Debian alert: New xfree86 packages fix multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 380-1 security@debian.org http://www.debian.org/security/ Matt Zimmerman September 12th, 2003 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : xfree86 Vulnerability : buffer overflows, denial of service Problem-Type : remote Debian-specific: no CVE Ids : CAN-2003-0063 CAN-2003-0071 CAN-2002-0164 CAN-2003-0730 Four vulnerabilities have been discovered in XFree86. CAN-2003-0063 - xterm window title reporting escape sequence can deceive user The xterm package provides a terminal escape sequence that reports the window title by injecting it into the input buffer of the terminal window, as if the user had typed it. An attacker can craft an escape sequence that sets the title of a victim's xterm window to an arbitrary string (such as a shell command) and then reports that title. If the victim is at a shell prompt when this is done, the injected command will appear on the command line, ready to be run. Since it is not possible to embed a carriage return in the window title, the attacker would have to convince the victim to press Enter (or rely upon the victim's careless or confusion) for the shell or other interactive process to interpret the window title as user input. It is conceivable that the attacker could craft other escape sequences that might convince the victim to accept the injected input, however. The Common Vulnerabilities and Exposures project at cve.mitre.org has assigned the name CAN-2003-0063 to this issue. To determine whether your version of xterm is vulnerable to abuse of the window title reporting feature, run the following command at a shell prompt from within an xterm window: echo -e "e[21t" (The terminal bell may ring, and the window title may be prefixed with an "l".) This flaw is exploitable by anything that can send output to a terminal window, such as a text document. The xterm user has to take action to cause the escape sequence to be sent, however (such as by viewing a malicious text document with the "cat" command). Whether you are likely to be exposed to it depends on how you use xterm. Consider the following: echo -e 'e]2;s && echo rm -rf *a' > /tmp/sploit echo -e 'e[21t' >> /tmp/sploit cat /tmp/sploit Debian has resolved this problem by disabling the window title reporting escape sequence in xterm; it is understood but ignored. The escape sequence to set the window title has not been disabled. A future release of the xterm package will have a configuration option to permit the user to turn the window title reporting feature back on, but it will default off. CAN-2003-0071 - xterm susceptible to DEC UDK escape sequence denial-of-service attack The xterm package, since it emulates DEC VT-series text terminals, emulates a feature of DEC VT terminals known as "User-Defined Keys" (UDK for short). There is a bug in xterm's handling of DEC UDK escape sequences, however, and an ill-formed one can cause the xterm process to enter a tight loop. This causes the process to "spin", consuming CPU cycles uselessly, and refusing to handle signals (such as efforts to kill the process or close the window). To determine whether your version of xterm is vulnerable to this attack, run the following command at a shell prompt from within a "sacrificial" xterm window (i.e., one that doesn't have anything in the scrollback buffer you might need to see later): echo -e "eP0;0|0A/17x9c" This flaw is exploitable by anything that can send output to a terminal window, such as a text document. The xterm user has to take action to cause the escape sequence to be sent, however (such as by viewing a malicious text document with the "cat" command). Whether you are likely to be exposed to it depends on how you use xterm. Debian has resolved this problem by backporting an upstream fix to XFree86 4.1.0. CAN-2002-0164 - flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments Most X servers descended from the MIT/X Consortium/X.Org Sample Implementation, including XFree86's X servers, support an extension to the X protocol called MIT-SHM, which enables X clients running on the same host as the X server to operate more quickly and efficiently by taking advantage of an operating system feature called shared memory where it is available. The Linux kernel, for example, supports shared memory. Because the X server runs with elevated privileges, the operating system's built-in access control mechanisms are ineffective to police the X server's usage of segments of shared memory. Th X server has to implement its own access control. This was imperfectly done in previous releases of XFree86 (and the MIT/X Consortium/X.Org Sample Implementation before it), leaving opportunities for malicious X clients to read and alter shared memory segments to which they should not have access. The Common Vulnerabilities and Exposures project at cve.mitre.org has assigned the name CAN-2002-0164 to this issue. Debian's XFree86 4.1.0-16 packages