Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


Top White Papers

More on LinuxToday


Advisories, February 13, 2007

Feb 14, 2007, 04:45 (0 Talkback[s])

Gentoo Linux


Gentoo Linux Security Advisory [UPDATE] GLSA 200611-05:02

http://security.gentoo.org/


Severity: High
Title: Netkit FTP Server: Privilege escalation
Date: November 10, 2006
Updated: February 11, 2007
Bugs: #150292
ID: 200611-05:02


Update

The original fix introduced a new vulnerability allowing the listing of any arbitrary directory with root group permissions due to a typo in the setgid() call. New fixed packages are available. Also, this update adds a second CVE reference which was not originally mentionned while it was covered by the original fix.

Additionally, please note that the Netkit FTP Server package has been renamed from net-ftp/ftpd to net-ftp/netkit-ftpd.

The updated sections appear below.

Background

net-ftp/netkit-ftpd is the Linux Netkit FTP server with optional SSL support.

Affected packages


     Package              /  Vulnerable  /                  Unaffected

  1  net-ftp/netkit-ftpd      < 0.17-r5                     >= 0.17-r5

Resolution

All Netkit FTP Server users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-ftp/netkit-ftpd-0.17-r5"

References

[ 1 ] CVE-2006-5778

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5778

[ 2 ] CVE-2006-6008

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6008

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200611-05.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


Gentoo Linux Security Advisory GLSA 200702-01

http://security.gentoo.org/


Severity: Normal
Title: Samba: Multiple vulnerabilities
Date: February 13, 2007
Bugs: #165549
ID: 200702-01


Synopsis

Multiple flaws exist in the Samba suite of programs, the most serious of which could result in the execution of arbitrary code.

Background

Samba is a suite of SMB and CIFS client/server programs for UNIX.

Affected packages


     Package       /  Vulnerable  /                         Unaffected

  1  net-fs/samba      < 3.0.24                              >= 3.0.24

Description

A format string vulnerability exists in the VFS module when handling AFS file systems and an infinite loop has been discovered when handling file rename operations.

Impact

A user with permission to write to a shared AFS file system may be able to compromise the smbd process and execute arbitrary code with the permissions of the daemon. The infinite loop could be abused to consume excessive resources on the smbd host, denying service to legitimate users.

Workaround

There is no known workaround at this time.

Resolution

All Samba users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.24"

References

[ 1 ] CVE-2007-0452

http://samba.org/samba/security/CVE-2007-0452.html

[ 2 ] CVE-2007-0454

http://samba.org/samba/security/CVE-2007-0454.html

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200702-01.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


Gentoo Linux Security Advisory GLSA 200702-02

http://security.gentoo.org/


Severity: High
Title: ProFTPD: Local privilege escalation
Date: February 13, 2007
Bugs: #158122
ID: 200702-02


Synopsis

A flaw in ProFTPD may allow a local attacker to obtain root privileges.

Background

ProFTPD is a powerful, configurable, and free FTP daemon.

Affected packages


     Package          /   Vulnerable   /                    Unaffected

  1  net-ftp/proftpd      < 1.3.1_rc1                     >= 1.3.1_rc1

Description

A flaw exists in the mod_ctrls module of ProFTPD, normally used to allow FTP server administrators to configure the daemon at runtime.

Impact

An FTP server administrator permitted to interact with mod_ctrls could potentially compromise the ProFTPD process and execute arbitrary code with the privileges of the FTP Daemon, which is normally the root user.

Workaround

Disable mod_ctrls, or ensure only trusted users can access this feature.

Resolution

All ProFTPD users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.1_rc1"

References

[ 1 ] CVE-2006-6563

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6563

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200702-02.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


Gentoo Linux Security Advisory GLSA 200702-03

http://security.gentoo.org/


Severity: Normal
Title: Snort: Denial of Service
Date: February 13, 2007
Bugs: #161632
ID: 200702-03


Synopsis

Snort contains a vulnerability in the rule matching algorithm that could result in a Denial of Service.

Background

Snort is a widely deployed intrusion detection program.

Affected packages


     Package             /  Vulnerable  /                   Unaffected

  1  net-analyzer/snort      < 2.6.1.2                      >= 2.6.1.2

Description

Randy Smith, Christian Estan and Somesh Jha discovered that the rule matching algorithm of Snort can be exploited in a way known as a "backtracking attack" to perform numerous time-consuming operations.

