CVE-2006-0207
CVSS5.0
发布时间 :2006-01-13 18:03:00
修订时间 :2011-09-09 00:00:00
NMCOPS    

[原文]Multiple HTTP response splitting vulnerabilities in PHP 5.1.1 allow remote attackers to inject arbitrary HTTP headers via a crafted Set-Cookie header, related to the (1) session extension (aka ext/session) and the (2) header function.


[CNNVD]PHP ext/session HTTP响应拆分漏洞(CNNVD-200601-146)

        PHP是广泛使用的通用目的脚本语言,特别适合于Web开发,可嵌入到HTML中。
        PHP5对请求回应数据的输出上存在漏洞,远程攻击者可能利用此漏洞执行跨站脚本攻击。从PHP5开始会在Set-Cookie HTTP首部中向用户发送回用户所提供的会话ID。由于没有对这个会话ID执行有效性检查,因此攻击者可以使用特制的会话ID向响应体中注入特制的HTTP首部,导致HTTP响应拆分和跨站脚本(XSS)攻击。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-94 [对生成代码的控制不恰当(代码注入)]

- CPE (受影响的平台与产品)

cpe:/a:php:php:5.0.4PHP PHP 5.0.4
cpe:/a:php:php:5.0.0PHP PHP 5.0.0
cpe:/a:php:php:5.0.1PHP PHP 5.0.1
cpe:/a:php:php:5.0:rc1
cpe:/a:php:php:5.1
cpe:/a:php:php:5.0.2PHP PHP 5.0.2
cpe:/a:php:php:5.1.1PHP PHP 5.1.1
cpe:/a:php:php:5.0.5PHP PHP 5.0.5
cpe:/a:php:php:5.0:rc3
cpe:/a:php:php:5.0:rc2
cpe:/a:php:php:5.0.3PHP PHP 5.0.3

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0207
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0207
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200601-146
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/24094
(PATCH)  XF  php-session-response-splitting(24094)
http://www.securityfocus.com/bid/16220
(PATCH)  BID  16220
http://www.gentoo.org/security/en/glsa/glsa-200603-22.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200603-22
http://securitytracker.com/id?1015484
(VENDOR_ADVISORY)  SECTRACK  1015484
http://secunia.com/advisories/19355
(VENDOR_ADVISORY)  SECUNIA  19355
http://secunia.com/advisories/19179
(VENDOR_ADVISORY)  SECUNIA  19179
http://secunia.com/advisories/18697
(VENDOR_ADVISORY)  SECUNIA  18697
http://secunia.com/advisories/18431
(VENDOR_ADVISORY)  SECUNIA  18431
http://www.vupen.com/english/advisories/2006/0369
(VENDOR_ADVISORY)  VUPEN  ADV-2006-0369
http://www.vupen.com/english/advisories/2006/0177
(VENDOR_ADVISORY)  VUPEN  ADV-2006-0177
http://www.ubuntulinux.org/support/documentation/usn/usn-261-1
(UNKNOWN)  UBUNTU  USN-261-1
http://www.php.net/release_5_1_2.php
(UNKNOWN)  CONFIRM  http://www.php.net/release_5_1_2.php
http://www.mandriva.com/security/advisories?name=MDKSA-2006:028
(UNKNOWN)  MANDRIVA  MDKSA-2006:028
http://www.hardened-php.net/advisory_012006.112.html
(VENDOR_ADVISORY)  MISC  http://www.hardened-php.net/advisory_012006.112.html
http://www.debian.org/security/2007/dsa-1331
(UNKNOWN)  DEBIAN  DSA-1331
http://secunia.com/advisories/25945
(UNKNOWN)  SECUNIA  25945
http://secunia.com/advisories/19012
(VENDOR_ADVISORY)  SECUNIA  19012
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html
(UNKNOWN)  SUSE  SUSE-SR:2006:004

- 漏洞信息

PHP ext/session HTTP响应拆分漏洞
中危 输入验证
2006-01-13 00:00:00 2006-05-02 00:00:00
远程  
        PHP是广泛使用的通用目的脚本语言,特别适合于Web开发,可嵌入到HTML中。
        PHP5对请求回应数据的输出上存在漏洞,远程攻击者可能利用此漏洞执行跨站脚本攻击。从PHP5开始会在Set-Cookie HTTP首部中向用户发送回用户所提供的会话ID。由于没有对这个会话ID执行有效性检查,因此攻击者可以使用特制的会话ID向响应体中注入特制的HTTP首部,导致HTTP响应拆分和跨站脚本(XSS)攻击。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        http://www.hardened-php.net/downloads.13.html

- 漏洞信息 (F57548)

Debian Linux Security Advisory 1331-1 (PacketStormID:F57548)
2007-07-10 00:00:00
Debian  debian.org
advisory,remote,web,overflow,arbitrary,php,vulnerability
linux,debian
CVE-2006-0207,CVE-2006-4486,CVE-2007-1864
[点击下载]

Debian Security Advisory 1331-1 - Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code. Stefan Esser discovered HTTP response splitting vulnerabilities in the session extension. This only affects Debian 3.1 (Sarge). Stefan Esser discovered that an integer overflow in memory allocation routines allows the bypass of memory limit restrictions. This only affects Debian 3.1 (Sarge) on 64 bit architectures. It was discovered that a buffer overflow in the xmlrpc extension allows the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1331-1                    security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
July 7th, 2007                          http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : php4
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2006-4486 CVE-2006-0207 CVE-2007-1864 

Several remote vulnerabilities have been discovered in PHP, a
server-side, HTML-embedded scripting language, which may lead to the
execution of arbitrary code. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2006-0207
    Stefan Esser discovered HTTP response splitting vulnerabilities
    in the session extension. This only affects Debian 3.1 (Sarge).

CVE-2006-4486
    Stefan Esser discovered that an integer overflow in memory allocation
    routines allows the bypass of memory limit restrictions. This only
    affects Debian 3.1 (Sarge) on 64 bit architectures.

CVE-2007-1864
    It was discovered that a buffer overflow in the xmlrpc extension
    allows the execution of arbitrary code.
    
For the oldstable distribution (sarge) these problems have been fixed
in version 4.3.10-22.

For the stable distribution (etch) these problems have been fixed
in version 4.4.4-8+etch4.

The unstable distribution (sid) no longer contains php4.

We recommend that you upgrade your PHP packages. Sarge packages for
hppa, mips and powerpc are not yet available, due to problems on the
build hosts. They will be provided later.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-22.dsc
      Size/MD5 checksum:     1686 275d3bf152c7eb24f9054726f259dd19
    http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-22.diff.gz
      Size/MD5 checksum:   288318 8b08b97d85d96ce4a6f0ba89ef8ed143
    http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10.orig.tar.gz
      Size/MD5 checksum:  4892209 73f5d1f42e34efa534a09c6091b5a21e

  Architecture independent components:

    http://security.debian.org/pool/updates/main/p/php4/php4-pear_4.3.10-22_all.deb
      Size/MD5 checksum:   249994 9542829963ecc9a84d0c5ae8e6d5543c
    http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-22_all.deb
      Size/MD5 checksum:     1146 8de38b3066c2a9e5e18cb5a4efff4856

  Alpha architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-22_alpha.deb
      Size/MD5 checksum:  1702008 e32f6acc34ed622dcf7ec1982eb9b900
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-22_alpha.deb
      Size/MD5 checksum:  1699516 4bdf08bba93781f2d5db18610ff1dc8f
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-22_alpha.deb
      Size/MD5 checksum:  3467224 35abf7fbe0b4a1c266ee840e1011cc67
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-22_alpha.deb
      Size/MD5 checksum:  1743864 d80afc3e61de65fa1dcc48484307a138
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-22_alpha.deb
      Size/MD5 checksum:   168716 057d3633627eb97d0441152936554f44
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-22_alpha.deb
      Size/MD5 checksum:    18134 16280cd4b134549f089ec08e38a1d685
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-22_alpha.deb
      Size/MD5 checksum:   328140 dbdd1143e30e362cc6e50b7fe16d0d58
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-22_alpha.deb
      Size/MD5 checksum:    39026 be4086a4dff7aac9f4171072160aa9bf
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-22_alpha.deb
      Size/MD5 checksum:    34542 50517a6e45bb7989c38d5fbcad8eae92
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-22_alpha.deb
      Size/MD5 checksum:    38136 acdc4849f6a5da157b26fcdb40338ec3
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-22_alpha.deb
      Size/MD5 checksum:    21362 15545c182b051a29eea026ed26f1e9ff
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-22_alpha.deb
      Size/MD5 checksum:    18194 2ef3306dbe374c3ba0712baf504becba
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-22_alpha.deb
      Size/MD5 checksum:     8320 cb10233cec53033abe1228c2108d95a6
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-22_alpha.deb
      Size/MD5 checksum:    22438 b59951d5e7a418155597d744a6a779e0
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-22_alpha.deb
      Size/MD5 checksum:    28360 9ebbaaf32b5c114438169cffb0d4ac8b
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-22_alpha.deb
      Size/MD5 checksum:     7952 ab3d11217a23213456c8bd5e9fc32c29
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-22_alpha.deb
      Size/MD5 checksum:    13756 cc75c2e6185f4263d6ede795f4ea82d8
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-22_alpha.deb
      Size/MD5 checksum:    23288 50227bb43b38eae775d2f4d37051ce7d
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-22_alpha.deb
      Size/MD5 checksum:    17876 eb54ca23af0746eb8ac4bc7bf4168bde

