Evolution Data Server Multiple Integer Overflow Vulnerabilities
2009-03-18T00:00:00
ID OPENVAS:1361412562310800254 Type openvas Reporter Copyright (C) 2009 Greenbone Networks GmbH Modified 2019-03-07T00:00:00
Description
This host is installed with Evolution Data Server and is prone to
multiple integer overflow vulnerabilities.
##############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_evolution_data_server_mult_int_overflow_vuln.nasl 14033 2019-03-07 11:09:35Z cfischer $
#
# Evolution Data Server Multiple Integer Overflow Vulnerabilities
#
# Authors:
# Sujit Ghosal <sghosal@secpod.com>
#
# Copyright:
# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
CPE = 'cpe:/a:gnome:evolution';
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.800254");
script_version("$Revision: 14033 $");
script_tag(name:"last_modification", value:"$Date: 2019-03-07 12:09:35 +0100 (Thu, 07 Mar 2019) $");
script_tag(name:"creation_date", value:"2009-03-18 14:25:01 +0100 (Wed, 18 Mar 2009)");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_bugtraq_id(34109, 34100);
script_cve_id("CVE-2009-0582", "CVE-2009-0587");
script_name("Evolution Data Server Multiple Integer Overflow Vulnerabilities");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2009 Greenbone Networks GmbH");
script_family("Buffer overflow");
script_dependencies("gb_evolution_data_server_detect.nasl");
script_mandatory_keys("Evolution/Ver");
script_xref(name:"URL", value:"http://secunia.com/advisories/34286");
script_xref(name:"URL", value:"http://securitytracker.com/id?1021845");
script_xref(name:"URL", value:"http://openwall.com/lists/oss-security/2009/03/12/2");
script_xref(name:"URL", value:"http://mail.gnome.org/archives/release-team/2009-March/msg00096.html");
script_tag(name:"impact", value:"Successful exploitation will let the attacker execute arbitrary codes
through long string that is converted to a base64 representation and
can cause a client crash via NTLM authentication type 2 packet with a
length value that exceeds the amount of packet data.");
script_tag(name:"affected", value:"Evolution Data Server version 2.24.5 and prior.
Evolution Data Server version in range 2.25.x to 2.25.92.");
script_tag(name:"insight", value:"- bug in Camel library while processing NTLM SASL packets.
- bug in glib library while encoding and decoding Base64 data.");
script_tag(name:"summary", value:"This host is installed with Evolution Data Server and is prone to
multiple integer overflow vulnerabilities.");
script_tag(name:"solution", value:"Upgrade to version 2.26 or later.");
script_tag(name:"qod_type", value:"executable_version_unreliable");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
if(!ver = get_app_version(cpe:CPE))
exit(0);
if(version_in_range(version:ver, test_version:"2.25", test_version2:"2.25.92") ||
version_is_less_equal(version:ver, test_version:"2.24.5")){
report = report_fixed_ver(installed_version:ver, fixed_version:"2.26");
security_message(port:0, data:report);
exit(0);
}
exit(99);
{"id": "OPENVAS:1361412562310800254", "type": "openvas", "bulletinFamily": "scanner", "title": "Evolution Data Server Multiple Integer Overflow Vulnerabilities", "description": "This host is installed with Evolution Data Server and is prone to\n multiple integer overflow vulnerabilities.", "published": "2009-03-18T00:00:00", "modified": "2019-03-07T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800254", "reporter": "Copyright (C) 2009 Greenbone Networks GmbH", "references": ["http://mail.gnome.org/archives/release-team/2009-March/msg00096.html", "http://openwall.com/lists/oss-security/2009/03/12/2", "http://securitytracker.com/id?1021845", "http://secunia.com/advisories/34286"], "cvelist": ["CVE-2009-0587", "CVE-2009-0582"], "lastseen": "2019-05-29T18:40:19", "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-0587", "CVE-2009-0582"]}, {"type": "openvas", "idList": ["OPENVAS:880818", "OPENVAS:1361412562310880940", "OPENVAS:63582", "OPENVAS:136141256231063635", "OPENVAS:63635", "OPENVAS:64049", "OPENVAS:136141256231064049", "OPENVAS:136141256231063582", "OPENVAS:1361412562310880818", "OPENVAS:64055"]}, {"type": "centos", "idList": ["CESA-2009:0358", "CESA-2009:0355", "CESA-2009:0354"]}, {"type": "redhat", "idList": ["RHSA-2009:0358", "RHSA-2009:0354", "RHSA-2009:0355"]}, {"type": "nessus", "idList": ["REDHAT-RHSA-2009-0358.NASL", "SL_20090316_EVOLUTION_DATA_SERVER_ON_SL5_X.NASL", "DEBIAN_DSA-1813.NASL", "ORACLELINUX_ELSA-2009-0358.NASL", "CENTOS_RHSA-2009-0354.NASL", "CENTOS_RHSA-2009-0358.NASL", "MANDRIVA_MDVSA-2009-078.NASL", "SL_20090316_EVOLUTION_ON_SL3_X.NASL", "ORACLELINUX_ELSA-2009-0354.NASL", "REDHAT-RHSA-2009-0355.NASL"]}, {"type": "oraclelinux", "idList": ["ELSA-2009-0354", "ELSA-2009-0358", "ELSA-2009-0355"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1813-1:869CC", "DEBIAN:DSA-1813-2:A4368"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:21518", "SECURITYVULNS:VULN:9770", "SECURITYVULNS:VULN:9743", "SECURITYVULNS:DOC:21483"]}, {"type": "ubuntu", "idList": ["USN-733-1"]}, {"type": "seebug", "idList": ["SSV:4920", "SSV:4913"]}, {"type": "fedora", "idList": ["FEDORA:BD982208503", "FEDORA:8282A208503"]}], "modified": "2019-05-29T18:40:19", "rev": 2}, "score": {"value": 7.8, "vector": "NONE", "modified": "2019-05-29T18:40:19", "rev": 2}, "vulnersScore": 7.8}, "pluginID": "1361412562310800254", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_evolution_data_server_mult_int_overflow_vuln.nasl 14033 2019-03-07 11:09:35Z cfischer $\n#\n# Evolution Data Server Multiple Integer Overflow Vulnerabilities\n#\n# Authors:\n# Sujit Ghosal <sghosal@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = 'cpe:/a:gnome:evolution';\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.800254\");\n script_version(\"$Revision: 14033 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-07 12:09:35 +0100 (Thu, 07 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-18 14:25:01 +0100 (Wed, 18 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_bugtraq_id(34109, 34100);\n script_cve_id(\"CVE-2009-0582\", \"CVE-2009-0587\");\n script_name(\"Evolution Data Server Multiple Integer Overflow Vulnerabilities\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"gb_evolution_data_server_detect.nasl\");\n script_mandatory_keys(\"Evolution/Ver\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/34286\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1021845\");\n script_xref(name:\"URL\", value:\"http://openwall.com/lists/oss-security/2009/03/12/2\");\n script_xref(name:\"URL\", value:\"http://mail.gnome.org/archives/release-team/2009-March/msg00096.html\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will let the attacker execute arbitrary codes\n through long string that is converted to a base64 representation and\n can cause a client crash via NTLM authentication type 2 packet with a\n length value that exceeds the amount of packet data.\");\n\n script_tag(name:\"affected\", value:\"Evolution Data Server version 2.24.5 and prior.\n Evolution Data Server version in range 2.25.x to 2.25.92.\");\n\n script_tag(name:\"insight\", value:\"- bug in Camel library while processing NTLM SASL packets.\n\n - bug in glib library while encoding and decoding Base64 data.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Evolution Data Server and is prone to\n multiple integer overflow vulnerabilities.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to version 2.26 or later.