Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


Top White Papers

More on LinuxToday


Advisories, January 26, 2006

Jan 27, 2006, 04:45 (0 Talkback[s])

Debian GNU/Linux


Debian Security Advisory DSA 947-2 security@debian.org
http://www.debian.org/security/ Michael Stone
January 25th, 2006 http://www.debian.org/security/faq


Package : clamav
Vulnerability : heap overflow
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2006-0162
Debian Bug : 320014

A heap overflow has been discovered in ClamAV, a virus scanner, which could allow an attacker to execute arbitrary code by sending a carefully crafted UPX-encoded executable to a system runnig ClamAV. In addition, other potential overflows have been corrected.

Packages for the ARM architecture were not available when DSA 947-1 was released; these packages are now available. Also, DSA 947-1 incorrectly identified the package version which corrected these issues in the unstable distribution (sid).

The old stable distribution (woody) does not include ClamAV.

For the stable distribution (sarge) this problem has been fixed in version 0.84-2.sarge.7.

For the unstable distribution (sid) this problem has been fixed in version 0.88-1.

We recommend that you upgrade your clamav package immediately.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


ARM architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.7_arm.deb
      Size/MD5 checksum: 63830 8fcc1f60dffe350cc1138f5217992032
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.7_arm.deb
      Size/MD5 checksum: 39510 10528078333fbf18bfc3a200d23b977b
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.7_arm.deb
      Size/MD5 checksum: 2171192 d45c061628d87b24bab8516564d7e1c0
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.7_arm.deb
      Size/MD5 checksum: 37310 abd9c3c02bf89e8eea072d66f01363eb
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.7_arm.deb
      Size/MD5 checksum: 174662 2f8277ebe9debd8bf8c997e66999cf82
    http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.7_arm.deb
      Size/MD5 checksum: 249490 e766e1d75c97b14b086ce0413b2c9cac

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 954-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
January 25th, 2006 http://www.debian.org/security/faq


Package : wine
Vulnerability : design flaw
Problem-Type : local (remote)
Debian-specific: no
CVE ID : CVE-2006-0106
Debian Bug : 346197

H D Moore that discovered that Wine, a free implemention of the Microsoft Windows APIs, inherits a design flaw from the Windows GDI API, which may lead to the execution of code through GDI escape functions in WMF files.

The old stable distribution (woody) does not seem to be affected by this problem.

For the stable distribution (sarge) this problem has been fixed in version 0.0.20050310-1.2.

For the unstable distribution (sid) this problem has been fixed in version 0.9.2-1.

We recommend that you upgrade your wine packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/w/wine/wine_0.0.20050310-1.2.dsc
      Size/MD5 checksum: 1321 7955ea0c5382fb0bb4649e07ed82f973
    http://security.debian.org/pool/updates/main/w/wine/wine_0.0.20050310-1.2.diff.gz
      Size/MD5 checksum: 47563 1973d7684bc3accf3c2eb1f4fa3b80be
    http://security.debian.org/pool/updates/main/w/wine/wine_0.0.20050310.orig.tar.gz
      Size/MD5 checksum: 11798040 d90d31716ba71211af26ac773934f57e

Architecture independent components:

    http://security.debian.org/pool/updates/main/w/wine/wine-doc_0.0.20050310-1.2_all.deb
      Size/MD5 checksum: 1780636 c78163bfadc872ca47b19c382f360bf2

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/w/wine/libwine_0.0.20050310-1.2_i386.deb
      Size/MD5 checksum: 8069792 90ae35746250507071ca6e8d43d9e647
    http://security.debian.org/pool/updates/main/w/wine/libwine-alsa_0.0.20050310-1.2_i386.deb
      Size/MD5 checksum: 1128766 38cee9eecc78832a9f8e83385f599d0f
    http://security.debian.org/pool/updates/main/w/wine/libwine-arts_0.0.20050310-1.2_i386.deb
      Size/MD5 checksum: 1105648 626dbf5ed914d7dfd080a826b275ebf6
    http://security.debian.org/pool/updates/main/w/wine/libwine-capi_0.0.20050310-1.2_i386.deb
      Size/MD5 checksum: 1094760 10c2c64aee60e0473c61f07de3e772f9
    http://security.debian.org/pool/updates/main/w/wine/libwine-dev_0.0.20050310-1.2_i386.deb
      Size/MD5 checksum: 2530646 7d1bc36dbb1dfa57d816ba24e135eadd
    http://security.debian.org/pool/updates/main/w/wine/libwine-jack_0.0.20050310-1.2_i386.deb
      Size/MD5 checksum: 1107820 77e61796adc46f530219502b37e0a86c
    http://security.debian.org/pool/updates/main/w/wine/libwine-nas_0.0.20050310-1.2_i386.deb
      Size/MD5 checksum: 1102382 af5ef1acdceb8ea0863abd3e6041c825
    http://security.debian.org/pool/updates/main/w/wine/libwine-print_0.0.20050310-1.2_i386.deb
      Size/MD5 checksum: 1202416 e504f2d0cdd5f5f0187b0c44abbfdcae
    http://security.debian.org/pool/updates/main/w/wine/libwine-twain_0.0.20050310-1.2_i386.deb
      Size/MD5 checksum: 1104750 4edd3e88a7ae7f4e0dc9a42d127a1de2
    http://security.debian.org/pool/updates/main/w/wine/wine_0.0.20050310-1.2_i386.deb
      Size/MD5 checksum: 1299408 dbf86414fc89653b4d910d282733e09b
    http://security.debian.org/pool/updates/main/w/wine/wine-utils_0.0.20050310-1.2_i386.deb
      Size/MD5 checksum: 1659130 7ba1ce62ec17663f390d8b1ea2b45d63

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 955-1 security@debian.org
http://www.debian.org/security/ Michael Stone
January 25th, 2006 http://www.debian.org/security/faq


Package : clamav
Vulnerability : DoS
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2005-3573, CVE-2005-4153
Debian Bug : 339095, 326024

Two denial of service bugs were found in the mailman list server. In one, attachment filenames containing UTF8 strings were not properly parsed, which could cause the server to crash. In another, a message containing a bad date string could cause a server crash.

The old stable distribution (woody) is not vulnerable to this issue.

For the stable distribution (sarge) this problem has been fixed in version 2.1.5-8sarge1.

For the unstable distribution (sid) this problem has been fixed in version 2.1.5-10.

We recommend that you upgrade your mailman package immediately.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1.dsc
      Size/MD5 checksum: 738 da48d99072879f627fbba7d57f8b9449
    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1.diff.gz
      Size/MD5 checksum: 188686 f6b707d6165c4e2def0a37ecaa9d0237
    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5.orig.tar.gz
      Size/MD5 checksum: 5745912 f5f56f04747cd4aff67427e7a45631af

Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_alpha.deb
      Size/MD5 checksum: 6612108 0c91e09a0ac1b146f9c9b2a5567b6b62

AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_amd64.deb
      Size/MD5 checksum: 6610470 971f05595431464b627c9f0d782c3f3d

ARM architecture:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_arm.deb
      Size/MD5 checksum: 6610082 7c1f992caa3bd026a0e0a0d0fb2da90b

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_i386.deb
      Size/MD5 checksum: 6611458 6887debd5526800e45691c7f69a67004

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_ia64.deb
      Size/MD5 checksum: 6611922 6608017e09f4cf2103677ea2abc0ab64

HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_hppa.deb
      Size/MD5 checksum: 6617272 21dc663d4ff65619a0eb5ba1efb2fd38

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_m68k.deb
      Size/MD5 checksum: 6616562 34978e9fe8dd54ed594ea8aac7f524e1

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_mips.deb
      Size/MD5 checksum: 6660790 18c26f54237f2c2debbe979f6f2ab4dc

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_mipsel.deb
      Size/MD5 checksum: 6652282 458f7ada6fad580545d54a67e3c75dad

PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_powerpc.deb
      Size/MD5 checksum: 6617334 a79738f25904b0cca44a2eda89322014

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_s390.deb
      Size/MD5 checksum: 6616708 f09da905ce4d8e521002850a466dcaf7

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_sparc.deb
      Size/MD5 checksum: 6616064 343a2acc7348c2c547922ecc79ad4c1a

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 956-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
January 26th, 2006 http://www.debian.org/security/faq


Package : lsh-utils
Vulnerability : filedescriptor leak
Problem type : local
Debian-specific: no
CVE ID : CVE-2006-0353
Debian Bug : 349303

Stefan Pfetzing discovered that lshd, a Secure Shell v2 (SSH2) protocol server, leaks a couple of file descriptors, related to the randomness generator, to user shells which are started by lshd. A local attacker can truncate the server's seed file, which may prevent the server from starting, and with some more effort, maybe also crack session keys.

