[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 784/06 - Four Ubuntu Security Notices:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------------------------
       UNIRAS (UK Government CERT) Briefing - 784/06 Dated 30.11.06 Time 13:15  

UNIRAS is part of NISCC (the UK National Infrastructure Security  Co-ordination Centre)
- ---------------------------------------------------------------------------------------
 	UNIRAS material is available from the NISCC website at www.niscc.gov.uk
- ---------------------------------------------------------------------------------------

Title
=====

Four Ubuntu Security Notices:

1. USN-386-1 - imagemagick vulnerability  

2. USN-387-1 - dovecot vulnerability

3. USN-388-1 - koffice vulnerability       

4. USN-389-1 - GnuPG vulnerability

Detail
======

1. Daniel Kobras discovered multiple buffer overflows in ImageMagick's SGI file format decoder.  By tricking a user or an automated
system into processing a specially crafted SGI image, this could be exploited to execute arbitrary code with the user's privileges.

2. Dovecot was discovered to have an error when handling its index cache files.  This error could be exploited by authenticated POP
and IMAP users to cause a crash of the Dovecot server, or possibly to execute arbitrary code.  Only servers using the non-default
option "mmap_disable=yes" were vulnerable.

3. An integer overflow was discovered in KOffice's filtering code.  By tricking a user into opening a specially crafted PPT file,
attackers could crash KOffice or possibly execute arbitrary code with the user's privileges.

4. A buffer overflow was discovered in GnuPG.  By tricking a user into running gpg interactively on a specially crafted message, an
attacker could execute arbitrary code with the user's privileges.  This vulnerability is not exposed when running gpg in batch mode.



1.



=========================================================== 
Ubuntu Security Notice USN-386-1          November 28, 2006
imagemagick vulnerability
CVE-2006-5868
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 5.10:
  libmagick6                               6:6.2.3.4-1ubuntu1.5

Ubuntu 6.06 LTS:
  libmagick9                               6:6.2.4.5-0.6ubuntu0.4

In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

Daniel Kobras discovered multiple buffer overflows in ImageMagick's SGI file format decoder.  By tricking a user or an automated
system into processing a specially crafted SGI image, this could be exploited to execute arbitrary code with the user's privileges.


Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.5.diff.gz
      Size/MD5:   144276 f71b4df055bac9231c6d4794256d5732
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.5.dsc
      Size/MD5:      899 0d1a0c35f2564b75e27af6a0a757f4c5
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4.orig.tar.gz
      Size/MD5:  5769194 7e9a3edd467a400a74126eb4a18e31ef

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.5_amd64.deb
      Size/MD5:  1334044 f1442ba90c54cfdd1dd0266828407376
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.2.3.4-1ubuntu1.5_amd64.deb
      Size/MD5:   259516 52c4772274427c11fe93dbc2ddb7445a
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6c2_6.2.3.4-1ubuntu1.5_amd64.deb
      Size/MD5:   171564 65bdac06e239398ee62f9ca67ce67e81
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.2.3.4-1ubuntu1.5_amd64.deb
      Size/MD5:  1671240 27f858940a212d836d37f197e1d558a7
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.2.3.4-1ubuntu1.5_amd64.deb
      Size/MD5:  1320974 c92c95369bd473aacb1741aa986df746
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.3.4-1ubuntu1.5_amd64.deb
      Size/MD5:   169642 7a89a61459b01be5af738d7694b6977c

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.5_i386.deb
      Size/MD5:  1333074 ea2b1d5399c1a419ed9267f3ac8ec3e4
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.2.3.4-1ubuntu1.5_i386.deb
      Size/MD5:   236018 c3b15c5532ce75a066bd7acb21053d42
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6c2_6.2.3.4-1ubuntu1.5_i386.deb
      Size/MD5:   170892 9bb90b14ddfe5b083402b55220523ae7
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.2.3.4-1ubuntu1.5_i386.deb
      Size/MD5:  1522170 254d36fb51155e07a65cf50f601fb90e
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.2.3.4-1ubuntu1.5_i386.deb
      Size/MD5:  1224904 55afca2d998171a389b0f485660361ab
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.3.4-1ubuntu1.5_i386.deb
      Size/MD5:   164948 c366d85731e2bfe7e7d7d89586c094f6

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.5_powerpc.deb
      Size/MD5:  1338026 a2df1ca024545fe1063712634f2fe411
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.2.3.4-1ubuntu1.5_powerpc.deb
      Size/MD5:   260500 65b4ac7834603aef286b67c2bb3909e1
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6c2_6.2.3.4-1ubuntu1.5_powerpc.deb
      Size/MD5:   164128 e5994c1f4c2820c2ce1fbb181cc608da
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.2.3.4-1ubuntu1.5_powerpc.deb
      Size/MD5:  1874614 5e3a953a21b30afd852e0e3d4f847329
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.2.3.4-1ubuntu1.5_powerpc.deb
      Size/MD5:  1258432 3e2222299d98ae6b102fa55f4f2879a7
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.3.4-1ubuntu1.5_powerpc.deb
      Size/MD5:   164090 419ffc1569e88008d0ce592d84fd09f0

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.5_sparc.deb
      Size/MD5:  1333274 89495b2b8d2a0ccda003983c7aa4f6db
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.2.3.4-1ubuntu1.5_sparc.deb
      Size/MD5:   237160 0fa436044e24fbd7fd46668adf54d4d8
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6c2_6.2.3.4-1ubuntu1.5_sparc.deb
      Size/MD5:   169068 21ddda496ae6571fd253f620c1f413ff
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.2.3.4-1ubuntu1.5_sparc.deb
      Size/MD5:  1782496 c334cad8f7c7c61261e3b6f260f5642b
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.2.3.4-1ubuntu1.5_sparc.deb
      Size/MD5:  1324138 7964183b384bb4499af877946ca17617
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.3.4-1ubuntu1.5_sparc.deb
      Size/MD5:   166410 9b29cba341a3c614306c5cf79fdf6a32

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5-0.6ubuntu0.4.diff.gz
      Size/MD5:    35503 22a98409b1626040601ef609b2422565
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5-0.6ubuntu0.4.dsc
      Size/MD5:      914 ce09e6ff2f5312abe01eb8c2519ba982
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5.orig.tar.gz
      Size/MD5:  6085147 8d790a280f355489d0cfb6d36ce6751f

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5-0.6ubuntu0.4_amd64.deb
      Size/MD5:  1616098 5aff32ee6d06a4ffae450b8e24d72cab
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9-dev_6.2.4.5-0.6ubuntu0.4_amd64.deb
      Size/MD5:   249280 e479fe98f23010e188aa4223d95a74e1
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9c2a_6.2.4.5-0.6ubuntu0.4_amd64.deb
      Size/MD5:   170144 4f476605b89a199ac213167dd1d5477e
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9-dev_6.2.4.5-0.6ubuntu0.4_amd64.deb
      Size/MD5:  1702592 0dac576b130935bca9cb63b6c73a38a9
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9_6.2.4.5-0.6ubuntu0.4_amd64.deb
      Size/MD5:  1347986 2aeafd90dcb307d49aeac231dcbcef66
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.4.5-0.6ubuntu0.4_amd64.deb
      Size/MD5:   171946 ca96ca3cfec1dc1bd78e45f3b198f88d

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5-0.6ubuntu0.4_i386.deb
      Size/MD5:  1614892 7ddc2989b4ebf3841fa9e06f2d7794a7
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9-dev_6.2.4.5-0.6ubuntu0.4_i386.deb
      Size/MD5:   227128 ca9829f99fd35e1f8fbe1344d2cbabc7
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9c2a_6.2.4.5-0.6ubuntu0.4_i386.deb
      Size/MD5:   168498 23d8ffe52e57c13a20cc1aecc08a439e
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9-dev_6.2.4.5-0.6ubuntu0.4_i386.deb
      Size/MD5:  1555966 bd23debc4d7803cf8b2ab5ead32e4d7b
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9_6.2.4.5-0.6ubuntu0.4_i386.deb
      Size/MD5:  1247120 2c59b3f89970d4c77312948a30ebaa12
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.4.5-0.6ubuntu0.4_i386.deb
      Size/MD5:   167310 a9ed294c57834eb2228ea32b85af28eb

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5-0.6ubuntu0.4_powerpc.deb
      Size/MD5:  1619732 97cb89c8ce5e0e8378a29434f93c725e
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9-dev_6.2.4.5-0.6ubuntu0.4_powerpc.deb
      Size/MD5:   251472 7ff2a19b6112bdf2341ad83b6c8180d7
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9c2a_6.2.4.5-0.6ubuntu0.4_powerpc.deb
      Size/MD5:   162446 19ceac2db725b255eb53cfef09122732
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9-dev_6.2.4.5-0.6ubuntu0.4_powerpc.deb
      Size/MD5:  1905982 dd93d9deb2d3c73df4a99f26e2b38cb8
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9_6.2.4.5-0.6ubuntu0.4_powerpc.deb
      Size/MD5:  1283844 c74d5c533e5473fa2f7355f006786ad4
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.4.5-0.6ubuntu0.4_powerpc.deb
      Size/MD5:   166318 06e8b7a4327f7c8b916c8a1ddbed28b6

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5-0.6ubuntu0.4_sparc.deb
      Size/MD5:  1615414 01bb86d55782b5fd8740374c9e591f8d
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9-dev_6.2.4.5-0.6ubuntu0.4_sparc.deb
      Size/MD5:   229276 08e0696804312268381fb7ff9d68a567
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9c2a_6.2.4.5-0.6ubuntu0.4_sparc.deb
      Size/MD5:   167300 92fb400448110ffa689136e60c8e42d1
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9-dev_6.2.4.5-0.6ubuntu0.4_sparc.deb
      Size/MD5:  1807446 be2efd78d9b95b8610e40efa51068589
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9_6.2.4.5-0.6ubuntu0.4_sparc.deb
      Size/MD5:  1343858 df210de3e91f2391b5a811b896266a3a
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.4.5-0.6ubuntu0.4_sparc.deb
      Size/MD5:   169028 370a73f08c265367fb29e86cdc2139b0




2.



=========================================================== 
Ubuntu Security Notice USN-387-1          November 28, 2006
dovecot vulnerability
CVE-2006-5973
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 6.06 LTS:
  dovecot-common                           1.0.beta3-3ubuntu5.4

Ubuntu 6.10:
  dovecot-common                           1.0.rc2-1ubuntu2.1

In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

Dovecot was discovered to have an error when handling its index cache files.  This error could be exploited by authenticated POP and
IMAP users to cause a crash of the Dovecot server, or possibly to execute arbitrary code.  Only servers using the non-default option
"mmap_disable=yes" were vulnerable.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_1.0.rc2-1ubuntu2.1.diff.gz
      Size/MD5:   472729 09b338e6892e572e2e9d91ec22a5f05e
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_1.0.rc2-1ubuntu2.1.dsc
      Size/MD5:      900 da748b07fc335d054629a3cb1446a63e
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_1.0.rc2.orig.tar.gz
      Size/MD5:  1257435 e27a248b2ee224e4618aa2f020150041

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.rc2-1ubuntu2.1_amd64.deb
      Size/MD5:   936252 52c327408a863459f9fcb2a42039bffc
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.rc2-1ubuntu2.1_amd64.deb
      Size/MD5:   386922 0811212d24e3f5f4d8460f2b3627b443
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.rc2-1ubuntu2.1_amd64.deb
      Size/MD5:   353150 a7f7601e4552eff649aeda9f7ef49350

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.rc2-1ubuntu2.1_i386.deb
      Size/MD5:   833658 e8185521fb7cf53f1c78ccd95f6f9eef
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.rc2-1ubuntu2.1_i386.deb
      Size/MD5:   354136 d89074a01b639a0403394895c47efac4
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.rc2-1ubuntu2.1_i386.deb
      Size/MD5:   323488 9d248269d8a33944a06d619affd62e28

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.rc2-1ubuntu2.1_powerpc.deb
      Size/MD5:   924944 9bda9397cc41f6e515d474d1f335d49c
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.rc2-1ubuntu2.1_powerpc.deb
      Size/MD5:   385242 cc72e58c0d04d0271c8b7cc8a303fc77
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.rc2-1ubuntu2.1_powerpc.deb
      Size/MD5:   351952 2bef7431d4c0861d9edd30119bed79f0

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.rc2-1ubuntu2.1_sparc.deb
      Size/MD5:   820430 e28f7336281cdd54c556b9c9ba011819
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.rc2-1ubuntu2.1_sparc.deb
      Size/MD5:   347692 e162121eefe72311585b90c3c6718124
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.rc2-1ubuntu2.1_sparc.deb
      Size/MD5:   316844 4f5ad0b8d5e671a406649676888791db

Updated packages for Ubuntu 6.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_1.0.beta3-3ubuntu5.4.diff.gz
      Size/MD5:   468953 1518e1cadad0e69bb1e18c77a8a2a06e
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_1.0.beta3-3ubuntu5.4.dsc
      Size/MD5:      867 f46814c20c38efc63d212d05714461d1
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_1.0.beta3.orig.tar.gz
      Size/MD5:  1360574 5418f9f7fe99e4f10bb82d9fe504138a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.beta3-3ubuntu5.4_amd64.deb
      Size/MD5:   962792 193171868a6d8c3c9908b68d7a58c14a
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.beta3-3ubuntu5.4_amd64.deb
      Size/MD5:   532830 762026328217e82db42fe6ddb98bfc2b
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.beta3-3ubuntu5.4_amd64.deb
      Size/MD5:   500920 2f42ee2f548bc1defc33ed4b15b06315

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.beta3-3ubuntu5.4_i386.deb
      Size/MD5:   838756 deaa721cec3ccdcec72787e6fac539dc
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.beta3-3ubuntu5.4_i386.deb
      Size/MD5:   486042 22d3b5160b983dae1217c1cf19a6f9bc
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.beta3-3ubuntu5.4_i386.deb
      Size/MD5:   456818 b3209b05b1650d878954debe4868531b

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.beta3-3ubuntu5.4_powerpc.deb
      Size/MD5:   940686 efe340e32c9834dc455e8a2482fdacb3
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.beta3-3ubuntu5.4_powerpc.deb
      Size/MD5:   526556 864fd3fff50a9eb90f70b9db021515f4
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.beta3-3ubuntu5.4_powerpc.deb
      Size/MD5:   494276 622cf9cc8104add8e865391b7f73be0c

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_1.0.beta3-3ubuntu5.4_sparc.deb
      Size/MD5:   855364 6876997d628b53ec054552687e5ab6c2
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_1.0.beta3-3ubuntu5.4_sparc.deb
      Size/MD5:   492036 818b124ffe5d635e7639271b51d11f4b
    http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_1.0.beta3-3ubuntu5.4_sparc.deb
      Size/MD5:   462198 2eea31b7278678dd215fa85b2cd0dcf8



3.


=========================================================== 
Ubuntu Security Notice USN-388-1          November 29, 2006
koffice vulnerability
CVE-2006-6120
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.10

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 5.10:
  koffice-libs                             1:1.4.1-0ubuntu7.4

After a standard system upgrade you need to restart your Desktop session to effect the necessary changes.

Details follow:

An integer overflow was discovered in KOffice's filtering code.  By tricking a user into opening a specially crafted PPT file,
attackers could crash KOffice or possibly execute arbitrary code with the user's privileges.


Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.4.1-0ubuntu7.4.diff.gz
      Size/MD5:    68701 00932ef9fcfa1d04bdcd3d02399e6b54
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.4.1-0ubuntu7.4.dsc
      Size/MD5:     1048 9afa7821978d0a695ccdac7db1eb3e58
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.4.1.orig.tar.gz
      Size/MD5: 21026614 9e214aef83d2a9a6485a831a67b7bcfa

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio-data_1.4.1-0ubuntu7.4_all.deb
      Size/MD5:   634772 7fd40e05783a3d9546534195c66648f8
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-data_1.4.1-0ubuntu7.4_all.deb
      Size/MD5:   688372 19dbb2fc1879c35b5a059d53313946ce
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-doc-html_1.4.1-0ubuntu7.4_all.deb
      Size/MD5:   326300 2c25ae3bd2059a0df6f70bf548b29454
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.4.1-0ubuntu7.4_all.deb
      Size/MD5:    22892 d68438ea3a5948dc30dd595abc4bc323

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:   433004 93fa7fdb2ccdf62436a0a3ffc30d4653
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:   960898 eddbfe366d1fff0c5d3d57746a6a3d36
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:   707762 f21e7cc05b1362495dc4205de91836a1
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:   167020 e547f4cd0296e704d21a655ed6c70ed0
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:   178454 6885ee6e6db8568fe2e2a31cb24de2f1
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:  5552572 9c517913e9b7767472927543bf94bf3c
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:   106670 c17f47264ec277cfab98591612f58d48
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:  2895504 256232cc7b38ded14892ae87315c5009
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:  2574826 de98505de6899025707ae849633adc3f
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:  1034992 1c21071eeaca6a441de4a045785e64ed
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:   327320 e88c8aac476d63ed0bc9e9ce4b2c1e0a
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:   481400 9160377c8719abe32abb55cbbfe8d2f5
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.4.1-0ubuntu7.4_amd64.deb
      Size/MD5:  5736518 67e268b62aef4a788260ec46910bd970

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:   377394 97d295c575ac98c298a59ead1189def4
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:   954852 94bbe0f51a198b020cdd7f6786648aa0
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:   701352 80b333ec3aa6ec5c1b51f0a8dc5ede3e
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:   153312 f26df7570623906502ff33853e7162e4
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:   178460 5322a94138cfe9a6f0c3b1c6a729a992
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:  4949830 c90d916c41c1c2119853a0fadd25a3bd
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:   101200 24dbfe4d12bd4efcf89f73a02ee992ff
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:  2786100 9bc56c55021de36b2c11f99723ab3188
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:  2495444 857a4bf9fc8c520ecc01fb408644a8e9
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:   967028 699df680dbb7ce1eab59ac96ee98f9cd
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:   322374 72f22887c75ed2bc9a36c7b0c62a3e86
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:   449560 deb912f53797b36bd78e65a81ae949a8
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.4.1-0ubuntu7.4_i386.deb
      Size/MD5:  5463188 6ac4849bd415571b236364cb728d3fa6

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:   430582 f48450e917cf6aeccb536054ba890cc6
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:   965060 0d03528b35c2d19089cc06205dc878fe
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:   706386 d40def53afb5a74e2df3473008dfa91b
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:   170472 2c1dbcf8b85434c1a18807ecf4c9c1bd
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:   178450 0011685fe0961eb97505a56aa02b6489
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:  5218554 96e1c309e419c0394b91a89d8112e9df
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:   105184 378a189a9a1907ed4a1eb626ade6c591
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:  2831236 11e394a926e1f886f952bd6ebc76b0a7
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:  2539898 4649a0d16765302f2ae57834dab875c6
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:   996450 057b0926d976e4fc622b2a2f0b599037
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:   329264 e5de058fccffb07fbe61f523bd069246
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:   466704 13356452d0ddc84ba53b4858321e42f3
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.4.1-0ubuntu7.4_powerpc.deb
      Size/MD5:  5618448 803242e6ff1ee5bfe6fcdcfbfdadcf8c

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:   384438 71a480d5c3fe9bb5ae737db61acda456
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:   956294 eeaec4aada765ce4dee7138760d1b6bf
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:   701392 a7330a78760f62f711343961f31675f1
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:   151282 184c6d96e4e7f7a25c2714cf0d91382d
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:   178472 abd1b00aad73a814063b7081fb20ddc1
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:  5099614 9d7cd91aa01ff45d9be2a1f23a8fbe9b
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:   101434 62b2d2be3d9efa1d4300ab2f2081eaa8
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:  2814930 be78c646f7517399dd3dc665b6f8b3ef
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:  2505104 245e4436a592136dbf90a64e01430c49
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:   976878 696fa0b29047b2dcde1274f027e1db4e
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:   322878 c5f6c230f001041ca02f8330edb3f64f
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:   449936 62e05f34fecff064852d405c7556e543
    http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.4.1-0ubuntu7.4_sparc.deb
      Size/MD5:  5533476 14a6ed4aad576147a47dc938a1389511




4.


=========================================================== 
Ubuntu Security Notice USN-389-1          November 29, 2006
gnupg vulnerability
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 5.10:
  gnupg                                    1.4.1-1ubuntu1.5

Ubuntu 6.06 LTS:
  gnupg                                    1.4.2.2-1ubuntu2.3

Ubuntu 6.10:
  gnupg                                    1.4.3-2ubuntu3.1

In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

A buffer overflow was discovered in GnuPG.  By tricking a user into running gpg interactively on a specially crafted message, an
attacker could execute arbitrary code with the user's privileges.  This vulnerability is not exposed when running gpg in batch mode.


Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.5.diff.gz
      Size/MD5:    21914 9c398c7ad981984ce7e2d5c73d39646c
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.5.dsc
      Size/MD5:      684 99674acf9842bede50bfc9cee94233bc
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1.orig.tar.gz
      Size/MD5:  4059170 1cc77c6943baaa711222e954bbd785e5

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.5_amd64.deb
      Size/MD5:  1136516 6f95cee543adea0d34af0db0270e8301
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.5_amd64.udeb
      Size/MD5:   152280 91e6fec1a7cac200e6607a5aca8e283c

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.5_i386.deb
      Size/MD5:  1044704 511314c5de795b3f732fbc48fa9bc245
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.5_i386.udeb
      Size/MD5:   130672 c2af84edf925cf93e92df0afd1747a8b

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.5_powerpc.deb
      Size/MD5:  1119908 d942ad0abd5921bb771fd6180d32f28b
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.5_powerpc.udeb
      Size/MD5:   140214 ac880f5f3a32fe0bba76d61ef5374f61

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.5_sparc.deb
      Size/MD5:  1064488 49125a2b181ce9e4ca22b67b6712b153
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.5_sparc.udeb
      Size/MD5:   139606 f97c2b5b2f406afb0cc8478df8529a1c

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.3.diff.gz
      Size/MD5:    20808 4208a73338b5624d39f355e553927548
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.3.dsc
      Size/MD5:      690 858b47da7b535136aa99ab7ccbd2aaef
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2.orig.tar.gz
      Size/MD5:  4222685 50d8fd9c5715ff78b7db0e5f20d08550

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.3_amd64.deb
      Size/MD5:  1066374 7e03df9183620a5c23db7caefb3f5b2b
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.2.2-1ubuntu2.3_amd64.udeb
      Size/MD5:   140312 9384b3aa9a950db2bb80ad20f820529c

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.3_i386.deb
      Size/MD5:   981392 75eba5633769eb5c8e4fbd863d0ffed9
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.2.2-1ubuntu2.3_i386.udeb
      Size/MD5:   120284 5ab02d409b4b475657f5c52081d3ccf9

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.3_powerpc.deb
      Size/MD5:  1053850 43d575debcff4457419d48f78d164449
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.2.2-1ubuntu2.3_powerpc.udeb
      Size/MD5:   130154 9491f62000cc12df6f23b8d66fd97859

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.3_sparc.deb
      Size/MD5:   994040 09848e3252cae2efeefeef913e4ef9d5
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.2.2-1ubuntu2.3_sparc.udeb
      Size/MD5:   127412 56d3912d3002bf3f0377a6437a6f851c

Updated packages for Ubuntu 6.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3-2ubuntu3.1.diff.gz
      Size/MD5:    25822 be04724ca7e6d4dcf2a016ebe2d4bd25
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3-2ubuntu3.1.dsc
      Size/MD5:      697 446e892916ea052627a78152037651d9
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3.orig.tar.gz
      Size/MD5:  4320394 fcdf572a33dd037653707b128dd150a7

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/universe/g/gnupg/gnupg-udeb_1.4.3-2ubuntu3.1_amd64.udeb
      Size/MD5:   379748 635660a16621f2d7cc752e61cf926208
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3-2ubuntu3.1_amd64.deb
      Size/MD5:  1112036 daa0230d7072a2b25996d5ef387d5312
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.3-2ubuntu3.1_amd64.udeb
      Size/MD5:   142628 db13e0940956c59d2efd2467e30dd27c

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/universe/g/gnupg/gnupg-udeb_1.4.3-2ubuntu3.1_i386.udeb
      Size/MD5:   357538 0cfa39e8bf18bd48991298bc01a733ec
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3-2ubuntu3.1_i386.deb
      Size/MD5:  1055538 67ba9574b18247de52f32ba976d941ef
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.3-2ubuntu3.1_i386.udeb
      Size/MD5:   129146 1fb42163be150d7fa7b73dfcbfbcb244

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/universe/g/gnupg/gnupg-udeb_1.4.3-2ubuntu3.1_powerpc.udeb
      Size/MD5:   372472 f2b7b44029ff56d7911590d4285be8bd
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3-2ubuntu3.1_powerpc.deb
      Size/MD5:  1107214 8ac1d1de40130c0b61334fde37692c9b
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.3-2ubuntu3.1_powerpc.udeb
      Size/MD5:   136288 023825eced954075f8e3443a227a5aa3

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/universe/g/gnupg/gnupg-udeb_1.4.3-2ubuntu3.1_sparc.udeb
      Size/MD5:   366138 d98c8c252f725be2895a99a2f1ffd23d
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3-2ubuntu3.1_sparc.deb
      Size/MD5:  1042190 01e8b454133f351081d6fab5fdea0443
    http://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.3-2ubuntu3.1_sparc.udeb
      Size/MD5:   132764 d961891ab18f423819b766f3ce670e39



- ---------------------------------------------------------------------------------------
NISCC values your feedback.

1. Which of the following most reflects the value of the briefing to you?
   (Place an 'X' next to your choice)

	Very useful:__ Useful:__ Not useful:__ 

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our briefings?


Thank you for your contribution.
- ---------------------------------------------------------------------------------------

For additional information or assistance, please contact our help desk by telephone.  
You may send Not Protectively Marked information via e-mail to uniras@xxxxxxxxxxxxx

Office hours:

Mon - Fri: 08:30 - 17:00 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

- ---------------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Ubuntu for the information contained 

in this briefing.
- ---------------------------------------------------------------------------------------

This notice contains information released by the original author. Some of the information may have changed since it was released. If
the vulnerability affects you, it may be prudent to retrieve the advisory from the site of the original source to ensure that you
receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade name, trademark manufacturer, or otherwise, does not
constitute or imply its endorsement, recommendation, or favouring by UNIRAS or NISCC. The views and opinions of authors expressed
within this notice shall not be used for advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors or omissions contained within this briefing notice. In
particular, they shall not be liable for any loss or damage whatsoever, arising from or in connection with the usage of information
contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) and has contacts with other international Incident
Response Teams (IRTs) in order to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents,
and to promote information sharing amongst its members and the community at large.
- ---------------------------------------------------------------------------------------
<End of UNIRAS Briefing>



-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRW7Ymml7oeQsXfKvEQKwVACg4eUo7aaRvDqhfmTZYPMV/hjT6UUAoORU
Vx7babP3O5gbLnYwaWWPbDYH
=1pyQ
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________