Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


More on LinuxToday


Debian GNU/Linux Advisories: acm, mantis, kernel-source, kernel-image, gtksee, proftpd

Jun 30, 2003, 01:20 (0 Talkback[s])

Debian Security Advisory DSA 333-1 http://www.debian.org/security/faq
http://www.debian.org/security/ Matt Zimmerman
June 27th, 2003 http://www.debian.org/security/faq

Package : acm
Vulnerability : integer overflow
Problem-Type : remote
Debian-specific : no
CVE Ids : CVE-2002-0391

acm, a multi-player aerial combat simulation, uses a network protocol based on the same RPC implementation used in many C libraries. This implementation was found to contain an integer overflow vulnerability which could be exploited to execute arbitrary code.

For the stable distribution (woody) this problem has been fixed in version 5.0-3.woody.1.

For the unstable distribution (sid) this problem has been fixed in version 5.0-10.

We recommend that you update your acm package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1.dsc
Size/MD5 checksum: 593 7b97e94d274f4042c7092c677a399d1a
http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1.diff.gz
Size/MD5 checksum: 14248 42f110d62edb95c352bb068d97833057
http://security.debian.org/pool/updates/main/a/acm/acm_5.0.orig.tar.gz
Size/MD5 checksum: 1239047 c0768937733989eb4b10708a782eaf6a

Alpha architecture:

http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1_alpha.deb
Size/MD5 checksum: 583226 32bc02220b0e335d079854f1ff1fbb8b

ARM architecture:

http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1_arm.deb
Size/MD5 checksum: 544240 3b0947f07c5fc24b33ed7af591021e1f

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1_i386.deb
Size/MD5 checksum: 525616 a3a6a0285fb698d2032a36ab87fd6a1f

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1_ia64.deb
Size/MD5 checksum: 648708 2959fba6dccaa512dc831f2b150fe293

HP Precision architecture:

http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1_hppa.deb
Size/MD5 checksum: 570940 9e003ccf3112edd2c349086ac9e7b05a

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1_m68k.deb
Size/MD5 checksum: 515596 b618564e2e94ca304372084dc58753cc

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1_mips.deb
Size/MD5 checksum: 581384 af7e8c6e422f5ff0701baefe2e567891

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1_mipsel.deb
Size/MD5 checksum: 581420 a711924b81bf95dd7d8c1577bfe90589

PowerPC architecture:

http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1_powerpc.deb
Size/MD5 checksum: 549898 36dd4c082f90af46f2252b32cf0cd733

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1_s390.deb
Size/MD5 checksum: 531922 936b063457eca68d5a54a638d32a0134

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/a/acm/acm_5.0-3.woody.1_sparc.deb
Size/MD5 checksum: 547274 adaaee0cdbfd7eaf552dec2de2f16f9b

These files will probably be moved into the stable distribution on its next revision.



Debian Security Advisory DSA 335-1 http://www.debian.org/security/faq
http://www.debian.org/security/ Matt Zimmerman
June 28th, 2003 http://www.debian.org/security/faq

Package : mantis
Vulnerability : incorrect permissions
Problem-Type : local
Debian-specific : yes

mantis, a PHP/MySQL web based bug tracking system, stores the password used to access its database in a configuration file which is world-readable. This could allow a local attacker to read the password and gain read/write access to the database.

For the stable distribution (woody) this problem has been fixed in version 0.17.1-3.

For the old stable distribution (potato) does not contain a mantis package.

For the unstable distribution (sid) this problem is fixed in version 0.17.5-6.

We recommend that you update your mantis package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/m/mantis/mantis_0.17.1-3.dsc
Size/MD5 checksum: 577 51599356a83dc1b315fc7e6f21d338ff
http://security.debian.org/pool/updates/main/m/mantis/mantis_0.17.1-3.diff.gz
Size/MD5 checksum: 15264 4a65805f85b2e70ab61f61446ab29336
http://security.debian.org/pool/updates/main/m/mantis/mantis_0.17.1.orig.tar.gz
Size/MD5 checksum: 220458 d8bac093eaf31ef5812e714db5c07f82

Architecture independent components:

http://security.debian.org/pool/updates/main/m/mantis/mantis_0.17.1-3_all.deb
Size/MD5 checksum: 250314 e47ccc4eec1d97677a7fa350565ed98a

You may use an automated update by adding the resources from the footer to the proper configuration.



