[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 822/06 - Three Debian Security Advisories:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

 UNIRAS (UK Government CERT) Briefing - 822/06 dated  14.12.06 time 14:45
 UNIRAS is part of NISCC (the UK National Infrastructure Security
 Co-ordination Centre)
______________________________________________________________________________

 UNIRAS material is available from the NISCC website at www.niscc.gov.uk
______________________________________________________________________________

Title
=====

Three Debian Security Advisories:

1. DSA-1234-1 - New ruby1.6 package fixdenial of service

2. DSA-1235-1 - New ruby1.8 package fixdenial of service

3. DSA-1236-1 - New enemies-of-carlottapackage fix missing sanity checks

Detail
======

1. A denial of service vulnerability has been discovered in the CGI library 
included with Ruby, the intepreted scripting langauge for quick and easy 
object-orientated programming.

2. A denial of service vulnerability has been discovered in the CGI library 
included with Ruby, the intepreted scripting langauge for quick and easy 
object-orientated programming.

3. Antti-Juhani Kaijanaho discovered that enemies-of-carlotta, a simple manager 
for mailing lists, does not properly sanitise email addresses before passing them 
through to the system shell.



1.



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1234-1                  security@xxxxxxxxxx
http://www.debian.org/security/                               Steve Kemp
December 13, 2006
- - ------------------------------------------------------------------------

Package        : ruby1.6 (1.6.8-12sarge3)
Vulnerability  : Denial of service
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2006-5467
Debian Bug     : 398457


A denial of service vulnerability has been discovered in the CGI library included with Ruby, the intepreted scripting langauge for
quick and easy object-orientated programming.

For the stable distribution (sarge), this problem has been fixed in version 1.6.8-12sarge3.

We recommend that you upgrade your ruby1.6 package.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update
        will update the internal database apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian 3.1 (stable)
- - -------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3.dsc
    Size/MD5 checksum:      995 afe54a8363d4d14b066f32b07b095dde
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3.diff.gz
    Size/MD5 checksum:    78860 73e5ba7c3a427ceb1bf4926cf9e440a9
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8.orig.tar.gz
    Size/MD5 checksum:  1022364 aa1e272added83a5206c565d62c9c8ed

Architecture independent packages:

  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-elisp_1.6.8-12sarge3_all.deb
    Size/MD5 checksum:   152700 0086c6b5b4d81a689ec8ab938e495e33
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-examples_1.6.8-12sarge3_all.deb
    Size/MD5 checksum:   160374 ad819f654e8b072a38ebbf2e6aa24fd5
  http://security.debian.org/pool/updates/main/r/ruby1.6/irb1.6_1.6.8-12sarge3_all.deb
    Size/MD5 checksum:   174876 7518ee339c9c8450d13097c25d1ab034

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/r/ruby1.6/libtk-ruby1.6_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   178640 225d0be161efb37087a2ce9de3b37566
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   688428 154f8e9a83bd637ff39df9023fad0bbb
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsyslog-ruby1.6_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   145022 cba2af385573937052fe3f00664841d3
  http://security.debian.org/pool/updates/main/r/ruby1.6/libcurses-ruby1.6_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   146562 eabbf08274f6cce027ace854627157cb
  http://security.debian.org/pool/updates/main/r/ruby1.6/libgdbm-ruby1.6_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   146560 5e49af7b3cbb7a60cf6d8ab3c453c1f2
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsdbm-ruby1.6_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   149118 dfcee284ca8d7e913b264f12de7d260f
  http://security.debian.org/pool/updates/main/r/ruby1.6/libdbm-ruby1.6_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   145046 5dd5914d57db7623cc2e25e4c0a7287a
  http://security.debian.org/pool/updates/main/r/ruby1.6/libreadline-ruby1.6_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   144908 d088c80629003bd8a800b2b8da360b11
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6-dbg_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   726692 a1d9bcf1e1c34576113b7c65a57f0576
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-dev_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   700268 f0097fe8617fa00e30bfe746eb13706b
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtcltk-ruby1.6_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   165542 13bf6ffc763f2ca0d9af8522e2638dfd
  http://security.debian.org/pool/updates/main/r/ruby1.6/libpty-ruby1.6_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   148628 940fbeb69ccec2ab3b4956511642dccc
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3_alpha.deb
    Size/MD5 checksum:   159290 b403a9bb1d6e5c3007b4d283620c0302

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/r/ruby1.6/libtcltk-ruby1.6_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   164818 aff47f4b190bf00d9b8e9903373c6333
  http://security.debian.org/pool/updates/main/r/ruby1.6/libpty-ruby1.6_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   148026 21e694282148b8631aee26ca6b2ad9b8
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6-dbg_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   688068 c4d59fd192b5f648604fc09f82c67d41
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-dev_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   577402 f72367e44f4ae55c36ab7df959d75149
  http://security.debian.org/pool/updates/main/r/ruby1.6/libreadline-ruby1.6_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   144288 8134c6e83daed5a07884881a7f6e0a3b
  http://security.debian.org/pool/updates/main/r/ruby1.6/libcurses-ruby1.6_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   145502 c3cc5c8cccc7850c5038f3778924806a
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsdbm-ruby1.6_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   147764 4935294864a911066640c61944817061
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsyslog-ruby1.6_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   144554 60e6eff272013f9959844f91905efc1f
  http://security.debian.org/pool/updates/main/r/ruby1.6/libdbm-ruby1.6_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   144338 6813806140be66ca7f57e197d736913b
  http://security.debian.org/pool/updates/main/r/ruby1.6/libgdbm-ruby1.6_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   145894 9554144622d3b5893271d91c12a65fee
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   642408 204f5254cb042361949dfe1677e74397
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   158994 c6385b5f4c253db485ae69010f131fd0
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtk-ruby1.6_1.6.8-12sarge3_amd64.deb
    Size/MD5 checksum:   178398 71698e9480c2ea3f27644cf572f80430