\");\n\n script_tag(name:\"qod_type\", value:\"executable_version_unreliable\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!ver = get_app_version(cpe:CPE))\n exit(0);\n\nif(version_in_range(version:ver, test_version:\"2.25\", test_version2:\"2.25.92\") ||\n version_is_less_equal(version:ver, test_version:\"2.24.5\")){\n report = report_fixed_ver(installed_version:ver, fixed_version:\"2.26\");\n security_message(port:0, data:report);\n exit(0);\n}\n\nexit(99);", "naslFamily": "Buffer overflow", "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T05:39:59", "description": "The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.", "edition": 6, "cvss3": {}, "published": "2009-03-14T18:30:00", "title": "CVE-2009-0582", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-0582"], "modified": "2017-09-29T01:33:00", "cpe": ["cpe:/a:gnome:evolution-data-server:2.25.92", "cpe:/a:gnome:evolution-data-server:2.24.5"], "id": "CVE-2009-0582", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0582", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}, "cpe23": ["cpe:2.3:a:gnome:evolution-data-server:2.25.92:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:evolution-data-server:2.24.5:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:39:59", "description": "Multiple integer overflows in Evolution Data Server (aka evolution-data-server) before 2.24.5 allow context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation in (1) addressbook/libebook/e-vcard.c in evc or (2) camel/camel-mime-utils.c in libcamel.", "edition": 6, "cvss3": {}, "published": "2009-03-14T18:30:00", "title": "CVE-2009-0587", "type": "cve", "cwe": ["CWE-189"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-0587"], "modified": "2018-10-10T19:29:00", "cpe": ["cpe:/a:go-evolution:evolution-data-server:2.24.4"], "id": "CVE-2009-0587", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0587", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:go-evolution:evolution-data-server:2.24.4:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2018-04-06T11:38:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0587", "CVE-2009-0582"], "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:0358.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM) tools\nfor the GNOME desktop environment.\n\nIt was discovered that evolution did not properly validate NTLM (NT LAN\nManager) authentication challenge packets. A malicious server using NTLM\nauthentication could cause evolution to disclose portions of its memory or\ncrash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow was\nfound in the Base64 encoding routine used by evolution. This could cause\nevolution to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. All running\ninstances of evolution must be restarted for the update to take effect.", "modified": "2018-04-06T00:00:00", "published": "2009-03-20T00:00:00", "id": "OPENVAS:136141256231063582", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063582", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:0358", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_0358.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:0358 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:0358.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM) tools\nfor the GNOME desktop environment.\n\nIt was discovered that evolution did not properly validate NTLM (NT LAN\nManager) authentication challenge packets. A malicious server using NTLM\nauthentication could cause evolution to disclose portions of its memory or\ncrash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow was\nfound in the Base64 encoding routine used by evolution. This could cause\nevolution to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. All running\ninstances of evolution must be restarted for the update to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63582\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)\");\n script_cve_id(\"CVE-2009-0582\", \"CVE-2009-0587\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"RedHat Security Advisory RHSA-2009:0358\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-0358.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#moderate\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"evolution\", rpm:\"evolution~1.4.5~25.el3\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-debuginfo\", rpm:\"evolution-debuginfo~1.4.5~25.el3\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-devel\", rpm:\"evolution-devel~1.4.5~25.el3\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0587", "CVE-2009-0582"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-08-09T00:00:00", "id": "OPENVAS:1361412562310880818", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880818", "type": "openvas", "title": "CentOS Update for evolution CESA-2009:0358 centos3 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for evolution CESA-2009:0358 centos3 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2009-March/015676.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880818\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"CESA\", value:\"2009:0358\");\n script_cve_id(\"CVE-2009-0582\", \"CVE-2009-0587\");\n script_name(\"CentOS Update for evolution CESA-2009:0358 centos3 i386\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'evolution'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS3\");\n script_tag(name:\"affected\", value:\"evolution on CentOS 3\");\n script_tag(name:\"insight\", value:\"Evolution is the integrated collection of e-mail, calendaring, contact\n management, communications, and personal information management (PIM) tools\n for the GNOME desktop environment.\n\n It was discovered that evolution did not properly validate NTLM (NT LAN\n Manager) authentication challenge packets. A malicious server using NTLM\n authentication could cause evolution to disclose portions of its memory or\n crash during user authentication. (CVE-2009-0582)\n\n An integer overflow flaw which could cause heap-based buffer overflow was\n found in the Base64 encoding routine used by evolution. This could cause\n evolution to crash, or, possibly, execute an arbitrary code when large\n untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\n All users of evolution are advised to upgrade to these updated packages,\n which contain backported patches to correct these issues. All running\n instances of evolution must be restarted for the update to take effect.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS3\")\n{\n\n if ((res = isrpmvuln(pkg:\"evolution\", rpm:\"evolution~1.4.5~25.el3\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"evolution-devel\", rpm:\"evolution-devel~1.4.5~25.el3\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-25T10:55:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0587", "CVE-2009-0582"], "description": "Check for the Version of evolution", "modified": "2017-07-10T00:00:00", "published": "2011-08-09T00:00:00", "id": "OPENVAS:880818", "href": "http://plugins.openvas.org/nasl.php?oid=880818", "type": "openvas", "title": "CentOS Update for evolution CESA-2009:0358 centos3 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for evolution CESA-2009:0358 centos3 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Evolution is the integrated collection of e-mail, calendaring, contact\n management, communications, and personal information management (PIM) tools\n for the GNOME desktop environment.\n\n It was discovered that evolution did not properly validate NTLM (NT LAN\n Manager) authentication challenge packets. A malicious server using NTLM\n authentication could cause evolution to disclose portions of its memory or\n crash during user authentication. (CVE-2009-0582)\n \n An integer overflow flaw which could cause heap-based buffer overflow was\n found in the Base64 encoding routine used by evolution. This could cause\n evolution to crash, or, possibly, execute an arbitrary code when large\n untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n \n All users of evolution are advised to upgrade to these updated packages,\n which contain backported patches to correct these issues. All running\n instances of evolution must be restarted for the update to take effect.