CVE-2006-2449
CVSS4.0
发布时间 :2006-06-15 06:02:00
修订时间 :2011-03-07 21:36:13
NMCOPS    

[原文]KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack related to the session type for login.


[CNNVD]KDE KDM会话类型配置文件符号 信息泄露漏洞(CNNVD-200606-298)

        KDE是一个为UNIX工作站设计的强大的开源图形桌面环境。KDE中所捆绑的KDM允许用户选择登录的会话类型。
        KDM对用户配置文件的处理上存在漏洞,攻击者可能利用此漏洞非授权读取敏感的系统文件。
        KDM的设置储存在用户的主目录中。通过符号链接攻击,KDM可能受骗允许用户读取通常情况下无法读取的内容,比如 /etc/shadow 文件。

- CVSS (基础分值)

CVSS分值: 4 [中等(MEDIUM)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:kde:kde:3.3.2
cpe:/o:kde:kde:3.2
cpe:/o:kde:kde:3.2.3
cpe:/o:kde:kde:3.5
cpe:/o:kde:kde:3.2.2
cpe:/o:kde:kde:3.4.3
cpe:/o:kde:kde:3.4.1
cpe:/o:kde:kde:3.3.1
cpe:/o:kde:kde:3.4
cpe:/o:kde:kde:3.2.1
cpe:/o:kde:kde:3.5.3
cpe:/o:kde:kde:3.3
cpe:/o:kde:kde:3.5.2
cpe:/o:kde:kde:3.4.2

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9844KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack related to the session ty...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2449
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2449
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-298
(官方数据源) CNNVD

- 其它链接及资源

http://www.ubuntulinux.org/support/documentation/usn/usn-301-1
(PATCH)  UBUNTU  USN-301-1
http://www.securityfocus.com/archive/1/archive/1/437133/100/0/threaded
(VENDOR_ADVISORY)  BUGTRAQ  20060614 [KDE Security Advisory] KDM symlink attack vulnerability
http://www.redhat.com/support/errata/RHSA-2006-0548.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2006:0548
http://www.vupen.com/english/advisories/2006/2355
(UNKNOWN)  VUPEN  ADV-2006-2355
http://www.securityfocus.com/bid/18431
(UNKNOWN)  BID  18431
http://www.securityfocus.com/archive/1/archive/1/437322/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060615 rPSA-2006-0106-1 kdebase
http://www.osvdb.org/26511
(UNKNOWN)  OSVDB  26511
http://www.novell.com/linux/security/advisories/2006_39_kdm.html
(VENDOR_ADVISORY)  SUSE  SUSE-SA:2006:039
http://www.kde.org/info/security/advisory-20060614-1.txt
(VENDOR_ADVISORY)  CONFIRM  http://www.kde.org/info/security/advisory-20060614-1.txt
http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml
(UNKNOWN)  GENTOO  GLSA-200606-23
http://www.debian.org/security/2006/dsa-1156
(VENDOR_ADVISORY)  DEBIAN  DSA-1156
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467
(UNKNOWN)  SLACKWARE  SSA:2006-178-01
http://securitytracker.com/id?1016297
(UNKNOWN)  SECTRACK  1016297
http://secunia.com/advisories/21662
(VENDOR_ADVISORY)  SECUNIA  21662
http://secunia.com/advisories/20890
(VENDOR_ADVISORY)  SECUNIA  20890
http://secunia.com/advisories/20869
(VENDOR_ADVISORY)  SECUNIA  20869
http://secunia.com/advisories/20785
(VENDOR_ADVISORY)  SECUNIA  20785
http://secunia.com/advisories/20702
(VENDOR_ADVISORY)  SECUNIA  20702
http://secunia.com/advisories/20674
(VENDOR_ADVISORY)  SECUNIA  20674
http://secunia.com/advisories/20660
(VENDOR_ADVISORY)  SECUNIA  20660
http://secunia.com/advisories/20602
(VENDOR_ADVISORY)  SECUNIA  20602
http://xforce.iss.net/xforce/xfdb/27181
(UNKNOWN)  XF  kde-kdm-symlink(27181)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:106
(UNKNOWN)  MANDRIVA  MDKSA-2006:106
http://www.mandriva.com/security/advisories?name=MDKSA-2006:105
(UNKNOWN)  MANDRIVA  MDKSA-2006:105

- 漏洞信息

KDE KDM会话类型配置文件符号 信息泄露漏洞
中危 其他
2006-06-15 00:00:00 2006-10-25 00:00:00
本地  
        KDE是一个为UNIX工作站设计的强大的开源图形桌面环境。KDE中所捆绑的KDM允许用户选择登录的会话类型。
        KDM对用户配置文件的处理上存在漏洞,攻击者可能利用此漏洞非授权读取敏感的系统文件。
        KDM的设置储存在用户的主目录中。通过符号链接攻击,KDM可能受骗允许用户读取通常情况下无法读取的内容,比如 /etc/shadow 文件。

- 公告与补丁

        目前厂商已经发布了相关补丁,请到厂商的主页下载:
        KDE aRts 1.3.2
        Slackware arts-1.4.2-i486-2_slack10.2.tgz
        Slackware 10.2:
        ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/ arts-1.4.2-i486-2_slack10.2.tgz
        KDE KDE 3.2
        KDE post-3.2.0-kdebase-kdm.diff
        ftp://ftp.kde.org/pub/kde/security_patches
        Mandriva kdebase-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-3.2-79.16.C30mdk.src.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva kdebase-3.2-79.16.C30mdk.src.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-common-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-common-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-kate-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-kate-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva kdebase-kcontrol-data-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-kcontrol-data-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva kdebase-kdeprintfax-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-kdeprintfax-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva kdebase-kdm-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-kdm-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva kdebase-kdm-config-file-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-kdm-config-file-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva kdebase-kmenuedit-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-kmenuedit-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva kdebase-konsole-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-konsole-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva kdebase-nsplugins-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-nsplugins-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva kdebase-progs-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva kdebase-progs-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64kdebase4-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64kdebase4-devel-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64kdebase4-kate-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva lib64kdebase4-kate-devel-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64kdebase4-kmenuedit-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64kdebase4-konsole-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64kdebase4-nsplugins-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64kdebase4-nsplugins-devel-3.2-79.16.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva libkdebase4-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva libkdebase4-devel-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva libkdebase4-kate-3.2-79.16.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva libkdebase4-kate-de

- 漏洞信息 (F49488)

Debian Linux Security Advisory 1156-1 (PacketStormID:F49488)
2006-08-28 00:00:00
Debian  debian.org
advisory,arbitrary
linux,debian
CVE-2006-2449
[点击下载]

Debian Security Advisory 1156-1 - Ludwig Nussel discovered that kdm, the X display manager for KDE, handles access to the session type configuration file insecurely, which may lead to the disclosure of arbitrary files through a symlink attack.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1156-1                    security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
August 27th, 2006                       http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : kdebase 
Vulnerability  : programming error
Problem-Type   : local
Debian-specific: no
CVE ID         : CVE-2006-2449
Debian Bug     : 374002

Ludwig Nussel discovered that kdm, the X display manager for KDE, handles
access to the session type configuration file insecurely, which may lead
to the disclosure of arbitrary files through a symlink attack.

For the stable distribution (sarge) this problem has been fixed in
version 3.3.2-1sarge3.

For the unstable distribution (sid) this problem has been fixed in
version 3.5.2-2.

We recommend that you upgrade your kdm package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/k/kdebase/kdebase_3.3.2-1sarge3.dsc
      Size/MD5 checksum:     1470 4dcac8639db06647d036df537ae3c9b8
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase_3.3.2-1sarge3.diff.gz
      Size/MD5 checksum:   882284 3343a59ccdd62593012a01f2ff62148b
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase_3.3.2.orig.tar.gz
      Size/MD5 checksum: 23750520 32d59e3bcb972a9a29414935c7f72481

  Architecture independent components:

    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-data_3.3.2-1sarge3_all.deb
      Size/MD5 checksum:  3700080 fa994227cf4ae826c32c899c9362f0cb
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-doc_3.3.2-1sarge3_all.deb
      Size/MD5 checksum:   997138 7247267f3878ecb1705277c3de7fc055
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase_3.3.2-1sarge3_all.deb
      Size/MD5 checksum:    20210 05b343cd49a2cb8f16e98642074cde30
    http://security.debian.org/pool/updates/main/k/kdebase/xfonts-konsole_3.3.2-1sarge3_all.deb
      Size/MD5 checksum:    35986 66b307a828e4615e7ac2a407bfa9f118

  Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   239788 b526e5f7d1cce5858e7fccaab0a3374b
    http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   616386 0e6f8cec7fd40581bd3205b08743629a
    http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:  7894894 d88f6b374a4d122102b235496ab2dec5
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:  1069872 8640186a601f2f9d022bb9c13fd12857
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:    57228 7636abbe283ee0c355edd68bbf66e768
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   764358 6f1d8dacab9be8b1de4a1d5cdfdf5a33
    http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   226914 a074209ee031c0de0f254d7cd410c45e
    http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:  1084382 db7e781f94b32b57590dd8bae42dbe40
    http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   707150 9425aca92c4bc8f308757a5cd780c76c
    http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   467970 0ffd07d3916f4839e2307e0d5f02d2c8
    http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   189728 ca7c75d168fb48a8b8559ae3bf40b774
    http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   723158 e3eb650f44d467458666fbf87b906869
    http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:  2378598 f0bc17f2e9a6c6b0ca851bcb7c1d39e5
    http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   220018 039ccc7aabfdbc46f67c90a52549c34a
    http://security.debian.org/pool/updates/main/k/kdebase/kmenuedit_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   211776 b37308198fac85e4156d9c5aa90481ba
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:  2338618 0162348fe5e7ed843fc2e497567566ea
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror-nsplugins_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   141522 755932aa38975bdff75675cea2f04770
    http://security.debian.org/pool/updates/main/k/kdebase/konsole_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   620724 799c63637b324bd140a60f4e67ed6a2f
    http://security.debian.org/pool/updates/main/k/kdebase/kpager_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   101494 214dcba10b8d054810eafe20e40a5ca7
    http://security.debian.org/pool/updates/main/k/kdebase/kpersonalizer_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   483284 eae8e6f0e3e769933e760a59a3c2765a
    http://security.debian.org/pool/updates/main/k/kdebase/ksmserver_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   127544 d01131be64cc86497c3172de31726b86
    http://security.debian.org/pool/updates/main/k/kdebase/ksplash_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   815644 bd0c1a259bdb466cef2c50a5b3d3d16c
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguard_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   532542 303d04db5f973a44f699d2ea9f79f9cc
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguardd_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:    59584 6a3bf8650bfb839967facc7737ecc8b4
    http://security.debian.org/pool/updates/main/k/kdebase/ktip_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:    80246 20a977b362f76d0f66831c40e601fdc5
    http://security.debian.org/pool/updates/main/k/kdebase/kwin_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   927240 cc11de59031b5037168e8453af35e6c6
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:   271130 18afe106bea658b55b8ade25842b7f76
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4-dev_3.3.2-1sarge3_alpha.deb
      Size/MD5 checksum:    44912 338471def44b1d10cdcf496def56bca8

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   239784 18067a1bbe1861b021f265c119404bc7
    http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   596912 c330231aacaebc1120437fc55d31ca63
    http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:  7759842 efee8af325ec3907d7e1ea0efac8099d
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:  1008198 52446a848a846b13504b6556359e54fd
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:    57212 dc81e271f45bb5a504d45bf299a239d7
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   724464 f8a595d9358a37b0489266f35d3c6362
    http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   226028 815bfb747916104de5665bbb426af18e
    http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:  1073530 780d32984675eaaa03196ae6cbde6043
    http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   688532 c4a0d4e1cc83687f5559d6a40b0c425b
    http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   443500 422309602e1b16e572aa859c5a22a866
    http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   185660 765ca6a294a8d130dec5f13cde319446
    http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   717334 58d76d36e07cd2e4e1fbf702ba626053
    http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:  2266870 3f1cf2904f9867ec59d61bd097c0c336
    http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   212788 454ec9da63883782a29851e0e0c6b70e
    http://security.debian.org/pool/updates/main/k/kdebase/kmenuedit_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   205060 e6305ec1719979f91f160a19bce14918
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:  2286680 c51db688384ebdc344d7b408c26374b0
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror-nsplugins_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   132128 d4ef809dafa7dd5bc3e6662a24e9f1c3
    http://security.debian.org/pool/updates/main/k/kdebase/konsole_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   581044 9a8fcfe1b00b76e3a91fdba960f0e3a8
    http://security.debian.org/pool/updates/main/k/kdebase/kpager_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:    98004 8700189b0b0cec132c3cc600da5a2f78
    http://security.debian.org/pool/updates/main/k/kdebase/kpersonalizer_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   470748 d1776c09cccfc577b0e173388bcfe1ad
    http://security.debian.org/pool/updates/main/k/kdebase/ksmserver_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   123808 13f20cc71ff72eb91a661f39c1ca3081
    http://security.debian.org/pool/updates/main/k/kdebase/ksplash_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   809330 7059ee55f2e190c3663a26ded7e6debf
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguard_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   488736 b57c427fcc1137bdf295066e31965409
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguardd_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:    54324 230c677e3127656ddb39216054e8a7e8
    http://security.debian.org/pool/updates/main/k/kdebase/ktip_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:    80006 1a5ca99576354bf9b0827b8ee13c190b
    http://security.debian.org/pool/updates/main/k/kdebase/kwin_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   878002 e3f379973a73d3ed6514d382748ac2c3
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:   256568 706adacf6b765ffe89e37b3acd000814
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4-dev_3.3.2-1sarge3_amd64.deb
      Size/MD5 checksum:    44916 be1c2348ff730580d3a753d6397c693c

  ARM architecture:

    http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   236496 780a82dcfad101af1c7765dfb6490a1f
    http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   564848 4651a34e7e91aeea1acc30fb02ed3580
    http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:  7509240 8a421b0f03830e22f911343879850579
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   893504 3458fb4d168881a63d073be8071b5fd8
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:    57272 8476248736e3b08db9f5c0d20adc2960
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   654580 cd47f40d7781970f2ed67c88bc2aad99
    http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   218542 6c28fdc8c89e997d2a8e7bcd1a69c99f
    http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:  1055268 d5850fed174092bfbd300d6790ef7243
    http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   659926 eed60ac0d0fefe5a8a7e31ca2102d1d6
    http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   406252 77a5e8cc83f769b1bbd2d1d034741ec9
    http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   167462 26113a5f01c2f50e969579f048d31ac7
    http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   696132 f224ff1f2a0eea9cde8477082a6137fa
    http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:  2030932 f30f3b4975896127139a458fcc1b01c3
    http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   197536 d9155e2a9e996f5a4314f31909aa8ca8
    http://security.debian.org/pool/updates/main/k/kdebase/kmenuedit_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   191662 d12d70069d04c004b7fc4fb75145a618
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:  2169722 a186c39c17e0beb767bb4d76e477fd8c
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror-nsplugins_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   117376 270ebe29a035096803dd8e554002a10d
    http://security.debian.org/pool/updates/main/k/kdebase/konsole_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   531556 946f8df5713be3f9bf736d443f114c55
    http://security.debian.org/pool/updates/main/k/kdebase/kpager_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:    91002 458a15250ad3a14a0010c4ff20e08555
    http://security.debian.org/pool/updates/main/k/kdebase/kpersonalizer_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   462970 ffa74004de79031d72862582b019184a
    http://security.debian.org/pool/updates/main/k/kdebase/ksmserver_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   117782 1cfd95fc413ce4a133b204ec53bf65e7
    http://security.debian.org/pool/updates/main/k/kdebase/ksplash_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   793098 ba7839aff396d1f905ad2d337189990f
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguard_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   435606 5dbb89aee4c11beb2a0b59f4d9d9c692
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguardd_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:    49700 b0afd591589387f97625d7ecf9c6c461
    http://security.debian.org/pool/updates/main/k/kdebase/ktip_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:    79414 bdd5847f01967ca150779f1a1f0d9a51
    http://security.debian.org/pool/updates/main/k/kdebase/kwin_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   800254 0aad37202a8fdb7826b7a6425896b048
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:   231402 b1bd36d4c605119d162aeb19f2b420b3
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4-dev_3.3.2-1sarge3_arm.deb
      Size/MD5 checksum:    44920 ff2adc663c110051a263f71f9b1dde4d

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   238552 3315f3726ec7bcc2b2336264ee1d6113
    http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   582412 58f81b8e2a85b4ac2590d04c339d57b5
    http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:  7662460 90981f72d4368fc940a4fa1a7e4f64f9
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   954376 0d21ac76ee892b4801720136a0b33900
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:    57230 ec1cb3381a3f4afe7b382c5f8ff55199
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   697440 5efafc13c4ce1614666158bd570ec74d
    http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   223118 3bebac40feaeb0e466af26f7067b1fab
    http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:  1063596 c73e53fe6e2374184af490c79a07eb99
    http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   680672 a7ac569bad33ed7bc8419c33aaef8996
    http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   417326 1c502f75f0661242ddbeac4791f1b7f8
    http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   178908 65dddbcbccd904145e4020e64d942ff3
    http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   711378 e9ea7945ee02963a7c916a3e545e62b0
    http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:  2175624 4008eb9c4bbd5360a4eeb8e46b4e50c2
    http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   205020 165b654e57f1d35a31fa152a24afa0cb
    http://security.debian.org/pool/updates/main/k/kdebase/kmenuedit_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   200970 abc1503a3850d65f6ff91f880acf348d
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:  2239890 91e2886a7e2e420a0d8f3eb95fb27f6d
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror-nsplugins_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   123316 079c71fbc6ccd53960d019e41fbf6ad2
    http://security.debian.org/pool/updates/main/k/kdebase/konsole_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   568180 ef6532f854c54bfcc50acd3f0569e0b8
    http://security.debian.org/pool/updates/main/k/kdebase/kpager_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:    94712 8f71942e5f28d466b1e1bec4844619f0
    http://security.debian.org/pool/updates/main/k/kdebase/kpersonalizer_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   468770 289a16d56ac2df3bc0f5a6b5d30db912
    http://security.debian.org/pool/updates/main/k/kdebase/ksmserver_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   121494 e368bade4131851262de00f57453645c
    http://security.debian.org/pool/updates/main/k/kdebase/ksplash_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   802022 64e6b973ac208ec943d2e2cc45a16ce9
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguard_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   479926 6dd986c5507b79bbe6c0cdb560752a70
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguardd_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:    49048 4a89bfd14874d413415fd5b6f8356599
    http://security.debian.org/pool/updates/main/k/kdebase/ktip_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:    79680 966842fe7926161702a92f1907ec309c
    http://security.debian.org/pool/updates/main/k/kdebase/kwin_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   854870 5cf7be0a787c73b26fc3c7161a1de866
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:   249494 2b43b65830f35ea3619ff8596340031d
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4-dev_3.3.2-1sarge3_i386.deb
      Size/MD5 checksum:    44922 d07fda73f6365a4470db2ac21030c906

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   242972 39007d42463b76f8fe5b764eecd4566f
    http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   656870 82b78a0ba20c100a84bdbeae5258c70b
    http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:  8326492 17bc165bd399624e50554f81675739a1
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:  1185246 d6564c209b78e49acf24dc31f36f057b
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:    57222 c29f21bd55947f81f0c790e89e5f270e
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   889928 0cb5bc458a78eff7d110c494ae860026
    http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   235506 5f30b4f0259bab1f4fd71e0500cb7623
    http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:  1108452 f7f06d45124f2feea65e96a087ec196d
    http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   753752 278c7736fe43e846362993b2d07120c6
    http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   515014 078c57d32243ed75fcea8733668dfb57
    http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   211120 5f91449d4fbc45958a199c3be8892b12
    http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   749964 ef1b615d17d34988eaa98810ea65834b
    http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:  2669884 255ea0e994ac522a1ea6a6506c4214ad
    http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   245672 887f5855d0c9e81faf1bfc4a41f98433
    http://security.debian.org/pool/updates/main/k/kdebase/kmenuedit_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   241126 d73a5f682bddc740cf027c42eb15a91b
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:  2519520 7e6edb85db2eace50675894c82bec90a
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror-nsplugins_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   156862 64f38288f0d21fe978579ecd97e1b846
    http://security.debian.org/pool/updates/main/k/kdebase/konsole_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   712466 0dd62c1a7548d46059e21ce3d806db87
    http://security.debian.org/pool/updates/main/k/kdebase/kpager_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   108480 d18a00bff71822e1ed5e9d623b85e37b
    http://security.debian.org/pool/updates/main/k/kdebase/kpersonalizer_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   497148 627f5725932044da0a878216b02b3c09
    http://security.debian.org/pool/updates/main/k/kdebase/ksmserver_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   140420 c1dce97e837b3828f0ac10c95859b26d
    http://security.debian.org/pool/updates/main/k/kdebase/ksplash_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   836502 fb443ee55dcaff89da080256ca3864a8
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguard_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   594054 64655fb6b93bb9e1b07baa5207ba87a7
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguardd_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:    68072 3fae870dba768fcf7d36974d925ceea2
    http://security.debian.org/pool/updates/main/k/kdebase/ktip_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:    80760 d9304a9807d58838bf5d0724dc8f727b
    http://security.debian.org/pool/updates/main/k/kdebase/kwin_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:  1078524 df0b796e05d102ac20ce6c438fafdca5
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:   317816 85258955a5062c9b324d4374d2a3f307
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4-dev_3.3.2-1sarge3_ia64.deb
      Size/MD5 checksum:    44914 04a1e00457e6fec99e956c3a19974030

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   238796 c86889191264d3af5fb91593eef7601b
    http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   628896 7e0ebe1d24fb0d427b2417e1cd73a87b
    http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:  7949378 aaeeb1252ee10c94bde77905642acb93
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:  1039750 a9a1e6478404f3cb28f106667a06c392
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:    57242 438f8607b9d939c2cdb27e1d0f723a0c
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   765090 8b7a6e096c62ffba772abdce360632a8
    http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   226808 4a8ccc90000a60a8ad212764b61f49fa
    http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:  1078198 08dc71bf1b0534e98eeeadea97f9c5fc
    http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   703518 869694d9804c0c31f2cf08dd4a2492f3
    http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   442114 14436697a49e7095d3f82abc6a8d5c6d
    http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   187460 d1b20d46902a6caf3171743785d2e97b
    http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   729752 4ce0288672a5dca76b6eaaa59808baaa
    http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:  2399320 134fc3888d3697a61dd710837ec975ce
    http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   222812 73b5dcabc323acb392b376a859fb9398
    http://security.debian.org/pool/updates/main/k/kdebase/kmenuedit_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   217558 0c4b767c361cd025291cc651a37b9a30
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:  2363760 a76ebc8bfa46a354436f1d37094245cc
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror-nsplugins_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   135448 43babfce2e0bedebfb87ea6df37841b6
    http://security.debian.org/pool/updates/main/k/kdebase/konsole_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   625556 f737dc931af95f5868077cef35ef0bb4
    http://security.debian.org/pool/updates/main/k/kdebase/kpager_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:    98258 e26d1d35397f29d036b77270631bb842
    http://security.debian.org/pool/updates/main/k/kdebase/kpersonalizer_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   473120 3c3caa89ea6d785f097b5ea99b4deec5
    http://security.debian.org/pool/updates/main/k/kdebase/ksmserver_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   128602 3eae63333c3a6380722437447d4b4248
    http://security.debian.org/pool/updates/main/k/kdebase/ksplash_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   817794 883addc848e9624ecd5c9ee7ead1b222
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguard_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   527522 b43f608fda36319a752b823e19fbb469
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguardd_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:    58792 b4428e88b5ecbf7caf6586ab4df8d389
    http://security.debian.org/pool/updates/main/k/kdebase/ktip_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:    80138 1402e1514c6f702a5c07c2df7d7c0d0d
    http://security.debian.org/pool/updates/main/k/kdebase/kwin_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   928234 b2db5e2e970dceb63eda17d88fc1faf6
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:   274932 ef356493bdc0481dc3ebe1f945a5cc68
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4-dev_3.3.2-1sarge3_hppa.deb
      Size/MD5 checksum:    44918 242352d1be2ded016270f1ab25d0815e

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   238376 d42977b8ecf66ffe1d5891652697e627
    http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   595158 e3e418c8b1d8b7795f82341da905fd4a
    http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:  7721910 5aef7bdddbafa89107fc5d43ccc715d6
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   944228 a0925ed61ab2ef4aa9cc351d6fc20f6d
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:    57314 b486d533e946ea7964fb2a062c2335c7
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   682244 a463fee8b6aa450bc95f7546805d4284
    http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   224170 d13c92e70d0fd71a42413d14ac124ff2
    http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:  1067772 c74ecef1925a5e7a74aaddb22e64dcec
    http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   675506 e877122639d93e3eb5fd0aa87bf8988e
    http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   401800 1ad32f212e3ac08f3d0e82639adb2770
    http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   178690 3be29f496098ddb25f24f8c8f21a372f
    http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   712540 6a56230693c4eab9552f8402c7ce9210
    http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:  2171310 5f1a58a3d96ed2cf79c7804db55fadaa
    http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   211314 b1a2e1d0c79ec79a3505630a4e112923
    http://security.debian.org/pool/updates/main/k/kdebase/kmenuedit_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   205038 334d4c5c682a4c766c4655b222381ecf
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:  2253556 dfedc91190a4e8c670efd64c402ea516
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror-nsplugins_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   123664 3994f09af199b2fef332020650d9dc28
    http://security.debian.org/pool/updates/main/k/kdebase/konsole_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   563094 884ffde2fe7c9e357fe189e24f3e3f9a
    http://security.debian.org/pool/updates/main/k/kdebase/kpager_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:    94160 6f5198522b8f31730f4d389def975c4c
    http://security.debian.org/pool/updates/main/k/kdebase/kpersonalizer_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   459202 4f54ecf13668eb022d0d2913944ebfcb
    http://security.debian.org/pool/updates/main/k/kdebase/ksmserver_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   121552 8668d901ec4f92b382f2947e0c203760
    http://security.debian.org/pool/updates/main/k/kdebase/ksplash_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   806822 d90cedb61bde5f98074aa4dcd5f2a566
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguard_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   450712 0897a7b186f9ed92556ed4c27d575682
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguardd_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:    44740 4cb702a1ff3f6ea4bf1129c613fa28c1
    http://security.debian.org/pool/updates/main/k/kdebase/ktip_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:    79686 ba0d818103be1aac8e3088df91c9574f
    http://security.debian.org/pool/updates/main/k/kdebase/kwin_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   858058 fbec6c073783ea71618414384ec118c4
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:   245320 8e161cba9527435634eb81cfb55b4d7f
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4-dev_3.3.2-1sarge3_m68k.deb
      Size/MD5 checksum:    44926 b4bdf2ea30362df9d5a02ab582fccf8c

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   236248 cd7536f310d8a4468dc035d44ffa3181
    http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   560146 0541d9689d6c3ad23f09c1ac49281904
    http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:  7363142 93528c67b04747a7a51a8b36ab3b1c67
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   911162 2838c5c81ff39dd9ad386506b7a71a26
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:    57236 81e6ecd439c96e9821a7e2930ffc659c
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   636128 31b118f7c9cf90de31c597165306abdc
    http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   215956 5e22b573afaff398a98ac6dff0e5121c
    http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:  1057680 e3a80ef798fb271a26a89512f3a17f52
    http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   663484 b1c2173a19fabf8cba7e968b75b639b0
    http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   437738 4d1ee17d5b68178d69f5ffa4dc0146ef
    http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   165066 eb9b4bacb027ba2cea4db9cd0e88f0c7
    http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   695744 c8195779062cb5e29f3c97398f1fa936
    http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:  2020548 0d242ec7d5e44788d314f2fb0d0dcfb4
    http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   193996 055c30b44fb1192068fb1d0ca5141f8a
    http://security.debian.org/pool/updates/main/k/kdebase/kmenuedit_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   186360 31ba064a693b6039409d87e7e748b3d6
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:  2145746 503c101fed9603c5e8abe59aad1ef9a9
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror-nsplugins_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   121102 950bb47dd2f222c5949ba0649b006856
    http://security.debian.org/pool/updates/main/k/kdebase/konsole_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   528122 f630abcc7d1809320e47f49703788be7
    http://security.debian.org/pool/updates/main/k/kdebase/kpager_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:    96926 f9913b78188adcbf307f8b438fa62b7f
    http://security.debian.org/pool/updates/main/k/kdebase/kpersonalizer_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   465646 f23e4f4f7a5e5f7b6849b1137c564b3c
    http://security.debian.org/pool/updates/main/k/kdebase/ksmserver_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   116466 c220c59834143eb3a168180645052273
    http://security.debian.org/pool/updates/main/k/kdebase/ksplash_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   792132 895e38798113df626ba0d6df0cb9e2c5
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguard_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   442208 9cd0da350044739f1cfb6bd36aa58dd9
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguardd_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:    55338 aac06cf7b982b113b8b1777d0e87f3dc
    http://security.debian.org/pool/updates/main/k/kdebase/ktip_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:    80154 64d0aea3a4bd0c8e03cb4cf54958089b
    http://security.debian.org/pool/updates/main/k/kdebase/kwin_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   777964 e07d302db4e874755e5bcf8bb2e33098
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:   226138 2146d56c864703e5a860882127b01ba2
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4-dev_3.3.2-1sarge3_mips.deb
      Size/MD5 checksum:    44920 8cd2688893a36fb432defc03c160472b

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   236038 20e837bd1a38c5e571ff04c72e9f0bde
    http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   555198 ce8db7ee26640740d58d6b1bfa3ccf9c
    http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:  7337768 22432dba6d5f1d6b6ec2b0c2cbe132f8
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   903110 387d25ddbaeb8743ce6a8ed7c3da7149
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:    57236 175bfb915d7e21fe0da8b16f442943ca
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   631292 9a143ab669ade96c15478fcefdb68478
    http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   215380 9d59c2281b8319f5375a7132fde0feff
    http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:  1056184 6704f3ad0c1402fb06fa2d04d1818495
    http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   660176 78298eb461b04014c56fdefa5ff1b7bc
    http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   436692 76102bc5a45e2f13c40264f6c054ee18
    http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   163286 9858fab3ed9b46b13ed8aa7ef5996b2e
    http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   694570 a5d70a15f32b4b6175a80ac551fc6074
    http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:  1991024 00910beba50b0b7cb193590fff1d51e1
    http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   191684 cf0184099965788cdb5a17746658cd74
    http://security.debian.org/pool/updates/main/k/kdebase/kmenuedit_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   184920 337a69b352d2ca44cb20faae9ca62864
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:  2132466 c68ca061744953760ecf27a0495c6af5
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror-nsplugins_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   119852 0dc73e747bc628643258f80cbf9618cb
    http://security.debian.org/pool/updates/main/k/kdebase/konsole_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   520500 4fcac660f9a7503b3d6a5eff664357b4
    http://security.debian.org/pool/updates/main/k/kdebase/kpager_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:    96350 e36b6d15a9842cd047a9a2ae71a233fa
    http://security.debian.org/pool/updates/main/k/kdebase/kpersonalizer_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   465058 8338d5c74caa0df64c2af9ae7bc90290
    http://security.debian.org/pool/updates/main/k/kdebase/ksmserver_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   115614 c655659d4c622c6ddc2452b7decabd48
    http://security.debian.org/pool/updates/main/k/kdebase/ksplash_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   790584 63cb756955638fafdc53d2061df45a07
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguard_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   436444 4e32bc071ff0e1ee3212f00a6c9dafbd
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguardd_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:    55540 74b9bc80a8b74219196ec70aac75300e
    http://security.debian.org/pool/updates/main/k/kdebase/ktip_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:    80150 2b8ed46e232291e1375112d98ec5273a
    http://security.debian.org/pool/updates/main/k/kdebase/kwin_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   769788 37ba727f18349b26df47730f9fc2ce42
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:   223136 0fe881d1dea5ff06ae8fa605f713a47b
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4-dev_3.3.2-1sarge3_mipsel.deb
      Size/MD5 checksum:    44914 f47bf151969bd6c1e1c28dbbb067a0ab

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   238628 f99a38cf970b338a60f25f630ce98957
    http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   578444 77ee7f9c0f4a39a0993aca9446691ddd
    http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:  7603228 4a345779f5016bb63ffd995c64dbbb44
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   944180 7997a1786fa5c4f78dcb940dff0cb304
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:    57238 24157f3efa35ce6e39da7447aed8b66d
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   719766 c36bb44abdc869fcc2e98f46ee6cec21
    http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   221944 1708658764c085b6737de86a443b72d0
    http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:  1070722 293da857bda93781ec64d085a0ef53e0
    http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   670278 c2360d7aa3a97a71fcdaa4a2d3abf67b
    http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   421410 3e01f92c865cb81e86c55debb09b28b1
    http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   170058 70e84138ed148000d5b407ebc75bf429
    http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   706724 c4e68d7a4afb0df14187f489c944409f
    http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:  2118732 3c9fc2501b8ae595925f897e0cd05fd9
    http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   202502 99a38e80b73e77fccd02ee43cce6897b
    http://security.debian.org/pool/updates/main/k/kdebase/kmenuedit_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   198502 adff972fca7216098f226e55fe3b28cd
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:  2215416 bac7b477a0b78f6f8bb0e0d9ae84ca5b
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror-nsplugins_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   128316 228ba71a1459990f077c875da25a8f9d
    http://security.debian.org/pool/updates/main/k/kdebase/konsole_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   548134 6db9f59261a15e83a97b542341230036
    http://security.debian.org/pool/updates/main/k/kdebase/kpager_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:    94132 4b5d96b74ef1a8efbf4ffc84bc785aa0
    http://security.debian.org/pool/updates/main/k/kdebase/kpersonalizer_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   465088 3c92bdeff93a30599953fe5c16e56dff
    http://security.debian.org/pool/updates/main/k/kdebase/ksmserver_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   122422 eb50e02279dbb27ccf505a52d3d162e9
    http://security.debian.org/pool/updates/main/k/kdebase/ksplash_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   802590 c6e6d421e4cc640094b46b5a6ad3ae9b
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguard_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   443308 fc750c3fe0b69b6825c4770cab71f593
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguardd_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:    54036 4e322fdb150fc55394bc2653eedf6662
    http://security.debian.org/pool/updates/main/k/kdebase/ktip_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:    81300 b4e93f7daf15a9cc949e28282d6c186f
    http://security.debian.org/pool/updates/main/k/kdebase/kwin_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   840712 d5473b090b02abe74d94556085558789
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:   237740 0ffbf0a204d1ef4f3b41b1fbec32901d
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4-dev_3.3.2-1sarge3_powerpc.deb
      Size/MD5 checksum:    44922 f6db9c220bb60095df6367aeb9705431

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   239240 88cfd61d91896f23a334131d3ea60252
    http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   604032 5c4da0d801b3ff733edcb6262338af0d
    http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:  7714428 e45623045829b302f5ba845ec15e2d08
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:  1015340 0cdc5bc93c7bb0a7529a70a339e08b76
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:    57238 a9a1b205601a3779ee92f6ae2fcc41c6
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   710854 c3142fcf22ff5fb1a71f0899cc3a9930
    http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   223222 2790203b70450a679046d583b9899916
    http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:  1069568 4137ed185f9a513aefe6fe6c7fe4a115
    http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   694038 faaf55929e4ac3566851bb4a683f1ba3
    http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   436844 38bc0955905450cd8d2b9e7907c9be93
    http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   184720 05e5b3139bc1da3277a7fbc8127578f2
    http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   719362 41ae429069cb81390122994b84a4ba59
    http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:  2293410 9aa31c7a8726dac06deb9246e0852622
    http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   215776 0b0dd8a2ff5ecde22e52321783646fd0
    http://security.debian.org/pool/updates/main/k/kdebase/kmenuedit_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   204950 962cfb34e5c76c02778e2a261898fa04
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:  2313724 11ae332778a2c907c6d67aabf6f84e14
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror-nsplugins_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   132810 60ceda2ab6884c2eb65bad5065672a1b
    http://security.debian.org/pool/updates/main/k/kdebase/konsole_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   601058 0334b1628ad96212fecc863a49076ead
    http://security.debian.org/pool/updates/main/k/kdebase/kpager_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:    98682 ebbecb55f3d35e7a8b27a532125f8fe3
    http://security.debian.org/pool/updates/main/k/kdebase/kpersonalizer_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   463606 ce0f7d9af786e74d6dbdf82b6eee6424
    http://security.debian.org/pool/updates/main/k/kdebase/ksmserver_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   126006 07c8498a42e0b8699b188f9d7ae86613
    http://security.debian.org/pool/updates/main/k/kdebase/ksplash_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   808284 56b8d2da4b31c35cba910568ccac1659
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguard_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   473678 34eea76bfaf9ad9547fbe9b5eb32fc90
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguardd_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:    52694 9d0a5f6c6e30e6c8035208746e634943
    http://security.debian.org/pool/updates/main/k/kdebase/ktip_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:    80112 e85332e1de5cdc6a68907dfccbd16960
    http://security.debian.org/pool/updates/main/k/kdebase/kwin_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   867690 0cd58f03522c18cfc02816315734b86c
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:   262352 b8f386feeac42dd46305834ad874e737
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4-dev_3.3.2-1sarge3_s390.deb
      Size/MD5 checksum:    44916 412b1bd402c3a1a8c053482a33e07508

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   237274 b2874ba43af4ccd1781fdae648e26aa8
    http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   571122 8f631668682d66f77148ec95e1ae5042
    http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:  7541264 e6df317342dc80cf863102c921e07b07
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   915790 1bebc497990020beb288d087a615782e
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:    57250 f29f8076e8ec425de28aa22c2e3dd0c3
    http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   667858 ff63eca3b4aa2d0be9916b68669eb7bd
    http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   219874 45801435a16ad214bd9207ee2c29865f
    http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:  1056656 fab0b90ef1876b52f9bf98d3e0822a2a
    http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   667150 bac284d3558567429387745a6fc10d7d
    http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   408920 1d76fe066cd4eebd029461f1af5153dd
    http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   171976 4e9deac72de1a2292dccc4ec0ef8beb1
    http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   701988 d0075fce3e089e51d1b2e0c0ba6acb19
    http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:  2080192 3e1d233124be6b596cc8e516b3d2d2cf
    http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   199500 5de7b53f8d4c867b28cd243e3fb3c5ed
    http://security.debian.org/pool/updates/main/k/kdebase/kmenuedit_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   192878 f65c2df32aef0e5723c5655eee3c7270
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:  2188988 bf4ae7e0d672366593caeec1a1c40dbb
    http://security.debian.org/pool/updates/main/k/kdebase/konqueror-nsplugins_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   118298 daeb4e2f999743b466dbfd8af951e0e1
    http://security.debian.org/pool/updates/main/k/kdebase/konsole_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   546034 821d3490b110919122eec22acd8a1d2a
    http://security.debian.org/pool/updates/main/k/kdebase/kpager_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:    92880 cc9b1f68dfe288c251b9f9751611825e
    http://security.debian.org/pool/updates/main/k/kdebase/kpersonalizer_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   463246 b6496ce84eafd20d06f77dcf32c53a99
    http://security.debian.org/pool/updates/main/k/kdebase/ksmserver_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   119260 457e12bb600a9cc9404d17b1dd941bfc
    http://security.debian.org/pool/updates/main/k/kdebase/ksplash_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   793610 c9ca7f399c807554fc63b0632f3c6dac
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguard_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   445120 e1cabc723d742944cffc33f53f4024d0
    http://security.debian.org/pool/updates/main/k/kdebase/ksysguardd_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:    49070 f634b87f8cd385604702233ca6548498
    http://security.debian.org/pool/updates/main/k/kdebase/ktip_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:    79594 a51ccabb5a4fea5d8a245a4f3e67b2a4
    http://security.debian.org/pool/updates/main/k/kdebase/kwin_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   806802 04c6ee6c37389453bc895975fa639b5c
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:   236538 43887c1e8b49498316bd1ec38457facc
    http://security.debian.org/pool/updates/main/k/kdebase/libkonq4-dev_3.3.2-1sarge3_sparc.deb
      Size/MD5 checksum:    44914 75b8dca6a838d151128e9dbb8b96aad1


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE8efNXm3vHE4uyloRArJyAJwP1uZ+demVdkh3yeKZMn/fXXh27ACfdZWq
WUtVITPEF8clA5XiPUgFr74=
=nDG8
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F48048)

SUSE-SA-2006-039.txt (PacketStormID:F48048)
2006-07-09 00:00:00
 
advisory,local
linux,suse
CVE-2006-2449
[点击下载]

SUSE Security Announcement SUSE-SA:2006:039 - The KDE Display Manager KDM stores the type of the previously used session in the user's home directory. By using a symlink a local attacker could trick kdm into also storing content of files that are normally not accessible by users, like for instance /etc/shadow.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                kdebase3-kdm
        Announcement ID:        SUSE-SA:2006:039
        Date:                   Mon, 03 Jul 2006 16:00:00 +0000
        Affected Products:      Novell Linux Desktop 9
                                SUSE LINUX 10.1
                                SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE LINUX 9.1
                                SUSE SLES 9
        Vulnerability Type:     local privilege escalation
        Severity (1-10):        7
        SUSE Default Package:   yes
        Cross-References:       CVE-2006-2449

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             KDM local information exposure
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report.
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   The KDE Display Manager KDM stores the type of the previously used
   session in the user's home directory.

   By using a symlink a local attacker could trick kdm into also storing
   content of files that are normally not accessible by users, like for
   instance /etc/shadow.

   This problem is tracked by Mitre CVE ID CVE-2006-2449 and was
   found by Ludwig Nussel of the SUSE Security Team.

2) Solution or Work-Around

   There is no known workaround, please install the update packages.

3) Special Instructions and Notes

   Please restart all running instances of kdm after the update.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv <file.rpm>

   to apply the update, replacing <file.rpm> with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kdebase3-kdm-3.5.1-69.23.i586.rpm
          6b51aa1795da71a71119cf6aa6820153

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kdebase3-kdm-3.4.2-27.4.i586.rpm
          5b36c9bc7cee1cdde72d7ad70860d596

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kdebase3-kdm-3.4.0-28.4.i586.rpm
          f5a7cc054bf5223057e36aeef4bb2e55

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kdebase3-kdm-3.3.0-29.5.i586.rpm
          e3b919080e181d5854526410675e116e

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kdebase3-kdm-3.2.1-68.53.i586.rpm
          247b449b8b6142ff9ee413acbd4efc57

   Power PC Platform:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kdebase3-kdm-3.5.1-69.23.ppc.rpm
          6db4614fe15867245801e17c72e9c8bd

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kdebase3-kdm-3.4.2-27.4.ppc.rpm
          6366c0536eb41220bd1686513fe6e2c1

   x86-64 Platform:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kdebase3-kdm-3.5.1-69.23.x86_64.rpm
          6c31f10bd18a53f585a1cc6ac45ccbe4

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kdebase3-kdm-3.4.2-27.4.x86_64.rpm
          f606da7a6561ec09fbbb70a467da1790

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kdebase3-kdm-3.4.0-28.4.x86_64.rpm
          fece9cedbe4033094c62124d85fe37cd

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kdebase3-kdm-3.3.0-29.5.x86_64.rpm
          421cfc9dcacc8d1a59009cc849182297

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kdebase3-kdm-3.2.1-68.53.x86_64.rpm
          3456c10099c7c075ef2653e750f0ad72

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

   Novell Linux Desktop 9
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/c43d8bdde8ba418c079df014b739eaa7.html

   SUSE SLES 9
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/292ea0b25bd919ecf3df3ef887f35425.html

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify <file>

    replacing <file> with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made <DATE> using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team <security@suse.de>"

    where <DATE> is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig <file.rpm>

       to verify the signature of the package, replacing <file.rpm> with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum <filename.rpm>

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-subscribe@suse.com>.

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-announce-subscribe@suse.com>.

    For general information or the frequently asked questions (FAQ),
    send mail to <suse-security-info@suse.com> or
    <suse-security-faq@suse.com>.

    =====================================================================
    SUSE's security contact is <security@suse.com> or <security@suse.de>.
    The <security@suse.de> public key is listed below.
    =====================================================================
______________________________________________________________________________

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way. In particular, the
    clear text signature should show proof of the authenticity of the text.

    SUSE Linux Products GmbH provides no warranties of any kind whatsoever
    with respect to the information contained in this security advisory.

Type Bits/KeyID     Date       User ID
pub  2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de>
pub  1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de>

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)

mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU
F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS
FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW
tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It
Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF
AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+
3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk
YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP
+Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR
8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U
8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S
cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh
ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB
UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo
AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n
KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi
BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro
nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg
KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx
yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn
B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV
wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh
UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF
5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3
D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu
zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd
9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi
a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13
CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp
271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE
t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG
B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw
rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt
IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL
rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H
RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa
g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA
CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO
=ypVs
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQEVAwUBRKkhr3ey5gA9JdPZAQJwGAf+J5wt1zWBdHvVTXWeqfh0rfSznNNiLSPz
D7S5JTXG+SG2vKUiF/Vi/CeD5W86CrT3MpHQyVNxrK9P12L5b08Fm5U5hhMwub7V
SJNWC79agPuFMNh0wNqSOhqsfMB/vSwGSdLQ3TnQLHIdAyredmXu0wE52v2BfjPW
HxuOVBRl5Cp4yFwMxWfmTfvqwNIyWdjF7HLzu0xtmYLZw4Mh09MvfnrzyhC3TxNO
fTzxs38Eki2EYdrIIHknnA02GNVLCMDblms4+9q5gAe+tlrVHnS91FJ3zO/qkSZD
4Q6YhosCsnjFZLHTWtZI7dNBlQE9JbEblXs0JdvwFbi9o992lYOh5g==
=wahD
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F47642)

Mandriva Linux Security Advisory 2006.106 (PacketStormID:F47642)
2006-06-26 00:00:00
Mandriva  mandriva.com
advisory,arbitrary,local
linux,mandriva
CVE-2006-2449
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-106 - A problem with how kdm manages the ~/.dmrc file was discovered by Ludwig Nussel. By using a symlink attack, a local user could get kdm to read arbitrary files on the system, including privileged system files and those belonging to other users. Mandriva's mdkkdm also suffers from this same problem and has been patched to correct it. Only Corporate 3 is affected; in Mandriva Linux 2006, mdkkdm is in contribs.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:106
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : mdkkdm
 Date    : June 15, 2006
 Affected: Corporate 3.0
 _______________________________________________________________________
 
 Problem Description:
 
 A problem with how kdm manages the ~/.dmrc file was discovered by
 Ludwig Nussel.  By using a symlink attack, a local user could get kdm
 to read arbitrary files on the system, including privileged system
 files and those belonging to other users.
 
 Mandriva's mdkkdm also suffers from this same problem and has been
 patched to correct it.  Only Corporate 3 is affected; in Mandriva Linux
 2006, mdkkdm is in contribs.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2449
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate 3.0:
 dd234f9831a30157879e25b29a14cf2f  corporate/3.0/RPMS/mdkkdm-9.2-22.1.C30mdk.i586.rpm
 043b4a58f3a101482a21afe8ca5d162b  corporate/3.0/SRPMS/mdkkdm-9.2-22.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 d1350d31ceb08dc68b1184469d23fea5  x86_64/corporate/3.0/RPMS/mdkkdm-9.2-22.1.C30mdk.x86_64.rpm
 043b4a58f3a101482a21afe8ca5d162b  x86_64/corporate/3.0/SRPMS/mdkkdm-9.2-22.1.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEkcuvmqjQ0CJFipgRAhSEAJ0eeFGqcgfB2YzBwE31V158wx//dQCfYpoG
fM8uDiCEkZpXVDvghnJEd10=
=qk90
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F47640)

Mandriva Linux Security Advisory 2006.105 (PacketStormID:F47640)
2006-06-26 00:00:00
Mandriva  mandriva.com
advisory,arbitrary,local
linux,mandriva
CVE-2006-2449
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-105 - A problem with how kdm manages the ~/.dmrc file was discovered by Ludwig Nussel. By using a symlink attack, a local user could get kdm to read arbitrary files on the system, including privileged system files and those belonging to other users.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:105
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kdebase
 Date    : June 15, 2006
 Affected: 2006.0, Corporate 3.0
 _______________________________________________________________________
 
 Problem Description:
 
 A problem with how kdm manages the ~/.dmrc file was discovered by
 Ludwig Nussel.  By using a symlink attack, a local user could get kdm
 to read arbitrary files on the system, including privileged system
 files and those belonging to other users.
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2449
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 726ebca14ef5a2d3bb16b8c5cd586356  2006.0/RPMS/kdebase-3.4.2-55.5.20060mdk.i586.rpm
 67258d27916b2f1094daec6a72cc5a36  2006.0/RPMS/kdebase-common-3.4.2-55.5.20060mdk.i586.rpm
 00c0d00a72f143b7f81ca0f5b2274dc7  2006.0/RPMS/kdebase-kate-3.4.2-55.5.20060mdk.i586.rpm
 8d42b7e78e69cf213be098241a9e8598  2006.0/RPMS/kdebase-kcontrol-data-3.4.2-55.5.20060mdk.i586.rpm
 d672219a07c7bbcc49397ea266f038a0  2006.0/RPMS/kdebase-kcontrol-nsplugins-3.4.2-55.5.20060mdk.i586.rpm
 e9954cab45c6e1d131b46041d4bcce0f  2006.0/RPMS/kdebase-kdeprintfax-3.4.2-55.5.20060mdk.i586.rpm
 d03fadff36a0a9b004348847fa18c927  2006.0/RPMS/kdebase-kdm-3.4.2-55.5.20060mdk.i586.rpm
 3648f9f109ee067dae7508dff745071c  2006.0/RPMS/kdebase-kdm-config-file-3.4.2-55.5.20060mdk.i586.rpm
 2cfc8867c6a00ebe570c288065161901  2006.0/RPMS/kdebase-kmenuedit-3.4.2-55.5.20060mdk.i586.rpm
 fe43cec32fc283385dbfb6f1eda7b69b  2006.0/RPMS/kdebase-konsole-3.4.2-55.5.20060mdk.i586.rpm
 6b187d1d14878e7910141b14055ba53f  2006.0/RPMS/kdebase-nsplugins-3.4.2-55.5.20060mdk.i586.rpm
 2fc45a4e8002ff458d950f3a6f9e25c4  2006.0/RPMS/kdebase-progs-3.4.2-55.5.20060mdk.i586.rpm
 dfb5094f0df1b1cdd28a23b61da3a06f  2006.0/RPMS/libkdebase4-3.4.2-55.5.20060mdk.i586.rpm
 7561375483fcbfcd29df293a0ded800a  2006.0/RPMS/libkdebase4-devel-3.4.2-55.5.20060mdk.i586.rpm
 2b999ec3ca33a8665f6887999d67145f  2006.0/RPMS/libkdebase4-kate-3.4.2-55.5.20060mdk.i586.rpm
 22ffce36b1e6d3c0518bf6c3d209d636  2006.0/RPMS/libkdebase4-kate-devel-3.4.2-55.5.20060mdk.i586.rpm
 17d13b30f1a98c10561a54c90e846120  2006.0/RPMS/libkdebase4-kmenuedit-3.4.2-55.5.20060mdk.i586.rpm
 947d66c0dd9cdb7a9f7e42fffa98b962  2006.0/RPMS/libkdebase4-konsole-3.4.2-55.5.20060mdk.i586.rpm
 d96c8c54b11b12febaa623ef7706773f  2006.0/SRPMS/kdebase-3.4.2-55.5.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 9445b9aa2f63f0954eaf8fe8de0cea2d  x86_64/2006.0/RPMS/kdebase-3.4.2-55.5.20060mdk.x86_64.rpm
 9f38a7226f9ffa9cf4d3e54491c395b4  x86_64/2006.0/RPMS/kdebase-common-3.4.2-55.5.20060mdk.x86_64.rpm
 0b8630897380a181df39a2aafe61429f  x86_64/2006.0/RPMS/kdebase-kate-3.4.2-55.5.20060mdk.x86_64.rpm
 1b3cb9ee7e6ad29efe96fa401c66c06a  x86_64/2006.0/RPMS/kdebase-kcontrol-data-3.4.2-55.5.20060mdk.x86_64.rpm
 4abaa902c27a1c48f66c07b9d15592c5  x86_64/2006.0/RPMS/kdebase-kcontrol-nsplugins-3.4.2-55.5.20060mdk.x86_64.rpm
 f6a797e354ab5e61056e9a6c874361b0  x86_64/2006.0/RPMS/kdebase-kdeprintfax-3.4.2-55.5.20060mdk.x86_64.rpm
 52aefd9b732993a2a38b576623754364  x86_64/2006.0/RPMS/kdebase-kdm-3.4.2-55.5.20060mdk.x86_64.rpm
 d785e9c02f2eabcd814d139472acaede  x86_64/2006.0/RPMS/kdebase-kdm-config-file-3.4.2-55.5.20060mdk.x86_64.rpm
 0d7081df83b791dac816444af85ad2ea  x86_64/2006.0/RPMS/kdebase-kmenuedit-3.4.2-55.5.20060mdk.x86_64.rpm
 26e53b61879d3c2f25452cff9f5eb766  x86_64/2006.0/RPMS/kdebase-konsole-3.4.2-55.5.20060mdk.x86_64.rpm
 7e899e5d166f2bbc2ed83668579281e8  x86_64/2006.0/RPMS/kdebase-nsplugins-3.4.2-55.5.20060mdk.x86_64.rpm
 70c2d41960ad53dd8af05cabd2cfe113  x86_64/2006.0/RPMS/kdebase-progs-3.4.2-55.5.20060mdk.x86_64.rpm
 b7b012c632ba73983474ba6d0b85f3cd  x86_64/2006.0/RPMS/lib64kdebase4-3.4.2-55.5.20060mdk.x86_64.rpm
 6d6a9a5c9695b3168115773214cd5b5d  x86_64/2006.0/RPMS/lib64kdebase4-devel-3.4.2-55.5.20060mdk.x86_64.rpm
 b87ae3232e723ccceba364b26d08ff8b  x86_64/2006.0/RPMS/lib64kdebase4-kate-3.4.2-55.5.20060mdk.x86_64.rpm
 dc0c9a6dee46458bde36960da267f7c3  x86_64/2006.0/RPMS/lib64kdebase4-kate-devel-3.4.2-55.5.20060mdk.x86_64.rpm
 9fc2e0f1146a6c11bde9d839bf42de3a  x86_64/2006.0/RPMS/lib64kdebase4-kmenuedit-3.4.2-55.5.20060mdk.x86_64.rpm
 5fda3b2cd68127accd88dabcbc8d35e9  x86_64/2006.0/RPMS/lib64kdebase4-konsole-3.4.2-55.5.20060mdk.x86_64.rpm
 d96c8c54b11b12febaa623ef7706773f  x86_64/2006.0/SRPMS/kdebase-3.4.2-55.5.20060mdk.src.rpm

 Corporate 3.0:
 ef3b48418d1d820c5e77289e5e13eb51  corporate/3.0/RPMS/kdebase-3.2-79.16.C30mdk.i586.rpm
 7a11e9bdecb4d77155ae20b6ac70e7ca  corporate/3.0/RPMS/kdebase-common-3.2-79.16.C30mdk.i586.rpm
 8f4884ab14d2f4ea1513c2aaba4db23a  corporate/3.0/RPMS/kdebase-kate-3.2-79.16.C30mdk.i586.rpm
 d9ede34c2fc22189fbff4cb6d9142f77  corporate/3.0/RPMS/kdebase-kcontrol-data-3.2-79.16.C30mdk.i586.rpm
 a479eaa99cf9aa9e48ae6ebdec049f46  corporate/3.0/RPMS/kdebase-kdeprintfax-3.2-79.16.C30mdk.i586.rpm
 e76eb27bf6e194353ff1620979bd75bc  corporate/3.0/RPMS/kdebase-kdm-3.2-79.16.C30mdk.i586.rpm
 d9871f5abf93901c53985173e7daa7f1  corporate/3.0/RPMS/kdebase-kdm-config-file-3.2-79.16.C30mdk.i586.rpm
 a50ab9efa112240601053c89921a246e  corporate/3.0/RPMS/kdebase-kmenuedit-3.2-79.16.C30mdk.i586.rpm
 fb27cc11388706d3ff1503a53aef9fd7  corporate/3.0/RPMS/kdebase-konsole-3.2-79.16.C30mdk.i586.rpm
 5d2c5d750aab6d938e0ba2977c1e3e94  corporate/3.0/RPMS/kdebase-nsplugins-3.2-79.16.C30mdk.i586.rpm
 0b08427948257b69d387d2cb8ef84e24  corporate/3.0/RPMS/kdebase-progs-3.2-79.16.C30mdk.i586.rpm
 2dd212d67fefe8e08a6a1bcec4c8872c  corporate/3.0/RPMS/libkdebase4-3.2-79.16.C30mdk.i586.rpm
 5aece054b5eb7615f55d79f8beff81e8  corporate/3.0/RPMS/libkdebase4-devel-3.2-79.16.C30mdk.i586.rpm
 8e690cad1ced882f2705058b7cf1e029  corporate/3.0/RPMS/libkdebase4-kate-3.2-79.16.C30mdk.i586.rpm
 9fed5c34ec8dfcf1a16c085641920e08  corporate/3.0/RPMS/libkdebase4-kate-devel-3.2-79.16.C30mdk.i586.rpm
 f3dcfab1dfba92511bbfc0f6f2da6b30  corporate/3.0/RPMS/libkdebase4-kmenuedit-3.2-79.16.C30mdk.i586.rpm
 b9f199e99430a55b6d20476d1a71af05  corporate/3.0/RPMS/libkdebase4-konsole-3.2-79.16.C30mdk.i586.rpm
 bd1e5da137831c0ed7dfe490109da83e  corporate/3.0/RPMS/libkdebase4-nsplugins-3.2-79.16.C30mdk.i586.rpm
 fee4d611492e726bd8331f5c41885e82  corporate/3.0/RPMS/libkdebase4-nsplugins-devel-3.2-79.16.C30mdk.i586.rpm
 a07f41acf5e23f73458caea242b17df7  corporate/3.0/SRPMS/kdebase-3.2-79.16.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 c6c8cdd25d44d7ec8ce846f3cf200a59  x86_64/corporate/3.0/RPMS/kdebase-3.2-79.16.C30mdk.x86_64.rpm
 90e827dc3f1466d8bf8a1d93b6fe5274  x86_64/corporate/3.0/RPMS/kdebase-common-3.2-79.16.C30mdk.x86_64.rpm
 7994f4858992febb3476e74bdef18c78  x86_64/corporate/3.0/RPMS/kdebase-kate-3.2-79.16.C30mdk.x86_64.rpm
 6370d0bbc319e459e2f57b76afa5d8ca  x86_64/corporate/3.0/RPMS/kdebase-kcontrol-data-3.2-79.16.C30mdk.x86_64.rpm
 ea4a3e76df7385c1e822de4b5ebd1b74  x86_64/corporate/3.0/RPMS/kdebase-kdeprintfax-3.2-79.16.C30mdk.x86_64.rpm
 ae72ad4feb487c5e140a37481d0b9ed1  x86_64/corporate/3.0/RPMS/kdebase-kdm-3.2-79.16.C30mdk.x86_64.rpm
 32d7826318e11489a1920cee6b546328  x86_64/corporate/3.0/RPMS/kdebase-kdm-config-file-3.2-79.16.C30mdk.x86_64.rpm
 0eb3518324296234429c450eba0034c8  x86_64/corporate/3.0/RPMS/kdebase-kmenuedit-3.2-79.16.C30mdk.x86_64.rpm
 bb6ccf30e34f5814b32887b99a9469a8  x86_64/corporate/3.0/RPMS/kdebase-konsole-3.2-79.16.C30mdk.x86_64.rpm
 16d283884747b1fe328146c61caae36c  x86_64/corporate/3.0/RPMS/kdebase-nsplugins-3.2-79.16.C30mdk.x86_64.rpm
 d678ca184d5b2a46bb271d69a4cdbabe  x86_64/corporate/3.0/RPMS/kdebase-progs-3.2-79.16.C30mdk.x86_64.rpm
 c2fc2aee9289b43f2ee501e5592e199d  x86_64/corporate/3.0/RPMS/lib64kdebase4-3.2-79.16.C30mdk.x86_64.rpm
 1967f8b2a1dc08ce6492cf8a5d066f49  x86_64/corporate/3.0/RPMS/lib64kdebase4-devel-3.2-79.16.C30mdk.x86_64.rpm
 f0780b73632275d602d1f72ced0a83cc  x86_64/corporate/3.0/RPMS/lib64kdebase4-kate-3.2-79.16.C30mdk.x86_64.rpm
 0551d850ad5ef4868238a23b4b2d4361  x86_64/corporate/3.0/RPMS/lib64kdebase4-kate-devel-3.2-79.16.C30mdk.x86_64.rpm
 3b1cd784425760243654923bce43a838  x86_64/corporate/3.0/RPMS/lib64kdebase4-kmenuedit-3.2-79.16.C30mdk.x86_64.rpm
 397953a52f385954f0108cb86b69ba62  x86_64/corporate/3.0/RPMS/lib64kdebase4-konsole-3.2-79.16.C30mdk.x86_64.rpm
 c72de4cb208b6f08a332295fd78f9438  x86_64/corporate/3.0/RPMS/lib64kdebase4-nsplugins-3.2-79.16.C30mdk.x86_64.rpm
 0f545f5f9bde740c50000d5c373bfd11  x86_64/corporate/3.0/RPMS/lib64kdebase4-nsplugins-devel-3.2-79.16.C30mdk.x86_64.rpm
 a07f41acf5e23f73458caea242b17df7  x86_64/corporate/3.0/SRPMS/kdebase-3.2-79.16.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEkcIjmqjQ0CJFipgRArzBAJ9Mo70yiJi66DQdJzv8DrtsURPp7QCfd3tJ
iehgJbnn4Z83wR9MRrNl3GE=
=NX9g
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F47631)

rPSA-2006-0106-1.txt (PacketStormID:F47631)
2006-06-26 00:00:00
rPath  
advisory,arbitrary
linux
CVE-2006-2449
[点击下载]

KDM allows the user to select the session type for login. This setting is stored in the user home directory. Previous versions of KDM will follow a symbolic link and can thus disclose the contents of any file on the system (such as /etc/shadow) to arbitrary users. KDM is not the default window manager on rPath Linux.

rPath Security Advisory: 2006-0106-1
Published: 2006-06-15
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
    Local Root Deterministic Information Exposure
Updated Versions:
    kdebase=/conary.rpath.com@rpl:devel//1/3.4.2-3.11-1

References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2449
    http://issues.rpath.com/browse/RPL-425
    http://www.kde.org/info/security/advisory-20060615-1.txt

Description:
    KDM allows the user to select the session type for login. This setting
    is stored in the user home directory. Previous versions of KDM will
    follow a symbolic link and can thus disclose the contents of any file
    on the system (such as /etc/shadow) to arbitrary users. KDM is not the
    default window manager on rPath Linux.
    

- 漏洞信息 (F47554)

Ubuntu Security Notice 301-1 (PacketStormID:F47554)
2006-06-21 00:00:00
Ubuntu  ubuntu.com
advisory,arbitrary,local
linux,ubuntu
CVE-2006-2449
[点击下载]

Ubuntu Security Notice 301-1 - Ludwig Nussel discovered that kdm managed the ~/.dmrc file in an insecure way. By performing a symlink attack, a local user could exploit this to read arbitrary files on the system, like private files of other users, /etc/shadow, and similarly sensitive data.

=========================================================== 
Ubuntu Security Notice USN-301-1              June 14, 2006
kdebase vulnerability
CVE-2006-2449
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  kdm                            4:3.4.0-0ubuntu18.3

Ubuntu 5.10:
  kdm                            4:3.4.3-0ubuntu7

Ubuntu 6.06 LTS:
  kdm                            4:3.5.2-0ubuntu27

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Ludwig Nussel discovered that kdm managed the ~/.dmrc file in an
insecure way. By performing a symlink attack, a local user could
exploit this to read arbitrary files on the system, like private files
of other users, /etc/shadow, and similarly sensitive data.

Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.0-0ubuntu18.3.diff.gz
      Size/MD5:   189940 e438b29d3f1d6aa5eba23a66db0cb73c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.0-0ubuntu18.3.dsc
      Size/MD5:     1622 fe4317d23fded7349420082dbdfe6011
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.0.orig.tar.gz
      Size/MD5: 26947670 31334d21606078a1f1eab1c3a25317e9

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-data_3.4.0-0ubuntu18.3_all.deb
      Size/MD5:  4609190 bec4425639d4eaffeb7701e791e8aa36
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-doc_3.4.0-0ubuntu18.3_all.deb
      Size/MD5:  1084806 686cea67b31fcbe95eafabb4ca07a271
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.0-0ubuntu18.3_all.deb
      Size/MD5:    22270 5a36a1b6724fb9657bf4764f7d65d126
    http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase/xfonts-konsole_3.4.0-0ubuntu18.3_all.deb
      Size/MD5:    38168 92671967a67838d37112766397c56358

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kappfinder_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   245484 85c67d8bd907d9ea1826a94690e89993
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kate_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   654568 145ce29e15e283daa64fb09cfa70d239
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kcontrol_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:  7957814 277ab5dd8c5f1180336da92cdf7d2be0
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-bin_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:  1153030 772de41db9421d79b844f92820185eb8
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-dev_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:    61226 ecfaa369e4d60993b39d7ffa23cb1b51
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-kio-plugins_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   807912 6e40af9f21f2cc39e1b1d5524536abbe
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdepasswd_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   227242 672640000f24b4c7d8d50db81beef16e
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdeprint_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:  1100448 8114ce60f71f1f718ea566ca12143879
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdesktop_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   740256 9b9b18314d3388e4d85a5c960aeb35ec
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdm_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   671020 c029ee377d2e5f8c3d44282c2fdcb235
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kfind_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   185904 93359b04094c97310efc680327d21b83
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/khelpcenter_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:  1784496 20cda592949f1c31fd9513f82a5da15a
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kicker_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:  1805922 f6802bffc8088a8b47d5d5275c15016a
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/klipper_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   245470 678c227f14ed6323d3091a83f7a33ba7
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kmenuedit_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   207036 9ccc5cf4cf116d9ce4bff3e6706ce2cc
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror-nsplugins_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   135464 060a9cb2af2364fba0141f8ac9bf03fb
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:  2081958 3f8dad170e937186fea8a20cd7aa844e
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konsole_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   596846 3a4733100b599bfcb48743c88c7f0ab4
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpager_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   100762 fbcf6b98dc822a7aeb548c8a35fd7692
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpersonalizer_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   473484 847bf77ef49c1e504aaf82c34fa58780
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksmserver_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   142270 70af381f94ff4d14416d6a04ff5e67f3
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksplash_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   811260 b8b566739055cc1c26604b899d5979e7
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguard_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   490464 2419db6a10f12b3290d8caad92c6ba1b
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguardd_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:    56846 397c997beeae85a8891e6e9e946e5c24
    http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase/ktip_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:    80620 be40977f281cb168f7991b64d605cfa6
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kwin_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:  1013850 e1ee4b746ef57adfc0dfd5bdfbcbcf12
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4-dev_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:    48810 ad7eb3a3a8af0513bdb2b280c79a937e
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4_3.4.0-0ubuntu18.3_amd64.deb
      Size/MD5:   262192 ac0eab0709bc3ab7541f86296d6b23de

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kappfinder_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   243890 660a6a881dacdbf7937e8d7bc4502050
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kate_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   630630 e8680a4079b68dbd0a865f0098979c19
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kcontrol_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:  7787212 6af0c90fcda6049079cd8604068cfc88
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-bin_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:  1071470 0c20d9f729d4552a069ab87b1859e39b
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-dev_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:    61232 68c34abc1a62c10d88fa5a7aa1ceec08
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-kio-plugins_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   738994 7d3917856ce95774dfa8a8a3297fc8c0
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdepasswd_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   222672 af64f49f672f882b2233d06e3168545f
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdeprint_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:  1085644 3c6ff91c2cfd4632af430fb47ac49db6
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdesktop_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   717670 3ac7e669cb753e1a9e8413e24d23b754
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdm_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   634776 1113ca6b28ef913c597ce90b99f61276
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kfind_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   176212 237e4f607bd4e1faeb4c545e6ab3fd92
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/khelpcenter_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:  1769426 c090b3748ff1d28668f4092ba2edeec0
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kicker_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:  1691978 5c30a03e600cbc49eff4fae62d3261f5
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/klipper_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   231050 ba0c128834ce90675da2598fa237b51d
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kmenuedit_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   198620 0b342239caf8c132c19202fc6b5c01da
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror-nsplugins_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   124216 933951a86a2bb456921eeabf378f67d8
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:  2009026 d5f168dee1bac7fc9422fc4df0250fb0
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konsole_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   571048 983e7539c51e9b45b0fe00df07e20981
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpager_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:    95932 563b1bda4a10604becb3f0c072d694ad
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpersonalizer_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   465902 ff9f512c80f3599d042ebb9e566baeb9
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksmserver_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   137490 44e6d38f88d1fe42c664c38734eaa7de
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksplash_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   799896 51426fa0f14a3aa9c0174b04d57e0ffd
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguard_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   465356 7a325423818601d99f79fe74b464a063
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguardd_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:    49972 447ae9a370dee587b6200d33a39d8be8
    http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase/ktip_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:    80224 7332cbfa7d238d2f52d5d4afb9e48d37
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kwin_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   959976 14e294f73c98f7c925c6e07044261c36
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4-dev_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:    48806 7e0e2304972c7243948d9c9cd79c1dd2
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4_3.4.0-0ubuntu18.3_i386.deb
      Size/MD5:   248938 91322121e756433477e353b66d520b0b

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kappfinder_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   244694 83497f898eca7748e65cf07aa3f3aac2
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kate_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   632174 fa949ded6cb47c398f2cf606eb0e1767
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kcontrol_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:  7805390 f1c79a2f50ad8ea24921d8ba35c69868
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-bin_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:  1080016 6a43947eded45e87f1e2d87c6bcc3305
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-dev_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:    61238 86b0df47495cded9e990ed429813163e
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-kio-plugins_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   800074 69bb476fae00bba2a70cce61e4476c22
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdepasswd_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   223308 8ee47e71ccb8f68d857b257f7c831823
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdeprint_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:  1098688 e101915e20c9a3b3b0b6c0dafbc5069c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdesktop_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   718916 e4e7ea77cec0c02159e1496ac87488e6
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdm_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   653138 3f8b8e9c0811a825d7c87711661f6fab
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kfind_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   171094 2ca1af6763d51bec3cadae52645774b7
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/khelpcenter_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:  1771340 dbe9ca8152099b56b5d0ea49a0622ce1
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kicker_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:  1717632 00ecf952f2e80f8efa3fb1605dc8c175
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/klipper_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   232142 8701b300bf1544fedeb409d79f04c382
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kmenuedit_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   200954 827b9e68b00b50de2bbbf7b260cff8ab
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror-nsplugins_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   131522 f7b46e6d0be8ece96280751acc3dfef9
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:  2012804 945bafc74542a72f1add36a0721df6f4
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konsole_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   564468 3923549dfacd5e59ff723701be335bbf
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpager_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:    96678 ac1372ca305e11dc34f31743f3ec4c3b
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpersonalizer_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   467384 127b173083641506379c5d5998e5b13a
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksmserver_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   140006 f543ceb437d44f4e959375535ff8e463
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksplash_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   805790 a8b5a873d8a4de443705ec6b813aac33
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguard_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   446472 5f96d37df29a2a7c95953f56636642e4
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguardd_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:    56746 c45cd751b9e03408d15d1b144e11d510
    http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase/ktip_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:    81854 c12bdcf6e0a71ef165458345f663a139
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kwin_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   970396 9ffebf6a23954aa2e792ec718a34dbe9
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4-dev_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:    48814 524e4713f09eaa22ffcdc9c256431f9c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4_3.4.0-0ubuntu18.3_powerpc.deb
      Size/MD5:   244548 f4f7a1b24dde93bbea8b291a909d6967

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.3-0ubuntu7.diff.gz
      Size/MD5:   263901 c6fccdcf32bb5dcf2b01beb7811c9390
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.3-0ubuntu7.dsc
      Size/MD5:     1673 b25d51499caf21808cfc0f6b11024b4b
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.3.orig.tar.gz
      Size/MD5: 26670676 cdb4c65ff043b38f905abc957890da8f

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-data_3.4.3-0ubuntu7_all.deb
      Size/MD5:  4188102 71cb8f73bdee0edc1999fa52516223b1
    http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase/kdebase-doc-html_3.4.3-0ubuntu7_all.deb
      Size/MD5:   331164 7b6dab224c4497396c94d98521a54373
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-doc_3.4.3-0ubuntu7_all.deb
      Size/MD5:  2581326 e13ce1ddd2f343adc4b9330323a8ef49
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.4.3-0ubuntu7_all.deb
      Size/MD5:    33626 2e1cfad5104728c988e97957f7af96a5
    http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase/xfonts-konsole_3.4.3-0ubuntu7_all.deb
      Size/MD5:    49346 178b92a10fe7bc49a3a548d594115b9a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kappfinder_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   260578 ba713512542bb69dbde44debd8bf7ea8
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kate_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   662942 cda2690f65a11d7d56210cc4e0aa9876
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kcontrol_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:  8044780 b691752b53e75a4bcfe5d11ca494ca55
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-bin_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:  1167458 ec8e4f92617bf3d4ecbd3873d2ba8623
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-dev_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:    72392 7a4ffca326dd19d22b7691ea91f4fbf5
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-kio-plugins_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   839090 a45e9a4049b9ef1e78cad23164757d81
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdepasswd_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   241994 7231eb99277ecb93b33eaabefbeb6020
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdeprint_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:  1105936 d4dd04c7344fcc01b74811a65e452c4f
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdesktop_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   758310 8ed08d913434392c97ca665bd34e9b15
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdm_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   643340 192ee57754bc3b8dc7541dd2c9283d19
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kfind_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   204052 e6b4a3f2eecdd0d0145ba29a19d853ba
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/khelpcenter_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:  1805018 03c5a29b197c8593bba692099b073540
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kicker_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:  1851448 259e1961f1c9e3ecfc93f9bccce108bc
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/klipper_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   261772 1fcbaf61e2dc7dd2e6e1939a062128c4
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kmenuedit_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   225198 040ab79286a8258c6870618fc80564c3
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror-nsplugins_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   147596 3a48c960bf7789571570ae3636ee9469
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:  2130996 cb3ee4d798b03ac105d0d5bdf678a4ba
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konsole_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   623188 f10f84f46a27b4550b2d9065cc320a1c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpager_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   112874 61ce9550d698ab3876d5a140806b3d10
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpersonalizer_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   490336 1ff17c58fa18c19cb79a2be9421d0b32
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksmserver_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   153410 865d1a41c217b29efc4ca013f5e6678a
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksplash_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   824942 50e4239e02bd2059fca870743ada5c9e
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguard_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   513584 9babca38b4ec4a554968756a1f948cc1
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguardd_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:    68204 978dbbd6ced5cbb5827249fab08cda3e
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ktip_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:    92464 e7ecd89501d6ec0dc7ff5f0fa31da41b
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kwin_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:  1050090 2aeac46590a466c353848cdef8ecc394
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4-dev_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:    59806 6181cbed12df651d39c75469cc83c0a5
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4_3.4.3-0ubuntu7_amd64.deb
      Size/MD5:   279640 434253514f5abbf71b56768e7036b0e3

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kappfinder_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   258336 2d3373025ec942090989c64d3f8fb5d3
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kate_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   627088 a78ec756d8ecaca460ec4f35d0d38ede
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kcontrol_3.4.3-0ubuntu7_i386.deb
      Size/MD5:  7771322 101c91f44bfe1b10548d0320c99ae51c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-bin_3.4.3-0ubuntu7_i386.deb
      Size/MD5:  1052102 27712757bd74880774dcb4ededdf7f00
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-dev_3.4.3-0ubuntu7_i386.deb
      Size/MD5:    72376 6934b3f42206233ff61f78c25b8ddcfa
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-kio-plugins_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   733408 cd048bcc5a79187368d2b1364ef0c74a
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdepasswd_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   235182 2e0c4cd9cf663f666e580b12edfc9841
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdeprint_3.4.3-0ubuntu7_i386.deb
      Size/MD5:  1083720 327b3b4b31021d4e4963dc99cfd0e4b5
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdesktop_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   728116 9a07e291ac9b81a9637c2c1ca672cae7
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdm_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   601332 f716be6b26b0837c2e7db09ad0728a81
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kfind_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   189416 d451da9126829d6dc75eec6745d8fe26
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/khelpcenter_3.4.3-0ubuntu7_i386.deb
      Size/MD5:  1781536 cccbf48c038aa970662c66c8ae906068
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kicker_3.4.3-0ubuntu7_i386.deb
      Size/MD5:  1686986 c987e790386cc332624925b6eaa56535
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/klipper_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   242416 af1a8667be8ca4ad4b95819a0766b54f
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kmenuedit_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   208450 772fd7cbd7c3e196cc57c30954072669
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror-nsplugins_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   133142 1e10939ecc8666e6330e6482f04939c5
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror_3.4.3-0ubuntu7_i386.deb
      Size/MD5:  2010934 c3d7d0013e577fb57a2a5ec34a88a0a1
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konsole_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   577274 484e14181f65794c8ca98ecc91838336
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpager_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   107094 1a58eb024448d2dee1b07139c42109d2
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpersonalizer_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   481110 8cb98aff0763bd14b9c39b8034b3303d
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksmserver_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   145886 dd7ae0e57d80b46d8b416fe662132bd4
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksplash_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   808456 28e417a53f8056bbdabc0e60254e1eb6
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguard_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   463098 37e4395342a5321b611d38cf97f12b48
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguardd_3.4.3-0ubuntu7_i386.deb
      Size/MD5:    60642 1ac7135ad0b10ea737a71319aa010c8f
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ktip_3.4.3-0ubuntu7_i386.deb
      Size/MD5:    92084 bfc5e092b000d2ce29d2366b3ab2887a
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kwin_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   967100 1f81e9ff04f2459ec3797d63de55ed9c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4-dev_3.4.3-0ubuntu7_i386.deb
      Size/MD5:    59806 c9c70e80db5ce1f1bf9f81d8a74c195d
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4_3.4.3-0ubuntu7_i386.deb
      Size/MD5:   251356 fa02e56461f0f101a67214e6299e9e32

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kappfinder_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   259836 9adb402c9078a4ca87337517919dc541
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kate_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   640320 19edc66e7d56e3ada40462ddf700211c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kcontrol_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:  7889332 edc79ee64658f6089c14905e5e459a1d
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-bin_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:  1089878 9ec1b44142e8a86b0638c797a8425101
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-dev_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:    72394 e41ddede4f9ca460a2c8e2fe76a8566c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-kio-plugins_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   817970 a28abda8671715d5c243bed2d739d981
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdepasswd_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   237488 86f84ee34c99bfdeff8da24041ebf2a7
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdeprint_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:  1102268 43091b86c8db9d5348d0f3e26e776040
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdesktop_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   734286 5f8c33cf29b9a4fc4af6709b1e1f31c3
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdm_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   625018 63044667d5fedf533a5d5a79c588943e
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kfind_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   189542 a9dab42865d5c9b7d1fd7593a71441b0
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/khelpcenter_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:  1790174 3f0ae5b89d2daedbbf691b4112c6e14f
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kicker_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:  1757378 6385c6adfbca8da0dae685b729df6dba
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/klipper_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   247130 5d0126b31cdd5ec1c288103373027e65
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kmenuedit_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   218556 c53ae06835585bc627da3bf5f1608652
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror-nsplugins_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   142326 6fc19f4079df4ba120b5c4869166e4c3
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:  2047006 ad8bbf25aa1e9a51031edc3964ca8c1e
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konsole_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   589138 ec0f6e68e0bac6b09f09ae00a8411995
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpager_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   109052 299a609641d083d151100fb096a6a67a
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpersonalizer_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   485520 c46ae219f5a949f348ced8f3d3b7000a
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksmserver_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   151330 46d3959625ba520064436fe3fe70a4cd
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksplash_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   819082 0f6b6dd738044c6bfdcba786fbdc7cd7
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguard_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   472922 1e81770390f207903e32fe0e714d17cd
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguardd_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:    67880 2b8940f28ef23b0d1a63464574795960
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ktip_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:    93792 e4d975ba20e8cb0aa038255a17af25b4
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kwin_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:  1015652 9323f5d90dcfb76daeeb18ee260e489b
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4-dev_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:    59810 761f95e09da365ed5f890306a03d275e
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4_3.4.3-0ubuntu7_powerpc.deb
      Size/MD5:   258428 75339e0e52e958cc7464b2ac85de2c78

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.5.2-0ubuntu27.diff.gz
      Size/MD5:  1543570 cffda29aa6bf07274634902fb1f90e15
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.5.2-0ubuntu27.dsc
      Size/MD5:     1713 438fab3b19d72d4ede6a68deeaf644ce
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.5.2.orig.tar.gz
      Size/MD5: 28211532 e65a13408f863c3b41382561e9de5ffd

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-data_3.5.2-0ubuntu27_all.deb
      Size/MD5:  5770442 707c636aa1dada8df1e7df056961e19c
    http://security.ubuntu.com/ubuntu/pool/universe/k/kdebase/kdebase-doc-html_3.5.2-0ubuntu27_all.deb
      Size/MD5:   376154 58aca5cf18b56a272d5d698aba1d5856
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-doc_3.5.2-0ubuntu27_all.deb
      Size/MD5:  1792554 bcb3f99712aa7892982eb3adbeb036d3
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase_3.5.2-0ubuntu27_all.deb
      Size/MD5:    38978 4e964d1a3a8afc18d854b394be96694c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kappfinder_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   283512 b8aad4edc2b2c75bb3fde3ade599d39c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kate_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   806666 b2dccd2a0cb57625748926dc854bd46f
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kcontrol_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:  8248346 4cc21256e0b1d24d6df25e4697c48ffa
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-bin_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:  1155948 7b32e73efc5315d65fcc8d937728c279
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-dev_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:    78344 9350bb47a6963cc1f2fb1582ee6edb5c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-kio-plugins_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:  1121140 2af48dd8c063fc07d23adf48a2c2eea8
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdepasswd_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   246314 ac101e184bece400594801a7bfaf6ca8
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdeprint_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:  1307238 0a9f7a94266797485c8bddb5424900c2
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdesktop_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   789692 9416b4c458b36842d56a07dd86027a3b
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdm_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   659228 40705d873dd2ee85900c55e1593f5ebe
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kfind_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   210902 9e5d60e33478491c9231103beda68289
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/khelpcenter_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:  2020370 7e45cdca0f074dadfc32c4b1871538ed
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kicker_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:  2083834 b0a81f60ed09fc5e44d88dd0aa37f2c7
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/klipper_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   287378 a66f8abbd050da9f1c6c522ebe2f08c8
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kmenuedit_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   388086 f2eb9194184d12e2ccb2314dfd9b1930
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror-nsplugins_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   153234 d35fc525391bd33cd81fd23706d0d330
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:  2074312 4b787ed0bb28edc9d0cbbdfd1a24a439
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konsole_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   737376 0afe5723a5a9c2f170d9b9dce4d74855
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpager_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   119730 47b80cadc459bb95e40f04b9865db21d
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpersonalizer_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   495104 0864313d03c975fe8e1c0502b447dab7
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksmserver_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   163160 8f3cea5b0a0ff201403d6ac26d0f5a57
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksplash_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   720296 5d1fc0a087d0400c59bf79bd3b595a2a
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguard_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   528426 d8482164ab6ffad10873c30e431c9882
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguardd_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:    73992 3858c8eaa834c595cfc7c9de9def5cdb
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ktip_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   106434 ce836ec3fe22721166cdf077978105c0
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kwin_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:  1061696 9c298d396006969142ac91972a82e264
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4-dev_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:    64996 fccb0c230d7ec2e186105c8df69b7826
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4_3.5.2-0ubuntu27_amd64.deb
      Size/MD5:   284778 9a48b19f99ff22f6b4df5c213362ee20

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kappfinder_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   281294 e124e974b02a6c60999e76c29575fd2d
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kate_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   772594 c1feec00157b706e01bf0afd8546fda0
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kcontrol_3.5.2-0ubuntu27_i386.deb
      Size/MD5:  7965508 e2d0d4d74031f0bb478af87e7e11e890
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-bin_3.5.2-0ubuntu27_i386.deb
      Size/MD5:  1061682 49078a3d7b5272857815922b174e5f73
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-dev_3.5.2-0ubuntu27_i386.deb
      Size/MD5:    78334 a83567ce7567507f338c915c6e0e34b2
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-kio-plugins_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   982816 a89b37633cf316446e464907b7092294
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdepasswd_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   239696 27ab3462d4bc09122fe4fc1c7936815d
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdeprint_3.5.2-0ubuntu27_i386.deb
      Size/MD5:  1285560 0bb4ca8644be748d0f5b9880a413d930
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdesktop_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   757798 0e1a01344c9bcfaeb51eba750c78cd4f
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdm_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   615294 6091c389ad0156374328357a23be4ab0
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kfind_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   196814 9ee4ff8b33944220f748cf9adbe9af19
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/khelpcenter_3.5.2-0ubuntu27_i386.deb
      Size/MD5:  1997362 05ebc639d9cf9a13d17bdb9a1c039de1
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kicker_3.5.2-0ubuntu27_i386.deb
      Size/MD5:  1900332 a533d681135b56a9473fdd357db64d13
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/klipper_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   266226 a766f2a0a3449b4311068d500b859ca6
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kmenuedit_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   372544 fe40c5b7cf9bb07662f0616345282168
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror-nsplugins_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   138414 8587ce30ba20738946915909b0d68fc9
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror_3.5.2-0ubuntu27_i386.deb
      Size/MD5:  1957310 cd11deeb05cff9090ce0ec4cfb19499b
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konsole_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   689752 c7952af89c297498938b61ece931df1f
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpager_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   113896 49ba6db8d5431d2c35953b6ecf549a27
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpersonalizer_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   485692 2f5b06339fb9dc50613614c386decec6
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksmserver_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   155058 9593ae809c557b5790ba6faf8fbf31d1
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksplash_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   703880 e069706bd4c23b3f08e5228235c5dfef
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguard_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   478310 755b764d72ead745e136ddfd2f035072
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguardd_3.5.2-0ubuntu27_i386.deb
      Size/MD5:    65864 98f7e1c38b3c2b3027f5390017d107a7
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ktip_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   106010 01b56fbe087d3740c8389f2041d85404
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kwin_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   980904 12ecee767e7aad30f2b604072ce535f5
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4-dev_3.5.2-0ubuntu27_i386.deb
      Size/MD5:    64996 eb7bd664367af9eb57132f06bbcc1b04
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4_3.5.2-0ubuntu27_i386.deb
      Size/MD5:   258150 9c9a6b329fde1722bcc265069c27ee21

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kappfinder_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   283016 be2e8da0ad6809beafc7003fb5b1f7a1
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kate_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   782734 4bc9fe16bd9f3b6a0f50d85b4f7fd194
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kcontrol_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:  8088440 00fa039ffdeaf830f59374b4a0d38558
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-bin_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:  1107572 d679239ab2903cf49a134a77c63647a9
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-dev_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:    78348 d0acb0af34e86593232ba5713300e940
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdebase-kio-plugins_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:  1077792 a0b44c84455b563f15581699b4cf8f71
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdepasswd_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   242012 8766e4acbd542013abe4b9a7079bb36c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdeprint_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:  1303300 3ae50eea8fd3c7e2020eab1a03758394
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdesktop_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   765622 6d74fe4ececb4c5a7f28e6a88136297c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kdm_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   640508 8121c04bf56c9362be27d332d7112519
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kfind_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   196832 7165467b844405dd6df32454b7066e14
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/khelpcenter_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:  2006016 e1b5f733747b20eb60c431caf4dc7887
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kicker_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:  1980194 ba755582de1cf7a49f91585588e11bdd
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/klipper_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   270710 9e5abfffb765d5f21c856ba1447893da
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kmenuedit_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   380140 b3a0e8cecf2a69649c74ff2990cc119b
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror-nsplugins_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   147786 f5fe5644f5aa34ab618d0e1ddb05f80a
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konqueror_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:  1981320 c93bd9e0567dee5ec704a3ba146769fb
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/konsole_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   703124 9029190a1ce07ff2faaf281381fea147
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpager_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   115640 4f423c9bb50da6eb0a9097e40e498e8c
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kpersonalizer_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   490052 ea91c3d08aa0e87d377bb17e5233ead6
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksmserver_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   160640 ebd860eebc04578699be73f037e1b998
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksplash_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   714518 e842a6e87af7e85f869959bfd823fe8f
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguard_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   485070 4dadb5e6535c75d339d94da725fddbc2
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ksysguardd_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:    73908 263a8d122dc5197302f2dc6754e7b5cb
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/ktip_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   107782 540f9abebb333b83d6c6784318234325
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/kwin_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:  1027752 9bc7298c203cdc4d6ec07b940e3df128
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4-dev_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:    65004 c43aea9af433b0dfeb448f17bf3e314d
    http://security.ubuntu.com/ubuntu/pool/main/k/kdebase/libkonq4_3.5.2-0ubuntu27_powerpc.deb
      Size/MD5:   264436 542b3071a75d609efb0bfdbb3dcb5c75
    

- 漏洞信息 (F47550)

KDE Security Advisory 2006-06-14.1 (PacketStormID:F47550)
2006-06-21 00:00:00
KDE Desktop  kde.org
advisory
CVE-2006-2449
[点击下载]

KDE Security Advisory - KDM allows the user to select the session type for login. This setting is permanently stored in the user home directory. By using a symlink attack, KDM can be tricked into allowing the user to read file content that would otherwise be unreadable to this particular user. This vulnerability was discovered and reported by Ludwig Nussel. Affected is KDM as shipped with KDE 3.2.0 up to including 3.5.3. KDE 3.1.x and older and newer versions than KDE 3.5.3 are not affected.

KDE Security Advisory: KDM symlink attack vulnerability
Original Release Date: 2006-06-14
URL: http://www.kde.org/info/security/advisory-20060614-1.txt

0. References

        CVE-2006-2449


1. Systems affected:

	KDM as shipped with KDE 3.2.0 up to including 3.5.3. KDE 3.1.x and
	older and newer versions than KDE 3.5.3 are not affected. 


2. Overview:

	KDM allows the user to select the session type for login. This
        setting is permanently stored in the user home directory. By
        using a symlink attack, KDM can be tricked into allowing the
        user to read file content that would otherwise be unreadable
        to this particular user. This vulnerability was discovered
	and reported by Ludwig Nussel.
       

3. Impact:

	KDM might allow a normal user to read the content of /etc/shadow
        or other files, which allows compromising the privacy of another
        user or even the security of the whole system.

4. Solution:

        Source code patches have been made available which fix these
        vulnerabilities. Contact your OS vendor / binary package provider
        for information about how to obtain updated binary packages.


5. Patch:

        A patch for KDE 3.4.0 - KDE 3.5.3 is available from
        ftp://ftp.kde.org/pub/kde/security_patches :

	9daecff07d57dabba35da247e752916a  post-3.5.0-kdebase-kdm.diff

        A patch for KDE 3.3.x is available from
        ftp://ftp.kde.org/pub/kde/security_patches :

	f2e1424d97f2cd18674bef833274c5e3  post-3.3.0-kdebase-kdm.diff

        A patch for KDE 3.2.x is available from
        ftp://ftp.kde.org/pub/kde/security_patches :

	8aa6b41cccca4216c6eb1cf705c2370a  post-3.2.0-kdebase-kdm.diff


    

- 漏洞信息

26511
KDE KDM Login Sesson Type Symlink Arbitrary File Read
Local Access Required Race Condition
Loss of Confidentiality
Exploit Public

- 漏洞描述

KDM contains a flaw that may allow a malicious local user to read any files on the system. The issue is due to the 'ReadDmrc()' function reading temporary files insecurely. It is possible for a user to use a symlink style attack to read arbitrary files, resulting in a loss of confidentiality.

- 时间线

2006-06-14 Unknow
2006-06-14 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, KDE Project has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

KDE KDM Session Type Symbolic Link Vulnerability
Race Condition Error 18431
No Yes
2006-06-14 12:00:00 2006-11-23 10:05:00
Ludwig Nussel is credited with the discovery of this vulnerability.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
Slackware Linux 10.2
Slackware Linux 10.1
Slackware Linux 10.0
Slackware Linux -current
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Enterprise Server 9
rPath rPath Linux 1
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4
RedHat Desktop 4.0
Red Hat Enterprise Linux AS 4
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
KDE KDE 3.5.3
KDE KDE 3.5.2
KDE KDE 3.5.1
KDE KDE 3.5
KDE KDE 3.4.3
KDE KDE 3.4.2
KDE KDE 3.4.1
+ Red Hat Fedora Core4
KDE KDE 3.4
KDE KDE 3.4
KDE KDE 3.3.2
+ Debian Linux 3.1 sparc
+ Debian Linux 3.1 s/390
+ Debian Linux 3.1 s/390
+ Debian Linux 3.1 s/390
+ Debian Linux 3.1 ppc
+ Debian Linux 3.1 ppc
+ Debian Linux 3.1 ppc
+ Debian Linux 3.1 mipsel
+ Debian Linux 3.1 mipsel
+ Debian Linux 3.1 mipsel
+ Debian Linux 3.1 mips
+ Debian Linux 3.1 mips
+ Debian Linux 3.1 mips
+ Debian Linux 3.1 m68k
+ Debian Linux 3.1 m68k
+ Debian Linux 3.1 m68k
+ Debian Linux 3.1 ia-64
+ Debian Linux 3.1 ia-64
+ Debian Linux 3.1 ia-64
+ Debian Linux 3.1 ia-32
+ Debian Linux 3.1 ia-32
+ Debian Linux 3.1 ia-32
+ Debian Linux 3.1 hppa
+ Debian Linux 3.1 hppa
+ Debian Linux 3.1 hppa
+ Debian Linux 3.1 arm
+ Debian Linux 3.1 arm
+ Debian Linux 3.1 arm
+ Debian Linux 3.1 amd64
+ Debian Linux 3.1 amd64
+ Debian Linux 3.1 amd64
+ Debian Linux 3.1 alpha
+ Debian Linux 3.1 alpha
+ Debian Linux 3.1 alpha
+ Debian Linux 3.1
+ Debian Linux 3.1
+ Debian Linux 3.1
KDE KDE 3.3.2
KDE KDE 3.3.1
+ Red Hat Fedora Core3
KDE KDE 3.3
KDE KDE 3.2.3
KDE KDE 3.2.2
+ KDE KDE 3.2.2
+ Red Hat Fedora Core2
KDE KDE 3.2.1
KDE KDE 3.2
KDE aRts 1.3.2
Gentoo Linux
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1

- 漏洞讨论

KDM is prone to a vulnerability that may permit symbolic-link attacks when processing the user's session type.

An attacker with local access could potentially exploit this issue to view files and obtain privileged information.

A successful attack would most likely result in the loss of confidentiality and the theft of privileged information.

- 漏洞利用

Attackers can use standard shell commands to exploit this issue.

- 解决方案

The vendor has released an advisory and patches to address this issue.

Please see the referenced advisories for more information.


KDE aRts 1.3.2

KDE KDE 3.2

KDE KDE 3.2.1

KDE KDE 3.2.2

KDE KDE 3.2.3

KDE KDE 3.3

KDE KDE 3.3.1

KDE KDE 3.3.2

KDE KDE 3.3.2

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站