---

Advisories, December 11, 2005

Debian GNU/Linux


Debian Security Advisory DSA 918-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
December 9th, 2005 http://www.debian.org/security/faq


Package : osh
Vulnerability : programming error
Problem type : local
Debian-specific: no
CVE ID : CVE-2005-3347 CVE-2005-3533
Debian Bug : 338312

Several security related problems have been discovered in osh,
the operator’s shell for executing defined programs in a privileged
environment. The Common Vulnerabilities and Exposures project
identifies the following vulnerabilities:

CVE-2005-3347

Charles Stevenson discovered a bug in the substitution of
variables that allows a local attacker to open a root shell.

CVE-2005-3533

Solar Eclipse discovered a buffer overflow caused by the current
working directory plus a filename that could be used to execute
arbitrary code and e.g. open a root shell.

For the old stable distribution (woody) these problems have been
fixed in version 1.7-11woody2.

For the stable distribution (sarge) these problems have been
fixed in version 1.7-13sarge1.

For the unstable distribution (sid) these problems have been
fixed in version 1.7-15, however, the package has been removed
entirely.

We recommend that you upgrade your osh package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2.dsc

Size/MD5 checksum: 565 6341a0b49e77066cf3645e3abfe98653

http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2.diff.gz

Size/MD5 checksum: 12578 7276b78763b4033448f2903d0cf64e96

http://security.debian.org/pool/updates/main/o/osh/osh_1.7.orig.tar.gz

Size/MD5 checksum: 150241 0196364c5ea0afab1c1d3163c40cb1a8

Alpha architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_alpha.deb

Size/MD5 checksum: 32426 c41a8e928125f048778eeaecda51c58a

ARM architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_arm.deb

Size/MD5 checksum: 27402 fa9fdba7af436e4b7a1ac1d99657e9ce

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_i386.deb

Size/MD5 checksum: 27084 47d99052863f6ac5ad44c794e399bc43

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_ia64.deb

Size/MD5 checksum: 36942 b0b3631235a76fff6841ab7a7c1ce1d6

HP Precision architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_hppa.deb

Size/MD5 checksum: 29366 7684c38b177294c6f8c647e4ad5c7ce8

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_m68k.deb

Size/MD5 checksum: 26338 cf9c3511eb73cfdf5861966130354246

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_mips.deb

Size/MD5 checksum: 29510 d443160b8e72c36d30ce3f7fa5ae6178

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_mipsel.deb

Size/MD5 checksum: 29468 745f79348790bda9accb5250a40520f1

PowerPC architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_powerpc.deb

Size/MD5 checksum: 28816 7f387b8bc51460e94c1e0ca562906e2f

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_s390.deb

Size/MD5 checksum: 28294 60e0010eb4e3fe1007e1c4c3bf082c44

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_sparc.deb

Size/MD5 checksum: 30894 60969c49d4be186b8000af6532393335

Debian GNU/Linux 3.1 alias sarge


Source archives:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1.dsc

Size/MD5 checksum: 565 71ea00a2e13ea67b337d450a77cea49a

http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1.diff.gz

Size/MD5 checksum: 12818 5df9ac8705fd85dc8ad07a74a470ba77

http://security.debian.org/pool/updates/main/o/osh/osh_1.7.orig.tar.gz

Size/MD5 checksum: 150241 0196364c5ea0afab1c1d3163c40cb1a8

Alpha architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_alpha.deb

Size/MD5 checksum: 31468 767b6efad96e1e49f584d36eb502c5cc

AMD64 architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_amd64.deb

Size/MD5 checksum: 29360 496db05c70e81a7314382389826bb2a1

ARM architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_arm.deb

Size/MD5 checksum: 27712 578e45cadbb18d9ccc137494a3d1938d

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_i386.deb

Size/MD5 checksum: 27846 3be55b13083630d6fc4fbc4892f4be99

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_ia64.deb

Size/MD5 checksum: 35320 8849f5286f65d67ccfa2a25e4007f39f

HP Precision architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_hppa.deb

Size/MD5 checksum: 29650 1fcfede379bc4ee5474602ed8decd4da

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_m68k.deb

Size/MD5 checksum: 27094 d8af0990d6017e61cb63b025f77930c6

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_mips.deb

Size/MD5 checksum: 29824 b80543697d548c0ef3cf729685db249b

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_mipsel.deb

Size/MD5 checksum: 29838 2c18ef4a3d1243fd92f0d196b7a9d8c9

PowerPC architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_powerpc.deb

Size/MD5 checksum: 30432 71a1b2e26d896852efd7e29be68f1048

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_s390.deb

Size/MD5 checksum: 29526 c20605b6cef6b680ab4deade9651cf16

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_sparc.deb

Size/MD5 checksum: 28032 ad94a0fc87d2f681ef2fcbf536269f71

These files will probably be moved into the stable distribution
on its next update.