Debian Security Advisory DSA 336-1 http://www.debian.org/security/faq
http://www.debian.org/security/ Matt Zimmerman
June 29th, 2003 http://www.debian.org/security/faq

Package : kernel-source-2.2.20, kernel-image-2.2.20-i386
Vulnerability : several
Problem-Type : local, remote
Debian-specific : no
CVE Ids : CVE-2002-0429 CAN-2003-0001 CAN-2003-0127 CAN-2003-0244 CAN-2003-0246 CAN-2003-0247 CAN-2003-0248 CAN-2003-0364

A number of vulnerabilities have been discovered in the Linux kernel.

  • - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall)
  • - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets
  • - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel
  • - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain
  • - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.
  • - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops")
  • - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address.
  • - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions

This advisory provides updated 2.2.20 kernel source, and binary kernel images for the i386 architecture. Other architectures and kernel versions will be covered by separate advisories.

For the stable distribution (woody) on the powerpc architecture, these problems have been fixed in kernel-source-2.2.20 version 2.2.20-5woody2 and kernel-image-i386 version 2.2.20-5woody3.

For the unstable distribution (sid) these problems are fixed in kernel-source-2.2.25 and kernel-image-2.2.25-i386 version 2.2.25-2.

We recommend that you update your kernel packages.

NOTE: A system reboot will be required immediately after the upgrade in order to replace the running kernel. Remember to read carefully and follow the instructions given during the kernel upgrade process.

NOTE: These kernels are not binary-compatible with the previous version. Any loadable modules will need to be recompiled in order to work with the new kernel.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/k/kernel-source-2.2.20/kernel-source-2.2.20_2.2.20-5woody2.dsc
Size/MD5 checksum: 661 d3215fce4f216c046cccff92446e7918
http://security.debian.org/pool/updates/main/k/kernel-source-2.2.20/kernel-source-2.2.20_2.2.20-5woody2.diff.gz
Size/MD5 checksum: 159446 a579fda249086961d987de8781049f78
http://security.debian.org/pool/updates/main/k/kernel-source-2.2.20/kernel-source-2.2.20_2.2.20.orig.tar.gz
Size/MD5 checksum: 19394649 57c0edf86cb23a5b215db9121c9b3557
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-image-2.2.20-i386_2.2.20-5woody3.dsc
Size/MD5 checksum: 834 fa03ee805dd5024d730f49e0316dbf53
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-image-2.2.20-i386_2.2.20-5woody3.tar.gz
Size/MD5 checksum: 13928 0ccb61809634f83fd20de3079deb297c

Architecture independent components:

http://security.debian.org/pool/updates/main/k/kernel-source-2.2.20/kernel-doc-2.2.20_2.2.20-5woody2_all.deb
Size/MD5 checksum: 1162314 d3f23563af939c6d1f68860ce0419744
http://security.debian.org/pool/updates/main/k/kernel-source-2.2.20/kernel-source-2.2.20_2.2.20-5woody2_all.deb
Size/MD5 checksum: 15848472 0682fd4283579c341fa9ca27461cbad0