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"evolution on CentOS 3\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2009-March/015676.html\");\n script_id(880818);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2009:0358\");\n script_cve_id(\"CVE-2009-0582\", \"CVE-2009-0587\");\n script_name(\"CentOS Update for evolution CESA-2009:0358 centos3 i386\");\n\n script_summary(\"Check for the Version of evolution\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS3\")\n{\n\n if ((res = isrpmvuln(pkg:\"evolution\", rpm:\"evolution~1.4.5~25.el3\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"evolution-devel\", rpm:\"evolution-devel~1.4.5~25.el3\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:56:59", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0587", "CVE-2009-0582"], "description": "The remote host is missing updates to evolution announced in\nadvisory CESA-2009:0358.", "modified": "2017-07-10T00:00:00", "published": "2009-03-20T00:00:00", "id": "OPENVAS:63635", "href": "http://plugins.openvas.org/nasl.php?oid=63635", "type": "openvas", "title": "CentOS Security Advisory CESA-2009:0358 (evolution)", "sourceData": "#CESA-2009:0358 63635 4\n# $Id: ovcesa2009_0358.nasl 6650 2017-07-10 11:43:12Z cfischer $\n# Description: Auto-generated from advisory CESA-2009:0358 (evolution)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"For details on the issues addressed in this update,\nplease visit the referenced security advisories.\";\ntag_solution = \"Update the appropriate packages on your system.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=CESA-2009:0358\nhttp://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0358\nhttps://rhn.redhat.com/errata/RHSA-2009-0358.html\";\ntag_summary = \"The remote host is missing updates to evolution announced in\nadvisory CESA-2009:0358.\";\n\n\n\nif(description)\n{\n script_id(63635);\n script_version(\"$Revision: 6650 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:43:12 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)\");\n script_cve_id(\"CVE-2009-0582\", \"CVE-2009-0587\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"CentOS Security Advisory CESA-2009:0358 (evolution)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"evolution\", rpm:\"evolution~1.4.5~25.el3\", rls:\"CentOS3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-devel\", rpm:\"evolution-devel~1.4.5~25.el3\", rls:\"CentOS3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-27T10:56:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0587", "CVE-2009-0582"], "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:0358.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM) tools\nfor the GNOME desktop environment.\n\nIt was discovered that evolution did not properly validate NTLM (NT LAN\nManager) authentication challenge packets. A malicious server using NTLM\nauthentication could cause evolution to disclose portions of its memory or\ncrash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow was\nfound in the Base64 encoding routine used by evolution. This could cause\nevolution to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. All running\ninstances of evolution must be restarted for the update to take effect.", "modified": "2017-07-12T00:00:00", "published": "2009-03-20T00:00:00", "id": "OPENVAS:63582", "href": "http://plugins.openvas.org/nasl.php?oid=63582", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:0358", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_0358.nasl 6683 2017-07-12 09:41:57Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:0358 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:0358.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM) tools\nfor the GNOME desktop environment.\n\nIt was discovered that evolution did not properly validate NTLM (NT LAN\nManager) authentication challenge packets. A malicious server using NTLM\nauthentication could cause evolution to disclose portions of its memory or\ncrash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow was\nfound in the Base64 encoding routine used by evolution. This could cause\nevolution to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. All running\ninstances of evolution must be restarted for the update to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_id(63582);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)\");\n script_cve_id(\"CVE-2009-0582\", \"CVE-2009-0587\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"RedHat Security Advisory RHSA-2009:0358\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-0358.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#moderate\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"evolution\", rpm:\"evolution~1.4.5~25.el3\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-debuginfo\", rpm:\"evolution-debuginfo~1.4.5~25.el3\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-devel\", rpm:\"evolution-devel~1.4.5~25.el3\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:39:58", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0587", "CVE-2009-0582"], "description": "The remote host is missing updates to evolution announced in\nadvisory CESA-2009:0358.", "modified": "2018-04-06T00:00:00", "published": "2009-03-20T00:00:00", "id": "OPENVAS:136141256231063635", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063635", "type": "openvas", "title": "CentOS Security Advisory CESA-2009:0358 (evolution)", "sourceData": "#CESA-2009:0358 63635 4\n# $Id: ovcesa2009_0358.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory CESA-2009:0358 (evolution)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"For details on the issues addressed in this update,\nplease visit the referenced security advisories.\";\ntag_solution = \"Update the appropriate packages on your system.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=CESA-2009:0358\nhttp://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0358\nhttps://rhn.redhat.com/errata/RHSA-2009-0358.html\";\ntag_summary = \"The remote host is missing updates to evolution announced in\nadvisory CESA-2009:0358.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63635\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)\");\n script_cve_id(\"CVE-2009-0582\", \"CVE-2009-0587\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"CentOS Security Advisory CESA-2009:0358 (evolution)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"evolution\", rpm:\"evolution~1.4.5~25.el3\", rls:\"CentOS3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-devel\", rpm:\"evolution-devel~1.4.5~25.el3\", rls:\"CentOS3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:40:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "description": "The remote host is missing updates to evolution-data-server announced in\nadvisory CESA-2009:0354.", "modified": "2018-04-06T00:00:00", "published": "2009-05-25T00:00:00", "id": "OPENVAS:136141256231064055", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064055", "type": "openvas", "title": "CentOS Security Advisory CESA-2009:0354 (evolution-data-server)", "sourceData": "#CESA-2009:0354 64055 4\n# $Id: ovcesa2009_0354.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory CESA-2009:0354 (evolution-data-server)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"For details on the issues addressed in this update,\nplease visit the referenced security advisories.\";\ntag_solution = \"Update the appropriate packages on your system.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=CESA-2009:0354\nhttp://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0354\nhttps://rhn.redhat.com/errata/RHSA-2009-0354.html\";\ntag_summary = \"The remote host is missing updates to evolution-data-server announced in\nadvisory CESA-2009:0354.