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/r/ruby1.6/libcurses-ruby1.6_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   144496 f0b1ca783f13a9ee7825e383cedc9821
  http://security.debian.org/pool/updates/main/r/ruby1.6/libpty-ruby1.6_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   147320 d0aee332fadd1b2e351317b626022fc8
  http://security.debian.org/pool/updates/main/r/ruby1.6/libdbm-ruby1.6_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   143468 c97704d53471ec29c8f3074df3990010
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtcltk-ruby1.6_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   163978 65a2a9dedb0540c007abd1394e49258b
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   616564 253e50c1a16e23c03b7192a9138e75c2
  http://security.debian.org/pool/updates/main/r/ruby1.6/libgdbm-ruby1.6_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   144406 7cda48fca70e467655d1b4af12c5a63a
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-dev_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   582246 6317ca5966e3895c9afb265da9024ee1
  http://security.debian.org/pool/updates/main/r/ruby1.6/libreadline-ruby1.6_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   143506 dd2aa14c24af38c1817ff7c8d8d6c611
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   158758 831d69303a12966fd4167386f3bad624
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsyslog-ruby1.6_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   144126 f59a00b2dd2d91162a8db1c0fa5df523
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsdbm-ruby1.6_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   146570 057062a8864242676017884405241b43
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtk-ruby1.6_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   178326 897ce0b2431e334485dc783c150bef48
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6-dbg_1.6.8-12sarge3_arm.deb
    Size/MD5 checksum:   658204 6185331e2d979f8020338a215d0e654b

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/r/ruby1.6/libsdbm-ruby1.6_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   148944 e836b7fb29e09c04fcbced13f9a357b6
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   702938 39653ef7a0eed83b841f5861b4486346
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtk-ruby1.6_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   179102 8f0f418f64b53d5a40de46cd12e0879b
  http://security.debian.org/pool/updates/main/r/ruby1.6/libgdbm-ruby1.6_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   147038 55de9030c550d9fda11a09437b1a6881
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtcltk-ruby1.6_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   166364 cad06e65732544c6e18b7633030510a9
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsyslog-ruby1.6_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   145670 a892ee781d1e6077d9d4bd32cc819744
  http://security.debian.org/pool/updates/main/r/ruby1.6/libcurses-ruby1.6_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   146612 1097a76e4d3f662759f0c9c28f2dcbe0
  http://security.debian.org/pool/updates/main/r/ruby1.6/libdbm-ruby1.6_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   145534 5674d0646febc3c37e646fa3f397d6fc
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-dev_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   650994 7e91a28af706ac571e2a8aed1b405419
  http://security.debian.org/pool/updates/main/r/ruby1.6/libpty-ruby1.6_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   148980 24bba2514cfdfd8f9d14df4d58a0b8a7
  http://security.debian.org/pool/updates/main/r/ruby1.6/libreadline-ruby1.6_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   145154 f820b3dfc10aced5bcd248a774865002
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6-dbg_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   741098 0a83d1c24e4cea428438c40a34db0856
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3_hppa.deb
    Size/MD5 checksum:   159362 fdcadb966ee0d979592fe87ada1741dc

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/r/ruby1.6/libcurses-ruby1.6_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   144886 b612779ff9ac97a27a3416ef3c512eab
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsdbm-ruby1.6_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   147276 9bba0744ac04aaf167072763f292afb0
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtk-ruby1.6_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   178330 1b319065b7c5e9c04e00a63291489ff0
  http://security.debian.org/pool/updates/main/r/ruby1.6/libreadline-ruby1.6_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   143682 a09ac9249c7fed2c3d523ee8fab31ec5
  http://security.debian.org/pool/updates/main/r/ruby1.6/libdbm-ruby1.6_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   144072 61775e82c062c19c29879e13ec2766de
  http://security.debian.org/pool/updates/main/r/ruby1.6/libpty-ruby1.6_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   147468 9af13c33b594bb6cdb536c9a2c067a63
  http://security.debian.org/pool/updates/main/r/ruby1.6/libgdbm-ruby1.6_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   145130 f93afeb835f6d016e1bde4ca88274e95
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsyslog-ruby1.6_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   144000 1f8fdf448c3a9247bcf9415e19ad8df3
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-dev_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   552196 efd62faf3397ceaafe2d32f71c874357
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   616648 55ff1ea87e6ff23f4e86af660666e14f
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtcltk-ruby1.6_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   164250 6243594d2dab47a2933e6d5261a216fa
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6-dbg_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   669656 48bb2a4f4763a33c694df458626b02cf
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3_i386.deb
    Size/MD5 checksum:   158780 602b6b2dab6c525b4c3d7ce1f5d8254e

