A new Postfix vulnerability update is available for Ubuntu Linux. Here the announcement:
"Ubuntu Security Notice USN-636-1 August 19, 2008
postfix vulnerability
CVE-2008-2936
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 7.04
Ubuntu 7.10
Ubuntu 8.04 LTS
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
postfix 2.2.10-1ubuntu0.2
Ubuntu 7.04:
postfix 2.3.8-2ubuntu0.2
Ubuntu 7.10:
postfix 2.4.5-3ubuntu1.2
Ubuntu 8.04 LTS:
postfix 2.5.1-2ubuntu1.1
In general, a standard system upgrade is sufficient to effect the
necessary changes.
Details follow:
Sebastian Krahmer discovered that Postfix was not correctly handling
mailbox ownership when dealing with Linux's implementation of hardlinking
to symlinks. In certain mail spool configurations, a local attacker
could exploit this to append data to arbitrary files as the root user.
The default Ubuntu configuration was not vulnerable.
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.2.10-1u=
buntu0.2.diff.gz
Size/MD5: 158790 ebe05497d5747e14d9ba4218319b419a
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.2.10-1u=
buntu0.2.dsc
Size/MD5: 939 911d13d0db9a6e56791740268791a454
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.2.10.or=
ig.tar.gz
Size/MD5: 2443513 440a4702182a79ac2f51e8974fb742c9
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-dev_2.2.1=
0-1ubuntu0.2_all.deb
Size/MD5: 111048 385991b70757c4c554e6d5ef4563506e
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-doc_2.2.1=
0-1ubuntu0.2_all.deb
Size/MD5: 665876 f1f70b1f87fb87223caefb4d5de3cd30
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.2.=
10-1ubuntu0.2_amd64.deb
Size/MD5: 40662 84cbe555f64ff26871444be2dd719bea
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.2=
=2E10-1ubuntu0.2_amd64.deb
Size/MD5: 35888 89e57a726891c70c0d35bb92f05ccbdc
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.2.=
10-1ubuntu0.2_amd64.deb
Size/MD5: 35496 dbdb17cfa31cf860034dbf92a178ee70
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.2=
=2E10-1ubuntu0.2_amd64.deb
Size/MD5: 35708 9f72eb8e960caa465a374e5943e1f70d
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.2.10-1u=
buntu0.2_amd64.deb
Size/MD5: 1002408 22ba89119fa409b16f8b8913ea965b36
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.2.=
10-1ubuntu0.2_i386.deb
Size/MD5: 39604 9b00783a631a0fca37e77256224b76f1
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.2=
=2E10-1ubuntu0.2_i386.deb
Size/MD5: 35442 a1a84bce2079bae3799ba9822e7cf450
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.2.=
10-1ubuntu0.2_i386.deb
Size/MD5: 34892 13856c3b6e3eb048ae0765d2fffd5f86
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.2=
=2E10-1ubuntu0.2_i386.deb
Size/MD5: 35258 fb49f0c2be6704b4fe30aac746b9acfd
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.2.10-1u=
buntu0.2_i386.deb
Size/MD5: 923432 2679d51bbdb5fb28e0e2748e74225a19
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.2.=
10-1ubuntu0.2_powerpc.deb
Size/MD5: 41318 bc0b0472688c94e197d44560d3400620
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.2=
=2E10-1ubuntu0.2_powerpc.deb
Size/MD5: 37304 a6d1cd58415eec2b23b9b7cf9799a791
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.2.=
10-1ubuntu0.2_powerpc.deb
Size/MD5: 36864 24ad41aa3d4b49035ab8a6e5fe0bb98a
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.2=
=2E10-1ubuntu0.2_powerpc.deb
Size/MD5: 37144 8e49b1fdd458340becfacdd975855375
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.2.10-1u=
buntu0.2_powerpc.deb
Size/MD5: 1022534 fafd2baec74d3543c74bf30956685635
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.2.=