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64055\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-05-25 20:59:33 +0200 (Mon, 25 May 2009)\");\n script_cve_id(\"CVE-2009-0547\", \"CVE-2009-0582\", \"CVE-2009-0587\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"CentOS Security Advisory CESA-2009:0354 (evolution-data-server)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"evolution28-evolution-data-server\", rpm:\"evolution28-evolution-data-server~1.8.0~37.el4_7.2\", rls:\"CentOS4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution28-evolution-data-server-devel\", rpm:\"evolution28-evolution-data-server-devel~1.8.0~37.el4_7.2\", rls:\"CentOS4\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:37:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "description": "The remote host is missing updates to evolution-data-server announced in\nadvisory CESA-2009:0355.", "modified": "2018-04-06T00:00:00", "published": "2009-05-25T00:00:00", "id": "OPENVAS:136141256231064049", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064049", "type": "openvas", "title": "CentOS Security Advisory CESA-2009:0355 (evolution-data-server)", "sourceData": "#CESA-2009:0355 64049 4\n# $Id: ovcesa2009_0355.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory CESA-2009:0355 (evolution-data-server)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"For details on the issues addressed in this update,\nplease visit the referenced security advisories.\";\ntag_solution = \"Update the appropriate packages on your system.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=CESA-2009:0355\nhttp://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0355\nhttps://rhn.redhat.com/errata/RHSA-2009-0355.html\";\ntag_summary = \"The remote host is missing updates to evolution-data-server announced in\nadvisory CESA-2009:0355.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64049\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-05-25 20:59:33 +0200 (Mon, 25 May 2009)\");\n script_cve_id(\"CVE-2009-0547\", \"CVE-2009-0582\", \"CVE-2009-0587\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"CentOS Security Advisory CESA-2009:0355 (evolution-data-server)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"evolution\", rpm:\"evolution~2.0.2~41.el4_7.2\", rls:\"CentOS4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-data-server\", rpm:\"evolution-data-server~1.0.2~14.el4_7.1\", rls:\"CentOS4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-data-server-devel\", rpm:\"evolution-data-server-devel~1.0.2~14.el4_7.1\", rls:\"CentOS4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-devel\", rpm:\"evolution-devel~2.0.2~41.el4_7.2\", rls:\"CentOS4\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:55:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "description": "Check for the Version of evolution28-evolution-data-server", "modified": "2017-07-10T00:00:00", "published": "2011-08-09T00:00:00", "id": "OPENVAS:880940", "href": "http://plugins.openvas.org/nasl.php?oid=880940", "type": "openvas", "title": "CentOS Update for evolution28-evolution-data-server CESA-2009:0354 centos4 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for evolution28-evolution-data-server CESA-2009:0354 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Evolution Data Server provides a unified back-end for applications which\n interact with contacts, task, and calendar information. Evolution Data\n Server was originally developed as a back-end for Evolution, but is now\n used by multiple other applications.\n\n Evolution Data Server did not properly check the Secure/Multipurpose\n Internet Mail Extensions (S/MIME) signatures used for public key encryption\n and signing of e-mail messages. An attacker could use this flaw to spoof a\n signature by modifying the text of the e-mail message displayed to the\n user. (CVE-2009-0547)\n \n It was discovered that Evolution Data Server did not properly validate NTLM\n (NT LAN Manager) authentication challenge packets. A malicious server using\n NTLM authentication could cause an application using Evolution Data Server\n to disclose portions of its memory or crash during user authentication.\n (CVE-2009-0582)\n \n Multiple integer overflow flaws which could cause heap-based buffer\n overflows were found in the Base64 encoding routines used by Evolution Data\n Server. This could cause an application using Evolution Data Server to\n crash, or, possibly, execute an arbitrary code when large untrusted data\n blocks were Base64-encoded. (CVE-2009-0587)\n \n All users of evolution-data-server and evolution28-evolution-data-server\n are advised to upgrade to these updated packages, which contain backported\n patches to correct these issues. All running instances of Evolution Data\n Server and applications using it (such as Evolution) must be restarted for\n the update to take effect.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"evolution28-evolution-data-server on CentOS 4\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2009-May/015900.html\");\n script_id(880940);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2009:0354\");\n script_cve_id(\"CVE-2009-0547\", \"CVE-2009-0582\", \"CVE-2009-0587\");\n script_name(\"CentOS Update for evolution28-evolution-data-server CESA-2009:0354 centos4 i386\");\n\n script_summary(\"Check for the Version of evolution28-evolution-data-server\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"evolution28-evolution-data-server\", rpm:\"evolution28-evolution-data-server~1.8.0~37.el4_7.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"evolution28-evolution-data-server-devel\", rpm:\"evolution28-evolution-data-server-devel~1.8.0~37.el4_7.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-27T10:56:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:0355.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM) tools\nfor the GNOME desktop environment.\n\nEvolution Data Server provides a unified back-end for applications which\ninteract with contacts, task and calendar information. Evolution Data\nServer was originally developed as a back-end for Evolution, but is now\nused by multiple other applications.\n\nEvolution did not properly check the Secure/Multipurpose Internet Mail\nExtensions (S/MIME) signatures used for public key encryption and signing\nof e-mail messages. An attacker could use this flaw to spoof a signature by\nmodifying the text of the e-mail message displayed to the user. (CVE-2009-0547)\n\nIt was discovered that evolution did not properly validate NTLM (NT LAN\nManager) authentication challenge packets. A malicious server using NTLM\nauthentication could cause evolution to disclose portions of its memory or\ncrash during user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by evolution and\nevolution-data-server. This could cause evolution, or an application using\nevolution-data-server, to crash, or, possibly, execute an arbitrary code\nwhen large untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution and evolution-data-server are advised to upgrade to\nthese updated packages, which contain backported patches to correct these\nissues. All running instances of evolution and evolution-data-server must\nbe restarted for the update to take effect.", "modified": "2017-07-12T00:00:00", "published": "2009-03-20T00:00:00", "id": "OPENVAS:63581", "href": "http://plugins.openvas.org/nasl.php?oid=63581", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:0355", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_0355.nasl 6683 2017-07-12 09:41:57Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:0355 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:0355.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM) tools\nfor the GNOME desktop environment.\n\nEvolution Data Server provides a unified back-end for applications which\ninteract with contacts, task and calendar information. Evolution Data\nServer was originally developed as a back-end for Evolution, but is now\nused by multiple other applications.