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-headers-2.2.20_2.2.20-5woody3_i386.deb
Size/MD5 checksum: 1918624 d1d1f98e147fdf12a7374ff705ba89a7
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-headers-2.2.20-compact_2.2.20-5woody3_i386.deb
Size/MD5 checksum: 1867132 93d8ac12f8a884913ad88aeeb7a8ea1b
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-headers-2.2.20-idepci_2.2.20-5woody3_i386.deb
Size/MD5 checksum: 1839328 e3fb8a95dd2a1ba641fd598a019879c0
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-image-2.2.20_2.2.20-5woody3_i386.deb
Size/MD5 checksum: 5901626 3fa8bae1676466e02992a1ce80009697
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-image-2.2.20-compact_2.2.20-5woody3_i386.deb
Size/MD5 checksum: 1733362 5d5293e99f68cbabb1489226903f4895
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-image-2.2.20-idepci_2.2.20-5woody3_i386.deb
Size/MD5 checksum: 1395212 70389d3561e392a5487b493d24e2abfe

These files will probably be moved into the stable distribution on its next revision.



Debian Security Advisory DSA 337-1 http://www.debian.org/security/faq
http://www.debian.org/security/ Matt Zimmerman
June 29th, 2003 http://www.debian.org/security/faq

Package : gtksee
Vulnerability : buffer overflow
Problem-Type : local
Debian-specific : no
CVE Ids : CAN-2003-0444

Viliam Holub discovered a bug in gtksee whereby, when loading PNG images of certain color depths, gtksee would overflow a heap-allocated buffer. This vulnerability could be exploited by an attacker using a carefully constructed PNG image to execute arbitrary code when the victim loads the file in gtksee.

For the stable distribution (woody) this problem has been fixed in version 0.5.0-6.

For the unstable distribution (sid) this problem will be fixed soon. Refer to Debian bug #76346.

We recommend that you update your gtksee package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6.dsc
Size/MD5 checksum: 609 816a95eaab25f8602b45f07cc9535da3
http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6.diff.gz
Size/MD5 checksum: 3631 50123e3acce09d5bba798deef836acf5
http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0.orig.tar.gz
Size/MD5 checksum: 224809 21a8a9f28fa61d73725fb606962fa108

Alpha architecture:

http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6_alpha.deb
Size/MD5 checksum: 137056 29f5d8f312f6ac17d937b0924f671b70

ARM architecture:

http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6_arm.deb
Size/MD5 checksum: 118008 5c1071f06eb3b55449345e1ef7434e88

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6_i386.deb
Size/MD5 checksum: 118084 fd16b3894d3462fceb02cb90aa74783b

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6_ia64.deb
Size/MD5 checksum: 196372 60d7d6156c3f48ac1bb85f6f44d259fb

HP Precision architecture:

http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6_hppa.deb
Size/MD5 checksum: 122912 2943288b598af7d17db20eb61e173fec

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6_m68k.deb
Size/MD5 checksum: 115652 a934c616f63385b803bd96366e319eed

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6_mips.deb
Size/MD5 checksum: 118154 bb34474023526ed5dd47d13c005fce93

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6_mipsel.deb
Size/MD5 checksum: 114920 6671eed391cb58cb63336465dc95e3af

PowerPC architecture:

http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6_powerpc.deb
Size/MD5 checksum: 115882 3b71d0550032209bb3b6685eed3210a6

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6_s390.deb
Size/MD5 checksum: 116520 d38703d62fe603f477adc047b4500536

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/g/gtksee/gtksee_0.5.0-6_sparc.deb
Size/MD5 checksum: 117670 a3644e7ec17ebecb5db9eb4224cacb1c

These files will probably be moved into the stable distribution on its next revision.



Debian Security Advisory DSA 338-1 http://www.debian.org/security/faq
http://www.debian.org/security/ Matt Zimmerman
June 29th, 2003 http://www.debian.org/security/faq

Package : proftpd
Vulnerability : SQL injection
Problem-Type : remote
Debian-specific : no

runlevel [runlevel@raregazz.org] reported that ProFTPD's PostgreSQL authentication module is vulnerable to a SQL injection attack. This vulnerability could be exploited by a remote, unauthenticated attacker to execute arbitrary SQL statements, potentially exposing the passwords of other users, or to connect to ProFTPD as an arbitrary user without supplying the correct password.