After applying this update, you should remove the server's seed file (/var/spool/lsh/yarrow-seed-file) and then regenerate it with "lsh-make-seed --server" as root.

For security reasons, lsh-make-seed really needs to be run from the console of the system you are running it on. If you run lsh-make-seed using a remote shell, the timing information lsh-make-seed uses for its random seed creation is likely to be screwed. If need be, you can generate the random seed on a different system than that which it will eventually be on, by installing the lsh-utils package and running "lsh-make-seed -o my-other-server-seed-file". You may then transfer the seed to the destination system as using a secure connection.

The old stable distribution (woody) may not be affected by this problem.

For the stable distribution (sarge) this problem has been fixed in version 2.0.1-3sarge1.

For the unstable distribution (sid) this problem has been fixed in version 2.0.1cdbs-4.

We recommend that you upgrade your lsh-server package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1.dsc
      Size/MD5 checksum: 827 27a08dea0eb4d51595d12325dd2dc9b9
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1.diff.gz
      Size/MD5 checksum: 65643 ce143cd95c98d22be17702cfa7d00883
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1.orig.tar.gz
      Size/MD5 checksum: 1866063 25ca0b4385779de3d58d2d5757f495c3

Architecture independent components:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils-doc_2.0.1-3sarge1_all.deb
      Size/MD5 checksum: 167108 8a72fcaeee3a9e87bb2f596790e0ed0d

Alpha architecture:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_alpha.deb
      Size/MD5 checksum: 401168 b3c017e4498e57576f75c8c6a4141bd1
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_alpha.deb
      Size/MD5 checksum: 338576 573bddb6eaf7a2488199c4559aae3c29
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_alpha.deb
      Size/MD5 checksum: 1024694 db2d07041589921cea746b35970448c9

ARM architecture:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_arm.deb
      Size/MD5 checksum: 295730 dbbf6d2c5a9a78d8757536c0a91c12b1
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_arm.deb
      Size/MD5 checksum: 263990 524f432ff03e1e4e0de80868b5251dc1
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_arm.deb
      Size/MD5 checksum: 751640 662e1c293a3ad6ee830e0c154899a5e3

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_i386.deb
      Size/MD5 checksum: 300088 5038534a8bf05c1afe3b6a02d949d19e
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_i386.deb
      Size/MD5 checksum: 265836 6236889e8e52a65e3302a9cde882b46d
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_i386.deb
      Size/MD5 checksum: 746754 a8608dc7abfb61b37b49985d6914939d

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_ia64.deb
      Size/MD5 checksum: 447126 6e6ea9ed0b40b44f6a77de4bff109d15
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_ia64.deb
      Size/MD5 checksum: 374070 9c7aea3671804cbd9e67c621aa08ae11
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_ia64.deb
      Size/MD5 checksum: 1164462 e73a3d57a099a72d436f071d8666c41f

HP Precision architecture:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_hppa.deb
      Size/MD5 checksum: 343638 de455b0e097e6702ada6deaaf8803898
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_hppa.deb
      Size/MD5 checksum: 295558 225a99b05fafbe38ecba5ed54ae56997
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_hppa.deb
      Size/MD5 checksum: 868638 79878de6808ade34d2551aae99f9cd7b

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_m68k.deb
      Size/MD5 checksum: 272632 01605d69846557dfc5b2d3f802eeb9c2
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_m68k.deb
      Size/MD5 checksum: 244748 ae046120b9001ef2109b83ae014e7206
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_m68k.deb
      Size/MD5 checksum: 669880 1ba0c5ea28762faaaffebf763666c7b9

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_mips.deb
      Size/MD5 checksum: 352524 b760940edecb51c6f138f92ed79e1027
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_mips.deb
      Size/MD5 checksum: 305572 42622131e45e23460a40a168b22f2cdf
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_mips.deb
      Size/MD5 checksum: 886516 0a3a7d73e941ccb3d042a17ed91757e2

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_mipsel.deb
      Size/MD5 checksum: 353328 3aae28d22cd30aa12f9cc1edcc3f1800
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_mipsel.deb
      Size/MD5 checksum: 306144 3d47e49fa2507587cb1d92992e593081
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_mipsel.deb
      Size/MD5 checksum: 888880 0afea7b20d9dc5c12ca7cce15c74643f

PowerPC architecture:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_powerpc.deb
      Size/MD5 checksum: 316982 d6bbece27b282748d90d5938a8111f21
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_powerpc.deb
      Size/MD5 checksum: 282628 9c7a4830a74bc90a5832e6160e1e082d
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_powerpc.deb
      Size/MD5 checksum: 809622 31709a65f368f7a068dcbdce4e1aff06

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_s390.deb
      Size/MD5 checksum: 343902 6f3d3524ce342b6a2497940d4bc4bb40
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_s390.deb
      Size/MD5 checksum: 297426 50e9c6e52e3c32c6a8597d2a0475b0d4
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_s390.deb
      Size/MD5 checksum: 883990 8683782431b1e5e418265972c8877f81

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_sparc.deb
      Size/MD5 checksum: 292410 44c4c08694ffc59077c2f1fc1112d33f
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_sparc.deb
      Size/MD5 checksum: 262056 05063d13ff9e2b43a4e27e915507d932
    http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_sparc.deb
      Size/MD5 checksum: 751050 a2f59d44ed6b8c7759a240f491416b63

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 957-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
January 26th, 2006 http://www.debian.org/security/faq


Package : imagemagick
Vulnerability : missing shell meta sanitising Problem type : local (remote)
Debian-specific: no
CVE ID : CVE-2005-4601
BugTraq ID : 16093
Debian Bug : 345238

Florian Weimer discovered that delegate code in ImageMagick is vulnerable to shell command injection using specially crafted file names. This allows attackers to encode commands inside of graphic commands. With some user interaction, this is exploitable through Gnus and Thunderbird.

For the old stable distribution (woody) this problem has been fixed in version 5.4.4.5-1woody7.

For the stable distribution (sarge) this problem has been fixed in version 6.0.6.2-2.5.

For the unstable distribution (sid) this problem has been fixed in version 6.2.4.5-0.6.

We recommend that you upgrade your imagemagick packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7.dsc
      Size/MD5 checksum: 852 67e4d582bb44d45f7ba1437a4644a6ad
    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7.diff.gz
      Size/MD5 checksum: 17261 d62b1651a8d967f978b52505fe0a1cc2
    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5.orig.tar.gz
      Size/MD5 checksum: 3901237 f35e356b4ac1ebc58e3cffa7ea7abc07

Alpha architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7_alpha.deb
      Size/MD5 checksum: 1309986 c20701797664f6b083fde1a645ea906d
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody7_alpha.deb
      Size/MD5 checksum: 154356 093ab8e50691fdde7e716b3a8215bd8b
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody7_alpha.deb
      Size/MD5 checksum: 56552 2bb6f0bbce04a10b3e60d99345099973
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody7_alpha.deb
      Size/MD5 checksum: 833736 15c7381269282060e60425ce85cb7666
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody7_alpha.deb
      Size/MD5 checksum: 67556 33657ab7469547e6efd756ecac00c2e9
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody7_alpha.deb
      Size/MD5 checksum: 114066 6b0c71972aedbce8e18387f994bffa3e

ARM architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7_arm.deb
      Size/MD5 checksum: 1297384 bd5e539db8d231e4e7516a842b7e68ab
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody7_arm.deb
      Size/MD5 checksum: 119056 82b28c549519508f32744e5552d2cc08
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody7_arm.deb
      Size/MD5 checksum: 56596 ded087a7743793c861c964f357fc4c56
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody7_arm.deb
      Size/MD5 checksum: 899224 697607c3237a70ea9addad062bbaa8af
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody7_arm.deb
      Size/MD5 checksum: 67606 e3817334c08f1ce4729a9ebc8586fc27
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody7_arm.deb
      Size/MD5 checksum: 110204 2dd9c0650fab74a674627aff9923781c

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7_i386.deb
      Size/MD5 checksum: 1295022 3cec1d11934049b3ad3fc1ae420f316e
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody7_i386.deb
      Size/MD5 checksum: 122996 e1720817b909f6a5c7aeb8ef8829903c
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody7_i386.deb
      Size/MD5 checksum: 56560 8e007fe9ee07ad6cd2a3479e09cb3e3d
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody7_i386.deb
      Size/MD5 checksum: 773012 8014bd80f914c57f5e60606bb50ee86f
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody7_i386.deb
      Size/MD5 checksum: 67570 9cf180261abb9acfdf5d16987745f85a
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody7_i386.deb
      Size/MD5 checksum: 107154 647876d04cc845951fb637bad3161d8c

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7_ia64.deb
      Size/MD5 checksum: 1336476 ba8cf28509c62f4a8f2ea53c15ad356a
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody7_ia64.deb
      Size/MD5 checksum: 137276 98c97f42688a123c16e5fd0cdb820c3d
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody7_ia64.deb
      Size/MD5 checksum: 56560 79e3c0563410d6899bf9d291bc905978
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody7_ia64.deb
      Size/MD5 checksum: 1360952 08078311f79b773b23949569a5ed809b
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody7_ia64.deb
      Size/MD5 checksum: 67558 f280109e81a64cd8ebb0f6c7fea6c05d
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody7_ia64.deb
      Size/MD5 checksum: 133174 abda6e2f4092ae9dc348c4322d5de77f

HP Precision architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7_hppa.deb
      Size/MD5 checksum: 1297640 7bb4d9d340b4838669ac10880ae14e6d
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody7_hppa.deb
      Size/MD5 checksum: 133128 f9bd6f503cd09f852b634b438d0a45f0
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody7_hppa.deb
      Size/MD5 checksum: 56594 ae49fc60d3d594ce65b840ab09b9d037
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody7_hppa.deb
      Size/MD5 checksum: 860204 72fa7b7f13c1f14fe8aa23316a2417eb
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody7_hppa.deb
      Size/MD5 checksum: 67592 2d1fad508f4fe1ca0cb6b9f31c887bce
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody7_hppa.deb
      Size/MD5 checksum: 117440 45fd18b988d65f0fe5b9555d24dce649

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7_m68k.deb
      Size/MD5 checksum: 1292846 c619742bf86ed7148888e5c1b811e772
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody7_m68k.deb
      Size/MD5 checksum: 134298 05b1d1022c7ae57d5471a3e668fd62bf
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody7_m68k.deb
      Size/MD5 checksum: 56632 c7b75c5f1509c7bab52a2b7146f29fe7
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody7_m68k.deb
      Size/MD5 checksum: 752312 683eff2a87e142fb40a3afb0abe8b451
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody7_m68k.deb
      Size/MD5 checksum: 67628 8652b6591847e419b40318f0d6d05abd
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody7_m68k.deb
      Size/MD5 checksum: 107692 8bd11f4196e669f08c2a9f55f8a2bb06

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7_mips.deb
      Size/MD5 checksum: 1295044 745c5ea8646189c37831b2d2b4e51e00
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody7_mips.deb
      Size/MD5 checksum: 120570 90601dfe53e21a924e22007eb3afe2e6
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody7_mips.deb
      Size/MD5 checksum: 56580 6cc14c9b076a3bbf221e9c9b35e07ebe
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody7_mips.deb
      Size/MD5 checksum: 733318 d04a9c824acba3a78a4c3ff6b13b6477
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody7_mips.deb
      Size/MD5 checksum: 67592 cd843ac90e29e8b81beadf654f2f857c
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody7_mips.deb
      Size/MD5 checksum: 103592 4d4d236b3c9140af125af137f542b1f2