For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Package info: `apt-cache show ‘ and http://packages.debian.org/

Mandriva Linux


Mandriva Linux Security Advisory MDKSA-2005:206-1
http://www.mandriva.com/security/


Package : openvpn
Date : December 9, 2005
Affected: 2006.0


Problem Description:

Two Denial of Service vulnerabilities exist in OpenVPN. The
first allows a malicious or compromised server to execute arbitrary
code on the client (CVE-2005-3393). The second DoS can occur if
when in TCP server mode, OpenVPN received an error on accept(2) and
the resulting exception handler causes a segfault
(CVE-2005-3409).

The updated packages have been patched to correct these
problems.

Update:

Packages are now available for Mandriva Linux 2006.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3393

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3409


Updated Packages:

Mandriva Linux 2006.0:
7804df61685a36064119b813dca83172
2006.0/RPMS/openvpn-2.0.1-2.1.20060mdk.i586.rpm
2feb66835d37f31735746824027a2ef8
2006.0/SRPMS/openvpn-2.0.1-2.1.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
9d8cd19c6723507a275649c5d070970d
x86_64/2006.0/RPMS/openvpn-2.0.1-2.1.20060mdk.x86_64.rpm
2feb66835d37f31735746824027a2ef8
x86_64/2006.0/SRPMS/openvpn-2.0.1-2.1.20060mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team


Mandriva Linux Security Advisory MDKSA-2005:224
http://www.mandriva.com/security/


Package : curl
Date : December 8, 2005
Affected: 10.1, 10.2, 2006.0


Problem Description:

Stefan Esser discovered that libcurl’s URL parser function can
have a malloced buffer overflows in two ways if given a too long
URL. It cannot be triggered by a redirect, which makes remote
exploitation unlikely, but can be passed directly to libcurl
(allowing for local exploitation) and could also be used to break
out of PHP’s safe_mode/ open_basedir.

This vulnerability only exists in libcurl and curl 7.11.2 up to
and including 7.15.0, which means that Corporate Server 2.1 and
Corporate 3.0 are not vulnerable.

The updated packages have been patched to correct the problem.
As well, updated php-curl packages are available that provide a new
curl PHP module compiled against the fixed code.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077

http://www.dyadsecurity.com/perl-0002.html

http://curl.haxx.se/docs/adv_20051207.html


Updated Packages:

Mandriva Linux 10.1:
e338c6fec40f0b5f7c47f01ecfc85fd8
10.1/RPMS/curl-7.12.1-1.3.101mdk.i586.rpm
2c6fc6d5cb9f62c0fd7d0890779167dd
10.1/RPMS/libcurl3-7.12.1-1.3.101mdk.i586.rpm
496b439769425c8a45a15195c9f1a339
10.1/RPMS/libcurl3-devel-7.12.1-1.3.101mdk.i586.rpm
59bc58c52d3c7034e31bf7a5d9e2f845
10.1/SRPMS/curl-7.12.1-1.3.101mdk.src.rpm

Mandriva Linux 10.1/X86_64:
ecd5b17dd584d8ba4c986437bde4f6fa
x86_64/10.1/RPMS/curl-7.12.1-1.3.101mdk.x86_64.rpm
d3bb7a56841873696ffd6add01cf8da3
x86_64/10.1/RPMS/lib64curl3-7.12.1-1.3.101mdk.x86_64.rpm
f54e7f2fb8a4ad73787ce9af0e65ac41
x86_64/10.1/RPMS/lib64curl3-devel-7.12.1-1.3.101mdk.x86_64.rpm
59bc58c52d3c7034e31bf7a5d9e2f845
x86_64/10.1/SRPMS/curl-7.12.1-1.3.101mdk.src.rpm

Mandriva Linux 10.2:
287e79b91baa16afe1e57944bf8887a4
10.2/RPMS/curl-7.13.1-2.2.102mdk.i586.rpm
6012e004103928ffeb31f8017a08cce1
10.2/RPMS/libcurl3-7.13.1-2.2.102mdk.i586.rpm
60b5868305bda86a04ec63b349a1b45d
10.2/RPMS/libcurl3-devel-7.13.1-2.2.102mdk.i586.rpm
f12a43929acf2432a413937b00751f26
10.2/SRPMS/curl-7.13.1-2.2.102mdk.src.rpm

