"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: bind security update
Advisory ID: RHSA-2009:1620-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1620.html
Issue date: 2009-11-30
CVE Names: CVE-2009-4022
=====================================================================
1. Summary:
Updated bind packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
3. Description:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.
Michael Sinatra discovered that BIND was incorrectly caching responses
without performing proper DNSSEC validation, when those responses were
received during the resolution of a recursive client query that requested
DNSSEC records but indicated that checking should be disabled. A remote
attacker could use this flaw to bypass the DNSSEC validation check and
perform a cache poisoning attack if the target BIND server was receiving
such client queries. (CVE-2009-4022)
All BIND users are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing the
update, the BIND daemon (named) will be restarted automatically.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
538744 - CVE-2009-4022 bind: cache poisoning using not validated DNSSEC responses
6. Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind-9.3.6-4.P1.el5_4.1.src.rpm
i386:
bind-9.3.6-4.P1.el5_4.1.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.i386.rpm
bind-libs-9.3.6-4.P1.el5_4.1.i386.rpm
bind-sdb-9.3.6-4.P1.el5_4.1.i386.rpm
bind-utils-9.3.6-4.P1.el5_4.1.i386.rpm
x86_64:
bind-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-libs-9.3.6-4.P1.el5_4.1.i386.rpm
bind-libs-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-sdb-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-utils-9.3.6-4.P1.el5_4.1.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind-9.3.6-4.P1.el5_4.1.src.rpm
i386:
bind-chroot-9.3.6-4.P1.el5_4.1.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.i386.rpm
bind-devel-9.3.6-4.P1.el5_4.1.i386.rpm
bind-libbind-devel-9.3.6-4.P1.el5_4.1.i386.rpm
caching-nameserver-9.3.6-4.P1.el5_4.1.i386.rpm
x86_64:
bind-chroot-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-devel-9.3.6-4.P1.el5_4.1.i386.rpm
bind-devel-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-libbind-devel-9.3.6-4.P1.el5_4.1.i386.rpm
bind-libbind-devel-9.3.6-4.P1.el5_4.1.x86_64.rpm
caching-nameserver-9.3.6-4.P1.el5_4.1.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/bind-9.3.6-4.P1.el5_4.1.src.rpm
i386:
bind-9.3.6-4.P1.el5_4.1.i386.rpm
bind-chroot-9.3.6-4.P1.el5_4.1.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.i386.rpm
bind-devel-9.3.6-4.P1.el5_4.1.i386.rpm
bind-libbind-devel-9.3.6-4.P1.el5_4.1.i386.rpm
bind-libs-9.3.6-4.P1.el5_4.1.i386.rpm
bind-sdb-9.3.6-4.P1.el5_4.1.i386.rpm
bind-utils-9.3.6-4.P1.el5_4.1.i386.rpm
caching-nameserver-9.3.6-4.P1.el5_4.1.i386.rpm
ia64:
bind-9.3.6-4.P1.el5_4.1.ia64.rpm
bind-chroot-9.3.6-4.P1.el5_4.1.ia64.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.ia64.rpm
bind-devel-9.3.6-4.P1.el5_4.1.ia64.rpm
bind-libbind-devel-9.3.6-4.P1.el5_4.1.ia64.rpm
bind-libs-9.3.6-4.P1.el5_4.1.i386.rpm
bind-libs-9.3.6-4.P1.el5_4.1.ia64.rpm
bind-sdb-9.3.6-4.P1.el5_4.1.ia64.rpm
bind-utils-9.3.6-4.P1.el5_4.1.ia64.rpm
caching-nameserver-9.3.6-4.P1.el5_4.1.ia64.rpm
ppc:
bind-9.3.6-4.P1.el5_4.1.ppc.rpm
bind-chroot-9.3.6-4.P1.el5_4.1.ppc.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.ppc.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.ppc64.rpm
bind-devel-9.3.6-4.P1.el5_4.1.ppc.rpm
bind-devel-9.3.6-4.P1.el5_4.1.ppc64.rpm
bind-libbind-devel-9.3.6-4.P1.el5_4.1.ppc.rpm
bind-libbind-devel-9.3.6-4.P1.el5_4.1.ppc64.rpm
bind-libs-9.3.6-4.P1.el5_4.1.ppc.rpm
bind-libs-9.3.6-4.P1.el5_4.1.ppc64.rpm
bind-sdb-9.3.6-4.P1.el5_4.1.ppc.rpm
bind-utils-9.3.6-4.P1.el5_4.1.ppc.rpm
caching-nameserver-9.3.6-4.P1.el5_4.1.ppc.rpm
s390x:
bind-9.3.6-4.P1.el5_4.1.s390x.rpm
bind-chroot-9.3.6-4.P1.el5_4.1.s390x.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.s390.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.s390x.rpm
bind-devel-9.3.6-4.P1.el5_4.1.s390.rpm
bind-devel-9.3.6-4.P1.el5_4.1.s390x.rpm
bind-libbind-devel-9.3.6-4.P1.el5_4.1.s390.rpm
bind-libbind-devel-9.3.6-4.P1.el5_4.1.s390x.rpm
bind-libs-9.3.6-4.P1.el5_4.1.s390.rpm
bind-libs-9.3.6-4.P1.el5_4.1.s390x.rpm
bind-sdb-9.3.6-4.P1.el5_4.1.s390x.rpm
bind-utils-9.3.6-4.P1.el5_4.1.s390x.rpm
caching-nameserver-9.3.6-4.P1.el5_4.1.s390x.rpm
x86_64:
bind-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-chroot-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-devel-9.3.6-4.P1.el5_4.1.i386.rpm
bind-devel-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-libbind-devel-9.3.6-4.P1.el5_4.1.i386.rpm
bind-libbind-devel-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-libs-9.3.6-4.P1.el5_4.1.i386.rpm
bind-libs-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-sdb-9.3.6-4.P1.el5_4.1.x86_64.rpm
bind-utils-9.3.6-4.P1.el5_4.1.x86_64.rpm
caching-nameserver-9.3.6-4.P1.el5_4.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLE+gvXlSAg2UNWIIRAoVvAJ97KKl22lEjAyY2wJhZRmXdLKtf1ACgrdST
pRdevA9aKHNBnl92F8QK8tg=
=fgMX
-----END PGP SIGNATURE-----
"
RHSA-2009:1561-01 Important: libvorbis security update
"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: xerces-j2 security update
Advisory ID: RHSA-2009:1615-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1615.html
Issue date: 2009-11-30
CVE Names: CVE-2009-2625
=====================================================================
1. Summary:
Updated xerces-j2 packages that fix a security issue are now available for
Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
3. Description:
The xerces-j2 packages provide the Apache Xerces2 Java Parser, a
high-performance XML parser. A Document Type Definition (DTD) defines the
legal syntax (and also which elements can be used) for certain types of
files, such as XML files.
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. Applications using the Apache Xerces2 Java
Parser must be restarted for this update to take effect.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
512921 - CVE-2009-2625 OpenJDK: XML parsing Denial-Of-Service (6845701)
6. Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xerces-j2-2.7.1-7jpp.2.el5_4.2.src.rpm
i386:
xerces-j2-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-debuginfo-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-scripts-2.7.1-7jpp.2.el5_4.2.i386.rpm
x86_64:
xerces-j2-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-debuginfo-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-scripts-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xerces-j2-2.7.1-7jpp.2.el5_4.2.src.rpm
i386:
xerces-j2-debuginfo-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-demo-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-javadoc-apis-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-javadoc-impl-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-javadoc-other-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-javadoc-xni-2.7.1-7jpp.2.el5_4.2.i386.rpm
x86_64:
xerces-j2-debuginfo-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-demo-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-javadoc-apis-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-javadoc-impl-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-javadoc-other-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-javadoc-xni-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xerces-j2-2.7.1-7jpp.2.el5_4.2.src.rpm
i386:
xerces-j2-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-debuginfo-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-demo-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-javadoc-apis-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-javadoc-impl-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-javadoc-other-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-javadoc-xni-2.7.1-7jpp.2.el5_4.2.i386.rpm
xerces-j2-scripts-2.7.1-7jpp.2.el5_4.2.i386.rpm
ia64:
xerces-j2-2.7.1-7jpp.2.el5_4.2.ia64.rpm
xerces-j2-debuginfo-2.7.1-7jpp.2.el5_4.2.ia64.rpm
xerces-j2-demo-2.7.1-7jpp.2.el5_4.2.ia64.rpm
xerces-j2-javadoc-apis-2.7.1-7jpp.2.el5_4.2.ia64.rpm
xerces-j2-javadoc-impl-2.7.1-7jpp.2.el5_4.2.ia64.rpm
xerces-j2-javadoc-other-2.7.1-7jpp.2.el5_4.2.ia64.rpm
xerces-j2-javadoc-xni-2.7.1-7jpp.2.el5_4.2.ia64.rpm
xerces-j2-scripts-2.7.1-7jpp.2.el5_4.2.ia64.rpm
ppc:
xerces-j2-2.7.1-7jpp.2.el5_4.2.ppc.rpm
xerces-j2-debuginfo-2.7.1-7jpp.2.el5_4.2.ppc.rpm
xerces-j2-demo-2.7.1-7jpp.2.el5_4.2.ppc.rpm
xerces-j2-javadoc-apis-2.7.1-7jpp.2.el5_4.2.ppc.rpm
xerces-j2-javadoc-impl-2.7.1-7jpp.2.el5_4.2.ppc.rpm
xerces-j2-javadoc-other-2.7.1-7jpp.2.el5_4.2.ppc.rpm
xerces-j2-javadoc-xni-2.7.1-7jpp.2.el5_4.2.ppc.rpm
xerces-j2-scripts-2.7.1-7jpp.2.el5_4.2.ppc.rpm
s390x:
xerces-j2-2.7.1-7jpp.2.el5_4.2.s390x.rpm
xerces-j2-debuginfo-2.7.1-7jpp.2.el5_4.2.s390x.rpm
xerces-j2-demo-2.7.1-7jpp.2.el5_4.2.s390x.rpm
xerces-j2-javadoc-apis-2.7.1-7jpp.2.el5_4.2.s390x.rpm
xerces-j2-javadoc-impl-2.7.1-7jpp.2.el5_4.2.s390x.rpm
xerces-j2-javadoc-other-2.7.1-7jpp.2.el5_4.2.s390x.rpm
xerces-j2-javadoc-xni-2.7.1-7jpp.2.el5_4.2.s390x.rpm
xerces-j2-scripts-2.7.1-7jpp.2.el5_4.2.s390x.rpm
x86_64:
xerces-j2-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-debuginfo-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-demo-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-javadoc-apis-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-javadoc-impl-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-javadoc-other-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-javadoc-xni-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
xerces-j2-scripts-2.7.1-7jpp.2.el5_4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLE+e8XlSAg2UNWIIRArj1AJ9D7XYdGZq4f5t3oRZAS2QlvaOq9QCfRGc6
WQuAHppwz6F5zbI46BHKpec=
=ezs7
-----END PGP SIGNATURE-----
"
RHSA-2009:1561-01 Important: libvorbis security update
"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1942-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
November 29, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : wireshark
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE Id(s) : CVE-2009-1268 CVE-2008-1829 CVE-2009-2560 CVE-2009-2562 CVE-2009-3241 CVE-2009-3550 CVE-2009-3829
Several remote vulnerabilities have been discovered in the Wireshark
network traffic analyzer, which may lead to the execution of arbitrary
code or denial of service. The Common Vulnerabilities and Exposures
project identifies the following problems:
CVE-2009-2560
A NULL pointer dereference was found in the RADIUS dissector.
CVE-2009-3550
A NULL pointer dereference was found in the DCERP/NT dissector.
CVE-2009-3829
An integer overflow was discovered in the ERF parser.
This update also includes fixes for three minor issues, which were
scheduled for the next stable point update. (CVE-2008-1829,
CVE-2009-2562, CVE-2009-3241). Also CVE-2009-1268 was fixed for Etch.
Since this security update was issued prior to the release of the
point update, the fixes were included.
For the old stable distribution (etch), this problem has been fixed in
version 0.99.4-5.etch.4.
For the stable distribution (lenny), this problem has been fixed in
version 1.0.2-3+lenny7.
For the unstable distribution (sid) these problems have been fixed in
version 1.2.3-1.
We recommend that you upgrade your Wireshark packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
- -------------------------------
Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4.orig.tar.gz
Size/MD5 checksum: 13306790 2556a31d0d770dd1990bd67b98bd2f9b
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4.dsc
Size/MD5 checksum: 1075 2ff729c1b7aae033dd3e79fb29a63d68
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4.diff.gz
Size/MD5 checksum: 55126 25d98bc41c567ebc537f05ce2b36aa31
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-common_0.99.4-5.etch.4_alpha.deb
Size/MD5 checksum: 22916 9264867811ed85406dc802359dffe812
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_0.99.4-5.etch.4_alpha.deb
Size/MD5 checksum: 182750 844f036a9ea0914ad12d4c98ed12b3ed
http://security.debian.org/pool/updates/main/w/wireshark/ethereal_0.99.4-5.etch.4_alpha.deb
Size/MD5 checksum: 22552 6c949e6c7a92734b9887096ff78bed52
http://security.debian.org/pool/updates/main/w/wireshark/tshark_0.99.4-5.etch.4_alpha.deb
Size/MD5 checksum: 117444 643a41c38a8438d451cb1c38148f7ebb
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_0.99.4-5.etch.4_alpha.deb
Size/MD5 checksum: 9320680 b3421e4559d56c59818f449f050e81eb
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4_alpha.deb
Size/MD5 checksum: 673918 f958912a6d20834c00cb11ae11fc7e61
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-dev_0.99.4-5.etch.4_alpha.deb
Size/MD5 checksum: 22572 cfc4c2a166b66d11323ba7005a9ec458
http://security.debian.org/pool/updates/main/w/wireshark/tethereal_0.99.4-5.etch.4_alpha.deb
Size/MD5 checksum: 22564 9068787bffebdbaddd82dc9f1a351a11
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4_amd64.deb
Size/MD5 checksum: 619974 36ff84eb0469a0fc58fa4d74a4dc2d94
http://security.debian.org/pool/updates/main/w/wireshark/tshark_0.99.4-5.etch.4_amd64.deb
Size/MD5 checksum: 112510 210d916bf2fd3e62ee786038d0baf8e0
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_0.99.4-5.etch.4_amd64.deb
Size/MD5 checksum: 9120186 27328e93c02088bf3651ff91478ffdb0
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-dev_0.99.4-5.etch.4_amd64.deb
Size/MD5 checksum: 22596 bb66aced30828d44a7391d34a79c47de
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-common_0.99.4-5.etch.4_amd64.deb
Size/MD5 checksum: 22972 80ee26e1a6c2bdaa6b59c6fc7f523788
http://security.debian.org/pool/updates/main/w/wireshark/ethereal_0.99.4-5.etch.4_amd64.deb
Size/MD5 checksum: 22580 24fbe526a3b1f89270ac7487dd1a2449
http://security.debian.org/pool/updates/main/w/wireshark/tethereal_0.99.4-5.etch.4_amd64.deb
Size/MD5 checksum: 22588 cc4698a2e130908886800a44fee7a430
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_0.99.4-5.etch.4_amd64.deb
Size/MD5 checksum: 181778 aeb3324cb404333d00d073ae5626c85b
arm architecture (ARM)
http://security.debian.org/pool/updates/main/w/wireshark/tethereal_0.99.4-5.etch.4_arm.deb
Size/MD5 checksum: 21906 63ad883dd41145fbe730954c9e853388
http://security.debian.org/pool/updates/main/w/wireshark/ethereal_0.99.4-5.etch.4_arm.deb
Size/MD5 checksum: 21894 4b84544460f1fb35ea30b6a14c669ef4
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_0.99.4-5.etch.4_arm.deb
Size/MD5 checksum: 182202 6fb71186a9da6540c1d85630ab24cd1c
http://security.debian.org/pool/updates/main/w/wireshark/tshark_0.99.4-5.etch.4_arm.deb
Size/MD5 checksum: 107214 a5e3093fef0133b17f538b65b8d87342
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_0.99.4-5.etch.4_arm.deb
Size/MD5 checksum: 7737436 9b38f9f70345db66a4cd251c78584074
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-common_0.99.4-5.etch.4_arm.deb
Size/MD5 checksum: 22170 592174ccf980e88b00bfeb0bc6fadff8
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4_arm.deb
Size/MD5 checksum: 600704 96858438e740b509da8701ebc4dd56b8
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-dev_0.99.4-5.etch.4_arm.deb
Size/MD5 checksum: 21908 a283e65475356d9e945da09890b0427a
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/w/wireshark/tshark_0.99.4-5.etch.4_hppa.deb
Size/MD5 checksum: 109752 78730ace71c084bf3e65e5c968485687
http://security.debian.org/pool/updates/main/w/wireshark/tethereal_0.99.4-5.etch.4_hppa.deb
Size/MD5 checksum: 22576 ee65584380fe41b4eff538d1261971c3
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-common_0.99.4-5.etch.4_hppa.deb
Size/MD5 checksum: 22950 a44e59b3879ae0a71bcd300c53786bf5
http://security.debian.org/pool/updates/main/w/wireshark/ethereal_0.99.4-5.etch.4_hppa.deb
Size/MD5 checksum: 22572 806d4541a0a6fedc98708a98b3150c2a
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_0.99.4-5.etch.4_hppa.deb
Size/MD5 checksum: 182156 049ea6eb94efd5a3dfa5ae9dc30614b1
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4_hppa.deb
Size/MD5 checksum: 635026 71adda51739be4aaaa22eb3d851877e9
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_0.99.4-5.etch.4_hppa.deb
Size/MD5 checksum: 9854940 40cd33e4cff6e4150c0f1a455356efde
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-dev_0.99.4-5.etch.4_hppa.deb
Size/MD5 checksum: 22584 9785e5fa7e4560488ad8ae0dc9ca30e9
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/w/wireshark/tethereal_0.99.4-5.etch.4_i386.deb
Size/MD5 checksum: 21900 7ac4f600c97bf045debdd6d3beb17c63
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_0.99.4-5.etch.4_i386.deb
Size/MD5 checksum: 181616 4ba5807945434988b11614e5c51fcad4
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4_i386.deb
Size/MD5 checksum: 565182 34dd0aa961fbe70b0ed0d09a811a70b4
http://security.debian.org/pool/updates/main/w/wireshark/ethereal_0.99.4-5.etch.4_i386.deb
Size/MD5 checksum: 21894 99830ad6fc6c8e6009e68e6fc1122500
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_0.99.4-5.etch.4_i386.deb
Size/MD5 checksum: 7499524 4d49ade6925540936649c9272fb4389d
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-common_0.99.4-5.etch.4_i386.deb
Size/MD5 checksum: 22166 2cf78a9cfbe7e5571adead12aa9042e2
http://security.debian.org/pool/updates/main/w/wireshark/tshark_0.99.4-5.etch.4_i386.deb
Size/MD5 checksum: 102254 cd10b44ecca11449e9e04dd183eefd3f
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-dev_0.99.4-5.etch.4_i386.deb
Size/MD5 checksum: 21906 0b31fd8f824915bcad7b5d91a98367a0
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-dev_0.99.4-5.etch.4_ia64.deb
Size/MD5 checksum: 22566 0aa3c204facfbf284f11871187a0eb7c
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-common_0.99.4-5.etch.4_ia64.deb
Size/MD5 checksum: 22910 38378c14e8cdc6c24ed656352b21a34d
http://security.debian.org/pool/updates/main/w/wireshark/tshark_0.99.4-5.etch.4_ia64.deb
Size/MD5 checksum: 145810 d3e7be3aaaa760ba81c05eacbf4aa44b
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_0.99.4-5.etch.4_ia64.deb
Size/MD5 checksum: 10648322 7c47fad99b8b9fa55327825ee9cc447f
http://security.debian.org/pool/updates/main/w/wireshark/tethereal_0.99.4-5.etch.4_ia64.deb
Size/MD5 checksum: 22560 9f24c28d59dc3f0f5e896333d3d9bdf4
http://security.debian.org/pool/updates/main/w/wireshark/ethereal_0.99.4-5.etch.4_ia64.deb
Size/MD5 checksum: 22552 60aad869b41bbf52d287fcab648457bc
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4_ia64.deb
Size/MD5 checksum: 827672 0bf989273e3b5a6044dc5cae5771859f
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_0.99.4-5.etch.4_ia64.deb
Size/MD5 checksum: 182720 5fc96026980d5348dda2a52d107c54b6
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-common_0.99.4-5.etch.4_mips.deb
Size/MD5 checksum: 22160 d8290ac7830ef34ec4b7c0dc0c6d736d
http://security.debian.org/pool/updates/main/w/wireshark/tshark_0.99.4-5.etch.4_mips.deb
Size/MD5 checksum: 104886 3c9ef63521f5487537c003fd414caa1e
http://security.debian.org/pool/updates/main/w/wireshark/tethereal_0.99.4-5.etch.4_mips.deb
Size/MD5 checksum: 21900 5e0d86e61c76e2c5e8757b018a422784
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4_mips.deb
Size/MD5 checksum: 588894 dbe0163151865a2ebc0de7dc15115cb4
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-dev_0.99.4-5.etch.4_mips.deb
Size/MD5 checksum: 21904 c60608c00b86e6a9179f336f4d7c298b
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_0.99.4-5.etch.4_mips.deb
Size/MD5 checksum: 181616 2a34792935505310fa697872ea18ce23
http://security.debian.org/pool/updates/main/w/wireshark/ethereal_0.99.4-5.etch.4_mips.deb
Size/MD5 checksum: 21890 86d703936559a664f9fecf9b874cc7be
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_0.99.4-5.etch.4_mips.deb
Size/MD5 checksum: 8017732 42c7bbc57b980cafa4684927159545bd
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_0.99.4-5.etch.4_mipsel.deb
Size/MD5 checksum: 7405334 a65008d2ff4d5ad004870805554bc3e7
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4_mipsel.deb
Size/MD5 checksum: 575950 a24c28544c0a7c90c91567fbe1cc1ebd
http://security.debian.org/pool/updates/main/w/wireshark/tshark_0.99.4-5.etch.4_mipsel.deb
Size/MD5 checksum: 104576 b32a2cbcdf02d4cc48c7ebec6c6630b3
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_0.99.4-5.etch.4_mipsel.deb
Size/MD5 checksum: 182756 cb2276effe227636a7f0261b34d50642
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-dev_0.99.4-5.etch.4_mipsel.deb
Size/MD5 checksum: 22572 50a34025145b9c68619536836137bbb3
http://security.debian.org/pool/updates/main/w/wireshark/tethereal_0.99.4-5.etch.4_mipsel.deb
Size/MD5 checksum: 22564 a6bf0c153e84a88219f4ea41a420886b
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-common_0.99.4-5.etch.4_mipsel.deb
Size/MD5 checksum: 22910 ffccf61f6478f35c91ffe9573f9efb25
http://security.debian.org/pool/updates/main/w/wireshark/ethereal_0.99.4-5.etch.4_mipsel.deb
Size/MD5 checksum: 22556 e854c72d464872867e22681111fd3229
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_0.99.4-5.etch.4_powerpc.deb
Size/MD5 checksum: 182764 d6e8d0457c6680fb71e53d012593532e
http://security.debian.org/pool/updates/main/w/wireshark/ethereal_0.99.4-5.etch.4_powerpc.deb
Size/MD5 checksum: 22562 ee928728d4aeeecf45ff03b3ffbe66db
http://security.debian.org/pool/updates/main/w/wireshark/tshark_0.99.4-5.etch.4_powerpc.deb
Size/MD5 checksum: 104318 62b6fdb42fc8b828feaebe68b94d10d8
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-dev_0.99.4-5.etch.4_powerpc.deb
Size/MD5 checksum: 22578 499505e0c67287e9e4bddd2c520f911c
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_0.99.4-5.etch.4_powerpc.deb
Size/MD5 checksum: 8603008 0734d75f6c5edaaaa6ab90cdca36f4b9
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-common_0.99.4-5.etch.4_powerpc.deb
Size/MD5 checksum: 22920 90f46d5c142354d40d0d5e134e07bc2b
http://security.debian.org/pool/updates/main/w/wireshark/tethereal_0.99.4-5.etch.4_powerpc.deb
Size/MD5 checksum: 22572 3577d9aca2b8372a04483b2b881a4290
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4_powerpc.deb
Size/MD5 checksum: 583630 7c027623b17eed73130d0c851239a3b6
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-common_0.99.4-5.etch.4_s390.deb
Size/MD5 checksum: 22914 bd4eebd01f47b771d46feb10cd370e68
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-dev_0.99.4-5.etch.4_s390.deb
Size/MD5 checksum: 22574 ae0f0e473a8b4d1393d42db4f8c8ce2a
http://security.debian.org/pool/updates/main/w/wireshark/tshark_0.99.4-5.etch.4_s390.deb
Size/MD5 checksum: 115668 0ad97c94342ac14d4acebe5969ef7379
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_0.99.4-5.etch.4_s390.deb
Size/MD5 checksum: 9752846 f122226986acd89968a30710348205c6
http://security.debian.org/pool/updates/main/w/wireshark/ethereal_0.99.4-5.etch.4_s390.deb
Size/MD5 checksum: 22560 079c886952f5258ed59f6d1573890140
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4_s390.deb
Size/MD5 checksum: 641020 3fd0f64fcaea16198e9533084cd0b567
http://security.debian.org/pool/updates/main/w/wireshark/tethereal_0.99.4-5.etch.4_s390.deb
Size/MD5 checksum: 22566 a4db075ff6f6877289c6333e55a791ab
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_0.99.4-5.etch.4_s390.deb
Size/MD5 checksum: 182782 b1f4a269dd14fab055fed4a60dcb5c12
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/w/wireshark/tethereal_0.99.4-5.etch.4_sparc.deb
Size/MD5 checksum: 22562 cfbe034d2fb71b9aadf903c8d4a55439
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_0.99.4-5.etch.4_sparc.deb
Size/MD5 checksum: 586600 a2816359a42e5cb03dc36775a82c7ea3
http://security.debian.org/pool/updates/main/w/wireshark/tshark_0.99.4-5.etch.4_sparc.deb
Size/MD5 checksum: 104180 376bd28f3a920a0ee62927004c09a8d4
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_0.99.4-5.etch.4_sparc.deb
Size/MD5 checksum: 182148 6c3522ad4e94a8904789cb2ba8e8ece8
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-common_0.99.4-5.etch.4_sparc.deb
Size/MD5 checksum: 22934 4594c2c680b000253f6fa301e7b4e6c6
http://security.debian.org/pool/updates/main/w/wireshark/ethereal-dev_0.99.4-5.etch.4_sparc.deb
Size/MD5 checksum: 22570 d7ee740d72ce48b2f5d41e9532308fa7
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_0.99.4-5.etch.4_sparc.deb
Size/MD5 checksum: 8679472 4815608bf180edcbdc56e08d728a520a
http://security.debian.org/pool/updates/main/w/wireshark/ethereal_0.99.4-5.etch.4_sparc.deb
Size/MD5 checksum: 22554 6e0336bf14d034653999ce50fe83c267
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7.diff.gz
Size/MD5 checksum: 110161 250e28a303aa2313bf9c8c92e938b543
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2.orig.tar.gz
Size/MD5 checksum: 16935492 1834437f7c6dbed02082e7757133047d
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7.dsc
Size/MD5 checksum: 1502 70bc384e5c51e5b1c05817b5404ec0c6
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/w/wireshark/tshark_1.0.2-3+lenny7_alpha.deb
Size/MD5 checksum: 126172 5b2e9b063121cd415647515718aa1f90
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7_alpha.deb
Size/MD5 checksum: 731338 7691c8c717923ad7f11755393c67ed4b
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_1.0.2-3+lenny7_alpha.deb
Size/MD5 checksum: 12096806 f7a7e542ab24455fde2d62258e35dfe6
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_1.0.2-3+lenny7_alpha.deb
Size/MD5 checksum: 583592 2dc280bc416e8a8eba573f10bd9a4c61
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_1.0.2-3+lenny7_amd64.deb
Size/MD5 checksum: 583890 2dc231341d713172bff1e122b5c1ed53
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7_amd64.deb
Size/MD5 checksum: 659554 f4d744de8dc70ff988e2c625505545cb
http://security.debian.org/pool/updates/main/w/wireshark/tshark_1.0.2-3+lenny7_amd64.deb
Size/MD5 checksum: 119016 f6c6d48c2f7cc0f47d112df9c74302b4
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_1.0.2-3+lenny7_amd64.deb
Size/MD5 checksum: 11869634 c33d47f0ba58f5b476a3038aa54e10ca
arm architecture (ARM)
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_1.0.2-3+lenny7_arm.deb
Size/MD5 checksum: 584248 eda8fbd1f0706d58b7d25ed6f2646e6b
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7_arm.deb
Size/MD5 checksum: 614108 fd591bbf2469527ea552e0dbbb4eed26
http://security.debian.org/pool/updates/main/w/wireshark/tshark_1.0.2-3+lenny7_arm.deb
Size/MD5 checksum: 111024 6800249d87bb21dceb604527ec92b654
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_1.0.2-3+lenny7_arm.deb
Size/MD5 checksum: 10215708 a33f1fa02617480ed3321d552a5b2e08
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_1.0.2-3+lenny7_armel.deb
Size/MD5 checksum: 584856 3dd565d67eb4c6e18b21623292c4551f
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7_armel.deb
Size/MD5 checksum: 619918 06683265eff3c5ca0853a9b3c053af48
http://security.debian.org/pool/updates/main/w/wireshark/tshark_1.0.2-3+lenny7_armel.deb
Size/MD5 checksum: 113466 14b53be93f55eb1430a25264361cb87d
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_1.0.2-3+lenny7_armel.deb
Size/MD5 checksum: 10216784 6c1f84c62053658adcc6c14822f4a64a
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_1.0.2-3+lenny7_hppa.deb
Size/MD5 checksum: 13271300 55580fd284ab37e4bae7fcc9b1ee4669
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7_hppa.deb
Size/MD5 checksum: 694714 6cae9b82e13e3c812ea0e3286955a35e
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_1.0.2-3+lenny7_hppa.deb
Size/MD5 checksum: 584266 7c55dcbb1727e575ed3a99f5e22ba9f2
http://security.debian.org/pool/updates/main/w/wireshark/tshark_1.0.2-3+lenny7_hppa.deb
Size/MD5 checksum: 120924 734b01b1cebfa52fac30578a22104902
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_1.0.2-3+lenny7_i386.deb
Size/MD5 checksum: 10108360 5157ee3d041ccbb2931e13a8551706ff
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_1.0.2-3+lenny7_i386.deb
Size/MD5 checksum: 582516 2621c64b953d5f87b0f80ba8614637f9
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7_i386.deb
Size/MD5 checksum: 619208 4a34e3203d08488ac5df37bdfde269a6
http://security.debian.org/pool/updates/main/w/wireshark/tshark_1.0.2-3+lenny7_i386.deb
Size/MD5 checksum: 111392 aac2e88f950cbf280786af3449a952f8
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_1.0.2-3+lenny7_ia64.deb
Size/MD5 checksum: 13688788 0b6e89ff7c538a86479e2cc72e98d048
http://security.debian.org/pool/updates/main/w/wireshark/tshark_1.0.2-3+lenny7_ia64.deb
Size/MD5 checksum: 153864 d49889a0de70d2a4ae08397b43e16d59
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_1.0.2-3+lenny7_ia64.deb
Size/MD5 checksum: 569656 690330248a894259db9caef7d032627a
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7_ia64.deb
Size/MD5 checksum: 930064 b697cd603d6769efaa24975f41038a87
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/w/wireshark/tshark_1.0.2-3+lenny7_mips.deb
Size/MD5 checksum: 112318 4fcb6546e6d121413976df774bcb4e0a
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_1.0.2-3+lenny7_mips.deb
Size/MD5 checksum: 583750 2bdf2ecef90acdc4cd450aebeba1d8b3
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7_mips.deb
Size/MD5 checksum: 636448 7bcf284817662a74d8c00bb7b7d3156b
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_1.0.2-3+lenny7_mips.deb
Size/MD5 checksum: 10417404 cfd63f84d47af76a912b86ef5b58b3d7
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_1.0.2-3+lenny7_mipsel.deb
Size/MD5 checksum: 569688 d0219a56c1ef0b9bab390cb785670dcf
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_1.0.2-3+lenny7_mipsel.deb
Size/MD5 checksum: 9730674 4ec33f0b1ab577373d3d65226edd48cb
http://security.debian.org/pool/updates/main/w/wireshark/tshark_1.0.2-3+lenny7_mipsel.deb
Size/MD5 checksum: 113170 e17b2b66a26cd2b86b878b1bb6927fb1
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7_mipsel.deb
Size/MD5 checksum: 626942 938890f711e3cd6f84f504d8874372b9
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_1.0.2-3+lenny7_powerpc.deb
Size/MD5 checksum: 11227316 dbcd7366171cec00edf706699b91399f
http://security.debian.org/pool/updates/main/w/wireshark/tshark_1.0.2-3+lenny7_powerpc.deb
Size/MD5 checksum: 122336 672aedc7957f3ae9f18e5e6ce33da56f
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7_powerpc.deb
Size/MD5 checksum: 677424 06cdd9eef16be333ccb60b94e3309d16
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_1.0.2-3+lenny7_powerpc.deb
Size/MD5 checksum: 584610 cc6c9ad46b6e371764cb7193d6a18214
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/w/wireshark/tshark_1.0.2-3+lenny7_s390.deb
Size/MD5 checksum: 121886 9f312812e02428d07075d543b99d41ba
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_1.0.2-3+lenny7_s390.deb
Size/MD5 checksum: 12488896 55d3da11d6a7a5af75d549b08e0dd59f
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7_s390.deb
Size/MD5 checksum: 671222 331a3c79fd70ea249cab31263686d678
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_1.0.2-3+lenny7_s390.deb
Size/MD5 checksum: 569648 08e4ba2371daeb6fcf724d7bf85d64be
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-common_1.0.2-3+lenny7_sparc.deb
Size/MD5 checksum: 11290100 d57f0c2b031b2721e1298cfe7f4881ff
http://security.debian.org/pool/updates/main/w/wireshark/wireshark_1.0.2-3+lenny7_sparc.deb
Size/MD5 checksum: 629584 83b68e8b43bdf971116fdafc9fc885a5
http://security.debian.org/pool/updates/main/w/wireshark/wireshark-dev_1.0.2-3+lenny7_sparc.deb
Size/MD5 checksum: 569692 e006fc660e26f034936184464d2f540b
http://security.debian.org/pool/updates/main/w/wireshark/tshark_1.0.2-3+lenny7_sparc.deb
Size/MD5 checksum: 113466 85d3fa0b0e7baf6b1679394cffea5948
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAksSwZ0ACgkQXm3vHE4uylowlACg0A+Ht64yIVxPcpnb+zrKvKJy
ye4An0XWpeRT5aX3R3QR8hoxR1rE51vB
=RCnv
-----END PGP SIGNATURE-----
"
DSA 1938-1: New php-mail packages fix insufficient input sanitisingThe Big Reunion Festival gets ready to party
"Gentoo Linux Security Advisory GLSA 200911-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: dstat: Untrusted search path
Date: November 25, 2009
Bugs: #293497
ID: 200911-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
An untrusted search path vulnerability in the dstat might result in the
execution of arbitrary code.
Background
==========
dstat is a versatile system resource monitor written in Python.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 sys-apps/dstat = 0.6.9-r1
Description
===========
Robert Buchholz of the Gentoo Security Team reported that dstat
includes the current working directory and subdirectories in the Python
module search path (sys.path) before calling "import".
Impact
======
A local attacker could entice a user to run "dstat" from a directory
containing a specially crafted Python module, resulting in the
execution of arbitrary code with the privileges of the user running the
application.
Workaround
==========
Do not run "dstat" from untrusted working directories.
Resolution
==========
All dstat users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-apps/dstat-0.6.9-r1"
References
==========
[ 1 ] CVE-2009-3894
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3894
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200911-04.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2009 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
"
The Holloways return home to The GarageGLSA 200911-06 PEAR Net_Traceroute: Command injection
"Gentoo Linux Security Advisory GLSA 200911-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: PEAR Net_Traceroute: Command injection
Date: November 26, 2009
Bugs: #294264
ID: 200911-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
An input sanitation error in PEAR Net_Traceroute might allow remote
attackers to execute arbitrary commands.
Background
==========
PEAR Net_Traceroute is an OS independent wrapper class for executing
traceroute calls from PHP.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-php/PEAR-Net_Traceroute = 0.21.2
Description
===========
Pasquale Imperato reported that the $host parameter to the traceroute()
function in Traceroute.php is not properly sanitized before being
passed to exec().
Impact
======
A remote attacker could exploit this vulnerability when user input is
passed directly to PEAR Net_Traceroute in a PHP script, possibly
resulting in the remote execution of arbitrary shell commands with the
privileges of the user running the affected PHP script.
Workaround
==========
Ensure that all data that is passed to the traceroute() function is
properly shell escaped (for instance using the escapeshellcmd()
function).
Resolution
==========
All PEAR Net_Traceroute users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
">=dev-php/PEAR-Net_Traceroute-0.21.2"
References
==========
[ 1 ] CVE-2009-4025
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4025
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200911-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2009 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
"
Ronan Keating suffering anxiety attacks since Stephen Gatelys deathGLSA 200910-02 Pidgin: Multiple vulnerabilities
"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1939-1 security@debian.org
http://www.debian.org/security/ Giuseppe Iuculano
November 24, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : libvorbis
Vulnerability : several
Problem type : local(remote)
Debian-specific: no
Debian bug : 540958
CVE Ids : CVE-2009-2663 CVE-2009-3379
Lucas Adamski, Matthew Gregan, David Keeler, and Dan Kaminsky discovered
that libvorbis, a library for the Vorbis general-purpose compressed
audio codec, did not correctly handle certain malformed ogg files. An
attacher could cause a denial of service (memory corruption and
application crash) or possibly execute arbitrary code via a crafted .ogg
file.
For the oldstable distribution (etch), these problems have been fixed in
version 1.1.2.dfsg-1.4+etch1.
For the stable distribution (lenny), these problems have been fixed in
version 1.2.0.dfsg-3.1+lenny1.
For the testing distribution (squeeze) and the unstable distribution
(sid), these problems have been fixed in version 1.2.3-1
We recommend that you upgrade your libvorbis packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
- -------------------------------
Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.1.2.dfsg-1.4+etch1.diff.gz
Size/MD5 checksum: 17870 2e11d2c0176fd0a8e796e80667a681d8
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.1.2.dfsg.orig.tar.gz
Size/MD5 checksum: 1312540 44cf09fef7f78e7c6ba7dd63b6137412
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.1.2.dfsg-1.4+etch1.dsc
Size/MD5 checksum: 808 2a9e6b4dcd72e8bc8cf956404a1fb7ca
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_alpha.deb
Size/MD5 checksum: 94682 9c20663d4f36265241830b388d90a455
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_alpha.deb
Size/MD5 checksum: 19440 7caafa303b7fa32f0a6192d6b75b9874
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_alpha.deb
Size/MD5 checksum: 110988 8751f9d236abbacaf14c7f5e5a57a078
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_alpha.deb
Size/MD5 checksum: 495658 681d35e8b06a6d0d8c37f7c9fb5325c8
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_amd64.deb
Size/MD5 checksum: 93808 ee1c37e468df9f96aa86ecf11a9c3050
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_amd64.deb
Size/MD5 checksum: 18018 767aa39de969e302a62a8b1968aa8c39
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_amd64.deb
Size/MD5 checksum: 102012 91d4ff0b056c721041ec925adb956623
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_amd64.deb
Size/MD5 checksum: 463556 431c01bc7bc69936fdc4d4c1d32c12eb
arm architecture (ARM)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_arm.deb
Size/MD5 checksum: 459034 52d059837ff4ec37205c65c952d10dfd
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_arm.deb
Size/MD5 checksum: 75992 33f262fdec3a52f4d6e5cebd3238f600
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_arm.deb
Size/MD5 checksum: 98776 7c24697b474af64e5a85625777d0bc8d
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_arm.deb
Size/MD5 checksum: 18776 c00e2fcb4e65aa26d8a9d2fda4a86c0c
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_hppa.deb
Size/MD5 checksum: 486808 97cee8dfb056da78638884749a4cd3bb
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_hppa.deb
Size/MD5 checksum: 22180 97e127da32402398f9d3d073917aaf30
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_hppa.deb
Size/MD5 checksum: 108614 9e7b5f226060f6d492aa5a37830e8382
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_hppa.deb
Size/MD5 checksum: 92586 d768d0011d425413b5513cc6077c90cc
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_i386.deb
Size/MD5 checksum: 19096 ddf590ab7c51f75015815e7500c73c02
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_i386.deb
Size/MD5 checksum: 98656 d84b4ff35636254f8b79c4a1817a9f1b
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_i386.deb
Size/MD5 checksum: 455630 419e92bd2278385d2332485bfb5ec1c4
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_i386.deb
Size/MD5 checksum: 75688 8162e49e13fdd5f4f90b5e04737aef5b
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_ia64.deb
Size/MD5 checksum: 24924 8d0212e706fc747d46a3975aecab7216
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_ia64.deb
Size/MD5 checksum: 136680 c1c52b4d20178d8f2cce5201965bdfd9
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_ia64.deb
Size/MD5 checksum: 510898 b6c1d63e991ad6ac200b84a2ef2c7778
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_ia64.deb
Size/MD5 checksum: 98322 3fabeea5ac4bccea511c9896e9348bd4
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_mips.deb
Size/MD5 checksum: 479806 3d49befd4f109864db338470ca55cfc7
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_mips.deb
Size/MD5 checksum: 81862 6d767ac118ce0a06283d21bb324769f4
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_mips.deb
Size/MD5 checksum: 105506 b11a6faac0f84f7a39cd0926de7663d4
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_mips.deb
Size/MD5 checksum: 21196 0d5bab8e1549e3de1800c81d3103cef5
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_mipsel.deb
Size/MD5 checksum: 21184 4217f461a2c1d30891835bae475a4821
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_mipsel.deb
Size/MD5 checksum: 105478 f3465e3a92fc170d74fbb0506e4680ad
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_mipsel.deb
Size/MD5 checksum: 469818 126dd26c5dcde5fe3d600e0d40a9ceba
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_mipsel.deb
Size/MD5 checksum: 77222 b9441d25e697dcc50d524f1877cfca5e
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_powerpc.deb
Size/MD5 checksum: 105636 a61d57534c62b311e960335f238c0470
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_powerpc.deb
Size/MD5 checksum: 21596 cf321ab0979c9515553214fdbb4e133e
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_powerpc.deb
Size/MD5 checksum: 481752 593995999d19a5d57c3478675e98c420
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_powerpc.deb
Size/MD5 checksum: 82404 fd07873df7789ab093013b1baaee0edc
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_s390.deb
Size/MD5 checksum: 90790 4408b9fbd5a4f7f942b65db63784e7a7
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_s390.deb
Size/MD5 checksum: 103024 f3ea14da7a63f1cfbc44dc1339c40262
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_s390.deb
Size/MD5 checksum: 453202 d0ba253a2d00eb5d250be7d0b99bb727
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_s390.deb
Size/MD5 checksum: 21148 104ecad6b00ae020821510a23cdfa8b7
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_sparc.deb
Size/MD5 checksum: 460314 dac04732917ced67c8a81f708db6cfd4
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_sparc.deb
Size/MD5 checksum: 98978 e83cbcf90ca35296f02f01d57b3e915e
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_sparc.deb
Size/MD5 checksum: 79810 12328b2d6338996b25aeac8877331400
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_sparc.deb
Size/MD5 checksum: 18084 46c1fef587328abad16f2fb4f47add8d
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.2.0.dfsg-3.1+lenny1.diff.gz
Size/MD5 checksum: 10323 8a3c02bfdb7c2e6edc1a6ba952f4706e
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.2.0.dfsg-3.1+lenny1.dsc
Size/MD5 checksum: 1280 0e4285bf0fc44a182f35b15b3bef92af
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.2.0.dfsg.orig.tar.gz
Size/MD5 checksum: 1477935 3c7fff70c0989ab3c1c85366bf670818
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_alpha.deb
Size/MD5 checksum: 21514 54f57d2e85a0be5e1acad07ce954a168
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_alpha.deb
Size/MD5 checksum: 115208 f6dc710dafeffbec73e13170d9105829
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_alpha.deb
Size/MD5 checksum: 506716 140e414c05e73eab318a51f7d4aa2b8d
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_alpha.deb
Size/MD5 checksum: 96064 73db866b777df1909563190182640945
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_amd64.deb
Size/MD5 checksum: 478134 8ebe1257d8e115a5af1058f8a61d50bd
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_amd64.deb
Size/MD5 checksum: 20274 a89e0200bbd700c8ed5661493534f02b
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_amd64.deb
Size/MD5 checksum: 109190 f6ff320aee0bd6866e801206af4484f1
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_amd64.deb
Size/MD5 checksum: 95610 cea6849521bd398355ca1532577d331d
arm architecture (ARM)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_arm.deb
Size/MD5 checksum: 20652 66ffe73d9861dcd3232dbd436f8dcc6b
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_arm.deb
Size/MD5 checksum: 102034 cd5000ef6cacd9233d085ae95ea23d2b
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_arm.deb
Size/MD5 checksum: 468072 30b862d2990829dcc6e981216367f969
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_arm.deb
Size/MD5 checksum: 78076 37db0e079e0d0fd143ef3ec24346d007
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_armel.deb
Size/MD5 checksum: 81476 5ab9275754100c446347e657240e875f
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_armel.deb
Size/MD5 checksum: 111004 823aec12ac3297a641b2dea659618a1a
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_armel.deb
Size/MD5 checksum: 23996 753c36a998841c8f8aefa4d934d5823b
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_armel.deb
Size/MD5 checksum: 480568 2d544a79b74d22a2e680b521236ac4e7
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_hppa.deb
Size/MD5 checksum: 24294 f2ef7f0f4a071a61756b244a1c2f8fdd
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_hppa.deb
Size/MD5 checksum: 498788 cc869f79c972f23a0d0a4fba7257f67b
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_hppa.deb
Size/MD5 checksum: 114236 161bd0d31cdc44d0dce14f68af75d2bf
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_hppa.deb
Size/MD5 checksum: 93650 2120a920860dbf8b027ab3d0f53e35c3
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_i386.deb
Size/MD5 checksum: 101822 b35241103ae3b649b37082c75bb6c349
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_i386.deb
Size/MD5 checksum: 77266 e6272466696d9b1307c446495933904a
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_i386.deb
Size/MD5 checksum: 21228 5c64197678bc8102cac8d5e24ebf30f4
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_i386.deb
Size/MD5 checksum: 465548 3b5e01cb7ed617ceef7cfac672c42061
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_ia64.deb
Size/MD5 checksum: 27076 b10ab2d103d2c360fe8d865592170fed
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_ia64.deb
Size/MD5 checksum: 145298 1a48bdf218f2ad34e214edbdb74d3017
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_ia64.deb
Size/MD5 checksum: 100386 815eea5cd2cdd1f5c880d027e9d0d047
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_ia64.deb
Size/MD5 checksum: 529794 243a7c8dc4d8005141b722709e00fefd
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_mips.deb
Size/MD5 checksum: 23034 862ec33f1cdc5de0fe9d70a1dddabddc
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_mips.deb
Size/MD5 checksum: 489974 335f4276e4ace9e795a708bb378293ed
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_mips.deb
Size/MD5 checksum: 83664 5ebfbe684ab67af2070d7ebd78e920b6
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_mips.deb
Size/MD5 checksum: 109642 9088464063081cf3db925abbd77f95ab
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_mipsel.deb
Size/MD5 checksum: 78800 cbf9d026a528889229ede2fbbf07f9b1
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_mipsel.deb
Size/MD5 checksum: 110172 56df9de194208745f918c2489fd07dc4
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_mipsel.deb
Size/MD5 checksum: 23038 ebafe740326f2b2477e4a2932e0b1f20
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_mipsel.deb
Size/MD5 checksum: 480462 354c01ff4d127cfbd90b5d2bbf115124
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_powerpc.deb
Size/MD5 checksum: 84936 a8e159dfb4a7947ab21d03e42743f273
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_powerpc.deb
Size/MD5 checksum: 489602 055f226558649f3824c77ccf8710b3ff
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_powerpc.deb
Size/MD5 checksum: 25112 cbc19a2f5b18a39027a5f4796c328d38
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_powerpc.deb
Size/MD5 checksum: 115288 69dcb48991d54cb44f440951453819be
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_s390.deb
Size/MD5 checksum: 92652 332abcfbc21fde03527f98394d430589
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_s390.deb
Size/MD5 checksum: 23374 459565d5bf6fb2423bb966585050f76e
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_s390.deb
Size/MD5 checksum: 108572 d18b6585b3ac105589cbd85149f6dbf2
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_s390.deb
Size/MD5 checksum: 464128 54fd2ed9b7f46e98c61717df93623179
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_sparc.deb
Size/MD5 checksum: 104330 4c01729046cf263045262dbac19cf380
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_sparc.deb
Size/MD5 checksum: 20572 737481d4662074e10faaec373056d761
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_sparc.deb
Size/MD5 checksum: 81536 6ac89e9942629ddbf7e1bbf21226fda1
http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_sparc.deb
Size/MD5 checksum: 472582 bb723b7a07db184b259c28d757d1e271
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAksMYHkACgkQXm3vHE4uylqW1wCfafO6HW+9M4d2d2bMOHB/7bFv
CjIAn0S6sKzN3XYdLgar9zLlxbKSFFRx
=oVpm
-----END PGP SIGNATURE-----
"
DSA 1938-1: New php-mail packages fix insufficient input sanitisingThe Big Reunion Festival gets ready to party
"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1941-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
November 25, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : poppler
Vulnerability : several
Problem type : local(remote)
Debian-specific: no
CVE Id(s) : CVE-2009-0755 CVE-2009-3903 CVE-2009-3904 CVE-2009-3905 CVE-2009-3906 CVE-2009-3907 CVE-2009-3908 CVE-2009-3909 CVE-2009-3938
Several integer overflows, buffer overflows and memory allocation
errors were discovered in the Poppler PDF rendering library, which may
lead to denial of service or the execution of arbitrary code if a user
is tricked into opening a malformed PDF document.
For the stable distribution (lenny), these problems have been fixed in
version 0.8.7-3.
An update for the old stable distribution (etch) will be issued soon as
version 0.4.5-5.1etch4.
For the unstable distribution (sid), these problems will be fixed soon.
We recommend that you upgrade your poppler packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/p/poppler/poppler_0.8.7.orig.tar.gz
Size/MD5 checksum: 1469587 9af81429d6f8639c357a5eed25583365
http://security.debian.org/pool/updates/main/p/poppler/poppler_0.8.7-3.diff.gz
Size/MD5 checksum: 23304 55a0a858e65401534120b10b08c62256
http://security.debian.org/pool/updates/main/p/poppler/poppler_0.8.7-3.dsc
Size/MD5 checksum: 1481 4e0f8c954b0f7072d868b03da79799c7
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.8.7-3_alpha.deb
Size/MD5 checksum: 1334790 adc6ceeb368e0d4feebdf8163e2281e4
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.8.7-3_alpha.deb
Size/MD5 checksum: 196974 20d4df914f08ed2ccef0859dadcff863
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.8.7-3_alpha.deb
Size/MD5 checksum: 234664 f330cdb0bf1ee9001edb92677ff2d94d
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt2_0.8.7-3_alpha.deb
Size/MD5 checksum: 180372 701c9f92558359ec676ac7ed8c402abc
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib3_0.8.7-3_alpha.deb
Size/MD5 checksum: 220194 74703001f5c2588a415a53e0e61db107
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-dev_0.8.7-3_alpha.deb
Size/MD5 checksum: 452496 45ec03d58a9b33c941625d29ea726514
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-3_0.8.7-3_alpha.deb
Size/MD5 checksum: 329740 9b5b796f66136fccdd68ee2fb4410239
http://security.debian.org/pool/updates/main/p/poppler/libpoppler3_0.8.7-3_alpha.deb
Size/MD5 checksum: 891178 06d13d1837a263952327b5e1910bb049
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.8.7-3_alpha.deb
Size/MD5 checksum: 302962 343524216b65fad03cf7292183ad4760
http://security.debian.org/pool/updates/main/p/poppler/poppler-dbg_0.8.7-3_alpha.deb
Size/MD5 checksum: 3204196 077162dc4649e5e4e8e049e72ab2421c
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.8.7-3_amd64.deb
Size/MD5 checksum: 232070 24aa1dea8c17e539aacc23f5ca2ff683
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-dev_0.8.7-3_amd64.deb
Size/MD5 checksum: 358464 8b52ef334b17065d7355c1f944407e3f
http://security.debian.org/pool/updates/main/p/poppler/poppler-dbg_0.8.7-3_amd64.deb
Size/MD5 checksum: 3148528 fdaa186b15cd2ff806d3e69f9924b792
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt2_0.8.7-3_amd64.deb
Size/MD5 checksum: 178226 4b9ae48661be12327e3dc8f79f6cbd5f
http://security.debian.org/pool/updates/main/p/poppler/libpoppler3_0.8.7-3_amd64.deb
Size/MD5 checksum: 840192 690949b3a40aa59f1b2952cd48dea805
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.8.7-3_amd64.deb
Size/MD5 checksum: 1118416 34453c3ec346cc34b4ef94774d9bd975
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.8.7-3_amd64.deb
Size/MD5 checksum: 184820 3fc994f62c6e4f5c5615e48b5591574c
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-3_0.8.7-3_amd64.deb
Size/MD5 checksum: 313712 2f16ec788446b18a6ce0313ff233552b
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib3_0.8.7-3_amd64.deb
Size/MD5 checksum: 217370 51b12c5a9b716bef3cd8a5d29b4ac652
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.8.7-3_amd64.deb
Size/MD5 checksum: 274990 0f168bd7e2f0f201c4f1b5436c252987
arm architecture (ARM)
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.8.7-3_arm.deb
Size/MD5 checksum: 1096672 01910f32db12361cf60f109f986f1324
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-3_0.8.7-3_arm.deb
Size/MD5 checksum: 341724 4795d7bae33531c80bb14fc51e8c9952
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.8.7-3_arm.deb
Size/MD5 checksum: 226514 2d2f7ab236403d3a7040aa09e7832b1c
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-dev_0.8.7-3_arm.deb
Size/MD5 checksum: 389880 8a6b100417108055bf4dc1d40d77fa8b
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib3_0.8.7-3_arm.deb
Size/MD5 checksum: 208128 7fad0af4bd923fc218c4ed6a9aee0a48
http://security.debian.org/pool/updates/main/p/poppler/libpoppler3_0.8.7-3_arm.deb
Size/MD5 checksum: 807458 2e631c2cdbf34f7847d9106adca8d6c6
http://security.debian.org/pool/updates/main/p/poppler/poppler-dbg_0.8.7-3_arm.deb
Size/MD5 checksum: 3115760 99c003b02687fe4caeae077cc58cc00d
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt2_0.8.7-3_arm.deb
Size/MD5 checksum: 178000 6e68b3d42d47efabb7f1712862103d20
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.8.7-3_arm.deb
Size/MD5 checksum: 184604 1066c02c90002b2b69350619738963c3
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.8.7-3_arm.deb
Size/MD5 checksum: 270488 703a85948bb11c02d0e3b86237e7455d
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib3_0.8.7-3_armel.deb
Size/MD5 checksum: 207820 8098dd11c17d88a38f02eb38a7e48df8
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-dev_0.8.7-3_armel.deb
Size/MD5 checksum: 376028 ff27722643819e5693823193cc6749ea
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.8.7-3_armel.deb
Size/MD5 checksum: 273904 8077b3f075149e533852a8c24467def9
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.8.7-3_armel.deb
Size/MD5 checksum: 222166 0864461cfc76015274da63192778e1f2
http://security.debian.org/pool/updates/main/p/poppler/libpoppler3_0.8.7-3_armel.deb
Size/MD5 checksum: 776950 f34caa24fb31c36ab32162315d706a17
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.8.7-3_armel.deb
Size/MD5 checksum: 1108574 de0fe0a522dc1eb18db681b9a96ee089
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.8.7-3_armel.deb
Size/MD5 checksum: 181564 a6d91d3f6ae1f43e450264bdad083e04
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt2_0.8.7-3_armel.deb
Size/MD5 checksum: 174198 d1bd20388d59831b8aa6b0a9dfe9a537
http://security.debian.org/pool/updates/main/p/poppler/poppler-dbg_0.8.7-3_armel.deb
Size/MD5 checksum: 3157178 52340e4305b95a6b6f8e07cef9c94647
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-3_0.8.7-3_armel.deb
Size/MD5 checksum: 310682 ff8775a24d86a006b4bdee549095a543
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.8.7-3_hppa.deb
Size/MD5 checksum: 291400 18dc7b5a55715f920734a0c9080bb8e4
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.8.7-3_hppa.deb
Size/MD5 checksum: 188042 3c054ee2136540e9c378d03f032900e2
http://security.debian.org/pool/updates/main/p/poppler/libpoppler3_0.8.7-3_hppa.deb
Size/MD5 checksum: 929630 70bfae8d06c8b9654a09d1cd8ffb442c
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-3_0.8.7-3_hppa.deb
Size/MD5 checksum: 335326 32e7009057d2213232e4eab347ad6082
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt2_0.8.7-3_hppa.deb
Size/MD5 checksum: 180650 5756cb5df58f9bded9ddd34fe17fb6a0
http://security.debian.org/pool/updates/main/p/poppler/poppler-dbg_0.8.7-3_hppa.deb
Size/MD5 checksum: 3140906 8f80e2f2f99c1021d1167ed432480914
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.8.7-3_hppa.deb
Size/MD5 checksum: 234754 42029ce3bfc33844b96140c438358993
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-dev_0.8.7-3_hppa.deb
Size/MD5 checksum: 390020 984a6eb8add88e15cf1b0b749ffb5686
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.8.7-3_hppa.deb
Size/MD5 checksum: 1260894 092507febedac1f845b542b5da11820c
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib3_0.8.7-3_hppa.deb
Size/MD5 checksum: 225948 da2eabf0c906824a1ae02b95cdc97a8f
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.8.7-3_i386.deb
Size/MD5 checksum: 270290 c8e64a55fbeae9dec7382d7ffc4860d7
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.8.7-3_i386.deb
Size/MD5 checksum: 181818 7790ec0d1b045bac5ad8acf5b273d322
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.8.7-3_i386.deb
Size/MD5 checksum: 226530 012aaf45768ca8ca22a6d13073b0011c
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-3_0.8.7-3_i386.deb
Size/MD5 checksum: 312708 0858c85c7bb2627f97e312caa7ac080b
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-dev_0.8.7-3_i386.deb
Size/MD5 checksum: 344388 d5146377e2679555858662b0ee9a904b
http://security.debian.org/pool/updates/main/p/poppler/poppler-dbg_0.8.7-3_i386.deb
Size/MD5 checksum: 3061938 2ec5991343c3b279641beee69d0253e3
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt2_0.8.7-3_i386.deb
Size/MD5 checksum: 177704 d31a5e3e4df9c41e52619e134a75d4af
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.8.7-3_i386.deb
Size/MD5 checksum: 1053900 da7cc53970b606d599e5f02e0d068cc9
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib3_0.8.7-3_i386.deb
Size/MD5 checksum: 214612 bd5a6265f16cd51d4901692cfcaa655b
http://security.debian.org/pool/updates/main/p/poppler/libpoppler3_0.8.7-3_i386.deb
Size/MD5 checksum: 813824 a4744ae2b084c5a15485f4f3ec82342f
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib3_0.8.7-3_ia64.deb
Size/MD5 checksum: 232988 3eb095121469ddad24dfbb347d65bda7
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.8.7-3_ia64.deb
Size/MD5 checksum: 257208 eb1bfcf546e7a7ddc9071a8f7749ec7d
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.8.7-3_ia64.deb
Size/MD5 checksum: 195248 6c0d4510170d24342bee6732e416e497
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt2_0.8.7-3_ia64.deb
Size/MD5 checksum: 184620 ffa1bf57a03e82db9d76a177c539f1b4
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.8.7-3_ia64.deb
Size/MD5 checksum: 302272 bc12525cd130ccce7f6858b459352a7e
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-3_0.8.7-3_ia64.deb
Size/MD5 checksum: 353056 e9797db4c7161a44ee19b0b9904a93b6
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.8.7-3_ia64.deb
Size/MD5 checksum: 1421660 9de0b7b911c9e45a64755a00b8efe56f
http://security.debian.org/pool/updates/main/p/poppler/libpoppler3_0.8.7-3_ia64.deb
Size/MD5 checksum: 1073678 a7105ee7b1a5e1320fa0bd337a9c071b
http://security.debian.org/pool/updates/main/p/poppler/poppler-dbg_0.8.7-3_ia64.deb
Size/MD5 checksum: 3105780 4c18b21c30873abc144cfbdbda3afa2a
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-dev_0.8.7-3_ia64.deb
Size/MD5 checksum: 424280 754097ccdf1e2018c27cc23e77611025
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.8.7-3_mips.deb
Size/MD5 checksum: 187976 77a7d378772b5b06e0246bed481f9d5f
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt2_0.8.7-3_mips.deb
Size/MD5 checksum: 177002 4c199ed2c3122490bdb3187690cb8e74
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.8.7-3_mips.deb
Size/MD5 checksum: 231638 4f1630307637dd91b4b81eb770801689
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib3_0.8.7-3_mips.deb
Size/MD5 checksum: 215024 774f9149da9f2b1c8f19f645add40b8b
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-dev_0.8.7-3_mips.deb
Size/MD5 checksum: 390492 7f387232dc7aef639211309e8e0182d0
http://security.debian.org/pool/updates/main/p/poppler/libpoppler3_0.8.7-3_mips.deb
Size/MD5 checksum: 826354 04377b34bb9389e94942d4a7fc7e021c
http://security.debian.org/pool/updates/main/p/poppler/poppler-dbg_0.8.7-3_mips.deb
Size/MD5 checksum: 3230814 cccbe96a091ce019d54653bf0e41c69a
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-3_0.8.7-3_mips.deb
Size/MD5 checksum: 302368 e7152a0a6618bd05d124c0ce6ee42c53
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.8.7-3_mips.deb
Size/MD5 checksum: 287688 c8711627da0a79d362d90ee8f681f091
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.8.7-3_mips.deb
Size/MD5 checksum: 1219124 755a505cef94d51b148568310e5871fc
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.8.7-3_mipsel.deb
Size/MD5 checksum: 187086 3dd27225aff82082503d8cacd72a0ec2
http://security.debian.org/pool/updates/main/p/poppler/libpoppler3_0.8.7-3_mipsel.deb
Size/MD5 checksum: 804582 f97409504883b64db0f4b0238800fd5a
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.8.7-3_mipsel.deb
Size/MD5 checksum: 1200616 122b5b413a0579e6fa4bd868a0c38ba9
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-dev_0.8.7-3_mipsel.deb
Size/MD5 checksum: 386556 695b7729cfe1fb62cd6d4f37d60f8df0
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib3_0.8.7-3_mipsel.deb
Size/MD5 checksum: 214066 505a894995efb5624e7226d578c6984c
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.8.7-3_mipsel.deb
Size/MD5 checksum: 287962 e2330f7095902dbcb6eea90f7fec5c0e
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.8.7-3_mipsel.deb
Size/MD5 checksum: 231700 931ad6728924a8511ec0bb193be0f4a9
http://security.debian.org/pool/updates/main/p/poppler/poppler-dbg_0.8.7-3_mipsel.deb
Size/MD5 checksum: 3123054 a8a5ff5547608a095ce709227fe70bee
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-3_0.8.7-3_mipsel.deb
Size/MD5 checksum: 300122 a52f2f9d10e0cef69551e2e533109467
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt2_0.8.7-3_mipsel.deb
Size/MD5 checksum: 176902 29ecd0b702c9bb11404efde67cdd5b7b
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.8.7-3_powerpc.deb
Size/MD5 checksum: 185164 550684aab0a186e611e4360b6624cdd8
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.8.7-3_powerpc.deb
Size/MD5 checksum: 285208 7988738bbc015bb16fcab13bbbbcc20b
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-dev_0.8.7-3_powerpc.deb
Size/MD5 checksum: 360804 42cab8e240b4a7de9e62202b83039360
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.8.7-3_powerpc.deb
Size/MD5 checksum: 1183416 789101eaaafe977e949827750872da66
http://security.debian.org/pool/updates/main/p/poppler/libpoppler3_0.8.7-3_powerpc.deb
Size/MD5 checksum: 882860 8bc2784a8663b1d077dfc5d9866d40e9
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt2_0.8.7-3_powerpc.deb
Size/MD5 checksum: 181116 f9f78a295a924ead21ad588a7949e9d2
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib3_0.8.7-3_powerpc.deb
Size/MD5 checksum: 222218 4f8ac7559664c3e9a31f6b31e88a65ce
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-3_0.8.7-3_powerpc.deb
Size/MD5 checksum: 317990 66b3b30f8baf1ab964f0437f551621e5
http://security.debian.org/pool/updates/main/p/poppler/poppler-dbg_0.8.7-3_powerpc.deb
Size/MD5 checksum: 3226062 6c3cc30f6a0c2bdac5ec06e1b928338a
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.8.7-3_powerpc.deb
Size/MD5 checksum: 247222 c0c68194014f269724c999e5b16f9eba
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib3_0.8.7-3_s390.deb
Size/MD5 checksum: 218252 e41d127f260ba15a56dc7b42611146bd
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.8.7-3_s390.deb
Size/MD5 checksum: 182512 de685e8065837a6ea411d8a84abaffd0
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-3_0.8.7-3_s390.deb
Size/MD5 checksum: 312702 8d45e17d8ac29291704765d523b7179e
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt2_0.8.7-3_s390.deb
Size/MD5 checksum: 177556 f5ce014d7fe7defeb8dc76af8ca1b885
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-dev_0.8.7-3_s390.deb
Size/MD5 checksum: 349670 a2b956fc22a75710329117ddcf824ea4
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.8.7-3_s390.deb
Size/MD5 checksum: 279260 89bf9399206e169eee1bc521c4d38386
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.8.7-3_s390.deb
Size/MD5 checksum: 229604 e5c36cd62c71b7238e37802f05688df7
http://security.debian.org/pool/updates/main/p/poppler/poppler-dbg_0.8.7-3_s390.deb
Size/MD5 checksum: 3246660 622484103366a278451786b563c017fc
http://security.debian.org/pool/updates/main/p/poppler/libpoppler3_0.8.7-3_s390.deb
Size/MD5 checksum: 841254 e03aa30315c8a933f165acb45d4fe846
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.8.7-3_s390.deb
Size/MD5 checksum: 1122140 54d336a0cb8dc7f022e2960e4c393a3f
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-3_0.8.7-3_sparc.deb
Size/MD5 checksum: 310956 2ad62b41966206abf6a5e51abdc76310
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.8.7-3_sparc.deb
Size/MD5 checksum: 226786 68b42902f07c3a4542d7b7c71aee481d
http://security.debian.org/pool/updates/main/p/poppler/poppler-dbg_0.8.7-3_sparc.deb
Size/MD5 checksum: 3009938 0390643723092537919e6d2c62f5f4cb
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib3_0.8.7-3_sparc.deb
Size/MD5 checksum: 214264 10a5fa450895a7d4f2340472b034dfb2
http://security.debian.org/pool/updates/main/p/poppler/libpoppler3_0.8.7-3_sparc.deb
Size/MD5 checksum: 823062 6565194cdd9987d092b427e164ff68cc
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt4-dev_0.8.7-3_sparc.deb
Size/MD5 checksum: 348108 950535a89f3e90c8c1f49176835dfe6a
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.8.7-3_sparc.deb
Size/MD5 checksum: 272798 eabf47fa697c8beadaf5ea07f7b8a892
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt2_0.8.7-3_sparc.deb
Size/MD5 checksum: 176666 8d35ce9b58c1bc0aafa14c90bc5b4726
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.8.7-3_sparc.deb
Size/MD5 checksum: 181458 50b63df965e98f463af9bab524685d88
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.8.7-3_sparc.deb
Size/MD5 checksum: 1077822 fd0a234b61e3b1e55d6c2dd7751453da
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAksNsXoACgkQXm3vHE4uylq1NwCdFxYeEzaG0HqGbcJ0zx9fTZWY
EhUAoMSKqMuwGCOBOa6+zb3+coWC7kjp
=Mefd
-----END PGP SIGNATURE-----
"
USN-850-3: poppler vulnerabilitiesThe Big Reunion Festival gets ready to party
Archives
-
▼
2009
(488)
-
▼
November
(49)
- RHSA-2009:1620-01 Moderate: bind security update
- RHSA-2009:1615-01 Moderate: xerces-j2 security update
- DSA 1942-1: New wireshark packages fix several vul...
- GLSA 200911-04 dstat: Untrusted search path
- GLSA 200911-06 PEAR Net_Traceroute: Command injec...
- DSA 1939-1: New libvorbis packages fix several vul...
- DSA 1941-1: New poppler packages fix several vulne...
- RHSA-2009:1601-01 Critical: kdelibs security update
- GLSA 200911-05 Wireshark: Multiple vulnerabilities
- USN-861-1: libvorbis vulnerabilities
- DSA 1938-1: New php-mail packages fix insufficient...
- DSA 1937-1: New gforge packages fix cross-site scr...
- DSA-1934-1: New apache2 packages fix several issues
- USN-859-1: OpenJDK vulnerabilities
- USN-860-1: Apache vulnerabilities
- RHSA-2009:1595-01 Moderate: cups security update
- RHSA-2009:1587-01 Important: kernel security and b...
- GLSA 200911-02 Sun JDK/JRE: Multiple vulnerabilites
- DSA 1936-1: New libgd2 packages fix several vulner...
- RHSA-2009:1588-02 Important: kernel security update
- DSA 1935-1: New gnutls23/gnutls26 packages fix SSL...
- RHSA-2009:1585-01 Moderate: samba3x security and b...
- RHSA-2009:1584-01 Important: java-1.6.0-openjdk se...
- RHSA-2009:1580-02 Moderate: httpd security update
- DSA 1933-1: New cups packages fix cross-site scrip...
- USN-858-1: OpenLDAP vulnerability
- DSA 1932-1: New pidgin packages fix arbitrary code...
- RHSA-2009:1582-01 Critical: java-1.6.0-ibm securit...
- RHSA-2009:1561-01 Important: libvorbis security up...
- RHSA-2009:1562-01 Important: tomcat security update
- USN-853-2: Firefox and Xulrunner regression
- USN-854-1: GD library vulnerabilities
- DSA 1928-1: New Linux 2.6.24 packages fix several ...
- RHSA-2009:1540-01 Important: kernel-rt security, b...
- RHSA-2009:1550-01 Important: kernel security and b...
- RHSA-2009:1541-01 Important: kernel security update
- USN-850-3: poppler vulnerabilities
- DSA 1927-1: New Linux 2.6.26 packages fix several ...
- USN-855-1: libhtml-parser-perl vulnerability
- RHSA-2009:1548-01 Important: kernel security and b...
- RHSA-2009:1530-01 Critical: firefox security update
- DSA 1924-1: New mahara packages fix several vulner...
- USN-853-1: Firefox and Xulrunner vulnerabilities
- RHSA-2009:1528-01 Moderate: samba security and bug...
- RHSA-2009:1531-01 Critical: seamonkey security update
- DSA 1922-1: New xulrunner packages fix several vul...
- DSA 1923-1: New libhtml-parser-perl packages fix d...
- RHSA-2009:1535-01 Moderate: pidgin security update
- DSA 1921-1: New expat packages fix denial of service
-
▼
November
(49)