An announcement from Benjamin Mako Hill:
Another PEAR update is available for Ubuntu Linux
==========================================================
Ubuntu Security Notice USN-147-2 July 06, 2005
php4, php4-universe fixed packages
https://bugzilla.ubuntu.com/show_bug.cgi?id=12426
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
php4-pear
The problem can be corrected by upgrading the affected package to version 4:4.3.8-3ubuntu7.10 (for Ubuntu 4.10), or 4:4.3.10-10ubuntu3.2 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-147-2 July 06, 2005
php4, php4-universe fixed packages
https://bugzilla.ubuntu.com/show_bug.cgi?id=12426
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
php4-pear
The problem can be corrected by upgrading the affected package to version 4:4.3.8-3ubuntu7.10 (for Ubuntu 4.10), or 4:4.3.10-10ubuntu3.2 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
A zlib security update is available for Ubuntu Linux
==========================================================
Ubuntu Security Notice USN-148-1 July 06, 2005
zlib vulnerability
CAN-2005-2096
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
zlib1g
The problem can be corrected by upgrading the affected package to version 1:1.2.1.1-3ubuntu1.1 (for Ubuntu 4.10), or 1:1.2.2-4ubuntu1.1 (for Ubuntu 5.04). A standard system upgrade is NOT SUFFICIENT to effect the necessary changes! If you can afford to reboot your machine, this is the easiest way to ensure that all services using this library are restarted correctly. If not, please manually restart all server applications.
==========================================================
Ubuntu Security Notice USN-148-1 July 06, 2005
zlib vulnerability
CAN-2005-2096
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
zlib1g
The problem can be corrected by upgrading the affected package to version 1:1.2.1.1-3ubuntu1.1 (for Ubuntu 4.10), or 1:1.2.2-4ubuntu1.1 (for Ubuntu 5.04). A standard system upgrade is NOT SUFFICIENT to effect the necessary changes! If you can afford to reboot your machine, this is the easiest way to ensure that all services using this library are restarted correctly. If not, please manually restart all server applications.
A PHP XMLRPC security update is available for Ubuntu Linux
==========================================================
Ubuntu Security Notice USN-147-1 July 05, 2005
php4, php4-universe vulnerability
CAN-2005-1921
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
libapache2-mod-php4
php4-pear
The problem can be corrected by upgrading the affected package to version 4:4.3.8-3ubuntu7.9 (for Ubuntu 4.10), or 4:4.3.10-10ubuntu3.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-147-1 July 05, 2005
php4, php4-universe vulnerability
CAN-2005-1921
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
libapache2-mod-php4
php4-pear
The problem can be corrected by upgrading the affected package to version 4:4.3.8-3ubuntu7.9 (for Ubuntu 4.10), or 4:4.3.10-10ubuntu3.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
A Ruby security update has been released for Ubuntu Linux
==========================================================
Ubuntu Security Notice USN-146-1 June 29, 2005
ruby1.8 vulnerability
CAN-2005-1992
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
libxmlrpc-ruby1.8
ruby1.8
The problem can be corrected by upgrading the affected package to version 1.8.1+1.8.2pre2-3ubuntu0.2 (for Ubuntu 4.10), or 1.8.1+1.8.2pre4-1ubuntu0.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes; however, if you run custom XMLRPC servers implemented in Ruby, you have to restart them.
==========================================================
Ubuntu Security Notice USN-146-1 June 29, 2005
ruby1.8 vulnerability
CAN-2005-1992
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
libxmlrpc-ruby1.8
ruby1.8
The problem can be corrected by upgrading the affected package to version 1.8.1+1.8.2pre2-3ubuntu0.2 (for Ubuntu 4.10), or 1.8.1+1.8.2pre4-1ubuntu0.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes; however, if you run custom XMLRPC servers implemented in Ruby, you have to restart them.
A wget security update is available for Ubuntu Linux
===========================================================
Ubuntu Security Notice USN-145-1 June 28, 2005
wget vulnerabilities
CAN-2004-1487, CAN-2004-1488, CAN-2004-2014
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
wget
The problem can be corrected by upgrading the affected package to version 1.9.1-4ubuntu0.1 (for Ubuntu 4.10), or 1.9.1-10ubuntu2.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
===========================================================
Ubuntu Security Notice USN-145-1 June 28, 2005
wget vulnerabilities
CAN-2004-1487, CAN-2004-1488, CAN-2004-2014
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
wget
The problem can be corrected by upgrading the affected package to version 1.9.1-4ubuntu0.1 (for Ubuntu 4.10), or 1.9.1-10ubuntu2.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
A dbus security update is available for Ubuntu 4.10
==========================================================
Ubuntu Security Notice USN-144-1 June 27, 2005
dbus vulnerability
CAN-2005-0201
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
dbus-1
The problem can be corrected by upgrading the affected package to version 0.22-1ubuntu2.1. You have to restart your Gnome session (i.e. log out and back in) after doing a standard system upgrade to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-144-1 June 27, 2005
dbus vulnerability
CAN-2005-0201
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
dbus-1
The problem can be corrected by upgrading the affected package to version 0.22-1ubuntu2.1. You have to restart your Gnome session (i.e. log out and back in) after doing a standard system upgrade to effect the necessary changes.
A tcpdump update is available for Ubuntu Linux
==========================================================
Ubuntu Security Notice USN-141-1 June 21, 2005
tcpdump vulnerability
CAN-2005-1267
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
tcpdump
The problem can be corrected by upgrading the affected package to version 3.8.3-3ubuntu0.3 (for Ubuntu 4.10), or 3.8.3-3ubuntu0.4 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-141-1 June 21, 2005
tcpdump vulnerability
CAN-2005-1267
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
tcpdump
The problem can be corrected by upgrading the affected package to version 3.8.3-3ubuntu0.3 (for Ubuntu 4.10), or 3.8.3-3ubuntu0.4 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
A sudo update is available for Ubuntu Linux
==========================================================
Ubuntu Security Notice USN-142-1 June 21, 2005
sudo vulnerability
CAN-2005-1993
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
sudo
The problem can be corrected by upgrading the affected package to version 1.6.7p5-1ubuntu4.2 (for Ubuntu 4.10), or 1.6.8p5-1ubuntu2.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-142-1 June 21, 2005
sudo vulnerability
CAN-2005-1993
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
sudo
The problem can be corrected by upgrading the affected package to version 1.6.7p5-1ubuntu4.2 (for Ubuntu 4.10), or 1.6.8p5-1ubuntu2.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
Gaim security updates are available for Ubuntu Linux 4.10 and 5.04
==========================================================
Ubuntu Security Notice USN-140-1 June 15, 2005
gaim vulnerability
CAN-2005-1934
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
gaim
The problem can be corrected by upgrading the affected package to version 1:1.0.0-1ubuntu1.6 (for Ubuntu 4.10), or 1:1.1.4-1ubuntu4.3 (for Ubuntu 5.04). After doing a standard system upgrade you need to restart Gaim to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-140-1 June 15, 2005
gaim vulnerability
CAN-2005-1934
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
gaim
The problem can be corrected by upgrading the affected package to version 1:1.0.0-1ubuntu1.6 (for Ubuntu 4.10), or 1:1.1.4-1ubuntu4.3 (for Ubuntu 5.04). After doing a standard system upgrade you need to restart Gaim to effect the necessary changes.
Gaim security update are available for Ubuntu Linux 4.10 and 5.04
=========================================================
Ubuntu Security Notice USN-139-1 June 10, 2005
gaim vulnerability
CAN-2005-1269
=========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
gaim
The problem can be corrected by upgrading the affected package to version 1:1.0.0-1ubuntu1.5 (for Ubuntu 4.10) and 1:1.1.4-1ubuntu4.2 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
=========================================================
Ubuntu Security Notice USN-139-1 June 10, 2005
gaim vulnerability
CAN-2005-1269
=========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
gaim
The problem can be corrected by upgrading the affected package to version 1:1.0.0-1ubuntu1.5 (for Ubuntu 4.10) and 1:1.1.4-1ubuntu4.2 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
gedit security updates are available for Ubuntu Linux 4.10 and 5.04
==========================================================
Ubuntu Security Notice USN-138-1 June 09, 2005
gedit vulnerability
CAN-2005-1686
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
gedit
The problem can be corrected by upgrading the affected package to version 2.8.1-0ubuntu1.1 (for Ubuntu 4.10) and 2.10.2-0ubuntu2 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-138-1 June 09, 2005
gedit vulnerability
CAN-2005-1686
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
gedit
The problem can be corrected by upgrading the affected package to version 2.8.1-0ubuntu1.1 (for Ubuntu 4.10) and 2.10.2-0ubuntu2 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
Kernel updates are available for Ubuntu Linux
==========================================================
Ubuntu Security Notice USN-137-1 June 08, 2005
linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities
CAN-2005-0756, CAN-2005-1265
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
linux-image-2.6.10-5-386
linux-image-2.6.10-5-686
linux-image-2.6.10-5-686-smp
linux-image-2.6.10-5-amd64-generic
linux-image-2.6.10-5-amd64-k8
linux-image-2.6.10-5-amd64-k8-smp
linux-image-2.6.10-5-amd64-xeon
linux-image-2.6.10-5-itanium
linux-image-2.6.10-5-itanium-smp
linux-image-2.6.10-5-k7
linux-image-2.6.10-5-k7-smp
linux-image-2.6.10-5-mckinley
linux-image-2.6.10-5-mckinley-smp
linux-image-2.6.10-5-power3
linux-image-2.6.10-5-power3-smp
linux-image-2.6.10-5-power4
linux-image-2.6.10-5-power4-smp
linux-image-2.6.10-5-powerpc
linux-image-2.6.10-5-powerpc-smp
linux-image-2.6.8.1-5-386
linux-image-2.6.8.1-5-686
linux-image-2.6.8.1-5-686-smp
linux-image-2.6.8.1-5-amd64-generic
linux-image-2.6.8.1-5-amd64-k8
linux-image-2.6.8.1-5-amd64-k8-smp
linux-image-2.6.8.1-5-amd64-xeon
linux-image-2.6.8.1-5-k7
linux-image-2.6.8.1-5-k7-smp
linux-image-2.6.8.1-5-power3
linux-image-2.6.8.1-5-power3-smp
linux-image-2.6.8.1-5-power4
linux-image-2.6.8.1-5-power4-smp
linux-image-2.6.8.1-5-powerpc
linux-image-2.6.8.1-5-powerpc-smp
linux-patch-debian-2.6.8.1
linux-patch-ubuntu-2.6.10
The problem can be corrected by upgrading the affected package to version 2.6.8.1-16.19 (for Ubuntu 4.10), or 2.6.10-34.2 (for Ubuntu 5.04). After doing a standard system upgrade you need to reboot your computer to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-137-1 June 08, 2005
linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities
CAN-2005-0756, CAN-2005-1265
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
linux-image-2.6.10-5-386
linux-image-2.6.10-5-686
linux-image-2.6.10-5-686-smp
linux-image-2.6.10-5-amd64-generic
linux-image-2.6.10-5-amd64-k8
linux-image-2.6.10-5-amd64-k8-smp
linux-image-2.6.10-5-amd64-xeon
linux-image-2.6.10-5-itanium
linux-image-2.6.10-5-itanium-smp
linux-image-2.6.10-5-k7
linux-image-2.6.10-5-k7-smp
linux-image-2.6.10-5-mckinley
linux-image-2.6.10-5-mckinley-smp
linux-image-2.6.10-5-power3
linux-image-2.6.10-5-power3-smp
linux-image-2.6.10-5-power4
linux-image-2.6.10-5-power4-smp
linux-image-2.6.10-5-powerpc
linux-image-2.6.10-5-powerpc-smp
linux-image-2.6.8.1-5-386
linux-image-2.6.8.1-5-686
linux-image-2.6.8.1-5-686-smp
linux-image-2.6.8.1-5-amd64-generic
linux-image-2.6.8.1-5-amd64-k8
linux-image-2.6.8.1-5-amd64-k8-smp
linux-image-2.6.8.1-5-amd64-xeon
linux-image-2.6.8.1-5-k7
linux-image-2.6.8.1-5-k7-smp
linux-image-2.6.8.1-5-power3
linux-image-2.6.8.1-5-power3-smp
linux-image-2.6.8.1-5-power4
linux-image-2.6.8.1-5-power4-smp
linux-image-2.6.8.1-5-powerpc
linux-image-2.6.8.1-5-powerpc-smp
linux-patch-debian-2.6.8.1
linux-patch-ubuntu-2.6.10
The problem can be corrected by upgrading the affected package to version 2.6.8.1-16.19 (for Ubuntu 4.10), or 2.6.10-34.2 (for Ubuntu 5.04). After doing a standard system upgrade you need to reboot your computer to effect the necessary changes.
