[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 717/06 - Three Ubuntu Security Notices:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

 UNIRAS (UK Government CERT) Briefing - 717/06 dated 06.11.06 time 14:55
 UNIRAS is part of NISCC (the UK National Infrastructure Security
 Co-ordination Centre)
______________________________________________________________________________

 UNIRAS material is available from the NISCC website at www.niscc.gov.uk
______________________________________________________________________________

Title
=====

Three Ubuntu Security Notices:

1. USN-376-1 - imlib2 vulnerabilities

2. USN-377-1 - NVIDIA vulnerability

3. USN-378-1 - rpm vulnerability

Detail
======

1. M. Joonas Pihlaja discovered that imlib2 did not sufficiently verify the 
validity of ARGB, JPG, LBM, PNG, PNM, TGA, and TIFF images.  If a user 
were tricked into viewing or processing a specially crafted image with 
an application that uses imlib2, the flaws could be exploited to execute 
arbitrary code with the user's privileges.

2. Derek Abdine discovered that the NVIDIA Xorg driver did not correctly 
verify the size of buffers used to render text glyphs.  When displaying 
very long strings of text, the Xorg server would crash.  If a user were 
tricked into viewing a specially crafted series of glyphs, this flaw 
could be exploited to run arbitrary code with root privileges.

3. An error was found in the RPM library's handling of query reports.  In 
some locales, certain RPM packages would cause the library to crash.  If 
a user was tricked into querying a specially crafted RPM package, the 
flaw could be exploited to execute arbitrary code with the user's 
privileges.




1.



=========================================================== 
Ubuntu Security Notice USN-376-1          November 03, 2006
imlib2 vulnerabilities
CVE-2006-4806, CVE-2006-4807, CVE-2006-4808, CVE-2006-4809
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  libimlib2                                1.2.0-2.2ubuntu2.1

Ubuntu 6.06 LTS:
  libimlib2                                1.2.1-2ubuntu0.1

Ubuntu 6.10:
  libimlib2                                1.2.1-2ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

M. Joonas Pihlaja discovered that imlib2 did not sufficiently verify the 
validity of ARGB, JPG, LBM, PNG, PNM, TGA, and TIFF images.  If a user 
were tricked into viewing or processing a specially crafted image with 
an application that uses imlib2, the flaws could be exploited to execute 
arbitrary code with the user's privileges.


Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/imlib2_1.2.0-2.2ubuntu2.1.diff.gz
      Size/MD5:   100796 c82218d8d766d6c07313616ec4cf2869
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/imlib2_1.2.0-2.2ubuntu2.1.dsc
      Size/MD5:      749 8077c827432795c90a5e5097574539e4
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/imlib2_1.2.0.orig.tar.gz
      Size/MD5:   891164 dfc6d3cc270354af22ef9b5e3b312003

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2-dev_1.2.0-2.2ubuntu2.1_amd64.deb
      Size/MD5:   343188 a2c46b274c821dfa0f9ea479007a2260
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2_1.2.0-2.2ubuntu2.1_amd64.deb
      Size/MD5:   206726 c5db59d4cbbc613fbe2a9033ea163231

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2-dev_1.2.0-2.2ubuntu2.1_i386.deb
      Size/MD5:   300514 c69d47be87992d1c60b7cb3c97c99295
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2_1.2.0-2.2ubuntu2.1_i386.deb
      Size/MD5:   193200 2a07bef4498aec608729f855d629e792

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2-dev_1.2.0-2.2ubuntu2.1_powerpc.deb
      Size/MD5:   341252 65f5260ccaa1ec702e7023c566468c6e
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2_1.2.0-2.2ubuntu2.1_powerpc.deb
      Size/MD5:   213304 1694fcb555e6ebd08e824ed4700353f8

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2-dev_1.2.0-2.2ubuntu2.1_sparc.deb
      Size/MD5:   320930 947d8ad96ed45db2a339f18e637dcf6f
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2_1.2.0-2.2ubuntu2.1_sparc.deb
      Size/MD5:   197354 31eb4587fd3d1ed053249cdf69870b95