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-22_amd64.deb
      Size/MD5 checksum:  1661084 0b6824047bc867b95d207bc9a4a29f03
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-22_amd64.deb
      Size/MD5 checksum:  1658342 3a26fa9b301bb633dc3fda9091d86a36
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-22_amd64.deb
      Size/MD5 checksum:  3279950 951afe757262f9e7a15a1593b1cda079
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-22_amd64.deb
      Size/MD5 checksum:  1649058 96d9a0250ca02e74ee7c5e4b0fcde48f
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-22_amd64.deb
      Size/MD5 checksum:   168870 ec162fe6f1ac95d1a279af2a679bcb90
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-22_amd64.deb
      Size/MD5 checksum:    17830 81c2d6c54071e5d96d9c04aaee13b236
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-22_amd64.deb
      Size/MD5 checksum:   325178 d3eb922af0afaee903d3be11a4d7af2a
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-22_amd64.deb
      Size/MD5 checksum:    40802 d716cc1f761739234112d8071dff948e
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-22_amd64.deb
      Size/MD5 checksum:    34280 4102ad6bb2d0bf31123aa04da4f887d9
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-22_amd64.deb
      Size/MD5 checksum:    37722 4d0debcc05934a146b49541532062c45
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-22_amd64.deb
      Size/MD5 checksum:    21410 d4ba2d15a150693ea84683e687b8700c
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-22_amd64.deb
      Size/MD5 checksum:    18886 f32a1fe0c5de6aaed25d5fd93a952666
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-22_amd64.deb
      Size/MD5 checksum:     8240 d582f01decbc6341dffa413ca0f83b92
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-22_amd64.deb
      Size/MD5 checksum:    22884 91df08831320ffe5ccae67e4b1acfbe1
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-22_amd64.deb
      Size/MD5 checksum:    28780 e24ee4263ffbd4beccca7fbfd6ffbd26
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-22_amd64.deb
      Size/MD5 checksum:     7908 c46c1033560635c06cd1550ddee4d8ab
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-22_amd64.deb
      Size/MD5 checksum:    13668 4194188b82f0536041be6c62ca80f03e
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-22_amd64.deb
      Size/MD5 checksum:    22434 7c95d870c77874e8cdd9333ecb4d6c12
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-22_amd64.deb
      Size/MD5 checksum:    17572 b755733b324f8b6fe009ce58be81b871

  ARM architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-22_arm.deb
      Size/MD5 checksum:  1593104 5410609c3c65c8bf11a48e7aa387ac80
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-22_arm.deb
      Size/MD5 checksum:  1592462 d2b164ee919bc236214b2116e99c700a
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-22_arm.deb
      Size/MD5 checksum:  3173416 f6591563486d623aa04851912d08166d
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-22_arm.deb
      Size/MD5 checksum:  1593044 3e4ce1ad458213a5aba438a0651605d9
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-22_arm.deb
      Size/MD5 checksum:   168910 dd1996c03744b730c9f86a51a9eeef13
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-22_arm.deb
      Size/MD5 checksum:    17656 0f73dfaefeead5628b3354cabfb787ed
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-22_arm.deb
      Size/MD5 checksum:   325550 40cf746cfc5d71f978d4158ebd105a7c
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-22_arm.deb
      Size/MD5 checksum:    36114 e0df4c0fa78c6ee5b83e203b10a5c2bf
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-22_arm.deb
      Size/MD5 checksum:    31782 9cc61fd12b573a63fc7d8fc035e8ba6d
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-22_arm.deb
      Size/MD5 checksum:    35462 3819cdd49a8f07c3d289c0a92de3268c
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-22_arm.deb
      Size/MD5 checksum:    19738 4269fa0c62738f975db65e025e97c9f0
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-22_arm.deb
      Size/MD5 checksum:    17088 56020e5c4d0fe2fa482e7948c348a45e
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-22_arm.deb
      Size/MD5 checksum:     7828 4b5afcea937eee89b4a4180c3e12aabe
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-22_arm.deb
      Size/MD5 checksum:    20606 6388dde1388aeb77ca91353e2cb6d50a
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-22_arm.deb
      Size/MD5 checksum:    27334 53a59cc94d128ab3cef868c1020f0220
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-22_arm.deb
      Size/MD5 checksum:     7654 7255002e8acc7d542251a57cc14ebc03
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-22_arm.deb
      Size/MD5 checksum:    12798 61a55d6f52cf2fc2b4e49f568be9b026
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-22_arm.deb
      Size/MD5 checksum:    20900 c7cbb9446442e67de79e4f5c950e4147
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-22_arm.deb
      Size/MD5 checksum:    15796 6d001e67642c6c2b0c058976db3cb99d

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-22_i386.deb
      Size/MD5 checksum:  1614348 b7e9671a31a898da1b4219c9b6185bbc
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-22_i386.deb
      Size/MD5 checksum:  1612354 9d108ee7b6f85ba2097e8b676529c9c3
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-22_i386.deb
      Size/MD5 checksum:  3209432 fb172effe3844f33b959219546070273
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-22_i386.deb
      Size/MD5 checksum:  1609704 4e876ed4ec3ff6b24af1624d303d2c7f
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-22_i386.deb
      Size/MD5 checksum:   168870 676b990017df9375e0ea1e3b4c1c67da
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-22_i386.deb
      Size/MD5 checksum:    17898 432a163c9c38c44b56d3f27824025a2c
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-22_i386.deb
      Size/MD5 checksum:   325160 3ac78abeaf7e06d7f28a40731e0e6a0e
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-22_i386.deb
      Size/MD5 checksum:    37234 03ff79a59154f66184d0fcf4e8a379aa
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-22_i386.deb
      Size/MD5 checksum:    32384 bdf0858fe4420e0cf60069bff264a41a
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-22_i386.deb
      Size/MD5 checksum:    37402 5c07a7052ac4f02447ad77b19464a603
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-22_i386.deb
      Size/MD5 checksum:    19950 b1fd1e18a808f5cb6d3a8f5479a5051c
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-22_i386.deb
      Size/MD5 checksum:    17668 c73e8db0b128547cc48c3a7c5774aa44
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-22_i386.deb
      Size/MD5 checksum:     8036 14dadeb2766bf4f19bf9baf963dc73a9
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-22_i386.deb
      Size/MD5 checksum:    21214 7a559e0f4fad6d665dddca9b11f6b63a
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-22_i386.deb
      Size/MD5 checksum:    27142 9d2d1eefc0b491c8fe9a751e67976e46
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-22_i386.deb
      Size/MD5 checksum:     7702 30d3f5bd63c502fe916d72f09f018239
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-22_i386.deb
      Size/MD5 checksum:    13154 fbe8760da5b8bcac850a9b252158bfca
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-22_i386.deb
      Size/MD5 checksum:    21378 162dbfd71fa586711386fff21f6f57d7
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-22_i386.deb
      Size/MD5 checksum:    16396 0e22226e9175a10a31c8c62e30b80896

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-22_ia64.deb
      Size/MD5 checksum:  1952606 a03204cf1cfd497be43c5db6fbab8529
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-22_ia64.deb
      Size/MD5 checksum:  1949926 066d4b0ff5aacc3a0c0525c890293f5e
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-22_ia64.deb
      Size/MD5 checksum:  3897044 32e37a9f61641825c74fc1b4464f8e93
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-22_ia64.deb
      Size/MD5 checksum:  1950756 8082fdf0aed1b71917c5b792bbd81be2
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-22_ia64.deb
      Size/MD5 checksum:   168876 551c98dd8fcabe1083ef0d71269b8888
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-22_ia64.deb
      Size/MD5 checksum:    22014 07adaf03e78755996b4ae22196d032fa
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-22_ia64.deb
      Size/MD5 checksum:   325184 75cbdd211c37b6f970d0c2f8692d6dc5
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-22_ia64.deb
      Size/MD5 checksum:    50634 a56e4bd145d908eb40077bb39e499237
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-22_ia64.deb
      Size/MD5 checksum:    45244 82b0f956bec8eabe936087bfc85b797d
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-22_ia64.deb
      Size/MD5 checksum:    48260 751164be6073f83f4a8ecfd5298b1d21
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-22_ia64.deb
      Size/MD5 checksum:    27028 4e3fe06ae35dd03c8e1640c89af22b2f
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-22_ia64.deb
      Size/MD5 checksum:    22644 bdbd777bb1947ef5a9049e3116283fa9
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-22_ia64.deb
      Size/MD5 checksum:     9316 5dc08966a63ef6876acbb17f065f7304
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-22_ia64.deb
      Size/MD5 checksum:    27588 29995ebe245f1783cfe2c83eacc24e9c
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-22_ia64.deb
      Size/MD5 checksum:    36164 b09a52d21f918c0ecc02df08b72f01d4
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-22_ia64.deb
      Size/MD5 checksum:     9002 5ee32a091cdcedaab03babaf00714244
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-22_ia64.deb
      Size/MD5 checksum:    16324 eb0678ddfc2e8723a575028eb8c01ede
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-22_ia64.deb
      Size/MD5 checksum:    28866 b97f3ba1ff0702f692bc3648d544bf30
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-22_ia64.deb
      Size/MD5 checksum:    21894 273ff0cbc2c04a27e55adbe42c81bbee

