-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2004.0409 -- Debian Security Advisory DSA 518-1
           New kdelibs packages fix URI handler vulnerabilities
                               16 June 2004

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                kdelibs
Publisher:              Debian
Operating System:       Debian GNU/Linux 3.0
                        Linux variants
Impact:                 Overwrite Arbitrary Files
Access Required:        Remote
CVE Names:              CAN-2004-0411

Ref:                     ESB-2004.0349

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 518-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
June 14th, 2004                         http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : kdelibs
Vulnerability  : unsanitised input
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-0411

iDEFENSE identified a vulnerability in the Opera web browser that
could be used by remote attackers to create or truncate arbitrary
files on the victims machine.  The KDE team discovered that a similar
vulnerability exists in KDE.

A remote attacker could entice a user to open a carefully crafted
telnet URI which may either create or truncate a file in the victims
home directory.  In KDE 3.2 and later versions the user is first
explicitly asked to confirm the opening of the telnet URI.

For the stable distribution (woody) this problem has been fixed in
version 2.2.2-13.woody.10.

We recommend that you upgrade your KDE libraries.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.10.dsc
      Size/MD5 checksum:     1355 87b8870b059562d84f714463817558df
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.10.diff.gz
      Size/MD5 checksum:    58099 bb59b94d62d1bb27246963be8e136d57
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2.orig.tar.gz
      Size/MD5 checksum:  6396699 7a9277a2e727821338f751855c2ce5d3

  Architecture independent components:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-doc_2.2.2-13.woody.10_all.deb
      Size/MD5 checksum:  2564260 0f1630714b822c193bfdf710c60274f6

  Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_alpha.deb
      Size/MD5 checksum:   757490 c9d07cba479a5bba3d6567eb1c54129d
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_alpha.deb
      Size/MD5 checksum:  7553390 abff91d8d50f756f788ba70d36ce2a02
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_alpha.deb
      Size/MD5 checksum:   137442 334acae5a3d0491511bfbae8e88bbf1f
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_alpha.deb
      Size/MD5 checksum:   202010 dea66d7e08d3fdeb2033b223a73871cb
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_alpha.deb
      Size/MD5 checksum:  1022340 50826efc1e71dd8c84c900bc5e458805
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_alpha.deb
      Size/MD5 checksum:  1029254 bbfcf86398ecaf7751ef8ac20b4e8deb
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_alpha.deb
      Size/MD5 checksum:   198246 b8f5ba1e60bc9f201798c6f463b38973
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_alpha.deb
      Size/MD5 checksum:   174696 b7d640daca300ea09645ac35e3a99d32
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_alpha.deb
      Size/MD5 checksum:   178164 1a6527f89f38ccad33dee8402a026955
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_alpha.deb
      Size/MD5 checksum:    37266 5fb0f3bb093183f808debd11e77abfcf

  ARM architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_arm.deb
      Size/MD5 checksum:   743780 9c1e0839cf5a603d5b6eacd8644165fe
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_arm.deb
      Size/MD5 checksum:  6604906 b2001cc89feafed549dac4d3fe74bb8d
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_arm.deb
      Size/MD5 checksum:   104600 00b7481a711d88bcdb2702562fceace1
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_arm.deb
      Size/MD5 checksum:   186592 5deadb59a4dce5b7d1d1e9f97b065a73
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_arm.deb
      Size/MD5 checksum:   651780 bcd3e9e1b313c746ac213766144b282b
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_arm.deb
      Size/MD5 checksum:   655412 7c8be1eb3075a58b1a936377632150a3
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_arm.deb
      Size/MD5 checksum:   155638 9acc32815c0ab56b96dc1b61e58bf7a0
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_arm.deb
      Size/MD5 checksum:   124854 46f6c31a873407f537c06d7eaeb83e92
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_arm.deb
      Size/MD5 checksum:   127954 306c61a6dd1472eef43721ead361ddb3
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_arm.deb
      Size/MD5 checksum:    37262 19b68d71fa5c9e60baaa81368eab1a6c

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_i386.deb
      Size/MD5 checksum:   743050 9c445807ee91464fdc93b9455a640ce1
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_i386.deb
      Size/MD5 checksum:  6633628 c64514c4b153f05cb5f31cbac78df1d3
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_i386.deb
      Size/MD5 checksum:   106140 986d6c0a6ac507cf0f7d115f1cd27d74
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_i386.deb
      Size/MD5 checksum:   183070 383bd299b4a8f5dea97de0008da67e15
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_i386.deb
      Size/MD5 checksum:   625208 fa4200ad94f867dcff74045479a5fb01
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_i386.deb
      Size/MD5 checksum:   629530 83fbaf7ef69488eec164bd3c2eed2dab
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_i386.deb
      Size/MD5 checksum:   154996 57c079a635c53cf6d7766fd9ef87b196
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_i386.deb
      Size/MD5 checksum:   123514 0206fdd80e02e61bf43df9fb943b003e
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_i386.deb
      Size/MD5 checksum:   126598 1524775781195327f7f6910b96cf0f1e
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_i386.deb
      Size/MD5 checksum:    37272 c32ebb3072530d3fb7c5e3c9bbd2da66

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_ia64.deb
      Size/MD5 checksum:   767846 929b0bbde81dc77c12e711471d369bc1
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_ia64.deb
      Size/MD5 checksum:  8858604 01b16b6657b890057ed429d4b0f4f4c9
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_ia64.deb
      Size/MD5 checksum:   153754 fe44def3095afc6ca3f8111f9779e3e7
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_ia64.deb
      Size/MD5 checksum:   257172 9d5797385e4d93f3c7c421967b6da854
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_ia64.deb
      Size/MD5 checksum:  1045474 93d585bb02e2c8ea290981917e94cb1a
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_ia64.deb
      Size/MD5 checksum:  1050908 176bedda9448f6fd915574810a972f74
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_ia64.deb
      Size/MD5 checksum:   199530 85f0d5fb9782f26b440747b8af0a4057
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_ia64.deb
      Size/MD5 checksum:   185576 dcd4d23c6764945fdc02eac951bd94ca
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_ia64.deb
      Size/MD5 checksum:   191076 d01c039b281958f56635ad42d546c721
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_ia64.deb
      Size/MD5 checksum:    37262 813759b175ae3073248271af22358aed

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_hppa.deb
      Size/MD5 checksum:   749834 5533364457c838022e779e8491796e13
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_hppa.deb
      Size/MD5 checksum:  7343994 180d8354d5b85a840cb121746b1ed6f2
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_hppa.deb
      Size/MD5 checksum:   117472 41daadd0675a083e5aa1462810ceea66
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_hppa.deb
      Size/MD5 checksum:   217966 f7f7323b81cc2e508a85874e3a267f15
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_hppa.deb
      Size/MD5 checksum:  1111642 50a400debfea7308d16d957b5399978e
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_hppa.deb
      Size/MD5 checksum:  1115416 8702cbc3c6d6491bcfd88676d8c8547a
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_hppa.deb
      Size/MD5 checksum:   207590 3f8db60bfd75043b5eb5b3ca8468ba56
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_hppa.deb
      Size/MD5 checksum:   172030 3a8d92c8bc6813526217c9d035c57996
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_hppa.deb
      Size/MD5 checksum:   176130 54891d1d923e2399e8bfbb324c8e1414
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_hppa.deb
      Size/MD5 checksum:    37264 c1c102ef9c44646973319221c13144a4

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_m68k.deb
      Size/MD5 checksum:   740154 34334b1b1cfd0af3fdbc7a0af0e7d81a
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_m68k.deb
      Size/MD5 checksum:  6484358 dd8701833bbc5ee7276a3a7f01c5c6d7
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_m68k.deb
      Size/MD5 checksum:   103662 1c8614bd285f81b9589788dc5593e828
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_m68k.deb
      Size/MD5 checksum:   178582 76f1e09baa5b94fdd869360f2f599a8f
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_m68k.deb
      Size/MD5 checksum:   628806 6f076ef140375bebc2c0f9c827313152
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_m68k.deb
      Size/MD5 checksum:   633256 1c7073acd9b922a58770b5dc07457391
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_m68k.deb
      Size/MD5 checksum:   151148 06a1fb067ddf1e90b69e40c0e6bb84f0
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_m68k.deb
      Size/MD5 checksum:   120810 554f803f8e7fb226c7b481b8b813b062
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_m68k.deb
      Size/MD5 checksum:   123728 e13fc1738a349620749fda0291039012
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_m68k.deb
      Size/MD5 checksum:    37270 5441efdfb2ac25adcb640d9661a25ae5

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_mips.deb
      Size/MD5 checksum:   740002 95603d551ec28eb4b5568bd946168870
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_mips.deb
      Size/MD5 checksum:  6283956 030e3b82ffa3780eee88fd332278c44f
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_mips.deb
      Size/MD5 checksum:   106946 a6827cc73cc17c178d718fcd341aae32
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_mips.deb
      Size/MD5 checksum:   161090 6f892c177e599484506a790c49de5ddd
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_mips.deb
      Size/MD5 checksum:   620950 4281404d5f49d56bc62fae2a75eb6bf6
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_mips.deb
      Size/MD5 checksum:   625202 15cda3e839440a8541639e6ccfcbc970
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_mips.deb
      Size/MD5 checksum:   175902 2d452895d537beb473263519fb19142f
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_mips.deb
      Size/MD5 checksum:   124324 384fa9eb4c7bae2a35996fc7160d63e4
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_mips.deb
      Size/MD5 checksum:   127348 20d7e1fa06224e04dbd28e3f776cdd7a
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_mips.deb
      Size/MD5 checksum:    37272 97460f9d8761ce1c3ec4a364e8161463

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_mipsel.deb
      Size/MD5 checksum:   739328 3252fbb0235a5312bb7a05b5d957904e
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_mipsel.deb
      Size/MD5 checksum:  6190250 9f3ed8b49200705ea4aa0a1b6b2819e9
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_mipsel.deb
      Size/MD5 checksum:   105914 550af1757d0c1568de0e50f10be08753
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_mipsel.deb
      Size/MD5 checksum:   159316 8c07726937b3b67ab527c7812b478349
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_mipsel.deb
      Size/MD5 checksum:   613722 447caf99bc36251b550b6ac5e7f951be
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_mipsel.deb
      Size/MD5 checksum:   617374 4171afdd4c3d6f2208eb6b6ab4d30a6a
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_mipsel.deb
      Size/MD5 checksum:   175136 72d6de577aa3f9d78496aee0581f7cd5
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_mipsel.deb
      Size/MD5 checksum:   123348 d8e9c85fdae90e9c12d3e923a9f950f1
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_mipsel.deb
      Size/MD5 checksum:   126316 724600f85e61d361aa1911d3c87dda4e
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_mipsel.deb
      Size/MD5 checksum:    37268 7fc64112ff202468633e518e70c1aae9

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_powerpc.deb
      Size/MD5 checksum:   740986 41cea661cd4070e8d43dece1170012e3
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_powerpc.deb
      Size/MD5 checksum:  6742504 2f4aced08b35a414a519ff2aa91b3369
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_powerpc.deb
      Size/MD5 checksum:   106056 c4a8375d0de793dbbe5b41b6caac5775
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_powerpc.deb
      Size/MD5 checksum:   182706 0ac8e1e9be7c1a854e8657860da70362
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_powerpc.deb
      Size/MD5 checksum:   691206 4ce83759c74d334b0d2632e02c3d22d5
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_powerpc.deb
      Size/MD5 checksum:   694750 cb53c58a97b97050cc913ea34bbeba88
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_powerpc.deb
      Size/MD5 checksum:   153906 58353224e77af68451de988da027601c
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_powerpc.deb
      Size/MD5 checksum:   127652 a8583bb02d402d7ee84e19fc5a296ae1
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_powerpc.deb
      Size/MD5 checksum:   130570 8ff764183bc10393c519d32010a2740a
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_powerpc.deb
      Size/MD5 checksum:    37270 8bf7e12f339a6a0d5edcecb77cc62387

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_s390.deb
      Size/MD5 checksum:   742460 5dadec865a235d3c3b5e7c523e7a086c
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_s390.deb
      Size/MD5 checksum:  6740810 a630cdced6335ec84e1ae7beec2a2dfe
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_s390.deb
      Size/MD5 checksum:   110572 4005956b9bbeef2a9e48af41dc067048
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_s390.deb
      Size/MD5 checksum:   177074 cb2bfd52bddeadfd1f6fbeb07847c34f
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_s390.deb
      Size/MD5 checksum:   642356 5ca40da62dc632ccf15275e656bcf524
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_s390.deb
      Size/MD5 checksum:   647464 1e4c0afa42102137bf11784182c69e90
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_s390.deb
      Size/MD5 checksum:   151514 211ded8862398d80034a21b8c617ac2f
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_s390.deb
      Size/MD5 checksum:   130008 e282906341eff69eb564c0985c2dbc5e
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_s390.deb
      Size/MD5 checksum:   133444 ee2c9794ccb325cb19510b49fc9305c7
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_s390.deb
      Size/MD5 checksum:    37268 bcb46494bc7476bb77c477758c36d529

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_sparc.deb
      Size/MD5 checksum:   741822 e4e2ebb01ace0e9656190a58c55cc3f1
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_sparc.deb
      Size/MD5 checksum:  6579034 b476ac0725a3be1382763eff7473321f
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_sparc.deb
      Size/MD5 checksum:   117862 fe309530038fc010ef5cfb5652a5bafd
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_sparc.deb
      Size/MD5 checksum:   184300 eca4eae95ef96ef4fcd5cb019f95a65d
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_sparc.deb
      Size/MD5 checksum:   665080 56f13b02e4e6402cde72ef78cf8bc6ed
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_sparc.deb
      Size/MD5 checksum:   668940 415d841382a2276232afda5c11cdc7db
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_sparc.deb
      Size/MD5 checksum:   151884 196dd2c39fb7ab3f338b9116d957ba4f
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_sparc.deb
      Size/MD5 checksum:   128768 e9b7c833dfd3ac050f427187934a2ab4
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_sparc.deb
      Size/MD5 checksum:   131488 40d5ee36215ce9dd69718948bd163428
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_sparc.deb
      Size/MD5 checksum:    37266 e71969fefab5a015e5d652f3680baef5


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAzag7W5ql+IAeqTIRAtQ3AKCWeRFmZxve1ekiGmkgxZfilVOqHACeMBEV
RxmU60zhhiS+/5lco5kfEOg=
=4+nj
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQM/ibyh9+71yA2DNAQJkOwP9EjDwTjFoHo6GozhFv2Xo4poNTdb44x00
oP0GsA3oknDM5ZCvtUpD0yI4Fj8hr+Twl60wC70KUtlMy3JOVT7hrUH7psD1bkWs
YYuOfkZlvVXmfcH4Vi7QkdhNBaeF/W0nEMHN2iRc1X3h4W0ofdnxmVZwUFabgB6Q
mvnUsHvMXas=
=HF1I
-----END PGP SIGNATURE-----