Operating System:

[Debian]

Published:

27 September 2002

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2002.531 -- Debian Security Advisory DSA 149-2
                          New glibc packages fix
                             27 September 2002

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                glibc
Vendor:                 Debian
Operating System:       Debian GNU/Linux 2.2 alias potato
                        Debian GNU/Linux 3.0 alias woody
Impact:                 Root Compromise
Access Required:        Remote

Ref:                    ESB-2002.426

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 149-2                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
September 26th, 2002                    http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : glibc
Vulnerability  : division by zero
Problem-Type   : remote
Debian-specific: no
CVE Id         : CAN-2002-0391
CERT advisory  : VU#192995

Wolfram Gloger discovered that the bugfix from DSA 149-1 unintentially
replaced potential integer overflows in connection with malloc() with
more likely divisions by zero.  This called for an update.  For
completeness the original security advisory said:

  An integer overflow bug has been discovered in the RPC library used
  by GNU libc, which is derived from the SunRPC library.  This bug
  could be exploited to gain unauthorized root access to software
  linking to this code.  The packages below also fix integer overflows
  in the malloc code.

This is fixed in version 2.2.5-11.2 for the current stable
distribution (woody) by using a patch from the stable glibc-2_2 branch
by Wolfgang and in version 2.1.3-24 for the old stable release
(potato).

We recommend that you upgrade your libc6 packages.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
- - ---------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/g/glibc/glibc_2.1.3-24.dsc
      Size/MD5 checksum:     1060 56a209944950edd0e7bd154bb49a6ff0
    http://security.debian.org/pool/updates/main/g/glibc/glibc_2.1.3-24.diff.gz
      Size/MD5 checksum:   148278 ed41b49981c00c3c8799dc42c48563b1
    http://security.debian.org/pool/updates/main/g/glibc/glibc_2.1.3.orig.tar.gz
      Size/MD5 checksum:  6598238 aea1bb5c28f793013153d1b8f91eb746

  Architecture independent components:

    http://security.debian.org/pool/updates/main/g/glibc/glibc-doc_2.1.3-24_all.deb
      Size/MD5 checksum:  2189546 68a3e801ef1db64d5d72370daa5ed517
    http://security.debian.org/pool/updates/main/g/glibc/i18ndata_2.1.3-24_all.deb
      Size/MD5 checksum:  1062248 a04dad5fc72732421427bb2372d31ed6

  Alpha architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6.1_2.1.3-24_alpha.deb
      Size/MD5 checksum:  7198726 f2fd9f61fbdc92245ae7dc18d4abd081
    http://security.debian.org/pool/updates/main/g/glibc/libc6.1-dbg_2.1.3-24_alpha.deb
      Size/MD5 checksum:  2111990 f730a0d1895e5e5a5a6950a203bf7f5f
    http://security.debian.org/pool/updates/main/g/glibc/libc6.1-dev_2.1.3-24_alpha.deb
      Size/MD5 checksum:  3046530 390e61ccb0c61f55355a73ba7fd5ee3a
    http://security.debian.org/pool/updates/main/g/glibc/libc6.1-pic_2.1.3-24_alpha.deb
      Size/MD5 checksum:  1115348 8313dad63b91fda24d03cf1b8db5766b
    http://security.debian.org/pool/updates/main/g/glibc/libc6.1-prof_2.1.3-24_alpha.deb
      Size/MD5 checksum:  1696132 6f88d706cc9ff6ef9e5a4acf48430299
    http://security.debian.org/pool/updates/main/g/glibc/libnss1-compat_2.1.3-24_alpha.deb
      Size/MD5 checksum:   208516 0c21765032758a8cd6dbeb4dd63f5887
    http://security.debian.org/pool/updates/main/g/glibc/locales_2.1.3-24_alpha.deb
      Size/MD5 checksum:  2283806 e8f70b2194d507167a7df3673ce69a75
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.1.3-24_alpha.deb
      Size/MD5 checksum:   108726 116b94fde805a6facef2c63c9078e431

  ARM architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.1.3-24_arm.deb
      Size/MD5 checksum:  2023802 fe38eb56dfaf0f74272179441d600f50
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.1.3-24_arm.deb
      Size/MD5 checksum:  2334918 ab47d6a506a61db071739fe4a649f1bb
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.1.3-24_arm.deb
      Size/MD5 checksum:  2366110 5f55c612f4e0652bed5acb39a1f38b9b
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.1.3-24_arm.deb
      Size/MD5 checksum:   751874 af5831b0095c4ce31c8aa615916da982
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.1.3-24_arm.deb
      Size/MD5 checksum:  1067678 64b9528fd5ba7f4f19bd77570438dd7d
    http://security.debian.org/pool/updates/main/g/glibc/locales_2.1.3-24_arm.deb
      Size/MD5 checksum:  2284570 962a17552acf2f14228ab68a74b8135e
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.1.3-24_arm.deb
      Size/MD5 checksum:    36882 f170894060545aff048b17dc97c580a4

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.1.3-24_i386.deb
      Size/MD5 checksum:  1901136 000e5ecf3b6f91aeedb9d55960423d11
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.1.3-24_i386.deb
      Size/MD5 checksum:  2441914 9d38f83141c0916b61a8267cd65eec32
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.1.3-24_i386.deb
      Size/MD5 checksum:  2169844 0f91b24937e7681a253c4c3b5cac198b
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.1.3-24_i386.deb
      Size/MD5 checksum:   671160 f68ee40e7059eb70af44fdb865f9e9d8
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.1.3-24_i386.deb
      Size/MD5 checksum:   935130 2c48fe39f2e0cda6d1eae7212fdcc7cc
    http://security.debian.org/pool/updates/main/g/glibc/libnss1-compat_2.1.3-24_i386.deb
      Size/MD5 checksum:    38566 af4416f301864f1ca5b924ff40ac03ae
    http://security.debian.org/pool/updates/main/g/glibc/locales_2.1.3-24_i386.deb
      Size/MD5 checksum:  2284352 005a3ffcfd64d6ecbb61b724df31cb21
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.1.3-24_i386.deb
      Size/MD5 checksum:    36104 1e714f6f05a5befc5ebd9d51ffdec011

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.1.3-24_m68k.deb
      Size/MD5 checksum:  1884736 ac071d3b8ddea10073ea647fb6b63d00
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.1.3-24_m68k.deb
      Size/MD5 checksum:  2446666 e74e04a2bc580a0780a967e250540858
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.1.3-24_m68k.deb
      Size/MD5 checksum:  2097738 13759682b692b9b03a210c13c0360470
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.1.3-24_m68k.deb
      Size/MD5 checksum:   575746 c4d9e985cce239d7d20c5279dd98afc8
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.1.3-24_m68k.deb
      Size/MD5 checksum:   844262 01d755aa3118cd82dae845aaebfe9e8e
    http://security.debian.org/pool/updates/main/g/glibc/libnss1-compat_2.1.3-24_m68k.deb
      Size/MD5 checksum:    36834 9bb0656dc76fb5892ffc6fdfb1f82864
    http://security.debian.org/pool/updates/main/g/glibc/locales_2.1.3-24_m68k.deb
      Size/MD5 checksum:  2285006 fc3c2fdd1b88be3ffda7f1c5e2abb10b
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.1.3-24_m68k.deb
      Size/MD5 checksum:    35054 6b58c82314ed800bf1f9254ba788c54c

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.1.3-24_powerpc.deb
      Size/MD5 checksum:  2101414 0f4776713e33e45f4e690373b76a59eb
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.1.3-24_powerpc.deb
      Size/MD5 checksum:  2517980 6f6e3f2b0bb36f456f65141d2db0f0e4
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.1.3-24_powerpc.deb
      Size/MD5 checksum:  2380332 6fdfad017c64518ba910e5669d2a8329
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.1.3-24_powerpc.deb
      Size/MD5 checksum:   743110 b72f3f3d4ceb159d181e778f54796f61
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.1.3-24_powerpc.deb
      Size/MD5 checksum:  1132594 53e85c04291373fd2c2970758158bd70
    http://security.debian.org/pool/updates/main/g/glibc/locales_2.1.3-24_powerpc.deb
      Size/MD5 checksum:  2283854 ea60273ed2e212d72c16418935f44e83
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.1.3-24_powerpc.deb
      Size/MD5 checksum:    37554 f53fde87752c1c8a0d82c4ca1e14bb1a