\n\nEvolution did not properly check the Secure/Multipurpose Internet Mail\nExtensions (S/MIME) signatures used for public key encryption and signing\nof e-mail messages. An attacker could use this flaw to spoof a signature by\nmodifying the text of the e-mail message displayed to the user. (CVE-2009-0547)\n\nIt was discovered that evolution did not properly validate NTLM (NT LAN\nManager) authentication challenge packets. A malicious server using NTLM\nauthentication could cause evolution to disclose portions of its memory or\ncrash during user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by evolution and\nevolution-data-server. This could cause evolution, or an application using\nevolution-data-server, to crash, or, possibly, execute an arbitrary code\nwhen large untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution and evolution-data-server are advised to upgrade to\nthese updated packages, which contain backported patches to correct these\nissues. All running instances of evolution and evolution-data-server must\nbe restarted for the update to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_id(63581);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)\");\n script_cve_id(\"CVE-2009-0547\", \"CVE-2009-0582\", \"CVE-2009-0587\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"RedHat Security Advisory RHSA-2009:0355\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-0355.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#moderate\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"evolution\", rpm:\"evolution~2.0.2~41.el4_7.2\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-data-server\", rpm:\"evolution-data-server~1.0.2~14.el4_7.1\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-data-server-debuginfo\", rpm:\"evolution-data-server-debuginfo~1.0.2~14.el4_7.1\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-data-server-devel\", rpm:\"evolution-data-server-devel~1.0.2~14.el4_7.1\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-debuginfo\", rpm:\"evolution-debuginfo~2.0.2~41.el4_7.2\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"evolution-devel\", rpm:\"evolution-devel~2.0.2~41.el4_7.2\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "centos": [{"lastseen": "2019-12-20T18:24:48", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0587", "CVE-2009-0582"], "description": "**CentOS Errata and Security Advisory** CESA-2009:0358\n\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM) tools\nfor the GNOME desktop environment.\n\nIt was discovered that evolution did not properly validate NTLM (NT LAN\nManager) authentication challenge packets. A malicious server using NTLM\nauthentication could cause evolution to disclose portions of its memory or\ncrash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow was\nfound in the Base64 encoding routine used by evolution. This could cause\nevolution to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. All running\ninstances of evolution must be restarted for the update to take effect.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-March/027714.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-March/027715.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-March/027720.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-March/027721.html\n\n**Affected packages:**\nevolution\nevolution-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2009-0358.html", "edition": 3, "modified": "2009-03-18T20:47:31", "published": "2009-03-17T09:02:02", "href": "http://lists.centos.org/pipermail/centos-announce/2009-March/027714.html", "id": "CESA-2009:0358", "title": "evolution security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-12-20T18:26:08", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "description": "**CentOS Errata and Security Advisory** CESA-2009:0354\n\n\nEvolution Data Server provides a unified back-end for applications which\ninteract with contacts, task, and calendar information. Evolution Data\nServer was originally developed as a back-end for Evolution, but is now\nused by multiple other applications.\n\nEvolution Data Server did not properly check the Secure/Multipurpose\nInternet Mail Extensions (S/MIME) signatures used for public key encryption\nand signing of e-mail messages. An attacker could use this flaw to spoof a\nsignature by modifying the text of the e-mail message displayed to the\nuser. (CVE-2009-0547)\n\nIt was discovered that Evolution Data Server did not properly validate NTLM\n(NT LAN Manager) authentication challenge packets. A malicious server using\nNTLM authentication could cause an application using Evolution Data Server\nto disclose portions of its memory or crash during user authentication.\n(CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by Evolution Data\nServer. This could cause an application using Evolution Data Server to\ncrash, or, possibly, execute an arbitrary code when large untrusted data\nblocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution-data-server and evolution28-evolution-data-server\nare advised to upgrade to these updated packages, which contain backported\npatches to correct these issues. All running instances of Evolution Data\nServer and applications using it (such as Evolution) must be restarted for\nthe update to take effect.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-March/027719.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-March/027723.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-May/027938.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-May/027939.html\n\n**Affected packages:**\nevolution28-evolution-data-server\nevolution28-evolution-data-server-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2009-0354.html", "edition": 3, "modified": "2009-05-22T21:43:11", "published": "2009-03-17T17:19:33", "href": "http://lists.centos.org/pipermail/centos-announce/2009-March/027719.html", "id": "CESA-2009:0354", "title": "evolution28 security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-17T03:28:26", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "description": "**CentOS Errata and Security Advisory** CESA-2009:0355\n\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM) tools\nfor the GNOME desktop environment.\n\nEvolution Data Server provides a unified back-end for applications which\ninteract with contacts, task and calendar information. Evolution Data\nServer was originally developed as a back-end for Evolution, but is now\nused by multiple other applications.\n\nEvolution did not properly check the Secure/Multipurpose Internet Mail\nExtensions (S/MIME) signatures used for public key encryption and signing\nof e-mail messages. An attacker could use this flaw to spoof a signature by\nmodifying the text of the e-mail message displayed to the user. (CVE-2009-0547)\n\nIt was discovered that evolution did not properly validate NTLM (NT LAN\nManager) authentication challenge packets. A malicious server using NTLM\nauthentication could cause evolution to disclose portions of its memory or\ncrash during user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by evolution and\nevolution-data-server. This could cause evolution, or an application using\nevolution-data-server, to crash, or, possibly, execute an arbitrary code\nwhen large untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution and evolution-data-server are advised to upgrade to\nthese updated packages, which contain backported patches to correct these\nissues. All running instances of evolution and evolution-data-server must\nbe restarted for the update to take effect.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-March/027718.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-March/027722.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-May/027940.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-May/027941.html\n\n**Affected packages:**\nevolution\nevolution-data-server\nevolution-data-server-devel\nevolution-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2009-0355.html", "edition": 5, "modified": "2009-05-22T21:48:16", "published": "2009-03-17T17:18:35", "href": "http://lists.centos.org/pipermail/centos-announce/2009-March/027718.html", "id": "CESA-2009:0355", "title": "evolution security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:46:00", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0582", "CVE-2009-0587"], "description": "Evolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM) tools\nfor the GNOME desktop environment.\n\nIt was discovered that evolution did not properly validate NTLM (NT LAN\nManager) authentication challenge packets. A malicious server using NTLM\nauthentication could cause evolution to disclose portions of its memory or\ncrash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow was\nfound in the Base64 encoding routine used by evolution. This could cause\nevolution to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. All running\ninstances of evolution must be restarted for the update to take effect.", "modified": "2018-05-26T04:26:18", "published": "2009-03-16T04:00:00", "id": "RHSA-2009:0358", "href": "https://access.redhat.com/errata/RHSA-2009:0358", "type": "redhat", "title": "(RHSA-2009:0358) Moderate: evolution security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:46:01", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0547", "CVE-2009-0582", "CVE-2009-0587"], "description": "Evolution Data Server provides a unified back-end for applications which\ninteract with contacts, task, and calendar information. Evolution Data\nServer was originally developed as a back-end for Evolution, but is now\nused by multiple other applications.\n\nEvolution Data Server did not properly check the Secure/Multipurpose\nInternet Mail Extensions (S/MIME) signatures used for public key encryption\nand signing of e-mail messages. An attacker could use this flaw to spoof a\nsignature by modifying the text of the e-mail message displayed to the\nuser. (CVE-2009-0547)\n\nIt was discovered that Evolution Data Server did not properly validate NTLM\n(NT LAN Manager) authentication challenge packets. A malicious server using\nNTLM authentication could cause an application using Evolution Data Server\nto disclose portions of its memory or crash during user authentication.\n(CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by Evolution Data\nServer. This could cause an application using Evolution Data Server to\ncrash, or, possibly, execute an arbitrary code when large untrusted data\nblocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution-data-server and evolution28-evolution-data-server\nare advised to upgrade to these updated packages, which contain backported\npatches to correct these issues. All running instances of Evolution Data\nServer and applications using it (such as Evolution) must be restarted for\nthe update to take effect.", "modified": "2017-09-08T11:59:42", "published": "2009-03-16T04:00:00", "id": "RHSA-2009:0354", "href": "https://access.redhat.com/errata/RHSA-2009:0354", "type": "redhat", "title": "(RHSA-2009:0354) Moderate: evolution-data-server security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:44:58", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0547", "CVE-2009-0582", "CVE-2009-0587"], "description": "Evolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM) tools\nfor the GNOME desktop environment.\n\nEvolution Data Server provides a unified back-end for applications which\ninteract with contacts, task and calendar information. Evolution Data\nServer was originally developed as a back-end for Evolution, but is now\nused by multiple other applications.\n\nEvolution did not properly check the Secure/Multipurpose Internet Mail\nExtensions (S/MIME) signatures used for public key encryption and signing\nof e-mail messages. An attacker could use this flaw to spoof a signature by\nmodifying the text of the e-mail message displayed to the user. (CVE-2009-0547)\n\nIt was discovered that evolution did not properly validate NTLM (NT LAN\nManager) authentication challenge packets. A malicious server using NTLM\nauthentication could cause evolution to disclose portions of its memory or\ncrash during user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by evolution and\nevolution-data-server. This could cause evolution, or an application using\nevolution-data-server, to crash, or, possibly, execute an arbitrary code\nwhen large untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution and evolution-data-server are advised to upgrade to\nthese updated packages, which contain backported patches to correct these\nissues. All running instances of evolution and evolution-data-server must\nbe restarted for the update to take effect.", "modified": "2017-09-08T12:19:30", "published": "2009-03-16T04:00:00", "id": "RHSA-2009:0355", "href": "https://access.redhat.com/errata/RHSA-2009:0355", "type": "redhat", "title": "(RHSA-2009:0355) Moderate: evolution and evolution-data-server security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-17T12:44:25", "description": "From Red Hat Security Advisory 2009:0358 :\n\nUpdated evolution packages that fixes multiple security issues are now\navailable for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM)\ntools for the GNOME desktop environment.\n\nIt was discovered that evolution did not properly validate NTLM (NT\nLAN Manager) authentication challenge packets. A malicious server\nusing NTLM authentication could cause evolution to disclose portions\nof its memory or crash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow\nwas found in the Base64 encoding routine used by evolution. This could\ncause evolution to crash, or, possibly, execute an arbitrary code when\nlarge untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues.\nAll running instances of evolution must be restarted for the update to\ntake effect.", "edition": 25, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 3 : evolution (ELSA-2009-0358)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0587", "CVE-2009-0582"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:evolution-devel", "cpe:/o:oracle:linux:3", "p-cpe:/a:oracle:linux:evolution"], "id": "ORACLELINUX_ELSA-2009-0358.NASL", "href": "https://www.tenable.com/plugins/nessus/67827", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2009:0358 and \n# Oracle Linux Security Advisory ELSA-2009-0358 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67827);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0582\", \"CVE-2009-0587\");\n script_bugtraq_id(34100, 34109);\n script_xref(name:\"RHSA\", value:\"2009:0358\");\n\n script_name(english:\"Oracle Linux 3 : evolution (ELSA-2009-0358)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2009:0358 :\n\nUpdated evolution packages that fixes multiple security issues are now\navailable for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM)\ntools for the GNOME desktop environment.\n\nIt was discovered that evolution did not properly validate NTLM (NT\nLAN Manager) authentication challenge packets. A malicious server\nusing NTLM authentication could cause evolution to disclose portions\nof its memory or crash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow\nwas found in the Base64 encoding routine used by evolution. This could\ncause evolution to crash, or, possibly, execute an arbitrary code when\nlarge untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues.\nAll running instances of evolution must be restarted for the update to\ntake effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2009-March/000913.