Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


Top White Papers

More on LinuxToday


Debian GNU/Linux Advisories: synaesthesia, pwlib, mailman, hsftp, lbreakout2

Feb 23, 2004, 19:44 (0 Talkback[s])

Debian Security Advisory DSA 446-1 security@debian.org
http://www.debian.org/security/ Matt Zimmerman
February 21st, 2004 http://www.debian.org/security/faq


Package : synaesthesia
Vulnerability : insecure file creation
Problem-Type : local
Debian-specific: no
CVE Ids : CAN-2004-0160

During an audit, Ulf Harnhammar discovered a vulnerability in synaesthesia, a program which represents sounds visually. synaesthesia created its configuration file while holding root privileges, allowing a local user to create files owned by root and writable by the user's primary group. This type of vulnerability can usually be easily exploited to execute arbitary code with root privileges by various means.

For the current stable distribution (woody) this problem has been fixed in version 2.1-2.1woody1.

The unstable distribution (sid) is not affected by this problem, because synaesthesia is no longer setuid.

We recommend that you update your synaesthesia package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1-2.1woody1.dsc
Size/MD5 checksum: 635 ca8bc25afbb982dd10c40e5923c2e3c3
http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1-2.1woody1.diff.gz
Size/MD5 checksum: 3443 f62b934ffb45a01c0c54fa02c76ea68b
http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1.orig.tar.gz
Size/MD5 checksum: 129209 5bc166deb369a3c71efd61e1ad5e5475

Alpha architecture:

http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1-2.1woody1_alpha.deb
Size/MD5 checksum: 77836 7526ae1261ebb7c9ce6113e5e5ff0e00

ARM architecture:

http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1-2.1woody1_arm.deb
Size/MD5 checksum: 78138 e4a4770c9cb604e1f53b7f273acef38c

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1-2.1woody1_i386.deb
Size/MD5 checksum: 70656 e56242f5bd2639ae8ab6eed5c0f9a4f1

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1-2.1woody1_ia64.deb
Size/MD5 checksum: 85918 63f85dde186643f4ade2d28a8e0a9b1c

HP Precision architecture:

http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1-2.1woody1_hppa.deb
Size/MD5 checksum: 77528 529d8f398a586c2da550d1f6516c3dd9

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1-2.1woody1_m68k.deb
Size/MD5 checksum: 67276 fd6dfc3edc2006c9ec5a6b7c178edbc0

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1-2.1woody1_mips.deb
Size/MD5 checksum: 75688 7ec5526fa01d8fd8d89e30132528e796

PowerPC architecture:

http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1-2.1woody1_powerpc.deb
Size/MD5 checksum: 72086 8450c5664bc45e3ba415a4ae7dbfe04a

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1-2.1woody1_s390.deb
Size/MD5 checksum: 70246 04d89911bd4a830d10f09f67ff5215e2

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/s/synaesthesia/synaesthesia_2.1-2.1woody1_sparc.deb
Size/MD5 checksum: 72078 a14d6100f23836795db0f3440e8f3c64

These files will probably be moved into the stable distribution on its next revision.



Debian Security Advisory DSA 448-1 security@debian.org
http://www.debian.org/security/ Matt Zimmerman
February 22nd, 2004 http://www.debian.org/security/faq


Package : pwlib
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE Id : CAN-2004-0097
Debian bug : 233888

Multiple vulnerabilities were discovered in pwlib, a library used to aid in writing portable applications, whereby a remote attacker could cause a denial of service or potentially execute arbitrary code. This library is most notably used in several applications implementing the H.323 teleconferencing protocol, including the OpenH323 suite, gnomemeeting and asterisk.

For the current stable distribution (woody) this problem has been fixed in version 1.2.5-5woody1.

For the unstable distribution (sid), this problem will be fixed soon. Refer to Debian bug #233888 for details.

We recommend that you update your pwlib package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/p/pwlib/pwlib_1.2.5-5woody1.dsc
Size/MD5 checksum: 639 2e057d4bb38abbdfebe95ca2962a2733
http://security.debian.org/pool/updates/main/p/pwlib/pwlib_1.2.5-5woody1.diff.gz
Size/MD5 checksum: 34683 4f5b334e860eea238244d82d8084f6bb
http://security.debian.org/pool/updates/main/p/pwlib/pwlib_1.2.5.orig.tar.gz
Size/MD5 checksum: 749440 b320577dd1cff37cceea57c45de9de85

Alpha architecture:

http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_alpha.deb
Size/MD5 checksum: 130708 899913e27abbbaf9181e363fc5c00184
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_alpha.deb
Size/MD5 checksum: 868610 579711836aa1cf6310b445f4f769074d
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_alpha.deb
Size/MD5 checksum: 2270224 d51adae04e7caa1fb8c0c77c02ec366d
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_alpha.deb
Size/MD5 checksum: 1543738 9903ecfadacc28839ba71daebb2ce272

ARM architecture:

http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_arm.deb
Size/MD5 checksum: 133952 48cb63c89f21dad3e721bbc44d350824
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_arm.deb
Size/MD5 checksum: 861230 a1d5d4f66be1c134039139e1d4b686fd
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_arm.deb
Size/MD5 checksum: 1841968 a17d84ac845f1bd3ce70f6aab66026f6
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_arm.deb
Size/MD5 checksum: 1502856 d97cd24a9fca26db167d92ead0aa6077

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_i386.deb
Size/MD5 checksum: 112508 656f942f7909fb0d76f39973111d5839
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_i386.deb
Size/MD5 checksum: 788502 c389e02adcf493e704c2a5a1b129a883
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_i386.deb
Size/MD5 checksum: 1838780 aacb8d43274e1bed588659640d174a2d
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_i386.deb
Size/MD5 checksum: 1301568 c96d4b6b4004dd20dcf93f2b3081dcc3

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_ia64.deb
Size/MD5 checksum: 146510 f0f35a5d97c4e9c1bc4d71bc0c1f8d60
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_ia64.deb
Size/MD5 checksum: 996212 e1bf67b0d5e64ba7910bc602b871e330
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_ia64.deb
Size/MD5 checksum: 2466746 bf2a8caa6963954d1f7e95a978f76a5e
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_ia64.deb
Size/MD5 checksum: 1774658 7231677252682b0260e5c57469cb420f

HP Precision architecture:

http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_hppa.deb
Size/MD5 checksum: 149596 707e83b5967383808e7f353754864cbd
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_hppa.deb
Size/MD5 checksum: 991818 24b024ec88157f7d30bd853883b3aabd
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_hppa.deb
Size/MD5 checksum: 2847570 b60a52e989ec6fe77edff22547013d13
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_hppa.deb
Size/MD5 checksum: 1993572 dafc6b5a2adec05e389489c344b70a75

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_m68k.deb
Size/MD5 checksum: 104312 e70cd451ac98f4d01615e1ec5096c816
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_m68k.deb
Size/MD5 checksum: 858732 d513f7ca86a75a0b58cc2f120d47f05b
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_m68k.deb
Size/MD5 checksum: 1891398 db5ec25f3f813da5be85a504ceae83bb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_m68k.deb
Size/MD5 checksum: 1297004 b963c654b1cb7b66101b3cbe83c3494e

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_mips.deb
Size/MD5 checksum: 126130 86cb6659d891e1b9fecc915c1e06ea71
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_mips.deb
Size/MD5 checksum: 758362 72c65ab5fd677f9a0f546f895142fe54
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_mips.deb
Size/MD5 checksum: 1998404 15532db557ca3a7358330d30a3273cf1
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_mips.deb
Size/MD5 checksum: 1457282 248b40bcf4cb8a5a5c5b4074b457d001

PowerPC architecture:

http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_powerpc.deb
Size/MD5 checksum: 107404 eadf9a2ae2a8672669b7692c53cf1e9e
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_powerpc.deb
Size/MD5 checksum: 918814 3b180bd91862ae1f55f0d590359e6ffa
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_powerpc.deb
Size/MD5 checksum: 2269394 12646912e9fead507821e021806b4dc5
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_powerpc.deb
Size/MD5 checksum: 1659834 9077a25b959e5a7b4d804936ee7f69bb

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_s390.deb
Size/MD5 checksum: 97532 1b421333f3099dc46539dc4df4078ce7
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_s390.deb
Size/MD5 checksum: 832288 5f4ce30d3fc952317ca233dbd986ad3e
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_s390.deb
Size/MD5 checksum: 1930542 e738de76f0665c761f5ff309ed238fa2
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_s390.deb
Size/MD5 checksum: 1307926 08e82668880d288c18f472bf291a187c

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_sparc.deb
Size/MD5 checksum: 105478 19ef591ed5fbd335e3a1d6cf33e177f6
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_sparc.deb
Size/MD5 checksum: 781956 52cb039ef81f2ff5dd1e8b897063e304
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_sparc.deb
Size/MD5 checksum: 1906046 049defa3090dc3a97a73c6e6d194d603
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_sparc.deb
Size/MD5 checksum: 1367208 b10e687e83792b0897872431bee9e118

These files will probably be moved into the stable distribution on its next revision.



Debian Security Advisory DSA 436-2 security@debian.org
http://www.debian.org/security/ Matt Zimmerman
February 21st, 2004 http://www.debian.org/security/faq


Package : mailman
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE Ids : CAN-2003-0991 CAN-2003-0965 CAN-2003-0038

Several vulnerabilities have been fixed in the mailman package:

  • CAN-2003-0038 - potential cross-site scripting via certain CGI parameters (not known to be exploitable in this version)
  • CAN-2003-0965 - cross-site scripting in the administrative interface
  • CAN-2003-0991 - certain malformed email commands could cause the mailman process to crash

The cross-site scripting vulnerabilities could allow an attacker to perform administrative operations without authorization, by stealing a session cookie.

In the process of fixing these vulnerabilities for DSA 436-1, a bug was introduced which could cause mailman to crash on certain malformed messages.

For the current stable distribution (woody) this problem has been fixed in version 2.0.11-1woody8.

The update for the unstable distribution did not share the bug introduced in DSA 436-1.

We recommend that you update your mailman package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8.dsc
Size/MD5 checksum: 595 bef710bf0b5805d0946473c19ac42bbc
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8.diff.gz
Size/MD5 checksum: 31818 1f5fae277367b06965b2dc3d38fac895
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11.orig.tar.gz
Size/MD5 checksum: 415129 915264cb1ac8d7b78ea9eff3ba38ee04

Alpha architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_alpha.deb
Size/MD5 checksum: 461284 ea9daf95ebb6f6c15b64d93fc6a75dae

ARM architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_arm.deb
Size/MD5 checksum: 458966 89dc55b67c3f7b6156dfb93eeab2a209

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_i386.deb
Size/MD5 checksum: 458964 63db95b7687b1b8f6a222b49dde4e584

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_ia64.deb
Size/MD5 checksum: 461790 d651a19c06cba8ef5b12845df0cdf386

HP Precision architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_hppa.deb
Size/MD5 checksum: 459512 afddeae9eff5820d7de74ad6a6753d16

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_m68k.deb
Size/MD5 checksum: 459102 8266eaefb8e56631b3761e30e6bb3095

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_mips.deb
Size/MD5 checksum: 459502 9896dbddb5704e7ecf6de3524ab6d225

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody7_mipsel.deb
Size/MD5 checksum: 459336 a091672c96a16bfc42d807b4a2a99a11

PowerPC architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_powerpc.deb
Size/MD5 checksum: 459788 4ef14c3ee4845e039f1143e897f42c12

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_s390.deb
Size/MD5 checksum: 459790 b17c89f584242c502ff6b9ddac43814d

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_sparc.deb
Size/MD5 checksum: 464280 27935cf8280a793d24fe8ea188f77de4

These files will probably be moved into the stable distribution on its next revision.



Debian Security Advisory DSA 447-1 security@debian.org
http://www.debian.org/security/ Matt Zimmerman
February 22nd, 2004 http://www.debian.org/security/faq


Package : hsftp
Vulnerability : format string
Problem-Type : remote
Debian-specific: no
CVE Id : CAN-2004-0159

During an audit, Ulf Harnhammar discovered a format string vulnerability in hsftp. This vulnerability could be exploited by an attacker able to create files on a remote server with carefully crafted names, to which a user would connect using hsftp. When the user requests a directory listing, particular bytes in memory could be overwritten, potentially allowing arbitrary code to be executed with the privileges of the user invoking hsftp.

Note that while hsftp is installed setuid root, it only uses these privileges to acquire locked memory, and then relinquishes them.

For the current stable distribution (woody) this problem has been fixed in version 1.11-1woody1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you update your hsftp package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11-1woody1.dsc
Size/MD5 checksum: 595 9cefb21b2527ae0bf6cf813edd470320
http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11-1woody1.diff.gz
Size/MD5 checksum: 1850 9a62d6a8ca1b885e78b84d23978af15d
http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11.orig.tar.gz
Size/MD5 checksum: 50859 0b9d3eff1b9fcc2ab44a970c3535f777

Alpha architecture:

http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11-1woody1_alpha.deb
Size/MD5 checksum: 19582 a7ae51d2bc5102f8a92a8d5e640ab198

ARM architecture:

http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11-1woody1_arm.deb
Size/MD5 checksum: 17410 bf432d578eb24f94ae423a38a8380f7c

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11-1woody1_i386.deb
Size/MD5 checksum: 17106 b638f3ab3bd577a8c287a77b57933ea1

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11-1woody1_ia64.deb
Size/MD5 checksum: 22808 2673a0bd78ec8341da16998b51feefcf

HP Precision architecture:

http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11-1woody1_hppa.deb
Size/MD5 checksum: 18200 11c371b92821e461ac0179f3b7edfeb3

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11-1woody1_m68k.deb
Size/MD5 checksum: 16406 928c44582067a9b264f62d32408a9a46

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11-1woody1_mips.deb
Size/MD5 checksum: 17676 a6e150e08063dba73ff5a44f75f30a83

PowerPC architecture:

http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11-1woody1_powerpc.deb
Size/MD5 checksum: 17620 ca2e00d4af42d2b19f48a2b71455b167

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11-1woody1_s390.deb
Size/MD5 checksum: 17686 366193042afb69b518ef20c1ae08444d

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/h/hsftp/hsftp_1.11-1woody1_sparc.deb
Size/MD5 checksum: 17070 8788ef38808a6271c2a1ff2a1da6adff

These files will probably be moved into the stable distribution on its next revision.



Debian Security Advisory DSA 445-1 security@debian.org
http://www.debian.org/security/ Matt Zimmerman
February 21st, 2004 http://www.debian.org/security/faq


Package : lbreakout2
Vulnerability : buffer overflow
Problem-Type : local
Debian-specific: no
CVE Ids : CAN-2004-0158

During an audit, Ulf Harnhammar discovered a vulnerability in lbreakout2, a game, where proper bounds checking was not performed on environment variables. This bug could be exploited by a local attacker to gain the privileges of group "games".

For the current stable distribution (woody) this problem has been fixed in version 2.2.2-1woody1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you update your lbreakout2 package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1.dsc
Size/MD5 checksum: 638 c2e605263d4d0ca08218e667d1299efa
http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1.diff.gz
Size/MD5 checksum: 5688 692094c7a0705bfd5f5595a6ce750977
http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2.orig.tar.gz
Size/MD5 checksum: 1215427 d5f0ef9371d7165723aa35a3e325a3ba

Alpha architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_alpha.deb
Size/MD5 checksum: 1157816 7ef7a54e5b3803ca672b57731cb95f9a

ARM architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_arm.deb
Size/MD5 checksum: 1126502 28bb2c780e0907c9d7f9862f459002f8

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_i386.deb
Size/MD5 checksum: 1112732 80fb5d46320ff2b8fae374a61b8ae5ba

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_ia64.deb
Size/MD5 checksum: 1182786 a899fab79519604d591c4a330783db64

HP Precision architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_hppa.deb
Size/MD5 checksum: 1136182 fa206bfef247e4a2feb48234f160bf49

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_m68k.deb
Size/MD5 checksum: 1110628 9bf1761c57b1fe866e32837cbcf99e71

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_mips.deb
Size/MD5 checksum: 1142782 d9d2dd4237685a9eec94e7c310e172db

PowerPC architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_powerpc.deb
Size/MD5 checksum: 1129844 f7bd1188ba6485798eb22e195ee938dd

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_s390.deb
Size/MD5 checksum: 1121760 5c49bbbfd9f582151bf3cb8b8a2e213a

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_sparc.deb
Size/MD5 checksum: 1124704 95231dbcc444a3f2e65603029e1f5e2c

These files will probably be moved into the stable distribution on its next revision.


For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>