Gentoo Linux
Gentoo Linux Security Advisory GLSA 200612-19
Severity: Low
Title: pam_ldap: Authentication bypass vulnerability
Date: December 20, 2006
Bugs: #153916
ID: 200612-19
Synopsis
pam_ldap contains a vulnerability that may allow a remote user
with a locked account to gain unauthorized system access.
Background
pam_ldap is a Pluggable Authentication Module which allows
authentication against LDAP directories.
Affected packages
Package / Vulnerable / Unaffected
1 sys-auth/pam_ldap < 183 >= 183
Description
Steve Rigler discovered that pam_ldap does not correctly handle
“PasswordPolicyResponse” control responses from an LDAP directory.
This causes the pam_authenticate() function to always succeed, even
if the previous authentication failed.
Impact
A locked user may exploit this vulnerability to bypass the LDAP
authentication mechanism, possibly gaining unauthorized access to
the system.
Workaround
There is no known workaround at this time.
Resolution
All pam_ldap users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-auth/pam_ldap-183"
References
[ 1 ] CVE-2006-5170
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5170
Availability
This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200612-19.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).
The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Gentoo Linux Security Advisory GLSA 200612-20
Severity: Normal
Title: imlib2: Multiple vulnerabilities
Date: December 20, 2006
Bugs: #154216
ID: 200612-20
Synopsis
imlib2 contains several vulnerabilities that could lead to the
remote execution of arbitrary code or a Denial of Service.
Background
imlib2 is an advanced replacement for image manipulation
libraries such as libXpm. It is utilized by numerous programs,
including gkrellm and several window managers, to display
images.
Affected packages
Package / Vulnerable / Unaffected
1 media-libs/imlib2 < 1.3.0 >= 1.3.0
Description
M. Joonas Pihlaja discovered several buffer overflows in
loader_argb.c, loader_png.c, loaderlbm.c,
loader_jpeg.c, loadertiff.c, loader_tga.c, loader_pnm.c and
an out-of-bounds memory read access in loader_tga.c.
Impact
An attacker can entice a user to process a specially crafted
JPG, ARGB, PNG, LBM, PNM, TIFF, or TGA image with an “imlib2*”
binary or another application using the imlib2 libraries.
Successful exploitation of the buffer overflows causes the
execution of arbitrary code with the permissions of the user
running the application.
Workaround
There is no known workaround at this time.
Resolution
All imlib2 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/imlib2-1.3.0"
References
[ 1 ] CVE-2006-4806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4806
[ 2 ] CVE-2006-4807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4807
[ 3 ] CVE-2006-4808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4808
[ 4 ] CVE-2006-4809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4809
Availability
This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200612-20.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).
The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Gentoo Linux Security Advisory GLSA 200612-21
Severity: Normal
Title: Ruby: Denial of Service vulnerability
Date: December 20, 2006
Bugs: #157048
ID: 200612-21
Synopsis
The Ruby cgi.rb CGI library is vulnerable to a Denial of Service
attack.
Background
Ruby is a dynamic, open source programming language with a focus
on simplicity and productivity.
Affected packages
Package / Vulnerable / Unaffected
1 dev-lang/ruby < 1.8.5_p2 >= 1.8.5_p2
Description
The read_multipart function of the CGI library shipped with Ruby
(cgi.rb) does not properly check boundaries in MIME multipart
content. This is a different issue than GLSA 200611-12.
Impact
The vulnerability can be exploited by sending the cgi.rb library
a crafted HTTP request with multipart MIME encoding that contains a
malformed MIME boundary specifier. Successful exploitation of the
vulnerability causes the library to go into an infinite loop.
Workaround
There is no known workaround at this time.
Resolution
All Ruby users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.5_p2"
References
[ 1 ] CVE-2006-6303
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6303
Availability
This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200612-21.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).
The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Mandriva Linux
Mandriva Linux Security Advisory MDKSA-2006:234
http://www.mandriva.com/security/
Package : mono
Date : December 20, 2006
Affected: 2007.0
Problem Description:
XSP (the Mono ASP.NET server) is vulnerable to source disclosure
attack which allow a malicious user to obtain the source code of
the server-side application. This vulnerability grants the attacker
deeper knowledge of the Web application logic.
Updated packages have been patched to correct this issue.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6104
Updated Packages:
Mandriva Linux 2007.0:
372cd7944c4ae044529132a60a0f4cba
2007.0/i586/jay-1.1.17.1-5.2mdv2007.0.i586.rpm
57586c9c8baff2fbe3c59c3529adc5a7
2007.0/i586/libmono-runtime-1.1.17.1-5.2mdv2007.0.i586.rpm
1cf0dcab116f59634f3890fab1cb46eb
2007.0/i586/libmono0-1.1.17.1-5.2mdv2007.0.i586.rpm
1898e4fc4e6f1c671c37a8d76814a89f
2007.0/i586/libmono0-devel-1.1.17.1-5.2mdv2007.0.i586.rpm
7dca6df31b2cac25df9d1568136ab8b3
2007.0/i586/mono-1.1.17.1-5.2mdv2007.0.i586.rpm
cb7c8cd1f5db165f31ea7e139d60fc75
2007.0/i586/mono-data-sqlite-1.1.17.1-5.2mdv2007.0.i586.rpm
73cfb46d15b9b0588f4013781d40a114
2007.0/i586/mono-doc-1.1.17.1-5.2mdv2007.0.i586.rpm
ddc633435f442f9436caec01d9796830
2007.0/SRPMS/mono-1.1.17.1-5.2mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
2b54bfd1164dd9c935b9af5c3297e90a
2007.0/x86_64/jay-1.1.17.1-5.2mdv2007.0.x86_64.rpm
6b137c021b3596699b22af6a8ef919fc
2007.0/x86_64/lib64mono0-1.1.17.1-5.2mdv2007.0.x86_64.rpm
8825990b27f3c66c2e225d483290b41d
2007.0/x86_64/lib64mono0-devel-1.1.17.1-5.2mdv2007.0.x86_64.rpm
a58792e500afc0a1f231a46ba7c8cf96
2007.0/x86_64/libmono-runtime-1.1.17.1-5.2mdv2007.0.x86_64.rpm
6030ac6e852551dea3f36dc2ab54ecb2
2007.0/x86_64/mono-1.1.17.1-5.2mdv2007.0.x86_64.rpm
baec0fa42850f91bb089317f62e5722c
2007.0/x86_64/mono-data-sqlite-1.1.17.1-5.2mdv2007.0.x86_64.rpm
72d633232728911fc9fa428ab3af582f
2007.0/x86_64/mono-doc-1.1.17.1-5.2mdv2007.0.x86_64.rpm
ddc633435f442f9436caec01d9796830
2007.0/SRPMS/mono-1.1.17.1-5.2mdv2007.0.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.
All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:
gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
Ubuntu
Ubuntu Security Notice USN-397-1 December 20, 2006
mono vulnerability
CVE-2006-6104
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 6.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
mono-classlib-1.0 1.1.13.6-0ubuntu3.2
mono-classlib-2.0 1.1.13.6-0ubuntu3.2
Ubuntu 6.10:
libmono-system-web1.0-cil 1.1.17.1-1ubuntu7.1
libmono-system-web2.0-cil 1.1.17.1-1ubuntu7.1
After a standard system upgrade you need to restart any mono web
applications to effect the necessary changes.
Details follow:
Jose Ramon Palanco discovered that the mono System.Web class did
not consistently verify local file paths. As a result, the source
code for mono web applications could be retrieved remotely,
possibly leading to further compromise via the application’s
source.
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.13.6-0ubuntu3.2.diff.gz
Size/MD5: 48871
95da1c90d723f6849f6996a12a60cbc6
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.13.6-0ubuntu3.2.dsc
Size/MD5: 1047
21557fc891cfdb0a9af47451010c218a
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.13.6.orig.tar.gz
Size/MD5: 18217583
330cc66c6a44525950daf10c4f17c10e
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-assemblies-base_1.1.13.6-0ubuntu3.2_all.deb
Size/MD5: 42032
11c561430b9d35ebc4c62f5d8982250e
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-classlib-1.0-dbg_1.1.13.6-0ubuntu3.2_all.deb
Size/MD5: 3794836
6d7e9dad1a8f98a9e5c9fc704148cc53
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-classlib-1.0_1.1.13.6-0ubuntu3.2_all.deb
Size/MD5: 4560128
21602e7ff91b1f711873011ed7d87f66
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/mono-classlib-2.0-dbg_1.1.13.6-0ubuntu3.2_all.deb
Size/MD5: 4568456
9c30b6dcba099ea96eb4f9e8c618a3cc
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-classlib-2.0_1.1.13.6-0ubuntu3.2_all.deb
Size/MD5: 5218186
f9f6fb451a766a1afa3ad0022f9252a9
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-gac_1.1.13.6-0ubuntu3.2_all.deb
Size/MD5: 53264
568d945f286aa77f4bf1a0101c1554bf
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-gmcs_1.1.13.6-0ubuntu3.2_all.deb
Size/MD5: 841102
75142252d7637d54a44da37414090189
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-mcs_1.1.13.6-0ubuntu3.2_all.deb
Size/MD5: 1415842
9e8b5ae50e7644763308cbe6096c35d8
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-dev_1.1.13.6-0ubuntu3.2_amd64.deb
Size/MD5: 1127690
1b4c2d97b84c0864a5b101709172ec9e
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono0_1.1.13.6-0ubuntu3.2_amd64.deb
Size/MD5: 866072
b1f3fd709caa15cd2c54c4953fe1668f
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-common_1.1.13.6-0ubuntu3.2_amd64.deb
Size/MD5: 115972
6beabaca2a334afb123d602f950dc004
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-devel_1.1.13.6-0ubuntu3.2_amd64.deb
Size/MD5: 42066
17bfdcd4a86f4e5e9c033d14d6fa1384
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jay_1.1.13.6-0ubuntu3.2_amd64.deb
Size/MD5: 57624
5262d467e37ba718996a0b057b9b5c85
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jit_1.1.13.6-0ubuntu3.2_amd64.deb
Size/MD5: 12924
69deab0d023bfcdedff49c8c9e0fe316
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-utils_1.1.13.6-0ubuntu3.2_amd64.deb
Size/MD5: 1117590
28380154c21bd7dad17f361555d84af8
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.13.6-0ubuntu3.2_amd64.deb
Size/MD5: 1214
0ed2e4b1b5b975d6850458d0d7be67be
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-dev_1.1.13.6-0ubuntu3.2_i386.deb
Size/MD5: 1017346
b5cf785db92bcdf2ec66e88f649359e3
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono0_1.1.13.6-0ubuntu3.2_i386.deb
Size/MD5: 780556
601d21535e3baa5f02124fcebf545006
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-common_1.1.13.6-0ubuntu3.2_i386.deb
Size/MD5: 115534
55d7b1e8bfc0b49806ce6fbe879292d1
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-devel_1.1.13.6-0ubuntu3.2_i386.deb
Size/MD5: 42064
a1025dce492c6e925c4306f9a2cfa007
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jay_1.1.13.6-0ubuntu3.2_i386.deb
Size/MD5: 50692
a50854b6d1df53e9b70d9f2c2566a15a
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jit_1.1.13.6-0ubuntu3.2_i386.deb
Size/MD5: 12724
243586247671b7faa749a4d6cd3c33a7
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-utils_1.1.13.6-0ubuntu3.2_i386.deb
Size/MD5: 1015004
8b9cfe5134cfe97f585080d2c571ef5b
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.13.6-0ubuntu3.2_i386.deb
Size/MD5: 1210
32d89462b5e4398db6b4807575e3b0f3
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-dev_1.1.13.6-0ubuntu3.2_powerpc.deb
Size/MD5: 1085196
acd7fc6c681501959273b01f0e510233
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono0_1.1.13.6-0ubuntu3.2_powerpc.deb
Size/MD5: 816242
465fa119ffee6aac2d569ff7f04883f2
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-common_1.1.13.6-0ubuntu3.2_powerpc.deb
Size/MD5: 116514
26c997fe0a8ed68c66b54a00e7d52357
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-devel_1.1.13.6-0ubuntu3.2_powerpc.deb
Size/MD5: 42068
f6dfd7e19ddb761902ccfa2d9f5344ce
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jay_1.1.13.6-0ubuntu3.2_powerpc.deb
Size/MD5: 56654
a0eb22b159b7037ea7f286148dc56c39
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jit_1.1.13.6-0ubuntu3.2_powerpc.deb
Size/MD5: 14790
1ba1e121936d0588f4921a8481fa200e
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-utils_1.1.13.6-0ubuntu3.2_powerpc.deb
Size/MD5: 1102970
6a02b9bf34da073067ec61970ec5c4c9
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.13.6-0ubuntu3.2_powerpc.deb
Size/MD5: 1214
0caf8bd6ce431b226941c62a602369cc
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-dev_1.1.13.6-0ubuntu3.2_sparc.deb
Size/MD5: 1093072
4500d1121f03adeea62cb27d327c61f2
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono0_1.1.13.6-0ubuntu3.2_sparc.deb
Size/MD5: 820944
7073e3ded35354f6de76e68b25bb108c
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-common_1.1.13.6-0ubuntu3.2_sparc.deb
Size/MD5: 116092
067c29ec0dc398c4279d46004970176d
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-devel_1.1.13.6-0ubuntu3.2_sparc.deb
Size/MD5: 42064
efcdda6f00ff3539dadfb60d69eb13ee
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jay_1.1.13.6-0ubuntu3.2_sparc.deb
Size/MD5: 53662
51aa7729f708eb2ea4903c42bdffc143
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jit_1.1.13.6-0ubuntu3.2_sparc.deb
Size/MD5: 13002
cfa13256a3e43d73f82e8e9ff51d7fc3
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-utils_1.1.13.6-0ubuntu3.2_sparc.deb
Size/MD5: 1049814
76c2214b80471d6233021f10fad0fca9
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.13.6-0ubuntu3.2_sparc.deb
Size/MD5: 1214
cbf5c0379713b9fbff6f8abc443a6a54
Updated packages for Ubuntu 6.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.17.1-1ubuntu7.1.diff.gz
Size/MD5: 41023
f023375eafc247cf75d0452571ec393a
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.17.1-1ubuntu7.1.dsc
Size/MD5: 2303
4c239666e467fa49eb99e2329cefd631
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.17.1.orig.tar.gz
Size/MD5: 19352812
072cb3de1f19cbebd6034f7a5cff1292
Architecture independent packages:
Size/MD5: 19704
415f4665cfcbf1020697fcaad74a3781
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-accessibility2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 19638
478c9b6316f4fb1e6774a784b6eb1162
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-bytefx0.7.6.1-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 91206
e3107aeae7dcb3c9113c17f8658ee15e
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-bytefx0.7.6.2-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 91268
2a82d60eca1313f98ca390d310249c67
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-c5-1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 226832
6f69ab121db51554e3be115655e97885
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-cairo1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 45284
82995c188697c5f1c22e4043c2df598b
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-cairo2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 45080
527a1dcadc94992ad317d3c1c7387169
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-corlib1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 1845196
fce79a13a9061e1663777f51171be67f
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-corlib2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 2086932
2642319f830d8ff8f94df19a397271e3
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-cscompmgd7.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 24042
15bff0120d4fa815f2e27d4e010287ea
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-cscompmgd8.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 24274
f883d9922ccfa443ba124358aa90b7d2
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-data-tds1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 64786
0621bcb4cfdbdf69af07b344e3399807
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-data-tds2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 68502
5afb4df0eee2a7c74cea0a3cced50471
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-firebirdsql1.7-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 295562
18719dfa8f62049754f405a591dc7a67
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-ldap1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 221734
00373852dca844ec04782c038ff14fb5
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-ldap2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 221588
ece3b4dc87635b8a10d89d9292283526
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-microsoft-build2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 196264
48f7563e4a9f132b0e2e589987179f54
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-microsoft7.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 272388
69a2a0193c5c6899815dede37c4abe87
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-microsoft8.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 272460
cd96cc27916215880d0bc5d12d523fe8
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-npgsql1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 130810
f95d1d2f193b28cc03720c9c85288d6f
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-npgsql2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 131002
25058c028f497bd536e2dd22dc06fec2
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-oracle1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 113192
765bf6ca38bca5438760577734649bb2
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-oracle2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 112682
c86c16ea72e930e158ddda1b5f54d200
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-peapi1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 100978
d6dbe49b7a731dc410e69fc8bd111259
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-peapi2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 101016
76df4fad22d6a36b5a05899ab9f2c734
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-relaxng1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 178548
8ce8c27c9cfe9b46066005a0defcb955
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-relaxng2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 179020
dba2968c13a7bf3d828224ddd23ca123
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-security1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 247092
e0ff3768cb9943fc0b33370bdd52fb2d
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-security2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 248302
36bbbc4b14ded0afa0e951f65c156d61
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-sharpzip0.6-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 109692
244b57cd04ea60d12940851132e85522
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-sharpzip0.84-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 131906
f3bde99a2c0786ba8ad87c4d183c256b
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-sharpzip2.6-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 109778
4670af48d9dfa8ba77baf0fb889f1fc4
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-sharpzip2.84-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 131968
903962af278fc1cf9d4cc1dfc51eee66
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-sqlite1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 43128
b1d362169846207b08b5a2527b8877cb
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-sqlite2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 43100
dfc5aaf37ab6a1bf5c8d180e7f7f35ea
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-system-data1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 457190
7246bc28c92c70d5708b0a34502f1c10
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-system-data2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 522340
a953c525229103481063219285ed082a
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-system-ldap1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 48068
e3e5eb751ae55ad29312a228401e81a5
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-system-ldap2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 48028
3e6fac752208e6ca4dd2c42c0f586ada
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-system-messaging1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 63496
d2ea4fb9e29efa4677825afe266464e5
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-system-messaging2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 63494
99e64b84751580e777e6f7554e1458eb
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-system-runtime1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 118400
47f669e86356f713474d310e22ff59b2
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/libmono-system-runtime2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 135976
481b165e89b015f1018c9730a74e2b53
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-system-web1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 773126
7c3ab311fc18a7955d08a797b7bdd2b6
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-system-web2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 1414414
98992dbb9a8379607a2d508ef6aeb2d0
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-system1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 1747274
6cacfc2f93b9ff4a496368fbd9a20a31
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-system2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 2286404
35459134d553371940a0610cec144182
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-winforms1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 1364398
387b26116687f175d349726605f9061d
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-winforms2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 1563772
e526e6ed11f8d1422fb85357224f3810
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono1.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 403398
c586276f6e18c50a2744d5659d807d52
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono2.0-cil_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 403468
4e2069173a529a7c7f00222e95d66620
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-classlib-1.0_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 15932
f5d0e0b1096e5eac4c96f169b0e176e4
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/mono-classlib-2.0_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 15912
4793e87d090a46d3f7685b6d8c7da662
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-gac_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 29368
bd3b18c67416199522215bce088ace8f
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-gmcs_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 839480
2f4e9b0cd4759166408dbbf3fd51fc21
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-mcs_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 1012390
11f5282cf5d033cf622861509e629a37
http://security.ubuntu.com/ubuntu/pool/universe/m/mono/mono-mjs_1.1.17.1-1ubuntu7.1_all.deb
Size/MD5: 26122
20dd25afee3f83dc1e212dc2a54edbe0
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-dev_1.1.17.1-1ubuntu7.1_amd64.deb
Size/MD5: 1145618
85857b8102b3228b8726582f246bd238
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono0_1.1.17.1-1ubuntu7.1_amd64.deb
Size/MD5: 871482
4fcf666e9b9f0c7bb8e3e95663b275dc
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-common_1.1.17.1-1ubuntu7.1_amd64.deb
Size/MD5: 93458
b2514c1e1400afd2206d34cd70757457
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-devel_1.1.17.1-1ubuntu7.1_amd64.deb
Size/MD5: 15892
998c84af3ffb55064621e67cb8bda067
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jay_1.1.17.1-1ubuntu7.1_amd64.deb
Size/MD5: 59986
4d773655db93dac648bee002aba38400
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jit_1.1.17.1-1ubuntu7.1_amd64.deb
Size/MD5: 752996
2f3ec0865a533e43a87147e642b183cd
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-runtime_1.1.17.1-1ubuntu7.1_amd64.deb
Size/MD5: 15860
ad0ebdc556e927546bec5dbb7d62b591
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-utils_1.1.17.1-1ubuntu7.1_amd64.deb
Size/MD5: 1164930
c9bc39cc32a10441c46e27757d198e51
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.17.1-1ubuntu7.1_amd64.deb
Size/MD5: 1260
53eed5f5714aaaaccfe1c9a74861df47
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-dev_1.1.17.1-1ubuntu7.1_i386.deb
Size/MD5: 1075932
b57808aa52e598c304d6d56718034bc5
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono0_1.1.17.1-1ubuntu7.1_i386.deb
Size/MD5: 831988
d6b3fc0b4c0fd8ea33867a54f80f380f
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-common_1.1.17.1-1ubuntu7.1_i386.deb
Size/MD5: 93020
51361081e622cbee1b3ba33f32cac0de
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-devel_1.1.17.1-1ubuntu7.1_i386.deb
Size/MD5: 15886
2b7381abbfd2e09c00bd3f32122e1028
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jay_1.1.17.1-1ubuntu7.1_i386.deb
Size/MD5: 53642
019d8e834568651b9949cff6ea44f292
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jit_1.1.17.1-1ubuntu7.1_i386.deb
Size/MD5: 697248
7f6db63e2fb5593c699c46717336f650
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-runtime_1.1.17.1-1ubuntu7.1_i386.deb
Size/MD5: 15856
7114e6d2c648d93df426fe75a9ead053
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-utils_1.1.17.1-1ubuntu7.1_i386.deb
Size/MD5: 1107016
bfc189007e62c2637f72b12372152949
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.17.1-1ubuntu7.1_i386.deb
Size/MD5: 1260
a8b2313e9bc6989a55ea25a909d3ff86
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-dev_1.1.17.1-1ubuntu7.1_powerpc.deb
Size/MD5: 1109028
dd4f5249b6439c99a4d5269222388059
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono0_1.1.17.1-1ubuntu7.1_powerpc.deb
Size/MD5: 832364
da661a458e1278c34528696457ede4c3
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-common_1.1.17.1-1ubuntu7.1_powerpc.deb
Size/MD5: 93896
5ff5eb7f165b6c2c2d82c0ab955c59a2
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-devel_1.1.17.1-1ubuntu7.1_powerpc.deb
Size/MD5: 15894
17a7d78602fbac998549caac69b33227
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jay_1.1.17.1-1ubuntu7.1_powerpc.deb
Size/MD5: 58712
74385f2f9d46556693082cf2fb6fca53
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jit_1.1.17.1-1ubuntu7.1_powerpc.deb
Size/MD5: 716246
6a0ed7f2c72f5d18757c397e4af2fc68
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-runtime_1.1.17.1-1ubuntu7.1_powerpc.deb
Size/MD5: 15862
b461f6b6676af3bd79a4dadfdda08ff2
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-utils_1.1.17.1-1ubuntu7.1_powerpc.deb
Size/MD5: 1160836
81deab21481bf57def0c1108be597101
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.17.1-1ubuntu7.1_powerpc.deb
Size/MD5: 1260
482c88080f1375e327e631b61adc6552
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono-dev_1.1.17.1-1ubuntu7.1_sparc.deb
Size/MD5: 1124674
01d7a962a0035faea6746e979d01776c
http://security.ubuntu.com/ubuntu/pool/main/m/mono/libmono0_1.1.17.1-1ubuntu7.1_sparc.deb
Size/MD5: 839334
b3be3cdabecdfaa375090127c04ef2d5
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-common_1.1.17.1-1ubuntu7.1_sparc.deb
Size/MD5: 93488
3bbf0e0433549db3a40d3a98081d9af8
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-devel_1.1.17.1-1ubuntu7.1_sparc.deb
Size/MD5: 15892
746e0b301c4017d9c38d54515eeb13d1
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jay_1.1.17.1-1ubuntu7.1_sparc.deb
Size/MD5: 56182
08a1b26440c074071129120adde393b7
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-jit_1.1.17.1-1ubuntu7.1_sparc.deb
Size/MD5: 704896
17189bf83898893b4da699653b1ed2a9
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-runtime_1.1.17.1-1ubuntu7.1_sparc.deb
Size/MD5: 15862
d18ac3cc83e94fe549c32d57bc512f65
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono-utils_1.1.17.1-1ubuntu7.1_sparc.deb
Size/MD5: 1110106
1de8dc45fdcd083a298e876a39e4c676
http://security.ubuntu.com/ubuntu/pool/main/m/mono/mono_1.1.17.1-1ubuntu7.1_sparc.deb
Size/MD5: 1260
91765ebd3ef94a7ba557aef413a86951