[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SEGURANÇA] [DSA-030-1] Múltiplos problemas de segurança no X



 O original data de 12 de Fevereiro de 2001, mas essa mensagem somente
pode ser traduzida em 23 de Fevereiro de 2001.
------------------------------------------------------------------------
Informativo de Segurança do Debian DSA-030-1         security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
12 de Fevereiro de 2001.
------------------------------------------------------------------------


Pacote              : xfree86-1
Vulnerabilidade     : buffer overflow, manuseio inseguro de arquivo
                      temporário, ataque de negação de serviço
Específico do Debian: não

Chris Evans, Joseph S. Myers, Michal Zalewski, Alan Cox, e outros
notaram inúmeros problemas em diversos componentes da implementação de
amostra do X Window System (da qual o XFree86 é derivado). Enquanto não
existem relatos de exploits maliciosos no mundo real de qualquer desses
problemas, é, contudo, sugerido que você atualize seus pacotes do
XFree86 imediatamente. 

O escopo desse informativo é o XFree86 3.3.6 apenas, porque essa é a
versão liberada com o Debian/GNU Linux 2.2 ("potato"); pacotes Debian do
XFree86 4.0 e posteriores não foram liberados como parte da distribuição
Debian.

Várias pessoas são responsáveis pela autoria das correções para esses
problemas, incluindo Aaron Campbell, Paulo Cesar Pereira de Andrade,
Keith Packard, David Dawes, Matthieu Herrb, Trevor Johnson, Colin
Phipps, e Branden Robinson.

- - Os servidores X são vulneráveis a ataques de negação de serviço
    durante negociações do protocolo XC-SECURITY.
    Vulnerável: Debian 2.2, Debian 2.2r1, Debian 2.2r2

- - Clientes X baseados na Xlib (a maioria deles é) são sujeitos a
    buffer overflows em potencial nas funções _XReply() e _XAsyncReply
    se eles conectam-se a servidores X escritos maliciosamente que
    colocam dados falsos em suas respostas de protocolo.

  NOTA: Isso é apenas um ataque efetivo a clientes X rodando com
  privilégios elevados (programas setuid ou setgid), e oferece acesso em
  potencial apenas ao privilégio elevado. Por exemplo, o cliente X
  setuid mais comum é provavelmente o xterm. Em vários sistemas Unix, o
  xterm é setuid root; no Debian 2.2, ele é apenas setgid utmp, o que
  significa que um exploit efetivo é limitado a corromper os arquivos
  lastlog, utmp e wtmp -- *não* acesso root geral. Também note que um
  atacante deve previamente possuir privilégios suficientes para iniciar
  tal cliente X e conectar-se ao servidor X com sucesso.
  Vulnerável: Debian 2.2, Debian 2.2r1, Debian 2.2r2

- - Existe um buffer overflow (não baseado na pilha) no código XDMCP do
    xdm.
    Vulnerável: Debian 2.2, Debian 2.2r1, Debian 2.2r2

- - Existe um overflow de 1 byte em Xtrans.c.
    Vulnerável: Debian 2.2, Debian 2.2r1, Debian 2.2r2

- - Xtranssock.c é também sujeito a problemas com buffer overflows.
    Vulnerável: Debian 2.2, Debian 2.2r1, Debian 2.2r2

- - Existe um buffer overflow na flag -xkbmap do servidor X.
    Vulnerável: Debian 2.2, Debian 2.2r1, Debian 2.2r2

- - O widget MultiSrc na biblioteca widget Athena manuseia arquivos
    temporários inseguramente.
    Vulnerável: Debian 2.2, Debian 2.2r1, Debian 2.2r2

- - O programa imake manuseia arquivos temporários inseguramente quando
    executa regras de instalação.
    Vulnerável: Debian 2.2, Debian 2.2r1, Debian 2.2r2

- - A biblioteca ICE é sujeita a ataques por buffer overflow.
    Vulnerável: Debian 2.2, Debian 2.2r1, Debian 2.2r2

- - O programa xauth manuseia arquivos temporários inseguramente.
    Vulnerável: Debian 2.2, Debian 2.2r1, Debian 2.2r2

- - A função XauLock() da biblioteca Xau manuseia arquivos temporários
    inseguramente. 
    Vulnerável: Debian 2.2, Debian 2.2r1, Debian 2.2r2

- - Os programas gccmakedep e makedepend manuseiam arquivos temporários
    inseguramente.
    Vulnerável: Debian 2.2, Debian 2.2r1, Debian 2.2r2

Todas as questões acima foram resolvidas por essa release de segurança.