Mandriva Linux 10.2/X86_64:
6620e61f2dfc0f6b9f8ddb4bb17a9dc8
x86_64/10.2/RPMS/curl-7.13.1-2.2.102mdk.x86_64.rpm
bfe67e81d224684763cbbc673df15488
x86_64/10.2/RPMS/lib64curl3-7.13.1-2.2.102mdk.x86_64.rpm
4b601554dd99d63f94b3f35f0924034e
x86_64/10.2/RPMS/lib64curl3-devel-7.13.1-2.2.102mdk.x86_64.rpm
f12a43929acf2432a413937b00751f26
x86_64/10.2/SRPMS/curl-7.13.1-2.2.102mdk.src.rpm

Mandriva Linux 2006.0:
78fe1cf7868e10c17a31adaa01718f1d
2006.0/RPMS/curl-7.14.0-2.2.20060mdk.i586.rpm
d6cf997f844557f77ca5b720973f717d
2006.0/RPMS/libcurl3-7.14.0-2.2.20060mdk.i586.rpm
6959638e76f3f2d7c7c8774e4d891b5a
2006.0/RPMS/libcurl3-devel-7.14.0-2.2.20060mdk.i586.rpm
7502a4eb9fe19554714247e4a9a5f176
2006.0/RPMS/php-curl-5.0.4-1.1.20060mdk.i586.rpm
c04932aea0dc51673585ed68119d518d
2006.0/SRPMS/curl-7.14.0-2.2.20060mdk.src.rpm
8a30951717cc93a371e07fb95264b007
2006.0/SRPMS/php-curl-5.0.4-1.1.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
7401463c8a258183c1f3798b02f3d029
x86_64/2006.0/RPMS/curl-7.14.0-2.2.20060mdk.x86_64.rpm
b5d47137d19d7e69a31a50cab4e520b7
x86_64/2006.0/RPMS/lib64curl3-7.14.0-2.2.20060mdk.x86_64.rpm
50ddb76a23cb766bcb99d0ad7ff18492
x86_64/2006.0/RPMS/lib64curl3-devel-7.14.0-2.2.20060mdk.x86_64.rpm

a94e9b275b0a661940c4a15fbf63efb9
x86_64/2006.0/RPMS/php-curl-5.0.4-1.1.20060mdk.x86_64.rpm
c04932aea0dc51673585ed68119d518d
x86_64/2006.0/SRPMS/curl-7.14.0-2.2.20060mdk.src.rpm
8a30951717cc93a371e07fb95264b007
x86_64/2006.0/SRPMS/php-curl-5.0.4-1.1.20060mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team


Mandriva Linux Security Advisory MDKSA-2005:225
http://www.mandriva.com/security/


Package : perl
Date : December 8, 2005
Affected: 10.1, 10.2, 2006.0, Corporate 2.1, Corporate 3.0, Multi
Network Firewall 2.0


Problem Description:

Jack Louis discovered a new way to exploit format string errors
in the Perl programming language that could lead to the execution
of arbitrary code.

The updated packages are patched to close the particular exploit
vector in Perl itself, to mitigate the risk of format string
programming errors, however it does not fix problems that may exist
in particular pieces of software written in Perl.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3962

http://www.dyadsecurity.com/perl-0002.html


Updated Packages:

Mandriva Linux 10.1:
fd77af9b7802f41c22d4902b456fdb32
10.1/RPMS/perl-5.8.5-3.5.101mdk.i586.rpm
49c6b964236039da921a3a0a08105316
10.1/RPMS/perl-base-5.8.5-3.5.101mdk.i586.rpm
01ad564838030c9992ea70b8fa2261c5
10.1/RPMS/perl-devel-5.8.5-3.5.101mdk.i586.rpm
3ff0b066b2b67c9d6f0d6d5d757ed67e
10.1/RPMS/perl-doc-5.8.5-3.5.101mdk.i586.rpm
1e6de184d2c018701d5bc93c60610789
10.1/SRPMS/perl-5.8.5-3.5.101mdk.src.rpm

Mandriva Linux 10.1/X86_64:
4fef93b585d891e863588f99c0ddd18d
x86_64/10.1/RPMS/perl-5.8.5-3.5.101mdk.x86_64.rpm
9b31454c7a74aa9cab7219ca627100e0
x86_64/10.1/RPMS/perl-base-5.8.5-3.5.101mdk.x86_64.rpm
1b7708eb96804787524bf34bded09edf
x86_64/10.1/RPMS/perl-devel-5.8.5-3.5.101mdk.x86_64.rpm
cd197160854346c39854f060a9a18d5c
x86_64/10.1/RPMS/perl-doc-5.8.5-3.5.101mdk.x86_64.rpm
1e6de184d2c018701d5bc93c60610789
x86_64/10.1/SRPMS/perl-5.8.5-3.5.101mdk.src.rpm