binutils security updates are available for Ubuntu Linux 4.10 and 5.04
==========================================================
Ubuntu Security Notice USN-136-1 May 27, 2005
binutils vulnerability
CAN-2005-1704
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
binutils
binutils-multiarch
The problem can be corrected by upgrading the affected package to version 2.14.90.0.7-8ubuntu0.2 (for Ubuntu 4.10), or 2.15-5ubuntu2.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-136-1 May 27, 2005
binutils vulnerability
CAN-2005-1704
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
binutils
binutils-multiarch
The problem can be corrected by upgrading the affected package to version 2.14.90.0.7-8ubuntu0.2 (for Ubuntu 4.10), or 2.15-5ubuntu2.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
Updated gdb packages are available for Ubuntu Linux 4.10 and 5.04
==========================================================
Ubuntu Security Notice USN-135-1 May 27, 2005
gdb vulnerabilities
CAN-2005-1704, CAN-2005-1705
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
gdb
The problem can be corrected by upgrading the affected package to version 6.1-3ubuntu0.1 (for Ubuntu 4.10), or 6.3-5ubuntu1.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-135-1 May 27, 2005
gdb vulnerabilities
CAN-2005-1704, CAN-2005-1705
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
gdb
The problem can be corrected by upgrading the affected package to version 6.1-3ubuntu0.1 (for Ubuntu 4.10), or 6.3-5ubuntu1.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
A Firefox update has been released for Ubuntu Linux 5.04
==========================================================
Ubuntu Security Notice USN-134-1 May 26, 2005
mozilla-firefox vulnerabilities
MFSA 2005-42, CAN-2005-1531, CAN-2005-1532
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
mozilla-firefox
The problem can be corrected by upgrading the affected package to version 1.0.2-0ubuntu5.3. After doing a standard system upgrade you need to restart Firefox to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-134-1 May 26, 2005
mozilla-firefox vulnerabilities
MFSA 2005-42, CAN-2005-1531, CAN-2005-1532
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
mozilla-firefox
The problem can be corrected by upgrading the affected package to version 1.0.2-0ubuntu5.3. After doing a standard system upgrade you need to restart Firefox to effect the necessary changes.
An Apache utility security update is available for Ubuntu Linux 4.10
==========================================================
Ubuntu Security Notice USN-133-1 May 26, 2005
apache vulnerability
http://xforce.iss.net/xforce/xfdb/17413
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
apache-utils
The problem can be corrected by upgrading the affected package to version 1.3.31-6ubuntu0.7. In general, a standard system upgrade is sufficient to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-133-1 May 26, 2005
apache vulnerability
http://xforce.iss.net/xforce/xfdb/17413
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
apache-utils
The problem can be corrected by upgrading the affected package to version 1.3.31-6ubuntu0.7. In general, a standard system upgrade is sufficient to effect the necessary changes.
ImageMagick security updates are available for Ubuntu Linux 4.10 and 5.04
==========================================================
Ubuntu Security Notice USN-132-1 May 23, 2005
imagemagick vulnerabilities
CAN-2005-1275
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
libmagick6
The problem can be corrected by upgrading the affected package to version 5:6.0.2.5-1ubuntu1.5 (for Ubuntu 4.10), or 6:6.0.6.2-2.1ubuntu1.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-132-1 May 23, 2005
imagemagick vulnerabilities
CAN-2005-1275
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
libmagick6
The problem can be corrected by upgrading the affected package to version 5:6.0.2.5-1ubuntu1.5 (for Ubuntu 4.10), or 6:6.0.6.2-2.1ubuntu1.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.
linux-source security updates are available for Ubuntu Linux
==========================================================
Ubuntu Security Notice USN-131-1 May 23, 2005
linux-source-2.6.8.1, linux-source-2.6.10 vulnerabilities
CAN-2005-0109, CAN-2005-1041, CAN-2005-1263, CAN-2005-1264,
CAN-2005-1368, CAN-2005-1369, CAN-2005-1589
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
linux-image-2.6.10-5-386
linux-image-2.6.10-5-686
linux-image-2.6.10-5-686-smp
linux-image-2.6.10-5-amd64-generic
linux-image-2.6.10-5-amd64-k8
linux-image-2.6.10-5-amd64-k8-smp
linux-image-2.6.10-5-amd64-xeon
linux-image-2.6.10-5-itanium
linux-image-2.6.10-5-itanium-smp
linux-image-2.6.10-5-k7
linux-image-2.6.10-5-k7-smp
linux-image-2.6.10-5-mckinley
linux-image-2.6.10-5-mckinley-smp
linux-image-2.6.10-5-power3
linux-image-2.6.10-5-power3-smp
linux-image-2.6.10-5-power4
linux-image-2.6.10-5-power4-smp
linux-image-2.6.10-5-powerpc
linux-image-2.6.10-5-powerpc-smp
linux-image-2.6.8.1-5-386
linux-image-2.6.8.1-5-686
linux-image-2.6.8.1-5-686-smp
linux-image-2.6.8.1-5-amd64-generic
linux-image-2.6.8.1-5-amd64-k8
linux-image-2.6.8.1-5-amd64-k8-smp
linux-image-2.6.8.1-5-amd64-xeon
linux-image-2.6.8.1-5-k7
linux-image-2.6.8.1-5-k7-smp
linux-image-2.6.8.1-5-power3
linux-image-2.6.8.1-5-power3-smp
linux-image-2.6.8.1-5-power4
linux-image-2.6.8.1-5-power4-smp
linux-image-2.6.8.1-5-powerpc
linux-image-2.6.8.1-5-powerpc-smp
linux-patch-debian-2.6.8.1
linux-patch-ubuntu-2.6.10
The problem can be corrected by upgrading the affected package to
version 2.6.8.1-16.18 (for Ubuntu 4.10), or 2.6.10-34.1 (for Ubuntu
5.04). After doing a standard system upgrade you need to reboot your
computer to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-131-1 May 23, 2005
linux-source-2.6.8.1, linux-source-2.6.10 vulnerabilities
CAN-2005-0109, CAN-2005-1041, CAN-2005-1263, CAN-2005-1264,
CAN-2005-1368, CAN-2005-1369, CAN-2005-1589
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
linux-image-2.6.10-5-386
linux-image-2.6.10-5-686
linux-image-2.6.10-5-686-smp
linux-image-2.6.10-5-amd64-generic
linux-image-2.6.10-5-amd64-k8
linux-image-2.6.10-5-amd64-k8-smp
linux-image-2.6.10-5-amd64-xeon
linux-image-2.6.10-5-itanium
linux-image-2.6.10-5-itanium-smp
linux-image-2.6.10-5-k7
linux-image-2.6.10-5-k7-smp
linux-image-2.6.10-5-mckinley
linux-image-2.6.10-5-mckinley-smp
linux-image-2.6.10-5-power3
linux-image-2.6.10-5-power3-smp
linux-image-2.6.10-5-power4
linux-image-2.6.10-5-power4-smp
linux-image-2.6.10-5-powerpc
linux-image-2.6.10-5-powerpc-smp
linux-image-2.6.8.1-5-386
linux-image-2.6.8.1-5-686
linux-image-2.6.8.1-5-686-smp
linux-image-2.6.8.1-5-amd64-generic
linux-image-2.6.8.1-5-amd64-k8
linux-image-2.6.8.1-5-amd64-k8-smp
linux-image-2.6.8.1-5-amd64-xeon
linux-image-2.6.8.1-5-k7
linux-image-2.6.8.1-5-k7-smp
linux-image-2.6.8.1-5-power3
linux-image-2.6.8.1-5-power3-smp
linux-image-2.6.8.1-5-power4
linux-image-2.6.8.1-5-power4-smp
linux-image-2.6.8.1-5-powerpc
linux-image-2.6.8.1-5-powerpc-smp
linux-patch-debian-2.6.8.1
linux-patch-ubuntu-2.6.10
The problem can be corrected by upgrading the affected package to
version 2.6.8.1-16.18 (for Ubuntu 4.10), or 2.6.10-34.1 (for Ubuntu
5.04). After doing a standard system upgrade you need to reboot your
computer to effect the necessary changes.
tiff security update are available for Ubuntu Linux 4.10 and 5.04
==========================================================
Ubuntu Security Notice USN-130-1 May 19, 2005
tiff vulnerability
CAN-2005-1544
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
libtiff4
The problem can be corrected by upgrading the affected package to version 3.6.1-1.1ubuntu1.3 (for Ubuntu 4.10), or 3.6.1-5ubuntu0.1 (for Ubuntu 5.04). After a standard system upgrade you need to restart your CUPS server with
sudo /etc/init.d/cupsys restart
to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-130-1 May 19, 2005
tiff vulnerability
CAN-2005-1544
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
libtiff4
The problem can be corrected by upgrading the affected package to version 3.6.1-1.1ubuntu1.3 (for Ubuntu 4.10), or 3.6.1-5ubuntu0.1 (for Ubuntu 5.04). After a standard system upgrade you need to restart your CUPS server with
sudo /etc/init.d/cupsys restart
to effect the necessary changes.