305ad71601eab30d91ecc http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu10_amd64.deb Size/MD5: 590358 afa8b5c3552db22b12ce6ed3ac16dc7e i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu10_i386.deb Size/MD5: 172160 573cb37f61f18087fc2e42ee1e0a8c3a http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu10_i386.deb Size/MD5: 515976 0fb3906bfd5a1c9992a34119460161d6 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu10_powerpc.deb Size/MD5: 180218 d71a7d3615c0433e9c9c360316d45619 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu10_powerpc.deb Size/MD5: 568772 e3599c6460d3fa76c141948e0dd0647f sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu10_sparc.deb Size/MD5: 173624 ed7f31e26778d7b90825a8047dd132e9 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu10_sparc.deb Size/MD5: 525696
[Full-disclosure] [USN-309-1] libmms vulnerability
=== Ubuntu Security Notice USN-309-1 July 05, 2006 libmms vulnerability CVE-2006-2200 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: libmms00.1-0ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Several buffer overflows were found in libmms. By tricking a user into opening a specially crafted remote multimedia stream with an application using libmms, a remote attacker could overwrite an arbitrary memory portion with zeros, thereby crashing the program. In Ubuntu 5.10, this affects the GStreamer MMS plugin (gstreamer0.8-mms). Other Ubuntu releases do not support this library. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms_0.1-0ubuntu1.1.diff.gz Size/MD5: 4933 76da674c4ce46f604acb09b473f72f1d http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms_0.1-0ubuntu1.1.dsc Size/MD5: 607 3f7b2613ed4bda8a5d943141aa85d2d5 http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms_0.1.orig.tar.gz Size/MD5: 317089 ebd88537af9875265e41ee65603ecd1a amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms-dev_0.1-0ubuntu1.1_amd64.deb Size/MD5:19656 5f4757ce0808238ce09df147b0a16251 http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms0_0.1-0ubuntu1.1_amd64.deb Size/MD5:16042 bd2e57f384bad19a121b3d93c6ff7ec8 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms-dev_0.1-0ubuntu1.1_i386.deb Size/MD5:18078 30ea92c953e77a62cea90060c5ffe195 http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms0_0.1-0ubuntu1.1_i386.deb Size/MD5:14840 645668e9bf1b15cd3e7993bc8e66c6bd powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms-dev_0.1-0ubuntu1.1_powerpc.deb Size/MD5:20206 ee2b12725fce1f2eb94a4fbf6e10 http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms0_0.1-0ubuntu1.1_powerpc.deb Size/MD5:17700 013e1564d0aa094eddf28ae0723e264b sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms-dev_0.1-0ubuntu1.1_sparc.deb Size/MD5:19894 b0e5d23a750dad2a0e2fa528e4ba9e02 http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms0_0.1-0ubuntu1.1_sparc.deb Size/MD5:16176 3246a55286c83b1ff2b3a6fc47ee4241 signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-307-1] mutt vulnerability
=== Ubuntu Security Notice USN-307-1 June 28, 2006 mutt vulnerability http://secunia.com/advisories/20810 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: mutt 1.5.6-20040907+2ubuntu0.1 Ubuntu 5.10: mutt 1.5.9-2ubuntu1.1 Ubuntu 6.06 LTS: mutt 1.5.11-3ubuntu2.1 After a standard system upgrade you need to restart mutt to effect the necessary changes. Details follow: TAKAHASHI Tamotsu discovered that mutt's IMAP backend did not sufficiently check the validity of namespace strings. If an user connects to a malicious IMAP server, that server could exploit this to crash mutt or even execute arbitrary code with the privileges of the mutt user. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.6-20040907+2ubuntu0.1.diff.gz Size/MD5: 416375 64e6905e87d3b10d59f920b24baba212 http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.6-20040907+2ubuntu0.1.dsc Size/MD5: 794 90d6fdf6ed6ed8066217424251b5f70c http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.6.orig.tar.gz Size/MD5: 2908273 1df09da057a96ef35c4d347779c314a9 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.6-20040907+2ubuntu0.1_amd64.deb Size/MD5: 710852 41183be381c5ba75a1a370e1af65b0c2 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.6-20040907+2ubuntu0.1_i386.deb Size/MD5: 669278 03cc903858ad0243209209ab9de628e1 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.6-20040907+2ubuntu0.1_powerpc.deb Size/MD5: 715092 3506f6ca75eb05c61e3842a089d0e0a0 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.1.diff.gz Size/MD5:93197 655e867ac1e488c5ab37088a2bfb6c08 http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.1.dsc Size/MD5: 781 b4b263c27a300e31e649f93fad8ebeb6 http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9.orig.tar.gz Size/MD5: 3033253 587dd1d8f44361b73b82ef64eb30c3a0 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.1_amd64.deb Size/MD5: 730970 43ff1cfac57392b942729e74fa469598 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.1_i386.deb Size/MD5: 679380 a5230b99c9384aceaa5afb074369386a powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.1_powerpc.deb Size/MD5: 724474 ea2ecb5f204eb66b9ecfb8de8e36e4e8 Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.1.diff.gz Size/MD5: 416978 5580d195c109c523948a28b967f6f9fb http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.1.dsc Size/MD5: 751 d1b22f97bb807fb6d4f81f735b3f1a66 http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11.orig.tar.gz Size/MD5: 3187076 30f165fdfaf474521a640f1f3886069a amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.1_amd64.deb Size/MD5: 960128 2ce3a523e12f5e1493381f36f00cd189 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.1_i386.deb Size/MD5: 907296 da20b1b549edee817d1b1c87e6d13537 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.1_powerpc.deb Size/MD5: 956104 a331b93132b08dbac6bcdf5fc125e5c4 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.1_sparc.deb Size/MD5: 924652 37de7b45c27daae34f8c96114cc2536b signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-305-1] OpenLDAP vulnerability
=== Ubuntu Security Notice USN-305-1 June 27, 2006 openldap2, openldap2.2 vulnerability CVE-2006-2754 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: slapd 2.1.30-3ubuntu3.2 Ubuntu 5.10: slapd 2.2.26-3ubuntu0.1 Ubuntu 6.06 LTS: slapd 2.2.26-5ubuntu2.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: When processing overly long host names in OpenLDAP's slurpd replication server, a buffer overflow caused slurpd to crash. If an attacker manages to inject a specially crafted host name into slurpd, this might also be exploited to execute arbitrary code with slurpd's privileges; however, since slurpd is usually set up to replicate only trusted machines, this should not be exploitable in normal cases. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/openldap2_2.1.30-3ubuntu3.2.diff.gz Size/MD5: 117693 811feb51c50318d90b2f8d3955bd2cd4 http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/openldap2_2.1.30-3ubuntu3.2.dsc Size/MD5: 988 772bf522a7b5211787dc7272ea0b71cb http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/openldap2_2.1.30.orig.tar.gz Size/MD5: 2044673 e2ae8148c4bed07d7a70edd930bdc403 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libslapd2-dev_2.1.30-3ubuntu3.2_all.deb Size/MD5:72546 3fe7d6a3e99f1d49d049127af41a8334 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/ldap-utils_2.1.30-3ubuntu3.2_amd64.deb Size/MD5: 126502 b78a3e1a2d62ba78ca38842ba9c7b05a http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libldap2-dev_2.1.30-3ubuntu3.2_amd64.deb Size/MD5: 361334 2d589dc600e42bc19024170fcb728d39 http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libldap2_2.1.30-3ubuntu3.2_amd64.deb Size/MD5: 309204 c13675910f7c21bb3e723592c6e495f2 http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/slapd_2.1.30-3ubuntu3.2_amd64.deb Size/MD5: 1088128 a3b2230434033fd0070d643b3c09c1d4 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/ldap-utils_2.1.30-3ubuntu3.2_i386.deb Size/MD5: 110870 7cbb5b6f1ba2118946c6811076b701fa http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libldap2-dev_2.1.30-3ubuntu3.2_i386.deb Size/MD5: 318170 8dab1fcba483d48cac5bcda3b0c4a58c http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libldap2_2.1.30-3ubuntu3.2_i386.deb Size/MD5: 284732 301a45c6f09a37332ea5a7b184e8c176 http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/slapd_2.1.30-3ubuntu3.2_i386.deb Size/MD5: 979438 ff72cd74acd311e16307286b6c598130 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/ldap-utils_2.1.30-3ubuntu3.2_powerpc.deb Size/MD5: 129774 2b223fe63713e7f4cfbdb434b251d69e http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libldap2-dev_2.1.30-3ubuntu3.2_powerpc.deb Size/MD5: 373308 bb5106479b3f3928f8eaf247a2c9af01 http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/libldap2_2.1.30-3ubuntu3.2_powerpc.deb Size/MD5: 302964 73c3c1603cd8a00e4a49f6486676ecb6 http://security.ubuntu.com/ubuntu/pool/main/o/openldap2/slapd_2.1.30-3ubuntu3.2_powerpc.deb Size/MD5: 1058408 e483f9a6ecbee4aee2dd196b399e15ed Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openldap2.2/openldap2.2_2.2.26-3ubuntu0.1.diff.gz Size/MD5: 495731 9e5ff179d3930bba207a013a9361f5b0 http://security.ubuntu.com/ubuntu/pool/main/o/openldap2.2/openldap2.2_2.2.26-3ubuntu0.1.dsc Size/MD5: 1020 23742091bec8567bf0dfc5326657fb12 http://security.ubuntu.com/ubuntu/pool/main/o/openldap2.2/openldap2.2_2.2.26.orig.tar.gz Size/MD5: 2626629 afc8700b5738da863b30208e1d3e9de8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/o/openldap2.2/ldap-utils_2.2.26-3ubuntu0.1_amd64.deb Size/MD5: 129756 57ed4fbea2a6c2b0de87878fc81417da http://security.ubuntu.com/ubuntu/pool/main/o/openldap2.2/libldap-2.2-7_2.2.26-3ubuntu0.1_amd64.deb Size/MD5: 164128 6e18cf1741f0b0dd7ab88279b052a1a3 http://security.ubuntu.com/ubuntu/pool/main/o/openldap2.2/slapd_2.2.26-3ubuntu0.1_amd64.deb Size/MD5: 954370
[Full-disclosure] [USN-306-1] MySQL 4.1 vulnerability
=== Ubuntu Security Notice USN-306-1 June 27, 2006 mysql-dfsg-4.1 vulnerability CVE-2006-3081 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: mysql-server-4.1 4.1.12-1ubuntu3.6 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: MySQL did not correctly handle NULL as the second argument to the str_to_date() function. An authenticated user could exploit this to crash the server. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.6.diff.gz Size/MD5: 164878 463c3768464221d0825dbf8fd153432e http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.6.dsc Size/MD5: 1024 5e533d4f9d9fd83c67d4119a39625e2c http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12.orig.tar.gz Size/MD5: 15921909 c7b83a19bd8a4f42d5d64c239d05121f Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.12-1ubuntu3.6_all.deb Size/MD5:36742 b96636b4d38a0f45cd5607f26018101a amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.6_amd64.deb Size/MD5: 5831370 d23061f89f903c9808b6768dd6d92335 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.6_amd64.deb Size/MD5: 1540608 ff3bdbcec7d80ee656fff71318db5f9a http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.6_amd64.deb Size/MD5: 898350 2dbf1c511e23d4d0134979b7ec660264 http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.6_amd64.deb Size/MD5: 18433714 158ce4bd992fe64a8695687e82d2ef94 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.6_i386.deb Size/MD5: 5348044 41d20999de86b8f7983f62b756212cd1 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.6_i386.deb Size/MD5: 1475378 3057a66edc7863f8695d03aec050d0f5 http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.6_i386.deb Size/MD5: 866354 8c84ad0649a119fd0370d33756a9c1cb http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.6_i386.deb Size/MD5: 17336250 b1bc484bceaf8a4debdbb1d58d637dd0 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.6_powerpc.deb Size/MD5: 6069148 7d5d032fb8f0bed0c3efa6911578854c http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.6_powerpc.deb Size/MD5: 1549044 be30993f7e8f207d99f11b43282b5f00 http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.6_powerpc.deb Size/MD5: 937622 fb4802c64825f7e4127bbd15b656d214 http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.6_powerpc.deb Size/MD5: 18523392 31b331faba3c77b55e126b84d24ce223 signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-304-1] gnupg vulnerability
=== Ubuntu Security Notice USN-304-1 June 26, 2006 gnupg vulnerability CVE-2006-3082 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: gnupg 1.2.5-3ubuntu5.4 Ubuntu 5.10: gnupg 1.4.1-1ubuntu1.3 Ubuntu 6.06 LTS: gnupg 1.4.2.2-1ubuntu2.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Evgeny Legerov discovered that GnuPG did not sufficiently check overly large user ID packets. Specially crafted user IDs caused a buffer overflow. By tricking an user or remote automated system into processing a malicous GnuPG message, an attacker could exploit this to crash GnuPG or possibly even execute arbitrary code. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.4.diff.gz Size/MD5:66657 258c3a5166f20a0859a3137a0154e661 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.4.dsc Size/MD5: 654 7d0e00dfc3d9c8008fa863ad082a8244 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5.orig.tar.gz Size/MD5: 3645308 9109ff94f7a502acd915a6e61d28d98a amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.4_amd64.deb Size/MD5: 805972 eb80d914280ca0d14e518c2517303fca http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.2.5-3ubuntu5.4_amd64.udeb Size/MD5: 146410 b1fe302ef21bb1b2a861dca1648671c8 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.4_i386.deb Size/MD5: 750660 f7799aacd286de91cf1590d47f092fbf http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.2.5-3ubuntu5.4_i386.udeb Size/MD5: 121398 d3908ec7b4a400c372a88790cd5c powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.2.5-3ubuntu5.4_powerpc.deb Size/MD5: 806578 76656bbbce1e59dee14a07c4d06c9169 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.2.5-3ubuntu5.4_powerpc.udeb Size/MD5: 135516 57192001042e37f1597cbe8d4cc96397 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.3.diff.gz Size/MD5:21031 d2e00314a6319c80e40af374299b3cdb http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.3.dsc Size/MD5: 684 65b8ffc1c7f51d2920496eddadfb1236 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1.orig.tar.gz Size/MD5: 4059170 1cc77c6943baaa711222e954bbd785e5 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.3_amd64.deb Size/MD5: 1136302 5b871cea504e1b520ac61ee0ace19452 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.3_amd64.udeb Size/MD5: 152178 97622cf5abc3f4923281d08536f816c0 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.3_i386.deb Size/MD5: 1044392 30c94fae4dbc994eed85d226b226a938 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.3_i386.udeb Size/MD5: 130644 216ff1f2393a2dd5bf5c814a5f33ae9f powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.3_powerpc.deb Size/MD5: 1119498 67ad3b4a3254334e85bd659e24a65bea http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.3_powerpc.udeb Size/MD5: 140162 38a01b4e3f447f6cd340d6d17b714180 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.3_sparc.deb Size/MD5: 1064176 4e4e2671d46f266792d6693208bd5b34 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.3_sparc.udeb Size/MD5: 139584 9d840a2108b3d999e8b0ad620a262f69 Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.1.diff.gz Size/MD5:19943 a04a4bdf67d9e86d15c8b89312b455e5 http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.1.dsc Size/MD5: 692 90847403acb4d359f8b75ad345985b9d http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2.orig.tar.gz
[Full-disclosure] [USN-303-1] MySQL vulnerability
=== Ubuntu Security Notice USN-303-1 June 16, 2006 mysql-dfsg-4.1, mysql-dfsg-5.0 vulnerability CVE-2006-2753 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: libmysqlclient14 4.1.12-1ubuntu3.5 mysql-server-4.1 4.1.12-1ubuntu3.5 Ubuntu 6.06 LTS: libmysqlclient15off5.0.22-0ubuntu6.06 mysql-server-5.0 5.0.22-0ubuntu6.06 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: An SQL injection vulnerability has been discovered when using less popular multibyte encodings (such as SJIS, or BIG5) which contain valid multibyte characters that end with the byte 0x5c (the representation of the backslash character \ in ASCII). Many client libraries and applications use the non-standard, but popular way of escaping the ' character by replacing all occurences of it with \'. If a client application uses one of the affected encodings and does not interpret multibyte characters, and an attacker supplies a specially crafted byte sequence as an input string parameter, this escaping method would then produce a validly-encoded character and an excess ' character which would end the string. All subsequent characters would then be interpreted as SQL code, so the attacker could execute arbitrary SQL commands. The updated packages fix the mysql_real_escape_string() function to escape quote characters in a safe way. If you use third-party software which uses an ad-hoc method of string escaping, you should convert them to use mysql_real_escape_string() instead, or at least use the standard SQL method of escaping ' with ''. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.5.diff.gz Size/MD5: 164408 5397489739ab8a6fa1e2d7571ae16ca2 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.5.dsc Size/MD5: 1024 22dc09e63f2b4127c80c059bd6153c04 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12.orig.tar.gz Size/MD5: 15921909 c7b83a19bd8a4f42d5d64c239d05121f Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.12-1ubuntu3.5_all.deb Size/MD5:36658 8445340ee40a549040a29f7f89fa6055 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.5_amd64.deb Size/MD5: 5831402 04b5f068cace48115f03eaa2945ba4f7 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.5_amd64.deb Size/MD5: 1540532 52379ea5384399887a5044e2dc70a362 http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.5_amd64.deb Size/MD5: 898266 102c1f4e3a52f002c0072639a38fd1f1 http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.5_amd64.deb Size/MD5: 18433534 0b59eb84f010a37866855db11bc212d4 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.5_i386.deb Size/MD5: 5347970 10e3a08014562d78a92c78f9473606ad http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.5_i386.deb Size/MD5: 1475306 fe18f1652d49ce4f1f01f1fb41293ee0 http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.5_i386.deb Size/MD5: 866276 c4620364312b32767f4b8c93ca85ea6a http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.5_i386.deb Size/MD5: 17336092 c0a7e15a536c68f101d711faca79acd0 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.5_powerpc.deb Size/MD5: 6069036 84fe04fd9e556e03a5f8017b0287056e http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.5_powerpc.deb Size/MD5: 1548894 042a41167cffb3aa116ceca7b144c04a http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.5_powerpc.deb Size/MD5: 937510 b42029e8720887a9414a1e5affdfa2bf http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.5_powerpc.deb Size/MD5: 18523172 687d56f3e0ea63af4bc5d972849e7019 sparc architecture
[Full-disclosure] [USN-297-2] Thunderbird extensions update for recent security update
=== Ubuntu Security Notice USN-297-2 June 15, 2006 mozilla-thunderbird, thunderbird-quickfile updates === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: mozilla-thunderbird-inspector 1.5.0.4-0ubuntu6.06.1 mozilla-thunderbird-typeaheadfind 1.5.0.4-0ubuntu6.06.1 thunderbird-quickfile 0.15-0ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: USN-297-1 fixed some security vulnerabilities in Thunderbird. This update provides new versions of packaged extensions which work with the current Thunderbird version. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.1.diff.gz Size/MD5: 454261 c63c59380c972f4b4dc998a512aa6b3e http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.1.dsc Size/MD5: 962 85cc9ee64d60ad3ef8992479646d9ff3 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4.orig.tar.gz Size/MD5: 35231284 243305d4d6723a45fcb1028caa3abca6 http://security.ubuntu.com/ubuntu/pool/universe/t/thunderbird-quickfile/thunderbird-quickfile_0.15-0ubuntu1.1.diff.gz Size/MD5:10126 03cd2c65730b98d600f4adaf20a6ecdd http://security.ubuntu.com/ubuntu/pool/universe/t/thunderbird-quickfile/thunderbird-quickfile_0.15-0ubuntu1.1.dsc Size/MD5: 666 689f253ea9090b6ac40f48a544717ab4 http://security.ubuntu.com/ubuntu/pool/universe/t/thunderbird-quickfile/thunderbird-quickfile_0.15.orig.tar.gz Size/MD5:17269 8713f601ad35032cae30519eec2d06a4 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/t/thunderbird-quickfile/thunderbird-quickfile_0.15-0ubuntu1.1_all.deb Size/MD5:18896 d4b7eaca55d1aceed4b1f84046552b0d amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.4-0ubuntu6.06.1_amd64.deb Size/MD5: 3524638 2b842f2ae5785be8fbb7d563f371c018 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.4-0ubuntu6.06.1_amd64.deb Size/MD5: 193284 78b4f24eb45219c53fc4869e2ed1fcba http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.4-0ubuntu6.06.1_amd64.deb Size/MD5:58508 656649e2e1a4d07a1d6c33fccc7cd81d http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.1_amd64.deb Size/MD5: 11962550 a28e55f6d1d77192124d9dabd2a26db6 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.4-0ubuntu6.06.1_i386.deb Size/MD5: 3516874 4ac8fab207c26aae9935ccbac736bb4b http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.4-0ubuntu6.06.1_i386.deb Size/MD5: 186664 55d63936c5fbc8161c6cb9b76e11 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.4-0ubuntu6.06.1_i386.deb Size/MD5:54026 f588502ac5e7818405b611ca656efadd http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.1_i386.deb Size/MD5: 10269508 9b54f2f3413fd3980f8aee5a5ff51e80 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.4-0ubuntu6.06.1_powerpc.deb Size/MD5: 3521666 7ecd880e86a3ec94cd52f6551786c068 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.4-0ubuntu6.06.1_powerpc.deb Size/MD5: 190002 2dbb9232a43b6e094cf1a1265ccda5f1 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.4-0ubuntu6.06.1_powerpc.deb Size/MD5:57606 40b9debb92d3a0711e3c7e8a1ce07f2f http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.1_powerpc.deb Size/MD5: 11536310 d8f9698d5e5e20694d6812a605941d20 signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-297-1] Thunderbird vulnerabilities
=== Ubuntu Security Notice USN-297-1 June 13, 2006 mozilla-thunderbird vulnerabilities CVE-2006-2775, CVE-2006-2776, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2781, CVE-2006-2783, CVE-2006-2786, CVE-2006-2787 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: mozilla-thunderbird1.5.0.4-0ubuntu6.06 mozilla-thunderbird-enigmail 2:0.94-0ubuntu4.1 After a standard system upgrade you need to restart Thunderbird to effect the necessary changes. Please note that Thunderbird 1.0.8 in Ubuntu 5.10 and Ubuntu 5.04 are also affected by these problems. Updates for these Ubuntu releases will be delayed due to upstream dropping support for this Thunderbird version. We strongly advise that you disable JavaScript to disable the attack vectors for most vulnerabilities if you use one of these Ubuntu versions. Details follow: Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL. A malicious web site could exploit this to execute arbitrary code with the privileges of the user. (MFSA 2006-35, CVE-2006-2775) Paul Nickerson discovered that content-defined setters on an object prototype were getting called by privileged UI code. It was demonstrated that this could be exploited to run arbitrary web script with full user privileges (MFSA 2006-37, CVE-2006-2776). Mikolaj Habryn discovered a buffer overflow in the crypto.signText() function. By sending an email with malicious JavaScript to an user, and that user enabled JavaScript in Thunderbird (which is not the default and not recommended), this could potentially be exploited to execute arbitrary code with the user's privileges. (MFSA 2006-38, CVE-2006-2778) The Mozilla developer team discovered several bugs that lead to crashes with memory corruption. These might be exploitable by malicious web sites to execute arbitrary code with the privileges of the user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780) Masatoshi Kimura discovered a memory corruption (double-free) when processing a large VCard with invalid base64 characters in it. By sending a maliciously crafted set of VCards to a user, this could potentially be exploited to execute arbitrary code with the user's privileges. (MFSA 2006-40, CVE-2006-2781) Masatoshi Kimura found a way to bypass web input sanitizers which filter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)' characters into the HTML code (e. g. 'scr[BOM]ipt'), these filters might not recognize the tags anymore; however, Thunderbird would still execute them since BOM markers are filtered out before processing a mail containing JavaScript. (MFSA 2006-42, CVE-2006-2783) Kazuho Oku discovered various ways to perform HTTP response smuggling when used with certain proxy servers. Due to different interpretation of nonstandard HTTP headers in Thunderbird and the proxy server, a malicious HTML email can exploit this to send back two responses to one request. The second response could be used to steal login cookies or other sensitive data from another opened web site. (MFSA 2006-33, CVE-2006-2786) It was discovered that JavaScript run via EvalInSandbox() can escape the sandbox. Malicious scripts received in emails containing JavaScript could use these privileges to execute arbitrary code with the user's privileges. (MFSA 2006-31, CVE-2006-2787) The enigmail plugin has been updated to work with the new Thunderbird version. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.diff.gz Size/MD5: 454199 909966693eff8a078ba864ad117ce739 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4-0ubuntu6.06.dsc Size/MD5: 958 e4f852b4bab77b9623cc341c20bc09d9 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.4.orig.tar.gz Size/MD5: 35231284 243305d4d6723a45fcb1028caa3abca6 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu4.1.diff.gz Size/MD5:20665 cdfe87eb65540f718072e34e02934992 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94-0ubuntu4.1.dsc Size/MD5: 782 8fb6b5df3c43f49a66ccf53ba5668b30 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.94.orig.tar.gz Size/MD5: 3126659 7e34cbe51f5a1faca2e26fa0edfd6a06 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.4-0ubuntu6.06_amd64.deb
[Full-disclosure] [USN-288-4] dovecot regression fix
