---

Advisories: September 1, 2005

Debian GNU/Linux


Debian Security Advisory DSA 779-2 [email protected]
http://www.debian.org/security/
Martin Schulze
September 1st, 2005 http://www.debian.org/security/faq


Package : mozilla-firefox
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2005-2260 CAN-2005-2261 CAN-2005-2262 CAN-2005-2263
CAN-2005-2264 CAN-2005-2265 CAN-2005-2266 CAN-2005-2267
CAN-2005-2268 CAN-2005-2269 CAN-2005-2270
BugTraq ID : 14242
Debian Bug : 318061

We experienced that the update for Mozilla Firefox from DSA
779-1 unfortunately was a regression in several cases. Since the
usual praxis of backporting apparently does not work, this update
is basically version 1.0.6 with the version number rolled back, and
hence still named 1.0.4-*. For completeness below is the original
advisory text:

Several problems have been discovered in Mozilla Firefox, a
lightweight web browser based on Mozilla. The Common
Vulnerabilities and Exposures project identifies the following
problems:

CAN-2005-2260

The browser user interface does not properly distinguish between
user-generated events and untrusted synthetic events, which makes
it easier for remote attackers to perform dangerous actions that
normally could only be performed manually by the user.

CAN-2005-2261

XML scripts ran even when Javascript disabled.

CAN-2005-2262

The user can be tricked to executing arbitrary JavaScript code
by using a JavaScript URL as wallpaper.

CAN-2005-2263

It is possible for a remote attacker to execute a callback
function in the context of another domain (i.e. frame).

CAN-2005-2264

By opening a malicious link in the sidebar it is possible for
remote attackers to steal sensitive information.

CAN-2005-2265

Missing input sanitising of InstallVersion.compareTo() can cause
the application to crash.

CAN-2005-2266

Remote attackers could steal sensitive information such as
cookies and passwords from web sites by accessing data in alien
frames.

CAN-2005-2267

By using standalone applications such as Flash and QuickTime to
open a javascript: URL, it is possible for a remote attacker to
steal sensitive information and possibly execute arbitrary
code.

CAN-2005-2268

It is possible for a Javascript dialog box to spoof a dialog box
from a trusted site and facilitates phishing attacks.

CAN-2005-2269

Remote attackers could modify certain tag properties of DOM
nodes that could lead to the execution of arbitrary script or
code.

CAN-2005-2270

The Mozilla browser familie does not properly clone base
objects, which allows remote attackers to execute arbitrary
code.

The old stable distribution (woody) is not affected by these
problems.

For the stable distribution (sarge) these problems have been
fixed in version 1.0.4-2sarge3.

For the unstable distribution (sid) these problems have been
fixed in version 1.0.6-1.

We recommend that you upgrade your Mozilla Firefox packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3.dsc

      Size/MD5 checksum: 1001
e9e343d5899bc10b64650464839db1dc
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3.diff.gz

      Size/MD5 checksum: 323682
3e07c7d42de155ed01210386bc2f06f7
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz

      Size/MD5 checksum: 40212297
8e4ba81ad02c7986446d4e54e978409d

Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_alpha.deb

      Size/MD5 checksum: 11162870
103e4b84e9d2052cb4260b96e41319aa
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_alpha.deb

      Size/MD5 checksum: 166886
906bfa51b6c0cb8966fe06aec2b5816e
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_alpha.deb

      Size/MD5 checksum: 58708
1b3025f62bb3cb67b32c73c9f20ac5ba

AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_amd64.deb

      Size/MD5 checksum: 9397790
6b14119f896013d55826cb59dac50c3b
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_amd64.deb

      Size/MD5 checksum: 161636
33635aa0e4e18a2f8868bb49969a37a6
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_amd64.deb

      Size/MD5 checksum: 57194
a46c10258c9929c8e9f8001838dc4fe4

ARM architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_arm.deb

      Size/MD5 checksum: 8216696
f39cae6e1e57a572c316c14cc6c0b3d6
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_arm.deb

      Size/MD5 checksum: 153076
c634b6a8d6f42008526607877071bcaa
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_arm.deb

      Size/MD5 checksum: 52548
04b5b1e840e77b56837e1991c11a9ff6

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_i386.deb

      Size/MD5 checksum: 8889628
c7730b4e3df2f6a0bb12186a52884a9e
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_i386.deb

      Size/MD5 checksum: 156844
806fd550f9a5283e4fab73443c73fbcd
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_i386.deb

      Size/MD5 checksum: 54096
9eb9d71896406a619bd186bfe10ed0f2

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_ia64.deb

      Size/MD5 checksum: 11617476
564858f6b1f36f84a1fa9e8c7cb71316
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_ia64.deb

      Size/MD5 checksum: 167224
b574fe291d5537628022434ef13c9587
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_ia64.deb

      Size/MD5 checksum: 61876
4625f067b0cdb1a0de04829a9edbc6d7

HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_hppa.deb

      Size/MD5 checksum: 10266194
05ebaf745a3854b8a4dc8dd0e1cff53c
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_hppa.deb

      Size/MD5 checksum: 164592
902df65efa25b497b99a62d1a38acc2e
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_hppa.deb

      Size/MD5 checksum: 57692
2221b941de975d360a6f2123d83a73ea

Motorola 680×0 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_m68k.deb

      Size/MD5 checksum: 8167252
23f5666813a7118b5a1e841337b2b9aa
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_m68k.deb

      Size/MD5 checksum: 155742
f46394239362846cfdbe2f2d316bbc18
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_m68k.deb

      Size/MD5 checksum: 53352
619ac605ca4c6d0b449f6b2652b76463

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_mips.deb

      Size/MD5 checksum: 9919620
0f246fc3335b23e9975d78b0f86a2682
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_mips.deb

      Size/MD5 checksum: 154596
90a7786ea46368235be9b052b07eb7d0
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_mips.deb

      Size/MD5 checksum: 54366
ccec0a41faf2945c6ec426311fe4bf77

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_mipsel.deb

      Size/MD5 checksum: 9803502
117b7e5ea7a0d7b78518218009024eaa
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_mipsel.deb

      Size/MD5 checksum: 154172
a090df008b2336d500d772cf538dbe3e
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_mipsel.deb

      Size/MD5 checksum: 54180
1dde88657a7740f8261f8804a5bc3a13

PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_powerpc.deb

      Size/MD5 checksum: 8561832
f6dd2ad6a53d96b8779fcecd022733ae
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_powerpc.deb

      Size/MD5 checksum: 155236
88e76f256f6aa39c93ca73b95141e6fc
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_powerpc.deb

      Size/MD5 checksum: 56482
1525d1b14855694f62110a8fd2ad4b61

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_s390.deb

      Size/MD5 checksum: 9635736
770eca99436ee1646cc9af8eb1f4bce4
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_s390.deb

      Size/MD5 checksum: 162228
c17de607a44ebdd3838d07a8d784f9b8
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_s390.deb

      Size/MD5 checksum: 56664
ead0e97932f0bc9ad8c756d46cf6540f

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_sparc.deb

      Size/MD5 checksum: 8651242
7b87e6d2fca175b70259035c0d5506cf
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_sparc.deb

      Size/MD5 checksum: 155458
2ae1ce848a6ea81a485f2f1240f894cc
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_sparc.deb

      Size/MD5 checksum: 52906
89b1bb81288c9fa1f156ba6354292484

These files will probably be moved into the stable distribution
on its next update.



Debian Security Advisory DSA 792-1 [email protected]
http://www.debian.org/security/
Martin Schulze
August 31st, 2005 http://www.debian.org/security/faq


Package : pstotext
Vulnerability : missing input sanitising
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2005-2536
BugTraq ID : 14378
Debian Bug : 319758

Max Vozeler discovered that pstotext, a utility to extract text
from PostScript and PDF files, did not execute ghostscript with the
-dSAFER argument, which prevents potential malicious operations to
happen.

For the old stable distribution (woody) this problem has been
fixed in version 1.8g-5woody1.

For the stable distribution (sarge) this problem has been fixed
in version 1.9-1sarge1.

For the unstable distribution (sid) this problem has been fixed
in version 1.9-2.

We recommend that you upgrade your pstotext package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1.dsc

      Size/MD5 checksum: 569
5e4999fac3cb50533b8fa55fa9b8d839
    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1.diff.gz

      Size/MD5 checksum: 5551
e8656ca1e70907515dea96f646defbeb
    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g.orig.tar.gz

      Size/MD5 checksum: 36193
dfabf95fffea52cc03d8728617ca1b1e

Alpha architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_alpha.deb

      Size/MD5 checksum: 33478
dc7994b7f762a99cda3f6e9eebfd5078

ARM architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_arm.deb

      Size/MD5 checksum: 31158
64eb3bb5eaf13a54356bd8b55212ac93

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_i386.deb

      Size/MD5 checksum: 31140
ed687aa111ef4d56fd7b2fb220f8118a

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_ia64.deb

      Size/MD5 checksum: 37056
7ac97b49306cf896bb3d62b6b076ecb0

HP Precision architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_hppa.deb

      Size/MD5 checksum: 32884
6e7b79977d550e6981b0a6849face1b9

Motorola 680×0 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_m68k.deb

      Size/MD5 checksum: 30124
5b23f0c04107d284c561d1621c4fd9d1

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_mips.deb

      Size/MD5 checksum: 32978
56283a3ef2931d2c4759c4c56218f83a

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_mipsel.deb

      Size/MD5 checksum: 32624
29ed7091abca377c4b91fa68d7bc48cb

PowerPC architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_powerpc.deb

      Size/MD5 checksum: 32082
c8b4af3f34d681f9dabe4ff31bf0434a

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_s390.deb

      Size/MD5 checksum: 31354
ce7f8f5b398350e9d779a847b7c5ef2f

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_sparc.deb

      Size/MD5 checksum: 35050
e6e74a1ccfc2cb7246911b2f0427609f

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1.dsc

      Size/MD5 checksum: 566
a4a25eaf8322a20742fb0eac628c096c
    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1.diff.gz

      Size/MD5 checksum: 7817
634b242dbb68cbb6cf1595e6fa390d0e
    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9.orig.tar.gz

      Size/MD5 checksum: 37461
64576e8a10ff5514e285d98b3898ae78

Alpha architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_alpha.deb

      Size/MD5 checksum: 34084
82b71b24a4248ea05d243aa1d7b00e7c

AMD64 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_amd64.deb

      Size/MD5 checksum: 33670
b5911eb9b067b55315dadfba9c8cb590

ARM architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_arm.deb

      Size/MD5 checksum: 32260
426147c50900aba089a9eb430e2094bb

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_i386.deb

      Size/MD5 checksum: 32632
e2f9a3859fe3061c85d4f1a54253062e

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_ia64.deb

      Size/MD5 checksum: 37624
76f3ed1bb870504692fe7fadbeb6e9b7

HP Precision architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_hppa.deb

      Size/MD5 checksum: 34282
7570594eef38d55ebb26e981c8de306b

Motorola 680×0 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_m68k.deb

      Size/MD5 checksum: 31370
b9bd589dbbaf0d516cefb4f0b40397be

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_mips.deb

      Size/MD5 checksum: 34196
ac148736eaeedd368b6114c79c45b569

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_mipsel.deb

      Size/MD5 checksum: 33800
f9bad656d356e522daf2de44c0cc5f26

PowerPC architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_powerpc.deb

      Size/MD5 checksum: 33408
1b7b3cf7e04b3bf313d798ee822f7e92

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_s390.deb

      Size/MD5 checksum: 32948
b10976913ca43591166801bb9844f096

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_sparc.deb

      Size/MD5 checksum: 32992
c15517e727b7c38adec0f5f85282c430

These files will probably be moved into the stable distribution
on its next update.



Debian Security Advisory DSA 793-1 [email protected]
http://www.debian.org/security/
Martin Schulze
September 1st, 2005 http://www.debian.org/security/faq


Package : courier
Vulnerability : missing input sanitising
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2005-2724
Debian Bug : 325631

Jakob Balle discovered a vulnerability in the handling of
attachments in sqwebmail, a web mail application provided by the
courier mail suite, which can be exploited by an attacker to
conduct script insertion attacks.

For the old stable distribution (woody) this problem has been
fixed in version 0.37.3-2.6.

For the stable distribution (sarge) this problem has been fixed
in version 0.47-4sarge2.

For the unstable distribution (sid) this problem has been fixed
in version 0.47-8.

We recommend that you upgrade your sqwebmail package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

    http://security.debian.org/pool/updates/main/c/courier/courier_0.37.3-2.6.dsc

      Size/MD5 checksum: 913
9e519251e523fe1c3cb5b13438e256b3
    http://security.debian.org/pool/updates/main/c/courier/courier_0.37.3-2.6.diff.gz

      Size/MD5 checksum: 33752
bbb1f5cd5cc2733f1701c11d3ceddd8c
    http://security.debian.org/pool/updates/main/c/courier/courier_0.37.3.orig.tar.gz

      Size/MD5 checksum: 3238013
350cbb2e8b5f384409bdf2a15d605bc9

Architecture independent components:

    http://security.debian.org/pool/updates/main/c/courier/courier-doc_0.37.3-2.6_all.deb

      Size/MD5 checksum: 313516
a3469989b9f87d801c0cf57b82c03992

Alpha architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_alpha.deb

      Size/MD5 checksum: 52394
7ec42f6b7295bc83c75af4304e789bf0
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_alpha.deb

      Size/MD5 checksum: 47382
3fe84b87d20bcb98668839c632bcec93
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_alpha.deb

      Size/MD5 checksum: 146346
eba3c70f277b77cbf6967682c28803a0
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_alpha.deb

      Size/MD5 checksum: 18722
f5d11f88b2a794e06eade45f99cb7e26
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_alpha.deb

      Size/MD5 checksum: 138930
89ac890ed0f87e2b8a8a5d6492884b3d
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_alpha.deb

      Size/MD5 checksum: 61412
cb466ea58f24047c922e3960cb130aea
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_alpha.deb

      Size/MD5 checksum: 208314
fbb919f360992f1763934c3dff8bb4c9
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_alpha.deb

      Size/MD5 checksum: 134286
c0671581a43c12e1765048e54a3ce4cd
    http://security.debian.org/pool/updates/main/c/courier/courier-mta_0.37.3-2.6_alpha.deb

      Size/MD5 checksum: 667730
8e4d8ad4784849c2f508651f551e8731
    http://security.debian.org/pool/updates/main/c/courier/courier-pcp_0.37.3-2.6_alpha.deb

      Size/MD5 checksum: 62448
89487843681f10de6ab3566b9ee77b34
    http://security.debian.org/pool/updates/main/c/courier/courier-pop_0.37.3-2.6_alpha.deb

      Size/MD5 checksum: 40272
142328be8e8d166cf0463eb343678e6c
    http://security.debian.org/pool/updates/main/c/courier/courier-webadmin_0.37.3-2.6_alpha.deb

      Size/MD5 checksum: 25438
63ab82aaf730c856edd39dbf590f9448
    http://security.debian.org/pool/updates/main/c/courier/sqwebmail_0.37.3-2.6_alpha.deb

      Size/MD5 checksum: 330060
2dd6d235a1f2fa46231a57a37b2e0c52

ARM architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_arm.deb

      Size/MD5 checksum: 47332
eb245ab25c60ecf56748f4ad5f056f28
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_arm.deb

      Size/MD5 checksum: 42482
376fe13c7e7711b58116f14ae84ac0eb
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_arm.deb

      Size/MD5 checksum: 128690
086cbcf2808d0205f73143269d482be8
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_arm.deb

      Size/MD5 checksum: 17680
2a01606c6f966a4b621b3ef47582cc7f
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_arm.deb

      Size/MD5 checksum: 124620
35d25cce087f13995ff391dd47be3672
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_arm.deb

      Size/MD5 checksum: 53664
c876cc961f7abbc4fe3aea64fb1b6f15
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_arm.deb

      Size/MD5 checksum: 180150
b61ceeded835975a125500d5b7869ee3
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_arm.deb

      Size/MD5 checksum: 116256
0a900c4c6ef1b8bf6fcace2b05db9719
    http://security.debian.org/pool/updates/main/c/courier/courier-mta_0.37.3-2.6_arm.deb

      Size/MD5 checksum: 549914
e71cf4a650e6294dbf804bd3594e476c
    http://security.debian.org/pool/updates/main/c/courier/courier-pcp_0.37.3-2.6_arm.deb

      Size/MD5 checksum: 55844
f767586e1436bc09f9a31d17d40952bf
    http://security.debian.org/pool/updates/main/c/courier/courier-pop_0.37.3-2.6_arm.deb

      Size/MD5 checksum: 35410
bd83bfeaca7763ecd4c27933241ebbdb
    http://security.debian.org/pool/updates/main/c/courier/courier-webadmin_0.37.3-2.6_arm.deb

      Size/MD5 checksum: 25072
91f0e9d2dc149f2974e5224d681c6a4b
    http://security.debian.org/pool/updates/main/c/courier/sqwebmail_0.37.3-2.6_arm.deb

      Size/MD5 checksum: 297696
979e0ada05175b1ea55766b843bca389

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_i386.deb

      Size/MD5 checksum: 46454
cea858a7fc92c44ff7d47dc5147dd8cb
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_i386.deb

      Size/MD5 checksum: 41806
ce5726f8f7f22621de326c762dcd778a
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_i386.deb

      Size/MD5 checksum: 128824
f2ed07143b7bf307a6ffa130f0dc0033
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_i386.deb

      Size/MD5 checksum: 17410
35fbc5b327ea0f282a74a83dcca3b3b6
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_i386.deb

      Size/MD5 checksum: 120708
d1a6f9601c698eaffc85f97b592ccbf1
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_i386.deb

      Size/MD5 checksum: 53092
a8fcbe05d2464fb502fce4d30e8e0d0c
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_i386.deb

      Size/MD5 checksum: 174988
56ba9e60fbf80fc4d4a9f82aaec04792
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_i386.deb

      Size/MD5 checksum: 109722
47673782fc8944cc41041746f942bc9e
    http://security.debian.org/pool/updates/main/c/courier/courier-mta_0.37.3-2.6_i386.deb

      Size/MD5 checksum: 539038
3ae864646fcac926383a82844ddaa0cc
    http://security.debian.org/pool/updates/main/c/courier/courier-pcp_0.37.3-2.6_i386.deb

      Size/MD5 checksum: 54364
10e1e39484866bebf67f99756a10cb82
    http://security.debian.org/pool/updates/main/c/courier/courier-pop_0.37.3-2.6_i386.deb

      Size/MD5 checksum: 35082
20921159c83171629c17c3e9b7822d7f
    http://security.debian.org/pool/updates/main/c/courier/courier-webadmin_0.37.3-2.6_i386.deb

      Size/MD5 checksum: 25178
8cf6453456d08b884808dc1c3a085a04
    http://security.debian.org/pool/updates/main/c/courier/sqwebmail_0.37.3-2.6_i386.deb

      Size/MD5 checksum: 285788
fe4c58864d039674717f3272728eb061

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_ia64.deb

      Size/MD5 checksum: 75572
500bdd75210e8433d6d93c171145fec5
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_ia64.deb

      Size/MD5 checksum: 70812
9a83880345ae6b874f9984472e41cc8e
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_ia64.deb

      Size/MD5 checksum: 193840
f1e6f14880eb25f6fed737425259ca1d
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_ia64.deb

      Size/MD5 checksum: 23052
8c2dcceaa257dded88b75005259d1b97
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_ia64.deb

      Size/MD5 checksum: 213886
c9c10b857c30685772d13a8fd1d0f058
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_ia64.deb

      Size/MD5 checksum: 87328
0f75f1a47adf402cfe569e041ef8fe62
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_ia64.deb

      Size/MD5 checksum: 271546
54f3a6a971512e5ef85182b5e0424a0a
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_ia64.deb

      Size/MD5 checksum: 151786
b026308dce20225e8007eeed9ca7944f
    http://security.debian.org/pool/updates/main/c/courier/courier-mta_0.37.3-2.6_ia64.deb

      Size/MD5 checksum: 967076
e3a677b9f2dee2a8bc9a301cd566873d
    http://security.debian.org/pool/updates/main/c/courier/courier-pcp_0.37.3-2.6_ia64.deb

      Size/MD5 checksum: 103674
52d7ce5b4022448730a843696b985dc3
    http://security.debian.org/pool/updates/main/c/courier/courier-pop_0.37.3-2.6_ia64.deb

      Size/MD5 checksum: 53766
eb18a9434a7e581dbf57ae5d7da74da1
    http://security.debian.org/pool/updates/main/c/courier/courier-webadmin_0.37.3-2.6_ia64.deb

      Size/MD5 checksum: 26084
9b23b1a9ba52e310f0222eb374160019
    http://security.debian.org/pool/updates/main/c/courier/sqwebmail_0.37.3-2.6_ia64.deb

      Size/MD5 checksum: 506748
0844a539589e9a69470dd4eccc6f22cd

HP Precision architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_hppa.deb

      Size/MD5 checksum: 48084
3016509184ab4df23a0ef7757ce43ae6
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_hppa.deb

      Size/MD5 checksum: 43380
681e8939cb88f981c8e514bdeecf661a
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_hppa.deb

      Size/MD5 checksum: 130426
4dc32c2cb9d55c8dc703ec99e3eb431d
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_hppa.deb

      Size/MD5 checksum: 17688
d62db41aa8a091dd496be2fc1e7a087e
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_hppa.deb

      Size/MD5 checksum: 125402
9205f3af9a4be297b3631fb02e43efba
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_hppa.deb

      Size/MD5 checksum: 54508
80762cc78a49c4b9cd396c5f2a8ad061
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_hppa.deb

      Size/MD5 checksum: 193654
fcba51cb2611fa1b01c8b3f6aa3e659f
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_hppa.deb

      Size/MD5 checksum: 151154
df48ee812d0b8c5b4104c3b8e3e46d1a
    http://security.debian.org/pool/updates/main/c/courier/courier-mta_0.37.3-2.6_hppa.deb

      Size/MD5 checksum: 643782
603b221454b30f016d32f072ccb72312
    http://security.debian.org/pool/updates/main/c/courier/courier-pcp_0.37.3-2.6_hppa.deb

      Size/MD5 checksum: 56332
401b82693059f5a182b95a37e4850f42
    http://security.debian.org/pool/updates/main/c/courier/courier-pop_0.37.3-2.6_hppa.deb

      Size/MD5 checksum: 35574
1d87382767d17adf22f369d392bba426
    http://security.debian.org/pool/updates/main/c/courier/courier-webadmin_0.37.3-2.6_hppa.deb

      Size/MD5 checksum: 25322
f829a2893d08040647b1e5b3f622117a
    http://security.debian.org/pool/updates/main/c/courier/sqwebmail_0.37.3-2.6_hppa.deb

      Size/MD5 checksum: 296802
6661b480bde2f01479693d9c7a13f087

Motorola 680×0 architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_m68k.deb

      Size/MD5 checksum: 45078
a4ed9e0ea6f11af11bcff46a454975a2
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_m68k.deb

      Size/MD5 checksum: 40416
65add681d2db24f62415f0cadd942857
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_m68k.deb

      Size/MD5 checksum: 125010
50257f1269914759687d78acfb8ed94e
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_m68k.deb

      Size/MD5 checksum: 17118
e88fe85b4ef61cee3b5bf5a9ddf70673
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_m68k.deb

      Size/MD5 checksum: 115000
f4c959fb35558e3af72028a7d7511495
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_m68k.deb

      Size/MD5 checksum: 51226
5d10b94a11d6f89ed4fee07f0e7af4da
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_m68k.deb

      Size/MD5 checksum: 167798
38df74f4759a042bd8393b0c432bada3
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_m68k.deb

      Size/MD5 checksum: 105330
fe260c3033006335863649887a2cc442
    http://security.debian.org/pool/updates/main/c/courier/courier-mta_0.37.3-2.6_m68k.deb

      Size/MD5 checksum: 506940
fdef732f3a636d4370e54bf62924b187
    http://security.debian.org/pool/updates/main/c/courier/courier-pcp_0.37.3-2.6_m68k.deb

      Size/MD5 checksum: 51768
64b0614d88613fd304c32791d18a0adc
    http://security.debian.org/pool/updates/main/c/courier/courier-pop_0.37.3-2.6_m68k.deb

      Size/MD5 checksum: 33862
9f4563455166469aadd0d9957bd20cba
    http://security.debian.org/pool/updates/main/c/courier/courier-webadmin_0.37.3-2.6_m68k.deb

      Size/MD5 checksum: 25110
4ecf9604d4ff3badb91cc5ead8cfba9d
    http://security.debian.org/pool/updates/main/c/courier/sqwebmail_0.37.3-2.6_m68k.deb

      Size/MD5 checksum: 271856
0afe8c8fdf41985cfaa382026921537e

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/c/courier/courier-authdaemon_0.37.3-2.6_mips.deb

      Size/MD5 checksum: 49390
8f41cbeb776fd8e158e3e500c416d520
    http://security.debian.org/pool/updates/main/c/courier/courier-authmysql_0.37.3-2.6_mips.deb

      Size/MD5 checksum: 44308
02fe11c81523759aeacf1ca3f4ae9380
    http://security.debian.org/pool/updates/main/c/courier/courier-base_0.37.3-2.6_mips.deb

      Size/MD5 checksum: 136346
609a09377e67ac7d9240c2364ea0e6e2
    http://security.debian.org/pool/updates/main/c/courier/courier-debug_0.37.3-2.6_mips.deb

      Size/MD5 checksum: 17760
0b01bf4c0621eb0a590b6d5cdf4bc104
    http://security.debian.org/pool/updates/main/c/courier/courier-imap_1.4.3-2.6_mips.deb

      Size/MD5 checksum: 128096
f0d5248b652c94d173c61d2b9c445a6f
    http://security.debian.org/pool/updates/main/c/courier/courier-ldap_0.37.3-2.6_mips.deb

      Size/MD5 checksum: 55704
84d8dbbb3f21eb4e1e9a357bae2e73a4
    http://security.debian.org/pool/updates/main/c/courier/courier-maildrop_0.37.3-2.6_mips.deb

      Size/MD5 checksum: 185894
eeb0fece26ce633914851042061eb954
    http://security.debian.org/pool/updates/main/c/courier/courier-mlm_0.37.3-2.6_mips.deb