Re: [SECURITY] [DSA 803-1] New Apache packages fix HTTP request smuggling
Moin,
wir haben Version Apache/2.0.44 im Einsatz, also diesbezüglich kein
Handlungsbedarf.
---
Martin Schmidt - m.schmidt@hhpv.de
Hamburger Pensionsverwaltung eG
MS> Umgeleitet von He:
MS> ich beobachte die Security-Liste für debian. Dabei bin ich über diesen
MS> Fehler bzw. Fix gefallen. Ist der Fehler auf unseren Systemen unter
MS> Suse gefixed?
MS> -----BEGIN PGP SIGNED MESSAGE-----
MS> Hash: SHA1
MS> - --------------------------------------------------------------------------
MS> Debian Security Advisory DSA 803-1 security@debian.org
MS> http://www.debian.org/security/ Martin Schulze
MS> September 8th, 2005 http://www.debian.org/security/faq
MS> - --------------------------------------------------------------------------
>>Package : apache
MS> Vulnerability : programming error
>>Problem type : remote
>>Debian-specific: no
>>CVE ID : CAN-2005-2088
MS> Debian Bug : 322607
MS> A vulnerability has been discovered in the Apache web server. When it
MS> is acting as an HTTP proxy, it allows remote attackers to poison the
MS> web cache, bypass web application firewall protection, and conduct
MS> cross-site scripting attacks, which causes Apache to incorrectly
MS> handle and forward the body of the request.
MS> For the old stable distribution (woody) this problem has been fixed in
MS> version 1.3.26-0woody7.
MS> For the stable distribution (sarge) this problem has been fixed in
MS> version 1.3.33-6sarge1.
MS> For the unstable distribution (sid) this problem has been fixed in
MS> version 1.3.33-8.
MS> We recommend that you upgrade your Apache package.
MS> Upgrade Instructions
MS> - --------------------
MS> wget url
MS> will fetch the file for you
MS> dpkg -i file.deb
MS> will install the referenced file.
MS> If you are using the apt-get package manager, use the line for
MS> sources.list as given below:
MS> apt-get update
MS> will update the internal database
MS> apt-get upgrade
MS> will install corrected packages
MS> You may use an automated update by adding the resources from the
MS> footer to the proper configuration.
MS> Debian GNU/Linux 3.0 alias woody
MS> - --------------------------------
MS> Source archives:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7.dsc
MS> Size/MD5 checksum: 668 498fa0b608affe5f54ca6f39c09ee842
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7.diff.gz
MS> Size/MD5 checksum: 301515 9aca1a8cc1bb9d2cf016dd59f66e318d
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26.orig.tar.gz
MS> Size/MD5 checksum: 2586182 5cd778bbe6906b5ef39dbb7ef801de61
MS> Architecture independent components:
MS> http://security.debian.org/pool/updates/main/a/apache/apache-doc_1.3.26-0woody7_all.deb
MS> Size/MD5 checksum: 1022808 3c34206949d744c5131401fb37bd80c4
MS> Alpha architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_alpha.deb
MS> Size/MD5 checksum: 395714 420933ad19e04518f105c7c10a6bdca3
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_alpha.deb
MS> Size/MD5 checksum: 926264 af2983a29e494c582e40bd9e3bd6d5f3
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_alpha.deb
MS> Size/MD5 checksum: 714110 4a531cd2954b066755b68b9be16ace01
MS> ARM architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_arm.deb
MS> Size/MD5 checksum: 361344 cec90195145f015edfbfc35313c7f6cc
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_arm.deb
MS> Size/MD5 checksum: 839138 bc71db85fa4eff02aa30caaa757a5f2f
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_arm.deb
MS> Size/MD5 checksum: 544586 62191863ffd4f96497754f4b915a3c50
MS> Intel IA-32 architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_i386.deb
MS> Size/MD5 checksum: 350294 fba3a1bc003f12e9ee66bd82151c8a81
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_i386.deb
MS> Size/MD5 checksum: 812910 2e7fd26fa78f0a6b908299a169bd602b
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_i386.deb
MS> Size/MD5 checksum: 535754 d5868a7f4e0dea7465bedfabaebeeab4
MS> Intel IA-64 architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_ia64.deb
MS> Size/MD5 checksum: 437076 390ca31bee590563697f2ec874a9ab8e
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_ia64.deb
MS> Size/MD5 checksum: 1012722 08eb945393ea1d387db567b9d77b8c0d
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_ia64.deb
MS> Size/MD5 checksum: 949382 74acda01856de32d4e088e2979af4e21
MS> HP Precision architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_hppa.deb
MS> Size/MD5 checksum: 386404 38d85074b963f4c60d2c07e8f8437027
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_hppa.deb
MS> Size/MD5 checksum: 891868 9d205f549055bd60ca4ff7d829f4fc23
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_hppa.deb
MS> Size/MD5 checksum: 587298 1fd0eeb14f911f7292a2ed151f1963d3
MS> Motorola 680x0 architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_m68k.deb
MS> Size/MD5 checksum: 348106 fb9185202aafe64373cb39f74a2896ab
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_m68k.deb
MS> Size/MD5 checksum: 821416 08e1b1b1f63ac8444573e0eab09a6134
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_m68k.deb
MS> Size/MD5 checksum: 537452 be018f9034cb1585c4351d7a3edfb9e8
MS> Big endian MIPS architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_mips.deb
MS> Size/MD5 checksum: 376696 568c92beb624c9d5667f49564f441c93
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_mips.deb
MS> Size/MD5 checksum: 844412 6083195b5a3c769affdbed0c1c4cd4e5
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_mips.deb
MS> Size/MD5 checksum: 576630 6f40ec8c0c9f7782841a9b26a25598c5
MS> Little endian MIPS architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_mipsel.deb
MS> Size/MD5 checksum: 376756 78ca3c2a563dbc360e0b097261b5e96c
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_mipsel.deb
MS> Size/MD5 checksum: 843080 e39f27bc7d1643b8401be0b2e28e2190
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_mipsel.deb
MS> Size/MD5 checksum: 565760 ff557d4a490f6816e845a211f8b922f4
MS> PowerPC architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_powerpc.deb
MS> Size/MD5 checksum: 367218 d7cb4f03e68396ded487f9ced5bb4aaf
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_powerpc.deb
MS> Size/MD5 checksum: 846502 fb418736bd7c2f6a1ca334975846fddc
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_powerpc.deb
MS> Size/MD5 checksum: 559280 16166fe59363ec62ad55dbfba0b943ac
MS> IBM S/390 architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_s390.deb
MS> Size/MD5 checksum: 363954 e6d6879c6d646d6e1fb0219d814164ba
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_s390.deb
MS> Size/MD5 checksum: 832858 15e2a71fc2034c1a4ea87ce76d2c265b
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_s390.deb
MS> Size/MD5 checksum: 559654 9864c8523283558ef2634223c8e30175
MS> Sun Sparc architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_sparc.deb
MS> Size/MD5 checksum: 361122 91a73fa039e886fa5d7ec71e5f6c2be4
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_sparc.deb
MS> Size/MD5 checksum: 847538 18486b37535a3efbf2da6e1980e191af
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_sparc.deb
MS> Size/MD5 checksum: 545090 5c5a24942e0368597043dad517dc842d
MS> Debian GNU/Linux 3.1 alias sarge
MS> - --------------------------------
MS> Source archives:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1.dsc
MS> Size/MD5 checksum: 1119 1fd30bda6f8ced16f68a75b42062e719
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1.diff.gz
MS> Size/MD5 checksum: 369073 9b04027dc8af9fc5c19bef5304d6d1a6
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33.orig.tar.gz
MS> Size/MD5 checksum: 3105683 1a34f13302878a8713a2ac760d9b6da8
MS> Architecture independent components:
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.33-6sarge1_all.deb
MS> Size/MD5 checksum: 331258 2690e824569ca7d3b20c22697fff83ac
MS> http://security.debian.org/pool/updates/main/a/apache/apache-doc_1.3.33-6sarge1_all.deb
MS> Size/MD5 checksum: 1189326 53df3e1f7e47375c957673ff49649ee2
MS> http://security.debian.org/pool/updates/main/a/apache/apache-utils_1.3.33-6sarge1_all.deb
MS> Size/MD5 checksum: 212030 1a9af803b7bb9ee718c8d2463157c73d
MS> Alpha architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1_alpha.deb
MS> Size/MD5 checksum: 428030 3ffbf8af975d56bc7db1061251203648
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge1_alpha.deb
MS> Size/MD5 checksum: 903960 fdc9c4b3baa5a2d9bac6132b2505e9b9
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge1_alpha.deb
MS> Size/MD5 checksum: 9223190 723b5e2c114d4c1ffe17d4c875cef946
MS> http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge1_alpha.deb
MS> Size/MD5 checksum: 569232 8982fb3879163bf11223cd68e153b630
MS> http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge1_alpha.deb
MS> Size/MD5 checksum: 542450 9828318e78f6e8c48b393b7e56e902da
MS> http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge1_alpha.deb
MS> Size/MD5 checksum: 504952 5f37c07c2cd257fe8a977c2bccf84196
MS> AMD64 architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1_amd64.deb
MS> Size/MD5 checksum: 398816 fc41d5cc0df349bdfa3068150af6ce56
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge1_amd64.deb
MS> Size/MD5 checksum: 872748 1acdcb70258e22a443c1d8eafd9df6d8
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge1_amd64.deb
MS> Size/MD5 checksum: 9162752 ac8622c137cbcd3add6ef4456fe4d194
MS> http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge1_amd64.deb
MS> Size/MD5 checksum: 521410 7bad8992492c57535e63b073bbdd70a2
MS> http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge1_amd64.deb
MS> Size/MD5 checksum: 511600 440d57d227bacbba250e42b0998d3472
MS> http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge1_amd64.deb
MS> Size/MD5 checksum: 491566 d743410216b058f4dcda5d6a0edf6bfc
MS> ARM architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1_arm.deb
MS> Size/MD5 checksum: 384126 8625ed1b91de09247d944ddc324072a4
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge1_arm.deb
MS> Size/MD5 checksum: 841216 b06943003e94af6a1a713764f8829e04
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge1_arm.deb
MS> Size/MD5 checksum: 8986348 771b93d92f4bb496ea38968b7e7ab453
MS> http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge1_arm.deb
MS> Size/MD5 checksum: 495786 e83abce208df8f4d83c372ac7acad26b
MS> http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge1_arm.deb
MS> Size/MD5 checksum: 489450 8724665288e98071aa40a48214479340
MS> http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge1_arm.deb
MS> Size/MD5 checksum: 479176 ef5eb11ec3ec10b04e1d652e67a1a881
MS> Intel IA-32 architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1_i386.deb
MS> Size/MD5 checksum: 385394 d1fb460ac66b9c279bb973962c6b37a6
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge1_i386.deb
MS> Size/MD5 checksum: 844800 ad852939fd0e97aa35f731e506888eca
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge1_i386.deb
MS> Size/MD5 checksum: 9128930 d39bd56c23b083feeb2d30c1582ac091
MS> http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge1_i386.deb
MS> Size/MD5 checksum: 504894 49cff4c1bc76b51806afe487c0a93fd5
MS> http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge1_i386.deb
MS> Size/MD5 checksum: 492748 fa4e8d3d4c725d0145c78b3f782566d3
MS> http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge1_i386.deb
MS> Size/MD5 checksum: 485896 0ad21611cc1f3e24e4b51b0b0a76b1bf
MS> Intel IA-64 architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1_ia64.deb
MS> Size/MD5 checksum: 463278 f57f06ae8694e78bfa01fe01ae294579
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge1_ia64.deb
MS> Size/MD5 checksum: 971458 50569cef954ad7d77b7f239fc31f951b
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge1_ia64.deb
MS> Size/MD5 checksum: 9355914 a14cfca2717ae3221703ba675ffc72b8
MS> http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge1_ia64.deb
MS> Size/MD5 checksum: 627244 1c7a43c3824f95ba5bca90478a755070
MS> http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge1_ia64.deb
MS> Size/MD5 checksum: 585816 2d9b76094d06abe31ded988ca2706fb9
MS> http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge1_ia64.deb
MS> Size/MD5 checksum: 532720 4a9d91d7472ceb574f2cb33a798ff4fb
MS> HP Precision architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1_hppa.deb
MS> Size/MD5 checksum: 406526 e0e289829771783148f0aa8fd6b42887
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge1_hppa.deb
MS> Size/MD5 checksum: 905350 9919f238e92cae322d4ff4c05ed9ee5d
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge1_hppa.deb
MS> Size/MD5 checksum: 9101106 edb4267ac44bf9ecc5a101ca037f36c4
MS> http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge1_hppa.deb
MS> Size/MD5 checksum: 535940 eae642e169c3d570a8925051b485b9f0
MS> http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge1_hppa.deb
MS> Size/MD5 checksum: 518712 a12117ebb93f2dc0d9a5c6fdacc469a9
MS> http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge1_hppa.deb
MS> Size/MD5 checksum: 508670 c3cea44f6e4cbb3807a43d6126ee37b1
MS> Motorola 680x0 architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1_m68k.deb
MS> Size/MD5 checksum: 370908 a2c3e424759606dd7458accef0b44f1a
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge1_m68k.deb
MS> Size/MD5 checksum: 846822 1fe7f8bd1fc4d9a14781240b6feaa7d7
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge1_m68k.deb
MS> Size/MD5 checksum: 8973276 ef9b79490ab44c218453d89514250a7a
MS> http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge1_m68k.deb
MS> Size/MD5 checksum: 448590 5c66ff250a26bc1c37b0fcdaa2119a08
MS> http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge1_m68k.deb
MS> Size/MD5 checksum: 477172 d7f6a3d1bdbc2503cb2c4a195290e9af
MS> http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge1_m68k.deb
MS> Size/MD5 checksum: 489260 a148e7a997d6eb61157d0323fab7bfb1
MS> Big endian MIPS architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1_mips.deb
MS> Size/MD5 checksum: 403176 6b843eba1a3e47e7199b9177470442db
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge1_mips.deb
MS> Size/MD5 checksum: 851408 bd4260941f9ff3225239f435a3434f25
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge1_mips.deb
MS> Size/MD5 checksum: 9048796 f74919a30dfe9f9528b8203f29f3d13a
MS> http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge1_mips.deb
MS> Size/MD5 checksum: 485022 a3535fcc942da7cf5b6b65c35a953a51
MS> http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge1_mips.deb
MS> Size/MD5 checksum: 509744 b3727680a67aa43a28de81cd8177a5a8
MS> http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge1_mips.deb
MS> Size/MD5 checksum: 443412 2c0450982c0784bff8c949f4b009ec71
MS> Little endian MIPS architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1_mipsel.deb
MS> Size/MD5 checksum: 403554 9267cff98a6f26601eec930ee465a15d
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge1_mipsel.deb
MS> Size/MD5 checksum: 849718 296ee1fce7f27226e3a74bddecfee3cf
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge1_mipsel.deb
MS> Size/MD5 checksum: 9054322 2f0acb4f4fd17284984df97fcd2d6e3d
MS> http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge1_mipsel.deb
MS> Size/MD5 checksum: 485244 1f05badc7c8e3355c367e36b5dcf70e9
MS> http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge1_mipsel.deb
MS> Size/MD5 checksum: 510556 754c9c85a0c40a54b0a5a3826ef3abbd
MS> http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge1_mipsel.deb
MS> Size/MD5 checksum: 443336 1c10dd7f81c00d9673ad4aa979fb242e
MS> PowerPC architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1_powerpc.deb
MS> Size/MD5 checksum: 398582 d68c136329d94f8bfa9bfb71bcb07e2c
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge1_powerpc.deb
MS> Size/MD5 checksum: 921236 9bcad607aaae2cb909c91da5fed9011e
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge1_powerpc.deb
MS> Size/MD5 checksum: 9252826 71e4ba9567ec87c4027b93f7b652b95a
MS> http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge1_powerpc.deb
MS> Size/MD5 checksum: 515222 4e452c60d904b82a2e053c92383a63c4
MS> http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge1_powerpc.deb
MS> Size/MD5 checksum: 510242 cb5374bd1c272609f21554e63f696c69
MS> http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge1_powerpc.deb
MS> Size/MD5 checksum: 490588 77a97a033d92d14ba9ea7f602d558735
MS> IBM S/390 architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1_s390.deb
MS> Size/MD5 checksum: 403082 e114c88f6c2dd4ba6ee0b04d5a914cd8
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge1_s390.deb
MS> Size/MD5 checksum: 868348 b43f4c5706945e0ecddc05a28472655a
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge1_s390.deb
MS> Size/MD5 checksum: 9183454 f09e3839b02a0f7923a3b7da33c2c6e3
MS> http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge1_s390.deb
MS> Size/MD5 checksum: 489950 c90188ab4b4bab70009d32ef7cca0764
MS> http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge1_s390.deb
MS> Size/MD5 checksum: 514356 bfa36941fa00567abac50a90112f7b44
MS> http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge1_s390.deb
MS> Size/MD5 checksum: 460380 55ac06c1de1a071a8fb0a0c04c769985
MS> Sun Sparc architecture:
MS> http://security.debian.org/pool/updates/main/a/apache/apache_1.3.33-6sarge1_sparc.deb
MS> Size/MD5 checksum: 385444 728bb478200c9d1c584f0360ac4fc487
MS> http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.33-6sarge1_sparc.deb
MS> Size/MD5 checksum: 848868 fec17b5c0e4e0bb626e563db38e3704b
MS> http://security.debian.org/pool/updates/main/a/apache/apache-dbg_1.3.33-6sarge1_sparc.deb
MS> Size/MD5 checksum: 9046688 802b70f23eed8abd0767aed4b72901e7
MS> http://security.debian.org/pool/updates/main/a/apache/apache-perl_1.3.33-6sarge1_sparc.deb
MS> Size/MD5 checksum: 504046 1984de0906eded5c01dd485a6bcfcfe5
MS> http://security.debian.org/pool/updates/main/a/apache/apache-ssl_1.3.33-6sarge1_sparc.deb
MS> Size/MD5 checksum: 491800 ec7cd2874c2d64ca64cd471a26212632
MS> http://security.debian.org/pool/updates/main/a/apache/libapache-mod-perl_1.29.0.3-6sarge1_sparc.deb
MS> Size/MD5 checksum: 490198 a2c4676f9fd79892234f2f03ec188fb3
MS> These files will probably be moved into the stable distribution on
MS> its next update.
MS> - ---------------------------------------------------------------------------------
MS> For apt-get: deb http://security.debian.org/ stable/updates main
MS> For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
MS> Mailing list: debian-security-announce@lists.debian.org
MS> Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
MS> -----BEGIN PGP SIGNATURE-----
MS> Version: GnuPG v1.4.1 (GNU/Linux)
MS> iD8DBQFDH9OSW5ql+IAeqTIRAo8cAJ9wG0wUOQcSBszrarKnqWOs9IlwTACePEcf
MS> cDGL/fke9UfFWxj7FBIzBwM=
MS> =vhXI
MS> -----END PGP SIGNATURE-----
Reply to: