Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


More on LinuxToday


Advisories, August 24, 2006

Aug 25, 2006, 03:45 (0 Talkback[s])

Debian GNU/Linux


Debian Security Advisory DSA 1155-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
August 24th, 2006 http://www.debian.org/security/faq


Package : sendmail
Vulnerability : programming error
Problem type : remote
Debian-specific: no
CVE ID : CVE-2006-1173
CERT advisory : VU#146718
BugTraq ID : 18433
Debian Bug : 373801 380258

Frank Sheiness discovered that a MIME conversion routine in sendmail, a powerful, efficient, and scalable mail transport agent, could be tricked by a specially crafted mail to perform an endless recursion.

For the stable distribution (sarge) this problem has been fixed in version 8.13.4-3sarge2.

For the unstable distribution (sid) this problem has been fixed in version 8.13.7-1.

We recommend that you upgrade your sendmail package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.13.4-3sarge2.dsc
      Size/MD5 checksum: 910 960ea60c4191d0dffc223bc87bdc8b60
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.13.4-3sarge2.diff.gz
      Size/MD5 checksum: 384830 5746beee4bf07d3ed740f4835bc7fa36
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.13.4.orig.tar.gz
      Size/MD5 checksum: 1968047 d80dc659df96c63d227ed80c0c71b708

Architecture independent components:

    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-base_8.13.4-3sarge2_all.deb
      Size/MD5 checksum: 342338 33201cb38ffe42ee9f13e7cfd534cd77
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-cf_8.13.4-3sarge2_all.deb
      Size/MD5 checksum: 280724 fc323a1ae0ba4207bf485d0950838126
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-doc_8.13.4-3sarge2_all.deb
      Size/MD5 checksum: 815978 b96cb196d23aa2f66dba83a3f4220fe6
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.13.4-3sarge2_all.deb
      Size/MD5 checksum: 193664 014094391c524db1f1eae96f6c7bae22

Alpha architecture:

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.13.4-3sarge2_alpha.deb
      Size/MD5 checksum: 319036 3f4eb80c71a8bc63b7dc74af4d330e39
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter0_8.13.4-3sarge2_alpha.deb
      Size/MD5 checksum: 215600 5f2a9cbb0a24465ed648926037038edd
    http://security.debian.org/pool/updates/main/s/sendmail/rmail_8.13.4-3sarge2_alpha.deb
      Size/MD5 checksum: 228830 e8d15c3f6d26ca8d908e42b07bc7042f
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-bin_8.13.4-3sarge2_alpha.deb
      Size/MD5 checksum: 953944 46d247fc609bbb701634f51173d04a33
    http://security.debian.org/pool/updates/main/s/sendmail/sensible-mda_8.13.4-3sarge2_alpha.deb
      Size/MD5 checksum: 198126 f8cce9c9d0f6b8a393e70f37b4078769

AMD64 architecture:

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.13.4-3sarge2_amd64.deb
      Size/MD5 checksum: 296580 dbb1c9930fdd39d78f00165ab3bd4103
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter0_8.13.4-3sarge2_amd64.deb
      Size/MD5 checksum: 213218 5bf6afa8b44b7a85a639809c82294635
    http://security.debian.org/pool/updates/main/s/sendmail/rmail_8.13.4-3sarge2_amd64.deb
      Size/MD5 checksum: 225286 f0eb29825d98fae3ae47aca60cc25d59
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-bin_8.13.4-3sarge2_amd64.deb
      Size/MD5 checksum: 851166 2ab733eb6108e0cb75f461ee855f602a
    http://security.debian.org/pool/updates/main/s/sendmail/sensible-mda_8.13.4-3sarge2_amd64.deb
      Size/MD5 checksum: 197680 edb148b36ded61b6bd0615d120508605

ARM architecture:

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.13.4-3sarge2_arm.deb
      Size/MD5 checksum: 291930 5e7634c0a8733b0bce07d65e73a4ef16
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter0_8.13.4-3sarge2_arm.deb
      Size/MD5 checksum: 211570 6b4962041621b2dda3d2201f7107a8d3
    http://security.debian.org/pool/updates/main/s/sendmail/rmail_8.13.4-3sarge2_arm.deb
      Size/MD5 checksum: 223674 f10af1dde65c5055fdec8cb31e089264
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-bin_8.13.4-3sarge2_arm.deb
      Size/MD5 checksum: 829316 da778ae1e36441fc81219ba1c9424e94
    http://security.debian.org/pool/updates/main/s/sendmail/sensible-mda_8.13.4-3sarge2_arm.deb
      Size/MD5 checksum: 197238 e35b5bc8eb4f209b556ffae5f5b182ca

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.13.4-3sarge2_i386.deb
      Size/MD5 checksum: 287210 b0906f03f7965d82207c9510cafb6bca
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter0_8.13.4-3sarge2_i386.deb
      Size/MD5 checksum: 211614 1b239843c9a627900d62208144c4425c
    http://security.debian.org/pool/updates/main/s/sendmail/rmail_8.13.4-3sarge2_i386.deb
      Size/MD5 checksum: 222384 101b1290a634f1f3b0fbe385fa3f00ea
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-bin_8.13.4-3sarge2_i386.deb
      Size/MD5 checksum: 812502 f4533171ad66b3d3bb5e3457b8f072eb
    http://security.debian.org/pool/updates/main/s/sendmail/sensible-mda_8.13.4-3sarge2_i386.deb
      Size/MD5 checksum: 197280 bb50d3704bcd94d8fc391dd2b6bf4a89

