TITLE: Ubuntu update for kdelibs4c2 SECUNIA ADVISORY ID: SA18552 VERIFY ADVISORY: http://secunia.com/advisories/18552/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Ubuntu Linux 5.10 http://secunia.com/product/6606/ Ubuntu Linux 5.04 http://secunia.com/product/5036/ DESCRIPTION: Ubuntu has issued an update for kdelibs4c2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. For more information: SA18500 SOLUTION: Apply updated packages. -- Ubuntu 5.04 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0-0ubuntu3.5.diff.gz Size/MD5: 358726 808a563f44d810c4f7b793e188b7ed6c http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0-0ubuntu3.5.dsc Size/MD5: 1334 2a4b47a2139ea105fb14a3299da6b9d4 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0.orig.tar.gz Size/MD5: 20024253 471740de13cfed37d35eb180fc1b9b38 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.4.0-0ubuntu3.5_all.deb Size/MD5: 8013188 fe749972bb655f417e44b59256d7a16c http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.4.0-0ubuntu3.5_all.deb Size/MD5: 12073474 1e298ff6fc736ac362c10a8ca14ec857 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0-0ubuntu3.5_all.deb Size/MD5: 20374 79edb84d4b48be8299261ea433cd2f61 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.0-0ubuntu3.5_amd64.deb Size/MD5: 921910 ff4f8c8db8bf65131a9d1e8d824d0ba8 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.0-0ubuntu3.5_amd64.deb Size/MD5: 1303726 1ded0008a54ca638f7c0234958daf2e4 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4_3.4.0-0ubuntu3.5_amd64.deb Size/MD5: 8970084 94be0eb2e105a1eeaf206a207b788654 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.0-0ubuntu3.5_i386.deb Size/MD5: 839716 b19557a1335907b7ad7a13f32df810da http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.0-0ubuntu3.5_i386.deb Size/MD5: 1301176 83f4f74ea0b044f7d6153441c44808b1 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4_3.4.0-0ubuntu3.5_i386.deb Size/MD5: 8397124 4118bddcce98d59780790dd204efab13 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.0-0ubuntu3.5_powerpc.deb Size/MD5: 904676 945db8977ce062b2b559da6e257e4b87 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.0-0ubuntu3.5_powerpc.deb Size/MD5: 1304384 0e1c73bf68e80d82b351487d35e0b2f6 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4_3.4.0-0ubuntu3.5_powerpc.deb Size/MD5: 8368178 7b14cea3492d1b02dfe1f9a4a8dc9f9c -- Ubuntu 5.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.diff.gz Size/MD5: 328665 fe25d7b8b440125acd84c7b9f9f00a75 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.dsc Size/MD5: 1519 95b4baf3ef13cff5831edcd1ec26f186 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3.orig.tar.gz Size/MD5: 19981388 36e7a8320bd95760b41c4849da170100 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.4.3-0ubuntu2_all.deb Size/MD5: 6969390 ba193a72a412f8b8c0563ef7ba77b3b8 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.4.3-0ubuntu2_all.deb Size/MD5: 29299636 1ef2baa2ac91f076e3c835c97610181a http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2_all.deb Size/MD5: 30392 8d9127d1ea31b100a5882e3b56bd782d amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2_amd64.deb Size/MD5: 926190 7e959b279bda1180ecdb7852e6f37c44 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2_amd64.deb Size/MD5: 1308666 215fb9c612cd18a3fb748194946d679e http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2_amd64.deb Size/MD5: 22552540 117b4e782b9a68626f41b4541a780bcc http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2_amd64.deb Size/MD5: 9108608 824f71370370ab292ca36431b04a24f6 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2_i386.deb Size/MD5: 814432 bb3178965364a171d88a8e6490f92d4a http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2_i386.deb Size/MD5: 1305420 819bb5a548b81c8cb48227397e695deb http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2_i386.deb Size/MD5: 19409922 8d642c103ac367e1e5149b5e8496143b http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2_i386.deb Size/MD5: 8071700 596ef9ab7e8bb070a7e0fd1e371b1d8b powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2_powerpc.deb Size/MD5: 909782 bee7d2e456d1336cceef9410c4df6670 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2_powerpc.deb Size/MD5: 1310098 bf55f3409dca77bfd570142db5bd72ac http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2_powerpc.deb Size/MD5: 22763804 14dc658075acaffcf41dc580b96b81f4 http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2_powerpc.deb Size/MD5: 8433774 664cc2e6e04af82c8d2a9307db0f4cc6 ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-245-1 OTHER REFERENCES: SA18500: http://secunia.com/advisories/18500/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------