Debian GNU/Linux
Debian Security Advisory DSA 1106-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
July 10th, 2006 http://www.debian.org/security/faq
Package : ppp
Vulnerability : programming error
Problem type : local
Debian-specific: no
CVE ID : CVE-2006-2194
Marcus Meissner discovered that the winbind plugin in pppd does
not check whether a setuid() call has been successful when trying
to drop privileges, which may fail with some PAM
configurations.
The old stable distribution (woody) is not affected by this
problem.
For the stable distribution (sarge) this problem has been fixed
in version 2.4.3-20050321+2sarge1.
For the unstable distribution (sid) this problem has been fixed
in version 2.4.4rel-1.
We recommend that you upgrade your ppp package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
Source archives:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1.dsc
Size/MD5 checksum: 633
1b8f1f8da7cf7b56c2c6e13e2072167d
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1.diff.gz
Size/MD5 checksum: 83359
1fd6996f800c3d323b159ca5ab587712
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3.orig.tar.gz
Size/MD5 checksum: 697459
0537b03fb51cbb847290abdbb765cb93
Architecture independent components:
http://security.debian.org/pool/updates/main/p/ppp/ppp-dev_2.4.3-20050321+2sarge1_all.deb
Size/MD5 checksum: 32072
77bab82e596987e60908f19c27bceeb6
Alpha architecture:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1_alpha.deb
Size/MD5 checksum: 393308
5f90be499af49912e7074c26979037db
AMD64 architecture:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1_amd64.deb
Size/MD5 checksum: 346172
ae546c9f5f4f0bc2fdebab8858c93731
ARM architecture:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1_arm.deb
Size/MD5 checksum: 326134
aab781148123790027eb4bf114cc8df9
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1_i386.deb
Size/MD5 checksum: 324274
759537119b8680ed4e27ae09a52a65aa
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1_ia64.deb
Size/MD5 checksum: 437432
8a0acb4779046622af9c27a6307fa305
HP Precision architecture:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1_hppa.deb
Size/MD5 checksum: 357572
5c415d1e9a6e31fdb01b2eb7f8f1065f
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1_m68k.deb
Size/MD5 checksum: 305432
4e7f194f247899a3d20280eca53e41ba
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1_mips.deb
Size/MD5 checksum: 348852
aca3c70a1be8c013a48e6d939ebe036a
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1_mipsel.deb
Size/MD5 checksum: 351084
7cd743087a4155ff0d9e8085cbee7dbf
PowerPC architecture:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1_powerpc.deb
Size/MD5 checksum: 351188
60f69689787965812f891df34371600a
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1_s390.deb
Size/MD5 checksum: 343302
65648a90f1ab9abb71121ceeb9bb98a5
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/p/ppp/ppp_2.4.3-20050321+2sarge1_sparc.deb
Size/MD5 checksum: 329684
1df0e5a6621da5344bdb91a1fd4eef3e
These files will probably be moved into the stable distribution
on its next update.
Debian Security Advisory DSA 1107-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
July 10th, 2006 http://www.debian.org/security/faq
Package : gnupg
Vulnerability : integer overflow
Problem type : local (remote)
Debian-specific: no
CVE ID : CVE-2006-3082
Evgeny Legerov discovered that gnupg, the GNU privacy guard, a
free PGP replacement contains an integer overflow that can cause a
segmentation fault and possibly overwrite memory via a large user
ID strings.
For the old stable distribution (woody) this problem has been
fixed in version 1.0.6-4woody6.
For the stable distribution (sarge) this problem has been fixed
in version 1.4.1-1.sarge4.
For the unstable distribution (sid) this problem has been fixed
in version 1.4.3-2.