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/r/ruby1.6/libsyslog-ruby1.6_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   146544 528caff2be9a987e112b80ec7901c0d2
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtcltk-ruby1.6_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   167730 da38c813df07af30097aa5f07f0f39fd
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6-dbg_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   874930 8eaf1e00f39f10539602f98e3ed1ee50
  http://security.debian.org/pool/updates/main/r/ruby1.6/libpty-ruby1.6_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   150698 64d3c7e76ea21a04de6ff033a41858e3
  http://security.debian.org/pool/updates/main/r/ruby1.6/libdbm-ruby1.6_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   147228 c892c2a7313b08e05e54f8c6ae1529ea
  http://security.debian.org/pool/updates/main/r/ruby1.6/libgdbm-ruby1.6_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   149250 4dc8acc8ede7f48e40c2f7a88c8a7454
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtk-ruby1.6_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   179356 80509dd535e855690e24475e806d3fc3
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-dev_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   762730 adbcd0a670fb1e196f355e8a60ef6ef6
  http://security.debian.org/pool/updates/main/r/ruby1.6/libcurses-ruby1.6_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   148356 945bbf9ae0d8215ad1745aa2bfe23706
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsdbm-ruby1.6_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   154270 466654f80151e6f7b5336975afc7ce35
  http://security.debian.org/pool/updates/main/r/ruby1.6/libreadline-ruby1.6_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   147086 82ab42243ba5b78f41c1f647bbc8a484
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   820748 df9a6606ef6c0328378ab80d92e80247
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3_ia64.deb
    Size/MD5 checksum:   159710 e76c74583b6175d467f678fadec83d53

m68k architecture (Motorola Mc680x0)

  http://security.debian.org/pool/updates/main/r/ruby1.6/libgdbm-ruby1.6_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   144712 c2a1e7714f8543cccabb26a1d6d69a04
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsyslog-ruby1.6_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   144546 ae7b14ce1b0f3dbbdace3dd4748d75c8
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   603230 4ca88f79d61d95fb0f03052fe19b7593
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtcltk-ruby1.6_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   164178 5f23186d2355ef883d3b31dd26626f5a
  http://security.debian.org/pool/updates/main/r/ruby1.6/libpty-ruby1.6_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   147638 1fb27ef4a6696059a342f2eb9b2dcf4f
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-dev_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   493806 76f8de2c1903648d05f42d66eb6e4bf7
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtk-ruby1.6_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   178312 b1e8e64639f421e946647292acca7095
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6-dbg_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   648340 61747528ef0325a1c63d4e58a33f0160
  http://security.debian.org/pool/updates/main/r/ruby1.6/libdbm-ruby1.6_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   143514 5bf961f7b04ad1c64d98a5181a578a0c
  http://security.debian.org/pool/updates/main/r/ruby1.6/libcurses-ruby1.6_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   144834 7d377a98ee5c18482a0f8f7188001399
  http://security.debian.org/pool/updates/main/r/ruby1.6/libreadline-ruby1.6_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   143760 deae6eb5f2cb2339cd887d4a4b182721
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   158708 33788677e02d342ae3c4d3a1b3140e1a
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsdbm-ruby1.6_1.6.8-12sarge3_m68k.deb
    Size/MD5 checksum:   145964 c1e8c28f26f3c65fd1c4036e6b9c3525

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   627008 55d06bac9ec2e052a641590942dbc01c
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtk-ruby1.6_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   178404 cff58d0cd08592f023a9a3a46b8850c3
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtcltk-ruby1.6_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   163634 e52709367bf26bf5a754c66fa75f41bd
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-dev_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   604580 8b86731b20ad26952795fb7f577af6e9
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsyslog-ruby1.6_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   143972 edb950ad26a49f71ebbb3047b58609b5
  http://security.debian.org/pool/updates/main/r/ruby1.6/libgdbm-ruby1.6_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   144626 54f10f654113dd6535a08af04df3644e
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6-dbg_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   676274 b865d0a95e7f3c2bfc2b6283023d364b
  http://security.debian.org/pool/updates/main/r/ruby1.6/libpty-ruby1.6_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   147788 6716ba9b9ca8ce84d9af6647db281af8
  http://security.debian.org/pool/updates/main/r/ruby1.6/libdbm-ruby1.6_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   143444 bbabd4f42b9f5cc4aa743cb698346b00
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   159526 36359e57131dd8111f915c776460149b
  http://security.debian.org/pool/updates/main/r/ruby1.6/libreadline-ruby1.6_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   143678 3d6364965eaa22f46407b3a7096a7303
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsdbm-ruby1.6_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   146986 40f6fd607016cda785db80314ab44c35
  http://security.debian.org/pool/updates/main/r/ruby1.6/libcurses-ruby1.6_1.6.8-12sarge3_mips.deb
    Size/MD5 checksum:   144534 d4fcbebac17e3878f029551bc61c3b63

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/r/ruby1.6/libtk-ruby1.6_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   178392 3bf8e03d54230967565dd52f4fea2dc5
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6-dbg_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   670178 2672a61e8f68e7dfb9ffe7f4675b7cb5
  http://security.debian.org/pool/updates/main/r/ruby1.6/libgdbm-ruby1.6_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   144626 5cab76b8e2c9e2103d1dd699dddcae18
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtcltk-ruby1.6_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   163580 728f4b15d19c60674c97ad968f60f57e
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsyslog-ruby1.6_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   143960 b06ebde77d38fda38ded6cdc85508446
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   159510 34b3a4b70d81b1ad2b1c51c4b4719150
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsdbm-ruby1.6_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   147012 30ffe2fc9f2f441e52edadb7c870da10
  http://security.debian.org/pool/updates/main/r/ruby1.6/libdbm-ruby1.6_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   143430 ad06db9e159a552da7e1e6f89d7ca081
  http://security.debian.org/pool/updates/main/r/ruby1.6/libpty-ruby1.6_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   147732 258921162310f68b575559817866e4e6
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-dev_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   597896 b27575ab5272948e41d04e99c8743d1f
  http://security.debian.org/pool/updates/main/r/ruby1.6/libreadline-ruby1.6_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   143624 068d996407dfbffd5ae763f785bb5533
  http://security.debian.org/pool/updates/main/r/ruby1.6/libcurses-ruby1.6_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   144508 37fa4958cba56f6fb8efc26d79f813c5
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6_1.6.8-12sarge3_mipsel.deb
    Size/MD5 checksum:   627276 b9ed0467e0a2a3bcf2f08976a3e08dc8

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   160680 0812f75398011b695c3f665e1d595255
  http://security.debian.org/pool/updates/main/r/ruby1.6/libreadline-ruby1.6_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   145552 515be2c3ef243559c9f899661e7f9877
  http://security.debian.org/pool/updates/main/r/ruby1.6/libpty-ruby1.6_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   149568 55de6597739cd55e3b9c95592e862ede
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6-dbg_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   858346 094504fe267353c886c4dd39033ab5f5
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsyslog-ruby1.6_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   146140 594c544e537b4665e8c5d67715cf21ca
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   651384 b6a9bd13bbb16f94e5fad210673ce632
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtcltk-ruby1.6_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   165740 d35928983927d21ac99ab94f7a6d0729
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsdbm-ruby1.6_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   148922 5aafb2f4a5f31f644505ecc56ee802b8
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtk-ruby1.6_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   180330 f019e480a851a18c363e089e826600cd
  http://security.debian.org/pool/updates/main/r/ruby1.6/libgdbm-ruby1.6_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   146918 7dad85b5d0f3be26e1f957dce9749849
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-dev_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   555054 b49e866b4620847957e2e0a2dfa8ec7b
  http://security.debian.org/pool/updates/main/r/ruby1.6/libcurses-ruby1.6_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   146374 2390408d9f6fa502a17a4a2940e6cb10
  http://security.debian.org/pool/updates/main/r/ruby1.6/libdbm-ruby1.6_1.6.8-12sarge3_powerpc.deb
    Size/MD5 checksum:   145894 8db11656628d5aeaacc4a8d6aae6bade

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/r/ruby1.6/libtk-ruby1.6_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   178592 5dfbc53bf43a1d3b7fe156fb77aef9b1
  http://security.debian.org/pool/updates/main/r/ruby1.6/libgdbm-ruby1.6_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   146178 aaa66a6e73a2cd0a1febec7c401661a3
  http://security.debian.org/pool/updates/main/r/ruby1.6/libreadline-ruby1.6_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   144738 a601fc1b9e7a6a11326acb8a94d7e792
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   666320 76c056a8bc868d24ba13de0a6358ab91
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsyslog-ruby1.6_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   144748 6c2428bef96bac143c329987037a9678
  http://security.debian.org/pool/updates/main/r/ruby1.6/libdbm-ruby1.6_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   144766 89d97dfcb4e3646cf38d7f024bafa3dd
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsdbm-ruby1.6_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   148254 ad34b408344d58f4e8c2e30bdf706d68
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-dev_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   597000 21297ad50a979da1df0ebc5f353e8299
  http://security.debian.org/pool/updates/main/r/ruby1.6/libpty-ruby1.6_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   148520 3c56784f75ea9e20ce2b275fbcfae8b1
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtcltk-ruby1.6_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   165306 fd2b06b8355ec690513783ee62448e37
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6-dbg_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   795282 2211b0dda333ff7a861b717a9a37eca2
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   159026 06b570dc2bbe4d2fc58268dd59274f7f
  http://security.debian.org/pool/updates/main/r/ruby1.6/libcurses-ruby1.6_1.6.8-12sarge3_s390.deb
    Size/MD5 checksum:   145876 e3c3d1d9c2b3a35aef20ef1a0986bf89

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/r/ruby1.6/libdbm-ruby1.6_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   143654 6b309f76fe2ff7c5b187c5a2004e9c3f
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   632544 55b471abec72f2b422c7650d920770f7
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtcltk-ruby1.6_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   164386 f0efaab289dff936b8a56dd0329912be
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   158778 42acaabd98aa5af61bad0653076c8cee
  http://security.debian.org/pool/updates/main/r/ruby1.6/libcurses-ruby1.6_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   144622 af8c21e14e38fc383ee4095cda5465cc
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsyslog-ruby1.6_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   144468 3f2541a2fe8e3125d5997695006de29d
  http://security.debian.org/pool/updates/main/r/ruby1.6/libruby1.6-dbg_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   662688 d6f73972dcf03d841700326f6fe86561
  http://security.debian.org/pool/updates/main/r/ruby1.6/ruby1.6-dev_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   574262 8f6383d4dec3097c2ad37d3018848347
  http://security.debian.org/pool/updates/main/r/ruby1.6/libtk-ruby1.6_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   178380 418713d2b2aec8144d4457e22a465a7a
  http://security.debian.org/pool/updates/main/r/ruby1.6/libgdbm-ruby1.6_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   144856 c18f17360cb67e531c965cf6bbbc8d56
  http://security.debian.org/pool/updates/main/r/ruby1.6/libreadline-ruby1.6_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   143708 09a2b7cb67f15356c393153b5f99f791
  http://security.debian.org/pool/updates/main/r/ruby1.6/libpty-ruby1.6_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   147588 982f0365e109a376f9adc9816b4bc2a3
  http://security.debian.org/pool/updates/main/r/ruby1.6/libsdbm-ruby1.6_1.6.8-12sarge3_sparc.deb
    Size/MD5 checksum:   146426 7b3d03250dc47f317f4d3c31dbcbf851


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFFf+3jwM/Gs81MDZ0RAvH6AJ9ovjhIS/RtktqWaMAWAyGFuPay7wCg0g/R
i8HTUq3FG9qbC4pm0KKBCsw=
=dGsu
- -----END PGP SIGNATURE-----



2.


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1235-1                  security@xxxxxxxxxx
http://www.debian.org/security/                               Steve Kemp
December 13, 2006
- - ------------------------------------------------------------------------

Package        : ruby1.8
Vulnerability  : Denial of service
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2006-5467
Debian Bug     : 398457

A denial of service vulnerability has been discovered in the CGI library included with Ruby, the intepreted scripting langauge for
quick and easy object-orientated programming.

For the stable distribution (sarge), this problem has been fixed in version 1.8.2-7sarge5.

We recommend that you upgrade your ruby1.8 package.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update
        will update the internal database apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian 3.1 (stable)
- - -------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5.dsc
    Size/MD5 checksum:     1024 912f2bb9a68ba4c1dcad47ebded0946f
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2.orig.tar.gz
    Size/MD5 checksum:  3623780 4bc5254bec262d18cf1ceef03aae8bdf
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5.diff.gz
    Size/MD5 checksum:   537107 452d8fc55dd8b09fcce1fa843146316e

Architecture independent packages:

  http://security.debian.org/pool/updates/main/r/ruby1.8/rdoc1.8_1.8.2-7sarge5_all.deb
    Size/MD5 checksum:   234904 3c678d4f692f0a815f8e123ce1ec5cbc
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-elisp_1.8.2-7sarge5_all.deb
    Size/MD5 checksum:   142342 8aa7ade9e0b3af75caf49850d61188f8
  http://security.debian.org/pool/updates/main/r/ruby1.8/irb1.8_1.8.2-7sarge5_all.deb
    Size/MD5 checksum:   166572 9d149f07d1d580561c8fd139b2505806
  http://security.debian.org/pool/updates/main/r/ruby1.8/ri1.8_1.8.2-7sarge5_all.deb
    Size/MD5 checksum:   721046 ca07956a53ad6032c5770d36f6b83be6
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-examples_1.8.2-7sarge5_all.deb
    Size/MD5 checksum:   219032 4a2eec33f380b225db9c3b73d4925872

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge5_alpha.deb
    Size/MD5 checksum:   796230 c83c345488cb4d6073af0094e3343657
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge5_alpha.deb
    Size/MD5 checksum:   237746 b57a4a2a3d3029098e5ec51456dfbf96
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge5_alpha.deb
    Size/MD5 checksum:   133570 d59fed9aabc5fd7bd85e52a5994885ee
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge5_alpha.deb
    Size/MD5 checksum:  1468624 30354f8ce99453f748a2b73c0ecbe35d
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge5_alpha.deb
    Size/MD5 checksum:   137664 598deb2773a96cc9a3d6c6aa50d41970
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge5_alpha.deb
    Size/MD5 checksum:  1450302 90a592d6acc3c433e3055b7d48d72619
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5_alpha.deb
    Size/MD5 checksum:   152112 30df21197d9c6f4f79173d4010bececa
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge5_alpha.deb
    Size/MD5 checksum:   136106 7bfe56ddd935299f5725d391c7d87c29
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge5_alpha.deb
    Size/MD5 checksum:   827214 cea044e68e0b5c823d99a675c2382e0a

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge5_amd64.deb
    Size/MD5 checksum:   234196 3c6eeabc8701ba4362f4688b2806e08d
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge5_amd64.deb
    Size/MD5 checksum:  1392588 c04ec457b39ebeca3a657b89be94be10
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5_amd64.deb
    Size/MD5 checksum:   151770 d04f1108db6e218b5ec17f1f63433aa3
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge5_amd64.deb
    Size/MD5 checksum:   780908 efe048b111da22bc9fa7d0272e9f0e73
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge5_amd64.deb
    Size/MD5 checksum:   132778 de3de7b9de8500725f6801528003bdcd
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge5_amd64.deb
    Size/MD5 checksum:  1446914 e9d5e1518d9d5f4104c388d8a76ea54b
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge5_amd64.deb
    Size/MD5 checksum:   649342 ecdf8db978bbfbd1ff76deb70f7c99f8
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge5_amd64.deb
    Size/MD5 checksum:   135458 48edc1640fe2e46c76be6142cd0f653b
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge5_amd64.deb
    Size/MD5 checksum:   136936 99428965f5fa05692ccb1cd4d0cfb93b

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge5_arm.deb
    Size/MD5 checksum:   660602 0e3ba8cb5f5e6aed2e82183d6adf438e
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge5_arm.deb
    Size/MD5 checksum:   743978 34addffb617940e82a921f7b3fbd4971
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge5_arm.deb
    Size/MD5 checksum:   222524 95aaaff374f1eca459909e41d73281f3
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge5_arm.deb
    Size/MD5 checksum:   135618 3299078b49a0d18e8c1ba1df6053374c
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge5_arm.deb
    Size/MD5 checksum:   131882 d624363743612f51583dc365aece3a6c
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge5_arm.deb
    Size/MD5 checksum:  1348448 30160581763c0ca181a27051972f49b7
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge5_arm.deb
    Size/MD5 checksum:   134512 cc792f596cda0a76187ad0d87f9a78dd
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge5_arm.deb
    Size/MD5 checksum:  1441176 fff2f3b698f470e59ae7d1fc38213bee
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5_arm.deb
    Size/MD5 checksum:   151616 d44dda05ff32853bacf61558a75d329e

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge5_hppa.deb
    Size/MD5 checksum:  1453746 324d6165b61f85361d235c84232f9c57
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge5_hppa.deb
    Size/MD5 checksum:   840092 cefc1185f43039b7bb312b8d9eaf446d
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge5_hppa.deb
    Size/MD5 checksum:   138316 e6cdba374c69f955382b507829246d0b
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge5_hppa.deb
    Size/MD5 checksum:   736170 c363eb08f4cb707fb38b84d384aaed21
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge5_hppa.deb
    Size/MD5 checksum:   133848 1f547a7149e324c2be82b9ea7721e747
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge5_hppa.deb
    Size/MD5 checksum:   136670 cf7e020365d2c1e0f47a07d4ef2afcaf
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge5_hppa.deb
    Size/MD5 checksum:  1501190 a554170ecc2e0a5c8c20e1244e08b42b
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge5_hppa.deb
    Size/MD5 checksum:   246992 9b222eff056b6cfef4be08be31b14a24
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5_hppa.deb
    Size/MD5 checksum:   152186 c6c89f82e6a10eaab2d320ba7f3452a4

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge5_i386.deb
    Size/MD5 checksum:   134832 69fe160eaa7a61e977758ca8840f2f68
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge5_i386.deb
    Size/MD5 checksum:  1473438 d403bf6278df17c91cd29832e217d180
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge5_i386.deb
    Size/MD5 checksum:   132066 217be9ae92eac89f2c0e02382bc63927
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge5_i386.deb
    Size/MD5 checksum:   622628 81d3722ed53eeacbc154338472e27b75
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge5_i386.deb
    Size/MD5 checksum:   758384 7511dc65739e94a64f517aad719e1bc3
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5_i386.deb
    Size/MD5 checksum:   151662 5feafa4bbbcc724ee26d79fe7ff30f3f
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge5_i386.deb
    Size/MD5 checksum:  1359432 1c9fc5e0c26b059be2f962d41bde1a4f
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge5_i386.deb
    Size/MD5 checksum:   136006 00832183a598d7f2bdaa18b711fafad8
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge5_i386.deb
    Size/MD5 checksum:   225248 b7817d365ceee9e6da596e7cb360477b

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5_ia64.deb
    Size/MD5 checksum:   152520 32884dc2d4d81a84bff3bd13cb734d2b
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge5_ia64.deb
    Size/MD5 checksum:   998786 f538ed28e4a5a1e8b94aa240b72b44e1
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge5_ia64.deb
    Size/MD5 checksum:   867704 7aedeff3ca8fd793867c87bde17a0a76
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge5_ia64.deb
    Size/MD5 checksum:   265788 abfcef422b02e874dccefaad35c1f519
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge5_ia64.deb
    Size/MD5 checksum:   135912 0d6604955f68bf6e4b3712a5634dcb4a
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge5_ia64.deb
    Size/MD5 checksum:  1463086 2213dd9375aa10fb8e049a517a6a86df
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge5_ia64.deb
    Size/MD5 checksum:  1704178 923e50fedde26c1d4f7cd3dd98cfcdee
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge5_ia64.deb
    Size/MD5 checksum:   140554 e19468af83ef08fcf1d9201b2785112e
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge5_ia64.deb
    Size/MD5 checksum:   138710 e76a6815cc508d16509c73cb95dcbc84

m68k architecture (Motorola Mc680x0)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge5_m68k.deb
    Size/MD5 checksum:   230926 3dfb38f37e0d6aec8f084f528d31f63f
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge5_m68k.deb
    Size/MD5 checksum:   135930 ff3e15385d509399921ce4d5005742fd
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge5_m68k.deb
    Size/MD5 checksum:   730266 d9bf2e21bfadfd427310371fd51b5115
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge5_m68k.deb
    Size/MD5 checksum:   553324 16c3f3374ae776484fded03f8db92965
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge5_m68k.deb
    Size/MD5 checksum:  1333048 68a6602dde0f45986ed8a54675b7717c
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge5_m68k.deb
    Size/MD5 checksum:   132220 b6bceda24dbdfd364734c43745556c99
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge5_m68k.deb
    Size/MD5 checksum:   134532 3245f121451f94fa4d921f25bd75e16d
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge5_m68k.deb
    Size/MD5 checksum:  1439658 23889e93e548b1d45c90a8b7e64a73b3
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5_m68k.deb
    Size/MD5 checksum:   151552 27d9d1d7216184b5cc91f363463e3bfe

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge5_mips.deb
    Size/MD5 checksum:   215622 402d070be4eda4e233f7e1d3f0c3c392
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5_mips.deb
    Size/MD5 checksum:   152320 9c03debe81a9cde0d337668e45d8e132
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge5_mips.deb
    Size/MD5 checksum:   684456 05543ea183c6bebcd879fd060f8c2716
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge5_mips.deb
    Size/MD5 checksum:   763988 b4ad8c337b7a250fb0e41e9b67d19c81
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge5_mips.deb
    Size/MD5 checksum:   131774 2c0c8c5958cff11815b7d8b7541c01c6
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge5_mips.deb
    Size/MD5 checksum:   134312 79d335494bfdd25c747ea37cb878f643
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge5_mips.deb
    Size/MD5 checksum:   135682 09f2a8bbedd8fc5b3db44cad299e1e9b
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge5_mips.deb
    Size/MD5 checksum:  1436104 08da269ec8259ead00b1c6fa4946fe5d
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge5_mips.deb
    Size/MD5 checksum:  1356252 4edbd816da55af2ed1b442cee599b38e

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge5_mipsel.deb
    Size/MD5 checksum:  1436276 4c612c84dc2582aa309639f59905c0fa
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge5_mipsel.deb
    Size/MD5 checksum:   135708 2f21d089db63a23c7cd19a9afad3b2ae
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge5_mipsel.deb
    Size/MD5 checksum:   134338 9ca8f44c8bfef60b7e143773b033f131
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5_mipsel.deb
    Size/MD5 checksum:   152314 14914c49f3f053273a6bb0110355a104
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge5_mipsel.deb
    Size/MD5 checksum:  1357612 f5f95bc1374529043a55f2bcd09ab021
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge5_mipsel.deb
    Size/MD5 checksum:   214848 51bf577ec7cded96309dd115643c6dbe
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge5_mipsel.deb
    Size/MD5 checksum:   678152 ff55955ee9df9264c9093563b160c4d9
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge5_mipsel.deb
    Size/MD5 checksum:   756850 3cc935447b76a50319e8789536a9da16
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge5_mipsel.deb
    Size/MD5 checksum:   131738 04c13c8568b54c366b89a32979eafe9f

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5_powerpc.deb
    Size/MD5 checksum:   153474 ed53f886f5d7885ee090cf1e4d21124c
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge5_powerpc.deb
    Size/MD5 checksum:   970434 79062de7e5ff12a997b6b7b8a3538000
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge5_powerpc.deb
    Size/MD5 checksum:  1406404 d9095111417711d8e0349bc9c6350359
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge5_powerpc.deb
    Size/MD5 checksum:   138038 b8476508d3043c5cbadeb65fd714d18b
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge5_powerpc.deb
    Size/MD5 checksum:  1444486 140c09dc87544d5ad17928cfe636ce9c
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge5_powerpc.deb
    Size/MD5 checksum:   136900 0dc3553d639fccf0a046e2194c9798e3
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge5_powerpc.deb
    Size/MD5 checksum:   133950 1383efe626c84680889bd9ed10e34646
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge5_powerpc.deb
    Size/MD5 checksum:   225206 0f671c8aa9ac26d37dba279879a577fe
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge5_powerpc.deb
    Size/MD5 checksum:   621408 99e37bf125e6752deaa5e43073face38

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge5_s390.deb
    Size/MD5 checksum:   674956 77eb588bcc256b8c8deac0888c943aa6
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge5_s390.deb
    Size/MD5 checksum:   240012 41424b52d67ce57ec9ba7c766fefff3d
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge5_s390.deb
    Size/MD5 checksum:   137292 076f97dc2adeaf7bd50ae05d69b7ccc8
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge5_s390.deb
    Size/MD5 checksum:  1431026 9fe325e746e648e44ea8dd5281b00b63
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge5_s390.deb
    Size/MD5 checksum:  1447344 73803fc844bf00e8e10de5c623384271
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5_s390.deb
    Size/MD5 checksum:   151842 0f315ef8f7fe6760821041eb703571a5
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge5_s390.deb
    Size/MD5 checksum:   907324 733552cb6eeeef66aee92df2e0313cbd
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge5_s390.deb
    Size/MD5 checksum:   133274 d2124662357a9ab65e80a39df176617b
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge5_s390.deb
    Size/MD5 checksum:   135946 2d1bc2dd26c33d13976c03bab726cb90

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge5_sparc.deb
    Size/MD5 checksum:   134790 ad648350a34f40e1707cb9900d921a02
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge5_sparc.deb
    Size/MD5 checksum:   135994 bbdfc1b02895ba5840e1dfcb24e86455
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge5_sparc.deb
    Size/MD5 checksum:   229210 674972fbdae85fb9e27e96f17b152729
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge5_sparc.deb
    Size/MD5 checksum:   748414 cb6fa250ab3a8de01795e1c18d722ce9
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge5_sparc.deb
    Size/MD5 checksum:  1373300 a67833937bdc3c8582ad814c81062a5b
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge5_sparc.deb
    Size/MD5 checksum:  1442124 233233f5f41d10c4f4569ba56bb972a5
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge5_sparc.deb
    Size/MD5 checksum:   132142 f073ab78d23ddf91d2a1aac3df82fd36
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge5_sparc.deb
    Size/MD5 checksum:   646830 2486a6445c65bd4ea472b191a2632dfd
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge5_sparc.deb
    Size/MD5 checksum:   151616 5dcfbbe976ad2cc05a8f4e7ff0764b16


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFFf+94wM/Gs81MDZ0RAtAeAJ4o7GmZZlYU0R6+kqYuDIfxwcKldACgwBof
ohCUcoguTcsDeEVDch0aLe8=
=wCeS
- -----END PGP SIGNATURE-----



3.


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1236-1                  security@xxxxxxxxxx
http://www.debian.org/security/                               Steve Kemp
December 13, 2006
- - ------------------------------------------------------------------------

Package        : enemies-of-carlotta
Vulnerability  : missing sanity checks
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2006-5875

Antti-Juhani Kaijanaho discovered that enemies-of-carlotta, a simple manager for mailing lists, does not properly sanitise email
addresses before passing them through to the system shell.

For the stable distribution (sarge), this problem has been fixed in version
1.0.3-1sarge1

We recommend that you upgrade your enemies-of-carlotta package.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update
        will update the internal database apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian 3.1 (stable)
- - -------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/e/enemies-of-carlotta/enemies-of-carlotta_1.0.3.orig.tar.gz
    Size/MD5 checksum:    50970 c128776396562ef1c678e438422d11fb
  http://security.debian.org/pool/updates/main/e/enemies-of-carlotta/enemies-of-carlotta_1.0.3-1sarge1.dsc
    Size/MD5 checksum:      615 15c19c6a0ba8b3350f7ada9074713d12
  http://security.debian.org/pool/updates/main/e/enemies-of-carlotta/enemies-of-carlotta_1.0.3-1sarge1.diff.gz
    Size/MD5 checksum:     3587 c5e36788f3e1375c1f97533f1692de4a

Architecture independent packages:

  http://security.debian.org/pool/updates/main/e/enemies-of-carlotta/enemies-of-carlotta_1.0.3-1sarge1_all.deb
    Size/MD5 checksum:    42722 d78136bff713315256626eec51521c83


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFFf/GVwM/Gs81MDZ0RAn4jAKCix0rudNOKLzx7KVBq8xxtU0wryACfS2PN
HRjdDPz/0i1ssaEXt00F+Ag=
=rmMW
- -----END PGP SIGNATURE-----



______________________________________________________________________________

NISCC values your feedback.

1. Which of the following most reflects the value of the briefing to you?
(Place an 'X' next to your choice)

Very useful:__ Useful:__ Not useful:__ 

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our briefings?


Thank you for your contribution.
______________________________________________________________________________

For additional information or assistance, please contact our help desk
by telephone.  You may send Not Protectively Marked information via
e-mail to uniras@xxxxxxxxxxxxx

Office hours:

Mon - Fri: 08:30 - 17:00 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

______________________________________________________________________________

UNIRAS wishes to acknowledge the contributions of ****** for the
information contained in this briefing.
______________________________________________________________________________

This notice contains information released by the original author.
Some of the information may have changed since it was released. If the
vulnerability affects you, it may be prudent to retrieve the advisory
from the site of the original source to ensure that you receive the most
current information concerning that problem.

Reference to any specific commercial product, process, or service by
trade name, trademark manufacturer, or otherwise, does not constitute or
imply its endorsement, recommendation, or favouring by UNIRAS or NISCC.
The views and opinions of authors expressed within this notice shall not
be used for advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall not be liable for any loss or damage whatsoever, arising from or
in connection with the usage of information contained within this
notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST) and has contacts with other international Incident Response
Teams (IRTs) in order to foster cooperation and coordination in incident
prevention, to prompt rapid reaction to incidents, and to promote
information sharing amongst its members and the community at large.
______________________________________________________________________________

<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRYFjHWl7oeQsXfKvEQKYxACfT8CSJNXEbnS9T3Tf3/NTFWoNGkIAoJd/
x71pRHOp857RLlU8dgKwinNx
=81lk
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________