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-22_m68k.deb
      Size/MD5 checksum:  1580882 f4f13718246a7bfe8845ac47b59fdd28
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-22_m68k.deb
      Size/MD5 checksum:  1579076 a421b5d082b07afe03fbd382de9a6062
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-22_m68k.deb
      Size/MD5 checksum:  3081098 6afbc328072d1d38a738c4868a6a8d29
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-22_m68k.deb
      Size/MD5 checksum:  1551634 e710d0ee3764315a0c462cced15da798
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-22_m68k.deb
      Size/MD5 checksum:   168916 8a657c1ed11174ebfe90c42883e31cdf
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-22_m68k.deb
      Size/MD5 checksum:    18310 586ff3aedcfc092a8560dc92b38f242c
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-22_m68k.deb
      Size/MD5 checksum:   325796 7fced8608442819488c1128c829ad4d9
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-22_m68k.deb
      Size/MD5 checksum:    36512 e1817f4701e2a165ac954b0d2d8e40b4
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-22_m68k.deb
      Size/MD5 checksum:    31004 320e56bfcc4d2a4f2fa78e90c529ddd8
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-22_m68k.deb
      Size/MD5 checksum:    34928 b26e56fe8df70da287efed7f6b2c8abd
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-22_m68k.deb
      Size/MD5 checksum:    19128 e6c05a1206b8c7a365010935f491ca13
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-22_m68k.deb
      Size/MD5 checksum:    17808 7016c00e16cf7601dbc21e4650cb70c3
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-22_m68k.deb
      Size/MD5 checksum:     7960 5e5dbe17a6c7e1bc4a20a272f944789c
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-22_m68k.deb
      Size/MD5 checksum:    20684 c084ddf3005c96799e41c07c5d41a1af
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-22_m68k.deb
      Size/MD5 checksum:    25846 fff295ada3a5805d27d82d8fac354865
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-22_m68k.deb
      Size/MD5 checksum:     7670 c6f1d8f10560c888592dcc6f6fad08b4
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-22_m68k.deb
      Size/MD5 checksum:    12712 9ed391e533a62ff540aa8dafbabfa08d
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-22_m68k.deb
      Size/MD5 checksum:    20370 5636762ba6357480516df4c2ab24b80f
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-22_m68k.deb
      Size/MD5 checksum:    15878 9fb9a26c592dc40b5bae795b73639d43

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-22_mipsel.deb
      Size/MD5 checksum:  1630964 0f3ced4b479d9c38c6c81b38a983ec9f
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-22_mipsel.deb
      Size/MD5 checksum:  1629354 4a873448bea8c088735fb9597025d3f7
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-22_mipsel.deb
      Size/MD5 checksum:  3255772 f38acb4ddc688673c5a0bcce7f965940
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-22_mipsel.deb
      Size/MD5 checksum:  1631918 5d536a92bc5477efbd7d32558c7a45e7
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-22_mipsel.deb
      Size/MD5 checksum:   168892 9d27bd1604fb1fd698a2f3801f3bf84d
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-22_mipsel.deb
      Size/MD5 checksum:    16790 cfa54d1f9406e5346f2144469c5419eb
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-22_mipsel.deb
      Size/MD5 checksum:   325312 2caaf4719a222437ec09f88dd414ee67
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-22_mipsel.deb
      Size/MD5 checksum:    34774 9419d51a6ac86171b0d37803fe6c862e
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-22_mipsel.deb
      Size/MD5 checksum:    31664 2b67b9203d8137b1adaeaa9d9e70e62d
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-22_mipsel.deb
      Size/MD5 checksum:    33896 48fa23f2b75185f9139ee80b7834eb87
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-22_mipsel.deb
      Size/MD5 checksum:    19802 3adea005443cf7f636aecb7f3ee73b92
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-22_mipsel.deb
      Size/MD5 checksum:    16386 bcf93393b9a7e08969ae281a3e072d9e
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-22_mipsel.deb
      Size/MD5 checksum:     8092 d11336219b5713c5bf3a651bd3d9f5b3
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-22_mipsel.deb
      Size/MD5 checksum:    20448 9430960d561f7c21927707091a2123b1
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-22_mipsel.deb
      Size/MD5 checksum:    26242 ac7d756c47d401af5c2b5e20b97732b8
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-22_mipsel.deb
      Size/MD5 checksum:     7780 293fdeb98a4f1ce76e028e3ffeee5aef
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-22_mipsel.deb
      Size/MD5 checksum:    13052 cec6af641a2d61fba78abe4563aa62ee
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-22_mipsel.deb
      Size/MD5 checksum:    21594 4c0eedefc2e8c4473d25776cc8b193a1
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-22_mipsel.deb
      Size/MD5 checksum:    16164 e86989f7925a3e575c3cd73d590fd9b8

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-22_s390.deb
      Size/MD5 checksum:  1710016 f13d0a3da6b29f19227d0b354d4e26f4
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-22_s390.deb
      Size/MD5 checksum:  1709188 540218ad6511020b7add8f86d41565c3
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-22_s390.deb
      Size/MD5 checksum:  3361122 b05cd5e0f92448859979dddd0b54771e
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-22_s390.deb
      Size/MD5 checksum:  1687684 06814ada41c3c609115ad70f361cc2cc
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-22_s390.deb
      Size/MD5 checksum:   168880 e200ef0e76820184db398232e0a07666
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-22_s390.deb
      Size/MD5 checksum:    17842 ed202880713f3853368825f59c15a747
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-22_s390.deb
      Size/MD5 checksum:   325176 d8781f6fdde355d8e4654352dae2d1cd
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-22_s390.deb
      Size/MD5 checksum:    41124 ae416e5c43681062947e29b2b3891684
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-22_s390.deb
      Size/MD5 checksum:    33562 9245975ab28ecd4b5e42b94d9082d9fe
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-22_s390.deb
      Size/MD5 checksum:    37530 512c093d51c8bb6e65ac8f7b1e7684e1
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-22_s390.deb
      Size/MD5 checksum:    21410 fee2d754756a35b576e563ac63209718
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-22_s390.deb
      Size/MD5 checksum:    17726 f116192d4f48780adbb5eab6493d67a6
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-22_s390.deb
      Size/MD5 checksum:     8396 099162f0f5a78af74552365a67888282
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-22_s390.deb
      Size/MD5 checksum:    22934 177736b769e2be046934b0b29c66623d
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-22_s390.deb
      Size/MD5 checksum:    28870 b3ac728045ecee2d43ab1588cbe512f2
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-22_s390.deb
      Size/MD5 checksum:     8044 714bbdc3340443cbb5989152773deb45
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-22_s390.deb
      Size/MD5 checksum:    13896 32c3a0f7f7426018105fe2e517bec953
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-22_s390.deb
      Size/MD5 checksum:    22268 e180b9874a00d52f392f6b0687f61788
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-22_s390.deb
      Size/MD5 checksum:    17298 7be7d21bd4c3181eb3aa5a626f1d16b1

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-22_sparc.deb
      Size/MD5 checksum:  1623912 9309dbcb3aa5586a3c2eab922c2f9e55
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-22_sparc.deb
      Size/MD5 checksum:  1621300 52f73dfd5796a18babad40f11fd93cc8
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-22_sparc.deb
      Size/MD5 checksum:  3198744 a80b02ade50b0faeca427b985b743ef5
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-22_sparc.deb
      Size/MD5 checksum:  1607108 125e6d9db8b2ca788445d77c54df6126
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-22_sparc.deb
      Size/MD5 checksum:   168884 26c0076dfdbc24533e4f4ee91d7d7669
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-22_sparc.deb
      Size/MD5 checksum:    18072 b385e2bcdd30709d3a4f6ba97f026212
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-22_sparc.deb
      Size/MD5 checksum:   325258 47eaf5f870df33cd83167edde66c35bc
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-22_sparc.deb
      Size/MD5 checksum:    36488 5b7c76b235afc7c60692ea3cda2b467c
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-22_sparc.deb
      Size/MD5 checksum:    31948 83bf0be7368c8048438768da31b19112
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-22_sparc.deb
      Size/MD5 checksum:    36242 c017f8c8642d5de13bfac3da62bf0ce1
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-22_sparc.deb
      Size/MD5 checksum:    19270 7d3d43766cca6df506503767e4de016f
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-22_sparc.deb
      Size/MD5 checksum:    17490 712858ca5e0ed353333f8064deeb1839
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-22_sparc.deb
      Size/MD5 checksum:     7872 3f30717d0de066671b0dd3e0eff3deaa
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-22_sparc.deb
      Size/MD5 checksum:    20674 f240c37355d878346adbcfc7c2c38271
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-22_sparc.deb
      Size/MD5 checksum:    26532 bb0da54f19fdc49140047961310c4209
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-22_sparc.deb
      Size/MD5 checksum:     7596 075c70c7f98f417737c6291ca9c1a95c
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-22_sparc.deb
      Size/MD5 checksum:    12844 912b2877294f234c0bf71e2742b2fb8b
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-22_sparc.deb
      Size/MD5 checksum:    20848 194a95a419c96b578481bb33f0b331ca
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-22_sparc.deb
      Size/MD5 checksum:    15868 add2205e575b95c5a7a18665d8db304a