Mandriva Linux 10.2:
32b1b7a39b8e0781df41e57188fe5c97
10.2/RPMS/perl-5.8.6-6.2.102mdk.i586.rpm
05ae3f918377371783c491027b081e92
10.2/RPMS/perl-base-5.8.6-6.2.102mdk.i586.rpm
2c5b07488636b42b1b15f40b220fd1fd
10.2/RPMS/perl-devel-5.8.6-6.2.102mdk.i586.rpm
c116213d8e3e30407ba994b281d03f52
10.2/RPMS/perl-doc-5.8.6-6.2.102mdk.i586.rpm
54c3f67fd42027442a0f589f2ad9dcec
10.2/SRPMS/perl-5.8.6-6.2.102mdk.src.rpm

Mandriva Linux 10.2/X86_64:
e0890eb10b116c824c3f9a173097c60e
x86_64/10.2/RPMS/perl-5.8.6-6.2.102mdk.x86_64.rpm
75aa18ee9d21d40a639baaee28b238f4
x86_64/10.2/RPMS/perl-base-5.8.6-6.2.102mdk.x86_64.rpm
1dc42978eb832156c82042ece5c616d9
x86_64/10.2/RPMS/perl-devel-5.8.6-6.2.102mdk.x86_64.rpm
c4b0b1c2f41d8ab442202136572ec553
x86_64/10.2/RPMS/perl-doc-5.8.6-6.2.102mdk.x86_64.rpm
54c3f67fd42027442a0f589f2ad9dcec
x86_64/10.2/SRPMS/perl-5.8.6-6.2.102mdk.src.rpm

Mandriva Linux 2006.0:
6333d4baa23e9bc27340ab30d6f6f9fd
2006.0/RPMS/perl-5.8.7-3.2.20060mdk.i586.rpm
d91a62f81461a51dfffa6dd8e15b6ab4
2006.0/RPMS/perl-base-5.8.7-3.2.20060mdk.i586.rpm
7d8ec79ab483544765c236c3b7e1ba0f
2006.0/RPMS/perl-devel-5.8.7-3.2.20060mdk.i586.rpm
af9b52f68ce3eaf066a21694924a3f22
2006.0/RPMS/perl-doc-5.8.7-3.2.20060mdk.i586.rpm
ff8a844680f7df737431fb9c82c5f50d
2006.0/RPMS/perl-suid-5.8.7-3.2.20060mdk.i586.rpm
acde621a5890ff325a1ad8ffe83dc1ca
2006.0/SRPMS/perl-5.8.7-3.2.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
c1fc32b114cd8b2b0af431208da6beaf
x86_64/2006.0/RPMS/perl-5.8.7-3.2.20060mdk.x86_64.rpm
ebf3e1e5460c9362e3a0fc77dcbddad5
x86_64/2006.0/RPMS/perl-base-5.8.7-3.2.20060mdk.x86_64.rpm
ced9d56a6b9ae7196397f9d7b8e1e41f
x86_64/2006.0/RPMS/perl-devel-5.8.7-3.2.20060mdk.x86_64.rpm
896727d0819ed6161229f4c8722a67fc
x86_64/2006.0/RPMS/perl-doc-5.8.7-3.2.20060mdk.x86_64.rpm
241e526b1892577f35663073adcc4a97
x86_64/2006.0/RPMS/perl-suid-5.8.7-3.2.20060mdk.x86_64.rpm
acde621a5890ff325a1ad8ffe83dc1ca
x86_64/2006.0/SRPMS/perl-5.8.7-3.2.20060mdk.src.rpm

Corporate Server 2.1:
d20049231eead3d45b0b9281e1decb4c
corporate/2.1/RPMS/perl-5.8.0-14.6.C21mdk.i586.rpm
5da0de8e1beeba847d3576a7a06a496e
corporate/2.1/RPMS/perl-base-5.8.0-14.6.C21mdk.i586.rpm
09a1f64c8b71c473bc0779720defa812
corporate/2.1/RPMS/perl-devel-5.8.0-14.6.C21mdk.i586.rpm
512a995b03bc5e0c1d2dd22c7b326510
corporate/2.1/RPMS/perl-doc-5.8.0-14.6.C21mdk.i586.rpm
1b6f22e9b27bf9dc6e029b129c64f17d
corporate/2.1/SRPMS/perl-5.8.0-14.6.C21mdk.src.rpm

Corporate Server 2.1/X86_64:
5d2d2f4908b9c6e8f51d6bb8d961eebe
x86_64/corporate/2.1/RPMS/perl-5.8.0-14.6.C21mdk.x86_64.rpm
5b72479d3df3ae87fa4edf2a105e748d
x86_64/corporate/2.1/RPMS/perl-base-5.8.0-14.6.C21mdk.x86_64.rpm

3559e60ed31815f3902b75df42afc3d7
x86_64/corporate/2.1/RPMS/perl-devel-5.8.0-14.6.C21mdk.x86_64.rpm

00a8c82a911814a113ae2eaf6915d47b
x86_64/corporate/2.1/RPMS/perl-doc-5.8.0-14.6.C21mdk.x86_64.rpm
1b6f22e9b27bf9dc6e029b129c64f17d
x86_64/corporate/2.1/SRPMS/perl-5.8.0-14.6.C21mdk.src.rpm

Corporate 3.0:
7b1917b673681d9de4e4737af0b121c8
corporate/3.0/RPMS/perl-5.8.3-5.5.C30mdk.i586.rpm
2ddb28f87a9ab94bfda90fc476da3805
corporate/3.0/RPMS/perl-base-5.8.3-5.5.C30mdk.i586.rpm
c939615d266f5fa4ed1755ce31915dde
corporate/3.0/RPMS/perl-devel-5.8.3-5.5.C30mdk.i586.rpm
ca449fac6c286d5bbd0c3bd137316e98
corporate/3.0/RPMS/perl-doc-5.8.3-5.5.C30mdk.i586.rpm
d3a7de2cfc352459b85cdc261b57d1e6
corporate/3.0/SRPMS/perl-5.8.3-5.5.C30mdk.src.rpm

Corporate 3.0/X86_64:
4578c3ad7a7c4fd87086ac571478ae1b
x86_64/corporate/3.0/RPMS/perl-5.8.3-5.5.C30mdk.x86_64.rpm
bbe873bc27e07d05c7d4846edd34acec
x86_64/corporate/3.0/RPMS/perl-base-5.8.3-5.5.C30mdk.x86_64.rpm
833889de8df484c212c69a1e658f5ffe
x86_64/corporate/3.0/RPMS/perl-devel-5.8.3-5.5.C30mdk.x86_64.rpm

c9dbf8d3ca9715e33bbc664efc2dca24
x86_64/corporate/3.0/RPMS/perl-doc-5.8.3-5.5.C30mdk.x86_64.rpm
d3a7de2cfc352459b85cdc261b57d1e6
x86_64/corporate/3.0/SRPMS/perl-5.8.3-5.5.C30mdk.src.rpm

Multi Network Firewall 2.0:
0f29d338645e61084cf87953c331c87e
mnf/2.0/RPMS/perl-5.8.3-5.5.M20mdk.i586.rpm
fee6e3863a13cd043b29ae0fcd053221
mnf/2.0/RPMS/perl-base-5.8.3-5.5.M20mdk.i586.rpm
be47c56a9ae307c338031dcb5194e491
mnf/2.0/RPMS/perl-devel-5.8.3-5.5.M20mdk.i586.rpm
d0c6075c99103eb8b3bea0a38d1c9cdf
mnf/2.0/RPMS/perl-doc-5.8.3-5.5.M20mdk.i586.rpm
8ce4eff23c4dd50c5bbaef75b69c5482
mnf/2.0/SRPMS/perl-5.8.3-5.5.M20mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team

Trustix Secure Linux


Trustix Secure Linux Security Advisory #2005-0070

Package names: kernel, perl
Summary: Multiple vulnerabilities
Date: 2005-12-09
Affected versions: Trustix Secure Linux 2.2 Trustix Secure Linux
3.0 Trustix Operating System – Enterprise Server 2


Package description:
kernel
The kernel package contains the Linux kernel (vmlinuz), the core of
your Trustix Secure Linux operating system. The kernel handles the
basic functions of the operating system: memory allocation, process
allocation, device input and output, etc.

perl
Perl is a high-level programming language with roots in C, sed, awk
and shell scripting. Perl is good at handling processes and files,
and is especially good at handling text. Perl’s hallmarks are
practicality and efficiency. While it is used to do a lot of
different things, Perl’s most common applications (and what it
excels at) are probably system administration utilities and web
programming. A large proportion of the CGI scripts on the web are
written in Perl. You need the perl package installed on your system
so that your system can handle Perl scripts.

Problem description:
kernel < TSL 3.0 >

  • New Upstream.
  • SECURITY Fix: Memory leak in the VFS file lease handling in
    locks.c allows local users to cause a denial of service via certain
    Samba activities that cause an fasync entry to be re-allocated by
    the fcntl_setlease function after the fasync queue has already been
    cleaned by the locks_delete_lock function.
  • The auto-reap of child processes in Linux kernel 2.6 includes
    processes with ptrace attached, which leads to a dangling ptrace
    reference and allows local users to cause a denial of service
    (crash).
  • The time_out_leases function in locks.c allows local users to
    cause a denial of service (kernel log message consumption) by
    causing a large number of broken leases, which is recorded to the
    log using the printk function.