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/imlib2_1.2.1-2ubuntu0.1.diff.gz
      Size/MD5:   104822 b7b83481b45c6649393bf5f335b927e9
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/imlib2_1.2.1-2ubuntu0.1.dsc
      Size/MD5:      745 5984c54a0a0bb957119f22dfb1d4d76e
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/imlib2_1.2.1.orig.tar.gz
      Size/MD5:   911360 deb3c9713339fe9ca964e100cce42cd1

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2-dev_1.2.1-2ubuntu0.1_amd64.deb
      Size/MD5:   352012 6061ed5e49df0b5a88ca1f8fee8ff1a7
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2_1.2.1-2ubuntu0.1_amd64.deb
      Size/MD5:   214358 8d8d4f1ea638475cddb1f28c4d493cca

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2-dev_1.2.1-2ubuntu0.1_i386.deb
      Size/MD5:   302338 3bbc57a2a6d29ad243f291fce03d04e5
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2_1.2.1-2ubuntu0.1_i386.deb
      Size/MD5:   193210 14b26ac483c07cc0840053e3b656e221

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2-dev_1.2.1-2ubuntu0.1_powerpc.deb
      Size/MD5:   341726 f0679ab29b0123460f646470aff23017
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2_1.2.1-2ubuntu0.1_powerpc.deb
      Size/MD5:   212592 584c6ab6435c8ad94faaca0e0e75613c

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2-dev_1.2.1-2ubuntu0.1_sparc.deb
      Size/MD5:   317964 3bd6c317bc3c1c770a20ef6e164821ef
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2_1.2.1-2ubuntu0.1_sparc.deb
      Size/MD5:   193948 9bb7f287b8493e4357b846fe0724b395

Updated packages for Ubuntu 6.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/imlib2_1.2.1-2ubuntu1.1.diff.gz
      Size/MD5:   104898 2ab743c57b1b32afadc11c5dc0e55c25
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/imlib2_1.2.1-2ubuntu1.1.dsc
      Size/MD5:      745 11976cf02780a00e1e9bbd0857a45743
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/imlib2_1.2.1.orig.tar.gz
      Size/MD5:   911360 deb3c9713339fe9ca964e100cce42cd1

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2-dev_1.2.1-2ubuntu1.1_amd64.deb
      Size/MD5:   354212 6a3fd86de721474e8da50f1ef11437cc
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2_1.2.1-2ubuntu1.1_amd64.deb
      Size/MD5:   218382 cc08888dfedecbbc8d680663cc0b968f

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2-dev_1.2.1-2ubuntu1.1_i386.deb
      Size/MD5:   318096 0718c201480b313f3ec220856068c6a8
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2_1.2.1-2ubuntu1.1_i386.deb
      Size/MD5:   202792 e196f939edc08781a90f9a04d9549026

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2-dev_1.2.1-2ubuntu1.1_powerpc.deb
      Size/MD5:   345768 a9cbd9ef3f718230077ff949d2f0a22b
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2_1.2.1-2ubuntu1.1_powerpc.deb
      Size/MD5:   217928 0195e3b0bd2da4271e8dd87922a8bd39

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2-dev_1.2.1-2ubuntu1.1_sparc.deb
      Size/MD5:   324270 1e3f5a1195eec8b1f36d5f6b5d310ed9
    http://security.ubuntu.com/ubuntu/pool/main/i/imlib2/libimlib2_1.2.1-2ubuntu1.1_sparc.deb
      Size/MD5:   198158 87863ac900cf6424dd7363a2e62bfa44



2.



=========================================================== 
Ubuntu Security Notice USN-377-1          November 03, 2006
linux-restricted-modules-2.6.15, linux-restricted-modules-2.6.17 vulnerability
CVE-2006-5379
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  nvidia-glx                               2.6.15.12-1

Ubuntu 6.10:
  nvidia-glx                               2.6.17.6-1

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

Derek Abdine discovered that the NVIDIA Xorg driver did not correctly 
verify the size of buffers used to render text glyphs.  When displaying 
very long strings of text, the Xorg server would crash.  If a user were 
tricked into viewing a specially crafted series of glyphs, this flaw 
could be exploited to run arbitrary code with root privileges.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.12-1.diff
.gz
      Size/MD5:    93985 860cf848d5a892ba4186fb5e32f95d71
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.12-1.dsc
      Size/MD5:     3185 fd345d93d114f214837ff962508a6435
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.12.orig.t
ar.gz
      Size/MD5: 97745908 fb5765cfa2b0fdb06deb54fd6e537772

  Architecture independent packages:

 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-common_2.6.15.12-1_all.
deb
      Size/MD5:    18026 511ba0287932624db24d03e8dc79e685

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-27_3.11+2.6.15.12-1_am
d64.deb
      Size/MD5:   475148 5dda49165c6f7983814b3f16afbee12a
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.12-1_amd64.d
eb
      Size/MD5:  2404976 9bcf05ed37ccfe93776ccd013b30e229
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.12-1_amd64.deb
      Size/MD5:    76330 7b603576f7fea73119539f1ab13e616a
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.12-1_amd64.de
b
      Size/MD5:   510596 6efc07ea0add8578b32690543168e5bf
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-27-amd64-generic
_2.6.15.12-1_amd64.deb
      Size/MD5:  6861368 6c694708d980e88081536cc88d67a256
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-27-amd64-k8_2.6.
15.12-1_amd64.deb
      Size/MD5:  6860776 4bce165d50b69d7c8c5d059f9b69f3cf
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-27-amd64-xeon_2.
6.15.12-1_amd64.deb
      Size/MD5:  6837398 043473e222094dc1f67afda0122fd57d
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-27-amd64-generic-
di_2.6.15.12-1_amd64.udeb
      Size/MD5:   798880 a55cec041afe9f751e2d390989b41e98
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-27-amd64-generic-d
i_2.6.15.12-1_amd64.udeb
      Size/MD5:   497168 c51520e4bb75c3a02f38e6a0250584bf
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8776+2.6.15.12-1_amd64.deb
      Size/MD5:   166868 3d24ae843856bd7a9a5414b5f2df3106
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.12-1_amd64
.deb
      Size/MD5:   161920 bb23cd9f007b4b3ded1f33f819606c33
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.12-1_amd64.deb
      Size/MD5:  6070790 de787ded8f07bb0451cb14a672483eea
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8776+2.6.15.12-1_amd64.deb
      Size/MD5:  7328294 3bd3ab044d0310f4445e6a1f2d945a44
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8776+2.6.15.12-1_amd64.
deb
      Size/MD5:  1754438 dfbc5d8345be58adbd5c4393fdfc6645
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.12-1
_amd64.deb
      Size/MD5:  1405374 f84728215eaab40fd3b2d14be83d2135
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.12-1_
amd64.deb
      Size/MD5:   125436 d1d73b54a3a8f311c737d9628920a610
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.12-1_amd6
4.deb
      Size/MD5: 17296644 1e31e9bfd5cca7eb4f530fe085208342

  i386 architecture (x86 compatible Intel/AMD)

 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-27_3.11+2.6.15.12-1_i3
86.deb
      Size/MD5:  1204706 0c817291a4221fee929310427e96124c
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.12-1_i386.de
b
      Size/MD5:  3692714 4aee7ca54a018293a36f88ac2e67b82a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.12-1_i386.deb
      Size/MD5:    73244 9f03667b16646576b3aeaf1713338cc8
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.12-1_i386.deb
      Size/MD5:   660622 23b94b55e3545d22ecc369ab97fd57aa
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-27-386_2.6.15.12
-1_i386.deb
      Size/MD5:  8138584 44e91577e8b3488e8c79e96bdb02f003
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-27-686_2.6.15.12
-1_i386.deb
      Size/MD5:  7939688 9ec57786ee6e0d4007c11c82532a0195
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-27-k7_2.6.15.12-
1_i386.deb
      Size/MD5:  7938538 71e91037e2557e80ee79e8ebf32c4bc1
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-27-386-di_2.6.15.
12-1_i386.udeb
      Size/MD5:   798676 db53d667b0c32b49446b084853119743
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-27-386-di_2.6.15.1
2-1_i386.udeb
      Size/MD5:   476048 5b435f2742539568b10aeaa6a796394a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8776+2.6.15.12-1_i386.deb
      Size/MD5:   147600 67d4f4c38ed00413dca3b506d2b88292
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.12-1_i386.
deb
      Size/MD5:   140040 196548e08e5a8b8eff12af82c1e321d9
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.12-1_i386.deb
      Size/MD5:  3060302 055b0320696d8b528ba718bd7b964e42
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8776+2.6.15.12-1_i386.deb
      Size/MD5:  4063236 513dd4a98ce192f609b592ceccf93bb5
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8776+2.6.15.12-1_i386.d
eb
      Size/MD5:  1693954 937fe24556b5ce58e5fbbb09c86fe747
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.12-1
_i386.deb
      Size/MD5:  1401472 6dc14bac0bcc20fa3380f17ec0db3958
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.12-1_
i386.deb
      Size/MD5:   110882 1e0a2d00fd12b4209ea4cee6aed0a6bd
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.12-1_i386
.deb
      Size/MD5: 10557080 08b07d84b1e031e6292abd9b7e201d09

  powerpc architecture (Apple Macintosh G3/G4/G5)

 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-27-powerpc-smp_2
.6.15.12-1_powerpc.deb
      Size/MD5:  1339776 100c1caf0c79c821481c790ff4b8c78f
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-27-powerpc_2.6.1
5.12-1_powerpc.deb
      Size/MD5:  1334962 7ebf39deaf741b2ce0995a897b90911c
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-27-powerpc-di_2.6
.15.12-1_powerpc.udeb
      Size/MD5:   798758 f1a6d4e2f0305cd926b9404e9bfd79db
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-27-powerpc-di_2.6.
15.12-1_powerpc.udeb
      Size/MD5:   508364 d0737826161116ae123462e6ae1f54c4

  sparc architecture (Sun SPARC/UltraSPARC)

 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-27-sparc64-smp_2
.6.15.12-1_sparc.deb
      Size/MD5:   827710 485cea3ab9b8dc70c99596c07b22100d
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-27-sparc64_2.6.1
5.12-1_sparc.deb
      Size/MD5:   827628 0d9384446c976ed7a21684e1e80b2c11

Updated packages for Ubuntu 6.10:

  Source archives:

 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17_2.6.17.6-1.diff.
gz
      Size/MD5:    91862 0b689112bdb2ed66b79f28491332a004
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17_2.6.17.6-1.dsc
      Size/MD5:     2609 111b65d72b4f9525795577e41a6f7f44
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17_2.6.17.6.orig.ta
r.gz
      Size/MD5: 94291308 1c7b51bee76f372b00e0182dcff2a3f0

  Architecture independent packages:

 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-common_2.6.17.6-1_all.d
eb
      Size/MD5:    19968 9fa10c891935212a6a285c97a74997b7

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/avm-fritz-firmware-2.6.17-10_3.11+2.6.17.6-1_amd
64.deb
      Size/MD5:   476564 f506c09973eee4bfb64a46ae1e48f65f
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/avm-fritz-kernel-source_3.11+2.6.17.6-1_amd64.de
b
      Size/MD5:  2129856 fce2f208a402b2111526240bc2577dac
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/fglrx-control_8.28.8+2.6.17.6-1_amd64.deb
      Size/MD5:    77346 6e5b82e4e244c2ee5f31e008316cf60d
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/fglrx-kernel-source_8.28.8+2.6.17.6-1_amd64.deb
      Size/MD5:   547288 e7714816d9e8c9e60f6ec38d6de83ac8
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17-10-generic_2.6.1
7.6-1_amd64.deb
      Size/MD5:  6652086 4cb3732eff52654a388ed98962860369
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nic-restricted-firmware-2.6.17-10-generic-di_2.6
.17.6-1_amd64.udeb
      Size/MD5:   965670 4c176ca88d07f8532bf31a474117f599
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nic-restricted-modules-2.6.17-10-generic-di_2.6.
17.6-1_amd64.udeb
      Size/MD5:   319150 3d687938577004da7944befb541fa632
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nvidia-glx-dev_1.0.8776+2.6.17.6-1_amd64.deb
      Size/MD5:   168262 0f734ab07464e3b802aa6fc12120772b
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-glx-legacy-dev_1.0.7184+2.6.17.6-1_amd64.
deb
      Size/MD5:   162198 b724b69b1872e043f5ad1b59af4f4fa2
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-glx-legacy_1.0.7184+2.6.17.6-1_amd64.deb
      Size/MD5:  6082124 cceecbe70074cf7fecc42f5e6b197c59
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nvidia-glx_1.0.8776+2.6.17.6-1_amd64.deb
      Size/MD5:  7330336 c0c9ff9f408597d95bcdc3427d9e654b
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-kernel-source_1.0.8776+2.6.17.6-1_amd64.d
eb
      Size/MD5:  1755790 5c90ab4bd3c645e9c4ef4bc2daf6ccda
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-legacy-kernel-source_1.0.7184+2.6.17.6-1_
amd64.deb
      Size/MD5:  1383304 260ee7cbf06c3c7d9d088c283b3e6dad
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/vmware-player-kernel-modules-2.6.17-10_2.6.17.6-
1_amd64.deb
      Size/MD5:    93946 f5e5d5e217cb57b358b67f6ef32b92cb
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/xorg-driver-fglrx-dev_7.1.0-8.28.8+2.6.17.6-1_am
d64.deb
      Size/MD5:   133336 0a92c5ead9753fbed625e86c1ea12896
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/xorg-driver-fglrx_7.1.0-8.28.8+2.6.17.6-1_amd64.
deb
      Size/MD5: 16016432 71939c1da3a7ed6628b9a33ca8172cf8

  i386 architecture (x86 compatible Intel/AMD)

 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/avm-fritz-firmware-2.6.17-10_3.11+2.6.17.6-1_i38
6.deb
      Size/MD5:  1206110 6d1181995e227863f01dee7d37500502
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/avm-fritz-kernel-source_3.11+2.6.17.6-1_i386.deb
      Size/MD5:  3426564 b753457eef99261a3f4b790cea557791
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/fglrx-control_8.28.8+2.6.17.6-1_i386.deb
      Size/MD5:    74670 7761d4ab233473090dc7868293365cb8
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/fglrx-kernel-source_8.28.8+2.6.17.6-1_i386.deb
      Size/MD5:   701442 da89526ba22b2baf688c42dae37efc23
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17-10-386_2.6.17.6-
1_i386.deb
      Size/MD5:  7886198 2a240f7c12a0c6272b994275e8f7111f
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17-10-generic_2.6.1
7.6-1_i386.deb
      Size/MD5:  7681650 b766af56929dc612234c7182cee57e0f
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nic-restricted-firmware-2.6.17-10-386-di_2.6.17.
6-1_i386.udeb
      Size/MD5:   965574 7575fb2ff90854d87da08a61710ccdee
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nic-restricted-modules-2.6.17-10-386-di_2.6.17.6
-1_i386.udeb
      Size/MD5:   292836 7a795982171f93b4437c09655b87a4ee
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nvidia-glx-dev_1.0.8776+2.6.17.6-1_i386.deb
      Size/MD5:   149072 8c98c4acd0ff30063aca8938f3c202c1
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-glx-legacy-dev_1.0.7184+2.6.17.6-1_i386.d
eb
      Size/MD5:   141240 98633bb9a3a9181a943985119845a9b8
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-glx-legacy_1.0.7184+2.6.17.6-1_i386.deb
      Size/MD5:  3070234 a05664bc89410cec046ba00c4083651f
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nvidia-glx_1.0.8776+2.6.17.6-1_i386.deb
      Size/MD5:  4066066 eb8326f80e95abedeb5cb8887e04a263
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-kernel-source_1.0.8776+2.6.17.6-1_i386.de
b
      Size/MD5:  1695240 82f875684987df2ee298094f9994f27c
 
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.17/nvidia-legacy-kernel-source_1.0.7184+2.6.17.6-1_
i386.deb
      Size/MD5:  1374096 69bbc443179f677dba56c756c692768e
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/vmware-player-kernel-modules-2.6.17-10_2.6.17.6-
1_i386.deb
      Size/MD5:   140516 bfc8dc70278e143bc989e6a70b36d8a3
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/xorg-driver-fglrx-dev_7.1.0-8.28.8+2.6.17.6-1_i3
86.deb
      Size/MD5:   117394 041a9a400e42797f6507ca8771bd3d05
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/xorg-driver-fglrx_7.1.0-8.28.8+2.6.17.6-1_i386.d
eb
      Size/MD5:  9402142 e3510df2f9ec71bd91145a34d6871f8c

  powerpc architecture (Apple Macintosh G3/G4/G5)

 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17-10-powerpc-smp_2
.6.17.6-1_powerpc.deb
      Size/MD5:  1284894 3ccdcc03d7dba43075c2612f9b314153
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17-10-powerpc64-smp
_2.6.17.6-1_powerpc.deb
      Size/MD5:   996264 a713b7a6cd554feb298162f8b01d872d
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17-10-powerpc_2.6.1
7.6-1_powerpc.deb
      Size/MD5:  1282526 4905c748a4715e08547766d40b529b97
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nic-restricted-firmware-2.6.17-10-powerpc-di_2.6
.17.6-1_powerpc.udeb
      Size/MD5:   965668 e99b29e0fc447fc5d87104c4c74d1607
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/nic-restricted-modules-2.6.17-10-powerpc-di_2.6.
17.6-1_powerpc.udeb
      Size/MD5:   287156 401400fb84e210db0cfc5e61d14b6a4e

  sparc architecture (Sun SPARC/UltraSPARC)

 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17-10-sparc64-smp_2
.6.17.6-1_sparc.deb
      Size/MD5:   996226 4482ff1b31be183de52c54f613827af1
 
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.17/linux-restricted-modules-2.6.17-10-sparc64_2.6.1
7.6-1_sparc.deb
      Size/MD5:   996134 7bc5aeb4a421d7fcd4aefaf63572dd00




3.


=========================================================== 
Ubuntu Security Notice USN-378-1          November 04, 2006
rpm vulnerability
CVE-2006-5466
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  librpm4                                  4.4.1-5ubuntu2.1

Ubuntu 6.10:
  librpm4                                  4.4.1-9.1ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

An error was found in the RPM library's handling of query reports.  In 
some locales, certain RPM packages would cause the library to crash.  If 
a user was tricked into querying a specially crafted RPM package, the 
flaw could be exploited to execute arbitrary code with the user's 
privileges.

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1-5ubuntu2.1.diff.gz
      Size/MD5:   274437 77abf35a4c17b8ac8742700eb857e114
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1-5ubuntu2.1.dsc
      Size/MD5:      924 d4e94116e759ba86b6bf73ac32d8fcfd
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1.orig.tar.gz
      Size/MD5: 11497447 90ded9047b1b69d918c6c7c7b56fd7a9

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm-dev_4.4.1-5ubuntu2.1_amd64.deb
      Size/MD5:  1384092 0ce64761ca1fc50b3b859cb2672f8889
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm4_4.4.1-5ubuntu2.1_amd64.deb
      Size/MD5:  1023236 f60a4b3c8616b84e12b8f4a44a394277
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/lsb-rpm_4.4.1-5ubuntu2.1_amd64.deb
      Size/MD5:  2635094 894af1cced29645e0386852c04735f63
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/python2.4-rpm_4.4.1-5ubuntu2.1_amd64.deb
      Size/MD5:   548476 258dd9aaa0df9187d21da57874c7b240
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1-5ubuntu2.1_amd64.deb
      Size/MD5:   615958 3fb5b37fed9723346842f30e396fd709

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm-dev_4.4.1-5ubuntu2.1_i386.deb
      Size/MD5:  1261978 7598d7e093324228cdaee3f5e747a920
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm4_4.4.1-5ubuntu2.1_i386.deb
      Size/MD5:   933166 ceb5acbc6c28f730665bd7b1695ab3da
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/lsb-rpm_4.4.1-5ubuntu2.1_i386.deb
      Size/MD5:  2280872 5d7aaed850c18779385f93939e40d862
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/python2.4-rpm_4.4.1-5ubuntu2.1_i386.deb
      Size/MD5:   473910 321ac67b58315d42f90c1370717c5e52
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1-5ubuntu2.1_i386.deb
      Size/MD5:   598080 457d374399fb2c7cd88adee523f0e7c8

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm-dev_4.4.1-5ubuntu2.1_powerpc.deb
      Size/MD5:  1311550 05d97ccbd989e72cc70f916529b10dbb
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm4_4.4.1-5ubuntu2.1_powerpc.deb
      Size/MD5:   999330 13272c1c6eae0299a04bcf44fee0e4d3
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/lsb-rpm_4.4.1-5ubuntu2.1_powerpc.deb
      Size/MD5:  2690476 3cf910dd613f35dd43ea58a1d37923a3
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/python2.4-rpm_4.4.1-5ubuntu2.1_powerpc.deb
      Size/MD5:   579040 96277e2026fba155782f6421726467cc
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1-5ubuntu2.1_powerpc.deb
      Size/MD5:   624534 0d4f47296b07081cdc2de7673d96391e

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm-dev_4.4.1-5ubuntu2.1_sparc.deb
      Size/MD5:  1303352 1b38f39032ea0062b9734640eb9ee973
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm4_4.4.1-5ubuntu2.1_sparc.deb
      Size/MD5:   956194 b91a160d3d9a595c55a67060d2e81842
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/lsb-rpm_4.4.1-5ubuntu2.1_sparc.deb
      Size/MD5:  2517620 868655bab40c32a7f70e3576f9096b3d
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/python2.4-rpm_4.4.1-5ubuntu2.1_sparc.deb
      Size/MD5:   517742 0484154d20086493a7bf20af7023d8ee
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1-5ubuntu2.1_sparc.deb
      Size/MD5:   601254 4fddde165735e43ed8ff2804fb71aec0

Updated packages for Ubuntu 6.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1-9.1ubuntu0.1.diff.gz
      Size/MD5:   242934 02f368554b37b62c0374caae5dda121d
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1-9.1ubuntu0.1.dsc
      Size/MD5:     1012 23eb25fabf0a57cb9b36314d4b30500b
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1.orig.tar.gz
      Size/MD5: 11497447 90ded9047b1b69d918c6c7c7b56fd7a9

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm-dev_4.4.1-9.1ubuntu0.1_amd64.deb
      Size/MD5:  1382146 7175f800c20a9f075c5898b6c3deae25
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm4_4.4.1-9.1ubuntu0.1_amd64.deb
      Size/MD5:  1019772 9000c57678db6219b52fa321e953d98c
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/lsb-rpm_4.4.1-9.1ubuntu0.1_amd64.deb
      Size/MD5:  2652810 a2f8add8ba2e3bbd114d1d4ffa5097ca
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/python-rpm_4.4.1-9.1ubuntu0.1_amd64.deb
      Size/MD5:   621204 bc6a2dd2638b988af3b7b427bf7202f4
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1-9.1ubuntu0.1_amd64.deb
      Size/MD5:   614232 aa80f556ac460cff24496671a8e228c6

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm-dev_4.4.1-9.1ubuntu0.1_i386.deb
      Size/MD5:  1304188 aa4728b03210130660c8e1e0b6e3f9b7
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm4_4.4.1-9.1ubuntu0.1_i386.deb
      Size/MD5:   972672 27231318ad285d94df3b53bdd7bd3304
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/lsb-rpm_4.4.1-9.1ubuntu0.1_i386.deb
      Size/MD5:  2396326 eaf7611282e5a71c528f4ae73e13eecd
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/python-rpm_4.4.1-9.1ubuntu0.1_i386.deb
      Size/MD5:   562296 7da71f2d1f6e395cc31c8a0cf62b8d7b
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1-9.1ubuntu0.1_i386.deb
      Size/MD5:   600474 c4d90eb73da915b8a9794d3b306c3a82

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm-dev_4.4.1-9.1ubuntu0.1_powerpc.deb
      Size/MD5:  1317886 9d1001cdef76576eded57c664596dd69
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm4_4.4.1-9.1ubuntu0.1_powerpc.deb
      Size/MD5:  1006046 78ffab0bb25257065732eaea760bfb6c
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/lsb-rpm_4.4.1-9.1ubuntu0.1_powerpc.deb
      Size/MD5:  2689222 678c23972680321fb2226c1c57015a26
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/python-rpm_4.4.1-9.1ubuntu0.1_powerpc.deb
      Size/MD5:   655628 f5b6f0286b05c3860c36f524d14bc16d
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1-9.1ubuntu0.1_powerpc.deb
      Size/MD5:   624374 900601d9f85479a0a1729bc0fbec97c5

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm-dev_4.4.1-9.1ubuntu0.1_sparc.deb
      Size/MD5:  1315202 666faaca96fda5b4eeb4500d06ca2f8b
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/librpm4_4.4.1-9.1ubuntu0.1_sparc.deb
      Size/MD5:   964398 3ddc1cbc601b08a4504edbdbda46720c
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/lsb-rpm_4.4.1-9.1ubuntu0.1_sparc.deb
      Size/MD5:  2511934 44a14ac694c0694bd5edd4f541c38181
    http://security.ubuntu.com/ubuntu/pool/universe/r/rpm/python-rpm_4.4.1-9.1ubuntu0.1_sparc.deb
      Size/MD5:   599148 99a398097159e7521fa170ebd7a60f78
    http://security.ubuntu.com/ubuntu/pool/main/r/rpm/rpm_4.4.1-9.1ubuntu0.1_sparc.deb
      Size/MD5:   600120 2304b7fd16c94ba7d72f23b3b06d54e9


______________________________________________________________________________

NISCC values your feedback.

1. Which of the following most reflects the value of the briefing to you?
(Place an 'X' next to your choice)

Very useful:__ Useful:__ Not useful:__ 

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our briefings?


Thank you for your contribution.
______________________________________________________________________________

For additional information or assistance, please contact our help desk
by telephone.  You may send Not Protectively Marked information via
e-mail to uniras@xxxxxxxxxxxxx

Office hours:

Mon - Fri: 08:30 - 17:00 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

______________________________________________________________________________

UNIRAS wishes to acknowledge the contributions of Ubuntu for the
information contained in this briefing.
______________________________________________________________________________

This notice contains information released by the original author.
Some of the information may have changed since it was released. If the
vulnerability affects you, it may be prudent to retrieve the advisory
from the site of the original source to ensure that you receive the most
current information concerning that problem.

Reference to any specific commercial product, process, or service by
trade name, trademark manufacturer, or otherwise, does not constitute or
imply its endorsement, recommendation, or favouring by UNIRAS or NISCC.
The views and opinions of authors expressed within this notice shall not
be used for advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall not be liable for any loss or damage whatsoever, arising from or
in connection with the usage of information contained within this
notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST) and has contacts with other international Incident Response
Teams (IRTs) in order to foster cooperation and coordination in incident
prevention, to prompt rapid reaction to incidents, and to promote
information sharing amongst its members and the community at large.
______________________________________________________________________________

<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRU9Lz2l7oeQsXfKvEQJlHwCeP/zqbdKqfGX9mv6ZV2Aw7vZpmngAoJIA
devcboMQoYY4orc851wIFQ/v
=NOp7
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________