10-1ubuntu0.2_sparc.deb
Size/MD5: 40200 846923c4c1d784114dd827d98497efb2
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.2=
=2E10-1ubuntu0.2_sparc.deb
Size/MD5: 35640 ecf1c95cf92ee12f7d74a1239c564ce7
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.2.=
10-1ubuntu0.2_sparc.deb
Size/MD5: 35070 4dcd50d6119077932ec6d124100eba0e
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.2=
=2E10-1ubuntu0.2_sparc.deb
Size/MD5: 35536 dc2c3279be224e9300a5e615f96d54b3
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.2.10-1u=
buntu0.2_sparc.deb
Size/MD5: 936736 d935e6f4a43d439606061732f9206ad3
Updated packages for Ubuntu 7.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.3.8-2ub=
untu0.2.diff.gz
Size/MD5: 179040 20b66629425a363224f7dacb2719bbc6
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.3.8-2ub=
untu0.2.dsc
Size/MD5: 1045 2e5442d80de5b1db62f126c93bfc71de
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.3.8.ori=
g.tar.gz
Size/MD5: 2787761 a6c560657788fc7a5444fa9ea32f5513
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-dev_2.3.8=
-2ubuntu0.2_all.deb
Size/MD5: 127836 3b462fec112994ed01a2c29a29d0430f
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-doc_2.3.8=
-2ubuntu0.2_all.deb
Size/MD5: 765926 df5c11fb2547e7cddec34f1b46d61805
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.3.8=
-2ubuntu0.2_amd64.deb
Size/MD5: 36536 470e1c4c5b1a8c0fff01f74f3847f74c
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.3.=
8-2ubuntu0.2_amd64.deb
Size/MD5: 43404 244e0c5f182913684b3e5a263f3eec3c
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.3=
=2E8-2ubuntu0.2_amd64.deb
Size/MD5: 38450 1075d9af7fc0758a54619b7323c08382
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.3.=
8-2ubuntu0.2_amd64.deb
Size/MD5: 38496 5abd4dafc463ab3504da1e39d97fa4a5
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.3=
=2E8-2ubuntu0.2_amd64.deb
Size/MD5: 38560 8705afde3e81b3094219e0cdbccdc497
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.3.8-2ub=
untu0.2_amd64.deb
Size/MD5: 1160330 43c90381ea4ddb9aa43ce4838bc4b007
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.3.8=
-2ubuntu0.2_i386.deb
Size/MD5: 36298 5d6e4b00fa9ef65e2a11e8b20f2fe429
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.3.=
8-2ubuntu0.2_i386.deb
Size/MD5: 42708 4170e198093e0edc3efb1531cba3ea5a
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.3=
=2E8-2ubuntu0.2_i386.deb
Size/MD5: 38182 5c98fde9094e94c3cbcfec62f54fa1cc
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.3.=
8-2ubuntu0.2_i386.deb
Size/MD5: 38010 b8b6b419f7e6365a077819f72d1501f5
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.3=
=2E8-2ubuntu0.2_i386.deb
Size/MD5: 38248 29f8c55f295b2dd6add0d3ab367dd6c1
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.3.8-2ub=
untu0.2_i386.deb
Size/MD5: 1091798 1dc93d7fb2117cb51b3b8ee942609cd8
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.3.8=
-2ubuntu0.2_powerpc.deb
Size/MD5: 38660 9bc4a72da708ce310d24260aba619b55
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.3.=
8-2ubuntu0.2_powerpc.deb
Size/MD5: 45304 cef467b7bdcada7b2f7c3c0882a1360e
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.3=
=2E8-2ubuntu0.2_powerpc.deb
Size/MD5: 40746 a762f5454e0bf8951f3d141ca1cfd97c
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.3.=
8-2ubuntu0.2_powerpc.deb
Size/MD5: 40508 18fa95520c350f37637bc76057f3e423
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.3=
=2E8-2ubuntu0.2_powerpc.deb
Size/MD5: 40872 7d6fd4580df097f69ac43a7725e9358d