We recommend that you upgrade your gnupg package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6.dsc
Size/MD5 checksum: 577
40a60f7ff8a7c36e4ffb308caa350e70
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6.diff.gz
Size/MD5 checksum: 8597
add04b0a8c391de7134cca7c943d15d9
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6.orig.tar.gz
Size/MD5 checksum: 1941676
7c319a9e5e70ad9bc3bf0d7b5008a508
Alpha architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6_alpha.deb
Size/MD5 checksum: 1151184
3c46ca0e7a42f819619ba2a021a38eb9
ARM architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6_arm.deb
Size/MD5 checksum: 987554
843109424859d6a1006898419d6d642e
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6_i386.deb
Size/MD5 checksum: 966904
8ffd681040a2d466389f058e25ae29ae
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6_ia64.deb
Size/MD5 checksum: 1272488
5dcf85dd73bd2015438fd995a16762e5
HP Precision architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6_hppa.deb
Size/MD5 checksum: 1060316
22496f4150fd2334f7504deff0c474a1
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6_m68k.deb
Size/MD5 checksum: 942994
bc7eede5abdcbe721ff81a5e242ebfb6
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6_mips.deb
Size/MD5 checksum: 1036510
5e5824568a6a4b50851513c27db5a139
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6_mipsel.deb
Size/MD5 checksum: 1036966
792c1f9b0f61349001a789b08bf862d8
PowerPC architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6_powerpc.deb
Size/MD5 checksum: 1010208
6f1b3a058b7afab16a35ccba4d6b107e
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6_s390.deb
Size/MD5 checksum: 1002808
80b5ca38f239a23c8e2119b39966279b
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody6_sparc.deb
Size/MD5 checksum: 1003856
aa89804a111cdbede9845a8eb179f9d2
Debian GNU/Linux 3.1 alias sarge
Source archives:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4.dsc
Size/MD5 checksum: 680
006a79b9793ba193aa227850c11984dd
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4.diff.gz
Size/MD5 checksum: 20197
488b0289778532beb0608b8dca7982a7
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1.orig.tar.gz
Size/MD5 checksum: 4059170
1cc77c6943baaa711222e954bbd785e5
Alpha architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4_alpha.deb
Size/MD5 checksum: 2155794
cb1d024d2cae8c132bafe3422a2d1b3e
AMD64 architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4_amd64.deb
Size/MD5 checksum: 1963478
d0d3432b4b5968d2f837414b4202afe9
ARM architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4_arm.deb
Size/MD5 checksum: 1899338
b670611700f39489ea99517eb50678a9
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4_i386.deb
Size/MD5 checksum: 1908580
0f8623e8b3a59e9c8101fa2f7c23f576
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4_ia64.deb
Size/MD5 checksum: 2325178
fb8ba4735f0769f7c21e974321bd7c89
HP Precision architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4_hppa.deb
Size/MD5 checksum: 2003982
14149a1cee79407a1f99e5ae340dd501
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4_m68k.deb
Size/MD5 checksum: 1811020
dc751374cc6f994782e7de9ed5fd77ea
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4_mips.deb
Size/MD5 checksum: 2000688
0d44abe0cc416c06d63699a6c77b232d
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4_mipsel.deb
Size/MD5 checksum: 2007524
e59ad95cf552d2a4cb31a11b4db50147
PowerPC architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4_powerpc.deb
Size/MD5 checksum: 1957934
62443926a7a4fe049e62a8515a0ecb27
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4_s390.deb
Size/MD5 checksum: 1967012
a6b8d7173799fc57e46456a305f97d78
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge4_sparc.deb
Size/MD5 checksum: 1897410
6f793e910bb6a793c96c875059626914
These files will probably be moved into the stable distribution
on its next update.
Debian Security Advisory DSA 1108-1 security@debian.org
http://www.debian.org/security/
Moritz Muehlenhoff
Jul 11th, 2006 http://www.debian.org/security/faq
Package : mutt
Vulnerability : buffer overflow
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2006-3242
Debian Bug : 375828
It was discovered that the mutt mail reader performs
insufficient validation of values returned from an IMAP server,
which might overflow a buffer and potentially lead to the injection
of arbitrary code.
For the stable distribution (sarge) this problem has been fixed
in version 1.5.9-2sarge2.
For the unstable distribution (sid) this problem has been fixed
in version 1.5.11+cvs20060403-2.
We recommend that you upgrade your mutt package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
Source archives:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2.dsc
Size/MD5 checksum: 775
6dded70d1b853282f90168f83a3da833
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2.diff.gz
Size/MD5 checksum: 94233
7c72a620b8772515556b986bfb93b0fb
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9.orig.tar.gz
Size/MD5 checksum: 3033253
587dd1d8f44361b73b82ef64eb30c3a0
Alpha architecture:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_alpha.deb
Size/MD5 checksum: 1530480
f93c6b6e3d599a00d8927cc67c1ce691
AMD64 architecture:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_amd64.deb
Size/MD5 checksum: 1442518
aeb593803115ca292f2112fbf44106fc
ARM architecture:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_arm.deb
Size/MD5 checksum: 1420526
569e402f7715c2116d0445dedd8a419f
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_i386.deb
Size/MD5 checksum: 1416838
e38785e2498fca52d8a7bbefae26fa94
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_ia64.deb
Size/MD5 checksum: 1626542
2aa9e0061439f25598ce205ef680acc1
HP Precision architecture:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_hppa.deb
Size/MD5 checksum: 1467244
5731fe300b59d268423108e5073c29ac
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_m68k.deb
Size/MD5 checksum: 1370346
a9acf01e90144e69d06f5ab94984e3fa
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_mips.deb
Size/MD5 checksum: 1474126
ed6c9bd33b9f3173dac03c9bc8da120a
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_mipsel.deb
Size/MD5 checksum: 1472642
b1693682bf38da32054e638c37b6ab56
PowerPC architecture:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_powerpc.deb
Size/MD5 checksum: 1446202
6226966d71933436a2909dfc9a9c57a8
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_s390.deb
Size/MD5 checksum: 1444064
50bcd604cf4ebe69d4bd4e11c44cdb88
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_sparc.deb
Size/MD5 checksum: 1417006
056963151226667c293f13c4b8a2db88
These files will probably be moved into the stable distribution
on its next update.
For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>
Ubuntu Linux
Ubuntu Security Notice USN-312-1 July 10, 2006
gimp vulnerability
CVE-2006-3404
A security issue affects the following Ubuntu releases:
Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 5.04:
gimp 2.2.2-1ubuntu5.1
libgimp2.0 2.2.2-1ubuntu5.1
Ubuntu 5.10:
gimp 2.2.8-2ubuntu6.1
libgimp2.0 2.2.8-2ubuntu6.1
Ubuntu 6.06 LTS:
gimp 2.2.11-1ubuntu3.1
libgimp2.0 2.2.11-1ubuntu3.1
In general, a standard system upgrade is sufficient to effect
the necessary changes.
Details follow:
Henning Makholm discovered that gimp did not sufficiently
validate the ‘num_axes’ parameter in XCF files. By tricking a user
into opening a specially crafted XCF file with Gimp, an attacker
could exploit this to execute arbitrary code with the user’s
privileges.
Updated packages for Ubuntu 5.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1.diff.gz
Size/MD5: 25366
1c89e7a4876c8922baf9c3be9cce72b9
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1.dsc
Size/MD5: 1053
41cbd27c48207a245d8486d37c3bea44
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2.orig.tar.gz
Size/MD5: 20151209
eccbe0b2438be095222a6723e57c51a3
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-data_2.2.2-1ubuntu5.1_all.deb
Size/MD5: 2057404
4d2655688e65317c1cce1f7938c415b3
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp1.2_2.2.2-1ubuntu5.1_all.deb
Size/MD5: 23028
c55d030036cc817eba07f15a31cd2ab9
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-doc_2.2.2-1ubuntu5.1_all.deb
Size/MD5: 516766
2bddbe64aae9009428e16f40ff0ac92c
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.2-1ubuntu5.1_amd64.deb
Size/MD5: 34686
1491899331d67c323414df5625b378ad
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.2-1ubuntu5.1_amd64.deb
Size/MD5: 114452
c0d1e1ea2cb6ec1ed06b6327a91e5da6
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.2-1ubuntu5.1_amd64.deb
Size/MD5: 34686
c3726bb2cf00dc202439253ab8e5f47f
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1_amd64.deb
Size/MD5: 3138104
4cbd06980a263a956eaf2ed8a61fae14
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.2-1ubuntu5.1_amd64.deb
Size/MD5: 90072
e876c374828beb7951d8d1bb6323ef00
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.2-1ubuntu5.1_amd64.deb
Size/MD5: 434012
4ef7e7e58e45d192a8877747c432efdf
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.2-1ubuntu5.1_i386.deb
Size/MD5: 33386
e3249682facaedc43430c2a02f55be4f
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.2-1ubuntu5.1_i386.deb
Size/MD5: 108648
883b24c54ef4fec71777d601eca58b64
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.2-1ubuntu5.1_i386.deb
Size/MD5: 33806
ff701d78ebb13b876ea4651a00e06dce
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1_i386.deb
Size/MD5: 2822064
333aba3cca28c59606ef01e688a98fdc
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.2-1ubuntu5.1_i386.deb
Size/MD5: 90074
13fa37935cb5334bd13406119f326bee
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.2-1ubuntu5.1_i386.deb
Size/MD5: 404102
a9812964cf7257f5ae9609a95efb6a0f
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.2-1ubuntu5.1_powerpc.deb
Size/MD5: 34918
d46155c0c3ec7e265972c27156255595
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.2-1ubuntu5.1_powerpc.deb
Size/MD5: 110434
d0c4290c8a30db183db627df47b901ce
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.2-1ubuntu5.1_powerpc.deb
Size/MD5: 35606
c8f11092c804ba676de10fb0ee0206e5
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.2-1ubuntu5.1_powerpc.deb
Size/MD5: 3208564
ee4badf2b0ccaebd84dabeb123f5e98a
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.2-1ubuntu5.1_powerpc.deb
Size/MD5: 90100
073cc2a24d7be2923c1a1750661bbc9e
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.2-1ubuntu5.1_powerpc.deb
Size/MD5: 428626
65b3e8b890dbcf005442c935a061169d
Updated packages for Ubuntu 5.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.8-2ubuntu6.1.diff.gz
Size/MD5: 30972
004d46b2721db233a1037378a76ad219