shipped with an incomplete fix for the this flaw, only enforcing proper access control for X servers that were not started by a display manager (e.g., xdm). This update resolves that problem. The Debian Project knows of no exploits for this vulnerability. A malicious X client that abused the MIT-SHM extension could conceivably be written however, and run (deliberately or unwittingly) by a user able to run an X server on a host. The impact of this flaw depends on how shared memory is used on the system. See the ipcs(8) manual page for more information. Debian has resolved this problem by backporting an upstream fix to XFree86 4.1.0. CAN-2003-0730 - multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks Security researcher "blexim" wrote [paraphrased]: I have identified several bugs in the font libraries of the current version of the XFree86 source code. These bugs could potentially lead to the execution of arbitrary code by a remote user in any process which calls the functions in question. The functions are related to the transfer and enumeration of fonts from font servers to clients, limiting the range of the exposure caused by these bugs. Specifically, several sizing variables passed from a font server to a client are not adequately checked, causing calculations on them to result in erroneous values. These erroneous calculations can lead to buffers on the heap and stack overflowing, potentially leading to arbitrary code execution. As stated before, the risk is limited by the fact that only clients can be affected by these bugs, but in some (non-default) configurations, both xfs and the X server can act as clients to remote font servers. In these configurations, both xfs and the X server could be potentially compromised. The Common Vulnerabilities and Exposures project at cve.mitre.org has assigned the name CAN-2003-0730 to this issue. The Debian Project knows of no exploits for this vulnerability. By default in Debian, X servers are configured to listen only to a locally-running font server, which is not even used if the xfs package is not installed. The Debian default configuration of xfs uses only font directories on the local host, and does not attempt to connect to any external font servers. Debian has resolved this problem by backporting an upstream fix to XFree86 4.1.0. All of the above problems also affect the xfree86v3 packages (in the case of the first two flaws, the xterm source code contains the flaws, but no xterm package is produced). Due to resource limitations and a lack of upstream support for this legacy code, Debian is unable to continue supporting version 3.3.6 of XFree86. To avoid exposure to the latter two flaws in this advisory, we recommend that you remove the following packages if you have them installed: xserver-3dlabs xserver-8514 xserver-agx xserver-common-v3 xserver-fbdev xserver-i128 xserver-mach32 xserver-mach64 xserver-mach8 xserver-mono xserver-p9000 xserver-s3 xserver-s3v xserver-svga xserver-tga xserver-vga16 xserver-w32 (You may also wish to remove the xext, xlib6, and xlib6-altdev packages, as support for them is being terminated along with the rest of the XFree86 3.3.6 packages, though they are not affected by the flaws in this advisory.) For the stable distribution (woody) these problems have been fixed in version 4.1.0-16woody1. For the unstable distribution (sid) all problems except CAN-2003-0730 are fixed in version 4.2.1-11. CAN-2003-0730 will be fixed in 4.2.1-12, currently in preparation. We recommend that you update your xfree86 package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/x/xfree86/xfree86_4.1.0-16woody1.dsc Size/MD5 checksum: 1512 944b46135349c20bfcc29e70c48e3134 http://security.debian.org/pool/updates/main/x/xfree86/xfree86_4.1.0-16woody1.diff.gz Size/MD5 checksum: 1596153 502185d1b3e5b517d6a9cda100597014 http://security.debian.org/pool/updates/main/x/xfree86/xfree86_4.1.0.orig.tar.gz Size/MD5 checksum: 54433247 ea7a32e6a81a850e9f19428f3104c300 Architecture independent components: http://security.debian.org/pool/updates/main/x/xfree86/x-window-system_4.1.0-16woody1_all.deb Size/MD5 checksum: 59660 77a3d33f0adef1482433508fc2fe2572 http://security.debian.org/pool/updates/main/x/xfree86/xfonts-100dpi-transcoded_4.1.0-16woody1_all.deb Size/MD5 checksum: 8332974 61c2a42c2d5e668ab6adbaaff9da4c02 http://security.debian.org/pool/updates/main/x/xfree86/xfonts-100dpi_4.1.0-16woody1_all.deb Size/MD5 checksum: 4441766 a1980fa766907cd8c0137769378ce017 http://security.debian.org/pool/updates/main/x/xfree86/xfonts-75dpi-transcoded_4.1.0-16woody1_all.deb Size/MD5 checksum: 7224972 7672c6a1664634a543bee78dbd707f27 http://security.debian.org/pool/updates/main/x/xfree86/xfonts-75dpi_4.1.0-16woody1_all.deb Size/MD5 checksum: 3931002 ded7e9cf4ec402311366f3c16cf3b522 http://security.debian.org/pool/updates/main/x/xfree86/xfonts-base-transcoded_4.1.0-16woody1_all.deb Size/MD5 checksum: 1104714 0c310f293d5f18027b4f66d89e8c88a9 http://security.debian.org/pool/updates/main/x/xfree86/xfonts-base_4.1.0-16woody1_all.deb Size/MD5 checksum: 5028098 45d2fb54abcbc20a454c54d07fd87275 http://security.debian.org/pool/updates/main/x/xfree86/xfonts-cyrillic_4.1.0-16woody1_all.deb Size/MD5 checksum: 437850 a4b60c52f618daba56cb59422dca8e1e http://security.debian.org/pool/updates/main/x/xfree86/xfonts-pex_4.1.0-16woody1_all.deb Size/MD5 checksum: 68210 9c70aea042a1bb6e3bb32a12f417e335 http://security.debian.org/pool/updates/main/x/xfree86/xfonts-scalable_4.1.0-16woody1_all.deb Size/MD5 checksum: 795574 2b51a0af0d69f6bfc7c9386926d3393b http://security.debian.org/pool/updates/main/x/xfree86/xfree86-common_4.1.0-16woody1_all.deb Size/MD5 checksum: 545426 041abd5637b1dd4adb9461f1db4e8f54 http://security.debian.org/pool/updates/main/x/xfree86/xlib6g-dev_4.1.0-16woody1_all.deb Size/MD5 checksum: 59620 29a21611c82da8b2beac7b77a56c596f http://security.debian.org/pool/updates/main/x/xfree86/xlib6g_4.1.0-16woody1_all.deb Size/MD5 checksum: 59818 b6ac13562174e6071f8320aeb1abc0a5 http://security.debian.org/pool/updates/main/x/xfree86/xspecs_4.1.0-16woody1_all.deb Size/MD5 checksum: 4164958 3c984ffa27a444559d0ffae3a1802f14 Alpha architecture: http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 164866 1589c2363e16ad5d51e9889a31989945 http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 306128 56c6b42026e1146c4c3e133517f94e58 http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 197878 96e0f225d467aa56cc74523144aa10b8 http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 778272 757acf63b9140c8c3d8a616094010091 http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 203204 de9c0dc495c42356b4d577c09a7ef7be http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 649012 b511d1bb8f602037d58f99453241f168 http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 389956 2643d5a44baf3fe148fa99fa811c17e2 http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 263568 f5d176e3b64c05ed31b36b6410b88edb http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 820138 ead43db05d1682dc1cd33c990a85b913 http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 389850 8011f307a4d5cb0aa8bb7db530493772 http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 78564 bc5b9adecfaa4cc78dd24cc3e88774b5 http://security.debian.org/pool/updates/main/x/xfree86/twm_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 177350 1431799fc554aaea70c7026d2a5d570e http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 59834 68e917e3a99dc0ec98ecdfe5c0727f80 http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 1990190 ffd857b488710539d35fd2364b3fb772 http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 189472 05639af5c6bed73fb841cf59ae6e40bb http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 374388 3c6cdee84b2ecf885ed591af5a869149 http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 84420 256b1ac71b1dce646cffda30704e170c http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dev_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 693842 710420c07d20c12ba50900d28a194e4d http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 4133954 97db3a5d0bfd5dc3991db39573fd5068 http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3-dbg_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 1489760 146d8cf832269d7e3d6f39a3fe5925c7 http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 711612 115904a2a0f649d6f455e4561f474b5c http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa3_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 611030 1d9b81263c2eb48b733a9f6420cde676 http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa3-dbg_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 1603088 b234f6d424434758f7a777ce18ea5ce6 http://security.debian.org/pool/updates/main/x/xfree86/xlibs_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 1372460 df00b6ff8d52de15ef15df761b63e2c1 http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dbg_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 4393618 49d74798e58e143dab843c8ad7ddc581 http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dev_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 3225348 41fe5aff2fdfe51677cec138bfa51f73 http://security.debian.org/pool/updates/main/x/xfree86/xlibs-pic_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 84026 d3a486e3ad293e6819dc1250d573d30f http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 150362 6dcafb93fa6ac6e005ab34ec947199f0 http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 1888098 892d99d5af5409c0504e14c8d63f3e94 http://security.debian.org/pool/updates/main/x/xfree86/xprt_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 1474552 8336ea711719c79772e3ecdcff85d872 http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 219794 b20e366322272ac1abf24c905b7416c4 http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 5719450 550c9f5113ddd3805a734c85a8758c09 http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 524804 78830449f57a4cc482c2b29256148014 