The Ubuntu development team have reached their first milestone in the production of the Live CD version of the upcoming release of Ubuntu codenamed "Hoary Hedgehog." This edition features a completely redesigned system for creating Live CDs.
While some people have tried rough previews, this is the first proper milestone for the live CD version. Anyone, especially folks who are using our previous release (4.10 "Warty Warthog"), are encouraged to try this out.
The Live CD runs completely off of the CD and will not touch any of the data on your hard drive so it is:
- A fantastic way to get a preview of new features in the upcoming Ubuntu release without upgrading your system.
- A chance to use the Ubuntu Live CD on systems which were not supported by the Ubuntu 4.10 Live CD. The new edition supports a wider variety of hardware, including PowerPC and AMD64 systems.
- A great way to help test support for your hardware in the new release and give feedback.
You can get the latest version of the CDs here, via HTTP or
BitTorrent:
http://cdimage.ubuntu.com/releases/hoary/array-3.5-live/Additionally, daily snapshots of the Live CD as it evolves between now and our release in April can be found here:
http://cdimage.ubuntu.com/daily-live/current/All feedback should be sent to the Ubuntu development list at: ubuntu-devel@lists.ubuntu.com
Thanks,
The Ubuntu Team
A Perl DBI module security update is available for Ubuntu Linux 4.10
===========================================================
Ubuntu Security Notice USN-70-1 January 25, 2005
libdbi-perl vulnerabilities
CAN-2005-0077
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
libdbi-perl
The problem can be corrected by upgrading the affected package to version 1.42-3ubuntu0.1. In general, a standard system upgrade is sufficient to effect the necessary changes.
OSDir has posted a screenshot slideshow of Ubuntu Linux 5.04 Array CD 3
An Evolution security update has been released for Ubuntu Linux 4.10
==========================================================
Ubuntu Security Notice USN-69-1 January 24, 2005
evolution vulnerability
CAN-2005-0102
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
evolution
The problem can be corrected by upgrading the affected package to version 2.0.2-0ubuntu2.1. In general, a standard system upgrade is sufficient to effect the necessary changes.
An enscript security update has been released for Ubuntu Linux 4.10
===========================================================
Ubuntu Security Notice USN-68-1 January 24, 2005
enscript vulnerabilities
CAN-2004-1184 CAN-2004-1185 CAN-2004-1186
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
enscript
The problem can be corrected by upgrading the affected package to version 1.6.4-4ubuntu0.1. In general, a standard system upgrade is sufficient to effect the necessary changes.
Ubuntu Hoary Array CD 3 has been released
==========================================================
Ubuntu Security Notice USN-67-1 January 20, 2005
squid vulnerabilities
CAN-2005-0094, CAN-2005-0095, CAN-2005-0096, CAN-2005-0097
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
squid
The problem can be corrected by upgrading the affected package to version 2.5.5-6ubuntu0.3. In general, a standard system upgrade is sufficient to effect the necessary changes.
==========================================================
Ubuntu Security Notice USN-66-1 January 20, 2005
php4 vulnerabilities
http://www.securitytracker.com/alerts/2004/Oct/1011984.html
http://www.securityfocus.com/archive/1/384920
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
libapache2-mod-php4
php4-cgi
php4-curl
The problem can be corrected by upgrading the affected package to version 4:4.3.8-3ubuntu7.3. In general, a standard system upgrade is sufficient to effect the necessary changes.
An updated Apache utility script has been released for Ubuntu Linux 4.10
===========================================================
Ubuntu Security Notice USN-65-1 January 19, 2005
apache vulnerabilities
http://bugs.debian.org/290974
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
apache-utils
The problem can be corrected by upgrading the affected package to version 1.3.31-6ubuntu0.4. In general, a standard system upgrade is sufficient to effect the necessary changes.
xpdf, CUPS security updates are available for Ubuntu Linux 4.10
==========================================================
Ubuntu Security Notice USN-64-1 January 19, 2005
xpdf, cupsys vulnerabilities
CAN-2005-0064
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
cupsys
libcupsimage2
libcupsys2-gnutls10
xpdf-reader
xpdf-utils
The problem can be corrected by upgrading the affected package to version 1.1.20final+cvs20040330-4ubuntu16.4 (cupsys, libcupsimage2, and libcupsys2-gnutls10) and 3.00-8ubuntu1.4 (xpdf-reader and xpdf-utils). In general, a standard system upgrade is sufficient to effect the necessary changes.
A MySQL security update is available for Ubuntu Linux 4.10
===========================================================
Ubuntu Security Notice USN-63-1 January 18, 2005
mysql-dfsg vulnerability
CAN-2005-0004
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
mysql-client
The problem can be corrected by upgrading the affected package to version 4.0.20-2ubuntu1.2. In general, a standard system upgrade is sufficient to effect the necessary changes.
A vim security update has been released for Ubuntu Linux 4.10
===========================================================
Ubuntu Security Notice USN-61-1 January 18, 2005
vim vulnerabilities
CAN-2005-0069
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
kvim
vim
vim-gnome
vim-gtk
vim-lesstif
vim-perl
vim-python
vim-tcl
The problem can be corrected by upgrading the affected package to version 1:6.3-025+1ubuntu2.2. In general, a standard system upgrade is sufficient to effect the necessary changes.
A Imagemagick security update is available for Ubuntu Linux 4.10
==========================================================
Ubuntu Security Notice USN-62-1 January 18, 2005
imagemagick vulnerability
CAN-2005-0005
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
imagemagick
libmagick6
The problem can be corrected by upgrading the affected package to version 5:6.0.2.5-1ubuntu1.3. In general, a standard system upgrade is sufficient to effect the necessary changes.
A Linux kernel update is available for Ubuntu Linux 4.10
==========================================================
Ubuntu Security Notice USN-60-0 January 14, 2005
linux-source-2.6.8.1 vulnerabilities
CAN-2005-0001
http://lists.netsys.com/pipermail/full-disclosure/2005-January/030660.html
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
linux-image-2.6.8.1-4-386
linux-image-2.6.8.1-4-686
linux-image-2.6.8.1-4-686-smp
linux-image-2.6.8.1-4-amd64-generic
linux-image-2.6.8.1-4-amd64-k8
linux-image-2.6.8.1-4-amd64-k8-smp
linux-image-2.6.8.1-4-amd64-xeon
linux-image-2.6.8.1-4-k7
linux-image-2.6.8.1-4-k7-smp
linux-image-2.6.8.1-4-power3
linux-image-2.6.8.1-4-power3-smp
linux-image-2.6.8.1-4-power4
linux-image-2.6.8.1-4-power4-smp
linux-image-2.6.8.1-4-powerpc
linux-image-2.6.8.1-4-powerpc-smp
linux-patch-debian-2.6.8.1
The problem can be corrected by upgrading the affected package to version 2.6.8.1-16.10. In general, a standard system upgrade is sufficient to effect the necessary changes.
A mailman security update is available for Ubuntu Linux 4.10
==========================================================
Ubuntu Security Notice USN-59-1 January 10, 2005
mailman vulnerabilities
CAN-2004-1177, http://bugs.debian.org/285839
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
mailman
The problem can be corrected by upgrading the affected package to version 2.1.5-1ubuntu2.2. In general, a standard system upgrade is sufficient to effect the necessary changes.
A MIT Kerberos security update has been released for Ubuntu Linux 4.10
==========================================================
Ubuntu Security Notice USN-58-1 January 10, 2005
krb5 vulnerability
CAN-2004-1189
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
krb5-admin-server
krb5-kdc
libkadm55
libkrb53
The problem can be corrected by upgrading the affected package to version 1.3.4-3ubuntu0.1. In general, a standard system upgrade is sufficient to effect the necessary changes.
An updated Linux kernel package is available for Ubuntu Linux 4.10
==========================================================
Ubuntu Security Notice USN-57-1 January 09, 2005
linux-source-2.6.8.1 vulnerabilities
CAN-2004-1235, CAN-2004-1337
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
linux-image-2.6.8.1-4-386
linux-image-2.6.8.1-4-686
linux-image-2.6.8.1-4-686-smp
linux-image-2.6.8.1-4-amd64-generic
linux-image-2.6.8.1-4-amd64-k8
linux-image-2.6.8.1-4-amd64-k8-smp
linux-image-2.6.8.1-4-amd64-xeon
linux-image-2.6.8.1-4-k7
linux-image-2.6.8.1-4-k7-smp
linux-image-2.6.8.1-4-power3
linux-image-2.6.8.1-4-power3-smp
linux-image-2.6.8.1-4-power4
linux-image-2.6.8.1-4-power4-smp
linux-image-2.6.8.1-4-powerpc
linux-image-2.6.8.1-4-powerpc-smp
linux-patch-debian-2.6.8.1
The problem can be corrected by upgrading the affected package to version 2.6.8.1-16.8. In general, a standard system upgrade is sufficient to effect the necessary changes.
An exim4 security update has been released for Ubuntu Linux 4.10
==========================================================
Ubuntu Security Notice USN-56-1 January 07, 2005
exim4 vulnerabilities
CAN-2005-0021, CAN-2005-0022
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
exim4-daemon-heavy
exim4-daemon-light
The problem can be corrected by upgrading the affected package to version 4.34-5ubuntu1.1. In general, a standard system upgrade is sufficient to effect the necessary changes.
DistroWatch reports that an early live CD of Ubuntu Hoary 5.04 is now available for download
A TIFF library tool security update has been released for Ubuntu Linux 4.10
==========================================================
Ubuntu Security Notice USN-54-1 January 06, 2005
tiff vulnerability
CAN-2004-1183
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
libtiff-tools
The problem can be corrected by upgrading the affected package to version 3.6.1-1.1ubuntu1.2. In general, a standard system upgrade is sufficient to effect the necessary changes.