dcsimg
Linux Today: Linux News On Internet Time.




More on LinuxToday


Advisories, August 1, 2006

Aug 02, 2006, 03:45 (0 Talkback[s])

Debian GNU/Linux


Debian Security Advisory DSA 1130-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
July 30th, 2006 http://www.debian.org/security/faq


Package : sitebar
Vulnerability : missing input validation
Problem type : remote
Debian-specific: no
CVE ID : CVE-2006-3320
BugTraq ID : 18680
Debian Bug : 377299

A a cross-site scripting vulnerability has been discovered in sitebar, a web based bookmark manager written in PHP, which allows remote attackers to inject arbitrary web script or HTML.

For the stable distribution (sarge) this problem has been fixed in version 3.2.6-7.1.

For the unstable distribution (sid) this problem has been fixed in version 3.3.8-1.1.

We recommend that you upgrade your sitebar package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/s/sitebar/sitebar_3.2.6-7.1.dsc
      Size/MD5 checksum: 567 af6299567258255742c9289ead8618e4
    http://security.debian.org/pool/updates/main/s/sitebar/sitebar_3.2.6-7.1.diff.gz
      Size/MD5 checksum: 9214 2309667ac14ea821c7a1ba14b8a59916
    http://security.debian.org/pool/updates/main/s/sitebar/sitebar_3.2.6.orig.tar.gz
      Size/MD5 checksum: 333352 a86243f7a70a1a9ac80342fbcca14297

Architecture independent components:

    http://security.debian.org/pool/updates/main/s/sitebar/sitebar_3.2.6-7.1_all.deb
      Size/MD5 checksum: 339760 98d388ce2b2c8d746d333f6286e22c0b

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 1131-1 security@debian.org
http://www.debian.org/security/ Steve Kemp
Aug 1st, 2006 http://www.debian.org/security/faq


Package : apache
Vulnerability : buffer overflow
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2006-3747
CERT advisory : VU#395412
Debian Bug : 380231

Mark Dowd discovered a buffer overflow in the mod_rewrite component of apache, a versatile high-performance HTTP server. In some situations a remote attacker could exploit this to execute arbitary code.

For the stable distribution (sarge) this problem has been fixed in version 1.3.33-6sarge2.

For the unstable distribution (sid) this problems will be fixed shortly.

We recommend that you upgrade your apache package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2.dsc
      Size/MD5 checksum: 1119 8188c2fe660d475970139af295b07b86
    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2.diff.gz
      Size/MD5 checksum: 372930 40c5ca3d91d1307a191915459bc94237
    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33.orig.tar.gz
      Size/MD5 checksum: 3105683 1a34f13302878a8713a2ac760d9b6da8

Architecture independent components:

    http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.33-6sarge2_all.deb
      Size/MD5 checksum: 334562 a6a506713c09c27143feffe738aed3f9
    http://security.debian.org/pool/updates/main/a/apache/apache-doc_1.3.33-6sarge2_all.deb
      Size/MD5 checksum: 1332888 f24fa9421e8dc9acec2467b58468f2dd
    http://security.debian.org/pool/updates/main/a/apache/apache-utils_1.3.33-6sarge2_all.deb
      Size/MD5 checksum: 212626 b9a5198ee442212cdd248be8827400a1

Alpha architecture:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2_alpha.deb
      Size/MD5 checksum: 428152 a58caae837e1025d97cf44bf8fb23f0f
    http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge2_alpha.deb
      Size/MD5 checksum: 904242 ce2a0e4b97c1926dafdf31e589883995
    http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge2_alpha.deb
      Size/MD5 checksum: 9223072 182f1789104e294f72fede75dc13b875
    http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge2_alpha.deb
      Size/MD5 checksum: 569406 185346b21b2adbc248a06f689f094b97
    http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge2_alpha.deb
      Size/MD5 checksum: 542576 dfe389cdb48d38ee2a27a3a622a6c6e0
    http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge2_alpha.deb
      Size/MD5 checksum: 505050 36759af8debeceeebdd083a337e590cb

AMD64 architecture:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2_amd64.deb
      Size/MD5 checksum: 401466 6d45b8e9a23382f6b2eadc28af28e4a4
    http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge2_amd64.deb
      Size/MD5 checksum: 876652 7474a08ccd74235787761b8e1ffe8c0e
    http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge2_amd64.deb
      Size/MD5 checksum: 9162572 b55d8df232edbd900372fe339a065fd1
    http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge2_amd64.deb
      Size/MD5 checksum: 524410 41142b30d22c99476977c339cf071504
    http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge2_amd64.deb
      Size/MD5 checksum: 513708 5377d3aa2ad92e07db2654d3fd3761d1
    http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge2_amd64.deb
      Size/MD5 checksum: 492544 2d15619f2db2d39d6abdaf25574fbf4c

ARM architecture:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2_arm.deb
      Size/MD5 checksum: 384260 7785f5fa4d814bd1a1ec946fe007ec53
    http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge2_arm.deb
      Size/MD5 checksum: 841372 83ed59ba296d64b5b6731c3a57902810
    http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge2_arm.deb
      Size/MD5 checksum: 8985914 50fc722807a399105950b15e5eaba3b3
    http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge2_arm.deb
      Size/MD5 checksum: 495910 f7d7a9218c3bdabbf0982b3ec563bca6
    http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge2_arm.deb
      Size/MD5 checksum: 489556 7645d9195f00f4bf0c655eefaf971dff
    http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge2_arm.deb
      Size/MD5 checksum: 479280 e689e83904766cf209049c39fe3ee2d1

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2_i386.deb
      Size/MD5 checksum: 386664 0f0192626abd5a456bf7b6d43f9f1708
    http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge2_i386.deb
      Size/MD5 checksum: 860158 60891f21e526885833f7f7fcf43c92e4
    http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge2_i386.deb
      Size/MD5 checksum: 9124844 9d2e020813d5298c3f4d62dcd8ec6aaa
    http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge2_i386.deb
      Size/MD5 checksum: 504860 a084ffd32a38948db9dd0692ead50eeb
    http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge2_i386.deb
      Size/MD5 checksum: 493690 c442e0c156f98044c20a665d989aeca0
    http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge2_i386.deb
      Size/MD5 checksum: 486804 3862e6781f044fc2c4ae24170f47fe6f

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2_ia64.deb
      Size/MD5 checksum: 463372 13eb11e0de167d54b6606605ae1ff0f6
    http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge2_ia64.deb
      Size/MD5 checksum: 971834 2be725f2e6b84c10c512a0d804480e33
    http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge2_ia64.deb
      Size/MD5 checksum: 9355772 3b5d28d3d2531719d46c23920dd3e94c
    http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge2_ia64.deb
      Size/MD5 checksum: 627356 247a7da511dae2d5e698f2b424fe24c5
    http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge2_ia64.deb
      Size/MD5 checksum: 585922 aa5d4b2f9bcefe026da9168170e0c819
    http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge2_ia64.deb
      Size/MD5 checksum: 532826 9b9c3b43b6e85e92dd2c064871f7d9f3

HP Precision architecture:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2_hppa.deb
      Size/MD5 checksum: 406614 50c84b8682cd3b8af4e0eceaf7fd505a
    http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge2_hppa.deb
      Size/MD5 checksum: 905560 b02464bd2a9c5ca732e0c4f9208baee0
    http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge2_hppa.deb
      Size/MD5 checksum: 9100908 4516c9ad78527b3cb2be9daef76e9566
    http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge2_hppa.deb
      Size/MD5 checksum: 536024 e8ab5a278d1424ef9d68c155ae3a7ab8
    http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge2_hppa.deb
      Size/MD5 checksum: 518824 c6befb0053d4ed7daa9e9f3d1538bbb6
    http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge2_hppa.deb
      Size/MD5 checksum: 508750 6beec32a45b93df126f4973619c6076a