http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 712538 f198be0721d0fefe3e80de9de8de12b9 http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.1.0-16woody1_alpha.deb Size/MD5 checksum: 2046538 41b18574ece3be00a57c8f2420e194cd ARM architecture: http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.1.0-16woody1_arm.deb Size/MD5 checksum: 144700 345e837401ae1f48eabe0904aeac4ab0 http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.1.0-16woody1_arm.deb Size/MD5 checksum: 252596 78c3eaeb69c0744df80a4ea7b82d5c2b http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.1.0-16woody1_arm.deb Size/MD5 checksum: 178530 43b2a9d746d9b7aa147a124004620a94 http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.1.0-16woody1_arm.deb Size/MD5 checksum: 443948 b9f3e2d2d06b98d4f57dbf5f08c9fa3e http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.1.0-16woody1_arm.deb Size/MD5 checksum: 188344 011939c2d5c73132dc79eeb16184ec44 http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.1.0-16woody1_arm.deb Size/MD5 checksum: 377520 47bff42e7d0896c535ecf886c51afbfb http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.1.0-16woody1_arm.deb Size/MD5 checksum: 348050 c3994a45c47f2679dc9255b78509f556 http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.1.0-16woody1_arm.deb Size/MD5 checksum: 240318 a9e51c32915bc6c4779a43046cea7bae http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.1.0-16woody1_arm.deb Size/MD5 checksum: 490722 e10d565db8e49f9c1b8795f541dafb0c http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.1.0-16woody1_arm.deb Size/MD5 checksum: 347956 08d2176d6754817d50e96ae9bd4cece1 http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.1.0-16woody1_arm.deb Size/MD5 checksum: 76032 e5de962649328611044720866a85afb3 http://security.debian.org/pool/updates/main/x/xfree86/twm_4.1.0-16woody1_arm.deb Size/MD5 checksum: 168668 b93e3ef7e89883728176868f2b06a55f http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.1.0-16woody1_arm.deb Size/MD5 checksum: 59848 2d04ec15c027f7709f0396d28cba1282 http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.1.0-16woody1_arm.deb Size/MD5 checksum: 1623866 25e9fe67b7f750055927f1bb08c0e3b4 http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.1.0-16woody1_arm.deb Size/MD5 checksum: 175104 d719a073d23a85e0b6ea73b5ac3d431a http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.1.0-16woody1_arm.deb Size/MD5 checksum: 324422 3ff4ef758563163134c032e0b21540d7 http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.1.0-16woody1_arm.deb Size/MD5 checksum: 81586 7455f6073d9385706a92016973e37ce0 http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dev_4.1.0-16woody1_arm.deb Size/MD5 checksum: 606376 af0672909ca333192243bd99c66d8870 http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.1.0-16woody1_arm.deb Size/MD5 checksum: 351610 de91181edf74112232ddc966afbc02a9 http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3-dbg_4.1.0-16woody1_arm.deb Size/MD5 checksum: 931808 16c6364cfd52a64e4c8565b5c28ec8fd http://security.debian.org/pool/updates/main/x/xfree86/xlibs_4.1.0-16woody1_arm.deb Size/MD5 checksum: 1314666 8344fd91b283a3180d8db171e9098fbc http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dbg_4.1.0-16woody1_arm.deb Size/MD5 checksum: 2757110 86347d552e46d6588bffff6527891609 http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dev_4.1.0-16woody1_arm.deb Size/MD5 checksum: 3091924 2ecfecaf4d1480f6719161f41b1c57a9 http://security.debian.org/pool/updates/main/x/xfree86/xlibs-pic_4.1.0-16woody1_arm.deb Size/MD5 checksum: 84070 cd1a99cea3618cc2df79d8417a59283e http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.1.0-16woody1_arm.deb Size/MD5 checksum: 132958 a4dd99b199475e87d45a7c6b9c244787 http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.1.0-16woody1_arm.deb Size/MD5 checksum: 1655408 10d1a806b2428d178132e33149b56d9e http://security.debian.org/pool/updates/main/x/xfree86/xprt_4.1.0-16woody1_arm.deb Size/MD5 checksum: 1339478 5b79e75ece1e0712cc28fb240f92ecc3 http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.1.0-16woody1_arm.deb Size/MD5 checksum: 218956 565a64b431fd778ade91de79a11cdd47 http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.1.0-16woody1_arm.deb Size/MD5 checksum: 4831874 7c5f4bfc08c1e716f61c5b0b4fa5ae51 http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.1.0-16woody1_arm.deb Size/MD5 checksum: 494176 8f3d1fe933cd1eae269e82c36ded5bd9 http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.1.0-16woody1_arm.deb Size/MD5 checksum: 620578 472603867d1421d01e6c692e767eb032 http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.1.0-16woody1_arm.deb Size/MD5 checksum: 1786420 635e9b4396a3a20f17db98337e91b685 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.1.0-16woody1_i386.deb Size/MD5 checksum: 131868 4e6a729ecedd2d792f545b95ef8808e2 http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.1.0-16woody1_i386.deb Size/MD5 checksum: 229100 013b9f545a8bf7b4614b5ebfc00617db http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.1.0-16woody1_i386.deb Size/MD5 checksum: 167876 b9f7444698c022fdc76142fba2924a73 http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.1.0-16woody1_i386.deb Size/MD5 checksum: 408864 bf7ba3cafc0c6029b2e5fd99875c792f http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.1.0-16woody1_i386.deb Size/MD5 checksum: 165824 d6eeae92cccce977c08a41322c9e2ae0 http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.1.0-16woody1_i386.deb Size/MD5 checksum: 333700 c239af4fd8f9f46334b29c6238f4027e http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.1.0-16woody1_i386.deb Size/MD5 checksum: 292050 ff62c702b756263a3086ba61c8253fd5 http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.1.0-16woody1_i386.deb Size/MD5 checksum: 212696 9531fd87f93ff956508e216137345d33 http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.1.0-16woody1_i386.deb Size/MD5 checksum: 433272 d0c09cc477a275c1c2a4623aed08c55c http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.1.0-16woody1_i386.deb Size/MD5 checksum: 291924 8a6ae5427bd486a3742217b2baa8e704 http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.1.0-16woody1_i386.deb Size/MD5 checksum: 75768 bb365449a41c50f4325cfbfa2d29d224 http://security.debian.org/pool/updates/main/x/xfree86/twm_4.1.0-16woody1_i386.deb Size/MD5 checksum: 151086 6f58a0ce83eb1f08a6aa902bdd0a4bbc http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.1.0-16woody1_i386.deb Size/MD5 checksum: 59832 99de5573bd52e68023e1747f6099574b http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.1.0-16woody1_i386.deb Size/MD5 checksum: 1455808 ac5514563aa1be8ab2a50f1a845d5c87 http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.1.0-16woody1_i386.deb Size/MD5 checksum: 170514 6013f8eb6e7c78aa7e1f7ff439852e7f http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.1.0-16woody1_i386.deb Size/MD5 checksum: 274984 210ddc3dbdc15329709b887e3f516ac0 http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.1.0-16woody1_i386.deb Size/MD5 checksum: 80368 646d0ad46906cc7ab109949702b1d68f http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dev_4.1.0-16woody1_i386.deb Size/MD5 checksum: 552130 c345b869bda72ea9e81dedbe5c957b6a http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.1.0-16woody1_i386.deb Size/MD5 checksum: 3421956 bfe9428425b2867657328174d1038cc5 http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3-dbg_4.1.0-16woody1_i386.deb Size/MD5 checksum: 865318 bc4fcfed268ab378c4e611c51ab844eb http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.1.0-16woody1_i386.deb Size/MD5 checksum: 521954 8e1a132af4f7d8bf03e7c4aebe6f68ed http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa3_4.1.0-16woody1_i386.deb Size/MD5 checksum: 462062 0284e02b24c5bc1c6ea0619cdf3e3176 http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa3-dbg_4.1.0-16woody1_i386.deb Size/MD5 checksum: 963620 23b9e018dd3a2f3b57c0e9e25e083fcc http://security.debian.org/pool/updates/main/x/xfree86/xlibs_4.1.0-16woody1_i386.deb Size/MD5 checksum: 1223940 aa0cc49a4d7ba1967ca29c1ec1b786a1 http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dbg_4.1.0-16woody1_i386.deb Size/MD5 checksum: 2534236 51ec646bc89eeca7c3f727673958d051 http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dev_4.1.0-16woody1_i386.deb Size/MD5 checksum: 2724850 28a3ead8c6cbcaa064f05daff4c1dd9f http://security.debian.org/pool/updates/main/x/xfree86/xlibs-pic_4.1.0-16woody1_i386.deb Size/MD5 checksum: 72806 aeee0ddfff582183898337624a6e5a0f http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.1.0-16woody1_i386.deb Size/MD5 checksum: 123924 b77989c1a5314e8274d13821f1fea13b http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.1.0-16woody1_i386.deb Size/MD5 checksum: 1392972 328ea5d378d96e83323091822760a853 http://security.debian.org/pool/updates/main/x/xfree86/xprt_4.1.0-16woody1_i386.deb Size/MD5 checksum: 1122518 07ac6616cb6c84a11923a9bc94718dab http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.1.0-16woody1_i386.deb Size/MD5 checksum: 219050 9a99505ef78921269793dd75edc8cda2 http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.1.0-16woody1_i386.deb Size/MD5 checksum: 4334876 805e2b2e2ae08edb479a7b5ee52f4823 http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.1.0-16woody1_i386.deb Size/MD5 checksum: 483978 9ac9e1ef4cbed922661e69f4e5d2b068 http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.1.0-16woody1_i386.deb Size/MD5 checksum: 601676 7f8dee0ac3974e55046f5ffc3396f184 http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.1.0-16woody1_i386.deb Size/MD5 checksum: 1495932 e0b2e685945a924a2c454518e9cb8765 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 191052 79823d7ec74e9b4120c2a26cec34d780 http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 321506 b5c3dcdc87f282f517ed18d1b6a09262 http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 240868 3ba4a3f5bf0d6575363cd77d7eeac165 http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 824490 7f8129dd9a812ae380c11a772c40e02a http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 257462 de039254c0b162ec9347b1ed8ee8ce59 http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 1166896 547186763b3370fc7da723a36aaad5e1 http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 443612 3340375c091b952fa659a001c778c06c http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 339718 cf23cb9a8b1584f36f2aa20124194274 http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 1333316 88b88ef01a767216f33b4ad7af8bcae2 http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 443508 45468bc6469d2a9000eccfbea2bae74d http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 83312 c379fe38cd17a665819c6a88506f4068 http://security.debian.org/pool/updates/main/x/xfree86/twm_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 207136 69ae84939b0d052efb2939a339ba6064 http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 59836 062a0e576d0286cd38330550464c7b58 http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 2409600 4f8519fe609780cda1036e867b9a99e4 http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 210322 abcc2f3d14d6a59777a72091c0e9f864 http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 472904 8ebd374a3fdc9229a4d2b529cbc66f25 http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 90522 17ebcdf66c36b2b8a972e38f44a9278d http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dev_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 742964 47356a0370608644a49a20c44731bb2b http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 5184974 9dbf5b85af5dc5b787fc49a11a8e150d http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3-dbg_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 2394146 58ce91432619dcea37f4bdea032662ee http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 831202 1710d9b86fe0ac1a8c2d8f066e298957 http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa3_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 755344 e59ac8fff400c722f33da5e22f663e36 http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa3-dbg_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 3198822 564e9fb30c4ae252072c824ab99ef63d http://security.debian.org/pool/updates/main/x/xfree86/xlibs_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 1651928 fe029ff2145d14e6f5de6dd8cd58bf90 http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dbg_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 18060132 9c029ed22bdb90650064d6bb5ca836b1 http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dev_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 3512430 306a9b2df41fe39bc3d3a552e1b8d1af http://security.debian.org/pool/updates/main/x/xfree86/xlibs-pic_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 88644 2448ab3fc771fbb6bc0dfd17714029bb http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 169816 dfbe0d27616854586ab10a76fdbe7150 http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 2369928 d234d286498d08fad843f5214fe03a51 http://security.debian.org/pool/updates/main/x/xfree86/xprt_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 1894400 ab19d6258158894b704bc1abe145a288 http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 220980 3639dac0d5e21e7148f56409f62f58ec http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 6900550 44d66f86f743a7da5d0457de449ba446 http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 566226 05635ac4c0026ad63f0cf90128daf92a http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 814896 e48c8276b5e880dbc6cca21fdd6527cd http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.1.0-16woody1_ia64.deb Size/MD5 checksum: 2570950 ded41248f56a4aa50d8b162233d0914e HP Precision architecture: http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 153970 282d3d56f5bb262ee43dd195c8c64ac3 http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 277818 2ad015cf6fd0d61d3309f1597749b941 http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 201844 106ce97413bd06905d08343772ed81bb http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 488336 09fc528826e2a43f81b9c81f25247490 http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 203396 ff63d2458d9d2be8a6730b0e63254e9d http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 397250 f143cc3ffdd65f980cc0e1f8b46b5b74 http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 357932 57b67b20bc31be5adfb2777c2814493c http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 263802 526ae9aeb9eff5d3b44a8b524da28afd http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 516890 87e2d9ba2f01b5ff025e2abe5a20ebc0 http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 357810 f55c9ab6e9dd0ba084019919d9dd2aa1 http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 77990 f7a8a2ea68081a58faca3451df7f6b5c http://security.debian.org/pool/updates/main/x/xfree86/twm_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 171862 a7443c9db94d3e537cf68f00f6426e84 http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 59828 541a95464444759a8441ac8ea8b434f0 http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 1699284 2a8039d220647328f6a983b50b707e0e http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 180434 11d9a2e4538b54897bb13a047af9b78c http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 337770 89756d38d2524a1e360546f1b2e59e94 http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 83002 ca058399ba6a124f813ce75fe9a48f8c http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dev_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 680980 704a1ef0f5f54821bbe997cb43681eba http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 434142 9fe8e70f6cfdc53f35e9d1ac41138d9d http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3-dbg_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 995116 d262b4f194f76355e4c3aa53feb19b52 http://security.debian.org/pool/updates/main/x/xfree86/xlibs_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 1456222 3609976a0b3facbab8b9f338a5f5360b http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dbg_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 2977164 22afbf53fba3442713d17ee8b63588c4 http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dev_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 3191114 88a304ccb8f96f21593043ae907b4bdb http://security.debian.org/pool/updates/main/x/xfree86/xlibs-pic_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 80530 08bc4cd00ad008c6362b2cdcfacc01f4 http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 137256 6b5a563ef922d653aa1e9e7b541bca9b http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 1923244 5730d34a84e93760933ccdb14a226579 http://security.debian.org/pool/updates/main/x/xfree86/xprt_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 1498606 511f15524b42ef50b311217f817a1691 http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 219536 94b448d2443ca9e37f90600ea4b6ab09 http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 3591730 f028df776b92cf7939f92c69bcbdba33 http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 509590 4b1513550084710c18b810ba738b204b http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 664394 70ff31e23438f40bbc882415daab2b8a http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.1.0-16woody1_hppa.deb Size/MD5 checksum: 2069434 0a840cb6a2ad4b800c19e0ccfebb7225 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 127008 dbe5ce6140c4867cdcd8c19e16cafd7c http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 231820 ab45bf783d22460b17e7bec16083a7bb http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 176174 3df97696ae3bf267e127a604bee474c5 http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 432602 9c55fd39dd48c6acae5447a4a76a463d http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 162988 d3c24329255f11838a9c880eca9b388b http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 340310 38e7b70d621e11d7509c05fea5aa0499 http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 282708 f292b664b1c534b4eaeb9e091cac49ed http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 207472 689ce43213019ae32acb3a7b12ccbee6 http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 442826 ffc3121a9fae59ce0b51a1e990c35c7a http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 282600 02486152f99e4bd77df4d57a291a296f http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 74866 47aeaa1825535861410b295f8f6df659 http://security.debian.org/pool/updates/main/x/xfree86/twm_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 147248 e76441fe6e830b1f97a7577fac88c116 http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 59842 61aba227ab1fd8e50af023c8acc4e330 http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 1375040 06079bbb9cf37f2e5dbb53889193493f http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 167718 e9b474eebb48ac6f2cff62eaf41e1cbf http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 255870 3142c834fa0d1ce281c803294ce5aa6b http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 79272 0aec62a2fe0fe5ecbf757b3c6a4db715 http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dev_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 519110 8cb70e074a1e632c651bd68cb38378e9 http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 335086 edf50388426c5b579226a679cff5a5cc http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3-dbg_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 863944 cba183f599ae2ca957f36e48261396e1 http://security.debian.org/pool/updates/main/x/xfree86/xlibs_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 1181742 62ae21dff505723f3d11fb5c17d8ea66 http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dbg_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 2574676 c306abc6aef2942b5995d94f900490a4 http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dev_4.1.0-16woody1_m68k.deb Size/MD5 checksum: 2646876 d4e7a7cd7c4c13f810052c8b643e08bd |
This topic does not have any threads posted yet!
You cannot post until you login.