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.8-2ubuntu6.1.dsc
Size/MD5: 1084
e1f078639ad1201614e0c830fad88f61
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.8.orig.tar.gz
Size/MD5: 20529098
4d543228967a8d33a8276339c40ffe64
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-data_2.2.8-2ubuntu6.1_all.deb
Size/MD5: 2079192
d100e3e9b066e18a9fc1358237eecc90
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp1.2_2.2.8-2ubuntu6.1_all.deb
Size/MD5: 34806
ffd1badac2770f6f7fd2af0382a8d4f0
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-doc_2.2.8-2ubuntu6.1_all.deb
Size/MD5: 519014
5557d213c447c8719475b63b4f275570
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.8-2ubuntu6.1_amd64.deb
Size/MD5: 46334
cf5aa30f0a710e0a2a5d3b5d1f31de82
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.8-2ubuntu6.1_amd64.deb
Size/MD5: 126774
57b5c7fb31d5fd4c7a893a46aa9f59c8
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.8-2ubuntu6.1_amd64.deb
Size/MD5: 46420
f8540a7d00dc18d5d014c9c5d571a280
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.8-2ubuntu6.1_amd64.deb
Size/MD5: 3178830
1d4a121e227396c6c67558dd62c3e66e
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.8-2ubuntu6.1_amd64.deb
Size/MD5: 101984
04238d839cba2fb1f62e12178f27f06f
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.8-2ubuntu6.1_amd64.deb
Size/MD5: 446672
49cc4af975ae1820ac27431f0dfc382b
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.8-2ubuntu6.1_i386.deb
Size/MD5: 45178
32211947773168a74e8a32a96f1d7977
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.8-2ubuntu6.1_i386.deb
Size/MD5: 119216
9c8ea7d961f3008894ae311c88c51a4a
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.8-2ubuntu6.1_i386.deb
Size/MD5: 45512
181b1d11a870434b6143a05f817abba3
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.8-2ubuntu6.1_i386.deb
Size/MD5: 2805454
3751247190e54a478dd3e4bd09ec1d01
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.8-2ubuntu6.1_i386.deb
Size/MD5: 101976
01cf59d7bd98979b7f4731a156454c8d
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.8-2ubuntu6.1_i386.deb
Size/MD5: 403820
e1d8643a2f489f570ec4cbff690de43e
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.8-2ubuntu6.1_powerpc.deb
Size/MD5: 46774
283d55a3942da3e25f91222292256260
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.8-2ubuntu6.1_powerpc.deb
Size/MD5: 122710
d73fc3e1820c125e18af9bc5f546c489
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.8-2ubuntu6.1_powerpc.deb
Size/MD5: 47426
9640175231edeb56cefbcd1b2b64942c
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.8-2ubuntu6.1_powerpc.deb
Size/MD5: 3263286
21ee97ed61ca4cf5814c4c16bfa25390
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.8-2ubuntu6.1_powerpc.deb
Size/MD5: 102008
6155784e2c64ec20a2e2dedb207b835b
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.8-2ubuntu6.1_powerpc.deb
Size/MD5: 438484
9ecff496283a2ce8eb1c80ecfe462e39
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.8-2ubuntu6.1_sparc.deb
Size/MD5: 45234
69d43426f6ad3b9df471a8f6cf17ce7a
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.8-2ubuntu6.1_sparc.deb
Size/MD5: 120352
1ef0f1997cd115e06c0e70afdc7ae3ec
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.8-2ubuntu6.1_sparc.deb
Size/MD5: 45708
c8b2309d4456cec39618f02e203ff701
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.8-2ubuntu6.1_sparc.deb
Size/MD5: 2876458
7bc16fd12c4388293176983a874785f4
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.8-2ubuntu6.1_sparc.deb
Size/MD5: 101994
a0875688cfcdc478b88a8bd0488435f8
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.8-2ubuntu6.1_sparc.deb
Size/MD5: 422928
e0ba6fd3923075ee5856dd7bbcb47b01
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.11-1ubuntu3.1.diff.gz
Size/MD5: 33861
004dcc1835345fc1d474f6fa2dbf15ab
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.11-1ubuntu3.1.dsc
Size/MD5: 1266
d353df1f507926d72eedaba11c564932
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.11.orig.tar.gz
Size/MD5: 18549092
c4312189e3a7f869a26874854dc6a1d7
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-data_2.2.11-1ubuntu3.1_all.deb
Size/MD5: 2093412
4cdda893bedc7e4e8cecdfd68b73cc04
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-doc_2.2.11-1ubuntu3.1_all.deb
Size/MD5: 527466
8edee6915a0ad1a6d45a14ab8ecc847a
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-dbg_2.2.11-1ubuntu3.1_amd64.deb
Size/MD5: 8473344
1a6612ca5386e16e44adc93554c2567e
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.11-1ubuntu3.1_amd64.deb
Size/MD5: 53096
665807789fecc435294fdda90d58fe35
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.11-1ubuntu3.1_amd64.deb
Size/MD5: 133490
2cb5b3d370051bad846a5963fbccaf24
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.11-1ubuntu3.1_amd64.deb
Size/MD5: 53156
148b06d4fc0661241adbf234c4f814fa
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.11-1ubuntu3.1_amd64.deb
Size/MD5: 3147966
763f65666e85c50004284d518ccfc4f5
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.11-1ubuntu3.1_amd64.deb
Size/MD5: 108734
16ad76637519d42d8afdc780978db281
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.11-1ubuntu3.1_amd64.deb
Size/MD5: 453440
620657d5342af6e5fb9736b56c49e322
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-dbg_2.2.11-1ubuntu3.1_i386.deb
Size/MD5: 7197248
997dcf3438d2df3f97515b57069b0a6d
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.11-1ubuntu3.1_i386.deb
Size/MD5: 51792
37ea6be3a30463338060e70a4de58ec0
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.11-1ubuntu3.1_i386.deb
Size/MD5: 125872
ce230923c066949ec6314b50a666484c
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.11-1ubuntu3.1_i386.deb
Size/MD5: 52220
0a094c0178ed7034404a87e391f66f73
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.11-1ubuntu3.1_i386.deb
Size/MD5: 2777714
4faf75153a46135a8d8c7b9d6b10c986
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.11-1ubuntu3.1_i386.deb
Size/MD5: 108758
b4ed9b42f95fc07aa809fc49e2538ba8
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.11-1ubuntu3.1_i386.deb
Size/MD5: 410296
0725cc03751a2bbcee0707a0975bc2ed
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-dbg_2.2.11-1ubuntu3.1_powerpc.deb
Size/MD5: 8506604
46a43967bff3eb77bf8a2018208fc847
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.11-1ubuntu3.1_powerpc.deb
Size/MD5: 53564
b44a95cf20502d19c8e331c8577c07d8
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.11-1ubuntu3.1_powerpc.deb
Size/MD5: 129400
986c1e4c82efc7c81a7aa7b72e44d90a
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.11-1ubuntu3.1_powerpc.deb
Size/MD5: 54222
2efc43f1a03e224bd342514b0d01a799
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.11-1ubuntu3.1_powerpc.deb
Size/MD5: 3229098
e500ce8a902d0837ec4d19f7b511c3ba
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.11-1ubuntu3.1_powerpc.deb
Size/MD5: 108760
153b87573a51321a5d1ecd5cfc0f0698
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.11-1ubuntu3.1_powerpc.deb
Size/MD5: 444870
b5bb55e95bb99d6b091a52a06997ddcd
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-dbg_2.2.11-1ubuntu3.1_sparc.deb
Size/MD5: 7493990
d1a7b839cf5ede21cdb9017d031fd404
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-helpbrowser_2.2.11-1ubuntu3.1_sparc.deb
Size/MD5: 51956
209e08ed952a02a16acbe32de2cdc760
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp-python_2.2.11-1ubuntu3.1_sparc.deb
Size/MD5: 127186
36c4e2ec85bce5a19d8dac0573bf0436
http://security.ubuntu.com/ubuntu/pool/universe/g/gimp/gimp-svg_2.2.11-1ubuntu3.1_sparc.deb
Size/MD5: 52422
908d3b06661d753ccbc7f445080aeb14
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/gimp_2.2.11-1ubuntu3.1_sparc.deb
Size/MD5: 2821484
2a90f76cb39506c026577a1ecdad031d
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0-dev_2.2.11-1ubuntu3.1_sparc.deb
Size/MD5: 108758
07790df1c789e274534c5506e463288f
http://security.ubuntu.com/ubuntu/pool/main/g/gimp/libgimp2.0_2.2.11-1ubuntu3.1_sparc.deb
Size/MD5: 428780
86eaed52e36beb83a3eef41f21f810a9