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2_m68k.deb
      Size/MD5 checksum: 371072 d4f978e09502b619b7933e23290eaf5e
    http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge2_m68k.deb
      Size/MD5 checksum: 847234 8ca3d2d72183081217ae742327dd49f7
    http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge2_m68k.deb
      Size/MD5 checksum: 8973668 e6614fd4445efa2a29002d5f02d0b7c5
    http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge2_m68k.deb
      Size/MD5 checksum: 448692 e2024a331a75dabd3ff86927a1883cbc
    http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge2_m68k.deb
      Size/MD5 checksum: 477360 43f62ac274ccd93160d1db6d3110ebe6
    http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge2_m68k.deb
      Size/MD5 checksum: 489432 df5d49e0e858809966e4395cdfcab073

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2_mips.deb
      Size/MD5 checksum: 403276 4ff63b289978627f3db22de263e158ef
    http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge2_mips.deb
      Size/MD5 checksum: 851592 3e0d11bf481c1378ff776062dc2eed70
    http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge2_mips.deb
      Size/MD5 checksum: 9048564 aa4a667fdc83d41e739b69c949967929
    http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge2_mips.deb
      Size/MD5 checksum: 485152 0672cc250050d8e0e571ced7cb4420a0
    http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge2_mips.deb
      Size/MD5 checksum: 509872 09572aa1dd63bd7b1bff9b61d5752358
    http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge2_mips.deb
      Size/MD5 checksum: 443532 6efd073b42b13599960f29ff9263892a

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2_mipsel.deb
      Size/MD5 checksum: 403652 6906feb21ddb7af2a5ec9d4c2ccd874c
    http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge2_mipsel.deb
      Size/MD5 checksum: 849942 5786e24b7849df4eea36f3d3da80a82a
    http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge2_mipsel.deb
      Size/MD5 checksum: 9054052 f0d853c8399534429fcd2a3463016ef1
    http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge2_mipsel.deb
      Size/MD5 checksum: 485376 9001e3d37ac660635946eb066e50ec78
    http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge2_mipsel.deb
      Size/MD5 checksum: 510664 398e615c936d6e72bb443ce3550e57e2
    http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge2_mipsel.deb
      Size/MD5 checksum: 443422 e3a6f0ca68df1d8e8f26eef8f23b2822

PowerPC architecture:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2_powerpc.deb
      Size/MD5 checksum: 398666 29de2415f45cd033d04c28be500664ee
    http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge2_powerpc.deb
      Size/MD5 checksum: 921400 c36acb601638cb0a9961a2f5d95fcb28
    http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge2_powerpc.deb
      Size/MD5 checksum: 9252458 aa5f5cdc62365a6951cb6a67e005dc34
    http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge2_powerpc.deb
      Size/MD5 checksum: 515350 0d654fea1e92be4c2bb1375b6a51c060
    http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge2_powerpc.deb
      Size/MD5 checksum: 510372 15269ec946e59741172a69c8e7ea7557
    http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge2_powerpc.deb
      Size/MD5 checksum: 490708 2b1e1ae12a9cb2e8f59b6b8b219d7f9e

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2_s390.deb
      Size/MD5 checksum: 403204 73201862887af010def1edf24d22594d
    http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge2_s390.deb
      Size/MD5 checksum: 868450 b84df926a3235d152d8f7f35aa3394ae
    http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge2_s390.deb
      Size/MD5 checksum: 9183050 1cf5c335b2cf863898c0c84e4e150776
    http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge2_s390.deb
      Size/MD5 checksum: 490090 b361f3cf52b919b5e92d96f92a77270a
    http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge2_s390.deb
      Size/MD5 checksum: 514442 d3374e5f0d5cb468409795a1a7c9b8b3
    http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge2_s390.deb
      Size/MD5 checksum: 460466 bf56d745cf3b78e3ade0204a718417c6

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge2_sparc.deb
      Size/MD5 checksum: 385534 020faf78c7c61702c94d10eb03a07e37
    http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge2_sparc.deb
      Size/MD5 checksum: 849304 2cffd052a21ba9306ebadf4af2f6b734
    http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge2_sparc.deb
      Size/MD5 checksum: 9046234 f32d81e7736df5b65bf9912506b03466
    http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge2_sparc.deb
      Size/MD5 checksum: 504168 e3a5510199db8f05f5a6f3028b82ef11
    http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge2_sparc.deb
      Size/MD5 checksum: 491970 4f9732af9bcf8e6ecc54cb24f65b7d0b
    http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge2_sparc.deb
      Size/MD5 checksum: 490256 9c6e61c66d2f8641680f6f7dfe7316fe

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 1132-1 security@debian.org
http://www.debian.org/security/ Steve Kemp
Aug 1st, 2005 http://www.debian.org/security/faq


Package : apache2
Vulnerability : buffer overflow
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2006-3747
CERT advisory : VU#395412
Debian Bug : 380182

Mark Dowd discovered a buffer overflow in the mod_rewrite component of apache, a versatile high-performance HTTP server. In some situations a remote attacker could exploit this to execute arbitary code.

For the stable distribution (sarge) this problem has been fixed in version 2.0.54-5sarge1.

For the unstable distribution (sid) this problem will be fixed shortly.

We recommend that you upgrade your apache2 package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/a/apache2/apache2_2.0.54-5sarge1.dsc
      Size/MD5 checksum: 1153 4b2aeab1c5578a6879c1d036487c75a2
    http://security.debian.org/pool/updates/main/a/apache2/apache2_2.0.54-5sarge1.diff.gz
      Size/MD5 checksum: 110080 57c824fbbbae3fa68d504797fa8e6341
    http://security.debian.org/pool/updates/main/a/apache2/apache2_2.0.54.orig.tar.gz
      Size/MD5 checksum: 7493636 37d0d0a3e25ad93d37f0483021e70409

Architecture independent components:

    http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.0.54-5sarge1_all.deb
      Size/MD5 checksum: 3891046 f860e8207364bbbf05cfd81fa281508e
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-threadpool_2.0.54-5sarge1_all.deb
      Size/MD5 checksum: 33564 7d974c7e0f38c6e31017e712f15214fd

Alpha architecture:

    http://security.debian.org/pool/updates/main/a/apache2/apache2_2.0.54-5sarge1_alpha.deb
      Size/MD5 checksum: 33488 f36f397f92e8946d342d8b939a8e1f41
    http://security.debian.org/pool/updates/main/a/apache2/apache2-common_2.0.54-5sarge1_alpha.deb
      Size/MD5 checksum: 865320 82e919111eccc60ed021aa196cc3cb00
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.0.54-5sarge1_alpha.deb
      Size/MD5 checksum: 246374 e6d9e455161bad25b178992b109c9375
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.0.54-5sarge1_alpha.deb
      Size/MD5 checksum: 241488 80524503bc76924132c26df38c61e5ad
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.0.54-5sarge1_alpha.deb
      Size/MD5 checksum: 245676 91eab40f8da34595f1a96c1b3c2254a3
    http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.0.54-5sarge1_alpha.deb
      Size/MD5 checksum: 167694 81b924d7aca297e86e600a3439d31d4a
    http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.0.54-5sarge1_alpha.deb
      Size/MD5 checksum: 168422 fa3bf3865b48d5a8324a6e6135ffaab1
    http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.0.54-5sarge1_alpha.deb
      Size/MD5 checksum: 97552 67c989219009488916ba16f399fa33fb
    http://security.debian.org/pool/updates/main/a/apache2/libapr0_2.0.54-5sarge1_alpha.deb
      Size/MD5 checksum: 155792 ff3355874d8b7fa7c6ad1c55f8eabb8c
    http://security.debian.org/pool/updates/main/a/apache2/libapr0-dev_2.0.54-5sarge1_alpha.deb
      Size/MD5 checksum: 315260 ed3c2bc91b3be333c535aae01959f5f0

AMD64 architecture:

    http://security.debian.org/pool/updates/main/a/apache2/apache2_2.0.54-5sarge1_amd64.deb
      Size/MD5 checksum: 33482 431da06ae2973e4ab7e6195652b4f8b6
    http://security.debian.org/pool/updates/main/a/apache2/apache2-common_2.0.54-5sarge1_amd64.deb
      Size/MD5 checksum: 826686 3e2d13f95a82053ec6afa782ae62ffec
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.0.54-5sarge1_amd64.deb
      Size/MD5 checksum: 221350 7f3384834425befc9437ff16795fe827
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.0.54-5sarge1_amd64.deb
      Size/MD5 checksum: 216820 76034c08d148bf01b7eb72f5156fe2bc
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.0.54-5sarge1_amd64.deb
      Size/MD5 checksum: 220588 382bd5f3a47262c68c72566ae45aa005
    http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.0.54-5sarge1_amd64.deb
      Size/MD5 checksum: 167698 fb700ccba617ede30505a1a75f1528c1
    http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.0.54-5sarge1_amd64.deb
      Size/MD5 checksum: 168438 d0dd58b34bf5bb543f2bf9971bc30f17
    http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.0.54-5sarge1_amd64.deb
      Size/MD5 checksum: 92732 db6b4a3d3d2fa90a193c5d799b27161c
    http://security.debian.org/pool/updates/main/a/apache2/libapr0_2.0.54-5sarge1_amd64.deb
      Size/MD5 checksum: 137334 5318191c95c001866e475a9f8218a0d0
    http://security.debian.org/pool/updates/main/a/apache2/libapr0-dev_2.0.54-5sarge1_amd64.deb
      Size/MD5 checksum: 278836 fd2955649002a6d3c4b6de7c9f18c794

ARM architecture:

    http://security.debian.org/pool/updates/main/a/apache2/apache2_2.0.54-5sarge1_arm.deb
      Size/MD5 checksum: 33490 1584e54d81dbfc1d45f6208ad268903d
    http://security.debian.org/pool/updates/main/a/apache2/apache2-common_2.0.54-5sarge1_arm.deb
      Size/MD5 checksum: 793694 233ea0fad9d5531cdc20182474c583fc
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.0.54-5sarge1_arm.deb
      Size/MD5 checksum: 202316 8916fa2da9d7740f4b1ac22f498bd47d
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.0.54-5sarge1_arm.deb
      Size/MD5 checksum: 197954 bbaefcea762f1600f0ba330d79d63b5e
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.0.54-5sarge1_arm.deb
      Size/MD5 checksum: 201344 c494ebb8a6662ebb777f9f615ea50579
    http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.0.54-5sarge1_arm.deb
      Size/MD5 checksum: 167706 ac66b709dbf32ea62406dd9131727f4b
    http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.0.54-5sarge1_arm.deb
      Size/MD5 checksum: 168440 bbb3c010fb98d9bc96da846cb57c1c80
    http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.0.54-5sarge1_arm.deb
      Size/MD5 checksum: 92652 92ac8c180bd95c8fcb4fbcc173fd93f9
    http://security.debian.org/pool/updates/main/a/apache2/libapr0_2.0.54-5sarge1_arm.deb
      Size/MD5 checksum: 122384 4802054d8d5b2f25d5b4ed32f2bbcad2
    http://security.debian.org/pool/updates/main/a/apache2/libapr0-dev_2.0.54-5sarge1_arm.deb
      Size/MD5 checksum: 267920 02f1b191a308bdb9c4c9955a9a5170ea

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/a/apache2/apache2_2.0.54-5sarge1_i386.deb
      Size/MD5 checksum: 33486 7234f5717dbcbb800e90949d63cc1ddc
    http://security.debian.org/pool/updates/main/a/apache2/apache2-common_2.0.54-5sarge1_i386.deb
      Size/MD5 checksum: 812294 87b7c53659af00252c76484d030b76dd
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.0.54-5sarge1_i386.deb
      Size/MD5 checksum: 206644 f27a272c1e7c8a64fe3099e81879afe5
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.0.54-5sarge1_i386.deb
      Size/MD5 checksum: 202834 e9c259b62700c20aa0a123aac7ef8468
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.0.54-5sarge1_i386.deb
      Size/MD5 checksum: 206402 0b12002711a684dee34a6f158c08b008
    http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.0.54-5sarge1_i386.deb
      Size/MD5 checksum: 168868 9905d2bd31aaf49cb4c522a7130fc53e
    http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.0.54-5sarge1_i386.deb
      Size/MD5 checksum: 169670 6bdf51222903fb1af0a1950e8f02e7e6
    http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.0.54-5sarge1_i386.deb
      Size/MD5 checksum: 90916 15031d3164bf986a7d321d67f6f872f7
    http://security.debian.org/pool/updates/main/a/apache2/libapr0_2.0.54-5sarge1_i386.deb
      Size/MD5 checksum: 130372 f3aa36ce42aca7c552630338b70c4147
    http://security.debian.org/pool/updates/main/a/apache2/libapr0-dev_2.0.54-5sarge1_i386.deb
      Size/MD5 checksum: 260374 ffbe645e8c6762205148f7aa8656a3c7

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/a/apache2/apache2_2.0.54-5sarge1_ia64.deb
      Size/MD5 checksum: 33486 0cd1947abffb3793f6c0dc7690632573
    http://security.debian.org/pool/updates/main/a/apache2/apache2-common_2.0.54-5sarge1_ia64.deb
      Size/MD5 checksum: 973648 7522385d947774e00a2b0f9c8586cc11
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.0.54-5sarge1_ia64.deb
      Size/MD5 checksum: 289276 bace1a0298d9336892bedbdc708f35ec
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.0.54-5sarge1_ia64.deb
      Size/MD5 checksum: 281296 6495947c25e20f5459d44980378420f7
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.0.54-5sarge1_ia64.deb
      Size/MD5 checksum: 287876 d63b895f7d31859642932ef11521120b
    http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.0.54-5sarge1_ia64.deb
      Size/MD5 checksum: 167676 ae253a0de588b5f3c75cd0139c23b94e
    http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.0.54-5sarge1_ia64.deb
      Size/MD5 checksum: 168418 b9a670874ff49ad8016ce34f65db75ca
    http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.0.54-5sarge1_ia64.deb
      Size/MD5 checksum: 106404 02c8d485338f0f86e61769bedfd1195e
    http://security.debian.org/pool/updates/main/a/apache2/libapr0_2.0.54-5sarge1_ia64.deb
      Size/MD5 checksum: 177836 5f1d653818331006ad992b9f29fec1c3
    http://security.debian.org/pool/updates/main/a/apache2/libapr0-dev_2.0.54-5sarge1_ia64.deb
      Size/MD5 checksum: 328478 565500d14485fdfc229d31094477d79d

HP Precision architecture:

    http://security.debian.org/pool/updates/main/a/apache2/apache2_2.0.54-5sarge1_hppa.deb
      Size/MD5 checksum: 33488 c097912333905a2634218aca2f925af4
    http://security.debian.org/pool/updates/main/a/apache2/apache2-common_2.0.54-5sarge1_hppa.deb
      Size/MD5 checksum: 880192 bbf9181e42bf15946ea823bd4c60187a
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.0.54-5sarge1_hppa.deb
      Size/MD5 checksum: 228778 3f678491b1a4cdf7087ba3f7b579d2e4
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.0.54-5sarge1_hppa.deb
      Size/MD5 checksum: 222784 53c3247eb337389bf5610ffdc12101aa
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.0.54-5sarge1_hppa.deb
      Size/MD5 checksum: 227604 a55def8a3be473430a5add57f74a9e3e
    http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.0.54-5sarge1_hppa.deb
      Size/MD5 checksum: 167694 d986e8cc3ad0512e9e37d9d22209df6a
    http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.0.54-5sarge1_hppa.deb
      Size/MD5 checksum: 168436 77ed5eaaad9378052171f6317ba7f3b0
    http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.0.54-5sarge1_hppa.deb
      Size/MD5 checksum: 98822 048922c9ca8664f57b80c2f45f401d7f
    http://security.debian.org/pool/updates/main/a/apache2/libapr0_2.0.54-5sarge1_hppa.deb
      Size/MD5 checksum: 144996 20192edf00b0449ef13a9c104750c1fb
    http://security.debian.org/pool/updates/main/a/apache2/libapr0-dev_2.0.54-5sarge1_hppa.deb
      Size/MD5 checksum: 285012 86cf97e94f01f18e3c2263d94eb3f4f2

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/a/apache2/apache2_2.0.54-5sarge1_m68k.deb
      Size/MD5 checksum: 33496 7ed8701d7c988c636a45eb66ea558b11
    http://security.debian.org/pool/updates/main/a/apache2/apache2-common_2.0.54-5sarge1_m68k.deb
      Size/MD5 checksum: 783354 bbd0d75542a89db2b9af3fda0801251b
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.0.54-5sarge1_m68k.deb
      Size/MD5 checksum: 188908 1798d4afe93c070b947be8d80097a3a5
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.0.54-5sarge1_m68k.deb
      Size/MD5 checksum: 185514 1c0bf8a9a6f173753080c77af11fde0b
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.0.54-5sarge1_m68k.deb
      Size/MD5 checksum: 188314 c188c7e4ab5c0bd9af90e3cce04cb119
    http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.0.54-5sarge1_m68k.deb
      Size/MD5 checksum: 167770 7c804084f4c5104ea0e1759664bfc950
    http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.0.54-5sarge1_m68k.deb
      Size/MD5 checksum: 168494 46bb18ed1ad60faee0356fcf927a8d7e
    http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.0.54-5sarge1_m68k.deb
      Size/MD5 checksum: 88058 4dd93405f96d8a1504403b5e807ed11d
    http://security.debian.org/pool/updates/main/a/apache2/libapr0_2.0.54-5sarge1_m68k.deb
      Size/MD5 checksum: 117584 c02517bf4a19a576ceb5eb53788b8ddb
    http://security.debian.org/pool/updates/main/a/apache2/libapr0-dev_2.0.54-5sarge1_m68k.deb
      Size/MD5 checksum: 250068 f9858a08d86d3c5da03ce9ab5742c807

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/a/apache2/apache2_2.0.54-5sarge1_mips.deb
      Size/MD5 checksum: 33492 99198a05154084edcf0a023b4178c174
    http://security.debian.org/pool/updates/main/a/apache2/apache2-common_2.0.54-5sarge1_mips.deb
      Size/MD5 checksum: 807540 b5be0b94c36ef91ad37f8e97ee38da6b
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.0.54-5sarge1_mips.deb
      Size/MD5 checksum: 217966 40962c3bb0de39504e18a3e4d17960d4
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.0.54-5sarge1_mips.deb
      Size/MD5 checksum: 213184 17b42ce494efe8d695083b65c18bd04f
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.0.54-5sarge1_mips.deb
      Size/MD5 checksum: 217340 af8e8d55645e3f8515838cc6a4d0b96a
    http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.0.54-5sarge1_mips.deb
      Size/MD5 checksum: 167712 62bcc19fbe039422058de75fac9ef8a2
    http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.0.54-5sarge1_mips.deb
      Size/MD5 checksum: 168456 97347f55c5ca750159492a5e9fef0f05
    http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.0.54-5sarge1_mips.deb
      Size/MD5 checksum: 103016 7dfdbeb967d4db76535e326fe3bbe831
    http://security.debian.org/pool/updates/main/a/apache2/libapr0_2.0.54-5sarge1_mips.deb
      Size/MD5 checksum: 134456 fefc232dee0333abe758f480922e485a
    http://security.debian.org/pool/updates/main/a/apache2/libapr0-dev_2.0.54-5sarge1_mips.deb
      Size/MD5 checksum: 286508 e450f3a5c862321728f126fd27e67da8

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/a/apache2/apache2_2.0.54-5sarge1_mipsel.deb
      Size/MD5 checksum: 33492 a0beae9521a8681328ed01833936c7e6
    http://security.debian.org/pool/updates/main/a/apache2/apache2-common_2.0.54-5sarge1_mipsel.deb
      Size/MD5 checksum: 807356 efa828902d16f408dc2fb75344a02484
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.0.54-5sarge1_mipsel.deb
      Size/MD5 checksum: 217238 f61a494fe69366f8f0f319ec622c125d
    http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.0.54-5sarge1_mipsel.deb
      Size/MD5 checksum: 212602 1e168ac088ef73b5a9ae213eaed0e65b