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.13.4-3sarge2_ia64.deb
      Size/MD5 checksum: 330728 ce5076cdb2b4d6841697f8441b903c4b
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter0_8.13.4-3sarge2_ia64.deb
      Size/MD5 checksum: 220454 1bf7b131f12c5efedf329a8c606a6905
    http://security.debian.org/pool/updates/main/s/sendmail/rmail_8.13.4-3sarge2_ia64.deb
      Size/MD5 checksum: 239680 702d539a34fd1b1316fedda55b7e5ae1
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-bin_8.13.4-3sarge2_ia64.deb
      Size/MD5 checksum: 1162596 3f9c5fd6e4e58d09c488d1e18e5e8199
    http://security.debian.org/pool/updates/main/s/sendmail/sensible-mda_8.13.4-3sarge2_ia64.deb
      Size/MD5 checksum: 198966 82381861fc653cc8bcc0bdd11b6c982e

HP Precision architecture:

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.13.4-3sarge2_hppa.deb
      Size/MD5 checksum: 301512 c527f00a3851404869c148a30de682e0
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter0_8.13.4-3sarge2_hppa.deb
      Size/MD5 checksum: 215652 e9019f514e994d2b2582250d06f65ea0
    http://security.debian.org/pool/updates/main/s/sendmail/rmail_8.13.4-3sarge2_hppa.deb
      Size/MD5 checksum: 229404 030689791d9ab55108b00d22147cde0a
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-bin_8.13.4-3sarge2_hppa.deb
      Size/MD5 checksum: 919820 3309c8104d8eaa73abdcf90d1802204e
    http://security.debian.org/pool/updates/main/s/sendmail/sensible-mda_8.13.4-3sarge2_hppa.deb
      Size/MD5 checksum: 198126 49d18720f3e53fe2f1d8e092e98cf105

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.13.4-3sarge2_m68k.deb
      Size/MD5 checksum: 272812 11e4cc568a7889458d932db6d4ac61b6
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter0_8.13.4-3sarge2_m68k.deb
      Size/MD5 checksum: 210862 d51962d3877927d9e222d9ef941885bb
    http://security.debian.org/pool/updates/main/s/sendmail/rmail_8.13.4-3sarge2_m68k.deb
      Size/MD5 checksum: 218874 fa8b57e8b977426f6a6acb8a7c6a7c22
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-bin_8.13.4-3sarge2_m68k.deb
      Size/MD5 checksum: 728524 3c3a0ed89e720c9b5b676238fd4906cb
    http://security.debian.org/pool/updates/main/s/sendmail/sensible-mda_8.13.4-3sarge2_m68k.deb
      Size/MD5 checksum: 197172 6da127ab094398d33fdce92e4cdb0877

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.13.4-3sarge2_mips.deb
      Size/MD5 checksum: 293164 1da7ab05880c74c77e1cfe49d1c6b186
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter0_8.13.4-3sarge2_mips.deb
      Size/MD5 checksum: 212044 ea8f0785e2e23695b5a8ce9a6db0b241
    http://security.debian.org/pool/updates/main/s/sendmail/rmail_8.13.4-3sarge2_mips.deb
      Size/MD5 checksum: 227376 38b9b47ea73e44456eb0ef18b5575f8c
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-bin_8.13.4-3sarge2_mips.deb
      Size/MD5 checksum: 883436 4880521485f9c36548703ca007286f7e
    http://security.debian.org/pool/updates/main/s/sendmail/sensible-mda_8.13.4-3sarge2_mips.deb
      Size/MD5 checksum: 198136 5d31a8e053390f018f549fcdcff7c8cf

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.13.4-3sarge2_mipsel.deb
      Size/MD5 checksum: 293964 07b24d641a5badff3feebb780f62d335
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter0_8.13.4-3sarge2_mipsel.deb
      Size/MD5 checksum: 212342 e3e0903028c33b5f74e5f51d65513069
    http://security.debian.org/pool/updates/main/s/sendmail/rmail_8.13.4-3sarge2_mipsel.deb
      Size/MD5 checksum: 227662 224ac71024df656f978bf77c02179a5e
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-bin_8.13.4-3sarge2_mipsel.deb
      Size/MD5 checksum: 887092 c8226b40bacb22ea6141657fd7ac5566
    http://security.debian.org/pool/updates/main/s/sendmail/sensible-mda_8.13.4-3sarge2_mipsel.deb
      Size/MD5 checksum: 198308 9007cddf32c14fb0d26206a80be71953

PowerPC architecture:

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.13.4-3sarge2_powerpc.deb
      Size/MD5 checksum: 296008 826ce4a9a5269b1be8867f3f119ff58b
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter0_8.13.4-3sarge2_powerpc.deb
      Size/MD5 checksum: 216294 078a2c789c479c1382b9b639a0738b88
    http://security.debian.org/pool/updates/main/s/sendmail/rmail_8.13.4-3sarge2_powerpc.deb
      Size/MD5 checksum: 228474 2b02f60ae2c6dfa8de9f5e5c62bf3d59
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-bin_8.13.4-3sarge2_powerpc.deb
      Size/MD5 checksum: 867134 32296265a4e142ac4ec55a50b28bc050
    http://security.debian.org/pool/updates/main/s/sendmail/sensible-mda_8.13.4-3sarge2_powerpc.deb
      Size/MD5 checksum: 199352 7abc4f13f6351f1d93e548e2ecfd215e

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.13.4-3sarge2_s390.deb
      Size/MD5 checksum: 295158 5b5e75a74f2ff91c4a301057e22c26fb
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter0_8.13.4-3sarge2_s390.deb
      Size/MD5 checksum: 213298 fff5231f97b037d64e6fad5b200f558e
    http://security.debian.org/pool/updates/main/s/sendmail/rmail_8.13.4-3sarge2_s390.deb
      Size/MD5 checksum: 228670 f3aaf184734fdfdd7cb1aecac78f4827
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-bin_8.13.4-3sarge2_s390.deb
      Size/MD5 checksum: 875180 ba43126125f6da96878fc89fd971765c
    http://security.debian.org/pool/updates/main/s/sendmail/sensible-mda_8.13.4-3sarge2_s390.deb
      Size/MD5 checksum: 197662 b59525ac3fc1d4ab781646c50c35217e

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.13.4-3sarge2_sparc.deb
      Size/MD5 checksum: 285396 bdfb343b56374589948a271ca0a83acd
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter0_8.13.4-3sarge2_sparc.deb
      Size/MD5 checksum: 211612 776d54b96a9a5dbc465d97492025a050
    http://security.debian.org/pool/updates/main/s/sendmail/rmail_8.13.4-3sarge2_sparc.deb
      Size/MD5 checksum: 222882 fc69af2a76b50b938d9aacf8f978c025
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-bin_8.13.4-3sarge2_sparc.deb
      Size/MD5 checksum: 819474 cdafeb8dadc08275dd9cb2db5397b6f8
    http://security.debian.org/pool/updates/main/s/sendmail/sensible-mda_8.13.4-3sarge2_sparc.deb
      Size/MD5 checksum: 197400 11d3a7c2a52c824eb4002c5954d1c81a

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 1155-2 security@debian.org
http://www.debian.org/security/ Martin Schulze
August 24th, 2006 http://www.debian.org/security/faq


Package : sendmail
Vulnerability : programming error
Problem type : remote
Debian-specific: no
CVE ID : CVE-2006-1173
CERT advisory : VU#146718
BugTraq ID : 18433
Debian Bug : 373801 380258

It turned out that the sendmail binary depends on libsasl2 (>= 2.1.19.dfsg1) which is neither available in the stable nor in the the security archive. This version is scheduled for the inclusion in the next update of the stable release, though.

You'll have to download the referenced file for your architecture from below and install it with dpkg -i.

As an alternative, temporarily adding the following line to /etc/apt/sources.list will mitigate the problem as well:

deb http://ftp.debian.de/debian stable-proposed-updates main

Here is the original security advisory for completeness:

Frank Sheiness discovered that a MIME conversion routine in sendmail, a powerful, efficient, and scalable mail transport agent, could be tricked by a specially crafted mail to perform an endless recursion.

For the stable distribution (sarge) this problem has been fixed in version 8.13.4-3sarge2.

For the unstable distribution (sid) this problem has been fixed in version 8.13.7-1.

We recommend that you upgrade your sendmail package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/cyrus-sasl2_2.1.19.dfsg1-0sarge2.diff.gz
      Size/MD5 checksum: 31919 f7042b666907ca4294018bc764edce96
    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/cyrus-sasl2_2.1.19.dfsg1-0sarge2.dsc
      Size/MD5 checksum: 1131 aca52362519bd66cda473678eaf2130f
    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/cyrus-sasl2_2.1.19.dfsg1.orig.tar.gz
      Size/MD5 checksum: 1576960 f2fa0ce4d8b3dc37ca71fb5b5d57cd8b

Alpha architecture:

    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/libsasl2_2.1.19.dfsg1-0sarge2_alpha.deb
      Size/MD5 checksum: 277878 30d488b82d54f006662f52609da94f0a

HP Precision architecture:

    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/libsasl2_2.1.19.dfsg1-0sarge2_hppa.deb
      Size/MD5 checksum: 273306 46dec2833097a7006953004c712208f6

ARM architecture:

    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/libsasl2_2.1.19.dfsg1-0sarge2_arm.deb
      Size/MD5 checksum: 260076 17cbbf95b9ba82428fce3721d8904fab

Intel IA-32 architecture:

    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/libsasl2_2.1.19.dfsg1-0sarge2_i386.deb
      Size/MD5 checksum: 258784 2f307e6af80a02a3e559020a31f00c94

Motorola 680x0 architecture:

    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/libsasl2_2.1.19.dfsg1-0sarge2_m68k.deb
      Size/MD5 checksum: 253302 27e9e53ad9f430d5d731236f0fb7c5ca

Big endian MIPS architecture:

    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/libsasl2_2.1.19.dfsg1-0sarge2_mips.deb
      Size/MD5 checksum: 260866 8109e94b29d2f6a5cb1bedd0ce729ae9

Little endian MIPS architecture:

    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/libsasl2_2.1.19.dfsg1-0sarge2_mipsel.deb
      Size/MD5 checksum: 261078 2e6cd2f4f8e8fa7cb6863e6378cf77e9

PowerPC architecture:

    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/libsasl2_2.1.19.dfsg1-0sarge2_powerpc.deb
      Size/MD5 checksum: 268388 d3f233ab1a90934e6578b5ccebd5543b

Sun Sparc architecture:

    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/libsasl2_2.1.19.dfsg1-0sarge2_sparc.deb
      Size/MD5 checksum: 257648 06552692dcf73bd6db29ca5e12ea90bf

IBM S/390 architecture:

    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/libsasl2_2.1.19.dfsg1-0sarge2_s390.deb
      Size/MD5 checksum: 265332 586764113955d451c9ae16e404c7ea37

Intel IA-64 architecture:

    http://ftp.debian.org/debian/pool/main/c/cyrus-sasl2/libsasl2_2.1.19.dfsg1-0sarge2_ia64.deb
      Size/MD5 checksum: 297874 1b2e9357178ead1e33616513c8402080

These files will probably be moved into the stable distribution on its next update.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

Gentoo Linux


Gentoo Linux Security Advisory GLSA 200608-23

http://security.gentoo.org/


Severity: Normal
Title: Heartbeat: Denial of Service
Date: August 24, 2006
Bugs: #141894
ID: 200608-23


Synopsis

Heartbeat is vulnerable to a Denial of Service which can be triggered by a remote attacker without authentication.

Background

Heartbeat is a component of the High-Availability Linux project. It is used to perform death-of-node detection, communications and cluster management.

Affected packages


     Package                /  Vulnerable  /                Unaffected

  1  sys-cluster/heartbeat       < 2.0.7                      >= 2.0.7

Description

Yan Rong Ge discovered that the peel_netstring() function in cl_netstring.c does not validate the "length" parameter of user input, which can lead to an out-of-bounds memory access when processing certain Heartbeat messages (CVE-2006-3121). Furthermore an unspecified local DoS issue was fixed (CVE-2006-3815).

Impact

By sending a malicious UDP Heartbeat message, even before authentication, a remote attacker can crash the master control process of the cluster.

Workaround

There is no known workaround at this time.

Resolution

All Heartbeat users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=sys-cluster/heartbeat-2.0.7"

References

[ 1 ] CVE-2006-3121

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3121

[ 2 ] CVE-2006-3815

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3815

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200608-23.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Mandriva Linux


Mandriva Linux Security Advisory MDKSA-2006:148
http://www.mandriva.com/security/


Package : xorg-x11
Date : August 24, 2006
Affected: 2006.0, Corporate 3.0


Problem Description:

An integer overflow flaw was discovered in how xorg-x11/XFree86 handles PCF files. A malicious authorized client could exploit the issue to cause a DoS (crash) or potentially execute arbitrary code with root privileges on the xorg-x11/XFree86 server.

Updated packages are patched to address this issue.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467


Updated Packages:

Mandriva Linux 2006.0:
e96690462ea6e57335b457d763e26b80 2006.0/RPMS/libxorg-x11-6.9.0-5.8.20060mdk.i586.rpm
31f632a499f6a55459ce5446ad5871b5 2006.0/RPMS/libxorg-x11-devel-6.9.0-5.8.20060mdk.i586.rpm
1c0eda1098546a703159832671e10e99 2006.0/RPMS/libxorg-x11-static-devel-6.9.0-5.8.20060mdk.i586.rpm
5ac9c8c715cb5df656ccbacec5a87dae 2006.0/RPMS/X11R6-contrib-6.9.0-5.8.20060mdk.i586.rpm
ac15309aaeb2a021658314afde737da4 2006.0/RPMS/xorg-x11-100dpi-fonts-6.9.0-5.8.20060mdk.i586.rpm
f155986261ac4d70982f68b51a38c3dc 2006.0/RPMS/xorg-x11-6.9.0-5.8.20060mdk.i586.rpm
1c7afcc1116ae6db0df1fbec846c552f 2006.0/RPMS/xorg-x11-75dpi-fonts-6.9.0-5.8.20060mdk.i586.rpm
2273cbc4aac47f3060e39a5bebc69392 2006.0/RPMS/xorg-x11-cyrillic-fonts-6.9.0-5.8.20060mdk.i586.rpm
f67859d61e75afe3bcc1e481e346c72c 2006.0/RPMS/xorg-x11-doc-6.9.0-5.8.20060mdk.i586.rpm
f2685335f3b56d1e4d00f629fc4c4bad 2006.0/RPMS/xorg-x11-glide-module-6.9.0-5.8.20060mdk.i586.rpm
dbb7aecf3aa04ebdd98ce07a2d8e7ba5 2006.0/RPMS/xorg-x11-server-6.9.0-5.8.20060mdk.i586.rpm
bdb37de9d95ac078fa2e1a0e87de7a5e 2006.0/RPMS/xorg-x11-xauth-6.9.0-5.8.20060mdk.i586.rpm
06022dee267d75d01ff580a9e7afa3d4 2006.0/RPMS/xorg-x11-Xdmx-6.9.0-5.8.20060mdk.i586.rpm
483903328a38387fc0d0584e5478d474 2006.0/RPMS/xorg-x11-xfs-6.9.0-5.8.20060mdk.i586.rpm
6c720d145e82cfa47b3ffabae2b5493a 2006.0/RPMS/xorg-x11-Xnest-6.9.0-5.8.20060mdk.i586.rpm
bc7b594caa1d2142eb32f25e5a8bbf57 2006.0/RPMS/xorg-x11-Xprt-6.9.0-5.8.20060mdk.i586.rpm
5861d29021e989dd2ebcc668c6620444 2006.0/RPMS/xorg-x11-Xvfb-6.9.0-5.8.20060mdk.i586.rpm
5915dadb375c54be929c6f336b7c0231 2006.0/SRPMS/xorg-x11-6.9.0-5.8.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
2f0e74defdcef7544d949eaef81051b7 x86_64/2006.0/RPMS/lib64xorg-x11-6.9.0-5.8.20060mdk.x86_64.rpm
f9dca9d58a256e537586df14f0f3709b x86_64/2006.0/RPMS/lib64xorg-x11-devel-6.9.0-5.8.20060mdk.x86_64.rpm
ff60d844dbf4f376a2e7ec5468cd5701 x86_64/2006.0/RPMS/lib64xorg-x11-static-devel-6.9.0-5.8.20060mdk.x86_64.rpm
3d7251620e95952a72708a25a9d6b9ad x86_64/2006.0/RPMS/X11R6-contrib-6.9.0-5.8.20060mdk.x86_64.rpm
ae47c639f87ca7238c54449e4dac06e4 x86_64/2006.0/RPMS/xorg-x11-100dpi-fonts-6.9.0-5.8.20060mdk.x86_64.rpm
a9b1178ae4b51e0f04ca6ab305b7dd00 x86_64/2006.0/RPMS/xorg-x11-6.9.0-5.8.20060mdk.x86_64.rpm
1c53adb504f5bdd86123e8cc470e2316 x86_64/2006.0/RPMS/xorg-x11-75dpi-fonts-6.9.0-5.8.20060mdk.x86_64.rpm
49f3696276eb8d8db9894ad74aa300e7 x86_64/2006.0/RPMS/xorg-x11-cyrillic-fonts-6.9.0-5.8.20060mdk.x86_64.rpm
f2b94e866eeafb9db914990f19ace8c7 x86_64/2006.0/RPMS/xorg-x11-doc-6.9.0-5.8.20060mdk.x86_64.rpm
f31dd3184054ea253f98e9b628a835e4 x86_64/2006.0/RPMS/xorg-x11-glide-module-6.9.0-5.8.20060mdk.x86_64.rpm
2f17814f669ec11941bf1a8d72213cfa x86_64/2006.0/RPMS/xorg-x11-server-6.9.0-5.8.20060mdk.x86_64.rpm
b55e6ba22af3d404d83a4e6c762620b1 x86_64/2006.0/RPMS/xorg-x11-xauth-6.9.0-5.8.20060mdk.x86_64.rpm
130f98fbbbd53c49f1af4a174ce46d48 x86_64/2006.0/RPMS/xorg-x11-Xdmx-6.9.0-5.8.20060mdk.x86_64.rpm
263baf4aa6f429af65a4f22c25b1f967 x86_64/2006.0/RPMS/xorg-x11-xfs-6.9.0-5.8.20060mdk.x86_64.rpm
893c19c630ef1c6adcc189c7e87fd533 x86_64/2006.0/RPMS/xorg-x11-Xnest-6.9.0-5.8.20060mdk.x86_64.rpm
9e83acc573420cebe10682e38e9435ac x86_64/2006.0/RPMS/xorg-x11-Xprt-6.9.0-5.8.20060mdk.x86_64.rpm
7d562d5dcccc236eee9e9b62e68297f4 x86_64/2006.0/RPMS/xorg-x11-Xvfb-6.9.0-5.8.20060mdk.x86_64.rpm
5915dadb375c54be929c6f336b7c0231 x86_64/2006.0/SRPMS/xorg-x11-6.9.0-5.8.20060mdk.src.rpm

Corporate 3.0:
b8ec2f34a2de5dcce58c767d7acb9742 corporate/3.0/RPMS/libxfree86-4.3-32.6.C30mdk.i586.rpm
17ef760371f3c6132ffbeb16b8cc334f corporate/3.0/RPMS/libxfree86-devel-4.3-32.6.C30mdk.i586.rpm
0dfdac241d26016477688c7cdafa9954 corporate/3.0/RPMS/libxfree86-static-devel-4.3-32.6.C30mdk.i586.rpm
b3c9d0af6cd576695f42646b0e64823b corporate/3.0/RPMS/X11R6-contrib-4.3-32.6.C30mdk.i586.rpm
68c7ceffb72aa9962ff785470a4420eb corporate/3.0/RPMS/XFree86-100dpi-fonts-4.3-32.6.C30mdk.i586.rpm
f6c0dcbb55abfdb3fe731e7a02a516d7 corporate/3.0/RPMS/XFree86-4.3-32.6.C30mdk.i586.rpm
691a6da2b476618b92410b54b2cc659e corporate/3.0/RPMS/XFree86-75dpi-fonts-4.3-32.6.C30mdk.i586.rpm
7d86c5eed71597a8ccb9615dbdcd203e corporate/3.0/RPMS/XFree86-cyrillic-fonts-4.3-32.6.C30mdk.i586.rpm
54890690be35fa07c24a153294b4f047 corporate/3.0/RPMS/XFree86-doc-4.3-32.6.C30mdk.i586.rpm
ad22989ca3a580e832224a032ccb2e5f corporate/3.0/RPMS/XFree86-glide-module-4.3-32.6.C30mdk.i586.rpm
67f5e5000b538a5df6dd7d999acfaecd corporate/3.0/RPMS/XFree86-server-4.3-32.6.C30mdk.i586.rpm
db5ba130a18b93d416e781b77e48b752 corporate/3.0/RPMS/XFree86-xfs-4.3-32.6.C30mdk.i586.rpm
2c09fd4d1a1b61a1170c6d50eb675979 corporate/3.0/RPMS/XFree86-Xnest-4.3-32.6.C30mdk.i586.rpm
70b0c2ec881d07f1db12921d072b77d6 corporate/3.0/RPMS/XFree86-Xvfb-4.3-32.6.C30mdk.i586.rpm
61d6302023daef2488822d0146d73baf corporate/3.0/SRPMS/XFree86-4.3-32.6.C30mdk.src.rpm

Corporate 3.0/X86_64:
40d18d307b0d7ebcc665559a31226c97 x86_64/corporate/3.0/RPMS/lib64xfree86-4.3-32.6.C30mdk.x86_64.rpm
b482d0e7d223afeda7c15a78dc91f526 x86_64/corporate/3.0/RPMS/lib64xfree86-devel-4.3-32.6.C30mdk.x86_64.rpm
4850377b6975c3b6747ced40f77fefda x86_64/corporate/3.0/RPMS/lib64xfree86-static-devel-4.3-32.6.C30mdk.x86_64.rpm
962df4b68d2ac9b94540b1f12b5daeb4 x86_64/corporate/3.0/RPMS/X11R6-contrib-4.3-32.6.C30mdk.x86_64.rpm
a7ef4764f0e80e25f46d8118ea926eb0 x86_64/corporate/3.0/RPMS/XFree86-100dpi-fonts-4.3-32.6.C30mdk.x86_64.rpm
93da80be668a3feeb55cbf418e9ca3ba x86_64/corporate/3.0/RPMS/XFree86-4.3-32.6.C30mdk.x86_64.rpm
cb6db58a236a35a6923f475b595426fa x86_64/corporate/3.0/RPMS/XFree86-75dpi-fonts-4.3-32.6.C30mdk.x86_64.rpm
5243dcbb796550a6c3cb6097ef0e8b93 x86_64/corporate/3.0/RPMS/XFree86-cyrillic-fonts-4.3-32.6.C30mdk.x86_64.rpm
7212b487461c2f16c7b53adc6883bc9e x86_64/corporate/3.0/RPMS/XFree86-doc-4.3-32.6.C30mdk.x86_64.rpm
059398da9ef868e4c445a3c3963804d7 x86_64/corporate/3.0/RPMS/XFree86-server-4.3-32.6.C30mdk.x86_64.rpm
7fa19747b99f4ddda0fa8bedc4e08e2b x86_64/corporate/3.0/RPMS/XFree86-xfs-4.3-32.6.C30mdk.x86_64.rpm
01fc36b3ec6878c51a61ec35f0e98328 x86_64/corporate/3.0/RPMS/XFree86-Xnest-4.3-32.6.C30mdk.x86_64.rpm
be65abdd2513cf7e687542a12638e907 x86_64/corporate/3.0/RPMS/XFree86-Xvfb-4.3-32.6.C30mdk.x86_64.rpm
61d6302023daef2488822d0146d73baf x86_64/corporate/3.0/SRPMS/XFree86-4.3-32.6.C30mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com>


Mandriva Linux Security Advisory MDKSA-2006:149
http://www.mandriva.com/security/


Package : MySQL
Date : August 24, 2006
Affected: 2006.0


Problem Description:

MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy (CVE-2006-4031).

The update allows the local admin to override MERGE using the '--skip-merge' option when running mysqld. This can be defined under MYSQLD_OPTIONS in /etc/sysconfig/mysqld. If '--skip-merge' is not used, the old behaviour of MERGE tables is still used.

MySQL 4.1 before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions (CVE-2006-4226).

Packages have been patched to correct these issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4031
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4226


Updated Packages:

Mandriva Linux 2006.0:
33376bae20533f62ef5b549b34167843 2006.0/RPMS/libmysql14-4.1.12-4.6.20060mdk.i586.rpm
8f979c11aff7632c2baf8a16dfd20f7d 2006.0/RPMS/libmysql14-devel-4.1.12-4.6.20060mdk.i586.rpm
efdf42901fb07957dcae0667f4224c79 2006.0/RPMS/MySQL-4.1.12-4.6.20060mdk.i586.rpm
b8af458067a90bdc24572e5e4e65486e 2006.0/RPMS/MySQL-bench-4.1.12-4.6.20060mdk.i586.rpm
bc50ec326174fd40d4305fd869f40148 2006.0/RPMS/MySQL-client-4.1.12-4.6.20060mdk.i586.rpm
af157fcfa86fe01b523382b9b4cf7574 2006.0/RPMS/MySQL-common-4.1.12-4.6.20060mdk.i586.rpm
48ff5161c87ea0b2a562d8a85c71ba77 2006.0/RPMS/MySQL-Max-4.1.12-4.6.20060mdk.i586.rpm
9fbe8915b7e10bbb059f40ce2d87fc79 2006.0/RPMS/MySQL-NDB-4.1.12-4.6.20060mdk.i586.rpm
12ec1435c493ec7d4503a70a114bb0ff 2006.0/SRPMS/MySQL-4.1.12-4.6.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
a3e7eb190788f55675f32149061b76bc x86_64/2006.0/RPMS/lib64mysql14-4.1.12-4.6.20060mdk.x86_64.rpm
f73190c2eb69d25456268504eed1b8f8 x86_64/2006.0/RPMS/lib64mysql14-devel-4.1.12-4.6.20060mdk.x86_64.rpm
03695f3ec8872dc610c5f6dd938bf9b5 x86_64/2006.0/RPMS/MySQL-4.1.12-4.6.20060mdk.x86_64.rpm
76935c458a2f18d93940c352f9c19151 x86_64/2006.0/RPMS/MySQL-bench-4.1.12-4.6.20060mdk.x86_64.rpm
8af8fbdf8931ec7a1da24dd06a8c26cc x86_64/2006.0/RPMS/MySQL-client-4.1.12-4.6.20060mdk.x86_64.rpm
a7d2e88a3f0b7d5be8b3243978992d94 x86_64/2006.0/RPMS/MySQL-common-4.1.12-4.6.20060mdk.x86_64.rpm
c9f07a98015f74b918d622501a059c23 x86_64/2006.0/RPMS/MySQL-Max-4.1.12-4.6.20060mdk.x86_64.rpm
70cebedfedcd93bb5a46b3852ba3e1a1 x86_64/2006.0/RPMS/MySQL-NDB-4.1.12-4.6.20060mdk.x86_64.rpm
12ec1435c493ec7d4503a70a114bb0ff x86_64/2006.0/SRPMS/MySQL-4.1.12-4.6.20060mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com>

Red Hat Linux


Red Hat Security Advisory

Synopsis: Moderate: ImageMagick security update
Advisory ID: RHSA-2006:0633-03
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0633.html
Issue date: 2006-08-24
Updated on: 2006-08-24
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-3743 CVE-2006-3744 CVE-2006-4144


1. Summary:

Updated ImageMagick packages that fix several security issues are now available.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

ImageMagick(TM) is an image display and manipulation tool for the X Window System that can read and write multiple image formats.

Tavis Ormandy discovered several integer and buffer overflow flaws in the way ImageMagick decodes XCF, SGI, and Sun bitmap graphic files. An attacker could execute arbitrary code on a victim's machine if they were able to trick the victim into opening a specially crafted image file. (CVE-2006-3743, CVE-2006-3744, CVE-2006-4144)

Users of ImageMagick should upgrade to these updated packages, which contain backported patches and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

202193 - CVE-2006-3743 ImageMagick multiple security issues (CVE-2006-3744)
202771 - CVE-2006-4144 ImageMagick ReadSGIImage() integer overflow

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ImageMagick-5.3.8-16.src.rpm
95c4b8a3a13a03b92e7731c1869ffd80 ImageMagick-5.3.8-16.src.rpm

i386:
1ea6a08bc5450e64efdae7178b4025d8 ImageMagick-5.3.8-16.i386.rpm
69a30f7f38ffe810f918ef62ad80cf3a
ImageMagick-c++-5.3.8-16.i386.rpm
3c8c8f5281c953d4a8a0b5dc6102874b ImageMagick-c++-devel-5.3.8-16.i386.rpm
52e9b08e9c873cf6f2c822eeb077f7dc
ImageMagick-devel-5.3.8-16.i386.rpm
702dc419b9abce1d0c95d00790e9f0d4 ImageMagick-perl-5.3.8-16.i386.rpm

ia64:
397fdbc18c18676572bbd08b7b553ef7 ImageMagick-5.3.8-16.ia64.rpm
de51019600457d16a9f1c2aada788f82
ImageMagick-c++-5.3.8-16.ia64.rpm
83609c183e34f11bf57b5a9a3758b90a ImageMagick-c++-devel-5.3.8-16.ia64.rpm
e2b208ef6333a5a6432e41d8412c935e
ImageMagick-devel-5.3.8-16.ia64.rpm
af83cc3860d24179a71c5b6bec51a5ba ImageMagick-perl-5.3.8-16.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ImageMagick-5.3.8-16.src.rpm
95c4b8a3a13a03b92e7731c1869ffd80 ImageMagick-5.3.8-16.src.rpm

ia64:
397fdbc18c18676572bbd08b7b553ef7 ImageMagick-5.3.8-16.ia64.rpm
de51019600457d16a9f1c2aada788f82
ImageMagick-c++-5.3.8-16.ia64.rpm
83609c183e34f11bf57b5a9a3758b90a ImageMagick-c++-devel-5.3.8-16.ia64.rpm
e2b208ef6333a5a6432e41d8412c935e
ImageMagick-devel-5.3.8-16.ia64.rpm
af83cc3860d24179a71c5b6bec51a5ba ImageMagick-perl-5.3.8-16.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ImageMagick-5.3.8-16.src.rpm
95c4b8a3a13a03b92e7731c1869ffd80 ImageMagick-5.3.8-16.src.rpm

i386:
1ea6a08bc5450e64efdae7178b4025d8 ImageMagick-5.3.8-16.i386.rpm
69a30f7f38ffe810f918ef62ad80cf3a
ImageMagick-c++-5.3.8-16.i386.rpm
3c8c8f5281c953d4a8a0b5dc6102874b ImageMagick-c++-devel-5.3.8-16.i386.rpm
52e9b08e9c873cf6f2c822eeb077f7dc
ImageMagick-devel-5.3.8-16.i386.rpm
702dc419b9abce1d0c95d00790e9f0d4 ImageMagick-perl-5.3.8-16.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ImageMagick-5.3.8-16.src.rpm
95c4b8a3a13a03b92e7731c1869ffd80 ImageMagick-5.3.8-16.src.rpm

i386:
1ea6a08bc5450e64efdae7178b4025d8 ImageMagick-5.3.8-16.i386.rpm
69a30f7f38ffe810f918ef62ad80cf3a
ImageMagick-c++-5.3.8-16.i386.rpm
3c8c8f5281c953d4a8a0b5dc6102874b ImageMagick-c++-devel-5.3.8-16.i386.rpm
52e9b08e9c873cf6f2c822eeb077f7dc
ImageMagick-devel-5.3.8-16.i386.rpm
702dc419b9abce1d0c95d00790e9f0d4 ImageMagick-perl-5.3.8-16.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ImageMagick-5.5.6-20.src.rpm
24624ca0eb3a0775c26116623e23e1ae ImageMagick-5.5.6-20.src.rpm

i386:
49bb1ae98900a8e32f7ed0194cebb0bf ImageMagick-5.5.6-20.i386.rpm
2f110ea12de1552e27cc91b6375214a5
ImageMagick-c++-5.5.6-20.i386.rpm
979b22849f5ad735b9cdd460a7c7e636 ImageMagick-c++-devel-5.5.6-20.i386.rpm
ef22fa958b5a55a1696351dc349b784b
ImageMagick-debuginfo-5.5.6-20.i386.rpm
88e8126099e8db71729336dd9af2e204 ImageMagick-devel-5.5.6-20.i386.rpm
ecced6d469a8c90d48464b539aa75227
ImageMagick-perl-5.5.6-20.i386.rpm

ia64:
49bb1ae98900a8e32f7ed0194cebb0bf ImageMagick-5.5.6-20.i386.rpm
160ffd693dcda93446f0761e93f87f89
ImageMagick-5.5.6-20.ia64.rpm
2f110ea12de1552e27cc91b6375214a5 ImageMagick-c++-5.5.6-20.i386.rpm
4a2f448ceb5399fc790b9fb78b89044b
ImageMagick-c++-5.5.6-20.ia64.rpm
7b160d9c17f69e34fdd8e68c1a263584 ImageMagick-c++-devel-5.5.6-20.ia64.rpm
ef22fa958b5a55a1696351dc349b784b
ImageMagick-debuginfo-5.5.6-20.i386.rpm
af7538bbcbf9defcb238c39324c4af9a ImageMagick-debuginfo-5.5.6-20.ia64.rpm
3be3bb9d2589e21ceb8c548335213641
ImageMagick-devel-5.5.6-20.ia64.rpm
9c87d7a86b6e8ff6f60ccacaa874f8d6 ImageMagick-perl-5.5.6-20.ia64.rpm

ppc:
5dd343a64e1ee0940efb6bb7a53726fc ImageMagick-5.5.6-20.ppc.rpm
c95bd3568019802d1585747f0393b62f
ImageMagick-5.5.6-20.ppc64.rpm
05c16fdb9dbb529b6d8e8005faca65df ImageMagick-c++-5.5.6-20.ppc.rpm
371d3600959f6d4924c813916a08b748
ImageMagick-c++-5.5.6-20.ppc64.rpm
dcf5ede30b2d305a2acec1c39ef509f9 ImageMagick-c++-devel-5.5.6-20.ppc.rpm
4bd7423d1e80273de3a9bf27e0db2d89
ImageMagick-debuginfo-5.5.6-20.ppc.rpm
687e2ac358ddad9da86eadea599d26ec ImageMagick-debuginfo-5.5.6-20.ppc64.rpm
12eb5eda512a200dc63d82a2f3d42f53
ImageMagick-devel-5.5.6-20.ppc.rpm
d979b4a29bad733dd9f0d8fe7135bf28 ImageMagick-perl-5.5.6-20.ppc.rpm

s390:
ee010a4baae9c8ec95ab3c720034a2e3 ImageMagick-5.5.6-20.s390.rpm
11d78448026b7be7163fe83556de24a5
ImageMagick-c++-5.5.6-20.s390.rpm
51cddfd11bc0a0a73e29a77bfeeffb67 ImageMagick-c++-devel-5.5.6-20.s390.rpm
85a706324f0be12e43f6f140c42c3496
ImageMagick-debuginfo-5.5.6-20.s390.rpm
0bfcd98d989c09b3a75c8b8a52d76a9b ImageMagick-devel-5.5.6-20.s390.rpm
8a4fda0c318b490ac83a3258e8d66318
ImageMagick-perl-5.5.6-20.s390.rpm

s390x:
ee010a4baae9c8ec95ab3c720034a2e3 ImageMagick-5.5.6-20.s390.rpm
c49ee6e2d994da23f7ddd16da2b6bcbf
ImageMagick-5.5.6-20.s390x.rpm
11d78448026b7be7163fe83556de24a5 ImageMagick-c++-5.5.6-20.s390.rpm
02d642304740614222695d924db94372
ImageMagick-c++-5.5.6-20.s390x.rpm
f23d766a1b16405708220b3fdbb2d95b ImageMagick-c++-devel-5.5.6-20.s390x.rpm
85a706324f0be12e43f6f140c42c3496