=== Ubuntu Security Notice USN-288-4 June 13, 2006 dovecot regression https://launchpad.net/bugs/49601 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: dovecot-common 1.0.beta3-3ubuntu5.2 dovecot-imapd 1.0.beta3-3ubuntu5.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: USN-288-3 fixed a vulnerability in dovecot. Unfortunately the Ubuntu 6.06 update had a regression which caused authentication using a MySQL database to not work any more. This update fixes this again. We apologize for the inconvenience. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_1.0.beta3-3ubuntu5.2.diff.gz Size/MD5: 467460 6721c3917554e5383eff0d3d759393d5 http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_1.0.beta3-3ubuntu5.2.dsc Size/MD5: 869 0f74b95d1df45200b3d51cb5764810a8 http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_1.0.beta3.orig.tar.gz Size/MD5: 1360574 5418f9f7fe99e4f10bb82d9fe504138a amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.beta3-3ubuntu5.2_amd64.deb Size/MD5: 962458 24260c2d9be324071aef41db2d826504 http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.beta3-3ubuntu5.2_amd64.deb Size/MD5: 532464 b64008d2dd30299f0b70c2c34b3e92c0 http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.beta3-3ubuntu5.2_amd64.deb Size/MD5: 500614 10f84f165e8ade71ba000cc58573a0da i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.beta3-3ubuntu5.2_i386.deb Size/MD5: 838384 5f2b8dea89b9d219388a80d33a324129 http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.beta3-3ubuntu5.2_i386.deb Size/MD5: 485658 41cc4e3627b97756eaa2212ef72828c9 http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.beta3-3ubuntu5.2_i386.deb Size/MD5: 456374 7a146a5435886b5bf63b49ea13fa76b4 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.beta3-3ubuntu5.2_powerpc.deb Size/MD5: 940784 50a122950e2f40511c001924b6926254 http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.beta3-3ubuntu5.2_powerpc.deb Size/MD5: 526264 b7b0db3dc64507d906893dd434389c4d http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.beta3-3ubuntu5.2_powerpc.deb Size/MD5: 493950 7a52a6532ed3e5ff02417e59860b7c29 signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-298-1] libgd2 vulnerability
=== Ubuntu Security Notice USN-298-1 June 13, 2006 libgd2 vulnerability CVE-2006-2906 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libgd2-noxpm 2.0.33-1.1ubuntu1.5.04 libgd2-xpm 2.0.33-1.1ubuntu1.5.04 Ubuntu 5.10: libgd2-noxpm 2.0.33-1.1ubuntu1.5.10 libgd2-xpm 2.0.33-1.1ubuntu1.5.10 Ubuntu 6.06 LTS: libgd2-noxpm 2.0.33-2ubuntu5.1 libgd2-xpm 2.0.33-2ubuntu5.1 After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: Xavier Roche discovered that libgd's function for reading GIF image data did not sufficiently verify its validity. Specially crafted GIF images could cause an infinite loop which used up all available CPU resources. Since libgd is often used in PHP and Perl web applications, this could lead to a remote Denial of Service vulnerability. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-1.1ubuntu1.5.04.diff.gz Size/MD5: 259535 85c0f13b7f7ba029f629311c29708a0e http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-1.1ubuntu1.5.04.dsc Size/MD5: 897 6e3fa540918cab2297fbdd77f87ea6c6 http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33.orig.tar.gz Size/MD5: 587617 be0a6d326cd8567e736fbc75df0a5c45 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-dev_2.0.33-1.1ubuntu1.5.04_all.deb Size/MD5: 128566 741f8358ae222a0ff9ff3e679e50e508 http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd2_2.0.33-1.1ubuntu1.5.04_all.deb Size/MD5: 128546 d1fd6ab0661d2cfeaca8dfd2cf2b4c29 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-1.1ubuntu1.5.04_amd64.deb Size/MD5: 142554 fc8552468de8c3ff44249eb8bd4f84a0 http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1ubuntu1.5.04_amd64.deb Size/MD5: 338004 8abf135ee9e18ebd575dc5c8af7458db http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1ubuntu1.5.04_amd64.deb Size/MD5: 197030 d8836969867424381f0bd1c9e201bc8c http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1ubuntu1.5.04_amd64.deb Size/MD5: 340906 81be91de25d223b9dfb3aeb7a4cbcece http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-1.1ubuntu1.5.04_amd64.deb Size/MD5: 199468 aca7a9bb0dd0b286eba82014d3cbb0b8 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-1.1ubuntu1.5.04_i386.deb Size/MD5: 141060 71c2e67f310a0641b83f73c801174f76 http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1ubuntu1.5.04_i386.deb Size/MD5: 329156 ee26bcd67da3925975e38fc73a26c71e http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1ubuntu1.5.04_i386.deb Size/MD5: 190724 98e8381effd02adcbc4358cf6890a882 http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1ubuntu1.5.04_i386.deb Size/MD5: 330550 54689d29b260877e48c80d824cd384fe http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-1.1ubuntu1.5.04_i386.deb Size/MD5: 193258 53e97869e636c7ff19a03123bb50cf69 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-1.1ubuntu1.5.04_powerpc.deb Size/MD5: 150322 d47b3079e9403f954932b30b59ce2dc0 http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1ubuntu1.5.04_powerpc.deb Size/MD5: 341558 0b936726f765f2a43b76c128d9dbd1e1 http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1ubuntu1.5.04_powerpc.deb Size/MD5: 198802 cc4bdacf9c062630aa0abe0f603c21d7 http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1ubuntu1.5.04_powerpc.deb Size/MD5: 344204 36df75287c80b2bfe6ce6e055e316686 http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-1.1ubuntu1.5.04_powerpc.deb Size/MD5: 200872 4986d671d0f86482e77fe8bfa9aa8570 Updated packages for Ubuntu 5.10: Source archives:
[Full-disclosure] [USN-299-1] dhcdbd vulnerability
=== Ubuntu Security Notice USN-299-1 June 13, 2006 dhcdbd vulnerability https://launchpad.net/bugs/49104 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: dhcdbd 1.10-0ubuntu11.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Florian Hackenberger discovered a memory corruption bug in dhcdbd (the NetworkManager daemon for processing DHCP operations). Invalid DHCP responses crashed dhcdbd, which caused NetworkManager to not work any more. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/d/dhcdbd/dhcdbd_1.10-0ubuntu11.1.diff.gz Size/MD5: 5760 6f361c05e336353ac3552c9bc248319d http://security.ubuntu.com/ubuntu/pool/main/d/dhcdbd/dhcdbd_1.10-0ubuntu11.1.dsc Size/MD5: 608 e267063fb19c930c18f4484e4c7fe861 http://security.ubuntu.com/ubuntu/pool/main/d/dhcdbd/dhcdbd_1.10.orig.tar.gz Size/MD5:70160 d54941e97507bfdd2458839591e1fd60 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/d/dhcdbd/dhcdbd_1.10-0ubuntu11.1_amd64.deb Size/MD5:49386 bf512d561eba57cc5f74e97be95fcc06 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/d/dhcdbd/dhcdbd_1.10-0ubuntu11.1_i386.deb Size/MD5:43042 631f10b839b26e1423a21ceedbeb3cab powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/d/dhcdbd/dhcdbd_1.10-0ubuntu11.1_powerpc.deb Size/MD5:47644 43937e8d74230cdc3cf902917a4f4a0f signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-300-1] wv2 vulnerability
=== Ubuntu Security Notice USN-300-1 June 14, 2006 wv2 vulnerability CVE-2006-2197 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libwv2-1 0.2.2-1ubuntu1.1 libwv2-dev 0.2.2-1ubuntu1.1 Ubuntu 5.10: libwv2-1c2 0.2.2-1ubuntu2.1 libwv2-dev 0.2.2-1ubuntu2.1 Ubuntu 6.06 LTS: libwv2-1c2 0.2.2-5ubuntu0.1 libwv2-dev 0.2.2-5ubuntu0.1 After a standard system upgrade you need to restart KWord to effect the necessary changes. Details follow: libwv2 did not sufficiently check the validity of its input. Certain invalid Word documents caused a buffer overflow. By tricking a user into opening a specially crafted Word file with an application that uses libwv2, this could be exploited to execute arbitrary code with the user's privileges. The only packaged application using this library is KWord. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/wv2_0.2.2-1ubuntu1.1.diff.gz Size/MD5:16104 63df0ae571a2b6aeec69f9cb2373d1b9 http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/wv2_0.2.2-1ubuntu1.1.dsc Size/MD5: 661 b65ca0f07e82728296575737442c23b5 http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/wv2_0.2.2.orig.tar.gz Size/MD5: 855198 45fdc6df614f91e94d3b978dd8414e3b amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/libwv2-1_0.2.2-1ubuntu1.1_amd64.deb Size/MD5: 243364 6e29b4a9882dce4dffc6d946e0957ca6 http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/libwv2-dev_0.2.2-1ubuntu1.1_amd64.deb Size/MD5: 183310 5e2b9cbb4f2548b48f0c1c5d34d08c20 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/libwv2-1_0.2.2-1ubuntu1.1_i386.deb Size/MD5: 232014 af559c86604bf323dadafbf44159125e http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/libwv2-dev_0.2.2-1ubuntu1.1_i386.deb Size/MD5: 183308 bdb2ca946ba0689ac262c0b907f5fc64 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/libwv2-1_0.2.2-1ubuntu1.1_powerpc.deb Size/MD5: 221856 a2a7149c998191c373bf9cf3ec312f30 http://security.ubuntu.com/ubuntu/pool/universe/w/wv2/libwv2-dev_0.2.2-1ubuntu1.1_powerpc.deb Size/MD5: 183312 afa93e9c16613bcd9afee555e5a922cd Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/w/wv2/wv2_0.2.2-1ubuntu2.1.diff.gz Size/MD5:16170 7a07243952babcbc99fd59d82290d348 http://security.ubuntu.com/ubuntu/pool/main/w/wv2/wv2_0.2.2-1ubuntu2.1.dsc Size/MD5: 663 293e081bc9ae957ae7dcdcd559f09d05 http://security.ubuntu.com/ubuntu/pool/main/w/wv2/wv2_0.2.2.orig.tar.gz Size/MD5: 855198 45fdc6df614f91e94d3b978dd8414e3b amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/w/wv2/libwv2-1c2_0.2.2-1ubuntu2.1_amd64.deb Size/MD5: 272274 a9b18398d4266768b0232e0f0441a55d http://security.ubuntu.com/ubuntu/pool/main/w/wv2/libwv2-dev_0.2.2-1ubuntu2.1_amd64.deb Size/MD5: 183332 e897aac4010b63ae4fd8c5dc5de9a8aa i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/w/wv2/libwv2-1c2_0.2.2-1ubuntu2.1_i386.deb Size/MD5: 240956 9fec9a49d9cdbe447a37cea80cce0ef5 http://security.ubuntu.com/ubuntu/pool/main/w/wv2/libwv2-dev_0.2.2-1ubuntu2.1_i386.deb Size/MD5: 183328 4b48ad49dff6c4c236c0323387a2232c powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/w/wv2/libwv2-1c2_0.2.2-1ubuntu2.1_powerpc.deb Size/MD5: 244644 73b01188d26474efa183eef9cbdaa4d2 http://security.ubuntu.com/ubuntu/pool/main/w/wv2/libwv2-dev_0.2.2-1ubuntu2.1_powerpc.deb Size/MD5: 183338 e3adfe6108ae54a24dca635965ec6828 Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/w/wv2/wv2_0.2.2-5ubuntu0.1.diff.gz Size/MD5: 711482 de2a0a853439ae46d3946d5b51e3bb41 http://security.ubuntu.com/ubuntu/pool/main/w/wv2/wv2_0.2.2-5ubuntu0.1.dsc Size/MD5: 816 bcfd690cd308fa1cbd4bb87b6fc0714a http://security.ubuntu.com/ubuntu/pool/main/w/wv2/wv2_0.2.2.orig.tar.gz Size/MD5: 855198 45fdc6df614f91e94d3b978dd8414e3b amd64 architecture (Athlon64, Opteron, EM64T Xeon)
[Full-disclosure] [USN-301-1] kdm vulnerability
=== Ubuntu Security Notice USN-301-1 June 14, 2006 kdebase vulnerability CVE-2006-2449 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: kdm4:3.4.0-0ubuntu18.3 Ubuntu 5.10: kdm4:3.4.3-0ubuntu7 Ubuntu 6.06 LTS: kdm4:3.5.2-0ubuntu27 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Ludwig Nussel discovered that kdm managed the ~/.dmrc file in an insecure way. By performing a symlink attack, a local user could exploit this to read arbitrary files on the system, like private files of other users, /etc/shadow, and similarly sensitive data. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.0-0ubuntu18.3.diff.gz Size/MD5: 189940 e438b29d3f1d6aa5eba23a66db0cb73c http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.0-0ubuntu18.3.dsc Size/MD5: 1622 fe4317d23fded7349420082dbdfe6011 http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.0.orig.tar.gz Size/MD5: 26947670 31334d21606078a1f1eab1c3a25317e9 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-data_3.4.0-0ubuntu18.3_all.deb Size/MD5: 4609190 bec4425639d4eaffeb7701e791e8aa36 http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-doc_3.4.0-0ubuntu18.3_all.deb Size/MD5: 1084806 686cea67b31fcbe95eafabb4ca07a271 http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.0-0ubuntu18.3_all.deb Size/MD5:22270 5a36a1b6724fb9657bf4764f7d65d126 http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase/xfonts-konsole_3.4.0-0ubuntu18.3_all.deb Size/MD5:38168 92671967a67838d37112766397c56358 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kappfinder_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 245484 85c67d8bd907d9ea1826a94690e89993 http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kate_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 654568 145ce29e15e283daa64fb09cfa70d239 http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kcontrol_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 7957814 277ab5dd8c5f1180336da92cdf7d2be0 http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-bin_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 1153030 772de41db9421d79b844f92820185eb8 http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-dev_3.4.0-0ubuntu18.3_amd64.deb Size/MD5:61226 ecfaa369e4d60993b39d7ffa23cb1b51 http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-kio-plugins_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 807912 6e40af9f21f2cc39e1b1d5524536abbe http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdepasswd_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 227242 67264f24b4c7d8d50db81beef16e http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdeprint_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 1100448 8114ce60f71f1f718ea566ca12143879 http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdesktop_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 740256 9b9b18314d3388e4d85a5c960aeb35ec http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdm_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 671020 c029ee377d2e5f8c3d44282c2fdcb235 http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kfind_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 185904 93359b04094c97310efc680327d21b83 http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/khelpcenter_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 1784496 20cda592949f1c31fd9513f82a5da15a http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kicker_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 1805922 f6802bffc8088a8b47d5d5275c15016a http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/klipper_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 245470 678c227f14ed6323d3091a83f7a33ba7 http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kmenuedit_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 207036 9ccc5cf4cf116d9ce4bff3e6706ce2cc http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror-nsplugins_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 135464 060a9cb2af2364fba0141f8ac9bf03fb http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror_3.4.0-0ubuntu18.3_amd64.deb Size/MD5: 2081958 3f8dad170e937186fea8a20cd7aa844e