Há diversas outras questões de segurança do XFree86 geralmente
discutidas em conjunto com as acima, as quais um sistema Debian 2.2
atualizado *NÃO* é vulnerável:

- - Há 4 problemas distintos com a função XOpenDisplay() da Xlib em que
    um servidor X escrito maliciosamente poderia causar um ataque de
    negação de serviço ou um buffer overflow. Como antes, isso é apenas
    um ataque efetivo contra clientes X rodando com privilégios
    elevados, e o atacante deve previamente ter privilégios suficientes
    para iniciar tal cliente X e conectar-se ao servidor X com sucesso.
    O Debian 2.2 e 2.2r1 são vulneráveis a apenas um desses problemas,
    porque nós aplicamos correções no XFree86 3.3.6 para corrigir os
    outros três. Uma correção adicional aplicada ao Debian 2.2r2
    corrigiu a quarta.
    Vulnerável: Debian 2.2, Debian 2.2r1

- - O widget AsciiSrc na biblioteca widget Athena manuseia arquivos
    temporários inseguramente. O Debian 2.2r2 não é vulnerável a isso
    porque nós aplicamos uma correção.
    Vulnerável: Debian 2.2, Debian 2.2r1

- - O programa imake usa mktemp() ao invés de mkstemp(). Esse problema
    não existe no XFree86 3.3.6, e portanto nenhuma release do Debian
    2.2 é afetada.

Esses problemas foram corrigidos na versão 3.3.6-11potato32 e nós
recomendamos que você atualize seus pacotes X imediatamente.

wget url
        baixará o arquivo para você
dpkg -i arquivo.deb
        instalará o arquivo mencionado.

Debian GNU/Linux 2.2 codinome potato
- ---------------------------------

  Potato foi liberado para as arquiteturas alpha, arm, i386, m68k,
  powerpc e sparc. Nesse momento não há pacotes m68k disponíveis. Uma
  vez disponíveis serão anunciados em http://security.debian.org .
  
  
  Arquivos do código-fonte:
    
http://security.debian.org/dists/stable/updates/main/source/xfree86-1_3.3.6-11potato32.diff.gz
      MD5 checksum: 69cc55bd586d711c23c64e86f4a0a39a
    
http://security.debian.org/dists/stable/updates/main/source/xfree86-1_3.3.6-11potato32.dsc
      MD5 checksum: 1865df3421c2f9f41d08b9848c5c866a
    
http://security.debian.org/dists/stable/updates/main/source/xfree86-1_3.3.6.orig.tar.gz
      MD5 checksum: c4669bc60748021d9432e709286f6e4f

  Arquivos independentes de arquitetura:
    
http://security.debian.org/dists/stable/updates/main/binary-all/rstart_3.3.6-11potato32_all.deb
      MD5 checksum: c8b22fe902e1aa8a7a060e6583006687
    
http://security.debian.org/dists/stable/updates/main/binary-all/xbase_3.3.6-11potato32_all.deb
      MD5 checksum: 000d8ff1f045fb672011f6be512fa70a
    
http://security.debian.org/dists/stable/updates/main/binary-all/xfree86-common_3.3.6-11potato32_all.deb
      MD5 checksum: ae0366e2ccfd3b67604639eb4a937a55

  Arquitetura Alpha:
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/rstartd_3.3.6-11potato32_alpha.deb
      MD5 checksum: 7016eb78b364e47dd060c51e7b068a47
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/twm_3.3.6-11potato32_alpha.deb
      MD5 checksum: 6c7a7db332fc0bc1e6015c6f48a07354
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xbase-clients_3.3.6-11potato32_alpha.deb
      MD5 checksum: 133aaf41be70205abed442076afef7c4
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xdm_3.3.6-11potato32_alpha.deb
      MD5 checksum: 6b832ec44b17f0736d607d1a07fec93b
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xext_3.3.6-11potato32_alpha.deb
      MD5 checksum: f83f3ee576eee40736810065c2981606
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xf86setup_3.3.6-11potato32_alpha.deb
      MD5 checksum: 13d82d3fa7b0fc08f1a8e121c7be5ae1
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xfs_3.3.6-11potato32_alpha.deb
      MD5 checksum: fe9b269fe871f79f32ec5ed136341220
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xlib6g-dev_3.3.6-11potato32_alpha.deb
      MD5 checksum: d1c7bc79b308c640806d004450ee681f
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xlib6g-static_3.3.6-11potato32_alpha.deb
      MD5 checksum: 1f610de0a57488210c863becde75c3b9
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xlib6g_3.3.6-11potato32_alpha.deb
      MD5 checksum: 8f966a797732527914e0c69c9ddccd2e
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xmh_3.3.6-11potato32_alpha.deb
      MD5 checksum: 90791ebb652da5e8633e3f22173ee3ee
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xnest_3.3.6-11potato32_alpha.deb
      MD5 checksum: 513b94c445752986a7af3cb2dbee69ec
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xproxy_3.3.6-11potato32_alpha.deb
      MD5 checksum: c8149f37106daac11e3721ff189429c4
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xprt_3.3.6-11potato32_alpha.deb
      MD5 checksum: 7cba0fd69aa39934f1aa855103d5ab32
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xserver-3dlabs_3.3.6-11potato32_alpha.deb
      MD5 checksum: 9520a673ce7cb87eb0a84752d850dca3
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xserver-common_3.3.6-11potato32_alpha.deb
      MD5 checksum: 4faba513d9a29061378756ad491380b1
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xserver-fbdev_3.3.6-11potato32_alpha.deb
      MD5 checksum: 554faa5df6a7e7752bb41dbafaa13683
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xserver-i128_3.3.6-11potato32_alpha.deb
      MD5 checksum: b3c56c3140475ecd6f1f1ea90917731f
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xserver-mach64_3.3.6-11potato32_alpha.deb
      MD5 checksum: ad5474c1b98263db4984433d1b2fe6cb
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xserver-mono_3.3.6-11potato32_alpha.deb
      MD5 checksum: 3e3209f18e8fe3133976fbd34d10854a
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xserver-p9000_3.3.6-11potato32_alpha.deb
      MD5 checksum: d79c01d56e54457e10c0db1e252abb11
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xserver-s3_3.3.6-11potato32_alpha.deb
      MD5 checksum: 9d8aaee346d92200dcfbac3fdeb5e849
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xserver-s3v_3.3.6-11potato32_alpha.deb
      MD5 checksum: 019093d1f6c099e7a314fd7c4db1825e
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xserver-svga_3.3.6-11potato32_alpha.deb
      MD5 checksum: f749cf74f2de1e27de63440bd2aa9959
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xserver-tga_3.3.6-11potato32_alpha.deb
      MD5 checksum: 26b0f6107792962a38c5cb54e864a4ee
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xserver-vga16_3.3.6-11potato32_alpha.deb
      MD5 checksum: 2e1160fcf14bd0b53e5ec05cdf9fb6e9
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xsm_3.3.6-11potato32_alpha.deb
      MD5 checksum: 2148c30c9281b206a7262a257f8a631a
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xterm_3.3.6-11potato32_alpha.deb
      MD5 checksum: 4fd7f49556c10fa702b395affe32ca46
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xvfb_3.3.6-11potato32_alpha.deb
      MD5 checksum: b1d76c2437d0edd7579027bf98baa9ea

  Arquitetura ARM:
    
http://security.debian.org/dists/stable/updates/main/binary-arm/rstartd_3.3.6-11potato32_arm.deb
      MD5 checksum: a74f82bb54045973f66e5e8c2288bb67
    
http://security.debian.org/dists/stable/updates/main/binary-arm/twm_3.3.6-11potato32_arm.deb
      MD5 checksum: 20e9eadca43125ca5a7fbaf77e4401da
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xbase-clients_3.3.6-11potato32_arm.deb
      MD5 checksum: 57beb0497b91b06c009594d3d4413168
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xdm_3.3.6-11potato32_arm.deb
      MD5 checksum: f1d7460483afaa5a84342367383a1d62
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xext_3.3.6-11potato32_arm.deb
      MD5 checksum: a68db403ff21dab898574e8045d9e3fb
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xfs_3.3.6-11potato32_arm.deb
      MD5 checksum: aa8c6f3fd38c9cfed5b944484520ecb4
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xlib6g-dev_3.3.6-11potato32_arm.deb
      MD5 checksum: 2e60e3a0434337457150a87afaba59b8
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xlib6g-static_3.3.6-11potato32_arm.deb
      MD5 checksum: dd5b7bc5a4fee4b0fe6dea82b015a81f
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xlib6g_3.3.6-11potato32_arm.deb
      MD5 checksum: 5bd73196d5b95f08db7efb610346bec9
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xmh_3.3.6-11potato32_arm.deb
      MD5 checksum: d5b03006576d3ff44f4d35ce9aacddf9
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xnest_3.3.6-11potato32_arm.deb
      MD5 checksum: a0a0aee768ac07409e1d4a8b695734e9
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xproxy_3.3.6-11potato32_arm.deb
      MD5 checksum: cc3d0d62836fb10d49aca83062188636
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xprt_3.3.6-11potato32_arm.deb
      MD5 checksum: 7e074d0c074af762b017ffdd36f68bb2
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xserver-common_3.3.6-11potato32_arm.deb
      MD5 checksum: 09216ab3689d30eb2b5ea6f3f1ddca17
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xserver-fbdev_3.3.6-11potato32_arm.deb
      MD5 checksum: dec81f45cfca6c038427b312fed1405e
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xsm_3.3.6-11potato32_arm.deb
      MD5 checksum: 994637a3e1d8c6fd5e289d73fa717861
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xterm_3.3.6-11potato32_arm.deb
      MD5 checksum: 6f51fa8caf5330af5710f77d6d335cc2
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xvfb_3.3.6-11potato32_arm.deb
      MD5 checksum: 60a3cc66cbbe6e8cc921e6f8b0ce06f6

  Arquitetura Intel ia32:
    
http://security.debian.org/dists/stable/updates/main/binary-i386/rstartd_3.3.6-11potato32_i386.deb
      MD5 checksum: e3d0592e48eb3e312e5098b9b8fbd5bd
    
http://security.debian.org/dists/stable/updates/main/binary-i386/twm_3.3.6-11potato32_i386.deb
      MD5 checksum: ad1b70c0e1c8ce5e7549831c8a661926
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xbase-clients_3.3.6-11potato32_i386.deb
      MD5 checksum: 3a13e4b10c2ea0ed2a0cd200b5cf99aa
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xdm_3.3.6-11potato32_i386.deb
      MD5 checksum: 5c69e9f6cfd854fcc35bdcc28e842aac
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xext_3.3.6-11potato32_i386.deb
      MD5 checksum: eef72e739fa7b54a6dd5483d863ebe9a
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xf86setup_3.3.6-11potato32_i386.deb
      MD5 checksum: bebaddde2a877142d701959499341724
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xfs_3.3.6-11potato32_i386.deb
      MD5 checksum: 4d74861bba07d483afccb8b82e75524e
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xlib6-altdev_3.3.6-11potato32_i386.deb
      MD5 checksum: 3857e5548b6b0ccf93548b5e12b9fb94
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xlib6_3.3.6-11potato32_i386.deb
      MD5 checksum: 04ee5c0a5f5c5d1d5ec7c3fa1a8abb41
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xlib6g-dev_3.3.6-11potato32_i386.deb
      MD5 checksum: 1e621013cff2ce5e684ff3dd6eed4ada
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xlib6g-static_3.3.6-11potato32_i386.deb
      MD5 checksum: a7190ee3a4316ae816b3c7b65e54e59f
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xlib6g_3.3.6-11potato32_i386.deb
      MD5 checksum: 11d0a291a25c25aea161bf93db38d5a1
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xmh_3.3.6-11potato32_i386.deb
      MD5 checksum: e1eb815fc9a01da36d7444b3a2fd3fda
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xnest_3.3.6-11potato32_i386.deb
      MD5 checksum: f0a5ca51e123bf428f442f4a0664024e
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xproxy_3.3.6-11potato32_i386.deb
      MD5 checksum: 9f8625022de16d63f57d906f04fceced
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xprt_3.3.6-11potato32_i386.deb
      MD5 checksum: c3f23c39edf15bb8f11b4a54f079d7ca
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-3dlabs_3.3.6-11potato32_i386.deb
      MD5 checksum: f880d68af3d77c6052220885ea11ff17
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-8514_3.3.6-11potato32_i386.deb
      MD5 checksum: be2effceaf52bea16f0f391495d9c03f
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-agx_3.3.6-11potato32_i386.deb
      MD5 checksum: e3635066c8e25bb4ad8f0051548b92cc
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-common_3.3.6-11potato32_i386.deb
      MD5 checksum: 623f2183d5f277fc363e74c22296a35e
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-fbdev_3.3.6-11potato32_i386.deb
      MD5 checksum: 5a17c8c2ea526f802bb83c6c3aa5e0d3
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-i128_3.3.6-11potato32_i386.deb
      MD5 checksum: 6d5ca2b5e6fe1affc5a511bf6e436665
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-mach32_3.3.6-11potato32_i386.deb
      MD5 checksum: 3bee6d80194df3c3904d841e16ff3d0f
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-mach64_3.3.6-11potato32_i386.deb
      MD5 checksum: 8bdf77a6e5dae42a6407a3688a4fc08a
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-mach8_3.3.6-11potato32_i386.deb
      MD5 checksum: 62daf60fcb82abdf56dae2fcb8eb707a
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-mono_3.3.6-11potato32_i386.deb
      MD5 checksum: 415e0317d76dd4f27c52f6c9e206c5d9
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-p9000_3.3.6-11potato32_i386.deb
      MD5 checksum: 426751b7edd46e5968ecbb0ec9455fc7
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-s3_3.3.6-11potato32_i386.deb
      MD5 checksum: e8bf157d04976c87ceacd0ddde068cf4
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-s3v_3.3.6-11potato32_i386.deb
      MD5 checksum: 9caf08be5a7ea892f8dceb17ef8ea3b8
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-svga_3.3.6-11potato32_i386.deb
      MD5 checksum: 0eb3ea2a3f381d1e9297b400ad908f79
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-vga16_3.3.6-11potato32_i386.deb
      MD5 checksum: 5af1509c75304875f87b892b6f734484
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xserver-w32_3.3.6-11potato32_i386.deb
      MD5 checksum: 1eea9af440c79e1cf5c4354243ecc34d
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xsm_3.3.6-11potato32_i386.deb
      MD5 checksum: 6f45b950936530189f953bd28c0331c9
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xterm_3.3.6-11potato32_i386.deb
      MD5 checksum: 95e542ddf4e994eb014e22f5bb77fb94
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xvfb_3.3.6-11potato32_i386.deb
      MD5 checksum: dfe890b03ea09cc4003681a187d24ede

  Arquitetura PowerPC:
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/rstartd_3.3.6-11potato32_powerpc.deb
      MD5 checksum: fea33d0dcf4a5199984cd4e4b3bdcc62
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/twm_3.3.6-11potato32_powerpc.deb
      MD5 checksum: f12a774751ea4a6f0f64745e95ba62fd
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xbase-clients_3.3.6-11potato32_powerpc.deb
      MD5 checksum: c8e531206440a3762cd08d08b69aecfb
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xdm_3.3.6-11potato32_powerpc.deb
      MD5 checksum: 320fa9aa9e7803ff444396350bc02961
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xext_3.3.6-11potato32_powerpc.deb
      MD5 checksum: 415248c142cc892b72bde859d9cacde0
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xfs_3.3.6-11potato32_powerpc.deb
      MD5 checksum: 6863f8f353e9592f0479ff95221e65e5
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xlib6g-dev_3.3.6-11potato32_powerpc.deb
      MD5 checksum: d87dd3ba113feb97f72fb98548924d0d
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xlib6g-static_3.3.6-11potato32_powerpc.deb
      MD5 checksum: 7ae2d8e80616cd6bec528174f2fe98dc
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xlib6g_3.3.6-11potato32_powerpc.deb
      MD5 checksum: 1a2762def576884b64c5e662b61606de
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xmh_3.3.6-11potato32_powerpc.deb
      MD5 checksum: 640b1a3fecf20c87b49ed040db54d970
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xnest_3.3.6-11potato32_powerpc.deb
      MD5 checksum: 4fa0e956b167274415c1e1512f94c227
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xproxy_3.3.6-11potato32_powerpc.deb
      MD5 checksum: af6dd3f6cf611f3120628a415ed6df89
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xprt_3.3.6-11potato32_powerpc.deb
      MD5 checksum: b9932da793b94c5281db77674d049c04
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xserver-common_3.3.6-11potato32_powerpc.deb
      MD5 checksum: 1973982ddc3325de726623f248e1fcb4
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xserver-fbdev_3.3.6-11potato32_powerpc.deb
      MD5 checksum: 9a1d0c986411ff763c4669f0b18fab67
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xsm_3.3.6-11potato32_powerpc.deb
      MD5 checksum: 06d9ccd4c945b397b5e0d68cdbc2bc16
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xterm_3.3.6-11potato32_powerpc.deb
      MD5 checksum: e7b71bbc8bf8a4fab1a32ea4afe34ea9
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xvfb_3.3.6-11potato32_powerpc.deb
      MD5 checksum: c02c605c0149645a951448c6ff8cfbf5