Impact

A remote attacker could send specially crafted network packets, which would result in the cessation of the detections and the consumption of the CPU resources.

Workaround

There is no known workaround at this time.

Resolution

All Snort users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-analyzer/snort-2.6.1.2"

References

[ 1 ] CVE-2006-6931

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6931

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200702-03.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Mandriva Linux


Mandriva Linux Security Advisory MDKSA-2007:042
http://www.mandriva.com/security/


Package : smb4k
Date : February 12, 2007
Affected: 2007.0


Problem Description:

Kees Cook performed an audit on the Smb4K program and discovered a number of vulnerabilities and security weaknesses that have been addressed and corrected in Smb4K 0.8.0 which is being provided with this update.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0473
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0474
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0475
https://lists.berlios.de/pipermail/smb4k-announce/2006-December/000037.html


Updated Packages:

Mandriva Linux 2007.0:
b2cd743c9cfbe504e8c2a6814d2b8a52 2007.0/i586/libsmb4k0-0.8.0-1.1mdv2007.0.i586.rpm
b129dc1aa5e906e984c46e1a0863a0a6 2007.0/i586/libsmb4k0-devel-0.8.0-1.1mdv2007.0.i586.rpm
6e64f5017bb92379ffc90b4b77bad357 2007.0/i586/smb4k-0.8.0-1.1mdv2007.0.i586.rpm
35a1749a46125e8b1ccfc7e729f9ae03 2007.0/SRPMS/smb4k-0.8.0-1.1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
b7085b96bfaa3dc14ad7b9274bad2166 2007.0/x86_64/lib64smb4k0-0.8.0-1.1mdv2007.0.x86_64.rpm
ae3fcd1dc5cc1a3a70d4ccb30ae6d025 2007.0/x86_64/lib64smb4k0-devel-0.8.0-1.1mdv2007.0.x86_64.rpm
d8d64749ed12c54c9ca9fd6090f0a292 2007.0/x86_64/smb4k-0.8.0-1.1mdv2007.0.x86_64.rpm
35a1749a46125e8b1ccfc7e729f9ae03 2007.0/SRPMS/smb4k-0.8.0-1.1mdv2007.0.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com>

Trustix Secure Linux


Trustix Secure Linux Security Advisory #2007-0007

Package names: fetchmail, gd, php, postgresql, samba
Summary: Multiple vulnerabilities
Date: 2007-02-13
Affected versions: Trustix Secure Linux 2.2 Trustix Secure Linux 3.0 Trustix Operating System - Enterprise Server 2


Package description:
fetchmail
Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6,and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so you can read it through your favorite mail client.

gd
gd is a graphics library. It allows your code to quickly draw images complete with lines, arcs, text, multiple colors, cut and paste from other images, and flood fills, and write out the result as a PNG or JPEG file. This is particularly useful in World Wide Web applications, where PNG and JPEG are two of the formats accepted for inline images by most browsers.

php
PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled web page with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The mod_php module enables the Apache web server to understand and process the embedded PHP language in web pages.

postgresql
PostgreSQL is an advanced Object-Relational database management system (DBMS) that supports almost all SQL constructs (including transactions, subselects and user-defined types and functions). The postgresql package includes the client programs and libraries that you'll need to access a PostgreSQL DBMS server. These PostgreSQL client programs are programs that directly manipulate the internal structure of PostgreSQL databases on a PostgreSQL server. These client programs can be located on the same machine with the PostgreSQL server, or may be on a remote machine which accesses a PostgreSQL server over a network connection. This package contains the docs in HTML for the whole package, as well as command-line utilities for managing PostgreSQL databases on a PostgreSQL server.

samba
Samba provides an SMB server which can be used to provide network services to SMB (sometimes called "Lan Manager") clients, including various versions of MS Windows, OS/2, and other Linux machines. Samba uses NetBIOS over TCP/IP (NetBT) protocols and does NOT need NetBEUI (Microsoft Raw NetBIOS frame) protocol.

Problem description:
fetchmail < TSL 3.0 > < TSL 2.2 >

  • SECURITY Fix: Fetchmail does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.
  • A vulnerability has been reported in Fetchmail caused due to a NULL pointer dereference error when rejecting a message sent to an MDA, which could be exploited by attackers to cause a denial of service.

The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the names CVE-2006-5867 and CVE-2006-5974 to these issues.

gd < TSL 3.0 > < TSL 2.2 >

  • SECURITY Fix: Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.

The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CVE-2007-0455 to this issue.

php < TSL 3.0 > < TSL 2.2 >

  • New Upstream.
  • Includes fix for php "out of memory" error, Bug #2062.
  • Multiple Security fixes.

postgresql < TSL 3.0 > < TSL 2.2 > < TSEL 2 >

  • New upstream.
  • SECURITY Fix: An unspecified error can be used to suppress certain checks, which ensure that SQL functions return the correct data type. This can be exploited to crash the database backend or disclose potentially sensitive information.
  • An unspecified error when changing the data type of a table column can be exploited to crash the database backend or disclose potentially sensitive information.

The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the names CVE-2007-0555 and CVE-2007-0556 to these issues.

samba < TSL 3.0 > < TSL 2.2 > < TSEL 2 >

  • New upstream.
  • SECURITY Fix: smbd allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop.
  • Buffer overflow in the nss_winbind.so.1 library, as used in the winbindd daemon, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
  • Format string vulnerability in the afsacl.so VFS module allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping.

The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the names CVE-2007-0452, CVE-2007-0453 and CVE-2007-0454 to these issue.

Action:
We recommend that all systems with this package installed be upgraded. Please note that if you do not need the functionality provided by this package, you may want to remove it from your system.

Location:
All Trustix Secure Linux updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>

About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus on security and stability, the system is painlessly kept safe and up to date from day one using swup, the automated software updater.

Automatic updates:
Users of the SWUP tool can enjoy having updates automatically installed using 'swup --upgrade'.

Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>

Verification:
This advisory along with all Trustix packages are signed with the TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>

The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-2.2/> and
<URI:http://www.trustix.org/errata/trustix-3.0/>
or directly at
<URI:http://www.trustix.org/errata/2007/0007/>

MD5sums of the packages:


de6b10865bb6ad13a1a5934903d6cece 3.0/rpms/fetchmail-6.3.6-1tr.i586.rpm
f04e1c33d8c11352a8115a178bce8806 3.0/rpms/gd-2.0.33-7tr.i586.rpm
faff5121268f9cceb37d77e4c1fc2059 3.0/rpms/gd-devel-2.0.33-7tr.i586.rpm
d65cb3c4798099bce8756d9d4d9fa7a0 3.0/rpms/gd-utils-2.0.33-7tr.i586.rpm
5bebb862eb223b3a0eedfe16c82b2dc6 3.0/rpms/php-5.2.1-1tr.i586.rpm
a67665031b21953bebc51dba1aeba03c 3.0/rpms/php-calendar-5.2.1-1tr.i586.rpm
f0fcbc3e69f4e96d646fec7bdbbcf554 3.0/rpms/php-cli-5.2.1-1tr.i586.rpm
a939afe84d1671cce2bb7155f7ac0ab0 3.0/rpms/php-curl-5.2.1-1tr.i586.rpm
445da66088168ff3563b49a55397c745 3.0/rpms/php-dba-5.2.1-1tr.i586.rpm
9d5dd6d54688e2549206712d45d04c99 3.0/rpms/php-devel-5.2.1-1tr.i586.rpm
b5e735b2210a098d985422eec4899118 3.0/rpms/php-exif-5.2.1-1tr.i586.rpm
8bf72a390e67d8c4d21394ca8d8a3cbd 3.0/rpms/php-fcgi-5.2.1-1tr.i586.rpm
609c6aa553a37f58e61a7c255d0dad23 3.0/rpms/php-gd-5.2.1-1tr.i586.rpm
82e8b36e32d265d28362c0a2235a3a10 3.0/rpms/php-imap-5.2.1-1tr.i586.rpm
ec211999cb0359a7f17b82ea1d723777 3.0/rpms/php-ldap-5.2.1-1tr.i586.rpm
00274cb74e84ac30187acc473d64c862 3.0/rpms/php-mcrypt-5.2.1-1tr.i586.rpm
05d63a12841a4446990840d6ea85ab57 3.0/rpms/php-mhash-5.2.1-1tr.i586.rpm
af196d861f6b48ba18d8af54178e9cbf 3.0/rpms/php-mssql-5.2.1-1tr.i586.rpm
55cfb9816587f3f4af66649c3d5cf50d 3.0/rpms/php-mysql-5.2.1-1tr.i586.rpm
db96d6839bbac310d143240f0e355106 3.0/rpms/php-mysqli-5.2.1-1tr.i586.rpm
7e769d14d711d0da14c407a24030dc6e 3.0/rpms/php-openssl-5.2.1-1tr.i586.rpm
a4848dad7454d6731585fc29697ce641 3.0/rpms/php-pdo-mysql-5.2.1-1tr.i586.rpm
044c453773907443c0583e6100280052 3.0/rpms/php-pdo-sqlite-5.2.1-1tr.i586.rpm
a50c2f8aa1954845026f693c4f5dddd1 3.0/rpms/php-pgsql-5.2.1-1tr.i586.rpm
dc4811e93101cf4f67785aded0604282 3.0/rpms/php-pspell-5.2.1-1tr.i586.rpm
656c60c889a7c24af9aa8279f99683bd 3.0/rpms/php-snmp-5.2.1-1tr.i586.rpm
985487ad22973ee213428eb05a9a4e71 3.0/rpms/php-sqlite-5.2.1-1tr.i586.rpm
974ebe419202aad9e71e0b904ad9a1a7 3.0/rpms/php-xslt-5.2.1-1tr.i586.rpm
dccc24c6390eb5f08be54191a8759f90 3.0/rpms/php-zlib-5.2.1-1tr.i586.rpm
90b55a1dde7b503a6347ce898774df1b 3.0/rpms/postgresql-8.0.12-1tr.i586.rpm
dc976150bccad1c875003fe92e8df406 3.0/rpms/postgresql-contrib-8.0.12-1tr.i586.rpm
373435a876d99504c422eb22e918110b 3.0/rpms/postgresql-devel-8.0.12-1tr.i586.rpm
b28a5463590f707c2f2fbb4ec56c7968 3.0/rpms/postgresql-docs-8.0.12-1tr.i586.rpm
052899e6bf3d4dbf05b919ece3f78cc6 3.0/rpms/postgresql-libs-8.0.12-1tr.i586.rpm
b917d3a7500d092b603596b9322e2e50 3.0/rpms/postgresql-plperl-8.0.12-1tr.i586.rpm
7b978664feff21df4de290d04849de25 3.0/rpms/postgresql-python-8.0.12-1tr.i586.rpm
57eba62e91beb1f756604ba0903a798d 3.0/rpms/postgresql-server-8.0.12-1tr.i586.rpm
4a78a579acc27be07c605b53757f409d 3.0/rpms/postgresql-test-8.0.12-1tr.i586.rpm
98cf0c288eb646d46e45ea3786d69460 3.0/rpms/samba-3.0.24-1tr.i586.rpm
3b8d03e1c657944697f27dfd94083b54 3.0/rpms/samba-client-3.0.24-1tr.i586.rpm
58bdd6118bddbbe9962f4eddb28ff7c8 3.0/rpms/samba-common-3.0.24-1tr.i586.rpm
97ba37f6f890e39a44474a575c8009d1 3.0/rpms/samba-devel-3.0.24-1tr.i586.rpm
4871243701dbd75a994eb14eefb88c6b 3.0/rpms/samba-mysql-3.0.24-1tr.i586.rpm

2c2dd71f917ff909e1f562af4984a46e 2.2/rpms/fetchmail-6.2.5.5-2tr.i586.rpm
40add27b80f1d4e97643c33df19b067a 2.2/rpms/gd-2.0.33-5tr.i586.rpm
bb0f5436bd572f9526d6ec3461833061 2.2/rpms/gd-devel-2.0.33-5tr.i586.rpm
0411b52fdfb04e6473e093d2d8ba168c 2.2/rpms/gd-utils-2.0.33-5tr.i586.rpm
2922f2962e156ecd9b04ac172b34dfe7 2.2/rpms/php-5.2.1-1tr.i586.rpm
e6d7e6e767034dbd849a70790e1f4a67 2.2/rpms/php-cli-5.2.1-1tr.i586.rpm
76bac87481615ac1acf7554f956aeffb 2.2/rpms/php-curl-5.2.1-1tr.i586.rpm
68819d843e5f40b8fb900a8a47904ace 2.2/rpms/php-devel-5.2.1-1tr.i586.rpm
af0915f900c472c980704a104285fee3 2.2/rpms/php-exif-5.2.1-1tr.i586.rpm
95b0997487a8befd161061be801d97f4 2.2/rpms/php-fcgi-5.2.1-1tr.i586.rpm
efa831f89218ff297b22fcb9c9a82e5d 2.2/rpms/php-gd-5.2.1-1tr.i586.rpm
6d6b91a201b5fe4e7e8df46be3f38afa 2.2/rpms/php-imap-5.2.1-1tr.i586.rpm
596d513c1ca3f35bbed8ca888da95e04 2.2/rpms/php-ldap-5.2.1-1tr.i586.rpm
3edf364b42f6b64fe73bf2713f7010b9 2.2/rpms/php-mcrypt-5.2.1-1tr.i586.rpm
7f5adac66ada60f9c8b5c173f1382be6 2.2/rpms/php-mhash-5.2.1-1tr.i586.rpm
d64be30326180ddae851ea51cb09c8cd 2.2/rpms/php-mssql-5.2.1-1tr.i586.rpm
e5dd0daf72c394aa999adb3aaf8d70e7 2.2/rpms/php-mysql-5.2.1-1tr.i586.rpm
309a3ddf2736e498a567b33a5b4b3d0c 2.2/rpms/php-mysqli-5.2.1-1tr.i586.rpm
37a8663a1a6e99fe3ad945ed023ba62d 2.2/rpms/php-openssl-5.2.1-1tr.i586.rpm
5d7468c9d48fcd68d2aa0e202f741ce1 2.2/rpms/php-pdo-mysql-5.2.1-1tr.i586.rpm
1e88c42de999f7777a2a6dba4a774396 2.2/rpms/php-pdo-sqlite-5.2.1-1tr.i586.rpm
f80833a19188aa5cd3abdb6448478f0b 2.2/rpms/php-pgsql-5.2.1-1tr.i586.rpm
dd47890fd035022a41093469ba12ae63 2.2/rpms/php-sqlite-5.2.1-1tr.i586.rpm
002c8c187c729b661bc4fe927aa2b43f 2.2/rpms/php-zlib-5.2.1-1tr.i586.rpm
37bd8755048481460d79cb572d6c94ab 2.2/rpms/postgresql-8.0.12-1tr.i586.rpm
0c540ef41fb8f5000042e24bf37fde0b 2.2/rpms/postgresql-contrib-8.0.12-1tr.i586.rpm
b65d317f8b63ef6fc5e2654109f3721e 2.2/rpms/postgresql-devel-8.0.12-1tr.i586.rpm
f66b44c1e5e4ca008327f5104d6b3167 2.2/rpms/postgresql-docs-8.0.12-1tr.i586.rpm
884bb462892ef386c5cec5ea8ef71db9 2.2/rpms/postgresql-libs-8.0.12-1tr.i586.rpm
08a2acb9fb41edf92e5c17742be27b41 2.2/rpms/postgresql-plperl-8.0.12-1tr.i586.rpm
7d2d55f87f50c25264c847a2f0f4f3d9 2.2/rpms/postgresql-python-8.0.12-1tr.i586.rpm
39c7d13a5ecd0c75d4cfe32c624393d6 2.2/rpms/postgresql-server-8.0.12-1tr.i586.rpm
78d22a4d806246050d81108a44e159f4 2.2/rpms/postgresql-test-8.0.12-1tr.i586.rpm
a4326b1bde0265eb70f1a20d62380a08 2.2/rpms/samba-3.0.24-1tr.i586.rpm
219d539afdc93ae5bdaa2bc68170f91f 2.2/rpms/samba-client-3.0.24-1tr.i586.rpm
e041c99a9647c63a83264d5f05d6b105 2.2/rpms/samba-common-3.0.24-1tr.i586.rpm
5f8dc6eb620ebb5000143a32249b9ffe 2.2/rpms/samba-devel-3.0.24-1tr.i586.rpm
f318ce88117532b3bcdc4753169b9633 2.2/rpms/samba-mysql-3.0.24-1tr.i586.rpm


Trustix Security Team