[Full-disclosure] [USN-288-2] PostgreSQL server/client vulnerabilities
=== Ubuntu Security Notice USN-288-2 June 09, 2006 postgresql-8.1 vulnerabilities CVE-2006-2313, CVE-2006-2314 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: libpq-dev 8.1.4-0ubuntu1 libpq4 8.1.4-0ubuntu1 postgresql-8.1 8.1.4-0ubuntu1 postgresql-client-8.1 8.1.4-0ubuntu1 postgresql-contrib-8.1 8.1.4-0ubuntu1 After a standard system upgrade you need to restart all services that use PostgreSQL to effect the necessary changes. If you can afford it, rebooting the computer is the easiest way of ensuring that all running services use the updated client library. Details follow: USN-288-1 fixed two vulnerabilities in Ubuntu 5.04 and Ubuntu 5.10. This update fixes the same vulnerabilities for Ubuntu 6.06 LTS. For reference, these are the details of the original USN: CVE-2006-2313: Akio Ishida and Yasuo Ohgaki discovered a weakness in the handling of invalidly-encoded multibyte text data. If a client application processed untrusted input without respecting its encoding and applied standard string escaping techniques (such as replacing a single quote ' with \' or ''), the PostgreSQL server could interpret the resulting string in a way that allowed an attacker to inject arbitrary SQL commands into the resulting SQL query. The PostgreSQL server has been modified to reject such invalidly encoded strings now, which completely fixes the problem for some 'safe' multibyte encodings like UTF-8. CVE-2006-2314: However, there are some less popular and client-only multibyte encodings (such as SJIS, BIG5, GBK, GB18030, and UHC) which contain valid multibyte characters that end with the byte 0x5c, which is the representation of the backslash character \ in ASCII. Many client libraries and applications use the non-standard, but popular way of escaping the ' character by replacing all occurences of it with \'. If a client application uses one of the affected encodings and does not interpret multibyte characters, and an attacker supplies a specially crafted byte sequence as an input string parameter, this escaping method would then produce a validly-encoded character and an excess ' character which would end the string. All subsequent characters would then be interpreted as SQL code, so the attacker could execute arbitrary SQL commands. To fix this vulnerability end-to-end, client-side applications must be fixed to properly interpret multibyte encodings and use '' instead of \'. However, as a precautionary measure, the sequence \' is now regarded as invalid when one of the affected client encodings is in use. If you depend on the previous behaviour, you can restore it by setting 'backslash_quote = on' in postgresql.conf. However, please be aware that this could render you vulnerable again. This issue does not affect you if you only use single-byte (like SQL_ASCII or the ISO-8859-X family) or unaffected multibyte (like UTF-8) encodings. Please see http://www.postgresql.org/docs/techdocs.50 for further details. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.diff.gz Size/MD5:23774 50475bf9e83adaa54956b32fbeedbdca http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-0ubuntu1.dsc Size/MD5: e1b77d64f44d3293f650b126ff624565 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4.orig.tar.gz Size/MD5: 11312643 c6554a0ef948ab2b18b617954e1788fe Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.4-0ubuntu1_all.deb Size/MD5: 1440630 81de1288298a0b1540b995db84d639db amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-0ubuntu1_amd64.deb Size/MD5: 151534 1a2d7dbbb8be5b9c8a5839a9602ca654 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-0ubuntu1_amd64.deb Size/MD5: 343524 06e9895e5575d0abdc2d90c504d0f60c http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-0ubuntu1_amd64.deb Size/MD5: 172050 6d8c0db031695b43daedf1ba0ccf1db4 http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-0ubuntu1_amd64.deb Size/MD5: 173882 4df3a6b067ac6979ac5520d0413bc493
[Full-disclosure] [USN-293-1] gdm vulnerability
=== Ubuntu Security Notice USN-293-1 June 09, 2006 gdm vulnerability CVE-2006-2452 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: gdm2.8.0.5-0ubuntu1.2 Ubuntu 6.06 LTS: gdm2.14.6-0ubuntu2.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: If the admin configured a gdm theme that provided an user list, any user could activate the gdm setup program by first choosing the setup option from the menu, clicking on the user list and entering his own (instead of root's) password. This allowed normal users to configure potentially dangerous features like remote or automatic login. Please note that this does not affect a default Ubuntu installation, since the default theme does not provide an user list. In Ubuntu 6.06 you additionally have to have the ConfigAvailable setting enabled in gdm.conf to be vulnerable (it is disabled by default). Ubuntu 5.04 is not affected by this flaw. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.2.diff.gz Size/MD5:67128 33be1f0d249e20f26a71853429faecef http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.2.dsc Size/MD5: 820 a27629124864eceb8b7bde6d3bc5fce9 http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5.orig.tar.gz Size/MD5: 4226618 349b76492113ab814f2732d4ce3a49c2 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.2_amd64.deb Size/MD5: 1618282 de5b62fce24232a5f46c930cd719740d i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.2_i386.deb Size/MD5: 1559904 34f918ecf92c03d0ab4befa70d735670 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.2_powerpc.deb Size/MD5: 1571650 2a8967304c094d4a0e79a0c9018fff4d Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.14.6-0ubuntu2.1.diff.gz Size/MD5:75736 c0235a8f490d5b383b07365d7643da5e http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.14.6-0ubuntu2.1.dsc Size/MD5: 885 670690837f6ee2692adfea92d71dd901 http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.14.6.orig.tar.gz Size/MD5: 4681313 6e0e99eb405a9a8e04ff81122723aae5 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.14.6-0ubuntu2.1_amd64.deb Size/MD5: 1779088 d9c3c3cf9c4aebe8f797fafbd8f8e135 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.14.6-0ubuntu2.1_i386.deb Size/MD5: 1714272 78f75e07fc5950e5f61c80ca0188ebaf powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.14.6-0ubuntu2.1_powerpc.deb Size/MD5: 1762968 38d342e8408ad7cd6c613b8aa82e6458 signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-288-3] PostgreSQL client vulnerabilities
=== Ubuntu Security Notice USN-288-3 June 09, 2006 dovecot, exim4, postfix vulnerabilities CVE-2006-2314, CVE-2006-2753 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: dovecot-common 0.99.13-3ubuntu0.1 exim4-daemon-heavy 4.34-10ubuntu0.1 postfix-pgsql 2.1.5-9ubuntu3.1 Ubuntu 5.10: dovecot-common 0.99.14-1ubuntu1.1 exim4-daemon-heavy 4.52-1ubuntu0.1 postfix-pgsql 2.2.4-1ubuntu2.1 Ubuntu 6.06 LTS: dovecot-common 1.0.beta3-3ubuntu5.1 exim4-daemon-heavy 4.60-3ubuntu3.1 postfix-pgsql 2.2.10-1ubuntu0.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: USN-288-1 described a PostgreSQL client vulnerability in the way the ' character is escaped in SQL queries. It was determined that the PostgreSQL backends of Exim, Dovecot, and Postfix used this unsafe escaping method. For reference, these are the details of the original USN: CVE-2006-2313: Akio Ishida and Yasuo Ohgaki discovered a weakness in the handling of invalidly-encoded multibyte text data. If a client application processed untrusted input without respecting its encoding and applied standard string escaping techniques (such as replacing a single quote ' with \' or ''), the PostgreSQL server could interpret the resulting string in a way that allowed an attacker to inject arbitrary SQL commands into the resulting SQL query. The PostgreSQL server has been modified to reject such invalidly encoded strings now, which completely fixes the problem for some 'safe' multibyte encodings like UTF-8. CVE-2006-2314: However, there are some less popular and client-only multibyte encodings (such as SJIS, BIG5, GBK, GB18030, and UHC) which contain valid multibyte characters that end with the byte 0x5c, which is the representation of the backslash character \ in ASCII. Many client libraries and applications use the non-standard, but popular way of escaping the ' character by replacing all occurences of it with \'. If a client application uses one of the affected encodings and does not interpret multibyte characters, and an attacker supplies a specially crafted byte sequence as an input string parameter, this escaping method would then produce a validly-encoded character and an excess ' character which would end the string. All subsequent characters would then be interpreted as SQL code, so the attacker could execute arbitrary SQL commands. To fix this vulnerability end-to-end, client-side applications must be fixed to properly interpret multibyte encodings and use '' instead of \'. However, as a precautionary measure, the sequence \' is now regarded as invalid when one of the affected client encodings is in use. If you depend on the previous behaviour, you can restore it by setting 'backslash_quote = on' in postgresql.conf. However, please be aware that this could render you vulnerable again. This issue does not affect you if you only use single-byte (like SQL_ASCII or the ISO-8859-X family) or unaffected multibyte (like UTF-8) encodings. Please see http://www.postgresql.org/docs/techdocs.50 for further details. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_0.99.13-3ubuntu0.1.diff.gz Size/MD5:25404 3c04c4209d088672d44274173375bbae http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_0.99.13-3ubuntu0.1.dsc Size/MD5: 766 62f4a67113049644ff4ba1fe64186644 http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_0.99.13.orig.tar.gz Size/MD5: 867787 a84896c4236232b843972370e3730729 http://security.ubuntu.com/ubuntu/pool/main/e/exim4/exim4_4.34-10ubuntu0.1.diff.gz Size/MD5: 543118 eac768b2342855381a06668e0b9092b5 http://security.ubuntu.com/ubuntu/pool/main/e/exim4/exim4_4.34-10ubuntu0.1.dsc Size/MD5: 1093 cec092fdddee02a57f057adced2fc2b3 http://security.ubuntu.com/ubuntu/pool/main/e/exim4/exim4_4.34.orig.tar.gz Size/MD5: 1717473 acdf7117f18b71702d4da284b1263275 http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.1.5-9ubuntu3.1.diff.gz Size/MD5: 461692 f88e13bc7a3bd0a7f21d4038c6ab1ba6 http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.1.5-9ubuntu3.1.dsc Size/MD5: 870 9f52b77f7d9e17750e1b3fe83ea07495
[Full-disclosure] [USN-294-1] courier vulnerability
=== Ubuntu Security Notice USN-294-1 June 09, 2006 courier vulnerability CVE-2006-2659 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: courier-mta0.47-3ubuntu1.5 Ubuntu 5.10: courier-mta0.47-3ubuntu7.2 Ubuntu 6.06 LTS: courier-mta0.47-13ubuntu5.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: A Denial of Service vulnerability has been found in the function for encoding email addresses. Addresses containing a '=' before the '@' character caused the Courier to hang in an endless loop, rendering the service unusable. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier_0.47-3ubuntu1.5.diff.gz Size/MD5: 108704 54427ae8946f3393309424c67b434294 http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier_0.47-3ubuntu1.5.dsc Size/MD5: 1204 0740cd77bb282a9a6446b0ce0de80419 http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier_0.47.orig.tar.gz Size/MD5: 6350808 361a84e497148ce557c150d3576ec24b Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-doc_0.47-3ubuntu1.5_all.deb Size/MD5: 370652 20507345daea36580119b02989159a76 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-authdaemon_0.47-3ubuntu1.5_amd64.deb Size/MD5:62548 d157fe17cf5bc242082644b0e19434e4 http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authmysql_0.47-3ubuntu1.5_amd64.deb Size/MD5:57162 9a7094e1805c06a0c5e592a003f4dd30 http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authpostgresql_0.47-3ubuntu1.5_amd64.deb Size/MD5:57350 4a586bac446463116f8a752df108d3b2 http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-base_0.47-3ubuntu1.5_amd64.deb Size/MD5: 257282 659d6931e7f25352b88a6bffa1be6bba http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-faxmail_0.47-3ubuntu1.5_amd64.deb Size/MD5:28864 38b62157bdbca607c2db3d1866db4cd5 http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap-ssl_3.0.8-3ubuntu1.5_amd64.deb Size/MD5:21404 b9a740d1a5e4a366449711cb8472a291 http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap_3.0.8-3ubuntu1.5_amd64.deb Size/MD5: 950548 c1ae151418e74a11af6930f9b733a5f9 http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-ldap_0.47-3ubuntu1.5_amd64.deb Size/MD5:74292 d67ac6f6e8df175cc1eb877a766d9f10 http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-maildrop_0.47-3ubuntu1.5_amd64.deb Size/MD5: 942804 23c26b6c2f9d69a3baaf77bc9f8cf5c7 http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mlm_0.47-3ubuntu1.5_amd64.deb Size/MD5: 122864 b72a7fe87d9458ec172fabe33cb0aa0f http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta-ssl_0.47-3ubuntu1.5_amd64.deb Size/MD5:19486 2f0fc3d9f7ddd934d0224ab7085cac9a http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta_0.47-3ubuntu1.5_amd64.deb Size/MD5: 2157504 6a4f4624f1b01e3c2b4a11ed45370b44 http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-pcp_0.47-3ubuntu1.5_amd64.deb Size/MD5:6 7b8e381af3f0ec2a0d92895e3e7079cb http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop-ssl_0.47-3ubuntu1.5_amd64.deb Size/MD5:21202 80c2075c5f9eff0e42d58cd05c5fae3a http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop_0.47-3ubuntu1.5_amd64.deb Size/MD5: 423242 217a9fcf78949204f8666e3d1ad0d179 http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-ssl_0.47-3ubuntu1.5_amd64.deb Size/MD5: 195810 82539a6e475e5d83652274e6b4379d0e http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-webadmin_0.47-3ubuntu1.5_amd64.deb Size/MD5:34538 8d78c981468e57c927f593f0b1580c4e http://security.ubuntu.com/ubuntu/pool/universe/c/courier/sqwebmail_0.47-3ubuntu1.5_amd64.deb Size/MD5: 798170 3ac5a00717db529f057ce0da2cefa0ca i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-authdaemon_0.47-3ubuntu1.5_i386.deb Size/MD5:56302 d74f86a962af5e41b3248cbb02f5dbbf http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authmysql_0.47-3ubuntu1.5_i386.deb Size/MD5:52212
[Full-disclosure] [USN-295-1] xine-lib vulnerability
=== Ubuntu Security Notice USN-295-1 June 09, 2006 xine-lib vulnerability CVE-2006-2802 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libxine1 1.0-1ubuntu3.7 Ubuntu 5.10: libxine1c2 1.0.1-1ubuntu10.3 Ubuntu 6.06 LTS: libxine-main1 1.1.1+ubuntu2-7.1 In general, a standard system upgrade is sufficient to effect the necessary changes. XXX OR XXX After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: Federico L. Bossi Bonin discovered a buffer overflow in the HTTP input module. By tricking an user into opening a malicious remote media location, a remote attacker could exploit this to crash Xine library frontends (like totem-xine, gxine, or xine-ui) and possibly even execute arbitrary code with the user's privileges. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0-1ubuntu3.7.diff.gz Size/MD5: 4636 5cc6919bd457df6beae53e9a84e9e503 http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0-1ubuntu3.7.dsc Size/MD5: 1070 1a862dac447d52ecfb8bcdcbb24cf5de http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0.orig.tar.gz Size/MD5: 7384258 96e5195c366064e7778af44c3e71f43a amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0-1ubuntu3.7_amd64.deb Size/MD5: 106846 edbbcd4d032bb0e3ff692ac7138fe2fb http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1_1.0-1ubuntu3.7_amd64.deb Size/MD5: 3567510 0d1ba9ac491e5482d82acb2f776f21bb i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0-1ubuntu3.7_i386.deb Size/MD5: 106822 86c3f51b3200996f96131c8c53c67506 http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1_1.0-1ubuntu3.7_i386.deb Size/MD5: 3750458 eff585a1e98695ae4146cd97c7560fcf powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0-1ubuntu3.7_powerpc.deb Size/MD5: 106850 9097246c8357d5a04139bcee0ddbb7b8 http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1_1.0-1ubuntu3.7_powerpc.deb Size/MD5: 3925536 8d2576a78270fb2806a18e011a18921a Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0.1-1ubuntu10.3.diff.gz Size/MD5: 9453 2a3b01a6d858e8623a89e5cce831d392 http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0.1-1ubuntu10.3.dsc Size/MD5: 1186 47fb3762575e25d037c3e6ba2d3d6744 http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0.1.orig.tar.gz Size/MD5: 7774954 9be804b337c6c3a2e202c5a7237cb0f8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0.1-1ubuntu10.3_amd64.deb Size/MD5: 108858 8081b6beb283dfefeda7aa0a81d5008e http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1c2_1.0.1-1ubuntu10.3_amd64.deb Size/MD5: 3611122 99e0979785b3c7c7001d33ddd5e8bb96 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0.1-1ubuntu10.3_i386.deb Size/MD5: 108864 7dfd068cc168dcc55993d70277901b3d http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1c2_1.0.1-1ubuntu10.3_i386.deb Size/MD5: 4004210 156188682cd24dbfa922b94d66d2dd63 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0.1-1ubuntu10.3_powerpc.deb Size/MD5: 108866 1489e831ed6bb874756e0f2f4a44ecca http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1c2_1.0.1-1ubuntu10.3_powerpc.deb Size/MD5: 3849668 6fdbbe888f1c7ee821af81e16352d61b Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.1.1+ubuntu2-7.1.diff.gz Size/MD5:17494 e751ca0a9c5b41b7c4027bef6ace5c06 http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.1.1+ubuntu2-7.1.dsc Size/MD5: 1115 6bce2e7e1451f9466a8b18592622257b http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.1.1+ubuntu2.orig.tar.gz Size/MD5: 6099365 5d0f3988e4d95f6af6f3caf2130ee992 amd64 architecture (Athlon64, Opteron, EM64T Xeon)
[Full-disclosure] [USN-289-1] tiff vulnerabilities
=== Ubuntu Security Notice USN-289-1 June 08, 2006 tiff vulnerabilities CVE-2006-2193, CVE-2006-2656 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libtiff-tools 3.6.1-5ubuntu0.5 Ubuntu 5.10: libtiff-tools 3.7.3-1ubuntu1.4 Ubuntu 6.06 LTS: libtiff-tools 3.7.4-1ubuntu3.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: A buffer overflow has been found in the tiff2pdf utility. By tricking an user into processing a specially crafted TIF file with tiff2pdf, this could potentially be exploited to execute arbitrary code with the privileges of the user. (CVE-2006-2193) A. Alejandro Hernández discovered a buffer overflow in the tiffsplit utility. By calling tiffsplit with specially crafted long arguments, an user can execute arbitrary code. If tiffsplit is used in e. g. a web-based frontend or similar automated system, this could lead to remote arbitary code execution with the privileges of that system. (In normal interactive command line usage this is not a vulnerability.) (CVE-2006-2656) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1-5ubuntu0.5.diff.gz Size/MD5:26319 e6f75f611b9c77ce07cb2cf513f654ad http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1-5ubuntu0.5.dsc Size/MD5: 681 57c2c112da454d86f49d8bf2e8e16d9b http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1.orig.tar.gz Size/MD5: 848760 bd252167a20ac7910ab3bd2b3ee9e955 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.5_amd64.deb Size/MD5: 172880 e890e7578915c4613cd7a74b184445bd http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.5_amd64.deb Size/MD5: 459208 8817f18ad3ae963b4a74c716cf7bf0b8 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.5_amd64.deb Size/MD5: 112968 5646656fd78c0ff663866e74977bf78e i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.5_i386.deb Size/MD5: 155968 27e009d03b6a5d9a93eabde478dc9b1c http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.5_i386.deb Size/MD5: 440508 f484f7e00cb7240a9c6f860ec5de9ade http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.5_i386.deb Size/MD5: 103886 0388682d81cc301ef2b83a4f4438a05c powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.5_powerpc.deb Size/MD5: 188188 6316125bd4d1a540957aa0cc9c60fa8d http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.5_powerpc.deb Size/MD5: 463674 8f080f57ffc4cb3a0f116ce7c353c381 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.5_powerpc.deb Size/MD5: 114370 971a6be7879aaf5d92b55951b7cdd141 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3-1ubuntu1.4.diff.gz Size/MD5:11378 17db8270668b8b0eefceb0d27e14bd11 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3-1ubuntu1.4.dsc Size/MD5: 756 218a54ab0966c1b6204b27343b916093 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3.orig.tar.gz Size/MD5: 1268182 48fbef3d76a6253699f28f49c8f25a8b amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.3-1ubuntu1.4_amd64.deb Size/MD5:48184 eed2ddb6187b1717db2de95dbc590ec6 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.3-1ubuntu1.4_amd64.deb Size/MD5: 219688 79d9cf71f16a3a95c54b481bca648eab http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.3-1ubuntu1.4_amd64.deb Size/MD5: 281702 b5b1b261be7c047c3be3eeb2f8398b8a http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.3-1ubuntu1.4_amd64.deb Size/MD5: 472142 9cac886846d30589b05802fcc6e01f67 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.3-1ubuntu1.4_amd64.deb Size/MD5:43014 1b71df913359a6b0bdd8d6ebb3e33d7a i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.3-1ubuntu1.4_i386.deb Size/MD5:47562
[Full-disclosure] [USN-291-1] FreeType vulnerabilities
=== Ubuntu Security Notice USN-291-1 June 08, 2006 freetype vulnerabilities CVE-2006-0747, CVE-2006-1861, CVE-2006-2493, CVE-2006-2661 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.04: libfreetype6 2.1.7-2.3ubuntu0.1 Ubuntu 5.10: libfreetype6 2.1.7-2.4ubuntu1.1 Ubuntu 6.06 LTS: libfreetype6 2.1.10-1ubuntu2.1 After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: Several integer overflows have been discovered in the FreeType library. By tricking a user into installing and/or opening a specially crafted font file, these could be exploited to execute arbitrary code with the privileges of that user. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.3ubuntu0.1.diff.gz Size/MD5:55085 0be8f928fd34db525db66f8cd07f79e2 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.3ubuntu0.1.dsc Size/MD5: 695 55710d777fdc8cee093e4eb17d03b8e4 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7.orig.tar.gz Size/MD5: 1245623 991ff86e88b075ba363e876f4ea58680 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.3ubuntu0.1_amd64.deb Size/MD5:76248 654defa84e451a720843e160d9e0ad4b http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.3ubuntu0.1_amd64.deb Size/MD5: 723698 ac752c537fcd86b0e15366f75237c8c4 http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.3ubuntu0.1_amd64.udeb Size/MD5: 238246 7bcc9b311d84ac923693484563415fc0 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.3ubuntu0.1_amd64.deb Size/MD5: 389494 0c1c61803010adc6ac4303e0ed34cab4 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.3ubuntu0.1_i386.deb Size/MD5:57070 96143b6b668cdf1301a1f0d8cb935f38 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.3ubuntu0.1_i386.deb Size/MD5: 688162 c16278b396bc6a3932e6488f6a4302d6 http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.3ubuntu0.1_i386.udeb Size/MD5: 208092 ce4669a078ce4c5cd25e53e372fbc0f2 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.3ubuntu0.1_i386.deb Size/MD5: 358818 1e05d62b7c8fd3ed25ce9590289038b7 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.3ubuntu0.1_powerpc.deb Size/MD5:81974 261cb107a20048a653b7363e5e763095 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.3ubuntu0.1_powerpc.deb Size/MD5: 730026 45f7603197520093383be1bc4ef71768 http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.3ubuntu0.1_powerpc.udeb Size/MD5: 227736 82ba5fdb752f1e14a168356eb58040d4 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.3ubuntu0.1_powerpc.deb Size/MD5: 378628 560ddb84ab50151db4950def5ca94f20 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.4ubuntu1.1.diff.gz Size/MD5:56497 c0d09dab367b91d60391bfbe1614a751 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7-2.4ubuntu1.1.dsc Size/MD5: 695 baa464576ecff8f71180b69c43f3d3d7 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.7.orig.tar.gz Size/MD5: 1245623 991ff86e88b075ba363e876f4ea58680 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.7-2.4ubuntu1.1_amd64.deb Size/MD5:75536 763397ace4438b17c1d553e742164392 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.7-2.4ubuntu1.1_amd64.deb Size/MD5: 722918 ab4ac77fc4c341c5b9e3e5d8b7cd03ad http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.7-2.4ubuntu1.1_amd64.udeb Size/MD5: 241670 71a3a0944b74daf49d428096258481d4 http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.7-2.4ubuntu1.1_amd64.deb Size/MD5: 392814 ac0b9929a7839fe770b81d8934811f91 i386 architecture (x86
[Full-disclosure] [USN-287-1] Nagios vulnerability
=== Ubuntu Security Notice USN-287-1 May 29, 2006 nagios vulnerability CVE-2006-2489 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: nagios-common The problem can be corrected by upgrading the affected package to version 2:1.3-0+pre6ubuntu0.2 (for Ubuntu 5.04), or 2:1.3-cvs.20050402-4ubuntu3.2 (for Ubuntu 5.10). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: The nagios CGI scripts did not sufficiently check the validity of the HTTP Content-Length attribute. By sending a specially crafted HTTP request with an invalidly large Content-Length value to the Nagios server, a remote attacker could exploit this to execute arbitrary code with web server privileges. Please note that the Apache 2 web server already checks for valid Content-Length values, so installations using Apache 2 (the only web server officially supported in Ubuntu) are not vulnerable to this flaw. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-0+pre6ubuntu0.2.diff.gz Size/MD5:80449 1af54c94d8119c7838dd5daed1e50c9b http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-0+pre6ubuntu0.2.dsc Size/MD5: 1010 7ce12d54ea17c24c898346995397e069 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3.orig.tar.gz Size/MD5: 1625322 414d70e5269d5b8d7c21bf3ee129309f Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-common_1.3-0+pre6ubuntu0.2_all.deb Size/MD5: 1213320 bb517ad62a0b4515b677fffa556086f9 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-0+pre6ubuntu0.2_amd64.deb Size/MD5: 994506 a5115aa68e435a3727f066addedb20c7 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-0+pre6ubuntu0.2_amd64.deb Size/MD5: 1006602 29d2add2204db681b02c6345bb23c8ee http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-0+pre6ubuntu0.2_amd64.deb Size/MD5: 976218 026ea6069f7e240c501e40cc45d995a4 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-0+pre6ubuntu0.2_i386.deb Size/MD5: 872622 88340a6009fa9ca6e19d1d83967d47d0 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-0+pre6ubuntu0.2_i386.deb Size/MD5: 882350 26502350bfee23fbf3bba4297d4f73c1 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-0+pre6ubuntu0.2_i386.deb Size/MD5: 857930 f8f30305908113a31559f24d11d6d36d powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-0+pre6ubuntu0.2_powerpc.deb Size/MD5: 1003054 5710e195a858bd6e425e302dc1e8268b http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-0+pre6ubuntu0.2_powerpc.deb Size/MD5: 1010828 585a23296ea4a6e29141fa6cc8c6c39e http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-0+pre6ubuntu0.2_powerpc.deb Size/MD5: 970178 bcf95bae9783327b461f6c06dcfd6edb Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-cvs.20050402-4ubuntu3.2.diff.gz Size/MD5:73095 6415cb60826aacb697b6d5e8e2ce2987 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-cvs.20050402-4ubuntu3.2.dsc Size/MD5: 1039 40c86a1a990d82fa0c5608ad6d73c0d5 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-cvs.20050402.orig.tar.gz Size/MD5: 1621251 0f92b7b8e705411b7881d3650cbb5d56 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-common_1.3-cvs.20050402-4ubuntu3.2_all.deb Size/MD5: 1221338 8242fbb490a4f669f3f06eddb2b6439e amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-cvs.20050402-4ubuntu3.2_amd64.deb Size/MD5: 1030086 4833dee00a8e7dd04469fcda70184cf6 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-cvs.20050402-4ubuntu3.2_amd64.deb Size/MD5: 1041982 bfe2bee8ee08e6e45cce8bf905736e3b http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-cvs.20050402-4ubuntu3.2_amd64.deb Size/MD5: 1025714 c3f7679dd7e03cc7ef91178bb8943af1 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-cvs.20050402-4ubuntu3.2_i386.deb Size/MD5: 879066 4c9e26642676ae206c90cd68b44ec538
[Full-disclosure] [USN-286-1] Dia vulnerabilities
=== Ubuntu Security Notice USN-286-1 May 24, 2006 dia vulnerabilities CVE-2006-2453, CVE-2006-2480 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: dia dia-gnome The problem can be corrected by upgrading the affected package to version 0.94.0-5ubuntu1.3 (for Ubuntu 5.04), or 0.94.0-11ubuntu1.2 (for Ubuntu 5.10). After doing a standard system upgrade you need to restart dia to effect the necessary changes. Details follow: Several format string vulnerabilities have been discovered in dia. By tricking a user into opening a specially crafted dia file, or a file with a specially crafted name, this could be exploited to execute arbitrary code with the user's privileges. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia_0.94.0-5ubuntu1.3.diff.gz Size/MD5:17086 d5771a080f9fab65abe39fa461b0be3f http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia_0.94.0-5ubuntu1.3.dsc Size/MD5: 1408 dfca9d13543432df3ff0b89dd87694ad http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia_0.94.0.orig.tar.gz Size/MD5: 5241128 d2afdc10f55df29314250d98dbfd7a79 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-common_0.94.0-5ubuntu1.3_all.deb Size/MD5: 2148748 fc6799fd655d1417c1c382992dd28ab1 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-5ubuntu1.3_amd64.deb Size/MD5: 194954 2912894e6aa809b200c0435475a02009 http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-5ubuntu1.3_amd64.deb Size/MD5: 659674 b318e38937352a027afd3772621566f9 http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-5ubuntu1.3_amd64.deb Size/MD5: 193266 cd0496cef2874ef740abafe9f28d53ec i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-5ubuntu1.3_i386.deb Size/MD5: 176988 e9b27d3c32f4c683f9a0878f74b04df5 http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-5ubuntu1.3_i386.deb Size/MD5: 580590 60aa194372a368dad6c15b096c74a3f4 http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-5ubuntu1.3_i386.deb Size/MD5: 175510 c8bdfa25f8d165aa319b91dcdaa10004 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-5ubuntu1.3_powerpc.deb Size/MD5: 184652 a2616015be8f766ed36ba7a0fe6f1fa0 http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-5ubuntu1.3_powerpc.deb Size/MD5: 675104 bca6250681070c0045dba899f6f11707 http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-5ubuntu1.3_powerpc.deb Size/MD5: 183176 38213309ad4f232332aa62b47c2286df Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia_0.94.0-11ubuntu1.2.diff.gz Size/MD5:32541 a71619e0d5df51e905a68328c54c01d9 http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia_0.94.0-11ubuntu1.2.dsc Size/MD5: 1423 8d3d29b9e45d9d53f690a15643e72e96 http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia_0.94.0.orig.tar.gz Size/MD5: 5241128 d2afdc10f55df29314250d98dbfd7a79 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-common_0.94.0-11ubuntu1.2_all.deb Size/MD5: 2148928 ed8976d604e4929c85c8e9bab40406f0 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-11ubuntu1.2_amd64.deb Size/MD5: 194656 6a830bb38a1720bd19f12e96074a9418 http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-11ubuntu1.2_amd64.deb Size/MD5: 659118 e831effa3a3d9b2990e4b2c3f7b9d46a http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-11ubuntu1.2_amd64.deb Size/MD5: 193170 e7ac00a876bb8e24691a8fa3933ab0f5 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-11ubuntu1.2_i386.deb Size/MD5: 171796 6ea1f835eb7c4315084190e8f628b6ec http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-11ubuntu1.2_i386.deb Size/MD5: 549270 44d546e86e6c81936c1ab278a71f2ebc http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-11ubuntu1.2_i386.deb Size/MD5: 170448 e342deec10cef78f9f83fd8e691392d0 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-11ubuntu1.2_powerpc.deb Size/MD5: 185366 b2d487e8a89ace311fc5b9ed29088c92
[Full-disclosure] [USN-285-1] awstats vulnerability
=== Ubuntu Security Notice USN-285-1 May 23, 2006 awstats vulnerability CVE-2006-2237 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: awstats The problem can be corrected by upgrading the affected package to version 6.3-1ubuntu0.2 (for Ubuntu 5.04), or 6.4-1ubuntu1.1 (for Ubuntu 5.10). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: AWStats did not properly sanitize the 'migrate' CGI parameter. If the update of the stats via web front-end is allowed, a remote attacker could execute arbitrary commands on the server with the privileges of the AWStats server. This does not affect AWStats installations which only build static pages. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.2.diff.gz Size/MD5:25306 1f013ca8aaad65d8f3ae148e194b3551 http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.2.dsc Size/MD5: 595 46a103a327e1f1bad3876927c7e66198 http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3.orig.tar.gz Size/MD5: 938794 edb73007530a5800d53b9f1f90c88053 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.2_all.deb Size/MD5: 726430 728ee50f468a4cf3693a32b98c94b455 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.1.diff.gz Size/MD5:18541 e186b842fbd2d4d97b65eacf7c9c1295 http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.1.dsc Size/MD5: 595 c5784c2c1bfa002abbfa77d936bc2da5 http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4.orig.tar.gz Size/MD5: 918435 056e6fb0c7351b17fe5bbbe0aa1297b1 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.1_all.deb Size/MD5: 728490 60ca39a436e3a21a838560db5d8a5f3b signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-274-2] MySQL vulnerability
=== Ubuntu Security Notice USN-274-2 May 15, 2006 mysql-dfsg vulnerability CVE-2006-0903 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: mysql-server The problem can be corrected by upgrading the affected package to version 4.0.23-3ubuntu2.4 (for Ubuntu 5.04), or 4.0.24-10ubuntu2.3 (for Ubuntu 5.10). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: USN-274-1 fixed a logging bypass in the MySQL server. Unfortunately it was determined that the original update was not sufficient to completely fix the vulnerability, thus another update is necessary. We apologize for the inconvenience. For reference, these are the details of the original USN: A logging bypass was discovered in the MySQL query parser. A local attacker could exploit this by inserting NUL characters into query strings (even into comments), which would cause the query to be logged incompletely. This only affects you if you enabled the 'log' parameter in the MySQL configuration. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23-3ubuntu2.4.diff.gz Size/MD5: 347218 5bf62963f2439449d17429b974dc954e http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23-3ubuntu2.4.dsc Size/MD5: 891 cf807937ea7cb09d1717c562c355e2cd http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23.orig.tar.gz Size/MD5: 9814467 5eec8f66ed48c6ff92e73161651a492b Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-common_4.0.23-3ubuntu2.4_all.deb Size/MD5:32366 1a3bd9d864cae3bfa1987f859b5624aa amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.4_amd64.deb Size/MD5: 2867226 cee7c90e2a0fd2ab3d17ba1b25b74f0d http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.4_amd64.deb Size/MD5: 307670 e7fea674e9dcad07d491e70f80aefa77 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.23-3ubuntu2.4_amd64.deb Size/MD5: 431800 6b87ceedfa25337da77b1cb0f461526e http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.23-3ubuntu2.4_amd64.deb Size/MD5: 3629366 3ae34465083080e3bf9d620f8cb8cb02 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.4_i386.deb Size/MD5: 2827210 8efa7c02567c9728cd915d3c40e5a197 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.4_i386.deb Size/MD5: 290266 d922e809d77b6b5dc3b4ed0b60aab4ca http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.23-3ubuntu2.4_i386.deb Size/MD5: 405024 b44e2e31c97d7e53fe0c165c8857dae2 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.23-3ubuntu2.4_i386.deb Size/MD5: 3538020 3b77c2725479cf9167f0015ab6c84217 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.4_powerpc.deb Size/MD5: 3181320 b9a3a84b59e90cebc93f0a19cc63c9ef http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.4_powerpc.deb Size/MD5: 313258 cbcdd0d05906c05ff730b1b75d04c860 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.23-3ubuntu2.4_powerpc.deb Size/MD5: 462556 3b7b56ceb6c3698ab404080a0692f5ec http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.23-3ubuntu2.4_powerpc.deb Size/MD5: 3840116 63049c52217853f785162ba6d54f133d Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.24-10ubuntu2.3.diff.gz Size/MD5:99812 d274d44f9970d8b2489f2a70b033f77a http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.24-10ubuntu2.3.dsc Size/MD5: 966 2f2a9b55283f1d634dce18e558d92ba3 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.24.orig.tar.gz Size/MD5: 9923794 aed8f335795a359f32492159e3edfaa3 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-common_4.0.24-10ubuntu2.3_all.deb Size/MD5:35028 a2a4b01f8de78f0489b2fb1563cb5f7a amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10ubuntu2.3_amd64.deb
[Full-disclosure] [USN-284-1] Quagga vulnerabilities
=== Ubuntu Security Notice USN-284-1 May 15, 2006 quagga vulnerabilities CVE-2006-2223, CVE-2006-2224, CVE-2006-2276 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: quagga The problem can be corrected by upgrading the affected package to version 0.97.3-1ubuntu1.1 (for Ubuntu 5.04), or 0.99.1-1ubuntu1.1 (for Ubuntu 5.10). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Paul Jakma discovered that Quagga's ripd daemon did not properly handle authentication of RIPv1 requests. If the RIPv1 protocol had been disabled, or authentication for RIPv2 had been enabled, ripd still replied to RIPv1 requests, which could lead to information disclosure. (CVE-2006-2223) Paul Jakma also noticed that ripd accepted unauthenticated RIPv1 response packets if RIPv2 was configured to require authentication and both protocols were allowed. A remote attacker could exploit this to inject arbitrary routes. (CVE-2006-2224) Fredrik Widell discovered that Quagga did not properly handle certain invalid 'sh ip bgp' commands. By sending special commands to Quagga, a remote attacker with telnet access to the Quagga server could exploit this to trigger an endless loop in the daemon (Denial of Service). (CVE-2006-2276) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.97.3-1ubuntu1.1.diff.gz Size/MD5:38413 eda4c03884896ba450f16ee70f8c082a http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.97.3-1ubuntu1.1.dsc Size/MD5: 714 22a7196923c807617fcd995c01c340b1 http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.97.3.orig.tar.gz Size/MD5: 1964834 9015a5c61b22dc4e51b07fdc9bdadfd1 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.97.3-1ubuntu1.1_all.deb Size/MD5: 477692 15527f6d3580a5327a31a6244cfc78f7 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.97.3-1ubuntu1.1_amd64.deb Size/MD5: 1345612 75b7044e62475f2b4b6bf4a2c682f681 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.97.3-1ubuntu1.1_i386.deb Size/MD5: 1124086 9ff534e9d6a717b340d448b486f5a8de powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.97.3-1ubuntu1.1_powerpc.deb Size/MD5: 1245250 acaa9feaf12f20e42407d25103b698bd Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.1-1ubuntu1.1.diff.gz Size/MD5:27760 5577e4835dca7dce5d857ca843c43358 http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.1-1ubuntu1.1.dsc Size/MD5: 722 f2690f9ed75e966362870c591e4e5a72 http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.1.orig.tar.gz Size/MD5: 2107583 afd8c23a32050be76e55c28ec9dcff73 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.1-1ubuntu1.1_all.deb Size/MD5: 580362 af8e02b1ef292dc9e883a24b644d3e3f amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.1-1ubuntu1.1_amd64.deb Size/MD5: 1418614 6d36f2bc13d16f87d8bed040dfdfcc0d i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.1-1ubuntu1.1_i386.deb Size/MD5: 1204568 39d90181e76908dabf23d4bee37c220e signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-282-1] Nagios vulnerability
=== Ubuntu Security Notice USN-282-1 May 08, 2006 nagios vulnerability CVE-2006-2162 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: nagios-common The problem can be corrected by upgrading the affected package to version 2:1.3-0+pre6ubuntu0.1 (for Ubuntu 5.04), or 2:1.3-cvs.20050402-4ubuntu3.1 (for Ubuntu 5.10). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: The nagios CGI scripts did not sufficiently check the validity of the HTTP Content-Length attribute. By sending a specially crafted HTTP request with a negative Content-Length value to the Nagios server, a remote attacker could exploit this to execute arbitrary code with web server privileges. Please note that the Apache 2 web server already checks for valid Content-Length values, so installations using Apache 2 (the only web server officially supported in Ubuntu) are not vulnerable to this flaw. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-0+pre6ubuntu0.1.diff.gz Size/MD5:80281 7d71114ea6d8e11edb79133235e94951 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-0+pre6ubuntu0.1.dsc Size/MD5: 1010 611221f65f55763d607bd18754f5b46e http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3.orig.tar.gz Size/MD5: 1625322 414d70e5269d5b8d7c21bf3ee129309f Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-common_1.3-0+pre6ubuntu0.1_all.deb Size/MD5: 1213184 aef209a60989887c5e4828f8c6e5ed22 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-0+pre6ubuntu0.1_amd64.deb Size/MD5: 994148 caee3765a8cb8826cbfb83b6a80a93aa http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-0+pre6ubuntu0.1_amd64.deb Size/MD5: 1006218 331626a1400801648faa72261f72bc0f http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-0+pre6ubuntu0.1_amd64.deb Size/MD5: 975952 83b6c5a302ed299866fa717020c30d68 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-0+pre6ubuntu0.1_i386.deb Size/MD5: 872306 fcb37a47f0eff94a77d1a1e30205aeec http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-0+pre6ubuntu0.1_i386.deb Size/MD5: 882042 08b7590825e1d97807445e11859fb487 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-0+pre6ubuntu0.1_i386.deb Size/MD5: 857596 0feedae7fd082a9b566bdc52c2a69794 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-0+pre6ubuntu0.1_powerpc.deb Size/MD5: 1002618 f7267c0a908b37119bd1cc75a82f691a http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-0+pre6ubuntu0.1_powerpc.deb Size/MD5: 1010332 cd4882a8adaf882be52ca06c03a9f009 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-0+pre6ubuntu0.1_powerpc.deb Size/MD5: 969694 61692fa210eac3be4acc0ec31db859df Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-cvs.20050402-4ubuntu3.1.diff.gz Size/MD5:72940 45eb9bb3f5d319ee26e54911766c3329 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-cvs.20050402-4ubuntu3.1.dsc Size/MD5: 1039 38ccfb2a73283d3407b9fe60533f98ff http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios_1.3-cvs.20050402.orig.tar.gz Size/MD5: 1621251 0f92b7b8e705411b7881d3650cbb5d56 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-common_1.3-cvs.20050402-4ubuntu3.1_all.deb Size/MD5: 1221180 8d5b4df9c227530749020ffb466ff2f2 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-cvs.20050402-4ubuntu3.1_amd64.deb Size/MD5: 1029868 c8d76916a6910a2cbfe3ff1ba6ac5719 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-pgsql_1.3-cvs.20050402-4ubuntu3.1_amd64.deb Size/MD5: 1041510 623c9b4b2e3ab693c9993ede121488a7 http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-text_1.3-cvs.20050402-4ubuntu3.1_amd64.deb Size/MD5: 1025400 d37f7806f75fecda7f4b3d63491e0939 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/n/nagios/nagios-mysql_1.3-cvs.20050402-4ubuntu3.1_i386.deb Size/MD5: 878928 9ee514d4b91119f3ba6bfc6c1f62fbea
[Full-disclosure] [USN-283-1] MySQL vulnerabilities
=== Ubuntu Security Notice USN-283-1 May 08, 2006 mysql-dfsg-4.1, mysql-dfsg vulnerabilities CVE-2006-1516, CVE-2006-1517 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: mysql-server mysql-server-4.1 The problem can be corrected by upgrading the affected package to version 4.0.23-3ubuntu2.3 (for Ubuntu 5.04), 4.0.24-10ubuntu2.2 (mysql-server for Ubuntu 5.10), or 4.1.12-1ubuntu3.3 (mysql-server-4.1 for Ubuntu 5.10). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Stefano Di Paola discovered an information leak in the login packet parser. By sending a specially crafted malformed login packet, a remote attacker could exploit this to read a random piece of memory, which could potentially reveal sensitive data. (CVE-2006-1516) Stefano Di Paola also found a similar information leak in the parser for the COM_TABLE_DUMP request. (CVE-2006-1517) Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23-3ubuntu2.3.diff.gz Size/MD5: 345474 a03d04b6232f33905f239248035f3c38 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23-3ubuntu2.3.dsc Size/MD5: 891 f45ff763a72c15171cad1162886f35de http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23.orig.tar.gz Size/MD5: 9814467 5eec8f66ed48c6ff92e73161651a492b Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-common_4.0.23-3ubuntu2.3_all.deb Size/MD5:32208 36fa86a1832df41a6371ab247a13 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.3_amd64.deb Size/MD5: 2866464 bd0a5bcdee56e03cbecb27753e0f9f96 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.3_amd64.deb Size/MD5: 307028 3de11414c948eb5ba7cdd0a83eeb96f7 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.23-3ubuntu2.3_amd64.deb Size/MD5: 431620 d90f664ce975be92b926fd5b9d2429ab http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.23-3ubuntu2.3_amd64.deb Size/MD5: 3628942 9596aa1a65337b9b9dbf642c0bd9794d i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.3_i386.deb Size/MD5: 2826196 0762c6d6057e91dae14ade788b45afba http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.3_i386.deb Size/MD5: 289722 1a4a652c075dcab324c7e4f3f6384d1f http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.23-3ubuntu2.3_i386.deb Size/MD5: 404788 e6dcfc067fbae77ce3421a8d8dfdf8cc http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.23-3ubuntu2.3_i386.deb Size/MD5: 3537800 ca606ecc15afb3cce2c295aa1f9ab344 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.3_powerpc.deb Size/MD5: 3179856 dce3423162923cfc56b1ac6b79e07e07 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.3_powerpc.deb Size/MD5: 312632 8cfae324093e3ea018d539d1183133d2 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.23-3ubuntu2.3_powerpc.deb Size/MD5: 462406 96c5db41bc684ebc7754145b52beea3e http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.23-3ubuntu2.3_powerpc.deb Size/MD5: 3839416 0268c71659e4c1cbaa07a88051a4db56 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.3.diff.gz Size/MD5: 162244 fddf1e4d87d56438a65315e3df406b49 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.3.dsc Size/MD5: 1024 adf2851ddc2685c8071330f3d6587ddf http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12.orig.tar.gz Size/MD5: 15921909 c7b83a19bd8a4f42d5d64c239d05121f http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.24-10ubuntu2.2.diff.gz Size/MD5:98632 35543de80b68e132078805f930c22cc3 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.24-10ubuntu2.2.dsc Size/MD5: 964 a3306800e3fb87b1ba6425e1675a1c70 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.24.orig.tar.gz Size/MD5: 9923794 aed8f335795a359f32492159e3edfaa3
[Full-disclosure] [USN-277-1] TIFF library vulnerabilities
=== Ubuntu Security Notice USN-277-1 May 03, 2006 tiff vulnerabilities CVE-2006-2024, CVE-2006-2025, CVE-2006-2026, CVE-2006-2120 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: libtiff4 The problem can be corrected by upgrading the affected package to version 3.6.1-5ubuntu0.3 (for Ubuntu 5.04), or 3.7.3-1ubuntu1.1 (for Ubuntu 5.10). After a standard system upgrade you need to reboot your computer to effect the necessary changes, since this library is used by many client and server applications. Details follow: Tavis Ormandy and Andrey Kiselev discovered that libtiff did not sufficiently verify the validity of TIFF files. By tricking an user into opening a specially crafted TIFF file with any application that uses libtiff, an attacker could exploit this to crash the application or even execute arbitrary code with the application's privileges. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1-5ubuntu0.3.diff.gz Size/MD5:25844 bf3bb894195ad17e5c860daf0b52e1ce http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1-5ubuntu0.3.dsc Size/MD5: 681 7ca48c0c729b1ed1eaf448c8f25f3fd9 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.6.1.orig.tar.gz Size/MD5: 848760 bd252167a20ac7910ab3bd2b3ee9e955 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.3_amd64.deb Size/MD5: 172968 2ffca24fa53dc7bfb5c5901e193a104c http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.3_amd64.deb Size/MD5: 459186 3bb686188917d73793abc5f812d388b9 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.3_amd64.deb Size/MD5: 112794 309519051cbeac5ee4970c17c95f873f i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.3_i386.deb Size/MD5: 155950 dd997be32c7b3379260bf9f9ff9576c8 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.3_i386.deb Size/MD5: 440500 16622a398c014cf6035494e0ff29d660 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.3_i386.deb Size/MD5: 103712 fe939d6535627e0fc713fb43fefa399e powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.6.1-5ubuntu0.3_powerpc.deb Size/MD5: 188176 88838f14d7d5da36f1f403f4c0a39b66 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.6.1-5ubuntu0.3_powerpc.deb Size/MD5: 463658 3aa8bf134de05702211eafa321b06503 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.6.1-5ubuntu0.3_powerpc.deb Size/MD5: 114124 de1c205214d625b875ae75c18c18078a Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3-1ubuntu1.1.diff.gz Size/MD5:10710 2bd5f0ece5925350446d84ee8189e071 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3-1ubuntu1.1.dsc Size/MD5: 756 6189550944c0b45fc86c910ed0dbcf26 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.3.orig.tar.gz Size/MD5: 1268182 48fbef3d76a6253699f28f49c8f25a8b amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.3-1ubuntu1.1_amd64.deb Size/MD5:47954 af59fddd16097f942f3e0e30191d28d0 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.3-1ubuntu1.1_amd64.deb Size/MD5: 219564 3ed70fe840906f3f2a1c3911a7361e29 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.3-1ubuntu1.1_amd64.deb Size/MD5: 281560 1e221cf189548ff8d6e5d1493800c05d http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.3-1ubuntu1.1_amd64.deb Size/MD5: 471914 5736f410bb8db26c4249a4921491be9a http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.3-1ubuntu1.1_amd64.deb Size/MD5:42792 139dc849797a3d1075afb782d6bd6c70 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.3-1ubuntu1.1_i386.deb Size/MD5:47346 5eddb50954c66c612b7f3512782dda0f http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.3-1ubuntu1.1_i386.deb Size/MD5: 204506 18fdd790464fad763946019e3eacf08d http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.3-1ubuntu1.1_i386.deb Size/MD5: 258138 7034f05b5208a7e12d08f0f0f617c267
[Full-disclosure] [USN-278-1] gdm vulnerability