For the stable distribution (woody) this problem has been fixed in version 1.2.4+1.2.5rc1-5woody2.

For the unstable distribution (sid) this problem has been fixed in version 1.2.8-8.

We recommend that you update your proftpd package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2.dsc
Size/MD5 checksum: 727 b6bbf1fb682f160da85672afbd8cf848
http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2.tar.gz
Size/MD5 checksum: 699016 bf322cedf80a02c936c9d4eda74131fc

Architecture independent components:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd-doc_1.2.4+1.2.5rc1-5woody2_all.deb
Size/MD5 checksum: 281414 bc39191f1cfde5d1c3db3a0529da589f

Alpha architecture:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2_alpha.deb
Size/MD5 checksum: 205806 1fbcc7216485db7f69d01658a4694d14
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-common_1.2.4+1.2.5rc1-5woody2_alpha.deb
Size/MD5 checksum: 107888 7d85d92a95bde52c601dd4da25640a39
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_alpha.deb
Size/MD5 checksum: 216044 09a1bf535c009e48d7005249c57f5815
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_alpha.deb
Size/MD5 checksum: 228806 272b734be4a08a6f8b84a8d15fab57ea
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_alpha.deb
Size/MD5 checksum: 228494 3dd63c4b61b15ff8ec6768ec070efa6f

ARM architecture:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2_arm.deb
Size/MD5 checksum: 172962 c17bac8e5ebd35c82d29bbd84cd06d93
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-common_1.2.4+1.2.5rc1-5woody2_arm.deb
Size/MD5 checksum: 92170 dc5d6535ce88e8f1825a7f737a1f4abc
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_arm.deb
Size/MD5 checksum: 181486 90cfca9474481183bbbdb935299e404e
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_arm.deb
Size/MD5 checksum: 191796 78de889768d52230373761722d98e7fb
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_arm.deb
Size/MD5 checksum: 191710 27855567b8aa1d1afead2260d6e0d2dd

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2_i386.deb
Size/MD5 checksum: 159930 4061d5de926d8d180885ec88d8040ea5
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-common_1.2.4+1.2.5rc1-5woody2_i386.deb
Size/MD5 checksum: 90388 7b0bd6058b1c90b5fc04cf436f8090a8
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_i386.deb
Size/MD5 checksum: 167316 1c4c0d342c345f0a603dc86e85047f4d
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_i386.deb
Size/MD5 checksum: 177320 aa31ecfee263f9be5971462998e3267f
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_i386.deb
Size/MD5 checksum: 177272 7d01955741d26cb234f126eb9656a262

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2_ia64.deb
Size/MD5 checksum: 260888 b8abfb2497ed8bfff3b053992d9146db
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-common_1.2.4+1.2.5rc1-5woody2_ia64.deb
Size/MD5 checksum: 117100 4252bf31de41b04deaecba2a35d52dbf
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_ia64.deb
Size/MD5 checksum: 273580 b195fc7455460dbbf1921c44160e83ff
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_ia64.deb
Size/MD5 checksum: 292188 9548dad81719b86056f68575f3dc765b
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_ia64.deb
Size/MD5 checksum: 292012 2afd30e0551a7a7ab9e5e4250ea8c8ab

HP Precision architecture:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2_hppa.deb
Size/MD5 checksum: 199520 e9eec622d3574d67e161856fcfbaaa7e
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-common_1.2.4+1.2.5rc1-5woody2_hppa.deb
Size/MD5 checksum: 94904 7598c44f2640d88ec5b1c1811ad9ee8a
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_hppa.deb
Size/MD5 checksum: 209376 8656557f182a5ec635804229e4c24f9f
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_hppa.deb
Size/MD5 checksum: 221864 7d02a0f2cd73438a2a155b35b0b87a5b
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_hppa.deb
Size/MD5 checksum: 221692 7e28806db27cd450e0828cbe5b15e679

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2_m68k.deb
Size/MD5 checksum: 152734 e29c4c29549b404cad7ece71a235a97f
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-common_1.2.4+1.2.5rc1-5woody2_m68k.deb
Size/MD5 checksum: 90916 d524e287cf50ac8d65b1745efd8f1eb5
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_m68k.deb
Size/MD5 checksum: 159070 17d172d022c893fb21a465977efb67aa
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_m68k.deb
Size/MD5 checksum: 168186 ba776d7a211d6c0811dfa4cfff8103d4
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_m68k.deb
Size/MD5 checksum: 168046 f539d7bb416b0a77af9b329fbb40bbdc

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2_mips.deb
Size/MD5 checksum: 184406 0cc53970e72ee6daa257e099bd393184
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-common_1.2.4+1.2.5rc1-5woody2_mips.deb
Size/MD5 checksum: 103850 ab961f36d185f71be8560e413e0acd02
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_mips.deb
Size/MD5 checksum: 192328 d62da22de9d68ee61499686b99ef5162
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_mips.deb
Size/MD5 checksum: 203184 019e94b09e5ec82f858d39ccdfb98a9f
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_mips.deb
Size/MD5 checksum: 203062 187050f5af48a2f42e9f088ac873a18d

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2_mipsel.deb
Size/MD5 checksum: 185138 0ee63b58bb101dec2a6aa2c4a0c9db24
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-common_1.2.4+1.2.5rc1-5woody2_mipsel.deb
Size/MD5 checksum: 103716 bc85d55e05a8080679e1db79025438ec
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_mipsel.deb
Size/MD5 checksum: 192940 74169ef6f060184df30a5c4d40f202c2
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_mipsel.deb
Size/MD5 checksum: 203962 8cf7f74f563d8545bfe1ff7315e22272
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_mipsel.deb
Size/MD5 checksum: 203786 a0314a061652ad0efaa0f8e2d7964825

PowerPC architecture:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2_powerpc.deb
Size/MD5 checksum: 175390 7e5c0ec43d7ca73ca4bf1f22a68fc137
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-common_1.2.4+1.2.5rc1-5woody2_powerpc.deb
Size/MD5 checksum: 93304 d2ba0c7e16981d7ee13e0531fd1002e7
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_powerpc.deb
Size/MD5 checksum: 183158 2ec2ebe5e3d681183540365fae46ba00
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_powerpc.deb
Size/MD5 checksum: 193426 a919d347d1b8cb6e1989d679482cac7e
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_powerpc.deb
Size/MD5 checksum: 193304 59b9f59189145e3143e59711bbc1631b

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2_s390.deb
Size/MD5 checksum: 166080 45b72cea50f10fc210eea80549988ade
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-common_1.2.4+1.2.5rc1-5woody2_s390.deb
Size/MD5 checksum: 92152 2bdf3ffa8421b87927e84d51c033cbac
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_s390.deb
Size/MD5 checksum: 173954 ce047bfc41b52cd69eb2a06f7f0d772c
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_s390.deb
Size/MD5 checksum: 183348 44ff5a18066e9279073fec7f9f1effa9
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_s390.deb
Size/MD5 checksum: 183202 7e7a3ce1e040716124e49d25ddbceab5

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/p/proftpd/proftpd_1.2.4+1.2.5rc1-5woody2_sparc.deb
Size/MD5 checksum: 169568 74ef415c3b9191d26ca260d4b5f9f14d
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-common_1.2.4+1.2.5rc1-5woody2_sparc.deb
Size/MD5 checksum: 92694 7cb9eb15c256582ebbe4ee2074633c19
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_sparc.deb
Size/MD5 checksum: 177790 d0d1a7140862d474bf362c11ea7c9a6a
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_sparc.deb
Size/MD5 checksum: 188380 9d6a93e06664f40d40c1c5f342af2680
http://security.debian.org/pool/updates/main/p/proftpd/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_sparc.deb
Size/MD5 checksum: 188210 bab4d525c2d5498efdc4fc936a9fc684

These files will probably be moved into the stable distribution on its next revision.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/