Debian GNU/Linux 4.0 alias etch
- -------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/p/php4/php4_4.4.4-8+etch4.dsc
      Size/MD5 checksum:     2001 7b924e077ac34cbb57154292effc3436
    http://security.debian.org/pool/updates/main/p/php4/php4_4.4.4-8+etch4.diff.gz
      Size/MD5 checksum:    99294 1a5f3517c2babc868cbdcc7caa77c298
    http://security.debian.org/pool/updates/main/p/php4/php4_4.4.4.orig.tar.gz
      Size/MD5 checksum:  5555168 e884b9b7c2e936310553c946bc2f67c2

  Architecture independent components:

    http://security.debian.org/pool/updates/main/p/php4/php4-pear_4.4.4-8+etch4_all.deb
      Size/MD5 checksum:     1182 ac7e0e1d7ddf9477747d56db011756e7
    http://security.debian.org/pool/updates/main/p/php4/php4_4.4.4-8+etch4_all.deb
      Size/MD5 checksum:     1162 574a5e13465d5be6cc810b7ea18b1311

  Alpha architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:  1685672 628197d6a8442051e6fd0daff15c61ea
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:  1685872 1da9c548fdf31ab6709ad416e65c8e1e
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:  3314002 5a0f7056124b3f3e96f7fa9908f319c3
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:  1663910 d581dc8d0eb35c6602c7adf666fbf1f9
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:   205002 8785651a4c853567f351031a0f5630e0
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    16068 ffab2e012a47406834ea9138341991a5
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:   200812 78f4ade51155efbc152c125b5ca7d32f
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    37692 7333e4970fabe4118176c88a9f1a607c
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    32312 cbc69dbb0b5ba4de2f348e053c3bd3b7
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    35278 e3cd50fad1f9c7a434484e6c0e788b03
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    18698 530f5bc82db16e6b9f952148d3609ea2
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    14600 7fbe3bc58a9c2034c3c9ce8aba4c5c1d
    http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    13958 5d4eb6d627b73657e28b5fbc9a3029bc
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:     5312 9261f1e37636f48eab08f7bd0651ba64
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    20542 f7930ce602254f1402c4258f38b95458
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    25456 f773badfa818a1a2ad142e5ea3f5f6f6
    http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    37338 94e49e9b91594a021545f4b8b132e819
    http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:     8880 11b814d353357d7fc64c690e694884eb
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:     5000 57c9f11b5515c28b1c9f8b67818cfead
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    10976 7d3291fce5056aaa8a85d19afa8de179
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    19644 68fbbf1ff0bfe5af79071c718a260679
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch4_alpha.deb
      Size/MD5 checksum:    14572 3159ff3778f59d95b811c84ee660ebeb

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:  1647352 e70504f6e176e4731797e11c60f16697
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:  1648418 cc659c87fb7caf41148beb1b7dd017db
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:  3255352 3c37f35e4bb1d7bae68d71472a003d38
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:  1635934 482df2d7510401381d35a9543405f7c2
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:   205502 28978ea4cd0a4bbf0b9705fd2e54e3c8
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    15788 5cdaa3835546950d592cad972bb12f80
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:   200628 7264a480ddd53087c52988a9f95c0513
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    39462 d71838aa68313c084ab685831281c959
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    32324 9dbb980c93a4dc3d99e0586b0aeefee9
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    35252 a2aecb5a06f2dccf4899254f46c0db08
    http://security.debian.org/pool/updates/main/p/php4/php4-interbase_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    24152 143ad6d418fe3bb9fdcb20ac169e97ca
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    18612 d60e2ace06fa224bdab79e511fdfa021
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    15610 12dd02d3874ce0879cd3598cdc61458d
    http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    14012 ae114ea857a43e1b588e18f364a88217
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:     5234 fdd234b8eb9a496ff4c9379cfd26193c
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    20572 ab3c8ea527494d3f4f83812a26b678c5
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    26100 5910f1c50cbdd507b0dc0bb3cd8a5176
    http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    36016 809b346872d45a14bcac25981978d873
    http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:     9240 43cfb68caab38fba5a281d09b9f89825
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:     4956 c3e60104b44c90c95150abcd87daabfe
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    11018 d811d207c2df3412338f78791064d5a3
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    19108 8d65b7b13897bf3c43adaae0236e1ad2
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch4_amd64.deb
      Size/MD5 checksum:    14480 02359f755a176f54e63e623a0550cc00

  ARM architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:  1578436 8be1c53f96adf231edd977b4447800f8
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:  1579900 bcf88d557937009a4d290d84b0c02140
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:  3156546 d7c0147d4bfec6d403dee30d65d47272
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:  1587496 aea909b095e8e2e2c8dd22c28b3beba2
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:   206806 770c81a2a01a0d62e0c7a2649dd967bc
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    15292 89096fc458c66cc42ed39e8c590aebb6
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:   201434 bfcf4df1d97187a394bdb348ab414186
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    34580 963bd27e8401b997f5db132096c53efe
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    29414 d9ec67370e1ff1a34ee461a910ed922d
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    32698 ccf0db16652cccfc3050e9a6fe14b167
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    16884 fc87ac6f38a85dce2947f6837fa7a074
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    14066 ac2ba11f0a5c9bafb07fc33f4662c896
    http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    12816 1819494e5b71af72939a2803cece261f
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:     4854 454dd9a461d1578df29eef9d9e79264f
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    18280 472b9c619c2a2b790fe377702bb85209
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    24456 5ccb5aa3d19eff103d47a4e72d4c710d
    http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    33706 d4d9477166fd13f29152d84c10ace60e
    http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:     8806 dc68c9d0d33e965d6de87adefc6427a6
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:     4634 8a49172e1420f21a52b706c300ca3fbe
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    10108 912957bb863dd0cf5539104bb8fbe9fd
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    17784 363ed82e7c5a282e61eccb10386978b3
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch4_arm.deb
      Size/MD5 checksum:    12890 b05dad576bb78631ff62dad0c2396b22

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:  1742034 4aa7a8da3bd4d55286e277c51105f6b7
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:  1743650 eec83d38a33f1d00fce24981f6169b69
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:  3402924 2770a323eb5a9ae9d26e7b40e2375847
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:  1711704 b0659b5b7ff63c375599839092676453
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:   206800 5bd9d16cb0ea9167adc6d4f4f4e6bc14
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    18140 36d67f08b6248ddf198c13fa8183361e
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:   201236 ee774979bfa7f6c9e460d185fc603f9f
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    40558 01a0b50fcb4c7db3ded5c92af764ba04
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    34892 0afaf5cc0bb7c070ec8eeed16b8cc25c
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    38294 cf98f4c7ade1c70393d781ebb6f0a20d
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    20224 a109e023e43f07201304b37d251f0281
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    16198 5c4542a81fc480eabb4d3e7a428f801f
    http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    15670 803bbd2d04717f21b800e96ed2f6cbfc
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:     5800 035d122608b8ff09c4e23caf178b7bb1
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    21254 5a7ee224ef7464226529bb4c18e1ee66
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    27416 1fb227429b72a24f964b8a4a0e245b59
    http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    39398 3d324f5eba4ed05c827a214fe97e2796
    http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:     9642 46a60d00e5c99b798cf5959c5d5f413a
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:     5452 5827a4cba786a44b9c17017e27d40104
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    11552 e55d773015b05ad10bef042c9b01cd2d
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    20638 db53e4717d976eac77ead870a2600aea
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch4_hppa.deb
      Size/MD5 checksum:    15654 f1036cbd0ba4d99eedefd5da81de55e4

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:  1595812 6e21553e33145ee5d1d69f3aa3f35100
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:  1597396 09e1a5d13c576bd2f1c94b9bba3c8ee5
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:  3176204 69274148af28f2eaf9ae16c4ac9fe2b2
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:  1597172 427378ff3788cccc3eaf9939c489828a
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:   205800 441362a231c107f9b308596e7bd0cfa2
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    15922 47c78e2004f72aec970fd8044442ef56
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:   201084 f76b22456eae6313746fd5b92dd7b5f0
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    35040 9f111fde273a20af4c33ffca31382e40
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    29636 ca1f4e1b2fa072ceb234aead02966d75
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    33232 1840c4077f0dc3cad631ccb2aba84c8e
    http://security.debian.org/pool/updates/main/p/php4/php4-interbase_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    23148 3f48767500633fc685dcba0604182396
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    17054 55b2d438855005d6ae5e5f2dc00010a6
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    14058 a8482f10c18ff1bdfe2437c21d6d2541
    http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    13156 3b65012fd1d15c221efa83acd953119c
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:     5042 a4264877af04a16cd40b3b9ee65b2839
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    18544 70007cce50b81b27401b089f7521189f
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    24548 2b0fdbd9db6fff7069843df73bf01c0e
    http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    33834 b3c545c38167482d44a3de35c9818ded
    http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:     8434 d7b24c17cfe01d0a6443c10efeaf071f
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:     4758 6c923f03f06899474d15e35662c14bf0
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    10262 b522a8512b55bacedca58c7094a62106
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    18058 debb997ca629c2f467d74dbb41560950
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch4_i386.deb
      Size/MD5 checksum:    13194 6939c627e257352c604cfbde6288c8d8