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected evolution packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 189);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:evolution\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:evolution-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/03/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 3\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL3\", cpu:\"i386\", reference:\"evolution-1.4.5-25.el3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"x86_64\", reference:\"evolution-1.4.5-25.el3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"i386\", reference:\"evolution-devel-1.4.5-25.el3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"x86_64\", reference:\"evolution-devel-1.4.5-25.el3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"evolution / evolution-devel\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T13:44:09", "description": "It was discovered that evolution did not properly validate NTLM (NT\nLAN Manager) authentication challenge packets. A malicious server\nusing NTLM authentication could cause evolution to disclose portions\nof its memory or crash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow\nwas found in the Base64 encoding routine used by evolution. This could\ncause evolution to crash, or, possibly, execute an arbitrary code when\nlarge untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll running instances of evolution must be restarted for the update to\ntake effect.", "edition": 25, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : evolution on SL3.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0587", "CVE-2009-0582"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20090316_EVOLUTION_ON_SL3_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60546", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60546);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0582\", \"CVE-2009-0587\");\n\n script_name(english:\"Scientific Linux Security Update : evolution on SL3.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that evolution did not properly validate NTLM (NT\nLAN Manager) authentication challenge packets. A malicious server\nusing NTLM authentication could cause evolution to disclose portions\nof its memory or crash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow\nwas found in the Base64 encoding routine used by evolution. This could\ncause evolution to crash, or, possibly, execute an arbitrary code when\nlarge untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll running instances of evolution must be restarted for the update to\ntake effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0903&L=scientific-linux-errata&T=0&P=1444\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1ba29a0e\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected evolution and / or evolution-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(20, 189);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL3\", reference:\"evolution-1.4.5-25.el3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"evolution-devel-1.4.5-25.el3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T13:06:34", "description": "Updated evolution packages that fixes multiple security issues are now\navailable for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM)\ntools for the GNOME desktop environment.\n\nIt was discovered that evolution did not properly validate NTLM (NT\nLAN Manager) authentication challenge packets. A malicious server\nusing NTLM authentication could cause evolution to disclose portions\nof its memory or crash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow\nwas found in the Base64 encoding routine used by evolution. This could\ncause evolution to crash, or, possibly, execute an arbitrary code when\nlarge untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues.\nAll running instances of evolution must be restarted for the update to\ntake effect.", "edition": 27, "published": "2009-03-17T00:00:00", "title": "RHEL 3 : evolution (RHSA-2009:0358)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0587", "CVE-2009-0582"], "modified": "2009-03-17T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:3", "p-cpe:/a:redhat:enterprise_linux:evolution", "p-cpe:/a:redhat:enterprise_linux:evolution-devel"], "id": "REDHAT-RHSA-2009-0358.NASL", "href": "https://www.tenable.com/plugins/nessus/35947", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2009:0358. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(35947);\n script_version(\"1.26\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0582\", \"CVE-2009-0587\");\n script_bugtraq_id(34100, 34109);\n script_xref(name:\"RHSA\", value:\"2009:0358\");\n\n script_name(english:\"RHEL 3 : evolution (RHSA-2009:0358)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated evolution packages that fixes multiple security issues are now\navailable for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM)\ntools for the GNOME desktop environment.\n\nIt was discovered that evolution did not properly validate NTLM (NT\nLAN Manager) authentication challenge packets. A malicious server\nusing NTLM authentication could cause evolution to disclose portions\nof its memory or crash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow\nwas found in the Base64 encoding routine used by evolution. This could\ncause evolution to crash, or, possibly, execute an arbitrary code when\nlarge untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues.\nAll running instances of evolution must be restarted for the update to\ntake effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2009-0582\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2009-0587\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2009:0358\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected evolution and / or evolution-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 189);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:evolution\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:evolution-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/03/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/03/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 3.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2009:0358\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL3\", reference:\"evolution-1.4.5-25.el3\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"evolution-devel-1.4.5-25.el3\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"evolution / evolution-devel\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T09:25:35", "description": "Updated evolution packages that fixes multiple security issues are now\navailable for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM)\ntools for the GNOME desktop environment.\n\nIt was discovered that evolution did not properly validate NTLM (NT\nLAN Manager) authentication challenge packets. A malicious server\nusing NTLM authentication could cause evolution to disclose portions\nof its memory or crash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow\nwas found in the Base64 encoding routine used by evolution. This could\ncause evolution to crash, or, possibly, execute an arbitrary code when\nlarge untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues.\nAll running instances of evolution must be restarted for the update to\ntake effect.", "edition": 27, "published": "2009-03-17T00:00:00", "title": "CentOS 3 : evolution (CESA-2009:0358)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0587", "CVE-2009-0582"], "modified": "2009-03-17T00:00:00", "cpe": ["p-cpe:/a:centos:centos:evolution", "p-cpe:/a:centos:centos:evolution-devel", "cpe:/o:centos:centos:3"], "id": "CENTOS_RHSA-2009-0358.NASL", "href": "https://www.tenable.com/plugins/nessus/35931", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2009:0358 and \n# CentOS Errata and Security Advisory 2009:0358 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(35931);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2009-0582\", \"CVE-2009-0587\");\n script_bugtraq_id(34100, 34109);\n script_xref(name:\"RHSA\", value:\"2009:0358\");\n\n script_name(english:\"CentOS 3 : evolution (CESA-2009:0358)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated evolution packages that fixes multiple security issues are now\navailable for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM)\ntools for the GNOME desktop environment.