[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 800/06 - Six Debian Security Advisories:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------------------------
       UNIRAS (UK Government CERT) Briefing - 800/06 Dated 04.12.06 Time 11:30  

UNIRAS is part of NISCC (the UK National Infrastructure Security  Co-ordination Centre)
---------------------------------------------------------------------------------------
 	UNIRAS material is available from the NISCC website at www.niscc.gov.uk
---------------------------------------------------------------------------------------

Title
=====

Six Debian Security Advisories:

1. DSA-1223-1 - New tar packages fix arbitrary file overwrite

2. DSA 1224-1 - New Mozilla packages fix several vulnerabilities

3. DSA 1225-2 - New Mozilla Firefox packages fix several vulnerabilities

4. DSA 1226-1 - New links packages fix arbitrary shell command execution

5. DSA 1227-1 - New Mozilla Thunderbird packages fix several vulnerabilities

6. DSA 1205-2 - New thttpd packages fix insecure temporary file creation

Detail
======

1. Teemu Salmela discovered a vulnerability in GNU tar that could allow a malicious user to overwrite arbitrary files by inducing
the victim to attempt to extract a specially crafted tar file containing a GNUTYPE_NAMES record with a symbolic link.

2. Several security related problems have been discovered in Mozilla and derived products.  

3. Several security related problems have been discovered in Mozilla and derived products such as Mozilla Firefox.

4. Teemu Salmela discovered that the links character mode web browser performs insufficient sanitising of smb:// URIs, which might
lead to the execution of arbitrary shell commands.

5. Several security related problems have been discovered in Mozilla and derived products such as Mozilla Thunderbird.  

6. Marco d'Itri discovered that thttpd, a small, fast and secure webserver, makes use of insecure temporary files when its logfiles
are rotated, which might lead to a denial of service through a symlink attack.



1.



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1223-1                  security@xxxxxxxxxx
http://www.debian.org/security/                           Noah Meyerhans
December 01, 2006
- - ------------------------------------------------------------------------

Package        : tar
Vulnerability  : input validation error
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2006-6097
BugTraq ID     : 21235
Debian Bug     : 399845

Teemu Salmela discovered a vulnerability in GNU tar that could allow a malicious user to overwrite arbitrary files by inducing the
victim to attempt to extract a specially crafted tar file containing a GNUTYPE_NAMES record with a symbolic link.

For the stable distribution (sarge), this problem has been fixed in version 1.14-2.3

For the unstable distribution (sid) and the forthcoming stable release (etch), this problem will be fixed in version 1.16-2.

We recommend that you upgrade your tar package.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update
        will update the internal database apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian 3.1 (stable)
- - -------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14.orig.tar.gz
    Size/MD5 checksum:  1485633 3094544702b1affa32d969f0b6459663
  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3.diff.gz
    Size/MD5 checksum:    51004 d6513454cbe12eec5908c2b41253f843
  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3.dsc
    Size/MD5 checksum:      554 85503d4264d7b39c7969051c3661fa96

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3_alpha.deb
    Size/MD5 checksum:   520736 4b14a87c6e8b4dda327d802eddcf9af7

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3_amd64.deb
    Size/MD5 checksum:   503902 98a8169210eb273252a7997c726c4333

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3_arm.deb
    Size/MD5 checksum:   500266 49ef1817d4ee1753f66bd37be8f91455

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3_hppa.deb
    Size/MD5 checksum:   517810 5f48745a747ee36c330d97f3bc5cc980

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3_i386.deb
    Size/MD5 checksum:   499560 c764b0894f6c3317a78124177cfed9fe

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3_ia64.deb
    Size/MD5 checksum:   543432 0dc8b4d66a82d05d7b68f2dbee960791

m68k architecture (Motorola Mc680x0)

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3_m68k.deb
    Size/MD5 checksum:   489058 381e468152e0a5a37113f412f13d85a7

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3_mips.deb
    Size/MD5 checksum:   520512 29bc4c6133bfeb259175fea45277a647

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3_mipsel.deb
    Size/MD5 checksum:   520258 ed3b0aadf8720c97a1df6334a90efe3c

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3_powerpc.deb
    Size/MD5 checksum:   506908 3a57a912dc159ee20d47ca1591a68619

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3_s390.deb
    Size/MD5 checksum:   511972 79cb92aaeee839c2d82efe743a8cea59

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.3_sparc.deb
    Size/MD5 checksum:   499698 d260b9f5db00b12414d6136c63e37202


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFFcFcbYrVLjBFATsMRAn5hAJ93K1jekZBwWNyIksJkhFoJjcFczwCdHu23
g3FxyAVvV5ABJFj/9m4O8iE=
=Es6i
- -----END PGP SIGNATURE-----



2.