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:  2006084 4fe7767e58b2bcb86366b433b27060af
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:  2007382 fa84a36493913077ca0abfd669a1bf30
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:  4009560 3829523fddc03a9cc38d4a49af85bc7f
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:  2009666 a4709ff6cdd384735dace63255af7b6d
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:   206790 bb99e11ba723fa171294e98eb50221a5
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    20732 ead589594478596de90cc02096ce8db1
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:   201154 db93d065ab95af42d2fc0cf6f93b454d
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    53272 41b0f5e8da8c765300ae2c90e7583700
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    44072 8777316523ac768aef232ab5eb997ad1
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    45450 0bb3a57ce3424db4aef1bd1fbc06e721
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    24168 0e2e3c4149d9789439bb1931b3df8169
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    19668 9510dda6de98fd17250b5001fa72d36f
    http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    17870 ddd7238913367c0a2699b5c16291227b
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:     6478 e47b4a79d7166e2d80c2398950ea7419
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    26540 378961d69f2416998659588a3a9daf34
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    35076 8f8ac6770e3d712740e003b71cc9d5d0
    http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    51244 d2d5152b1005383f5cb05c6cec858c7f
    http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    11240 4712ab5d4771794dc2bccc9188583604
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:     6184 d5a9f98946475db9beff082ddb654622
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    13804 338d390779b1bdb8d3c264ba8466b4e0
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    26658 6f71f97b96f875981b1c8395f8cd4a0c
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch4_ia64.deb
      Size/MD5 checksum:    19100 7959a7be650f38882e5e441d83a2cd2e

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:  1603704 9c39f8ba5e04653e3b173fab5e59319a
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:  1604874 e9f3bda7f611bbe90539d7df024a085b
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:  3209914 41d78b8ffd7102eac4ed8dce4e790879
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:  1610624 3bd7f79fb751ef4a09d1e9b979104f0e
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:   206812 82d3d83dac3f609dd96b61fc1de4d3ff
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    14632 8e03edd9091b44c06a48679378b524d1
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:   201246 09743a7c1ed1e41ed9909e958c36d7a0
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    33904 728c21d25d8b02c0f19b366e09b91981
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    28862 8af5be4aeaa9ec48a3d176a1a9fcb70a
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    30220 3ce8636e04125d1dc783ed18fa1cf72d
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    17022 fb661fcedba95640f23288400a5e26c9
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    12748 cd637704a8b029cd88b11c26a61dc452
    http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    12324 3cca3c8198feb4f035906dfc197beb66
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:     5220 bda73a77b7d5c682f5761ac675980fa2
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    18090 f6cf2232aad58559e91974949ba1c615
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    23374 224c08bfad45fa777583b2e7127d90a5
    http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    33330 498864e324554c8c428f1bed7061916f
    http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:     8242 2a3629f2f039cc95a1a5ecde31c2cdc3
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:     4894 f60fc043cbacd7602570d8e5d02ddd33
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    10304 e7fca3738a53c40c61510e3d7d4df234
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    18110 4db29fb071c2c7f6c72497bcc0a6c457
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch4_mipsel.deb
      Size/MD5 checksum:    13220 756b4afd502baa8371bfd60a8ccf1003

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:  1647880 04f6d567541a4b41168af89669ce9ea2
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:  1649238 10741f49bf2b345476902eb7a7460193
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:  3257448 6db3ecc833eec9c173a440f637120f8f
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:  1635624 34f314845157edc92a1df0af0354df8a
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:   206804 3d3ab70c41b2b5dd9b38d30953d2967a
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    17790 9dd3faff28d9765b80bcb9f134295cfb
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:   201196 b951068b268dd045ad941ca56ba0284f
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    37702 730957d5c73840762df250c8243ea214
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    32308 f0ac41c16a310c5a1f942550547feb61
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    34532 92ebccb8fa1dc24e1a786a3ee9e742fb
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    18964 9107a17dae71d36bf8cea8a4d49a6686
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    15832 dc15474d8caed3c532cd11f612e7cd36
    http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    15110 f72af5e2281cbc51da969a51dbf92c55
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:     6730 9117a9d1a67459d8f54484c708830e23
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    20300 edef4b84fe981d0468a5bd74e5ba440f
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    26094 214eab2096381c199ee79ff9d875159d
    http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    36092 dc375c65c0937a846a5e67b0db1c6f66
    http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    10050 5ef98337dd7738ecf7b775c79dce2582
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:     6346 7f598c08c5dd1c8720b3e62305d1fe26
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    11866 34f7ad964a4a1b307ece9ed5e9799181
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    19952 0328b2af4129d5389b1770727535af32
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch4_powerpc.deb
      Size/MD5 checksum:    15334 a512fed8e9b941fe00d38acef06d14b3

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:  1704244 c1f4fae006076fa32b17c5879ac1c768
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:  1704984 9be3fd4c41168197c5554eb80a4c1b69
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:  3351810 7d2611160b682acd1cb5eefdedce4ee9
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:  1683968 d37e7d7ab43cf6ff783cc4a428a33ed7
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:   206790 8d462edf1d968453ff48a4d6c7980723
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    15906 02792ce865a9a817e0c65c9580effe99
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:   201176 137b080df7110399e45b574fbf60b309
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    39114 1ff308b4fad36eb9363d45b9ee5ab81f
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    31620 5feb2bcca9043733db593d34c82a52a3
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    35524 c1df0917588eb35f77807fea59ad2324
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    19176 d8a39d9837ee37241b01c2a1ec02c627
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    14404 f7f65b2b88292c0f5f92cd648a34086b
    http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    13884 ac2239aea754da6c9d74c2267e386cca
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:     5472 410101ba332de5fe27e4eb6e9bb25773
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    20730 5f3931fc8add6489882e04d7ffec57cb
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    26800 85900b459c42286f26a361b9e9e1fea2
    http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    37600 536fcf0f854753e4e86a1d3b83efc9b9
    http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:     9078 7fbcfcc49f4f2370c9aebb6366395f39
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:     5108 c89a6529d8aea4e654e72a3d64c2e8ef
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    11106 b4eb376aaab642cea745050cf352bf04
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    19370 ec56065177422c1359e49858539b650d
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch4_s390.deb
      Size/MD5 checksum:    14636 38d346eed5cf0af55f84e2e9b0065a91

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:  1599768 a92a3cd6aa60653c7edd5df07aa3f745
    http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:  1601386 56ddccaf1bb572ef161601852d1d7e48
    http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:  3148956 dc207693d3b25d158dd8bdcf423aefbf
    http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:  1583778 6a9800c86c06f22412eed447606537de
    http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:   206812 00d9f4b7cf2d1381eb51e49185139de0
    http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:    16072 3d0ed853ea9d5a9acdb68c2604f92e5c
    http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:   201220 2ff0bd326b40891e0019a830c8fc14c7
    http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:    33630 5231d67382f98a4125e352a38c1a088a
    http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:    28798 da4593b5478069f02cd4ef836572c5a0
    http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:    31568 aeafd62478dfbffab86f63e97518bb2e
    http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:    16218 ddd893b7f894e6be6eafc4f175946e88
    http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:    13492 2776959aaa4043202778dd5da786fd4a
    http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:    12724 8e03c8b94b4ebfca5c14e6f93311aeb8
    http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:     4856 b80e4b9f76fa63d7770ce797a25cdf21
    http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:    17810 36cf8e4324b3187d6bed4a58a12e7695
    http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:    22742 544732c583f124274a3b06f8d52a3e7c
    http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:    32690 f0f975afe23584600652b1392e794c9d
    http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:     8116 9729746ab8d86903125712f04940f254
    http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:     4642 0b8a4c031386ef47f2439d7ec83719ee
    http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:     9770 c812721f98e44043a4dad6c6d24475a9
    http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:    17252 6ffba7df2f0e57b46f5ea77c0767b8e4
    http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch4_sparc.deb
      Size/MD5 checksum:    12852 b9d12405747e411e21e8f3e12cbd1751

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGj6pbXm3vHE4uyloRAnx1AJ4rqOuMhAh328QN3QY8NFwOsMUh4QCgipw5
gJwTCxx+BWg9Yb97z1wObWU=
=ktu0
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F44569)

Ubuntu Security Notice 261-1 (PacketStormID:F44569)
2006-03-11 00:00:00
Ubuntu  security.ubuntu.com
advisory,remote,web,arbitrary,php,xss
linux,ubuntu
CVE-2006-0207,CVE-2006-0208
[点击下载]

Ubuntu Security Notice USN-261-1 - Stefan Esser discovered that the 'session' module did not sufficiently verify the validity of the user-supplied session ID. A remote attacker could exploit this to insert arbitrary HTTP headers into the response sent by the PHP application, which could lead to HTTP response splitting and cross site scripting attacks. PHP applications were also vulnerable to several cross site scripting flaws if the options 'display_errors' and 'html_errors' were enabled. Please note that enabling 'html_errors' is not recommended for production systems.

===========================================================
Ubuntu Security Notice USN-261-1	     March 10, 2006
php4, php5 vulnerabilities
CVE-2006-0207, CVE-2006-0208
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

libapache2-mod-php4
libapache2-mod-php5

The problem can be corrected by upgrading the affected package to
version 4:4.3.8-3ubuntu7.15 (libapache2-mod-php4 for Ubuntu 4.10),
4:4.3.10-10ubuntu4.4 (libapache2-mod-php4 for Ubuntu 5.04), or
5.0.5-2ubuntu1.2 (libapache2-mod-php5 for Ubuntu 5.10). After a
standard system upgrade you need to restart Apache with

  sudo apache2ctl restart

to effect the necessary changes.