=== Ubuntu Security Notice USN-278-1 May 03, 2006 gdm vulnerabilitiy CVE-2006-1057 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: gdm The problem can be corrected by upgrading the affected package to version 2.6.0.7-0ubuntu7.1 (for Ubuntu 5.04) or 2.8.0.5-0ubuntu1.1 (for Ubuntu 5.10). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Marcus Meissner discovered a race condition in gdm's handling of the ~/.ICEauthority file permissions. A local attacker could exploit this to become the owner of an arbitrary file in the system. When getting control over automatically executed scripts (like cron jobs), the attacker could eventually leverage this flaw to execute arbitrary commands with root privileges. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1.diff.gz Size/MD5:68630 07276634f63f6cf6e3d3946661cf2939 http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1.dsc Size/MD5: 787 6e666f8da0735aee929c25a9818dd53a http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7.orig.tar.gz Size/MD5: 5594495 50254890d9fbbec6b2d3455d4343f6e0 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1_amd64.deb Size/MD5: 1382686 716ba56c1177162685a7198b46a28667 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1_i386.deb Size/MD5: 1343230 9bb1a76e6d0a8658f49ce787f6a66606 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1_powerpc.deb Size/MD5: 1379750 bcaec993d57ce53221c920245495d3b8 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1.diff.gz Size/MD5:65777 3181d42210c694ab595840f1359d5735 http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1.dsc Size/MD5: 820 0165df3317618487e8d39e60b5174c83 http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5.orig.tar.gz Size/MD5: 4226618 349b76492113ab814f2732d4ce3a49c2 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1_amd64.deb Size/MD5: 1618080 7aa6c967d046d2876e577975e5c6759f i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1_i386.deb Size/MD5: 1559770 3dc875b89062d5572b2b2e84a8354434 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1_powerpc.deb Size/MD5: 1571404 1ca7c072d5460d694af449719f2abc57 signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-279-1] libnasl/nessus vulnerability
=== Ubuntu Security Notice USN-279-1 May 03, 2006 libnasl vulnerability CVE-2006-2093 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: libnasl2 The problem can be corrected by upgrading the affected package to version 2.2.3-1ubuntu0.1 (libnasl-dev and libnasl2) and 2.2.4-1ubuntu0.1 (libnasl-dev and libnasl2). After a standard system upgrade you need to restart nessusd to effect the necessary changes. Details follow: Jayesh KS discovered that the nasl_split() function in the NASL (Nessus Attack Scripting Language) library did not check for a zero-length separator argument, which lead to an invalid memory allocation. This library is primarily used in the Nessus security scanner; a remote attacker could exploit this vulnerability to cause the Nessus daemon to crash. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.3-1ubuntu0.1.diff.gz Size/MD5: 325024 934e559032064bdbfaf178e0e64b347d http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.3-1ubuntu0.1.dsc Size/MD5: 758 3326827ac8f9245a9188222ac517224d http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.3.orig.tar.gz Size/MD5: 360918 ee66b86f0a808c9eb1e1756490e5c067 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.3-1ubuntu0.1_amd64.deb Size/MD5: 334004 81c12b0e563175c9add90f462d55c46d http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.3-1ubuntu0.1_amd64.deb Size/MD5: 101580 63413de59bcc9efe8cacbcc34380df67 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.3-1ubuntu0.1_i386.deb Size/MD5: 312834 8c0bfa1daf1854ef200cc9bb4e50a54c http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.3-1ubuntu0.1_i386.deb Size/MD5:95840 4d8e2c1a91d8fc991f2fd1716b8583cb powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.3-1ubuntu0.1_powerpc.deb Size/MD5: 338600 33be5486ddf9ca014d27bf77281200f0 http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.3-1ubuntu0.1_powerpc.deb Size/MD5:99624 98dcfe611e5029dc619caf72dfd4da86 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.4-1ubuntu0.1.diff.gz Size/MD5: 325052 1a6cb2d4eba535bf7d04c86e28753fce http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.4-1ubuntu0.1.dsc Size/MD5: 758 77166e15fa4998fccb44c731649318b9 http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.4.orig.tar.gz Size/MD5: 361551 47de3e86725b5f54f5752233a4bc1ea8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.4-1ubuntu0.1_amd64.deb Size/MD5: 342848 312e410daa37b832a4462c0fd43a256e http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.4-1ubuntu0.1_amd64.deb Size/MD5: 105872 17131088c3fcf03c61ff48c1068de163 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.4-1ubuntu0.1_i386.deb Size/MD5: 314346 3e306ca23afe7008bc7fb1e0864763fa http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.4-1ubuntu0.1_i386.deb Size/MD5:96150 dc30810ccc3d00679da3f081517ada1d powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.4-1ubuntu0.1_powerpc.deb Size/MD5: 344788 fa5ead6eae23d5811973691236068b5a http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.4-1ubuntu0.1_powerpc.deb Size/MD5: 102438 25bf747848d3cec7561298f198ffa1f5 signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-274-1] MySQL vulnerability
=== Ubuntu Security Notice USN-274-1 April 27, 2006 mysql-dfsg vulnerability CVE-2006-0903 === A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: mysql-server The problem can be corrected by upgrading the affected package to version 4.0.20-2ubuntu1.7 (for Ubuntu 4.10), 4.0.23-3ubuntu2.2 (for Ubuntu 5.04), or 4.0.24-10ubuntu2.1 (for Ubuntu 5.10). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: A logging bypass was discovered in the MySQL query parser. A local attacker could exploit this by inserting NUL characters into query strings (even into comments), which would cause the query to be logged incompletely. This only affects you if you enabled the 'log' parameter in the MySQL configuration. Updated packages for Ubuntu 4.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.20-2ubuntu1.7.diff.gz Size/MD5: 176824 f214253e4c2a6ffcfd949bc19410ee6b http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.20-2ubuntu1.7.dsc Size/MD5: 894 19ef051a7994a4faea9b248c12dc44b5 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.20.orig.tar.gz Size/MD5: 9760117 f092867f6df2f50b34b8065312b9fb2b Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-common_4.0.20-2ubuntu1.7_all.deb Size/MD5:25144 b28d3fdc01b8d8194d0388d8d48a257d amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient-dev_4.0.20-2ubuntu1.7_amd64.deb Size/MD5: 2811182 c4111aec963f9a495b261b299e449c2e http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.20-2ubuntu1.7_amd64.deb Size/MD5: 305220 8f6653a1152af3624e68a759a2893827 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.20-2ubuntu1.7_amd64.deb Size/MD5: 423266 f5702114938059a53d531535caaad7f5 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.20-2ubuntu1.7_amd64.deb Size/MD5: 3578122 92a1b9e4c8d874dffc09ebf5fb13e72b i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient-dev_4.0.20-2ubuntu1.7_i386.deb Size/MD5: 2774718 6b2c35f99be213bfc34133995e611f46 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.20-2ubuntu1.7_i386.deb Size/MD5: 288162 61879cbc26a9b7dbb27c6c842546458d http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.20-2ubuntu1.7_i386.deb Size/MD5: 397264 612dc9f1b1149a2af49b0a2aa157e009 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.20-2ubuntu1.7_i386.deb Size/MD5: 3487310 47ecf2e29f3dbe465dfd990ba80c36eb powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient-dev_4.0.20-2ubuntu1.7_powerpc.deb Size/MD5: 3110894 81feb50003ee69b7e93b809b8c0bfc39 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.20-2ubuntu1.7_powerpc.deb Size/MD5: 308852 a8fe34e726d5302deb751838ef8ccb06 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-client_4.0.20-2ubuntu1.7_powerpc.deb Size/MD5: 452684 52bfacf4b50418cc8d30fdde7679eab4 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-server_4.0.20-2ubuntu1.7_powerpc.deb Size/MD5: 3770820 3c992663d03b4b9f548207e7dddb2749 Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23-3ubuntu2.2.diff.gz Size/MD5: 343725 a2b298ae7189d19d610096bd509ce596 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23-3ubuntu2.2.dsc Size/MD5: 891 b92cb6c84451811ccf7bd7c2a56c50b4 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.23.orig.tar.gz Size/MD5: 9814467 5eec8f66ed48c6ff92e73161651a492b Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/mysql-common_4.0.23-3ubuntu2.2_all.deb Size/MD5:31990 2d6d3941ca77a34d4fe04919aac8cbc7 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.23-3ubuntu2.2_amd64.deb Size/MD5: 2866184 3b5f0aa334fc9e1fa7056cf210f94fd2 http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/libmysqlclient12_4.0.23-3ubuntu2.2_amd64.deb Size/MD5: 306820 e2917d28d803a34a4c72da0fbba151d3
[Full-disclosure] [USN-275-1] Mozilla vulnerabilities
=== Ubuntu Security Notice USN-275-1 April 27, 2006 mozilla vulnerabilities CVE-2005-4134, CVE-2006-0292, CVE-2006-0296, CVE-2006-0748, CVE-2006-0749, CVE-2006-1727, CVE-2006-1728, CVE-2006-1729, CVE-2006-1730, CVE-2006-1731, CVE-2006-1732, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1736, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739, CVE-2006-1740, CVE-2006-1741, CVE-2006-1742, CVE-2006-1790 === A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: mozilla-browser mozilla-mailnews mozilla-psm The problem can be corrected by upgrading the affected package to version 2:1.7.13-0ubuntu04.10 (for Ubuntu 4.10), 2:1.7.13-0ubuntu05.04 (for Ubuntu 5.04), and 2:1.7.13-0ubuntu5.10 (for Ubuntu 5.10). After a standard system upgrade you need to restart Mozilla to effect the necessary changes. Details follow: Web pages with extremely long titles caused subsequent launches of Mozilla browser to hang for up to a few minutes, or caused Mozilla to crash on computers with insufficient memory. (CVE-2005-4134) Igor Bukanov discovered that the JavaScript engine did not properly declare some temporary variables. Under some rare circumstances, a malicious website could exploit this to execute arbitrary code with the privileges of the user. (CVE-2006-0292, CVE-2006-1742) The function XULDocument.persist() did not sufficiently validate the names of attributes. An attacker could exploit this to inject arbitrary XML code into the file 'localstore.rdf', which is read and evaluated at startup. This could include JavaScript commands that would be run with the user's privileges. (CVE-2006-0296) Due to a flaw in the HTML tag parser a specific sequence of HTML tags caused memory corruption. A malicious web site could exploit this to crash the browser or even execute arbitrary code with the user's privileges. (CVE-2006-0748) An invalid ordering of table-related tags caused Mozilla to use a negative array index. A malicious website could exploit this to execute arbitrary code with the privileges of the user. (CVE-2006-0749) Georgi Guninski discovered that embedded XBL scripts of web sites could escalate their (normally reduced) privileges to get full privileges of the user if that page is viewed with Print Preview. (CVE-2006-1727) The crypto.generateCRMFRequest() function had a flaw which could be exploited to run arbitrary code with the user's privileges. (CVE-2006-1728) Claus Jørgensen and Jesse Ruderman discovered that a text input box could be pre-filled with a filename and then turned into a file-upload control with the contents intact. A malicious web site could exploit this to read any local file the user has read privileges for. (CVE-2006-1729) An integer overflow was detected in the handling of the CSS property letter-spacing. A malicious web site could exploit this to run arbitrary code with the user's privileges. (CVE-2006-1730) The methods valueOf.call() and .valueOf.apply() returned an object whose privileges were not properly confined to those of the caller, which made them vulnerable to cross-site scripting attacks. A malicious web site could exploit this to modify the contents or steal confidential data (such as passwords) from other opened web pages. (CVE-2006-1731) The window.controllers array variable (CVE-2006-1732) and event handlers (CVE-2006-1741) were vulnerable to a similar attack. The privileged built-in XBL bindings were not fully protected from web content and could be accessed by calling valueOf.call() and valueOf.apply() on a method of that binding. A malicious web site could exploit this to run arbitrary JavaScript code with the user's privileges. (CVE-2006-1733) It was possible to use the Object.watch() method to access an internal function object (the clone parent). A malicious web site could exploit this to execute arbitrary JavaScript code with the user's privileges. (CVE-2006-1734) By calling the XBL.method.eval() method in a special way it was possible to create JavaScript functions that would get compiled with the wrong privileges. A malicious web site could exploit this to execute arbitrary JavaScript code with the user's privileges. (CVE-2006-1735) Michael Krax discovered that by layering a transparent image link to an executable on top of a visible (and presumably desirable) image a malicious site could fool the user to right-click and choose Save image as... from the context menu, which would download the executable instead of the image. (CVE-2006-1736) Several crashes have been fixed which could be triggered by web sites and involve memory corruption. These could potentially be exploited to execute arbitrary code with the user's privileges. (CVE-2006-1737, CVE-2006-1738, CVE-2006-1739, CVE-2006-1790) If the user has turned