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.1.3-24_sparc.deb
      Size/MD5 checksum:  2076376 16d18f67076863192d4cb93a0c719565
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.1.3-24_sparc.deb
      Size/MD5 checksum:  2495574 8d9843e68afecd9b70ec7a842e0ebc31
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.1.3-24_sparc.deb
      Size/MD5 checksum:  2355000 6e25d63cf64954cc053058f22014bcd9
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.1.3-24_sparc.deb
      Size/MD5 checksum:   745808 a9994b98f5ea434032bf389412ee6d16
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.1.3-24_sparc.deb
      Size/MD5 checksum:  1055762 66556a45ca6947ca1e2c7e9154a83a9f
    http://security.debian.org/pool/updates/main/g/glibc/locales_2.1.3-24_sparc.deb
      Size/MD5 checksum:  2270366 1863ee39bce50b704cf6b90b1d867384
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.1.3-24_sparc.deb
      Size/MD5 checksum:    36818 bda2c6fd37c382e761159a5f8530f370


Debian GNU/Linux 3.0 alias woody
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/g/glibc/glibc_2.2.5-11.2.dsc
      Size/MD5 checksum:     1203 cc651d09cfc7f6430af8ef1151b5eebb
    http://security.debian.org/pool/updates/main/g/glibc/glibc_2.2.5-11.2.diff.gz
      Size/MD5 checksum:   397057 4b7aa7f079f6ad37916c46479f741b9f
    http://security.debian.org/pool/updates/main/g/glibc/glibc_2.2.5.orig.tar.gz
      Size/MD5 checksum: 11370961 bf5653fdff22ee350bd7d48047cffab9

  Architecture independent components:

    http://security.debian.org/pool/updates/main/g/glibc/glibc-doc_2.2.5-11.2_all.deb
      Size/MD5 checksum:  2698876 2877980fbea71b195ba8022c62a0000a
    http://security.debian.org/pool/updates/main/g/glibc/locales_2.2.5-11.2_all.deb
      Size/MD5 checksum:  3391588 ab19531457d3d3298f92f2e2d0119cbb

  Alpha architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6.1_2.2.5-11.2_alpha.deb
      Size/MD5 checksum:  4557458 176d72bbacaf8ca7b33d04ecaa9b7001
    http://security.debian.org/pool/updates/main/g/glibc/libc6.1-dbg_2.2.5-11.2_alpha.deb
      Size/MD5 checksum:  1350652 4d1adaf79d9d7ca16ad2a58d4a4ae3d8
    http://security.debian.org/pool/updates/main/g/glibc/libc6.1-dev_2.2.5-11.2_alpha.deb
      Size/MD5 checksum:  2980802 6beeba4ad4be0a5e9503a032725ba6d7
    http://security.debian.org/pool/updates/main/g/glibc/libc6.1-pic_2.2.5-11.2_alpha.deb
      Size/MD5 checksum:  1321276 4568dac2cd0e8a9c7ee769dc6c1bf529
    http://security.debian.org/pool/updates/main/g/glibc/libc6.1-prof_2.2.5-11.2_alpha.deb
      Size/MD5 checksum:  1538660 b4ab2403a706739c2fbd1fe7db40f849
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.2_alpha.deb
      Size/MD5 checksum:    69382 8dbb4e14a60ce6c43dc49dbd9f0ecdd2

  ARM architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.2_arm.deb
      Size/MD5 checksum:  3685852 4b3c7dfc2e46d90631b389426dbdd19e
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.2_arm.deb
      Size/MD5 checksum:  2766750 f63f1726754da166bf064b2649ed3cc0
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.2_arm.deb
      Size/MD5 checksum:  2863014 f675ad2c4d39d39549bf2741638383c4
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.2_arm.deb
      Size/MD5 checksum:  1181936 3e050aeaf61f85556e9c2c6242f0bff7
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.2_arm.deb
      Size/MD5 checksum:  1282360 0f033ad6075c751e53f7644cf8a60c55
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.2_arm.deb
      Size/MD5 checksum:    59166 b4f7c6430ede4d4eefa7202fc4af5efc

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.2_i386.deb
      Size/MD5 checksum:  3383072 e37cc3dad69df9188d987a42fabde738
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.2_i386.deb
      Size/MD5 checksum:  2433230 e9dc8b93c756a7437d9e91d65faca903
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.2_i386.deb
      Size/MD5 checksum:  2390510 1bef69010fe0210df244a869662e654a
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.2_i386.deb
      Size/MD5 checksum:   841480 fb2da2b3efa28a23655eb5692dc6813d
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.2_i386.deb
      Size/MD5 checksum:   935728 d52850d335439ffad21e523d9e3422ec
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.2_i386.deb
      Size/MD5 checksum:    58870 e082d24f6735dfd0d8e2688430b347d3

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6.1_2.2.5-11.2_ia64.deb
      Size/MD5 checksum:  4437938 8cc6c8e99c62dc1918dab5a7aa35fb6d
    http://security.debian.org/pool/updates/main/g/glibc/libc6.1-dbg_2.2.5-11.2_ia64.deb
      Size/MD5 checksum:  8369284 2ad6308b967df7ea5ea31a0645a595c3
    http://security.debian.org/pool/updates/main/g/glibc/libc6.1-dev_2.2.5-11.2_ia64.deb
      Size/MD5 checksum:  3556276 46303674b90149bb65b54dee342ff235
    http://security.debian.org/pool/updates/main/g/glibc/libc6.1-pic_2.2.5-11.2_ia64.deb
      Size/MD5 checksum:  1365628 43c42ce2e2ab8cfd652751d8f64fa05e
    http://security.debian.org/pool/updates/main/g/glibc/libc6.1-prof_2.2.5-11.2_ia64.deb
      Size/MD5 checksum:  1637776 652a8ce2ea752ff32efefc3410940573
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.2_ia64.deb
      Size/MD5 checksum:    69456 f310fb9f327993155860c4c55111f6fa

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.2_hppa.deb
      Size/MD5 checksum:  4170820 57c6b87339826f6442ecad5a381b7c1b
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.2_hppa.deb
      Size/MD5 checksum:  3060268 2633dc06b0488e92aa81c92640a0d987
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.2_hppa.deb
      Size/MD5 checksum:  2897006 b7fef6dff42f2fa2f85ade4883de3d9a
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.2_hppa.deb
      Size/MD5 checksum:  1280278 4411ac432905eae0d97f468e3ca46904
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.2_hppa.deb
      Size/MD5 checksum:  1445386 702cc2098d5c87cf94a00960377fde8c
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.2_hppa.deb
      Size/MD5 checksum:    62306 310b5a74bcdeea880bade38af2917c48

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.2_m68k.deb
      Size/MD5 checksum:  3505748 12db5cbab079e9725aab14aeba2fbedd
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.2_m68k.deb
      Size/MD5 checksum:  2430290 46de8de296d647d4d680af31db808a15
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.2_m68k.deb
      Size/MD5 checksum:  2283638 02451ca9facfe6a673c9e4acb17d3c6a
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.2_m68k.deb
      Size/MD5 checksum:   731728 33f0a018ce93712090db3d2fc330a952
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.2_m68k.deb
      Size/MD5 checksum:   839092 131dc3626f358dd0c41a46f797d207d6
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.2_m68k.deb
      Size/MD5 checksum:    57702 7bbf7e77bc6d18a01a755b88aadff551

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.2_mips.deb
      Size/MD5 checksum:  3864018 2995a8d8d9ea372f6c627da72c144892
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.2_mips.deb
      Size/MD5 checksum:  3845706 68aaa757b10ac15c8b3e245a4255bfa2
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.2_mips.deb
      Size/MD5 checksum:  2979350 8629911cf42f31a1e4a7ecf281fe7231
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.2_mips.deb
      Size/MD5 checksum:  1203758 782edc65e4216c3f61a31207901259be
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.2_mips.deb
      Size/MD5 checksum:  1358188 ca7fe15a6661c4ccb9d7747af2b83f21
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.2_mips.deb
      Size/MD5 checksum:    60820 b318acf8a556df872933c2cb24cdb171

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.2_mipsel.deb
      Size/MD5 checksum:  3731392 9276b9cfffd22ce2ece77303f463aaf1
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.2_mipsel.deb
      Size/MD5 checksum:  3753058 4b90f2cc66add173393495ca6e766e91
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.2_mipsel.deb
      Size/MD5 checksum:  2971922 08ea3d5e516352cc6e0d0401dc59ba9f
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.2_mipsel.deb
      Size/MD5 checksum:  1197782 59b2a516fe2bc481aa6a600a929f6ea4
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.2_mipsel.deb
      Size/MD5 checksum:  1352716 3881c0cd7cc4e706e617468dfe00272a
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.2_mipsel.deb
      Size/MD5 checksum:    60778 3e93eda4d9e1f152eb9f64fae357f46e

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.2_powerpc.deb
      Size/MD5 checksum:  3979780 1d672e83c70a55ece8ca4a6800f6e4f4
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.2_powerpc.deb
      Size/MD5 checksum:  2869412 2c2f402ac905b8a53a69e5287730cc64
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.2_powerpc.deb
      Size/MD5 checksum:  2819666 a93d0af54362458e6ded73ff17f38c3c
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.2_powerpc.deb
      Size/MD5 checksum:  1148350 89077e75cf82f6105353e890546af293
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.2_powerpc.deb
      Size/MD5 checksum:  1343230 275a863e6cbd27b45253bbb081cd709b
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.2_powerpc.deb
      Size/MD5 checksum:    59818 4f81cae06383526dd421f899c90a9093

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.2_s390.deb
      Size/MD5 checksum:  3906712 2cf16576c6a179192025dec56950ab79
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.2_s390.deb
      Size/MD5 checksum:  1211148 1593f7dd6e46e1a00853bdae70c16012
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.2_s390.deb
      Size/MD5 checksum:  2595096 69c47e533c2777cade87ee6744d01f34
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.2_s390.deb
      Size/MD5 checksum:  1091674 3fdd48832defadc26a76d00b4cb41820
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.2_s390.deb
      Size/MD5 checksum:  1170718 846e3b767d527ad8664034ad4500936e
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.2_s390.deb
      Size/MD5 checksum:    60676 b87ed84eeb880b2e7bba7b3752287766

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.2_sparc.deb
      Size/MD5 checksum:  3862902 ade77878a5d2c77382743a734552eb05
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.2_sparc.deb
      Size/MD5 checksum:  2816124 b66a6a7dcb2d5430b004e675e3821876
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.2_sparc.deb
      Size/MD5 checksum:  2752354 28850f05607208be9f862f11e1c87047
    http://security.debian.org/pool/updates/main/g/glibc/libc6-dev-sparc64_2.2.5-11.2_sparc.deb
      Size/MD5 checksum:  1630408 36a193faabda15a6522089686290374b
    http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.2_sparc.deb
      Size/MD5 checksum:  1146214 4c66c97b37c5e2c9297f059f787f7427
    http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.2_sparc.deb
      Size/MD5 checksum:  1257804 241efa720c7f5f28a8d68f9f5a643a83
    http://security.debian.org/pool/updates/main/g/glibc/libc6-sparc64_2.2.5-11.2_sparc.deb
      Size/MD5 checksum:  4184406 dda2fad43eb67b6dc6ea0e5dde1ee293
    http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.2_sparc.deb
      Size/MD5 checksum:    59732 6e68a1a608f223b8037a3743d7c9b0e1


  These files will probably be moved into the stable distribution on
  its next revision.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE9kz1jW5ql+IAeqTIRAmJAAKCxoc2ib2KWyzF1nEruW660ZGS0kQCfV2sC
+Dw1P+g0JrjSeCZIglmjKa0=
=RoEZ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBPZR1xSh9+71yA2DNAQFveQQAgY1FXtgR0wDKrCH6FndRDzZOjXV6VjXM
Tm24i8L71ugXt/jSmWg8Nu7D6G+SNRrxvFeASKVH0hOoiBFpVLLH+3958pxvMxeM
3V0y/TNdWIE4cngLaBfGuX09o5HMlmXPdTya9M7PZcH1W8Z/uI3cQ/O/F4lg2y1p
tiHntTJUQZU=
=fRmr
-----END PGP SIGNATURE-----