  Arquitetura Sun Sparc:
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/rstartd_3.3.6-11potato32_sparc.deb
      MD5 checksum: 2ac68b7495bb6aa743dd4b88acd64b70
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/twm_3.3.6-11potato32_sparc.deb
      MD5 checksum: cafda6b0358af420ef392822436058a3
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xbase-clients_3.3.6-11potato32_sparc.deb
      MD5 checksum: 6072f6e30a444b4cdbd49c85c7892131
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xdm_3.3.6-11potato32_sparc.deb
      MD5 checksum: 1874048ad3f397fbff1ead11f0e10cd0
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xext_3.3.6-11potato32_sparc.deb
      MD5 checksum: 8199681a782a0609a7578dff15745d6a
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xfs_3.3.6-11potato32_sparc.deb
      MD5 checksum: 151363a3590aa61dd42b62ccd95a37ac
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xlib6g-dev_3.3.6-11potato32_sparc.deb
      MD5 checksum: adedf419e79f1bf7b4eefdc698d2c3f1
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xlib6g-static_3.3.6-11potato32_sparc.deb
      MD5 checksum: b50b401592e844b933b05fb0252a8308
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xlib6g_3.3.6-11potato32_sparc.deb
      MD5 checksum: 444875a9bebb02e38ebe7a2ddd132b85
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xmh_3.3.6-11potato32_sparc.deb
      MD5 checksum: 00e6656e19fa100359efb5647e1674bd
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xnest_3.3.6-11potato32_sparc.deb
      MD5 checksum: 1faeb8494593c823117cd7ffed91b1ce
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xproxy_3.3.6-11potato32_sparc.deb
      MD5 checksum: b08b12c3d791f664475865780adda576
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xprt_3.3.6-11potato32_sparc.deb
      MD5 checksum: 2e4837c71af32dea4179d4c76880c5eb
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xserver-3dlabs_3.3.6-11potato32_sparc.deb
      MD5 checksum: f5681db32ef1d79e4ebadf94c3ad753f
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xserver-common_3.3.6-11potato32_sparc.deb
      MD5 checksum: 8e40385ba47efee7fd026cfff90722c1
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xserver-fbdev_3.3.6-11potato32_sparc.deb
      MD5 checksum: 9755794983421183be1ec2c435870482
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xserver-mach64_3.3.6-11potato32_sparc.deb
      MD5 checksum: 9cd17f998483034fe1cc00cfc12f8e4e
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xserver-xsun-mono_3.3.6-11potato32_sparc.deb
      MD5 checksum: 57b0453b9fa62b95db47125878b123d2
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xserver-xsun24_3.3.6-11potato32_sparc.deb
      MD5 checksum: 61abde1c3b361cb13e51da92078ffabb
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xserver-xsun_3.3.6-11potato32_sparc.deb
      MD5 checksum: 4993edb405722fdffbde36c0a4106fe2
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xsm_3.3.6-11potato32_sparc.deb
      MD5 checksum: 2085a88b6a0955ec0dd41c5b9243a80d
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xterm_3.3.6-11potato32_sparc.deb
      MD5 checksum: 2a0bc3d0e1da1c307015eacb6b0ce742
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xvfb_3.3.6-11potato32_sparc.deb
      MD5 checksum: bad17a61b6d07c6d5b004ab12d5ba56e

  Esses arquivos serão movidos para
  ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ em breve.

Para arquiteturas que ainda não foi liberado favor consultar o diretório
apropriado ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .


----------------------------------------------------------------------------
No apt-get: deb http://security.debian.org/ stable/updates main
No dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Lista de mensagens: debian-security-announce@lists.debian.org
Informações sobre o pacote: 'apt-cache show <pacote>' e
http://packages.debian.org/<pacote>



Reply to: