dcsimg
Linux Today: Linux News On Internet Time.





More on LinuxToday


Advisories: September 1, 2005

Sep 02, 2005, 04:45 (0 Talkback[s])

Debian GNU/Linux


Debian Security Advisory DSA 779-2 security@debian.org
http://www.debian.org/security/ Martin Schulze
September 1st, 2005 http://www.debian.org/security/faq


Package : mozilla-firefox
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2005-2260 CAN-2005-2261 CAN-2005-2262 CAN-2005-2263 CAN-2005-2264 CAN-2005-2265 CAN-2005-2266 CAN-2005-2267 CAN-2005-2268 CAN-2005-2269 CAN-2005-2270
BugTraq ID : 14242
Debian Bug : 318061

We experienced that the update for Mozilla Firefox from DSA 779-1 unfortunately was a regression in several cases. Since the usual praxis of backporting apparently does not work, this update is basically version 1.0.6 with the version number rolled back, and hence still named 1.0.4-*. For completeness below is the original advisory text:

Several problems have been discovered in Mozilla Firefox, a lightweight web browser based on Mozilla. The Common Vulnerabilities and Exposures project identifies the following problems:

CAN-2005-2260

The browser user interface does not properly distinguish between user-generated events and untrusted synthetic events, which makes it easier for remote attackers to perform dangerous actions that normally could only be performed manually by the user.

CAN-2005-2261

XML scripts ran even when Javascript disabled.

CAN-2005-2262

The user can be tricked to executing arbitrary JavaScript code by using a JavaScript URL as wallpaper.

CAN-2005-2263

It is possible for a remote attacker to execute a callback function in the context of another domain (i.e. frame).

CAN-2005-2264

By opening a malicious link in the sidebar it is possible for remote attackers to steal sensitive information.

CAN-2005-2265

Missing input sanitising of InstallVersion.compareTo() can cause the application to crash.

CAN-2005-2266

Remote attackers could steal sensitive information such as cookies and passwords from web sites by accessing data in alien frames.

CAN-2005-2267

By using standalone applications such as Flash and QuickTime to open a javascript: URL, it is possible for a remote attacker to steal sensitive information and possibly execute arbitrary code.

CAN-2005-2268

It is possible for a Javascript dialog box to spoof a dialog box from a trusted site and facilitates phishing attacks.

CAN-2005-2269

Remote attackers could modify certain tag properties of DOM nodes that could lead to the execution of arbitrary script or code.

CAN-2005-2270

The Mozilla browser familie does not properly clone base objects, which allows remote attackers to execute arbitrary code.

The old stable distribution (woody) is not affected by these problems.

For the stable distribution (sarge) these problems have been fixed in version 1.0.4-2sarge3.

For the unstable distribution (sid) these problems have been fixed in version 1.0.6-1.

We recommend that you upgrade your Mozilla Firefox packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3.dsc
      Size/MD5 checksum: 1001 e9e343d5899bc10b64650464839db1dc
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3.diff.gz
      Size/MD5 checksum: 323682 3e07c7d42de155ed01210386bc2f06f7
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz
      Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d

Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_alpha.deb
      Size/MD5 checksum: 11162870 103e4b84e9d2052cb4260b96e41319aa
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_alpha.deb
      Size/MD5 checksum: 166886 906bfa51b6c0cb8966fe06aec2b5816e
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_alpha.deb
      Size/MD5 checksum: 58708 1b3025f62bb3cb67b32c73c9f20ac5ba

AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_amd64.deb
      Size/MD5 checksum: 9397790 6b14119f896013d55826cb59dac50c3b
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_amd64.deb
      Size/MD5 checksum: 161636 33635aa0e4e18a2f8868bb49969a37a6
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_amd64.deb
      Size/MD5 checksum: 57194 a46c10258c9929c8e9f8001838dc4fe4

ARM architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_arm.deb
      Size/MD5 checksum: 8216696 f39cae6e1e57a572c316c14cc6c0b3d6
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_arm.deb
      Size/MD5 checksum: 153076 c634b6a8d6f42008526607877071bcaa
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_arm.deb
      Size/MD5 checksum: 52548 04b5b1e840e77b56837e1991c11a9ff6

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_i386.deb
      Size/MD5 checksum: 8889628 c7730b4e3df2f6a0bb12186a52884a9e
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_i386.deb
      Size/MD5 checksum: 156844 806fd550f9a5283e4fab73443c73fbcd
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_i386.deb
      Size/MD5 checksum: 54096 9eb9d71896406a619bd186bfe10ed0f2

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_ia64.deb
      Size/MD5 checksum: 11617476 564858f6b1f36f84a1fa9e8c7cb71316
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_ia64.deb
      Size/MD5 checksum: 167224 b574fe291d5537628022434ef13c9587
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_ia64.deb
      Size/MD5 checksum: 61876 4625f067b0cdb1a0de04829a9edbc6d7

HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_hppa.deb
      Size/MD5 checksum: 10266194 05ebaf745a3854b8a4dc8dd0e1cff53c
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_hppa.deb
      Size/MD5 checksum: 164592 902df65efa25b497b99a62d1a38acc2e
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_hppa.deb
      Size/MD5 checksum: 57692 2221b941de975d360a6f2123d83a73ea

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_m68k.deb
      Size/MD5 checksum: 8167252 23f5666813a7118b5a1e841337b2b9aa
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_m68k.deb
      Size/MD5 checksum: 155742 f46394239362846cfdbe2f2d316bbc18
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_m68k.deb
      Size/MD5 checksum: 53352 619ac605ca4c6d0b449f6b2652b76463

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_mips.deb
      Size/MD5 checksum: 9919620 0f246fc3335b23e9975d78b0f86a2682
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_mips.deb
      Size/MD5 checksum: 154596 90a7786ea46368235be9b052b07eb7d0
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_mips.deb
      Size/MD5 checksum: 54366 ccec0a41faf2945c6ec426311fe4bf77

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_mipsel.deb
      Size/MD5 checksum: 9803502 117b7e5ea7a0d7b78518218009024eaa
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_mipsel.deb
      Size/MD5 checksum: 154172 a090df008b2336d500d772cf538dbe3e
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_mipsel.deb
      Size/MD5 checksum: 54180 1dde88657a7740f8261f8804a5bc3a13

PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_powerpc.deb
      Size/MD5 checksum: 8561832 f6dd2ad6a53d96b8779fcecd022733ae
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_powerpc.deb
      Size/MD5 checksum: 155236 88e76f256f6aa39c93ca73b95141e6fc
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_powerpc.deb
      Size/MD5 checksum: 56482 1525d1b14855694f62110a8fd2ad4b61

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_s390.deb
      Size/MD5 checksum: 9635736 770eca99436ee1646cc9af8eb1f4bce4
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_s390.deb
      Size/MD5 checksum: 162228 c17de607a44ebdd3838d07a8d784f9b8
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_s390.deb
      Size/MD5 checksum: 56664 ead0e97932f0bc9ad8c756d46cf6540f

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_sparc.deb
      Size/MD5 checksum: 8651242 7b87e6d2fca175b70259035c0d5506cf
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_sparc.deb
      Size/MD5 checksum: 155458 2ae1ce848a6ea81a485f2f1240f894cc
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_sparc.deb
      Size/MD5 checksum: 52906 89b1bb81288c9fa1f156ba6354292484

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 792-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
August 31st, 2005 http://www.debian.org/security/faq


Package : pstotext
Vulnerability : missing input sanitising
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2005-2536
BugTraq ID : 14378
Debian Bug : 319758

Max Vozeler discovered that pstotext, a utility to extract text from PostScript and PDF files, did not execute ghostscript with the -dSAFER argument, which prevents potential malicious operations to happen.

For the old stable distribution (woody) this problem has been fixed in version 1.8g-5woody1.

For the stable distribution (sarge) this problem has been fixed in version 1.9-1sarge1.

For the unstable distribution (sid) this problem has been fixed in version 1.9-2.

We recommend that you upgrade your pstotext package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1.dsc
      Size/MD5 checksum: 569 5e4999fac3cb50533b8fa55fa9b8d839
    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1.diff.gz
      Size/MD5 checksum: 5551 e8656ca1e70907515dea96f646defbeb
    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g.orig.tar.gz
      Size/MD5 checksum: 36193 dfabf95fffea52cc03d8728617ca1b1e

Alpha architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_alpha.deb
      Size/MD5 checksum: 33478 dc7994b7f762a99cda3f6e9eebfd5078

ARM architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_arm.deb
      Size/MD5 checksum: 31158 64eb3bb5eaf13a54356bd8b55212ac93

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_i386.deb
      Size/MD5 checksum: 31140 ed687aa111ef4d56fd7b2fb220f8118a

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_ia64.deb
      Size/MD5 checksum: 37056 7ac97b49306cf896bb3d62b6b076ecb0

HP Precision architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_hppa.deb
      Size/MD5 checksum: 32884 6e7b79977d550e6981b0a6849face1b9

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_m68k.deb
      Size/MD5 checksum: 30124 5b23f0c04107d284c561d1621c4fd9d1

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_mips.deb
      Size/MD5 checksum: 32978 56283a3ef2931d2c4759c4c56218f83a

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_mipsel.deb
      Size/MD5 checksum: 32624 29ed7091abca377c4b91fa68d7bc48cb

PowerPC architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_powerpc.deb
      Size/MD5 checksum: 32082 c8b4af3f34d681f9dabe4ff31bf0434a

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_s390.deb
      Size/MD5 checksum: 31354 ce7f8f5b398350e9d779a847b7c5ef2f

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_sparc.deb
      Size/MD5 checksum: 35050 e6e74a1ccfc2cb7246911b2f0427609f

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1.dsc
      Size/MD5 checksum: 566 a4a25eaf8322a20742fb0eac628c096c
    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1.diff.gz
      Size/MD5 checksum: 7817 634b242dbb68cbb6cf1595e6fa390d0e
    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9.orig.tar.gz
      Size/MD5 checksum: 37461 64576e8a10ff5514e285d98b3898ae78

Alpha architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_alpha.deb
      Size/MD5 checksum: 34084 82b71b24a4248ea05d243aa1d7b00e7c

AMD64 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_amd64.deb
      Size/MD5 checksum: 33670 b5911eb9b067b55315dadfba9c8cb590

ARM architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_arm.deb
      Size/MD5 checksum: 32260 426147c50900aba089a9eb430e2094bb

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_i386.deb
      Size/MD5 checksum: 32632 e2f9a3859fe3061c85d4f1a54253062e

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_ia64.deb
      Size/MD5 checksum: 37624 76f3ed1bb870504692fe7fadbeb6e9b7

HP Precision architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_hppa.deb
      Size/MD5 checksum: 34282 7570594eef38d55ebb26e981c8de306b

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_m68k.deb
      Size/MD5 checksum: 31370 b9bd589dbbaf0d516cefb4f0b40397be

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_mips.deb
      Size/MD5 checksum: 34196 ac148736eaeedd368b6114c79c45b569

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_mipsel.deb
      Size/MD5 checksum: 33800 f9bad656d356e522daf2de44c0cc5f26

PowerPC architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_powerpc.deb
      Size/MD5 checksum: 33408 1b7b3cf7e04b3bf313d798ee822f7e92

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_s390.deb
      Size/MD5 checksum: 32948 b10976913ca43591166801bb9844f096

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_sparc.deb
      Size/MD5 checksum: 32992 c15517e727b7c38adec0f5f85282c430

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 793-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
September 1st, 2005 http://www.debian.org/security/faq


Package : courier
Vulnerability : missing input sanitising
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2005-2724
Debian Bug : 325631

Jakob Balle discovered a vulnerability in the handling of attachments in sqwebmail, a web mail application provided by the courier mail suite, which can be exploited by an attacker to conduct script insertion attacks.

For the old stable distribution (woody) this problem has been fixed in version 0.37.3-2.6.

For the stable distribution (sarge) this problem has been fixed in version 0.47-4sarge2.

For the unstable distribution (sid) this problem has been fixed in version 0.47-8.

We recommend that you upgrade your sqwebmail package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

    http://security.debian.org/pool/updates/main/c/courier/courier_0.37.3-2.6.dsc
      Size/MD5 checksum: 913 9e519251e523fe1c3cb5b13438e256b3
    http://security.debian.org/pool/updates/main/c/courier/courier_0.37.3-2.6.diff.gz
      Size/MD5 checksum: 33752 bbb1f5cd5cc2733f1701c11d3ceddd8c
    http://security.debian.org/pool/updates/main/c/courier/courier_0.37.3.orig.tar.gz
      Size/MD5 checksum: 3238013 350cbb2e8b5f384409bdf2a15d605bc9

Architecture independent components:

    http://security.debian.org/pool/updates/main/c/courier/courier-doc_0.37.3-2.6_all.deb
      Size/MD5 checksum: 313516 a3469989b9f87d801c0cf57b82c03992

Alpha architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_alpha.deb
      Size/MD5 checksum: 52394 7ec42f6b7295bc83c75af4304e789bf0
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_alpha.deb
      Size/MD5 checksum: 47382 3fe84b87d20bcb98668839c632bcec93
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_alpha.deb
      Size/MD5 checksum: 146346 eba3c70f277b77cbf6967682c28803a0
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_alpha.deb
      Size/MD5 checksum: 18722 f5d11f88b2a794e06eade45f99cb7e26
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_alpha.deb
      Size/MD5 checksum: 138930 89ac890ed0f87e2b8a8a5d6492884b3d
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_alpha.deb
      Size/MD5 checksum: 61412 cb466ea58f24047c922e3960cb130aea
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_alpha.deb
      Size/MD5 checksum: 208314 fbb919f360992f1763934c3dff8bb4c9
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_alpha.deb
      Size/MD5 checksum: 134286 c0671581a43c12e1765048e54a3ce4cd
    http://security.debian.org/pool/updates/main/c/courier/courier-mta_0.37.3-2.6_alpha.deb
      Size/MD5 checksum: 667730 8e4d8ad4784849c2f508651f551e8731
    http://security.debian.org/pool/updates/main/c/courier/courier-pcp_0.37.3-2.6_alpha.deb
      Size/MD5 checksum: 62448 89487843681f10de6ab3566b9ee77b34
    http://security.debian.org/pool/updates/main/c/courier/courier-pop_0.37.3-2.6_alpha.deb
      Size/MD5 checksum: 40272 142328be8e8d166cf0463eb343678e6c
    http://security.debian.org/pool/updates/main/c/courier/courier-webadmin_0.37.3-2.6_alpha.deb
      Size/MD5 checksum: 25438 63ab82aaf730c856edd39dbf590f9448
    http://security.debian.org/pool/updates/main/c/courier/sqwebmail_0.37.3-2.6_alpha.deb
      Size/MD5 checksum: 330060 2dd6d235a1f2fa46231a57a37b2e0c52

ARM architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_arm.deb
      Size/MD5 checksum: 47332 eb245ab25c60ecf56748f4ad5f056f28
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_arm.deb
      Size/MD5 checksum: 42482 376fe13c7e7711b58116f14ae84ac0eb
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_arm.deb
      Size/MD5 checksum: 128690 086cbcf2808d0205f73143269d482be8
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_arm.deb
      Size/MD5 checksum: 17680 2a01606c6f966a4b621b3ef47582cc7f
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_arm.deb
      Size/MD5 checksum: 124620 35d25cce087f13995ff391dd47be3672
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_arm.deb
      Size/MD5 checksum: 53664 c876cc961f7abbc4fe3aea64fb1b6f15
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_arm.deb
      Size/MD5 checksum: 180150 b61ceeded835975a125500d5b7869ee3
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_arm.deb
      Size/MD5 checksum: 116256 0a900c4c6ef1b8bf6fcace2b05db9719
    http://security.debian.org/pool/updates/main/c/courier/courier-mta_0.37.3-2.6_arm.deb
      Size/MD5 checksum: 549914 e71cf4a650e6294dbf804bd3594e476c
    http://security.debian.org/pool/updates/main/c/courier/courier-pcp_0.37.3-2.6_arm.deb
      Size/MD5 checksum: 55844 f767586e1436bc09f9a31d17d40952bf
    http://security.debian.org/pool/updates/main/c/courier/courier-pop_0.37.3-2.6_arm.deb
      Size/MD5 checksum: 35410 bd83bfeaca7763ecd4c27933241ebbdb
    http://security.debian.org/pool/updates/main/c/courier/courier-webadmin_0.37.3-2.6_arm.deb
      Size/MD5 checksum: 25072 91f0e9d2dc149f2974e5224d681c6a4b
    http://security.debian.org/pool/updates/main/c/courier/sqwebmail_0.37.3-2.6_arm.deb
      Size/MD5 checksum: 297696 979e0ada05175b1ea55766b843bca389

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_i386.deb
      Size/MD5 checksum: 46454 cea858a7fc92c44ff7d47dc5147dd8cb
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_i386.deb
      Size/MD5 checksum: 41806 ce5726f8f7f22621de326c762dcd778a
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_i386.deb
      Size/MD5 checksum: 128824 f2ed07143b7bf307a6ffa130f0dc0033
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_i386.deb
      Size/MD5 checksum: 17410 35fbc5b327ea0f282a74a83dcca3b3b6
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_i386.deb
      Size/MD5 checksum: 120708 d1a6f9601c698eaffc85f97b592ccbf1
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_i386.deb
      Size/MD5 checksum: 53092 a8fcbe05d2464fb502fce4d30e8e0d0c
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_i386.deb
      Size/MD5 checksum: 174988 56ba9e60fbf80fc4d4a9f82aaec04792
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_i386.deb
      Size/MD5 checksum: 109722 47673782fc8944cc41041746f942bc9e
    http://security.debian.org/pool/updates/main/c/courier/courier-mta_0.37.3-2.6_i386.deb
      Size/MD5 checksum: 539038 3ae864646fcac926383a82844ddaa0cc
    http://security.debian.org/pool/updates/main/c/courier/courier-pcp_0.37.3-2.6_i386.deb
      Size/MD5 checksum: 54364 10e1e39484866bebf67f99756a10cb82
    http://security.debian.org/pool/updates/main/c/courier/courier-pop_0.37.3-2.6_i386.deb
      Size/MD5 checksum: 35082 20921159c83171629c17c3e9b7822d7f
    http://security.debian.org/pool/updates/main/c/courier/courier-webadmin_0.37.3-2.6_i386.deb
      Size/MD5 checksum: 25178 8cf6453456d08b884808dc1c3a085a04
    http://security.debian.org/pool/updates/main/c/courier/sqwebmail_0.37.3-2.6_i386.deb
      Size/MD5 checksum: 285788 fe4c58864d039674717f3272728eb061

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_ia64.deb
      Size/MD5 checksum: 75572 500bdd75210e8433d6d93c171145fec5
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_ia64.deb
      Size/MD5 checksum: 70812 9a83880345ae6b874f9984472e41cc8e
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_ia64.deb
      Size/MD5 checksum: 193840 f1e6f14880eb25f6fed737425259ca1d
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_ia64.deb
      Size/MD5 checksum: 23052 8c2dcceaa257dded88b75005259d1b97
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_ia64.deb
      Size/MD5 checksum: 213886 c9c10b857c30685772d13a8fd1d0f058
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_ia64.deb
      Size/MD5 checksum: 87328 0f75f1a47adf402cfe569e041ef8fe62
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_ia64.deb
      Size/MD5 checksum: 271546 54f3a6a971512e5ef85182b5e0424a0a
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_ia64.deb
      Size/MD5 checksum: 151786 b026308dce20225e8007eeed9ca7944f
    http://security.debian.org/pool/updates/main/c/courier/courier-mta_0.37.3-2.6_ia64.deb
      Size/MD5 checksum: 967076 e3a677b9f2dee2a8bc9a301cd566873d
    http://security.debian.org/pool/updates/main/c/courier/courier-pcp_0.37.3-2.6_ia64.deb
      Size/MD5 checksum: 103674 52d7ce5b4022448730a843696b985dc3
    http://security.debian.org/pool/updates/main/c/courier/courier-pop_0.37.3-2.6_ia64.deb
      Size/MD5 checksum: 53766 eb18a9434a7e581dbf57ae5d7da74da1
    http://security.debian.org/pool/updates/main/c/courier/courier-webadmin_0.37.3-2.6_ia64.deb
      Size/MD5 checksum: 26084 9b23b1a9ba52e310f0222eb374160019
    http://security.debian.org/pool/updates/main/c/courier/sqwebmail_0.37.3-2.6_ia64.deb
      Size/MD5 checksum: 506748 0844a539589e9a69470dd4eccc6f22cd

HP Precision architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_hppa.deb
      Size/MD5 checksum: 48084 3016509184ab4df23a0ef7757ce43ae6
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_hppa.deb
      Size/MD5 checksum: 43380 681e8939cb88f981c8e514bdeecf661a
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_hppa.deb
      Size/MD5 checksum: 130426 4dc32c2cb9d55c8dc703ec99e3eb431d
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_hppa.deb
      Size/MD5 checksum: 17688 d62db41aa8a091dd496be2fc1e7a087e
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_hppa.deb
      Size/MD5 checksum: 125402 9205f3af9a4be297b3631fb02e43efba
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_hppa.deb
      Size/MD5 checksum: 54508 80762cc78a49c4b9cd396c5f2a8ad061
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_hppa.deb
      Size/MD5 checksum: 193654 fcba51cb2611fa1b01c8b3f6aa3e659f
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_hppa.deb
      Size/MD5 checksum: 151154 df48ee812d0b8c5b4104c3b8e3e46d1a
    http://security.debian.org/pool/updates/main/c/courier/courier-mta_0.37.3-2.6_hppa.deb
      Size/MD5 checksum: 643782 603b221454b30f016d32f072ccb72312
    http://security.debian.org/pool/updates/main/c/courier/courier-pcp_0.37.3-2.6_hppa.deb
      Size/MD5 checksum: 56332 401b82693059f5a182b95a37e4850f42
    http://security.debian.org/pool/updates/main/c/courier/courier-pop_0.37.3-2.6_hppa.deb
      Size/MD5 checksum: 35574 1d87382767d17adf22f369d392bba426
    http://security.debian.org/pool/updates/main/c/courier/courier-webadmin_0.37.3-2.6_hppa.deb
      Size/MD5 checksum: 25322 f829a2893d08040647b1e5b3f622117a
    http://security.debian.org/pool/updates/main/c/courier/sqwebmail_0.37.3-2.6_hppa.deb
      Size/MD5 checksum: 296802 6661b480bde2f01479693d9c7a13f087

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_m68k.deb
      Size/MD5 checksum: 45078 a4ed9e0ea6f11af11bcff46a454975a2
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_m68k.deb
      Size/MD5 checksum: 40416 65add681d2db24f62415f0cadd942857
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_m68k.deb
      Size/MD5 checksum: 125010 50257f1269914759687d78acfb8ed94e
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_m68k.deb
      Size/MD5 checksum: 17118 e88fe85b4ef61cee3b5bf5a9ddf70673
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_m68k.deb
      Size/MD5 checksum: 115000 f4c959fb35558e3af72028a7d7511495
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_m68k.deb
      Size/MD5 checksum: 51226 5d10b94a11d6f89ed4fee07f0e7af4da
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_m68k.deb
      Size/MD5 checksum: 167798 38df74f4759a042bd8393b0c432bada3
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_m68k.deb
      Size/MD5 checksum: 105330 fe260c3033006335863649887a2cc442
    http://security.debian.org/pool/updates/main/c/courier/courier-mta_0.37.3-2.6_m68k.deb
      Size/MD5 checksum: 506940 fdef732f3a636d4370e54bf62924b187
    http://security.debian.org/pool/updates/main/c/courier/courier-pcp_0.37.3-2.6_m68k.deb
      Size/MD5 checksum: 51768 64b0614d88613fd304c32791d18a0adc
    http://security.debian.org/pool/updates/main/c/courier/courier-pop_0.37.3-2.6_m68k.deb
      Size/MD5 checksum: 33862 9f4563455166469aadd0d9957bd20cba
    http://security.debian.org/pool/updates/main/c/courier/courier-webadmin_0.37.3-2.6_m68k.deb
      Size/MD5 checksum: 25110 4ecf9604d4ff3badb91cc5ead8cfba9d
    http://security.debian.org/pool/updates/main/c/courier/sqwebmail_0.37.3-2.6_m68k.deb
      Size/MD5 checksum: 271856 0afe8c8fdf41985cfaa382026921537e

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_mips.deb
      Size/MD5 checksum: 49390 8f41cbeb776fd8e158e3e500c416d520
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_mips.deb
      Size/MD5 checksum: 44308 02fe11c81523759aeacf1ca3f4ae9380
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_mips.deb
      Size/MD5 checksum: 136346 609a09377e67ac7d9240c2364ea0e6e2
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_mips.deb
      Size/MD5 checksum: 17760 0b01bf4c0621eb0a590b6d5cdf4bc104
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_mips.deb
      Size/MD5 checksum: 128096 f0d5248b652c94d173c61d2b9c445a6f
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_mips.deb
      Size/MD5 checksum: 55704 84d8dbbb3f21eb4e1e9a357bae2e73a4
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_mips.deb
      Size/MD5 checksum: 185894 eeb0fece26ce633914851042061eb954
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_mips.deb