Date: 14 December 2009
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2009.1638
KDE vulnerabilitities identified
14 December 2009
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: KDE 4
Publisher: Ubuntu
Operating System: Ubuntu
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Reduced Security -- Remote/Unauthenticated
Resolution: Patch/Upgrade
Original Bulletin:
http://www.ubuntu.com/usn/usn-871-2
http://www.ubuntu.com/usn/usn-872-1
Comment: This advisory references vulnerabilities in products which run on
platforms other than Ubuntu. It is recommended that administrators
running KDE check for an updated version of the software for their
operating system.
This bulletin contains two (2) Ubuntu security advisories.
- --------------------------BEGIN INCLUDED TEXT--------------------
===========================================================
Ubuntu Security Notice USN-871-2 December 11, 2009
kde4libs vulnerabilities
https://launchpad.net/bugs/495301
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 8.10
Ubuntu 9.04
Ubuntu 9.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 8.10:
kdelibs5 4:4.1.4-0ubuntu1~intrepid1.5
Ubuntu 9.04:
kdelibs5 4:4.2.2-0ubuntu5.4
Ubuntu 9.10:
kdelibs5 4:4.3.2-0ubuntu7.2
After a standard system upgrade you need to restart your session to effect
the necessary changes.
Details follow:
USN-871-1 fixed vulnerabilities in KDE. This update provides the
corresponding updates for KDE 4.
This update also fixes a directory traversal flaw in KDE when processing
help:// URLs. This issue only affected Ubuntu 8.10.
Original advisory details:
It was discovered that the KDE libraries could use KHTML to process an
unknown MIME type. If a user or application linked against kdelibs were
tricked into opening a crafted file, an attacker could potentially trigger
XMLHTTPRequests to remote sites.
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.1.4-0ubuntu1~intrepid1.5.diff.gz
Size/MD5: 95977 d9bc80da0287e4a27cb968420d892d4b
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.1.4-0ubuntu1~intrepid1.5.dsc
Size/MD5: 2308 89059af41fd455cd8591eab8df0b8ce6
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.1.4.orig.tar.gz
Size/MD5: 11190299 18264580c1d6d978a3049a13fda36f29
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-data_4.1.4-0ubuntu1~intrepid1.5_all.deb
Size/MD5: 3110960 e0b7e12e3bebb6619a000970ea535e97
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-doc_4.1.4-0ubuntu1~intrepid1.5_all.deb
Size/MD5: 69202 2d65a7f3af2064f0071fe7f41235c6df
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.5_amd64.deb
Size/MD5: 395822 33edd1260233852ffc6c5d13de54d32c
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.5_amd64.deb
Size/MD5: 66056004 8bc845533fc9a3ab78b3dd17ea5c7a37
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.5_amd64.deb
Size/MD5: 1441140 ef9268b6681c6787d2dbb17924b58a79
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.5_amd64.deb
Size/MD5: 10103862 f388998bf382659d49a9677679d67dcc
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.5_i386.deb
Size/MD5: 371990 a1835282af9ddb9229117d34c1bef931
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.5_i386.deb
Size/MD5: 65218556 73c538baa8a8101fca781ccc66d124bf
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.5_i386.deb
Size/MD5: 1438690 6c5878c932b90f837183c7f496412f24
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.5_i386.deb
Size/MD5: 9523396 d3e663ccdcc52a1dd7dda5efbc64cda7
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.5_lpia.deb
Size/MD5: 376790 97518d066616d2fbf6b89cfe75e6d117
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.5_lpia.deb
Size/MD5: 65334088 1e2c5b4df8f5c91bbc4f92ebe7801375
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.5_lpia.deb
Size/MD5: 1441160 bf293d1061e06e79403863f55a33b9d4
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.5_lpia.deb
Size/MD5: 9535686 3a180768df11832e5cef0405c7ace583
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.5_powerpc.deb
Size/MD5: 423238 bd3e80909eda46558e4b276739973fc9
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.5_powerpc.deb
Size/MD5: 69280176 c9775805d6a90568449e5df0055c8d68
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.5_powerpc.deb
Size/MD5: 1446080 7f9a904fd5e138a90ebb24ec9762c0cf
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.5_powerpc.deb
Size/MD5: 10238640 2ca68c998ef5001b56599eeead4285bf
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.5_sparc.deb
Size/MD5: 381628 e4c66e47382390f9b18e7fc8a2d70fc2
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.5_sparc.deb
Size/MD5: 64525262 3e892b50f4eee4cb61eefda24e7a9612
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.5_sparc.deb
Size/MD5: 1438444 3b02a43b55ee9c18921cf4dd704ba8cd
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.5_sparc.deb
Size/MD5: 9653902 f9bd9be7d0c97c9fc492eb271d78a2b6
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.2.2-0ubuntu5.4.diff.gz
Size/MD5: 104020 32d0f05b8444a746a0edd41349c160c2
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.2.2-0ubuntu5.4.dsc
Size/MD5: 2305 ec9eb15c47913f5ec148ffddca904315
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.2.2.orig.tar.gz
Size/MD5: 12335659 83d6a0d59e79873bbe0a5a90ef23f27e
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-data_4.2.2-0ubuntu5.4_all.deb
Size/MD5: 1989926 dd442e1cf759169409634e0a55f7bbe8
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.4_amd64.deb
Size/MD5: 281654 85c7bf34df6d9129f5c295e05adae9a4
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.4_amd64.deb
Size/MD5: 44154854 ee9068a0c87001d9ec9d3d90ca2ca3da
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.4_amd64.deb
Size/MD5: 1091202 c1430eb8a84e68e5034c0d97f3ec51f4
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.4_amd64.deb
Size/MD5: 7071844 e1ca3960e074100bf58fd89654103ee5
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.4_amd64.deb
Size/MD5: 102524 2bbebb2f95726d931579aca0739a62c6
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.4_amd64.deb
Size/MD5: 610934 8b5c132c776faf2a029f34c4b30cd656
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.4_i386.deb
Size/MD5: 269104 c4612880c098d4647d13926496adefb9
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.4_i386.deb
Size/MD5: 43460726 c7f1491f2fcf451564a2312069dbde92
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.4_i386.deb
Size/MD5: 1090342 e56a2b8b8daeee653f55baa14be73284
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.4_i386.deb
Size/MD5: 6778280 07b3fa6ce24c085424d102eda7261969
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.4_i386.deb
Size/MD5: 127322 4ebcee74931d57bcb56b05fc270fde3d
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.4_i386.deb
Size/MD5: 567162 9f72ead2cee64f5a3de3917792ab4c0f
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.4_lpia.deb
Size/MD5: 275580 1d5da4de19d017fcfa79a4056c17ae01
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.4_lpia.deb
Size/MD5: 43587848 e94aed2b623e0463ef192e3ff19d6d44
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.4_lpia.deb
Size/MD5: 1092682 d040dc4b0718f148dfc93d81a6ef1454
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.4_lpia.deb
Size/MD5: 6850706 8f0adbd06a0847da5a2d15cfad4c257c
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.4_lpia.deb
Size/MD5: 102486 239d38e7ee3443c3fdfaff5db8ae2eb9
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.4_lpia.deb
Size/MD5: 600146 89db6cb42b9c9a2a43a214205173467c
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.4_powerpc.deb
Size/MD5: 269884 2d1ab31ad761746d55b508fdf9020b03
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.4_powerpc.deb
Size/MD5: 43126080 4e40874d089491ab0ad0a6f78dd6fd4d
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.4_powerpc.deb
Size/MD5: 1089852 50f1e895cf308de02e736bbf4ade19c1
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.4_powerpc.deb
Size/MD5: 6203800 ccee8ec8a8c1da20a3fc50870d454b61
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.4_powerpc.deb
Size/MD5: 102474 69bde557a52136bbc666fc39550030b5
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.4_powerpc.deb
Size/MD5: 555434 4253e3224b0eddab9fd85357b8771756
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.4_sparc.deb
Size/MD5: 250250 7eb83ed7165eb32e59cdd191046c39df
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.4_sparc.deb
Size/MD5: 40333438 5dc7af31143fceabcbf3d49929aed2e4
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.4_sparc.deb
Size/MD5: 1086248 3cd8c1c642149f35a6b04804664b5e1f
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.4_sparc.deb
Size/MD5: 5932388 5a59b3b9df837d93f5ae3ddd59870631
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.4_sparc.deb
Size/MD5: 102446 2d843ca6ed093eb1641e7e2f5f421ffe
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.4_sparc.deb
Size/MD5: 530794 b0b5583c144ed90a855ac9a0b6643f74
Updated packages for Ubuntu 9.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.3.2-0ubuntu7.2.diff.gz
Size/MD5: 160839 c594eccef7c8ceabff20a8b5bb8da6b0
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.3.2-0ubuntu7.2.dsc
Size/MD5: 2301 7e7ce51359cf82ec23188479bd81f34f
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.3.2.orig.tar.gz
Size/MD5: 12961029 076c304e8829229e1f1a5ef8eecda34d
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-data_4.3.2-0ubuntu7.2_all.deb
Size/MD5: 2501328 635e74cea648a785eaca9d5ac7b7a8bf
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.3.2-0ubuntu7.2_amd64.deb
Size/MD5: 236080 ee88e1d5afe4da918c8e362b263ca355
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.3.2-0ubuntu7.2_amd64.deb
Size/MD5: 47641692 4502ce2a9d687622a6fe0bfef406f1c6
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.3.2-0ubuntu7.2_amd64.deb
Size/MD5: 1162282 63050bae7403fb0ba6b7e34d686ecac7
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.3.2-0ubuntu7.2_amd64.deb
Size/MD5: 7276964 d901a84198c938147eb97e364c8a4e7c
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma3_4.3.2-0ubuntu7.2_amd64.deb
Size/MD5: 657864 1a124d132ca09637458657de0f61a68f
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.3.2-0ubuntu7.2_i386.deb
Size/MD5: 227420 bb3a9991d63988035414bdb8d2d195db
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.3.2-0ubuntu7.2_i386.deb
Size/MD5: 47142396 6950b2c99d61bfa71599020eb223aba7
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.3.2-0ubuntu7.2_i386.deb
Size/MD5: 1161550 829a35f9f7637176d9a4a74923d27cdb
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.3.2-0ubuntu7.2_i386.deb
Size/MD5: 7019572 3c4af34e1fc523ace73a2aa7a53048ef
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma3_4.3.2-0ubuntu7.2_i386.deb
Size/MD5: 608938 2b44f507a4ba29aa8d8de059d2674921
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.3.2-0ubuntu7.2_lpia.deb
Size/MD5: 234518 6edda7121cb4e64320eccfbf0ee37d79
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.3.2-0ubuntu7.2_lpia.deb
Size/MD5: 47232510 0fedbdd6ec510ac83e9fb6cc59f5293a
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.3.2-0ubuntu7.2_lpia.deb
Size/MD5: 1163720 66d8939b2a848dd113390438996d31c5
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.3.2-0ubuntu7.2_lpia.deb
Size/MD5: 7163048 0f84dc555132acf0d40f8310a7260c8c
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.3.2-0ubuntu7.2_lpia.deb
Size/MD5: 653692 bed649a879d2a387406f91284c27dc94
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.3.2-0ubuntu7.2_powerpc.deb
Size/MD5: 217718 2951df67e37de8dff2380eab9e946b0d
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.3.2-0ubuntu7.2_powerpc.deb
Size/MD5: 47000996 1eabf7a08da76c26a4981fdb2b039007
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.3.2-0ubuntu7.2_powerpc.deb
Size/MD5: 1158764 96a4bdf2699880369d39b8f12fefeb5c
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.3.2-0ubuntu7.2_powerpc.deb
Size/MD5: 6387572 fea74e2bbe2137a7bed4938649612bca
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.3.2-0ubuntu7.2_powerpc.deb
Size/MD5: 599074 193adda0adb27083c3643568bb560ea4
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.3.2-0ubuntu7.2_sparc.deb
Size/MD5: 217164 8a2cc000d2afa3daf4745cc9710c1391
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.3.2-0ubuntu7.2_sparc.deb
Size/MD5: 43663358 d58f044f914a89c78f5388e70fdc856c
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.3.2-0ubuntu7.2_sparc.deb
Size/MD5: 1157850 acaef9c86335bedc7133860129de2579
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.3.2-0ubuntu7.2_sparc.deb
Size/MD5: 6202126 4b1d5c0a92b9a2ab8368d4f649d80bb0
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.3.2-0ubuntu7.2_sparc.deb
Size/MD5: 572642 48ab7fa1e805f94334adcf212f86c6f6
===========================================================
Ubuntu Security Notice USN-872-1 December 11, 2009
kdebase-runtime vulnerabilities
https://launchpad.net/bugs/495301
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 8.10
Ubuntu 9.04
Ubuntu 9.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 8.10:
kdebase-runtime 4:4.1.4-0ubuntu1~intrepid1.2
Ubuntu 9.04:
kdebase-runtime 4:4.2.2-0ubuntu1.1
Ubuntu 9.10:
kdebase-runtime 4:4.3.2-0ubuntu4.1
After a standard system upgrade you need to restart your session to effect
the necessary changes.
Details follow:
It was discovered that the KIO subsystem of KDE did not properly perform
input validation when processing help:// URIs. If a user or KIO application
processed a crafted help:// URI, an attacker could trigger JavaScript
execution or access files via directory traversal.
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.1.4-0ubuntu1~intrepid1.2.diff.gz
Size/MD5: 36571 c37c88ec1cbeb1f4be4fb11d4cf69e12
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.1.4-0ubuntu1~intrepid1.2.dsc
Size/MD5: 2134 199cf0744b1d6b6c557be41f1ffe8a79
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.1.4.orig.tar.gz
Size/MD5: 55390394 448e488058f9a5c9304c1aca9dea1195
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kde-icons-oxygen_4.1.4-0ubuntu1~intrepid1.2_all.deb
Size/MD5: 13847918 82a952384c9d8219c3c4849cda32b122
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-data-common_4.1.4-0ubuntu1~intrepid1.2_all.deb
Size/MD5: 349078 b8d003a5ec5b6c2c2ccc15f160d843bd
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-data_4.1.4-0ubuntu1~intrepid1.2_all.deb
Size/MD5: 3093066 ce0070ce6f875497d9c89d22f5b69682
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.1.4-0ubuntu1~intrepid1.2_amd64.deb
Size/MD5: 70162 ebeb319d74ad0252bbf12462c13de95f
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.1.4-0ubuntu1~intrepid1.2_amd64.deb
Size/MD5: 11920218 33ff88e2a7c2803c88ded6600631edfc
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.1.4-0ubuntu1~intrepid1.2_amd64.deb
Size/MD5: 1688916 ac321645399d1202cdfaae464748fc89
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/khelpcenter4_4.1.4-0ubuntu1~intrepid1.2_amd64.deb
Size/MD5: 1875854 3b5792d1d65fffd5f09328a196fde58f
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/phonon-backend-xine_4.1.4-0ubuntu1~intrepid1.2_amd64.deb
Size/MD5: 172540 1742ffe7ffcdce4527722cd6ce8391ac
http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase-runtime/khelpcenter_4.1.4-0ubuntu1~intrepid1.2_amd64.deb
Size/MD5: 15910 c890a2e850b2f847b091b108b0615b9c
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.1.4-0ubuntu1~intrepid1.2_i386.deb
Size/MD5: 66428 2010c46d4d3e6c1bf7ef765cca5a39eb
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.1.4-0ubuntu1~intrepid1.2_i386.deb
Size/MD5: 11777512 b682bed24a3001a94944744d5c7bd304
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.1.4-0ubuntu1~intrepid1.2_i386.deb
Size/MD5: 1568690 e57e92c4fb6c344484d617f5e89857c1
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/khelpcenter4_4.1.4-0ubuntu1~intrepid1.2_i386.deb
Size/MD5: 1864474 675af9075d6374fed6a1f493c491222f
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/phonon-backend-xine_4.1.4-0ubuntu1~intrepid1.2_i386.deb
Size/MD5: 158396 54fcedea907fc851290c323b3932f256
http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase-runtime/khelpcenter_4.1.4-0ubuntu1~intrepid1.2_i386.deb
Size/MD5: 15910 8c546383f5d1fa13f82c48fb2b1b38de
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.1.4-0ubuntu1~intrepid1.2_lpia.deb
Size/MD5: 66648 108d528ede245aebe6a01fa946ed44a5
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.1.4-0ubuntu1~intrepid1.2_lpia.deb
Size/MD5: 11789554 a09c5b73f99285524448436d9531533a
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime_4.1.4-0ubuntu1~intrepid1.2_lpia.deb
Size/MD5: 1586454 2e8304acb8fa5e70906c3b8174c08df3
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/khelpcenter4_4.1.4-0ubuntu1~intrepid1.2_lpia.deb
Size/MD5: 1865860 1b5fec520664c671f5f8c2198b251689
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/phonon-backend-xine_4.1.4-0ubuntu1~intrepid1.2_lpia.deb
Size/MD5: 158812 f8897b22030218f55ee094d2b0a38a67
http://ports.ubuntu.com/pool/universe/k/kdebase-runtime/khelpcenter_4.1.4-0ubuntu1~intrepid1.2_lpia.deb
Size/MD5: 15902 11a3558f49ca8af971b2e7524e8af2d5
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb
Size/MD5: 76604 13da40bbcc022dafa801b32aa9413327
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb
Size/MD5: 12470754 20f48d33e07520e0a27d1d6ddd40c4c5
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb
Size/MD5: 1800142 6543ca81406125e3f67e632546324b9c
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/khelpcenter4_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb
Size/MD5: 1879472 30cf02d9bf140a05c64b5e9feed12fc3
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/phonon-backend-xine_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb
Size/MD5: 171248 21947ef75437823f8b25126505fbbd8a
http://ports.ubuntu.com/pool/universe/k/kdebase-runtime/khelpcenter_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb
Size/MD5: 15912 7578be999383c9ad946416bf855ae135
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.1.4-0ubuntu1~intrepid1.2_sparc.deb
Size/MD5: 71676 04e43f2ba8c3664dfbdd4eb5be6c77c3
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.1.4-0ubuntu1~intrepid1.2_sparc.deb
Size/MD5: 11638306 457f370027fa59048bf9f863f70b5a95
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime_4.1.4-0ubuntu1~intrepid1.2_sparc.deb
Size/MD5: 1575166 bd718951faaaeb8d37fcd784cf52ba25
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/khelpcenter4_4.1.4-0ubuntu1~intrepid1.2_sparc.deb
Size/MD5: 1873072 f7a088c52f8859d81e896d199c27f5ea
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/phonon-backend-xine_4.1.4-0ubuntu1~intrepid1.2_sparc.deb
Size/MD5: 163190 e99b428baf3c654eedfa04f731ace641
http://ports.ubuntu.com/pool/universe/k/kdebase-runtime/khelpcenter_4.1.4-0ubuntu1~intrepid1.2_sparc.deb
Size/MD5: 15916 5072343fbda451ffe5242c1713b3b1de
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.2.2-0ubuntu1.1.diff.gz
Size/MD5: 40714 cfe9d30de0fd8c69c7d8bb379990b8d1
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.2.2-0ubuntu1.1.dsc
Size/MD5: 2104 2ac1ace35e54d7f0f3b01f9dc70e60b7
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.2.2.orig.tar.gz
Size/MD5: 72242787 0c4c3ffbf545f71d25e2038276d05aff
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kde-icons-oxygen_4.2.2-0ubuntu1.1_all.deb
Size/MD5: 15382880 2d6c3a59ef3c65c0387f602fd0f2bb82
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-data-common_4.2.2-0ubuntu1.1_all.deb
Size/MD5: 200520 be9188dd71132097fe31f227a2357ef9
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-data_4.2.2-0ubuntu1.1_all.deb
Size/MD5: 3534474 c0f0e2f69e5f359e1680abf900750f19
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.2.2-0ubuntu1.1_amd64.deb
Size/MD5: 64132 a334b94fce2bda7be4f1e7beec32f3a4
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.2.2-0ubuntu1.1_amd64.deb
Size/MD5: 16371098 24cdeb9115b053d0fc9986e7c170e02d
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.2.2-0ubuntu1.1_amd64.deb
Size/MD5: 2055046 b4d92abccf254a5b6bfca56bef0602df
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/khelpcenter4_4.2.2-0ubuntu1.1_amd64.deb
Size/MD5: 1831642 ad873037c482fbf1c2cd318db2540521
http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase-runtime/khelpcenter_4.2.2-0ubuntu1.1_amd64.deb
Size/MD5: 7554 a9dea18c80c0b524247458ef54bad493
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.2.2-0ubuntu1.1_i386.deb
Size/MD5: 60450 82119b21ffef45aacc48f6edb4358de2
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.2.2-0ubuntu1.1_i386.deb
Size/MD5: 16199734 3f453f6d4f2d6b46b983eb9849129830
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.2.2-0ubuntu1.1_i386.deb
Size/MD5: 1906484 eca048b5f7dd707b80d424eb804abb37
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/khelpcenter4_4.2.2-0ubuntu1.1_i386.deb
Size/MD5: 1820720 b192075129b5364872ff9799274b670d
http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase-runtime/khelpcenter_4.2.2-0ubuntu1.1_i386.deb
Size/MD5: 7546 40b060388b2a90619223b5647cf51485
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.2.2-0ubuntu1.1_lpia.deb
Size/MD5: 61250 123e5c98cc6d526fd5ada38bfa59da76
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.2.2-0ubuntu1.1_lpia.deb
Size/MD5: 16207338 1d3bdb9b6a6aa3f4c98ebb8c01c0b3ef
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime_4.2.2-0ubuntu1.1_lpia.deb
Size/MD5: 1928090 7bffbab55c8d89f83922bacc654a9858
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/khelpcenter4_4.2.2-0ubuntu1.1_lpia.deb
Size/MD5: 1822704 5e9598befccd89f7a759d9d4fad59386
http://ports.ubuntu.com/pool/universe/k/kdebase-runtime/khelpcenter_4.2.2-0ubuntu1.1_lpia.deb
Size/MD5: 7542 9749c79062a0281145af5db1d26278db
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.2.2-0ubuntu1.1_powerpc.deb
Size/MD5: 71666 2ecbcf941411c7dd94efc3c1bdceb954
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.2.2-0ubuntu1.1_powerpc.deb
Size/MD5: 17096780 3aed961751066584a48300b86637fb39
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime_4.2.2-0ubuntu1.1_powerpc.deb
Size/MD5: 2176844 3648fcaef48bb8f85277616e134ee50b
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/khelpcenter4_4.2.2-0ubuntu1.1_powerpc.deb
Size/MD5: 1836380 fa8d421e654b2e3152a120d228be1ef4
http://ports.ubuntu.com/pool/universe/k/kdebase-runtime/khelpcenter_4.2.2-0ubuntu1.1_powerpc.deb
Size/MD5: 7552 4f4b1f1e032b6aa8bc7a9fc5e1200f8c
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.2.2-0ubuntu1.1_sparc.deb
Size/MD5: 65380 ead7bcd9dee0f506ae336213666e43d4
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.2.2-0ubuntu1.1_sparc.deb
Size/MD5: 16054148 791ac16760793ab9e26326f4ef5943a8
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime_4.2.2-0ubuntu1.1_sparc.deb
Size/MD5: 1922982 02a8a25de38ee5512d84eedc15829a38
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/khelpcenter4_4.2.2-0ubuntu1.1_sparc.deb
Size/MD5: 1831290 28d69a1bef078760801b15280bcd0053
http://ports.ubuntu.com/pool/universe/k/kdebase-runtime/khelpcenter_4.2.2-0ubuntu1.1_sparc.deb
Size/MD5: 7548 68d9089d31aab1227a2a4bb13e7e0019
Updated packages for Ubuntu 9.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.3.2-0ubuntu4.1.diff.gz
Size/MD5: 43739 4c7f4fc39ca280a92ba04ec32a15e694
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.3.2-0ubuntu4.1.dsc
Size/MD5: 2236 cebe4be39e025c9e8ab302c35342a8a2
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.3.2.orig.tar.gz
Size/MD5: 7914828 27fbe1543099373d43bec3280695f74f
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-data-common_4.3.2-0ubuntu4.1_all.deb
Size/MD5: 180122 0edd69e4c5ddc97fc7b7183a6ad75d9b
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-data_4.3.2-0ubuntu4.1_all.deb
Size/MD5: 3919240 3e5c58210ddf9ed57bfcf73bcc85f436
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.3.2-0ubuntu4.1_amd64.deb
Size/MD5: 51996 f587ae131b9bc750d7f0a5ba3eb3673a
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.3.2-0ubuntu4.1_amd64.deb
Size/MD5: 10512030 29ca5c7ff10e75fd444bdef204b51e8d
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.3.2-0ubuntu4.1_amd64.deb
Size/MD5: 1508594 d54a24b130c1f66a5f1b313fe570abf0
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/khelpcenter4_4.3.2-0ubuntu4.1_amd64.deb
Size/MD5: 1717084 fbe49cdf3301df0df0a58e9cf49031ef
http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase-runtime/khelpcenter_4.3.2-0ubuntu4.1_amd64.deb
Size/MD5: 7566 09191b1006aa011fb08d68442745df7b
http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase-runtime/plasma-scriptengine-javascript_4.3.2-0ubuntu4.1_amd64.deb
Size/MD5: 289518 eec3287fc379574e77c6dfcff4f7d814
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.3.2-0ubuntu4.1_i386.deb
Size/MD5: 50478 f4c0127dde62e73c3bdae13e34ae8c1e
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.3.2-0ubuntu4.1_i386.deb
Size/MD5: 10399956 d3f9e29789ecf62fb33d0f25abf1a54b
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/kdebase-runtime_4.3.2-0ubuntu4.1_i386.deb
Size/MD5: 1437076 d5b8253ce02e6ab35fd8539dd55aa59a
http://security.ubuntu.com/ubuntu/pool/main/k/kdebase-runtime/khelpcenter4_4.3.2-0ubuntu4.1_i386.deb
Size/MD5: 1711822 b29e6287dee20a8fd21734ce792b1851
http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase-runtime/khelpcenter_4.3.2-0ubuntu4.1_i386.deb
Size/MD5: 7564 52fb0f686a6d44906c07de570c3807b7
http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase-runtime/plasma-scriptengine-javascript_4.3.2-0ubuntu4.1_i386.deb
Size/MD5: 282580 250ebb27f43e56eeca3e7a5e024f5e27
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.3.2-0ubuntu4.1_lpia.deb
Size/MD5: 52368 cc378311780223a6993b7d63c2f2fe5e
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.3.2-0ubuntu4.1_lpia.deb
Size/MD5: 10409406 ad536a0eead81fdaf4cdb6755e1bea47
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime_4.3.2-0ubuntu4.1_lpia.deb
Size/MD5: 1485320 cfa8859b48cc3ff409fb1a65224d34a4
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/khelpcenter4_4.3.2-0ubuntu4.1_lpia.deb
Size/MD5: 1715892 7a03d450f14f72d64342ff50cdc8bd48
http://ports.ubuntu.com/pool/universe/k/kdebase-runtime/khelpcenter_4.3.2-0ubuntu4.1_lpia.deb
Size/MD5: 7566 dcc5449888c689aa61e3f56bb636d8c0
http://ports.ubuntu.com/pool/universe/k/kdebase-runtime/plasma-scriptengine-javascript_4.3.2-0ubuntu4.1_lpia.deb
Size/MD5: 292078 b4bcc886406cd876b617c65fae869cb0
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.3.2-0ubuntu4.1_powerpc.deb
Size/MD5: 49242 14dfebd9f06b5a6885871b9980ba4b45
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.3.2-0ubuntu4.1_powerpc.deb
Size/MD5: 10427318 a73247fe519ac020fcc732582bdc3572
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime_4.3.2-0ubuntu4.1_powerpc.deb
Size/MD5: 1312778 ee99e24c303cc8dff277a6dbe01109b4
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/khelpcenter4_4.3.2-0ubuntu4.1_powerpc.deb
Size/MD5: 1704864 8fe8a77e37aa36a41dd4908b40d99257
http://ports.ubuntu.com/pool/universe/k/kdebase-runtime/khelpcenter_4.3.2-0ubuntu4.1_powerpc.deb
Size/MD5: 7574 2bdc311c086ec68de4356fa46b11a3de
http://ports.ubuntu.com/pool/universe/k/kdebase-runtime/plasma-scriptengine-javascript_4.3.2-0ubuntu4.1_powerpc.deb
Size/MD5: 258384 8dc0a3833e401313aa8b229aa43c10dc
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-bin-kde4_4.3.2-0ubuntu4.1_sparc.deb
Size/MD5: 51426 28c48f3e2e00777fc2b8c9af121fca1e
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime-dbg_4.3.2-0ubuntu4.1_sparc.deb
Size/MD5: 9652854 08634cbb43d6decea29568d0a8692ba3
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/kdebase-runtime_4.3.2-0ubuntu4.1_sparc.deb
Size/MD5: 1290964 4504589f207dd711116619bb8ee86fed
http://ports.ubuntu.com/pool/main/k/kdebase-runtime/khelpcenter4_4.3.2-0ubuntu4.1_sparc.deb
Size/MD5: 1700812 11c412fef79551e861e67d64d483d015
http://ports.ubuntu.com/pool/universe/k/kdebase-runtime/khelpcenter_4.3.2-0ubuntu4.1_sparc.deb
Size/MD5: 7568 a7d4f1bf330ba2afbabc49d86febb225
http://ports.ubuntu.com/pool/universe/k/kdebase-runtime/plasma-scriptengine-javascript_4.3.2-0ubuntu4.1_sparc.deb
Size/MD5: 252010 cb93b6ac8041a85d4339bf99fc443f06
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFLJcgsNVH5XJJInbgRAhGyAJ49LtDpcMcgsdmSdkHz9WCLghhY0gCbB+Gu
ovZDqJ5ng50buerHZz6gPPU=
=0VR/
-----END PGP SIGNATURE-----
|