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 1224-1                    security@xxxxxxxxxx
http://www.debian.org/security/                             Martin Schulze
December 3rd, 2006                      http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : mozilla
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2006-4310 CVE-2006-5462 CVE-2006-5463 CVE-2006-5464 CVE-2006-5748
CERT advisories: VU#335392  VU#390480 VU#495288 VU#714496 
BugTraq IDs    : 19678 20957

Several security related problems have been discovered in Mozilla and derived products.  The Common Vulnerabilities and Exposures
project identifies the following vulnerabilities:

CVE-2006-4310

    Tomas Kempinsky discovered that malformed FTP server responses
    could lead to denial of service.

CVE-2006-5462

    Ulrich Kühn discovered that the correction for a cryptographic
    flaw in the handling of PKCS-1 certificates was incomplete, which
    allows the forgery of certificates.

CVE-2006-5463

    "shutdown" discovered that modification of JavaScript objects
    during execution could lead to the execution of arbitrary
    JavaScript bytecode.

CVE-2006-5464

    Jesse Ruderman and Martijn Wargers discovered several crashes in
    the layout engine, which might also allow execution of arbitrary
    code.

CVE-2006-5748

    Igor Bukanov and Jesse Ruderman discovered several crashes in the
    JavaScript engine, which might allow execution of arbitrary code.

This update also adresses several crashes, which could be triggered by malicious websites and fixes a regression introduced in the
previous Mozilla update.


For the stable distribution (sarge) these problems have been fixed in version 1.7.8-1sarge8.

We recommend that you upgrade your mozilla package.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:

apt-get update
        will update the internal database apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8.dsc
      Size/MD5 checksum:     1124 a6f4c7ddbcb0d9126d4e0a81fda4059a
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8.diff.gz
      Size/MD5 checksum:   574770 77a056d9582389d1a31de1136dd7a0a2
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8.orig.tar.gz
      Size/MD5 checksum: 30589520 13c0f0331617748426679e8f2e9f537a

  Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum:   168064 33104218442c9bd7b113df794afdefe0
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum:   148564 be8d4aeb7da1d0a7e7524096cefee038
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum:   184948 f831a7dd089c599c695ab540720be912
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum:   858396 bd636d8d59d54016d4051ae37fbf0455
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum:     1034 bb3c11032fe99445e2831485155f9bec
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum: 11494648 a1029b5935bf687048b0a8156fb3910c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum:   403290 ade408aef33a53453263a2a83cf96524
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum:   158332 ccdc52d9b79b5359e18ef4f8e39ae068
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum:  3358886 c86ce3ccec680c80730cf046560d1cc8
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum:   122288 91187d98388e73f4ca5aa93314a23d78
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum:   204152 405074b924c7ec7450da6cc623a2d6f9
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum:  1937184 a527be2c3bb0991c25b1388b17f36509
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_alpha.deb
      Size/MD5 checksum:   212628 6c21078c7b3676273f1224c7028e4f63

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum:   168068 44912cded148a15690602d83b05517c4
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum:   147682 56dd565ea350862e6c512562929d6beb
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum:   184956 1f2c8bb99907df91c3d0f7800d77461d
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum:   716604 df8853c93a3f8688efc458929802087a
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum:     1036 2691304128a390fa0d0ddd06e5c014fd
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum: 10958880 c7c04de71bd68b738f13c187a88b4ab1
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum:   403272 6f5cba2fcd9f28e58e1a46ce9fe2034d
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum:   158328 ffd9e0136af049212c7668080b1590ba
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum:  3352912 accc3e9736aa0758d131cdf459e2be49
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum:   121194 cbf6ac02a99d7fb7a64cc29b07433c82
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum:   204156 ed48ca294a99e3e18eed491119c0d5ea
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum:  1936052 c051bd4fe32d5d0225f3eae41b01af61
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_amd64.deb
      Size/MD5 checksum:   204454 e52b74e973244cdc91030148777b2607

  ARM architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:   168078 056a33d7d2c0d1ddec9dc82bc10fa91b
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:   126062 279c0b2b4672b68c99414f2864d48c8e
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:   184962 d3b634a995bcb30e328c4bc23db47742
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:   633928 2021be577fc4731afad9fb85f10b900e
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:     1036 a6a62863932baa16457b8957f191dc8c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:  9221058 38cf4492787382ca6f092f8b8996c29d
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:   403328 db6d998bf24a01bc40e8958c18b8354a
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:   158342 5851791133fe390520c0dc627cf0e5bb
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:  3342584 471aee590010373272675eb6dc51bf9b
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:   112668 3a2b8d1d473e4801a0e90f0e6e20d173
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:   204162 6679a330049947996fd1649ee9015238
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:  1604480 9ce39476d103f3d42cb500853c5f24d8
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_arm.deb
      Size/MD5 checksum:   169002 02c81d7993667ef81be7c602681e96f0