Details follow:

Stefan Esser discovered that the 'session' module did not sufficiently
verify the validity of the user-supplied session ID. A remote attacker
could exploit this to insert arbitrary HTTP headers into the response
sent by the PHP application, which could lead to HTTP Response
Splitting (forging of arbitrary responses on behalf the PHP
application) and Cross Site Scripting (XSS) (execution of arbitrary
web script code in the client's browser) attacks. (CVE-2006-0207)

PHP applications were also vulnerable to several Cross Site Scripting
(XSS) flaws if the options 'display_errors' and 'html_errors' were
enabled. Please note that enabling 'html_errors' is not recommended
for production systems. (CVE-2006-0208)


Updated packages for Ubuntu 4.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.8-3ubuntu7.15.diff.gz
      Size/MD5:   628138 6d13c97dd5c273807d65e17194655c60
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.8-3ubuntu7.15.dsc
      Size/MD5:     1628 fa0855f0a47ac0da3ce2e0291efd53a8
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.8.orig.tar.gz
      Size/MD5:  4832570 dd69f8c89281f088eadf4ade3dbd39ee

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.8-3ubuntu7.15_all.deb
      Size/MD5:   333536 a9cb4bfdff7175af25e3c43e1ca99e29
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-pear_4.3.8-3ubuntu7.15_all.deb
      Size/MD5:   335384 6482cb46c9928244e98f075827f6a617

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:  1692324 9bca7af466e37a6e68f80cc104ec83c5
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:  3201776 ad16f47eb8167d523ba5325854234134
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-curl_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:    17276 f1d347a6444fdb7761814d87175fbc1e
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-domxml_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:    40432 76a417740ad35c0754aae3618fb46caa
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-gd_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:    33726 3f60b0940c13e49fd2e6167646a9f0a0
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-ldap_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:    21242 8232a15a0f2057cd0d5aa7703523105e
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-mcal_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:    18404 ab19760bfdd4d41a8334dd9674891968
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-mhash_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:     7990 f36099f811a9c485239836efe4ea7b50
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-mysql_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:    23112 af5b40fd3c8c248920632f2d16692377
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-odbc_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:    28332 9098834c216639b980b186fa89c4b61c
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-recode_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:     7614 8609f8b3f0ea4fff235da1725ecb95a2
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-snmp_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:    12972 939405ee34382b34d97ed3ab8a112202
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-sybase_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:    21516 ef47b264b278f6ee28d1e22a28e5a4e2
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-xslt_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:    17254 e80ca496ea9ce09e2db49e120f430968
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4_4.3.8-3ubuntu7.15_amd64.deb
      Size/MD5:  1707454 4b344c99f91702a34be20ac906e4a482

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:  1632646 bb3c45fc7c9fde958ed5fcb0e2dc5f95
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:  3047870 0dcee14032817defaeed22f19f5b66a1
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-curl_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:    16856 d7f94d7b5c522896bf4eec607d50caae
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-domxml_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:    35558 de4a15aa5b76685bd6cefa08b553aa07
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-gd_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:    31184 7e5161ff9fdc4af900eafd98e7eb6312
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-ldap_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:    19478 99fec171410209fafe5706fc965d222f
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-mcal_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:    17058 3d52076616ad995093e6a3a8ecf51a24
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-mhash_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:     7750 610b08408adba4bd0cdde1c72a405451
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-mysql_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:    20906 cd52c425e5ec328ccfd8b7e2f0a4881f
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-odbc_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:    26074 147184e073208fec3d014305df55af99
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-recode_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:     7384 2fb855d5acff88adacd88a1c80fa8f1d
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-snmp_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:    12332 d2e4e434aec6a9ae47781c1e2b10c99c
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-sybase_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:    20018 0ad88f2bed3b6e7800343db2b4caafa9
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-xslt_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:    15890 9e8704ae18de2e8652408aa9ac185fa9
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4_4.3.8-3ubuntu7.15_i386.deb
      Size/MD5:  1648546 acbff1804d03dac9911601492eb30aab

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:  1694114 d4a9556dd253a37b326fc596284fd740
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:  3206032 10a79acee7043c9b1296df4a53825db2
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-curl_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:    19086 0202b18371b88c3dcbf416b8d962bbbe
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-domxml_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:    38278 a35b44134e5806f1e2d9bb228079833a
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-gd_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:    34138 68fd54ba1875270ece632effb5c4b31d
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-ldap_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:    21474 1fe77cb11f3d996e7bc5b328fa1587fb
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-mcal_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:    19304 74483d0ababb948ca36dc230f38e193c
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-mhash_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:     9322 4b8ca98be43e19fb9ca4ffefb97a375d
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-mysql_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:    22690 f2436da75b8a98670a377f16b9078a9c
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-odbc_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:    28398 73a6a8d71b2ce40e66ea1382df9a4ec7
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-recode_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:     9004 aa511891afccfd013de583028ea68360
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-snmp_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:    14330 ce8ac4276eafa5ac1602777f7cfebb8a
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-sybase_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:    22198 cb18a62f2d4d994239d41f429af0af0e
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4-xslt_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:    18062 bb4654edd38aebe0930de90750a29973
    http://security.ubuntu.com/ubuntu/pool/universe/p/php4/php4_4.3.8-3ubuntu7.15_powerpc.deb
      Size/MD5:  1711852 4ac67e4f5901a41713d2e3c661433efa

Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.4.diff.gz
      Size/MD5:   277430 b95d85820bf701c7d2be61c5c7198175
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.4.dsc
      Size/MD5:     1471 54ba7948d8bd1306ec8171c54120f75b
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10.orig.tar.gz
      Size/MD5:  4892209 73f5d1f42e34efa534a09c6091b5a21e

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4_4.3.10-10ubuntu4.4_all.deb
      Size/MD5:     1126 aa658ffc8f9b3aa714dd108bfa6cdc4d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.4_amd64.deb
      Size/MD5:  1657666 abdb0a81856e6e48417277100cfc60c9
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.4_amd64.deb
      Size/MD5:  3275608 6699fb5e09c4058af221ae4b85e4f51c
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.4_amd64.deb
      Size/MD5:  1647522 2c81ca2cdbe65ceded374bec8b154fd1
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.4_amd64.deb
      Size/MD5:   167492 80e89ed06194b6a2c442099b6bf7b9ad
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.4_amd64.deb
      Size/MD5:   348258 a458c24200211312c4210cbe17b583a7

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.4_i386.deb
      Size/MD5:  1593040 2eda071c692053b4f967d62491668a32
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.4_i386.deb
      Size/MD5:  3169848 b69ef99681b118966584ec4da1699416
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.4_i386.deb
      Size/MD5:  1592914 1c47ded0b8c5863627a40bdd66894f29
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.4_i386.deb
      Size/MD5:   167470 f30061db6c22f322930515711305d7f6
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.4_i386.deb
      Size/MD5:   348258 f2e6c199baad4a244b82fd40b7d109cc

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/p/php4/libapache2-mod-php4_4.3.10-10ubuntu4.4_powerpc.deb
      Size/MD5:  1658982 580e372591edea6f74b91bfb01d8bb87
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cgi_4.3.10-10ubuntu4.4_powerpc.deb
      Size/MD5:  3278814 b6d1d11bd146de15612b28512972706c
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-cli_4.3.10-10ubuntu4.4_powerpc.deb
      Size/MD5:  1646128 00ea1f813d38ec837076bbe9a51e2158
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-common_4.3.10-10ubuntu4.4_powerpc.deb
      Size/MD5:   167476 fe7e2bb8ae313c7f8f762e31765c6231
    http://security.ubuntu.com/ubuntu/pool/main/p/php4/php4-dev_4.3.10-10ubuntu4.4_powerpc.deb
      Size/MD5:   348260 c40aef14c9384f3db289af464852e066

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.2.diff.gz
      Size/MD5:   102782 7b8c8048028dd7a7881beb5a234e5b59
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.2.dsc
      Size/MD5:     1709 ae55cff34b8fb62ce100a3d073c34c1b
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5.orig.tar.gz
      Size/MD5:  6082082 ae36a2aa35cfaa58bdc5b9a525e6f451

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php-pear_5.0.5-2ubuntu1.2_all.deb
      Size/MD5:   173656 3787d99f04687153236f02f01d58f3be
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.0.5-2ubuntu1.2_all.deb
      Size/MD5:     1040 fc592c124e11ad63f5b920e07feddf5a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:  2013084 21c56fe0a894c6411b0d7d620a4bcd67
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:  3971538 d07139986c945fcb9fe2f9d781ebaa6c
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:  1996650 a6cfcbc3fd6e7d1211e3657daafdfa01
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:   127846 e3b9100832a9b0d565cf5ed0c72a09cb
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:    23864 39fdd7db27a23bfa717bca8b46f429a5
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:   218780 befa15e6a3e88b2519f438b03c9dec63
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:    35558 a429ae30070e66e9d3fb1e6c8eff83f1
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:    20660 fb61821a68782510b8e24404feaf3384
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:     8618 12d7fa9662a363b0467b8f81e8a2a6e6
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:    24472 e5ed51d65036c5a46e2781bd36b004b0
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:    29288 42a5f708c5f4c9fc1b2f076f7d4425e6
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:    40068 a30e930c33d4dc2f2f54cf6e3e1543cb
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:     8096 8160c251f927bc288e119158ff6b62de
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:    14468 8aad0ea75dd20c1c01a3b968dcaf4ebd
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:    28152 b4c81504e1003b302b94728292fa2e24
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:    22214 198fad0995287da902c62e86c3f82419
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:    41888 211dabd2c0a0668d60943e9865b1ab4b
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.0.5-2ubuntu1.2_amd64.deb
      Size/MD5:    15094 060cad7834fa57a5a0bb6555514a21da

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:  1868592 7da56a69341521bf6305351f407ce5b0
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:  3709496 8de15b1a09a36409a7ad4c1d1ff2a472
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:  1864190 29599d5f9512190e0c3dcdea36dca798
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:   127840 a4c2c2239f003e0d0778948082471744
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:    22084 91ec51f58daf5b0f835097da2ea55012
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:   218750 3a5a651193d791ce1e826824814c2a0b
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:    31610 c29c34b97c9514235939e525b2911d38
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:    18536 e8c22c597c2c29bc5877f72faba08029
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:     8240 c247c3f531d3e9f570119d779131cf8b
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:    21270 cfdbdf41dc59f5e9dd6391ae3f53a1de
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:    26386 524ea719430e011497aa4c755e29e602
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:    36038 bf0bcd479839e6e0a63a8335a3428dd5
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:     7856 70f757ee6b82576fc410fcf2f6a39aa7
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:    13362 035c5e0f97455e2ec76d708203ff79d0
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:    24730 43570313345b3d37ccf0c29113215573
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:    20112 2a4400f118f22bb96230e0017286c7de
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:    37490 159f8030eda9e892c02fa15154a9cdcb
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.0.5-2ubuntu1.2_i386.deb
      Size/MD5:    14020 4bd594b6df28395787c62a9811a9f1ac

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:  1984002 27388376cf79927eceebd8e126cdac74
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:  3908180 1911f448bc5fa6101a81d4042fca0da3
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:  1962140 4e0054a55cebdbd0fe0b52300fd177fb
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:   127852 e8ff3c709b39fec6477341f78b7cd21f
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:    25784 3dee76d29a3de9884dfd7253d4e0ca57
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:   218780 44d9d43ed0fbd4f431df9ddf2d5cd97d
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:    35492 bbb5daefd09ccdc25f5ea01dde39d45e
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:    21132 2dbda88358f2cd260cd4e634459f4354
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:    10012 14f184b7978cbbbd5762ef8ff6eb7c3d
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:    23962 0ea8334b1de434d6650407b41d27984f
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:    29356 8a83c5850d95fda4a133a48b89f17121
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:    39796 9605b1143ef9c17a03e8e6ba4e03984b
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:     9510 9ba4d7b186d8aab090cbce2729031b33
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:    15306 7a03cc0de110e296b3fb677b4fc7e313
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:    28400 1aa8320aa65b1ec2193acd6995ecee5b
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:    23186 6993cbc657129b9eb58dfd2833c8097d
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:    40476 a36854ae79d1b2dde2f2d7b164e2c08a
    http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.0.5-2ubuntu1.2_powerpc.deb
      Size/MD5:    15884 7537d0302cac7ce5d8c45bab9bb91b68
    

- 漏洞信息 (F43547)

Mandriva Linux Security Advisory 2006.028 (PacketStormID:F43547)
2006-02-02 00:00:00
Mandriva  mandriva.com
advisory,remote,web,arbitrary,php,vulnerability,xss
linux,mandriva
CVE-2006-0207,CVE-2006-0208
[点击下载]

Mandriva Linux Security Advisory - Multiple response splitting vulnerabilities in PHP allow remote attackers to inject arbitrary HTTP headers via unknown attack vectors, possibly involving a crafted Set-Cookie header, related to the session extension (aka ext/session) and the header function. Multiple cross-site scripting (XSS) vulnerabilities in PHP allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in certain error conditions.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:028
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : php
 Date    : February 1, 2006
 Affected: 10.1, 10.2, 2006.0, Corporate 2.1, Corporate 3.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 Multiple response splitting vulnerabilities in PHP allow remote attackers to 
 inject arbitrary HTTP headers via unknown attack vectors, possibly involving a 
 crafted Set-Cookie header, related to the (1) session extension 
 (aka ext/session) and the (2) header function. (CVE-2006-0207)
 
 Multiple cross-site scripting (XSS) vulnerabilities in PHP allow remote 
 attackers to inject arbitrary web script or HTML via unknown attack vectors in 
 "certain error conditions." (CVE-2006-0208). This issue does not affect
 Corporate Server 2.1.
 
 Updated packages are patched to address these issues.  Users must execute
 "service httpd restart" for the new PHP modules to be loaded by Apache.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0207
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0208
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 10.1:
 df01c3861affe2f3e1c889018bb2bdbf  10.1/RPMS/libphp_common432-4.3.8-3.7.101mdk.i586.rpm
 f9df1052bc1f6ce85a3bbb5ec544b077  10.1/RPMS/php432-devel-4.3.8-3.7.101mdk.i586.rpm
 3be049c85f40f7051f3cf1e44b165485  10.1/RPMS/php-cgi-4.3.8-3.7.101mdk.i586.rpm
 de903ca3c9126f451f48d71e30042066  10.1/RPMS/php-cli-4.3.8-3.7.101mdk.i586.rpm
 d697297c4330d93379848b2f3ea5b59c  10.1/SRPMS/php-4.3.8-3.7.101mdk.src.rpm

 Mandriva Linux 10.1/X86_64:
 c9123a9203fd795b7445c2d54b2e0e65  x86_64/10.1/RPMS/lib64php_common432-4.3.8-3.7.101mdk.x86_64.rpm
 a8ec659d640715f2cbe8ec5b93868de2  x86_64/10.1/RPMS/php432-devel-4.3.8-3.7.101mdk.x86_64.rpm
 76ff7da663400e000c148d5562540097  x86_64/10.1/RPMS/php-cgi-4.3.8-3.7.101mdk.x86_64.rpm
 d4c84cc9cf9325560e641f20040579ee  x86_64/10.1/RPMS/php-cli-4.3.8-3.7.101mdk.x86_64.rpm
 d697297c4330d93379848b2f3ea5b59c  x86_64/10.1/SRPMS/php-4.3.8-3.7.101mdk.src.rpm

 Mandriva Linux 10.2:
 fb20504431c87a13d3dccc44a14cc8fb  10.2/RPMS/libphp_common432-4.3.10-7.5.102mdk.i586.rpm
 a4a9a3e923ad9fb3364cb40fc65d4dda  10.2/RPMS/php432-devel-4.3.10-7.5.102mdk.i586.rpm
 603deaacb7e29fbb89c45bbedc5669dd  10.2/RPMS/php-cgi-4.3.10-7.5.102mdk.i586.rpm
 80c2c8841acd4119ef49be89c0fcc2d0  10.2/RPMS/php-cli-4.3.10-7.5.102mdk.i586.rpm
 7e608b7cc03ac505f9a118f75fd62d25  10.2/SRPMS/php-4.3.10-7.5.102mdk.src.rpm

 Mandriva Linux 10.2/X86_64:
 17a7eb595d3d46d7a5aaface597c8667  x86_64/10.2/RPMS/lib64php_common432-4.3.10-7.5.102mdk.x86_64.rpm
 b1e1b44ebdefde1f92fd4067f8dbabf5  x86_64/10.2/RPMS/php432-devel-4.3.10-7.5.102mdk.x86_64.rpm
 778fa2d2adaf31a8cb7e31dbd808066e  x86_64/10.2/RPMS/php-cgi-4.3.10-7.5.102mdk.x86_64.rpm
 d02642564aa38691a881194c2662d98c  x86_64/10.2/RPMS/php-cli-4.3.10-7.5.102mdk.x86_64.rpm
 7e608b7cc03ac505f9a118f75fd62d25  x86_64/10.2/SRPMS/php-4.3.10-7.5.102mdk.src.rpm

 Mandriva Linux 2006.0:
 f2b7973428979dd09f52accd547568da  2006.0/RPMS/libphp5_common5-5.0.4-9.3.20060mdk.i586.rpm
 5f4d832f023ab7a89ef0100bf84f5287  2006.0/RPMS/php-cgi-5.0.4-9.3.20060mdk.i586.rpm
 2670bb765568506f6747a73974939c07  2006.0/RPMS/php-cli-5.0.4-9.3.20060mdk.i586.rpm
 379cda215916c997a1dc2dbd5fb2620c  2006.0/RPMS/php-devel-5.0.4-9.3.20060mdk.i586.rpm
 ca8db2763cf64ea2bac4322ee9cca899  2006.0/RPMS/php-fcgi-5.0.4-9.3.20060mdk.i586.rpm
 92af673ab17df4b7dfe7fdebee76a48b  2006.0/SRPMS/php-5.0.4-9.3.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 f3d43c707c9a8d5cec75bafcb78e6ab1  x86_64/2006.0/RPMS/lib64php5_common5-5.0.4-9.3.20060mdk.x86_64.rpm
 2f94a04a14fe62fae94111b6cb684ece  x86_64/2006.0/RPMS/php-cgi-5.0.4-9.3.20060mdk.x86_64.rpm
 4ede0e512810b584bed25e09fca6ba4a  x86_64/2006.0/RPMS/php-cli-5.0.4-9.3.20060mdk.x86_64.rpm
 f172b4c76fcf58cd9dc090a25103f6a5  x86_64/2006.0/RPMS/php-devel-5.0.4-9.3.20060mdk.x86_64.rpm
 79efe6cf1c641439fe1bbd4e75b8fc4f  x86_64/2006.0/RPMS/php-fcgi-5.0.4-9.3.20060mdk.x86_64.rpm
 92af673ab17df4b7dfe7fdebee76a48b  x86_64/2006.0/SRPMS/php-5.0.4-9.3.20060mdk.src.rpm

 Corporate Server 2.1:
 09f5076909971d5604836d7b9ea9fd45  corporate/2.1/RPMS/php-4.2.3-4.7.C21mdk.i586.rpm
 8c035441a66315b1eff8b17312c3a930  corporate/2.1/RPMS/php-common-4.2.3-4.7.C21mdk.i586.rpm
 c6f1fd24fe3e8f1ab43dcac22606486f  corporate/2.1/RPMS/php-devel-4.2.3-4.7.C21mdk.i586.rpm
 86819061809b349bd18566a406273570  corporate/2.1/RPMS/php-pear-4.2.3-4.7.C21mdk.i586.rpm
 7dd951360a264bf5866d065a00d5238f  corporate/2.1/SRPMS/php-4.2.3-4.7.C21mdk.src.rpm

 Corporate Server 2.1/X86_64:
 37b27434d1c44f27d8c277ae564b936e  x86_64/corporate/2.1/RPMS/php-4.2.3-4.7.C21mdk.x86_64.rpm
 6136563a8257ef44180ca6b4401901f6  x86_64/corporate/2.1/RPMS/php-common-4.2.3-4.7.C21mdk.x86_64.rpm
 bbdb1dbdda2d70b035ef466443bfc422  x86_64/corporate/2.1/RPMS/php-devel-4.2.3-4.7.C21mdk.x86_64.rpm
 5d44bf1bfea2cf67b4d8e89199163451  x86_64/corporate/2.1/RPMS/php-pear-4.2.3-4.7.C21mdk.x86_64.rpm
 7dd951360a264bf5866d065a00d5238f  x86_64/corporate/2.1/SRPMS/php-4.2.3-4.7.C21mdk.src.rpm

 Corporate 3.0:
 f888ebc54f82378b18d93215be73d644  corporate/3.0/RPMS/libphp_common432-4.3.4-4.9.C30mdk.i586.rpm
 1b24d7a3868b0ad3447306d68278ea9a  corporate/3.0/RPMS/php432-devel-4.3.4-4.9.C30mdk.i586.rpm
 5bc5839d0a2747b4752af35136e198e7  corporate/3.0/RPMS/php-cgi-4.3.4-4.9.C30mdk.i586.rpm
 d78925d4af67aa5485e5b46c41989b9c  corporate/3.0/RPMS/php-cli-4.3.4-4.9.C30mdk.i586.rpm
 27ef8f959b0f289b57762ff27a5ac80b  corporate/3.0/SRPMS/php-4.3.4-4.9.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 9bed4b632f00c11be8a5ad2f18f55856  x86_64/corporate/3.0/RPMS/lib64php_common432-4.3.4-4.9.C30mdk.x86_64.rpm
 46f077064f5f9c200fda31f35975a16c  x86_64/corporate/3.0/RPMS/php432-devel-4.3.4-4.9.C30mdk.x86_64.rpm
 ed1e1bba020c45e77f29193925639e2e  x86_64/corporate/3.0/RPMS/php-cgi-4.3.4-4.9.C30mdk.x86_64.rpm
 6bdd852998838bc68e15bd336aedd197  x86_64/corporate/3.0/RPMS/php-cli-4.3.4-4.9.C30mdk.x86_64.rpm
 27ef8f959b0f289b57762ff27a5ac80b  x86_64/corporate/3.0/SRPMS/php-4.3.4-4.9.C30mdk.src.rpm

 Multi Network Firewall 2.0:
 5addfadc57bce90e16b99fa09c8223d0  mnf/2.0/RPMS/libphp_common432-4.3.4-4.9.M20mdk.i586.rpm
 68ebbc08d9225e65e7760a98a440fc50  mnf/2.0/RPMS/php432-devel-4.3.4-4.9.M20mdk.i586.rpm
 c3e1085df6f3e9802d25c31201f91004  mnf/2.0/RPMS/php-cgi-4.3.4-4.9.M20mdk.i586.rpm
 ae86a53032acd9d82f9dbfba561a173c  mnf/2.0/RPMS/php-cli-4.3.4-4.9.M20mdk.i586.rpm
 01bd5e9d8cb5520e29a9dec0358c1ecd  mnf/2.0/SRPMS/php-4.3.4-4.9.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFD4QVimqjQ0CJFipgRAvw9AKCIQsnG6F29XOIxOyP8+Nbz5UjTcgCfQGp8
C2vb3/bapIAQwAjWIDWy/tM=
=1kiW
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息

22478
PHP Session Extension SessionID Set-Cookie Arbitrary Header Injection
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-01-12 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 5.1.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

PHP 5 User-Supplied Session ID Input Validation Vulnerability
Input Validation Error 16220
Yes No
2006-01-12 12:00:00 2007-07-09 09:37:00
Stefan Esser is credited with the discovery of this vulnerability.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 4.1 ppc
Ubuntu Ubuntu Linux 4.1 ia64
Ubuntu Ubuntu Linux 4.1 ia32
Turbolinux Turbolinux Server 10.0 x86
Turbolinux Turbolinux Server 10.0
Turbolinux Turbolinux Desktop 10.0
Turbolinux Turbolinux 10 F...
TurboLinux Personal
TurboLinux Multimedia
Turbolinux Home
Turbolinux Appliance Server Workgroup Edition 1.0
Turbolinux Appliance Server Hosting Edition 1.0
Turbolinux Appliance Server 1.0 Workgroup Edition
Turbolinux Appliance Server 1.0 Hosting Edition
Turbolinux Appliance Server 2.0
Trend Micro InterScan VirusWall 8.0
TransSoft Broker FTP Server 8.0
TransSoft Broker FTP Server 7.0
S.u.S.E. UnitedLinux 1.0
S.u.S.E. SuSE Linux Standard Server 8.0
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SUSE LINUX Retail Solution 8.0
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 9.0 x86_64
S.u.S.E. Linux Professional 9.0
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Openexchange Server
S.u.S.E. Linux Office Server
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 1.0
S.u.S.E. Linux Database Server 0
S.u.S.E. Linux Connectivity Server
PHP PHP 5.1.1
PHP PHP 5.1
PHP PHP 5.0.5
PHP PHP 5.0.4
PHP PHP 5.0.3
+ Trustix Secure Linux 2.2
PHP PHP 5.0.2
PHP PHP 5.0.1
PHP PHP 5.0 candidate 3
PHP PHP 5.0 candidate 2
PHP PHP 5.0 candidate 1
PHP PHP 5.0 .0
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
Mandriva Linux Mandrake 10.2 x86_64
Mandriva Linux Mandrake 10.2
Mandriva Linux Mandrake 10.1 x86_64
Mandriva Linux Mandrake 10.1
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
MandrakeSoft Corporate Server 2.1 x86_64
MandrakeSoft Corporate Server 2.1
Gentoo Linux
Debian Linux 4.0 sparc
Debian Linux 4.0 s/390
Debian Linux 4.0 powerpc
Debian Linux 4.0 mipsel
Debian Linux 4.0 mips
Debian Linux 4.0 m68k
Debian Linux 4.0 ia-64
Debian Linux 4.0 ia-32
Debian Linux 4.0 hppa
Debian Linux 4.0 arm
Debian Linux 4.0 amd64
Debian Linux 4.0 alpha
Debian Linux 4.0
PHP PHP 5.1.2
+ Ubuntu Ubuntu Linux 6.06 LTS sparc
+ Ubuntu Ubuntu Linux 6.06 LTS powerpc
+ Ubuntu Ubuntu Linux 6.06 LTS i386
+ Ubuntu Ubuntu Linux 6.06 LTS amd64
PHP PHP 4.0 0

- 不受影响的程序版本

PHP PHP 5.1.2
+ Ubuntu Ubuntu Linux 6.06 LTS sparc
+ Ubuntu Ubuntu Linux 6.06 LTS powerpc
+ Ubuntu Ubuntu Linux 6.06 LTS i386
+ Ubuntu Ubuntu Linux 6.06 LTS amd64
PHP PHP 4.0 0

- 漏洞讨论

PHP 5 is prone to an input-validation vulnerability. This is due to a lack of proper sanitization of user-supplied input of PHP session IDs, transmitted by way of HTTP headers.

An attacker may use this vulnerability to perform HTTP response splitting, often resulting in content spoofing and cross-site scripting attacks.

PHP 5.1.1 and prior versions are affected.

- 漏洞利用

No exploit is required.

- 解决方案

The vendor has released PHP 5 version 5.1.2 to address this issue.

Please see the referenced vendor advisories for more information.


PHP PHP 5.0 .0

PHP PHP 5.0 candidate 2

PHP PHP 5.0 candidate 3

PHP PHP 5.0.1

PHP PHP 5.0.3

PHP PHP 5.0.5

PHP PHP 5.1

PHP PHP 5.1.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站