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.3.8-2ub=
untu0.2_powerpc.deb
Size/MD5: 1250290 254af1263b8ab4e73c85505197b7d5eb
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.3.8=
-2ubuntu0.2_sparc.deb
Size/MD5: 36246 169219f5e401310e3cd11835e5db44be
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.3.=
8-2ubuntu0.2_sparc.deb
Size/MD5: 43034 982a9da17823e7f7db0ead4e6b4fa2c6
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.3=
=2E8-2ubuntu0.2_sparc.deb
Size/MD5: 38152 6d88f08012b527764dfe79c36905022d
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.3.=
8-2ubuntu0.2_sparc.deb
Size/MD5: 38028 8df8f345574e6a6efeb90d5a1fe67be7
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.3=
=2E8-2ubuntu0.2_sparc.deb
Size/MD5: 38282 8c8b38694a148be8ccd61200b1cb3f38
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.3.8-2ub=
untu0.2_sparc.deb
Size/MD5: 1109436 2e2b1c0edd99100dfeeb55133d2eae06
Updated packages for Ubuntu 7.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.4.5-3ub=
untu1.2.diff.gz
Size/MD5: 209826 4dc60005ca6e2c5f59e84648985c537f
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.4.5-3ub=
untu1.2.dsc
Size/MD5: 1034 95363287774288965d6188725a089901
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.4.5.ori=
g.tar.gz
Size/MD5: 2934634 ceba0cde05d12baa0ba2ed69fbb96b42
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-dev_2.4.5=
-3ubuntu1.2_all.deb
Size/MD5: 131508 ea4adb1f2dccb38324d0cd397f54a3df
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-doc_2.4.5=
-3ubuntu1.2_all.deb
Size/MD5: 805910 aa004a8258cf394cac1ffc321528082e
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.4.5=
-3ubuntu1.2_amd64.deb
Size/MD5: 38110 86eda497ee4fd42c1e21d3774d8b5a0b
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.4.=
5-3ubuntu1.2_amd64.deb
Size/MD5: 45242 64103ee95852c5e2b500ee95f3142da6
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.4=
=2E5-3ubuntu1.2_amd64.deb
Size/MD5: 40054 399b36a2522047e890a2bd88f0f57a58
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.4.=
5-3ubuntu1.2_amd64.deb
Size/MD5: 40102 ff9995b801687774960da61d100f3064
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.4=
=2E5-3ubuntu1.2_amd64.deb
Size/MD5: 40150 593e04136d69d2bb7beb681384bf925b
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.4.5-3ub=
untu1.2_amd64.deb
Size/MD5: 1188168 d8e47c5cb0e9d73e18072366832349fb
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.4.5=
-3ubuntu1.2_i386.deb
Size/MD5: 37886 44fc0bc073524d741b59eccc3db9450b
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.4.=
5-3ubuntu1.2_i386.deb
Size/MD5: 44584 47181a92153fa4f0fea74a3ccca842ce
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.4=
=2E5-3ubuntu1.2_i386.deb
Size/MD5: 39726 5fdecc93373f6a181e416f98f902c61e
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.4.=
5-3ubuntu1.2_i386.deb
Size/MD5: 39568 1b7a5b1230c5adbb7d5ee0fab5c4c07b
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.4=
=2E5-3ubuntu1.2_i386.deb
Size/MD5: 39810 7fc771389f9ee3460703fc6a320b1c90
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.4.5-3ub=
untu1.2_i386.deb
Size/MD5: 1118918 d345dda9af37e3ad0d9ff5497c7cdc32
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/p/postfix/postfix-cdb_2.4.5-3ubuntu1.=
2_lpia.deb
Size/MD5: 37858 0876387abbbd1c60bf67951e4108e85b
http://ports.ubuntu.com/pool/main/p/postfix/postfix-ldap_2.4.5-3ubuntu1=
=2E2_lpia.deb
Size/MD5: 44332 294c1a503a142ebfce9d62e1b236293e
http://ports.ubuntu.com/pool/main/p/postfix/postfix-mysql_2.4.5-3ubuntu=
1.2_lpia.deb
Size/MD5: 39738 c7235b9a994e0f3ff54c51434fed7ef5
http://ports.ubuntu.com/pool/main/p/postfix/postfix-pcre_2.4.5-3ubuntu1=
=2E2_lpia.deb
Size/MD5: 39464 2034676f32410c3dd8a2b5a3e223dfa0
http://ports.ubuntu.com/pool/main/p/postfix/postfix-pgsql_2.4.5-3ubuntu=
1.2_lpia.deb
Size/MD5: 39806 7d81a4e723d462a8a4346476a331f564
http://ports.ubuntu.com/pool/main/p/postfix/postfix_2.4.5-3ubuntu1.2_lp=
ia.deb
Size/MD5: 1109680 0186655c7e92dd3bac61116f5f09ced4
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.4.5=
-3ubuntu1.2_powerpc.deb
Size/MD5: 40254 e3b6e4041bedb336913a65c2f420ffd9
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.4.=
5-3ubuntu1.2_powerpc.deb
Size/MD5: 47190 2074d9bbedca312724d4330b431476cd
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.4=
=2E5-3ubuntu1.2_powerpc.deb
Size/MD5: 42312 e6ff8a5f41167ac1c16133d29a8428f6
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.4.=
5-3ubuntu1.2_powerpc.deb
Size/MD5: 42104 51e65af71c5ecca825921527f5dfcb1f
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.4=
=2E5-3ubuntu1.2_powerpc.deb
Size/MD5: 42442 217cb5ffd89dcaac4f4706761d33ff5b
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.4.5-3ub=
untu1.2_powerpc.deb
Size/MD5: 1282068 71b40f40f51f364a8f19cec47dcb8b16
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.4.5=
-3ubuntu1.2_sparc.deb
Size/MD5: 37894 4e72739c8d7f7d22a277f47830907aab
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.4.=
5-3ubuntu1.2_sparc.deb
Size/MD5: 45020 348924b4bdf4c5bb3e1432f90128c41a
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.4=
=2E5-3ubuntu1.2_sparc.deb
Size/MD5: 39740 0e5260cee5a41c95538505545e8930b6
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.4.=
5-3ubuntu1.2_sparc.deb
Size/MD5: 39716 c46dbfe1ae7b6998a4f979deb6d38efb
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.4=
=2E5-3ubuntu1.2_sparc.deb
Size/MD5: 39944 727078d9e7c887b5c40dd0c41fae494b
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.4.5-3ub=
untu1.2_sparc.deb
Size/MD5: 1138246 7cc8d09dbf3f00fa3a794b9b153d323b
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.5.1-2ub=
untu1.1.diff.gz
Size/MD5: 213794 7b4334bd696a7ad8040adc1e161b0728
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.5.1-2ub=
untu1.1.dsc
Size/MD5: 1074 87a5e2cc9c84e355e6cfc87479558ef9
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.5.1.ori=
g.tar.gz
Size/MD5: 3153629 95a559c509081fdd07d78eafd4f4c3b4
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-dev_2.5.1=
-2ubuntu1.1_all.deb
Size/MD5: 136926 5e2342815225dde97e599b795869c440
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-doc_2.5.1=
-2ubuntu1.1_all.deb
Size/MD5: 892342 29bf7b8216b1bc764733368d9dc89757
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.5.1=
-2ubuntu1.1_amd64.deb
Size/MD5: 40198 78ddaa1e204dca1ea2c3f6c1843e2c0a
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.5.=
1-2ubuntu1.1_amd64.deb
Size/MD5: 47576 604b3d115e16b92d1eb4dd59fad03153
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.5=
=2E1-2ubuntu1.1_amd64.deb
Size/MD5: 42092 45b3697d79eb2d6cbba5d8e365d9d64e
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.5.=
1-2ubuntu1.1_amd64.deb
Size/MD5: 42066 1fb6f543973b63510aad129964fa0256
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.5=
=2E1-2ubuntu1.1_amd64.deb
Size/MD5: 42198 c3ed9184ce3c2774c6d04f1f7ff0bbdc
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.5.1-2ub=
untu1.1_amd64.deb
Size/MD5: 1229540 17e12578544c3967a5ab9ab6fda8cadb
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.5.1=
-2ubuntu1.1_i386.deb
Size/MD5: 39938 20a8ee462f522033a866d2ee633fd196
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.5.=
1-2ubuntu1.1_i386.deb
Size/MD5: 46836 3ab3f65fc6bb99c6f1bc16d841e32b15
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.5=
=2E1-2ubuntu1.1_i386.deb
Size/MD5: 41858 69a5f3580b0593d9cd17e0a9b5aa1dd1
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.5.=
1-2ubuntu1.1_i386.deb
Size/MD5: 41660 d505de7f65b1dbdff7c21ea0bdbd23fa
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.5=
=2E1-2ubuntu1.1_i386.deb
Size/MD5: 41928 176dc2c77c96ed0bb12b205acb41e3dd
http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.5.1-2ub=
untu1.1_i386.deb
Size/MD5: 1160294 b84b067af6de626db8ccdf2194e2bf18
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/p/postfix/postfix-cdb_2.5.1-2ubuntu1.=
1_lpia.deb
Size/MD5: 39916 04fd7aa3d769c46bda43426e5b44d75d
http://ports.ubuntu.com/pool/main/p/postfix/postfix-ldap_2.5.1-2ubuntu1=
=2E1_lpia.deb
Size/MD5: 46904 82e6ed37ae4b1a84dd3c1c32d45ccd1d
http://ports.ubuntu.com/pool/main/p/postfix/postfix-mysql_2.5.1-2ubuntu=
1.1_lpia.deb
Size/MD5: 41842 2c6dff73aa998744ed7f0ce1504849d4
http://ports.ubuntu.com/pool/main/p/postfix/postfix-pcre_2.5.1-2ubuntu1=
=2E1_lpia.deb
Size/MD5: 41566 31fc26942c5640325cf935042697c153
http://ports.ubuntu.com/pool/main/p/postfix/postfix-pgsql_2.5.1-2ubuntu=
1.1_lpia.deb
Size/MD5: 41910 3d571259272f296e535dc6036f44519b
http://ports.ubuntu.com/pool/main/p/postfix/postfix_2.5.1-2ubuntu1.1_lp=
ia.deb
Size/MD5: 1156792 d4431f19c2be4b04ca630a77d5168daf
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/p/postfix/postfix-cdb_2.5.1-2ubuntu1.=
1_powerpc.deb
Size/MD5: 42278 7464c74db433abd32dbeaec05ee670a1
http://ports.ubuntu.com/pool/main/p/postfix/postfix-ldap_2.5.1-2ubuntu1=
=2E1_powerpc.deb
Size/MD5: 49566 973b8fc257dc4d229341eb378ac45562
http://ports.ubuntu.com/pool/main/p/postfix/postfix-mysql_2.5.1-2ubuntu=
1.1_powerpc.deb
Size/MD5: 44402 956e887f9e3474185f8c3bcab69aa864
http://ports.ubuntu.com/pool/main/p/postfix/postfix-pcre_2.5.1-2ubuntu1=
=2E1_powerpc.deb
Size/MD5: 44184 4bd5a4630e414a17aa782acad9ae0cb9
http://ports.ubuntu.com/pool/main/p/postfix/postfix-pgsql_2.5.1-2ubuntu=
1.1_powerpc.deb
Size/MD5: 44538 9fbb5e83b895e279a9cea01bbf2aa7dd
http://ports.ubuntu.com/pool/main/p/postfix/postfix_2.5.1-2ubuntu1.1_po=
werpc.deb
Size/MD5: 1327794 070e9cade92d85939b9a1d2f19b04df4
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/p/postfix/postfix-cdb_2.5.1-2ubuntu1.=
1_sparc.deb
Size/MD5: 39872 1e9c43283f2fc12f33169913f0f13345
http://ports.ubuntu.com/pool/main/p/postfix/postfix-ldap_2.5.1-2ubuntu1=
=2E1_sparc.deb
Size/MD5: 47068 934a7df55a9c4cde1a08050272784d24
http://ports.ubuntu.com/pool/main/p/postfix/postfix-mysql_2.5.1-2ubuntu=
1.1_sparc.deb
Size/MD5: 41742 67fdde3f8bb0dd7d7f2e18bd56e5f796
http://ports.ubuntu.com/pool/main/p/postfix/postfix-pcre_2.5.1-2ubuntu1=
=2E1_sparc.deb
Size/MD5: 41770 d984d9d79311dfd294e4e0e19ac3a512
http://ports.ubuntu.com/pool/main/p/postfix/postfix-pgsql_2.5.1-2ubuntu=
1.1_sparc.deb
Size/MD5: 41950 46d7589c5a83a3b94f138c01c1f2d8a6
http://ports.ubuntu.com/pool/main/p/postfix/postfix_2.5.1-2ubuntu1.1_sp=
arc.deb
Size/MD5: 1175744 75fccac6b0b901bb0c603b4725236318
--x+WOirvrtTKur1pg
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Kees Cook
iEYEARECAAYFAkirRP8ACgkQH/9LqRcGPm1OugCfXZmZTHHZFa41q/YWYCBtbVQj
2QcAnj7pfbqh0TtaTywTP1SVeaJ+dv3M
=Z34u
-----END PGP SIGNATURE-----
"
Apple ships massive Mac OS X 10.4 security upgrade
USN-612-11: openssl-blacklist update
Torque Engine main reason for Penny Arcade’s absence on PSN
USN-620-1: OpenSSL vulnerabilities
This entry was posted
on 10:43 PM
.
Archives
-
▼
2008
(457)
-
▼
August
(65)
- CESA-2008:0836 Moderate CentOS 5 x86_64 libxml2 Up...
- CESA-2008:0849 Important CentOS 5 x86_64 ipsec-too...
- RHSA-2008:0847-01 Important: libtiff security and ...
- RHSA-2008:0848-01 Important: libtiff security and ...
- RHSA-2008:0863-01 Important: libtiff security update
- CESA-2008:0836 Moderate CentOS 5 i386 libxml2 Update
- CESA-2008:0836 Moderate CentOS 3 x86_64 libxml2 - ...
- CESA-2008:0836 Moderate CentOS 3 i386 libxml2 - se...
- Intel acquires Linux distro developer
- RHSA-2008:0648-01 Important: tomcat security update
- RHSA-2008:0849-01 Important: ipsec-tools security ...
- CESA-2008:0839 Moderate CentOS 4 ia64 postfix - se...
- DSA 1631-1: New libxml2 packages fix denial of ser...
- MIDs offer Atom, HSDPA
- CESA-2008:0836 Moderate CentOS 4 s390(x) libxml2 -...
- CESA-2008:0836 Moderate CentOS 4 ia64 libxml2 - se...
- Kubuntu 8.10 Alpha 4 Review
- CESA-2008:0855 Critical CentOS 4 s390(x) openssh -...
- Contentteller Release Candidate 2 available
- Creating Advanced MySQL-Based Virtual Hosts On Lig...
- openSUSE 11.1 Alpha 2
- DSA 1629-2: New postfix packages fix installabilit...
- USN-636-1: Postfix vulnerability
- RHSA-2008:0815-01 Moderate: yum-rhn-plugin securit...
- Intel aims x86 at digital TVs
- Intel unveils dual-core Atom
- GLSA 200808-12 Postfix: Local privilege escalatio...
- AMD Radeon HD 4870 X2 On Linux
- DSA 1629-1: New postfix packages fix privilege esc...
- RHSA-2008:0818-02 Moderate: hplip security update
- RHSA-2008:0814-01 Moderate: condor security and bu...
- Ubuntu Linux 8.10 Alpha-4 released
- No title
- No title
- How To Set Up WebDAV With Lighttpd On Debian Etch
- RHSA-2008:0816-01 Moderate: condor security and bu...
- Contentteller Release Candidate 1 available
- GLSA 200808-09 OpenLDAP: Denial of Service vulner...
- DSA 1627-1: New PowerDNS packages reduce DNS spoof...
- GLSA 200808-11 UUDeview: Insecure temporary file ...
- GLSA 200808-10 Adobe Reader: User-assisted execut...
- GLSA 200808-07 ClamAV: Multiple Denials of Service
- ispCP Omega 1.0.0 RC6 released
- GLSA 200808-08 stunnel: Security bypass
- GLSA 200808-03 Mozilla products: Multiple vulnera...
- RHSA-2008:0612-01 Important: kernel security and b...
- Lightweight GNOME alternative emerges
- GLSA 200808-06 libxslt: Execution of arbitrary code
- GLSA 200808-04 Wireshark: Denial of Service
- At last -- native apps for Motorola Linux phones
- USN-626-2: Devhelp, Epiphany, Midbrowser and Yelp ...
- GLSA 200808-01 xine-lib: User-assisted execution ...
- How To Install The Zimbra Desktop Email Client On ...
- Fedora 10 Alpha
- GLSA 200807-15 Pan: User-assisted execution of ar...
- USN-633-1: libxslt vulnerabilities
- Installing And Using OpenVZ On CentOS 5.2
- DSA 1625-1: New cupsys packages fix arbitrary code...
- USN-634-1: OpenLDAP vulnerability
- RHSA-2008:0790-02 Critical: java-1.5.0-ibm securit...
- Netbooks growing -- in two ways
- DSA 1624-1: New libxslt packages fix arbitrary cod...
- DSA 1626-1: New httrack packages fix arbitrary cod...
- USN-626-1: Firefox and xulrunner vulnerabilities
- DSA 1623-1: New dnsmasq packages fix cache poisoning
-
▼
August
(65)