dcsimg
Linux Today: Linux News On Internet Time.





More on LinuxToday


Advisories, May 22, 2006

May 23, 2006, 04:45 (0 Talkback[s])

Debian GNU/Linux


Debian Security Advisory DSA 1058-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
May 18th, 2006 http://www.debian.org/security/faq


Package : awstats
Vulnerability : missing input sanitising
Problem type : remote
Debian-specific: no
CVE ID : CVE-2006-2237
BugTraq ID : 17844
Debian Bugs : 364443 365909 365910

Hendrik Weimer discovered that specially crafted web requests can cause awstats, a powerful and featureful web server log analyzer, to execute arbitrary commands.

The old stable distribution (woody) is not affected by this problem.

For the stable distribution (sarge) this problem has been fixed in version 6.4-1sarge2.

For the unstable distribution (sid) this problem has been fixed in version 6.5-2.

We recommend that you upgrade your awstats package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/a/awstats/awstats_6.4-1sarge2.dsc
      Size/MD5 checksum: 591 bc33a94cbf5cb3fe89922f312434d0d6
    http://security.debian.org/pool/updates/main/a/awstats/awstats_6.4-1sarge2.diff.gz
      Size/MD5 checksum: 18702 88fa1b4b53640c4b5b05deaca9a3c156
    http://security.debian.org/pool/updates/main/a/awstats/awstats_6.4.orig.tar.gz
      Size/MD5 checksum: 918435 056e6fb0c7351b17fe5bbbe0aa1297b1

Architecture independent components:

    http://security.debian.org/pool/updates/main/a/awstats/awstats_6.4-1sarge2_all.deb
      Size/MD5 checksum: 728566 d3241a30634640b4f363097f751e7282

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 1059-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
May 19th, 2006 http://www.debian.org/security/faq


Package : quagga
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2006-2223 CVE-2006-2224 CVE-2006-2276
BugTraq ID : 17808
Debian Bugs : 365940 366980

Konstantin Gavrilenko discovered several vulnerabilities in quagga, the BGP/OSPF/RIP routing daemon. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2006-2223

Remote attackers may obtain sensitive information via RIPv1 REQUEST packets even if the quagga has been configured to use MD5 authentication.

CVE-2006-2224

Remote attackers could inject arbitrary routes using the RIPv1 RESPONSE packet even if the quagga has been configured to use MD5 authentication.

CVE-2006-2276

Fredrik Widell discovered that local users are can cause a denial of service ia a certain sh ip bgp command entered in the telnet interface.

The old stable distribution (woody) does not contain quagga packages.

For the stable distribution (sarge) these problems have been fixed in version 0.98.3-7.2.

For the unstable distribution (sid) these problems have been fixed in version 0.99.4-1.

We recommend that you upgrade your quagga package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2.dsc
      Size/MD5 checksum: 725 e985734e8ee31a87ff96f9c9b7291fa5
    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2.diff.gz
      Size/MD5 checksum: 43801 fe5b28230c268fe7ab141453a82c473c
    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3.orig.tar.gz
      Size/MD5 checksum: 2118348 68be5e911e4d604c0f5959338263356e

Architecture independent components:

    http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.98.3-7.2_all.deb
      Size/MD5 checksum: 488700 c79865480dfe140b106d39111b5379ba

Alpha architecture:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_alpha.deb
      Size/MD5 checksum: 1611704 c44bc78a27990ca9d77fe4529c04e42a

AMD64 architecture:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_amd64.deb
      Size/MD5 checksum: 1412990 7ab17ec568d3f0e2122677e81db5a2e2

ARM architecture:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_arm.deb
      Size/MD5 checksum: 1290442 9a5d285ffe43d8b05c470147c48357d5

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_i386.deb
      Size/MD5 checksum: 1191426 a0438042e1935582b66a44f17e62b40b

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_ia64.deb
      Size/MD5 checksum: 1829114 9e6e40afc51734c572de0f4e6e2d6519

HP Precision architecture:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_hppa.deb
      Size/MD5 checksum: 1447726 4f6d058646cd78f86994eee61359df22

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_m68k.deb
      Size/MD5 checksum: 1159670 1438a6da0f5c0672075438df92e82695

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_mips.deb
      Size/MD5 checksum: 1352522 567e463657f21ec64870c1a243012b49

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_mipsel.deb
      Size/MD5 checksum: 1355460 3dec77ae54b897882091bb5501b349c7

PowerPC architecture:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_powerpc.deb
      Size/MD5 checksum: 1316776 adaa0828d830d7145236ee2f216fe46d

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_s390.deb
      Size/MD5 checksum: 1401616 41b91f2eb90d26b1482696681552d9cb

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_sparc.deb
      Size/MD5 checksum: 1287378 3b1624ec028e9f7944edd3fc396b0778

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 1060-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
May 19th, 2006 http://www.debian.org/security/faq


Package : kernel-patch-vserver
Vulnerability : programming error
Problem-Type : local
Debian-specific: no
CVE ID : CVE-2006-2110

Jan Rekorajski discovered that the kernel patch for virtual private servers does not limit context capabilities to the root user within the virtual server, which might lead to privilege escalation for some virtual server specific operations.

The old stable distribution (woody) does not contain kernel-patch-vserver packages.

For the stable distribution (sarge) this problem has been fixed in version 1.9.5.6.

For the unstable distribution (sid) this problem has been fixed in version 2:2.0.1-4.

We recommend that you upgrade your kernel-patch-vserver package and rebuild your kernel immediately.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.6.dsc
      Size/MD5 checksum: 635 512748c6aad20c132cbdf85c5e4fd72a
    http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.6.tar.gz
      Size/MD5 checksum: 945398 671ed0151cf315be316024c8a946afe9

Architecture independent components:

    http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.6_all.deb
      Size/MD5 checksum: 431900 02b2d5ba6d4144b8f45056d30100db30

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 1061-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
May 19th, 2006 http://www.debian.org/security/faq


Package : popfile
Vulnerability : missing input sanitising
Problem-Type : local(remote)
Debian-specific: no
CVE ID : CVE-2006-0876
Debian Bug : 354464

It has been discovered that popfile, a bayesian mail classifier, can be forced into a crash through malformed character sets within email messages, which allows denial of service.

The old stable distribution (woody) does not contain popfile packages.

For the stable distribution (sarge) this problem has been fixed in version 0.22.2-2sarge1.

For the unstable distribution (sid) this problem has been fixed in version 0.22.4-1.

We recommend that you upgrade your popfile package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/p/popfile/popfile_0.22.2-2sarge1.dsc
      Size/MD5 checksum: 589 3e810260fb4c4527a1b2b4ed2cb60550
    http://security.debian.org/pool/updates/main/p/popfile/popfile_0.22.2-2sarge1.diff.gz
      Size/MD5 checksum: 13892 412e873bf3ed0031ac6f0d728f428188
    http://security.debian.org/pool/updates/main/p/popfile/popfile_0.22.2.orig.tar.gz
      Size/MD5 checksum: 1494830 05538821f28c3f57d514460effc034ef

Architecture independent components:

    http://security.debian.org/pool/updates/main/p/popfile/popfile_0.22.2-2sarge1_all.deb
      Size/MD5 checksum: 1481360 85f5e08bff66c1830c1d6bd35f34c89b

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 1062-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
May 19th, 2006 http://www.debian.org/security/faq


Package : kphone
Vulnerability : insecure file creation
Problem-Type : local
Debian-specific: no
CVE ID : CVE-2006-2442
Debian Bug : 337830

Sven Dreyer discovered that KPhone, a Voice over IP client for KDE, creates a configuration file world-readable, which could leak sensitive information like SIP passwords.