    The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the names
    CVE-2005-3807, CVE-2005-3784 and CVE-2005-3857 to these issues.

    perl < TSL 3.0 > < TSL 2.2 > < TSEL 2 >

  • SECURITY Fix: Integer overflow in the format string
    functionality (Perl_sv_vcatpvfn) allows attackers to overwrite
    arbitrary memory and possibly execute arbitrary code via format
    string specifiers with large values.

The Common Vulnerabilities and Exposures project has assigned
the name CVE-2005-3962 to this issue.

Action:
We recommend that all systems with this package installed be
upgraded. Please note that if you do not need the functionality
provided by this package, you may want to remove it from your
system.

Location:
All Trustix Secure Linux updates are available from
http://http.trustix.org/pub/trustix/updates/>
ftp://ftp.trustix.org/pub/trustix/updates/>

About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers.
With focus on security and stability, the system is painlessly kept
safe and up to date from day one using swup, the automated software
updater.

Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using ‘swup –upgrade’.

Questions?
Check out our mailing lists:
http://www.trustix.org/support/>

Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
http://www.trustix.org/TSL-SIGN-KEY>

The advisory itself is available from the errata pages at
http://www.trustix.org/errata/trustix-2.2/> and
http://www.trustix.org/errata/trustix-3.0/>
or directly at
http://www.trustix.org/errata/2005/0070/>

MD5sums of the packages:


0a2350d4e0d9965f62cdf5888bcb0f59 2.2/rpms/perl-5.8.5-9tr.i586.rpm

f9fcbc28250c9e5814e42efcc9f43d8a
3.0/rpms/kernel-2.6.14.3-1tr.i586.rpm
358f51e0ff323ff75181c6c4e2bc6344
3.0/rpms/kernel-doc-2.6.14.3-1tr.i586.rpm
d947bd6c4c87baebb8c0de07e318eb5c
3.0/rpms/kernel-headers-2.6.14.3-1tr.i586.rpm
c310a3663bb59f7e239646ec666ca7e8
3.0/rpms/kernel-smp-2.6.14.3-1tr.i586.rpm
bb7bcc9f91b3d7ca8e4788130db0b6d4
3.0/rpms/kernel-smp-headers-2.6.14.3-1tr.i586.rpm
3ee05562361906884b990a716c16ed3f
3.0/rpms/kernel-source-2.6.14.3-1tr.i586.rpm
6701845da1900ff436de6430b30a20d5
3.0/rpms/kernel-utils-2.6.14.3-1tr.i586.rpm
cace6154ca9297d263abd04f1ac25358
3.0/rpms/perl-5.8.7-2tr.i586.rpm


Trustix Security Team

Ubuntu Linux


Ubuntu Security Notice USN-226-1 December 09, 2005
courier vulnerability
CVE-2005-3532


A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

courier-authdaemon

The problem can be corrected by upgrading the affected package
to version 0.45.6-1ubuntu0.2 (for Ubuntu 4.10), 0.47-3ubuntu1.4
(for Ubuntu 5.04), or 0.47-3ubuntu7.1 (for Ubuntu 5.10). In
general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Patrick Cheong Shu Yang discovered a flaw in the user account
handling of courier-authdaemon. After successful authorization, the
Courier mail server granted access to deactivated accounts.

Updated packages for Ubuntu 4.10:

Source archives:


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier_0.45.6-1ubuntu0.2.diff.gz

Size/MD5: 92828 f643cc4d20a3e208a436985b890a3db4

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier_0.45.6-1ubuntu0.2.dsc

Size/MD5: 1207 58d7fb5c25676cd26c89625aacd8a5c1

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier_0.45.6.orig.tar.gz

Size/MD5: 6388279 7ae1f4236b4a28432af9e720a3718329

Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-doc_0.45.6-1ubuntu0.2_all.deb

Size/MD5: 367974 7f50c52514504a4245d08ccc74adc8d3

amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-authdaemon_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 61134 79be3b6f79e77fb77094c84916887d58

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authmysql_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 55868 0bd5c31284665805eb85b3e2ff5a5263

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authpostgresql_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 56090 0ad7a71914eedee0432dcf51c678b9da

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-base_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 250542 af2634919c4f80a48fb99e08dcbbb7f4

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-faxmail_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 27646 1acfe59e3c9cc8edc8f5099204cc6434

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap-ssl_3.0.5-1ubuntu0.2_amd64.deb

Size/MD5: 19866 1cc526c3ed7a2480c6894f3d82baa5ec

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap_3.0.5-1ubuntu0.2_amd64.deb

Size/MD5: 948990 a014bb527775b3ddc5915c5a38a9a232

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-ldap_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 72760 bc13e6fd28030f037d794234ec7ca5ea

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-maildrop_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 942678 5cb59ff8a910c210b0c5d50dbd82a234

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mlm_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 121314 431fddbca9b2e7ae2d4dc251ef5cb910

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta-ssl_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 18170 4a2ea0bdca0e07eb7e8b12c2bae0c707

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 2142640 bc9206f0f5d47b5fb99c9f501aee6a26

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-pcp_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 65476 7f415e9695095eeadd549adb74b07781

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop-ssl_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 19682 0902f8697b35f4da73a91cec09f8619c

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 422086 01d66aeadb99010f118e7b0c73091dea

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-ssl_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 194292 a4bf873a5dc385be98ccb518d0d9dd20

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-webadmin_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 33812 881b3f5e4a55535fecca586047b70cb5

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/sqwebmail_0.45.6-1ubuntu0.2_amd64.deb

Size/MD5: 796118 fabf0a4eb4f6293ce449a4457f899242

i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-authdaemon_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 55310 4ad0265601aba10be362d624e66588f6

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authmysql_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 51360 2f1a810e2dc589e23b2d5a61263fbf8a

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authpostgresql_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 51426 a5d4f54df8291ea2306a8adb3d3c4efe

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-base_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 228320 7bcd8eb065100e4a387bc429db84fbbd

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-faxmail_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 27642 015ebde2a02e1d90cf04972431ea5792

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap-ssl_3.0.5-1ubuntu0.2_i386.deb

Size/MD5: 19866 d331671fe65e2b757866f52417fe213e

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap_3.0.5-1ubuntu0.2_i386.deb

Size/MD5: 923192 84680aabebd667ab0c3b7b369d841b98

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-ldap_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 66624 ec1d837a69b9c6aed73039dd2d389349

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-maildrop_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 916630 fc0b5e4389d2cb82595032434c21999b

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mlm_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 116408 e7ef5afd4d7a1fdabb99709955dc44fb

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta-ssl_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 18168 4cec944cdcc21da2fa029c04f9138338

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 2045020 4f0bc3bfaa11291d2bf482b67c1f824a

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-pcp_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 58996 bd433fa70abd8456df52d0edd9f3c18d

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop-ssl_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 19680 c4a0afa4383912581cbf251f4d91721c

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 413942 d1cb057b73c90b4076eede7a790f6a6d

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-ssl_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 191078 00558241f6fbfc8fcaeabdeeca38bfe3

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-webadmin_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 33636 f31648c600edc44d4fc6ca21236b29a0

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/sqwebmail_0.45.6-1ubuntu0.2_i386.deb

Size/MD5: 762106 0f8f10b0c73fcd1268355cae32d719a8

powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-authdaemon_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 61442 a74cb650cb4a4a1cc42d03d1dce57729

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authmysql_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 56728 b3c40ae23693b5d381634620f0bf225b

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authpostgresql_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 56930 82ac5eceb51cefbcdcc7cae0b5e9ff18

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-base_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 249308 eea44561956e523380b0865d4b44f5be

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-faxmail_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 27654 9452c0e2b7910efbe61dbf215a956a00

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap-ssl_3.0.5-1ubuntu0.2_powerpc.deb

Size/MD5: 19870 c221dadb5d76d8e80d4d9c18c6bc5e00

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap_3.0.5-1ubuntu0.2_powerpc.deb

Size/MD5: 1063472 1b93cb8b1da4392554b9383316546454

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-ldap_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 73686 882ca51f3f168c14294723fecc8c454a

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-maildrop_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 1058784 138ec1917ab30dc6db7bbf2077cb2008

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mlm_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 127542 56acfb77b8e5876c8edd50f0ce7c48a9

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta-ssl_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 18172 2499020cb9b13f3b300c091523d97e7e

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 2365852 dfdb5aa6963a15cf7d30dcb832420298

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-pcp_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 65624 b823365c10941a7d9d831edb4794b6ab

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop-ssl_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 19686 fe2c34b05ddc4097f398535793d21f83

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 478142 4281580bbda09daec7a241fcb362d9b8

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-ssl_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 195292 78560346f853348ea27e75f00fb75b11

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-webadmin_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 33980 611b9a41d8e66a93fb936781b936ebff

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/sqwebmail_0.45.6-1ubuntu0.2_powerpc.deb

Size/MD5: 857912 ea2e59d5b1aa6671a91917018f32a45e

Updated packages for Ubuntu 5.04:

Source archives:


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier_0.47-3ubuntu1.4.diff.gz

Size/MD5: 108427 463a7d9043ce5f316268fe304357ff6c

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier_0.47-3ubuntu1.4.dsc

Size/MD5: 1204 6ba3575f3fc3ea367b7bc2824c9e5f87

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier_0.47.orig.tar.gz

Size/MD5: 6350808 361a84e497148ce557c150d3576ec24b

Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-doc_0.47-3ubuntu1.4_all.deb

Size/MD5: 370532 89c78e172532b0d617b289157347483b

amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-authdaemon_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 62384 601c5aea9adfe39d6b4bdaa06a69592d

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authmysql_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 57006 358bdb5d36a2ea10df132daa70238d18

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authpostgresql_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 57190 ab85ef96b251fdced2d2854832e38e96

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-base_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 257168 b67743c752efe408c3d77090ac24804a

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-faxmail_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 28720 96fad4cf46718f7bfdf1d63536a92a59

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap-ssl_3.0.8-3ubuntu1.4_amd64.deb

Size/MD5: 21282 85fcb879d725788fd45279be52f75e2c

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap_3.0.8-3ubuntu1.4_amd64.deb

Size/MD5: 950510 b7669a090eff9870bf7b5de015644481

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-ldap_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 74106 1e9cb371ca35f372274d19d96127cc3a

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-maildrop_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 942846 e00881fea462419705c40f3ae70411af

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mlm_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 122706 632b4bc3f249d298fb78e723ac524fd0

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta-ssl_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 19334 aac3ca017ac5ac1c8d1f4fa8b345a9b0

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 2157378 4eb5da1c44534d03aa2d98d3d92d4f68

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-pcp_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 66512 b9a62356541090e07708dd25817c0efc

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop-ssl_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 21070 42321acf84a5a7fee632a49e472e6815

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 423140 72e3b01251c51b0b5acff3018e025f7e

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-ssl_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 195642 8acbcbf16861d6364f4011d831199200

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-webadmin_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 34408 569573001d9172cc993b397fc162ada9

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/sqwebmail_0.47-3ubuntu1.4_amd64.deb

Size/MD5: 798116 6253d990d4e35323319d8ef795685360

i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-authdaemon_0.47-3ubuntu1.4_i386.deb

Size/MD5: 56164 d5ea14d215460d3982c3e2e0182ffbfa

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authmysql_0.47-3ubuntu1.4_i386.deb

Size/MD5: 52064 aa30f6db6dbd0a1ed58b9fd0e5c40915

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-authpostgresql_0.47-3ubuntu1.4_i386.deb

Size/MD5: 52146 5cb184a6ef943a0b3d58bf97a19d7f62

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-base_0.47-3ubuntu1.4_i386.deb

Size/MD5: 233414 3c844ab202cd5473b8036e14e18d643a

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-faxmail_0.47-3ubuntu1.4_i386.deb

Size/MD5: 28738 6dc93d1f5da1ea11361cc154407f4333

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap-ssl_3.0.8-3ubuntu1.4_i386.deb

Size/MD5: 21282 2a4783204fc1d75482e0471030a8a835

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-imap_3.0.8-3ubuntu1.4_i386.deb

Size/MD5: 925248 fe7a1df132e4fb1d23a4482e80517ee0

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-ldap_0.47-3ubuntu1.4_i386.deb

Size/MD5: 67584 683d2a8d27be9f0959e8d0074863727a

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-maildrop_0.47-3ubuntu1.4_i386.deb

Size/MD5: 916594 de691731f0b8820dddda17c510f3b1c4

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mlm_0.47-3ubuntu1.4_i386.deb

Size/MD5: 117314 237a1a89c3b95eb7bfc02d4c6fefb41a

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta-ssl_0.47-3ubuntu1.4_i386.deb

Size/MD5: 19336 eeb7c9711b45064af42ad4ff96cbcb59

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-mta_0.47-3ubuntu1.4_i386.deb

Size/MD5: 2052174 b3dc799b852013341c32a1f554774fff

http://security.ubuntu.com/ubuntu/pool/universe/c/courier/courier-pcp_0.47-3ubuntu1.4_i386.deb

Size/MD5: 59806 ff3dacf3777a2c2e54ccb8562cd6ad71

http://security.ubuntu.com/ubuntu/pool/main/c/courier/courier-pop-ssl_0.47-3ubuntu1.4_i386.deb

Size/MD5: 21078 b55458a82063418b3345a2158a42e524

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis