-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2005.0339 -- Debian Security Advisory DSA 714-1
             New kdelibs packages fix arbitrary code execution
                               27 April 2005

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           kdelibs
Publisher:         Debian
Operating System:  Debian GNU/Linux 3.0
                   Linux variants
Impact:            Execute Arbitrary Code/Commands
Access:            Remote/Unauthenticated
CVE Names:         CAN-2005-1046

Original Bulletin: http://www.debian.org/security/2005/dsa-714

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 714-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
April 26th, 2005                        http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : kdelibs
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-1046

KDE security team discovered several vulnerabilities in the PCX and
other image file format readers in the KDE core libraries, some of
them exploitable to execute arbitrary code.  To a small extend the
packages in woody are affected as well.

For the stable distribution (woody) this problem has been fixed in
version 2.2.2-13.woody.14.

For the unstable distribution (sid) this problem has been fixed in
version 3.3.2-5.

We recommend that you upgrade your kdelibs packages.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.14.dsc
      Size/MD5 checksum:     1355 2edeb0458baefabf6cad7e312f34712e
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.14.diff.gz
      Size/MD5 checksum:    61029 aab99bcaa38986b246b4c390b3d6240f
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2.orig.tar.gz
      Size/MD5 checksum:  6396699 7a9277a2e727821338f751855c2ce5d3

  Architecture independent components:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-doc_2.2.2-13.woody.14_all.deb
      Size/MD5 checksum:  2566570 bf158da1274e633190acdea02ff3a6b2

  Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.14_alpha.deb
      Size/MD5 checksum:   757842 c36da42fb8265860b8867e45206c9185
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.14_alpha.deb
      Size/MD5 checksum:  7533646 6c306edc12186660b14b05cc05176905
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.14_alpha.deb
      Size/MD5 checksum:   137658 6f108583d6fa4b9faedc63815e8debd9
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.14_alpha.deb
      Size/MD5 checksum:   202316 8c6888e10724394268186d5e02187e48
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.14_alpha.deb
      Size/MD5 checksum:  1022540 4415412df2720a1f2a2a2d4d96a0f67f
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.14_alpha.deb
      Size/MD5 checksum:  1029392 e48959c7502219939d7ae0c978a137f9
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.14_alpha.deb
      Size/MD5 checksum:   198464 06ed7e88d3d172eb614e1bfebc715a84
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.14_alpha.deb
      Size/MD5 checksum:   175010 69a33131b2910a627277a0fe6a8a347c
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.14_alpha.deb
      Size/MD5 checksum:   178430 bdd26c67147a6fe2f330693d4115ff34
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.14_alpha.deb
      Size/MD5 checksum:    37504 82131f7d56034cd5e3fb51bb93feb3ee

  ARM architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.14_arm.deb
      Size/MD5 checksum:   744050 494a6b5e13989bb1af655a08fc6b034d
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.14_arm.deb
      Size/MD5 checksum:  6605028 f82ea87f6cb02efbba5f15eb84d9600a
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.14_arm.deb
      Size/MD5 checksum:   104870 62c8b620f4902992a797e17d5b5e80c3
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.14_arm.deb
      Size/MD5 checksum:   186886 7a931840616877b3a64d5d8a9fdf0b5f
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.14_arm.deb
      Size/MD5 checksum:   652040 a5553896972a43d53cc439ef3b1e4c08
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.14_arm.deb
      Size/MD5 checksum:   655674 294711360824657a7d82322913a0052a
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.14_arm.deb
      Size/MD5 checksum:   156014 5f773c03b00e642344491753752f90d0
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.14_arm.deb
      Size/MD5 checksum:   125094 1f8527c29f51feec519d194347891a2f
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.14_arm.deb
      Size/MD5 checksum:   128216 644d9e2f238ae3674c0bbefc3abd0913
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.14_arm.deb
      Size/MD5 checksum:    37508 555511e6d1542dd85b3f2525a8d1f179

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.14_i386.deb
      Size/MD5 checksum:   743320 91785fa72bd2f7d60f5c1a20fcee6edd
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.14_i386.deb
      Size/MD5 checksum:  6619904 3cb4a66ec80635e08a33d18cbc539c31
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.14_i386.deb
      Size/MD5 checksum:   106408 03e67ed6c91058b72c9421aba5a29fd5
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.14_i386.deb
      Size/MD5 checksum:   183424 5b34a15931eca4001dca956b74a4a827
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.14_i386.deb
      Size/MD5 checksum:   625580 1a9670079bedc52aaf36d50f65a6cdfe
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.14_i386.deb
      Size/MD5 checksum:   629740 eb924c6a36898ed0f4154e92271302a6
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.14_i386.deb
      Size/MD5 checksum:   155318 67ae607a8ce21027cd3c73805c464cab
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.14_i386.deb
      Size/MD5 checksum:   123770 196d19248c6671040e3fc9204c308273
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.14_i386.deb
      Size/MD5 checksum:   126846 ed76442966d9757101beaa782d8bf8f1
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.14_i386.deb
      Size/MD5 checksum:    37486 1a4128190396a577ef04466930cc6e6b

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.14_ia64.deb
      Size/MD5 checksum:   768242 1237c0dfd23668879908a2a2965c227a
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.14_ia64.deb
      Size/MD5 checksum:  8843698 da72b2d17c7c26c9db8f9bc23f92564f
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.14_ia64.deb
      Size/MD5 checksum:   154020 43c47aa7108caa693157bffec1c72447
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.14_ia64.deb
      Size/MD5 checksum:   257678 d2d312195da96a197e9949834c7e6da8
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.14_ia64.deb
      Size/MD5 checksum:  1045820 85d7913da76ecf49dd7ee0c6834204cd
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.14_ia64.deb
      Size/MD5 checksum:  1051304 8cbdc7d36e899a4f71fdea223ec6c88c
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.14_ia64.deb
      Size/MD5 checksum:   199792 f4c638fa150d33b228f5bcdd7d27df8a
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.14_ia64.deb
      Size/MD5 checksum:   185778 fec5f64d251724241d42347c73b68319
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.14_ia64.deb
      Size/MD5 checksum:   191298 a9e1f44bb6d66f786f06e15ae0c0560c
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.14_ia64.deb
      Size/MD5 checksum:    37496 f7ee54e15c6247ddaf296e62b9dc2ef2

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.14_hppa.deb
      Size/MD5 checksum:   750128 5cde6628d6065687f32d23ca42c4b4a2
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.14_hppa.deb
      Size/MD5 checksum:  7367572 ad1e68fa713ed91b5ccb8f14fb97a023
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.14_hppa.deb
      Size/MD5 checksum:   117832 be8e58fb33a273b8ea4c3f55585a430d
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.14_hppa.deb
      Size/MD5 checksum:   218258 8035d8010c52bc2567400dd48fce0c02
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.14_hppa.deb
      Size/MD5 checksum:  1112036 a04250ae1a33687931f7d180e925c6a1
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.14_hppa.deb
      Size/MD5 checksum:  1115628 a0d26fa493cfa9fc3775b9eaa16222da
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.14_hppa.deb
      Size/MD5 checksum:   208046 b6c325233fcb98d2a8d724feaa607c36
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.14_hppa.deb
      Size/MD5 checksum:   172310 4f1e932b44e8a542624b77b5ad27ff7e
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.14_hppa.deb
      Size/MD5 checksum:   176484 db2f63e71a237953ecd5a8fa8604c465
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.14_hppa.deb
      Size/MD5 checksum:    37500 bce68008ede6c63e44500e616331fbb6

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.14_m68k.deb
      Size/MD5 checksum:   740488 80ebcca522f2b3cf87005f0f9f3555e4
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.14_m68k.deb
      Size/MD5 checksum:  6485098 7959f90d7d271535222901edc139c273
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.14_m68k.deb
      Size/MD5 checksum:   103950 f59690bd51e8b1c9809f9df9198d6b37
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.14_m68k.deb
      Size/MD5 checksum:   178844 dec6510a262922ed8b4b3dd9471d024d
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.14_m68k.deb
      Size/MD5 checksum:   629010 8bd957e00e0593af9dba939fe64ac3c8
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.14_m68k.deb
      Size/MD5 checksum:   633518 840ab067671bd13996dc51ddf55e3ac8
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.14_m68k.deb
      Size/MD5 checksum:   151550 713a805ea7a0d530950183b90f60958a
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.14_m68k.deb
      Size/MD5 checksum:   121080 542da8694055f5d3e218e7e8adf456c2
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.14_m68k.deb
      Size/MD5 checksum:   124000 a10868d87ef70a54db09abc0df4434c5
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.14_m68k.deb
      Size/MD5 checksum:    37512 1ad80019230d31fe389ba146771e7ed5

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.14_mips.deb
      Size/MD5 checksum:   740276 960ceb78e82e2df114c7c1fdbfaf45e5
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.14_mips.deb
      Size/MD5 checksum:  6284820 5d7c8d96e691e9026975b7f03071662d
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.14_mips.deb
      Size/MD5 checksum:   107202 4954f1153e012cb625fb675bdefcbe40
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.14_mips.deb
      Size/MD5 checksum:   161288 2113879170ac67549384ced2a64ea5a2
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.14_mips.deb
      Size/MD5 checksum:   621216 433ab8e45480b9db258a42b11a2d83c2
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.14_mips.deb
      Size/MD5 checksum:   625566 4e7b13c2d0cc10469b5524728024ca01
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.14_mips.deb
      Size/MD5 checksum:   176214 65e13e2bf05121c6a4c3dedd12ef7379
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.14_mips.deb
      Size/MD5 checksum:   124612 5f37f8c5aea38bf745f1bc83917fc2af
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.14_mips.deb
      Size/MD5 checksum:   127616 ed13fd47b01ec4c1e932b2e1ab9a5097
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.14_mips.deb
      Size/MD5 checksum:    37512 e89bae84f5d23e44bc8a8c97f90beca5

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.14_mipsel.deb
      Size/MD5 checksum:   739614 b6c96307d8e4bb13eb8030c3c9d8b4fc
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.14_mipsel.deb
      Size/MD5 checksum:  6190894 05e576bc649eaa947db4841872bd9af5
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.14_mipsel.deb
      Size/MD5 checksum:   106208 8b5bad7478c2817b381090e0dbb29795
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.14_mipsel.deb
      Size/MD5 checksum:   159544 3dce69d70433c6d2cb49d875e139eeaa
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.14_mipsel.deb
      Size/MD5 checksum:   614058 838c176f4bd39640a5ba9c37f0a38cc5
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.14_mipsel.deb
      Size/MD5 checksum:   617518 d35cd5459d046df52ddfc0211141ef73
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.14_mipsel.deb
      Size/MD5 checksum:   175364 a77dcb1b7f29aa1603aa20f642ad824e
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.14_mipsel.deb
      Size/MD5 checksum:   123628 fd6962b418fe4c33bf1364429f16446b
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.14_mipsel.deb
      Size/MD5 checksum:   126584 d3170d436f8ffc0a74a1ddc43e1788f3
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.14_mipsel.deb
      Size/MD5 checksum:    37508 ca51ad9bea2b452af76e86e632c111e9

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.14_powerpc.deb
      Size/MD5 checksum:   741300 eb89bb59fa2f161b35999d9181dc01db
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.14_powerpc.deb
      Size/MD5 checksum:  6743570 9619dca36a404d209f93232279508185
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.14_powerpc.deb
      Size/MD5 checksum:   106326 242e987d56b6c372b591033cffde91b7
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.14_powerpc.deb
      Size/MD5 checksum:   182946 f5c3f5cc9ddd5076345bd66c59231ba0
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.14_powerpc.deb
      Size/MD5 checksum:   691316 d137a0428c5e4fd3fae8a7831bdadb3e
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.14_powerpc.deb
      Size/MD5 checksum:   695130 cb7e5a47e2e9892227a3a5dddc726bfd
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.14_powerpc.deb
      Size/MD5 checksum:   154244 fec6e32c9e1a7ed943d7a1984324426a
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.14_powerpc.deb
      Size/MD5 checksum:   127922 b73520e3822413ccb507185c56af1ced
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.14_powerpc.deb
      Size/MD5 checksum:   130804 133638aa6468f9c8bc6f2f6f5e2e4e67
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.14_powerpc.deb
      Size/MD5 checksum:    37504 38201cb34cd63798675dfa5a9e6e90d7

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.14_s390.deb
      Size/MD5 checksum:   742784 36239887c0e7e88e721de5d16a082551
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.14_s390.deb
      Size/MD5 checksum:  6744134 5dae1ac50b4f78dc705d8781f9ef1ea7
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.14_s390.deb
      Size/MD5 checksum:   110856 f862feecc410247fc5d40776d04de014
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.14_s390.deb
      Size/MD5 checksum:   177308 adbae20e71534d6771cf8fcea380e453
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.14_s390.deb
      Size/MD5 checksum:   642670 5165b9299b59b6e905f2e18f2958afa5
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.14_s390.deb
      Size/MD5 checksum:   647630 7210303f5483407c297c3a1e62e1e5c7
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.14_s390.deb
      Size/MD5 checksum:   151798 d0b717e3aee78f6f708b7f086b9741c0
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.14_s390.deb
      Size/MD5 checksum:   130248 edbc32000c6054ba200e3522c9628551
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.14_s390.deb
      Size/MD5 checksum:   133674 7da46cc510872323bebcd09c58fff19a
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.14_s390.deb
      Size/MD5 checksum:    37500 ce0714242e7e0a595a903e1459f5a0c1

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.14_sparc.deb
      Size/MD5 checksum:   742142 9e26ee08c924af025f0015880960c971
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.14_sparc.deb
      Size/MD5 checksum:  6580444 ec9e9aa4f144a0403c51b57992708ff0
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.14_sparc.deb
      Size/MD5 checksum:   118130 390c3ba206654dab2a387f4371411fd0
    http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.14_sparc.deb
      Size/MD5 checksum:   184540 55586ba0a39f1f3c3daa6b0c2081afc5
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.14_sparc.deb
      Size/MD5 checksum:   665362 d0e8852e1e5be139a9f93b0ef1dcc0ad
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.14_sparc.deb
      Size/MD5 checksum:   669202 708f0b996113a04debec2665e1df2c8e
    http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.14_sparc.deb
      Size/MD5 checksum:   152176 e8839c77be54061471e8e0a352d91ae1
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.14_sparc.deb
      Size/MD5 checksum:   129038 9324be7e3be679679ea97ffa5b29b6b5
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.14_sparc.deb
      Size/MD5 checksum:   131742 f450e2fb20246271a2b12f53bcdd76be
    http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.14_sparc.deb
      Size/MD5 checksum:    37498 f6acc8a4444b7e0794d8e675ca403369


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCblrGW5ql+IAeqTIRAk+NAJ4xzSibYRzA7f1JWvEgV8d0/oaZJQCfecPw
DQeU+noGcTB6G8MhnmwxN8A=
=Hkq5
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQm7u8ih9+71yA2DNAQIldgP/ZwQDeo+35urK9KS199+0Xau+TPK1aMy6
60ypa8ZSLOKRscwuUAUSyEwTzYrPwxJiXuGHFiDT9hlR7EKxqSqEjPI73sxp300h
AFWp5hKSoVg/tftJ3xnThtVWeCFMj+oP3YQNi280S9DBN084BK2kTPHvDPbe/pe/
/IsojYakvnc=
=qkM+
-----END PGP SIGNATURE-----