The the old stable distribution (woody) doesn't contain kphone packages.

For the stable distribution (sarge) this problem has been fixed in version 4.1.0-2sarge1.

For the unstable distribution (sid) this problem has been fixed in version 4.2-6.

We recommend that you upgrade your kphone package. If your current kphonerc has too lax permissions, you'll need to reset them manually.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1.dsc
      Size/MD5 checksum: 617 8ae2a2b2de1a1b8bec866ebdf80c19a5
    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1.diff.gz
      Size/MD5 checksum: 5549 f1eaf0a90d21add053ccf55224d92dad
    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0.orig.tar.gz
      Size/MD5 checksum: 278918 d226b44d34e99887e3169ddd52a4684d

Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_alpha.deb
      Size/MD5 checksum: 508416 791a3100d4afc06824cf3ccf14c53408

AMD64 architecture:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_amd64.deb
      Size/MD5 checksum: 392966 861d930b1cd2b6f48d5c6812b7f13d9b

ARM architecture:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_arm.deb
      Size/MD5 checksum: 471016 039242b5a961a3ee1c7ec9ebb9b95da3

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_i386.deb
      Size/MD5 checksum: 381318 d0203159c05f9e69d0df7f686b56b83a

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_ia64.deb
      Size/MD5 checksum: 629790 48d03ebfa1d9b37e4ec179a6ebec30bc

HP Precision architecture:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_hppa.deb
      Size/MD5 checksum: 581040 076f0b97e587664cecc86f47286d0fc1

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_m68k.deb
      Size/MD5 checksum: 429470 c89a81b425acb793bca20349f7f02bd7

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_mips.deb
      Size/MD5 checksum: 412354 8e1ca8d30e7b805d003d1b2fe7b2ddfe

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_mipsel.deb
      Size/MD5 checksum: 411060 f8ee56ae8a66d7b28a48de2ad7763f2f

PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_powerpc.deb
      Size/MD5 checksum: 414244 e238049a1b5bb4035024460f77df4145

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_s390.deb
      Size/MD5 checksum: 352368 83baf45d1c86eb13e9e178a95c20128d

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_sparc.deb
      Size/MD5 checksum: 402408 de3a4a8af85d5b76d3fe4672cea34efa

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 1063-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
May 8th, 2006 http://www.debian.org/security/faq


Package : phpgroupware
Vulnerability : missing input sanitising
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2005-2781
Debian Bug : 340094

It was discovered that the Avatar upload feature of FUD Forum, a component of the web based groupware system phpgroupware, does not sufficiently validate uploaded files, which might lead to the execution of injected web script code.

For the old stable distribution (woody) this problem has been fixed in version 0.9.14-0.RC3.2.woody6.

For the stable distribution (sarge) this problem has been fixed in version 0.9.16.005-3.sarge5.

For the unstable distribution (sid) this problem has been fixed in version 0.9.16.009-1.

We recommend that you upgrade your XXXXXXXXXXXXXX package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.14-0.RC3.2.woody6.dsc
      Size/MD5 checksum: 1650 a8b4043505ade9c7a892de2e20b4bafc
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.14-0.RC3.2.woody6.diff.gz
      Size/MD5 checksum: 451095 1f7bc2394a54e08b7f82dd690cc4ed21
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.14.orig.tar.gz
      Size/MD5 checksum: 8356188 22e715d0884d09aa848d694701a85b6b

Architecture independent components:

    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-addressbook_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 81862 c83e9f68579859233adb176f8ac697a9
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-admin_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 144016 baaa556e24d3149fc83d9a272e8e3961
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-api-doc_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 283966 f18bcc2a0583743389f9475603352125
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-api_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 2119202 3367647a848bff937e1a4a04f3767641
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-bookkeeping_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 42312 c865ae750a2bc4da1be3f551920484f6
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-bookmarks_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 119318 af55f928a97ef990e1c6e354cfc28e01
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-brewer_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 63534 50b23905605d7131e94c7ad2349c1998
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-calendar_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 228288 ce5ac5c015d54d668d4be55fc783e91c
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-chat_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 19962 4149327bd8be5a28c490127a76d7ad4e
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-chora_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 61118 0eec344f5b3030810a55785985aada1f
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-comic_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 328194 29a36cde3d2a100bd355c2262757d429
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-core-doc_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 91356 3179e28ad0944b073a9556a9700a6d0f
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-core_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 19716 59489a7babcca3d9a65a53b7e486dace
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-developer-tools_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 42144 c56b7fcd24f0a75243dfd78092788e1f
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-dj_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 46616 ba2190be42e7ca3fdaa19534cae41c07
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-eldaptir_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 51530 03bb01bd9783b455ab1e258fdf51a850
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-email_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 321562 a5f661a20c8f71ef3f960c6b275791a5
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-filemanager_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 38424 8da10b1cea7ab4b26b0e7319809ca2a6
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-forum_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 49492 27dbafd16f64ca2b6cafce8a9e31a012
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-ftp_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 40582 a694f888dd1c9faf277ff3dac6779391
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-headlines_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 60080 33f9f53fbf69922ceccfb934147c5536
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-hr_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 24282 bbc8338af95bb3dfe5ed5f245e7e2361
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-img_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 39490 e499d726cb8fd44687ec60d5c9aba018
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-infolog_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 94906 9deea6e659fe8f2ad5b0cfb8845c1140
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-inv_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 94638 996a46ec1031c2c7d4f8b25a5711f898
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-manual_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 88020 43c918d2491116d3ed5d1afac35e3b8d
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-messenger_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 30352 8b3e2fdc1611420f0a4b36f9a629e1e1
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-napster_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 26128 d429474ab6f1f62ccbebe7d6bf69b84f
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-news-admin_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 31958 d88a64deced5224ef510337c8fb2b37c
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-nntp_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 43152 36471891daedb198174670cc45e9e17b
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-notes_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 28012 68f892fff5c0bc650b6d06219c5071b1
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-phonelog_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 22244 35c169e88342d64ab6781160a901ece3
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-phpsysinfo_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 36306 fa861bb756acc40636ea706ece0c92d1
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-phpwebhosting_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 62812 995809a1b7149fedb3d578b15d62be76
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-polls_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 30082 98dd710444d52714d96f8aa89d24b1cd
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-preferences_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 46600 43a1a95d47485d078515fec1aed5d3fb
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-projects_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 91878 cc03405f78d2b929973d5ef914504c90
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-registration_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 36120 2b2b7ed023cc258f32ea1cd0e699f913
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-setup_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 279126 73265213a9f60f3267b46968b42f8df6
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-skel_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 31564 564f37d66805e04a26a6ce3154e50bbf
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-soap_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 23252 e3be2988fa1890c7580b3cd7f21e3533
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-stocks_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 27340 c310f90223fa6bbced6537ae92f46c51
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-todo_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 44404 98fb8fc7f8bfee0717fe8ee475a63b78
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-tts_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 47478 99adaaf6b131f282c38f0f6711754c2a
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-wap_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 28128 68691199be7926d49f68b298ecd24350
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-weather_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 490608 496e73830ca02ef1cc83fb3dfe8e0864
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-xmlrpc_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 75408 e8c14fc499ea27338e36089848a254f6
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.14-0.RC3.2.woody6_all.deb
      Size/MD5 checksum: 26124 281f88a4cde750eee219505221900e2e

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.16.005-3.sarge5.dsc
      Size/MD5 checksum: 1615 d6ff7ee4f27c1e71f8c24714259c92f0
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.16.005-3.sarge5.diff.gz
      Size/MD5 checksum: 37120 646f51af59284af7a56dfb2034b975a4
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.16.005.orig.tar.gz
      Size/MD5 checksum: 19442629 5edd5518e8f77174c12844f9cfad6ac4

Architecture independent components:

    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-addressbook_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 177350 059a4f9088e5a73a398709c4cd1e9ae5
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-admin_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 186820 74627f648e024d301b0ec28334f30cba
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-bookmarks_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 102450 8852560a5d2d32c2295a00d7e337b171
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-calendar_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 323468 a3f5952793046329c17449929b9e27f0
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-chat_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 23404 671e9521ae7dd2eafb6310a9b3698726
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-comic_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 434428 ec345b6fea4caedf74114303c932c18a
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-core_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 6734 b5383388f8cc10905e580e61445b74ba
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-developer-tools_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 33700 e750df7f3d5378f7eb6e676fc6ac89a7
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-dj_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 43818 5b99542b96311a6566fa3d4f0c4e53ad
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-eldaptir_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 51138 9f35d918c797e7fa13e5a28332c6c8bb
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-email_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 1118766 024023c08417e65a93f4fa20f7218371
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-etemplate_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 1328590 8e0e87d0ff306fb2e98ca082ff19959d
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-felamimail_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 180404 ecba72e7f8d958e601a6cbeaf331c8d5
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-filemanager_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 92834 7cbd5e350e05459c28455ea848f1b55e
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-folders_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 168034 3b7c560361c6e09fdc82aeafd94f3d93
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-forum_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 45968 b9950d52d1cd59275a8b517786c66ef9
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-ftp_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 36764 4cb2c03804b12f0318c014410ba67d37
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-fudforum_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 1353484 b6776109aa02a77a302d42d2b1ff6d64
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-headlines_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 63788 cbf7dca72a19a8117d3da9b6748635d6
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-hr_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 19012 66ac8b34ac3e959d5aa968a4022fad47
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-img_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 8818 bd7c9bbcbc6ca7bba18f687738dd0c41
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-infolog_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 138000 a0ec85e1855b045975924ff77cded820
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-manual_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 90610 e4a798fda79fec686e95be27626780c3
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-messenger_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 26204 54855b055ff79692182c16f2546ce329
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-news-admin_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 41888 44a37e4636e20add04e1f90442e361ae
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-nntp_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 48100 e81ae8bcb802d62640c5d13402ac21be
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-notes_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 35160 89464f64577aa51614e92d3a2223d07c
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-phonelog_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 20854 310cd0434e142ae17f5d63e37ab019a8
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-phpbrain_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 40954 9895ddf81d2f9ff3031f7b6dcf911776
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-phpgwapi_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 9681698 c8c2dcb50f04c90b90a2808f9525c295
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-phpsysinfo_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 116874 e9fcfb252f6b2cc5eabe060671341f2c
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-polls_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 31746 d9c9e86eb7b2b02c1326656fe19b9c6d
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-preferences_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 60204 ae5476756abb23558836d5eaea8e75ea
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-projects_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 121300 2c14c91d5ac606a6f3253c4272521bf4
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-qmailldap_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 23672 301559d88df74fbe8ce20044a10b0f31
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-registration_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 30406 de9bcb93731c4e31f67cbb49c9cfcb06
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-setup_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 269572 32fd6d497b2cc55e0888e2077e8d7553
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-sitemgr_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 903156 874cf242e0b305ab8aacb8f0b39407df
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-skel_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 19280 73547d5f8ebdb7385858be732e626af2
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-soap_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 24210 9fdeec524b9799028cd7fd578c381cf3
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-stocks_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 22160 a57c2163515d871fdc10fafffbf3b4b0
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-todo_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 51368 55a81bf8b3a735ff1983921559b3ee8d
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-tts_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 56656 bfadbbfc98e5e17379fdb6ccc4579bfd
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-wiki_0.9.16.005-3.sarge5_all.deb
      Size/MD5 checksum: 70024 653b3c506ef70a1e4c5be3963bce0464