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum:   168076 906aae615cfccc867128dfe39ac510bc
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum:   158584 e4d74474057887b6cb2852f4e4b01c74
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum:   184956 5551d423e4375da8fb4f9c16dd6a3f3b
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum:   756664 d2a92775acd425551d1804c23eae7bdf
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum:     1038 7e88d25552135eb7f79a2fd2c6bd2b22
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum: 12177466 14304d3394a221c2aa7bc531af9b591b
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum:   403286 f98a9ce0ae8980625c282f80523f0bc7
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum:   158338 c384d2a4f962d0b9820a5ba28cd1218c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum:  3359316 77e7f6cfee145742ae2e13f24ec27def
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum:   123522 69dbc3a82863990e7ca431b7f6a29b61
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum:   204160 34b097e3f1e4a08af78541d3a12271e7
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum:  2135234 33d7b6fbf3a170104167b5403fc3f794
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_hppa.deb
      Size/MD5 checksum:   216448 fb8e5b76a683c26e1c3ced60acbb23b2

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum:   168078 fead516428ff54afba8fb9ffeb6107b7
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum:   138378 89380d80fe8f7e985a9307a9a677bc3e
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum:   184968 0abd8dfb25de28cb50c5e58648a0ff3a
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum:   662194 a2f137e0d9c3c8a936a7ef1393de2955
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum:     1036 fd2f5c0d987df8a32ab9818ff0a2d968
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum: 10315404 db2f25cbb471e5387de1aeef7e176f7e
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum:   403286 b3bf4d34d9a51f3f1708b06c70901cf3
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum:   158358 fde8eec72729840210de689b2a343a51
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum:  3348734 081bfa3f5e9b81894f5a147ec05298ab
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum:   116236 5bb8e35c9cf6bcf73572e1307d4e036f
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum:   204172 bb709199707869539300ae4ace073983
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum:  1811294 790f8577dc06fc90034945919a949ac7
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_i386.deb
      Size/MD5 checksum:   192634 592adc759e44972dacdc85ebe1296a63

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum:   168060 3ee0a67cfc308f6d7b0f9343a63f02fb
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum:   176012 62b50ac23c369004b18620238da294dd
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum:   184936 443ef5c72a5fd2b92028468433fdc2da
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum:   968864 f4e5406c1a7abe968b52cccfd4ba3041
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum:     1032 682087a412c08bbc251fe22e56a0dd6d
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum: 12966514 05ed823dbd6c55fd456f03f63aefb7e3
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum:   403270 03b53aaf2cd12b98d1e3f6f8a8d7dbea
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum:   158318 ee4f77127d14a091d8730fbcb7cab219
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum:  3378656 76bc26292ee2482e3b7f18b807357898
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum:   125584 372e14fa5d4a23a4df7f4b393f66bc3a
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum:   204148 030a13e33c394393c22cbbe03a5fd7b7
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum:  2302326 2045f4c0ded45041ede24f2fe8316f25
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_ia64.deb
      Size/MD5 checksum:   242940 92b1755ece7f86361e2467ecbe8a0b98

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:   168086 d72a577c1f74c1e64183625c6afbb356
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:   127678 38a811b392550848806b4ea82b3786d9
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:   184978 37b8d8c26f1e913bcc0676351655fbd9
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:   601900 70ae4f03be4fb2a05589149a565184f4
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:     1044 843ae71e0612517ec6d037f0157bcc6a
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:  9716824 1976d754f162f52fada5c6ae709a63df
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:   403350 9299ef454121636429cd58ce4648de74
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:   158384 8f5d9c08ce9ee22a7a523ab12d0339a1
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:  3337078 7c2763fc5d1399ba0f6de5e60c487a9f
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:   114460 847321a189d09a37590931b7bdaa12b8
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:   204188 0acd1202b74153c09e96dc03c82f858c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:  1683182 6fce1b70bc59f24fcaf9204ed8045a0e
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_m68k.deb
      Size/MD5 checksum:   175004 ba9f9d625b54cb3b8338f353eb591d63

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum:   168066 40951a292610d572fb32bc9a08e3d716
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum:   142540 467f786d8c69106d6bf52c4ff0f147df
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum:   184948 90d54a6da32f70c55e562ba0908bb615
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum:   727612 bef2fa46727d30564df686f3bec97b4c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum:     1036 3f24cf20cf983e887def6ab4e83d313f
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum: 10739450 81c0c801442b91873e351e6469cd626d
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum:   403256 7dea9f93c79476d6c4a08e7da9749d71
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum:   158328 6ff36aad6504f5156e2cdc4e4e6990fa
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum:  3358884 7dc0ffad84ddf4ff45ed019f856ddde8
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum:   117622 63931cee65d76f9c7810110fffd591b7
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum:   204148 64b3b20a437d605742e300d41cdbf251
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum:  1795510 92e0f045d8bf37b1ea6d90e84480d40c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_mips.deb
      Size/MD5 checksum:   190118 debdc2467236eec1f5ca49bc8ddac2c9

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum:   168074 cf9f50671782c08500d3c2d29f93ef9e
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum:   142492 b7b2127fa138bd01dc1c7b4fb4dc1638
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum:   184942 4a26b1d61ac0daf627f2e7cb8797db82
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum:   717068 0b935bf6dca82a129f2c678b6069b928
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum:     1040 69af0bb34af5f881b501bd829b4364bf
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum: 10620284 93085f80cc02f554bf3d7e1e0d39c176
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum:   403274 526ced11500a8d0c08044786255199df
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum:   158340 7b6d7ee717b0bf427bbb469b05908f38
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum:  3359422 a710eb88d086ddd2f41f1c0f9a1582c6
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum:   117206 6f80a50306eb573deaa8052ef7b953c4
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum:   204160 182f59bc3a66185d5d99f4f4b892bf0d
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum:  1777592 0bef8a8191417e642e11a87b95cbff28
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_mipsel.deb
      Size/MD5 checksum:   187610 15e1ba2286e45ea4de8bd10e1043b4ae

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:   168068 4afc44e689523284f6596c49a0c57c04
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:   132968 c7f1bc15d01ace3a8544dd8ac09c4f5f
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:   184954 69dd645183560089b4f0b079b14ff7ba
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:   720814 b919244b4647539e92ac8496175e5ec9
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:     1030 c93abd84beb9d1b5df1f393dcb742e4d
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:  9712666 01692a2bb19b64406bcdecdf43fd6921
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:   403274 c84c30bab18ab3337cf7c995f1bd235e
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:   158332 e356212dd93e1bd4762f0350461bc0d8
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:  3341184 51eac899e26a44b28ca9304f7de58bad
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:   114586 582bec3e96ed89fb2b66d127135c2d99
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:   204154 cfcef824bc6d730f8749e92626377512
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:  1643132 05d2aae54574a7440b11e3d1683b4491
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_powerpc.deb
      Size/MD5 checksum:   175800 b9c2d4010924375ae96697b5c85a2886

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum:   168068 49233d2e9ce43df4702d355bbe0a1405
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum:   158304 a8cdc38cb9ac827b54c646b8b5c2b2e7
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum:   184938 4f7852977d08f31cfad5e8c352946426
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum:   801008 abfe303f9e48e5341c81a9622c0f9f1c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum:     1032 35f2fdd96e584c9afbda26d3395ef78f
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum: 11340612 0a8315780402713a6f25f3bb068b9593
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum:   403268 f4d3465aae90c369a0f4b0000f9b76f9
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum:   158330 01c26b88dbf2a25b4520e484a324267e
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum:  3353508 2d8ca556688100796c7b66b65f509246
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum:   121340 1c28f9aa34ab20b8c9b87b6a484f29c0
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum:   204142 e2c4c8c3b721f3560390c86f8a8e4f42
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum:  1944770 525714424a1fa0131327ced0961987c9
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_s390.deb
      Size/MD5 checksum:   213646 31a3c2bc95b020fa1a4104cdb24f51cf

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:   168070 ec1b9711bc09abaf87a1e8caeac523a9
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:   130234 a57dbc4e7d4fb4a7269dce9063b848d9
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:   184964 f6d4813d577feef2530f5993e4dc5464
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:   674592 5634a5745abfd58cec63f3615b9a7e0e
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:     1036 222687822a8e79b3407dd3edec552b19
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:  9385078 1e10244c49ded27051ea0eeef38508f5
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:   403290 fe2140858be3ef7e5b732dc9d98f5f40
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:   158338 5703ab5f69f23b9deccc705bf97bfe16
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:  3342206 18dd2adf74fc28147f85cc55d4bafc25
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:   112520 0d19cd564f1c80ce919f85da844fe535
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:   204166 6caff56854b59671710aace6b683bcc2
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:  1583766 3366a381ab996886b6924e1d12ad0bc7
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_sparc.deb
      Size/MD5 checksum:   168196 2fc28554dfb6e322e354ccbdff26fb50


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFcu2fW5ql+IAeqTIRAgn6AJ4ouLaDYxzUO8yo41wOsjgdYakn7wCfamS1
o3nLd80vTavGY8LgjJxV6Ok=
=SFB8
- -----END PGP SIGNATURE-----



3.


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 1225-2                    security@xxxxxxxxxx
http://www.debian.org/security/                             Martin Schulze
December 3rd, 2006                      http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : mozilla-firefox
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2006-4310 CVE-2006-5462 CVE-2006-5463 CVE-2006-5464
                 CVE-2006-5748
CERT advisories: VU#335392 VU#390480 VU#495288 VU#714496 
BugTraq IDs    : 19678 20957

This update covers packages for the little endian MIPS architecture missing in the original advisory.

Several security related problems have been discovered in Mozilla and derived products such as Mozilla Firefox.  The Common
Vulnerabilities and Exposures project identifies the following vulnerabilities:

CVE-2006-4310

    Tomas Kempinsky discovered that malformed FTP server responses
    could lead to denial of service.

CVE-2006-5462

    Ulrich Kühn discovered that the correction for a cryptographic
    flaw in the handling of PKCS-1 certificates was incomplete, which
    allows the forgery of certificates.

CVE-2006-5463

    "shutdown" discovered that modification of JavaScript objects
    during execution could lead to the execution of arbitrary
    JavaScript bytecode.

CVE-2006-5464

    Jesse Ruderman and Martijn Wargers discovered several crashes in
    the layout engine, which might also allow execution of arbitrary
    code.

CVE-2006-5748

    Igor Bukanov and Jesse Ruderman discovered several crashes in the
    JavaScript engine, which might allow execution of arbitrary code.

This update also adresses several crashes, which could be triggered by malicious websites and fixes a regression introduced in the
previous Mozilla update.


For the stable distribution (sarge) these problems have been fixed in version 1.0.4-2sarge13.

For the unstable distribution (sid) these problems have been fixed in the current iceweasel package 2.0+dfsg-1.

We recommend that you upgrade your mozilla-firefox package.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:

apt-get update
        will update the internal database apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13.dsc
      Size/MD5 checksum:     1003 4a8d05c1e9563e6066ca838e7c0b2f53
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13.diff.gz
      Size/MD5 checksum:   450265 46d4bedf12a1e0c92a275ae012d92b5a
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz
      Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_mipsel.deb
      Size/MD5 checksum:  9820186 7823ac933179f566597b7bd4e3810fcb
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_mipsel.deb
      Size/MD5 checksum:   158272 950a04ca3dfd4870b30d5d8c6ae536ee
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_mipsel.deb
      Size/MD5 checksum:    58218 0dad036900c189fc233a5fe25c2edd3a


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFcy0VW5ql+IAeqTIRAgxMAKC0SdOsZeB/nY4PZL+cqJJFJkhPQgCgo2DD
Bl3uw4f40sxNi3ss3FrgBPY=
=OMQR
- -----END PGP SIGNATURE-----



4.


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 1226-1                    security@xxxxxxxxxx
http://www.debian.org/security/                         Moritz Muehlenhoff
December 3rd, 2006                      http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : links
Vulnerability  : insufficient escaping
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2006-5925
Debian Bug     : 399187

Teemu Salmela discovered that the links character mode web browser performs insufficient sanitising of smb:// URIs, which might lead
to the execution of arbitrary shell commands.

For the stable distribution (sarge) this problem has been fixed in version 0.99+1.00pre12-1sarge1.

For the upcoming stable distribution (etch) this problem has been fixed in version 0.99+1.00pre12-1.1.

For the unstable distribution (sid) this problem has been fixed in version 0.99+1.00pre12-1.1.

We recommend that you upgrade your links package.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update
        will update the internal database apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1.dsc
      Size/MD5 checksum:      628 a1ac1c1549a102a35398b6453df8cf03
    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1.diff.gz
      Size/MD5 checksum:     8329 5898f75988aba793e9559295996289ef
    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12.orig.tar.gz
      Size/MD5 checksum:   597848 c262b08c822a582bbc992e3730f43336

  Architecture independent components:

    http://security.debian.org/pool/updates/main/l/links/links-ssl_0.99+1.00pre12-1sarge1_all.deb
      Size/MD5 checksum:     5460 d983ff06f50743eefc590e13b881c649

  Alpha architecture:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_alpha.deb
      Size/MD5 checksum:   441038 6d3f4dbcdb63455d1a7c6c573c0a2cb0

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_amd64.deb
      Size/MD5 checksum:   396200 13443385aff64d07c142561684d3698d

  ARM architecture:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_arm.deb
      Size/MD5 checksum:   376692 90dc38882cee571a605ea4c1b312101f

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_hppa.deb
      Size/MD5 checksum:   416286 1a0e7cd0c9885a5a47f89feecdeea13a

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_i386.deb
      Size/MD5 checksum:   385186 a99be183941d62c33bd7d0f49c1856cb

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_ia64.deb
      Size/MD5 checksum:   524446 e68877303d408b3b730e703c6d78f709

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_m68k.deb
      Size/MD5 checksum:   343786 51765dbe4d8788b4f4219c6f71461579

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_mips.deb
      Size/MD5 checksum:   412208 f3272fc9e06d0ad0bed4c2d2816502fe

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_mipsel.deb
      Size/MD5 checksum:   408254 70f5c450fd225ea6a82befeb3d6aeeab

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_powerpc.deb
      Size/MD5 checksum:   396926 b0cbccacc3632be2d3eb97cea74ea6d8

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_s390.deb
      Size/MD5 checksum:   390546 2def4e695f30d34bb03a0592f5deee5b

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_sparc.deb
      Size/MD5 checksum:   379836 be1bae25603d4a50cf854a6b6b075960


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFczECXm3vHE4uyloRAnygAJwJea6TheWExHFK0nH5A5rbWDG3ygCgmbfu
5P76B0rdqS+zzIEMonB9cWU=
=Hj9Z
- -----END PGP SIGNATURE-----



5.


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 1227-1                    security@xxxxxxxxxx
http://www.debian.org/security/                             Martin Schulze
December 4th, 2006                      http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : mozilla-thunderbird
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2006-4310 CVE-2006-5462 CVE-2006-5463 CVE-2006-5464
                 CVE-2006-5748
CERT advisories: VU#335392 VU#390480 VU#495288 VU#714496 
BugTraq IDs    : 19678 20957

Several security related problems have been discovered in Mozilla and derived products such as Mozilla Thunderbird.  The Common
Vulnerabilities and Exposures project identifies the following vulnerabilities:

CVE-2006-4310

    Tomas Kempinsky discovered that malformed FTP server responses
    could lead to denial of service.

CVE-2006-5462

    Ulrich Kühn discovered that the correction for a cryptographic
    flaw in the handling of PKCS-1 certificates was incomplete, which
    allows the forgery of certificates.

CVE-2006-5463

    "shutdown" discovered that modification of JavaScript objects
    during execution could lead to the execution of arbitrary
    JavaScript bytecode.

CVE-2006-5464

    Jesse Ruderman and Martijn Wargers discovered several crashes in
    the layout engine, which might also allow execution of arbitrary
    code.

CVE-2006-5748

    Igor Bukanov and Jesse Ruderman discovered several crashes in the
    JavaScript engine, which might allow execution of arbitrary code.

This update also adresses several crashes, which could be triggered by malicious websites and fixes a regression introduced in the
previous Mozilla update.


For the stable distribution (sarge) these problems have been fixed in version 1.0.4-2sarge13.

For the unstable distribution (sid) these problems have been fixed in the current icedove package 1.5.0.8.

We recommend that you upgrade your mozilla-thunderbird package.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:

apt-get update
        will update the internal database apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1.dsc
      Size/MD5 checksum:     1003 6c5f746adeacacdf3127e17cb2aa8bee
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1.diff.gz
      Size/MD5 checksum:   529889 28823ccf3573c2dd660fd9d9e3e22b09
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2.orig.tar.gz
      Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4

  Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_alpha.deb
      Size/MD5 checksum: 12856976 84bc9994e2d58b31b25e2bd069d1def3
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_alpha.deb
      Size/MD5 checksum:  3280854 caa0d6f973d08d3f2b35e52254b00c2d
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_alpha.deb
      Size/MD5 checksum:   152698 d9fdc6a19105ddd536acd60a8ee2ab37
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_alpha.deb
      Size/MD5 checksum:    34122 cafae516210656d77a176415fb8db6f4
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_alpha.deb
      Size/MD5 checksum:    90116 699b3712455d642e224b54c926328a4c

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_amd64.deb
      Size/MD5 checksum: 12259294 289d4d588a4c47385220edb78c04afae
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_amd64.deb
      Size/MD5 checksum:  3282040 f4c6b066917601dad180472abf540098
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_amd64.deb
      Size/MD5 checksum:   151728 58934099903d70e9299390ea13f59df5
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_amd64.deb
      Size/MD5 checksum:    34120 08a6bedf50fe0457cbce271965871b47
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_amd64.deb
      Size/MD5 checksum:    89962 ba63d212aa7a4aeed16ed0f2d80d6a86

  ARM architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_arm.deb
      Size/MD5 checksum: 10345710 e715702c5b2aa723f9d25802287e94e4
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_arm.deb
      Size/MD5 checksum:  3273096 cce5d1fd85a8409b4af4ff6f7968e9d2
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_arm.deb
      Size/MD5 checksum:   143868 8a3036032e81ef1010e3a3162725a818
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_arm.deb
      Size/MD5 checksum:    34132 f2ab43ddc5f063963bef4e1ff6d9c956
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_arm.deb
      Size/MD5 checksum:    81934 ae1ce06ee154fb9e85fea35aaf5311fc

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_hppa.deb
      Size/MD5 checksum: 13571836 d5c2bbb909b9d6be2ca180f14c307f1e
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_hppa.deb
      Size/MD5 checksum:  3285646 5c9f816a25d33453f59179991ea74d0d
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_hppa.deb
      Size/MD5 checksum:   153926 4f22d429a7781c9f09b4edb68816c853
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_hppa.deb
      Size/MD5 checksum:    34134 cae400c43c5f0f5e0e276a047dbdab20
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_hppa.deb
      Size/MD5 checksum:    97998 bf0c11bb906656980cc4e5744eb464bd

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_i386.deb
      Size/MD5 checksum: 11549564 41a015e8acb35a566e733d5e3efbd26f
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_i386.deb
      Size/MD5 checksum:  3279334 7f4340a3a8a8194a7e99bd818866c57e
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_i386.deb
      Size/MD5 checksum:   147232 ad62baa206ff857d41db06fc9985881e
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_i386.deb
      Size/MD5 checksum:    34122 463263b2b57ed86dcde4f3bb458d0cf7
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_i386.deb
      Size/MD5 checksum:    88704 427bbd7d9754931c19829bc21096553d

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_ia64.deb
      Size/MD5 checksum: 14632100 53cd255c1673064d35138b4ddd9a00dd
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_ia64.deb
      Size/MD5 checksum:  3291608 e4d9bf2df8ae5a7ca3730f12409fe836
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_ia64.deb
      Size/MD5 checksum:   156062 a264399ce67bcfef3823da09effe603f
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_ia64.deb
      Size/MD5 checksum:    34120 beeb92a784afcee38f2ea9c5a5747a8c
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_ia64.deb
      Size/MD5 checksum:   107826 ce5eb8ae242c1e3ae2de7b2dd4638086

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_m68k.deb
      Size/MD5 checksum: 10795348 67b697071cc0d1f5667c6ed7464e90f7
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_m68k.deb
      Size/MD5 checksum:  3272426 d1a76c3cc4d53d311d4fa2933fa241aa
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_m68k.deb
      Size/MD5 checksum:   145646 bb4e9eed4d5639080ad0f40d4b9ccd3e
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_m68k.deb
      Size/MD5 checksum:    34148 7a167f58be69a5f87ae0b6ff696c195b
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_m68k.deb
      Size/MD5 checksum:    83168 00b7c01b14e69d3de5b716a97b531135

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_mips.deb
      Size/MD5 checksum: 11949608 9ec9db79429dda4d407ccf88ccdcd432
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_mips.deb
      Size/MD5 checksum:  3280190 9c5196972a3cf0c2c526f858aca2466e
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_mips.deb
      Size/MD5 checksum:   148640 5797fb7d9315c3143f3764f6b6f85c25
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_mips.deb
      Size/MD5 checksum:    34124 cb575700d4f03213414e5723de4f71e3
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_mips.deb
      Size/MD5 checksum:    85368 0ac0335d952db222dd2cabb47aebaf93

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_mipsel.deb
      Size/MD5 checksum: 11817496 aba31a9b55e305979548c2bc354d25b8
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_mipsel.deb
      Size/MD5 checksum:  3281036 ad64af4aa0945eb30474881150f19368
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_mipsel.deb
      Size/MD5 checksum:   148210 efb0d8070713c0392b4bf515df28b2a2
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_mipsel.deb
      Size/MD5 checksum:    34122 7506a7d0d2452a5aa57a8e729a129afe
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_mipsel.de
b
      Size/MD5 checksum:    85264 a660f1051091732b2b827a25169bcd13

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_powerpc.deb
      Size/MD5 checksum: 10913258 2b2bc733b1a9c582846a35e09f790792
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_powerpc.deb
      Size/MD5 checksum:  3270832 f0971f53b8576629a543e31b13b5fc82
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_powerpc.deb
      Size/MD5 checksum:   145640 b0f543ffae409f9c2ed5feb623d9ccc9
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_powerpc.deb
      Size/MD5 checksum:    34126 d00d244fff67496236b40c606eb2b068
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_powerpc.d
eb
      Size/MD5 checksum:    82090 08904221a4f22160c5448adc5e584892

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_s390.deb
      Size/MD5 checksum: 12706338 9cff7d191572124759121b992f9fcbbe
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_s390.deb
      Size/MD5 checksum:  3281302 32b6910f4a3352602eb5f2fba6496b5c
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_s390.deb
      Size/MD5 checksum:   152014 b85e247ddc89da9251bc96237bc496cb
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_s390.deb
      Size/MD5 checksum:    34118 34fa6f63472be37d37e23ce669dc9ae3
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_s390.deb
      Size/MD5 checksum:    89892 c8e4543a63614010de56776b5b597006

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_sparc.deb
      Size/MD5 checksum: 11182150 3728f5afbe35203ae332876bc1804866
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_sparc.deb
      Size/MD5 checksum:  3276596 305ba0ef1c0dec7b7057af38507a981b
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_sparc.deb
      Size/MD5 checksum:   145322 6799c906fa439170521396913ba7092a
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_sparc.deb
      Size/MD5 checksum:    34118 4ac987cbe24509923ed7cf89c78995dc
 
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_sparc.deb
      Size/MD5 checksum:    83734 191466ecaad65e7781192a118749fc45


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFc9kCW5ql+IAeqTIRAlWUAJ4yg4SG/SCLzd///G08uHiPjnxtiACgqN6r
iMNDIuBp0otB0CAnhO2A2Cw=
=otNU
- -----END PGP SIGNATURE-----



6.



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


- - --------------------------------------------------------------------------
Debian Security Advisory DSA 1205-2                    security@xxxxxxxxxx
http://www.debian.org/security/                                 Steve Kemp
December 1sd, 2006                      http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : thttpd
Vulnerability  : insecure temporary files
Problem-Type   : local
Debian-specific: yes
CVE ID         : CVE-2006-4248
Debian Bug     : 396277


Marco d'Itri discovered that thttpd, a small, fast and secure webserver, makes use of insecure temporary files when its logfiles are
rotated, which might lead to a denial of service through a symlink attack.

The original advisory for this issue didn't contain fixed packages for all supported architectures which are corrected in this
update.

For the stable distribution (sarge) this problem has been fixed in version 2.23beta1-3sarge2

For the unstable distribution (sid) this problem has been fixed in version 2.23beta1-5

We recommend that you upgrade your thttpd package.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update
        will update the internal database apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2.dsc
      Size/MD5 checksum:      614 0f9a3730f341fa0151596a3b9f20764d
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2.diff.gz
      Size/MD5 checksum:    14313 8545dd3d0f7a2083ecca36e53e72bd6b
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1.orig.tar.gz
      Size/MD5 checksum:   128712 d3d91f6596f53d5e2b27cea8607d5bba

  Alpha architecture:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_alpha.deb
      Size/MD5 checksum:    59270 d4076615e782deb79cabae37733de534
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_alpha.deb
      Size/MD5 checksum:    28056 ee6e6ccccb7619755da6478e349d03fd

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_amd64.deb
      Size/MD5 checksum:    56090 59ab35cd4a12c7a010229e793d3d031b
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_amd64.deb
      Size/MD5 checksum:    26518 76286320653018389937886b1e6b2cfa

  ARM architecture:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_arm.deb
      Size/MD5 checksum:    53230 cf8a02a2f0f3bd64522f79111f079642
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_arm.deb
      Size/MD5 checksum:    24694 88d75dcab4fa8bca63f48afb04ded258

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_hppa.deb
      Size/MD5 checksum:    57420 0104f76c6a50be56598ecb7ebb6317a4
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_hppa.deb
      Size/MD5 checksum:    26984 46a6908e5e1a0c02bb6b065ed6fab80d

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_i386.deb
      Size/MD5 checksum:    51180 991b1072ebd903b6a9ee316b1bfdc8c6
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_i386.deb
      Size/MD5 checksum:    24776 fd3dddb60d160a6245da4c7efd5dcfe4

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_ia64.deb
      Size/MD5 checksum:    71992 3ae1510acb0dad29743795678058e467
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_ia64.deb
      Size/MD5 checksum:    30360 d1b09a54ddb43b6cf5b080e59dbb9792

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_m68k.deb
      Size/MD5 checksum:    50170 58f820e0cc1ff0921d641fc4f340d4ae
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_m68k.deb
      Size/MD5 checksum:    24834 fd383afb658a319f594056f14107c6f7

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_mips.deb
      Size/MD5 checksum:    57060 d42bd66e806d204f9b01559148cbbbea
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_mips.deb
      Size/MD5 checksum:    31062 b2fedfffe04d03b9d4d7d2316669735e

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_mipsel.deb
      Size/MD5 checksum:    57168 4407a2da69e31159642973201900f64e
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_mipsel.deb
      Size/MD5 checksum:    31188 3a9282003d6785a05ef91a17c646eb1b

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_powerpc.deb
      Size/MD5 checksum:    53466 24b0524b9944d1bb9e2d8451035be5a0
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_powerpc.deb
      Size/MD5 checksum:    25232 8686e26fba64af5040a2484e1c626f06

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_s390.deb
      Size/MD5 checksum:    56264 6b018396fae8f11be8d6dc2ddae99762
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_s390.deb
      Size/MD5 checksum:    26344 f7c45e7292b79e9e047982519ed7717b

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_sparc.deb
      Size/MD5 checksum:    53338 3d5315a2b44da8acd151bc714ca45efc
    http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_sparc.deb
      Size/MD5 checksum:    24796 a64846770af6a96a1ae30d0b02fda299
  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFFcEu4wM/Gs81MDZ0RAlC3AKCwfFp3xBERF++ZlJrbrE05r8Z+WgCfdQ0K
HeTSA+a1FJmlA36FbBRFj6Q=
=3NoA
- -----END PGP SIGNATURE-----


- ---------------------------------------------------------------------------------------
NISCC values your feedback.

1. Which of the following most reflects the value of the briefing to you?
   (Place an 'X' next to your choice)

	Very useful:__ Useful:__ Not useful:__ 

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our briefings?


Thank you for your contribution.
- ---------------------------------------------------------------------------------------

For additional information or assistance, please contact our help desk by telephone.  
You may send Not Protectively Marked information via e-mail to uniras@xxxxxxxxxxxxx

Office hours:

Mon - Fri: 08:30 - 17:00 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

- ---------------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Debian for the information contained 

in this briefing.
- ---------------------------------------------------------------------------------------

This notice contains information released by the original author. Some of the 
information may have changed since it was released. If the vulnerability affects you, 
it may be prudent to retrieve the advisory from the site of the original source to 
ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade name, 
trademark manufacturer, or otherwise, does not constitute or imply its endorsement, 
recommendation, or favouring by UNIRAS or NISCC. The views and opinions of authors 
expressed within this notice shall not be used for advertising or product endorsement 
purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors or omissions 
contained within this briefing notice. In particular, they shall not be liable for 
any loss or damage whatsoever, arising from or in connection with the usage of 
information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) and has 
contacts with other international Incident Response Teams (IRTs) in order to foster 
cooperation and coordination in incident prevention, to prompt rapid reaction to 
incidents, and to promote information sharing amongst its members and the community at 
large.
- ---------------------------------------------------------------------------------------
<End of UNIRAS Briefing>



-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRXQGKml7oeQsXfKvEQJVJACgqzeuKq0oxj69DWkM4Ha1bCwf6j8AoIZf
P0V7ccqnSealGcvy7ujwKNLU
=asnu
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________