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7_mipsel.deb
      Size/MD5 checksum: 1294980 917f0b68ac7c173c1091ae7144066b3c
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody7_mipsel.deb
      Size/MD5 checksum: 114286 a0e67c91aa8ec9f836e192e9f0c8b69d
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody7_mipsel.deb
      Size/MD5 checksum: 56590 722c9ef218758cff0c641cc4111f926a
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody7_mipsel.deb
      Size/MD5 checksum: 721314 265a6eacfe344286cb0121e80c399837
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody7_mipsel.deb
      Size/MD5 checksum: 67586 6198d64a70cbd72e9fb29fd1cd5f6557
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody7_mipsel.deb
      Size/MD5 checksum: 103122 a2f3af2fe3fb8453dc3b7c3c1302895a

PowerPC architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7_powerpc.deb
      Size/MD5 checksum: 1291762 698f98c29bba25115e2fa7fd05bcbb9a
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody7_powerpc.deb
      Size/MD5 checksum: 136206 45721da51aae57cb62e0d4dd5dda4504
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody7_powerpc.deb
      Size/MD5 checksum: 56588 901178cf61c125aa0f421e3704a129e4
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody7_powerpc.deb
      Size/MD5 checksum: 786786 d2ced90686a961348b36b0bdc780f40b
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody7_powerpc.deb
      Size/MD5 checksum: 67596 6771a875e3bbfffbc9bfab84f9086b9b
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody7_powerpc.deb
      Size/MD5 checksum: 112210 5405f574467c2c44937e8ae15bdf05f4

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7_s390.deb
      Size/MD5 checksum: 1292442 6942ae2614a5dd1168195805cba3aecb
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody7_s390.deb
      Size/MD5 checksum: 132278 3030fc88dc302069813609810b4965f3
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody7_s390.deb
      Size/MD5 checksum: 56574 440e4e4cf3ce0fc5e00034d817b32ce7
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody7_s390.deb
      Size/MD5 checksum: 778490 a8c26cce45195f3aa4629dc097d6050e
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody7_s390.deb
      Size/MD5 checksum: 67580 999d24eaef3216a708a75fe77dbf07b1
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody7_s390.deb
      Size/MD5 checksum: 109248 5942da8db3b4cbf525ff149a270b3bfd

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody7_sparc.deb
      Size/MD5 checksum: 1295460 856992170c304757ddf53aa6a8117a0b
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody7_sparc.deb
      Size/MD5 checksum: 124098 6ea86ba8e136f2977e5449903377de57
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody7_sparc.deb
      Size/MD5 checksum: 56576 b0f7b5712fddc5dd2948236fb671f362
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody7_sparc.deb
      Size/MD5 checksum: 803042 18fca32c183ebe76d3f8c20732e62605
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody7_sparc.deb
      Size/MD5 checksum: 67574 4eaacb3070f3ad0b3c183ad19d3080fa
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody7_sparc.deb
      Size/MD5 checksum: 113146 66293b8b4f7c7f9f0c4c2d176f177351

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.5.dsc
      Size/MD5 checksum: 881 9759ca89f1025366c941c8deb35959ba
    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.5.diff.gz
      Size/MD5 checksum: 138551 6a6d0caa658f84c8b3ca0bbe17388041
    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2.orig.tar.gz
      Size/MD5 checksum: 6824001 477a361ba0154cc2423726fab4a3f57c

Alpha architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.5_alpha.deb
      Size/MD5 checksum: 1469362 ab37be52c2dee50c17a62fa5d8ae1db2
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.5_alpha.deb
      Size/MD5 checksum: 173458 64635b7f91c466493bde8f971e57c7f1
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.5_alpha.deb
      Size/MD5 checksum: 288252 2e2c644e718d2967d90116608f6f9262
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.5_alpha.deb
      Size/MD5 checksum: 1283978 19c702b738c8e8b54883f4293ad71027
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.5_alpha.deb
      Size/MD5 checksum: 2203004 354a1cffa24edc25ac7ca95cfc34ccb5