\n\nIt was discovered that evolution did not properly validate NTLM (NT\nLAN Manager) authentication challenge packets. A malicious server\nusing NTLM authentication could cause evolution to disclose portions\nof its memory or crash during user authentication. (CVE-2009-0582)\n\nAn integer overflow flaw which could cause heap-based buffer overflow\nwas found in the Base64 encoding routine used by evolution. This could\ncause evolution to crash, or, possibly, execute an arbitrary code when\nlarge untrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues.\nAll running instances of evolution must be restarted for the update to\ntake effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-March/015676.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?8f1b9b20\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-March/015677.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?09faecdf\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-March/015682.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7ead2946\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected evolution packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 189);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:evolution\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:evolution-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/03/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/03/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 3.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-3\", reference:\"evolution-1.4.5-25.el3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"evolution-devel-1.4.5-25.el3\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"evolution / evolution-devel\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T09:25:35", "description": "Updated evolution and evolution-data-server packages that fixes\nmultiple security issues are now available for Red Hat Enterprise\nLinux 4.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM)\ntools for the GNOME desktop environment.\n\nEvolution Data Server provides a unified back-end for applications\nwhich interact with contacts, task and calendar information. Evolution\nData Server was originally developed as a back-end for Evolution, but\nis now used by multiple other applications.\n\nEvolution did not properly check the Secure/Multipurpose Internet Mail\nExtensions (S/MIME) signatures used for public key encryption and\nsigning of e-mail messages. An attacker could use this flaw to spoof a\nsignature by modifying the text of the e-mail message displayed to the\nuser. (CVE-2009-0547)\n\nIt was discovered that evolution did not properly validate NTLM (NT\nLAN Manager) authentication challenge packets. A malicious server\nusing NTLM authentication could cause evolution to disclose portions\nof its memory or crash during user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by evolution\nand evolution-data-server. This could cause evolution, or an\napplication using evolution-data-server, to crash, or, possibly,\nexecute an arbitrary code when large untrusted data blocks were\nBase64-encoded. (CVE-2009-0587)\n\nAll users of evolution and evolution-data-server are advised to\nupgrade to these updated packages, which contain backported patches to\ncorrect these issues. All running instances of evolution and\nevolution-data-server must be restarted for the update to take effect.", "edition": 27, "published": "2009-05-26T00:00:00", "title": "CentOS 4 : evolution / evolution-data-server (CESA-2009:0355)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "modified": "2009-05-26T00:00:00", "cpe": ["p-cpe:/a:centos:centos:evolution-data-server-devel", "p-cpe:/a:centos:centos:evolution-data-server", "cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:evolution", "p-cpe:/a:centos:centos:evolution-devel"], "id": "CENTOS_RHSA-2009-0355.NASL", "href": "https://www.tenable.com/plugins/nessus/38894", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2009:0355 and \n# CentOS Errata and Security Advisory 2009:0355 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(38894);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2009-0547\", \"CVE-2009-0582\", \"CVE-2009-0587\");\n script_bugtraq_id(33720, 34100, 34109);\n script_xref(name:\"RHSA\", value:\"2009:0355\");\n\n script_name(english:\"CentOS 4 : evolution / evolution-data-server (CESA-2009:0355)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated evolution and evolution-data-server packages that fixes\nmultiple security issues are now available for Red Hat Enterprise\nLinux 4.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution is the integrated collection of e-mail, calendaring, contact\nmanagement, communications, and personal information management (PIM)\ntools for the GNOME desktop environment.\n\nEvolution Data Server provides a unified back-end for applications\nwhich interact with contacts, task and calendar information. Evolution\nData Server was originally developed as a back-end for Evolution, but\nis now used by multiple other applications.\n\nEvolution did not properly check the Secure/Multipurpose Internet Mail\nExtensions (S/MIME) signatures used for public key encryption and\nsigning of e-mail messages. An attacker could use this flaw to spoof a\nsignature by modifying the text of the e-mail message displayed to the\nuser. (CVE-2009-0547)\n\nIt was discovered that evolution did not properly validate NTLM (NT\nLAN Manager) authentication challenge packets. A malicious server\nusing NTLM authentication could cause evolution to disclose portions\nof its memory or crash during user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by evolution\nand evolution-data-server. This could cause evolution, or an\napplication using evolution-data-server, to crash, or, possibly,\nexecute an arbitrary code when large untrusted data blocks were\nBase64-encoded. (CVE-2009-0587)\n\nAll users of evolution and evolution-data-server are advised to\nupgrade to these updated packages, which contain backported patches to\ncorrect these issues. All running instances of evolution and\nevolution-data-server must be restarted for the update to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-March/015680.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2e8b8110\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-May/015902.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?67637f07\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-May/015903.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5cb36ba6\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected evolution and / or evolution-data-server packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 189, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:evolution\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:evolution-data-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:evolution-data-server-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:evolution-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/02/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/05/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"evolution-2.0.2-41.el4_7.2\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"evolution-data-server-1.0.2-14.el4_7.1\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"evolution-data-server-devel-1.0.2-14.el4_7.1\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"evolution-devel-2.0.2-41.el4_7.2\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"evolution / evolution-data-server / evolution-data-server-devel / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T11:52:04", "description": "A wrong handling of signed Secure/Multipurpose Internet Mail\nExtensions (S/MIME) e-mail messages enables attackers to spoof its\nsignatures by modifying the latter copy (CVE-2009-0547).\n\nCrafted authentication challange packets (NT Lan Manager type 2) sent\nby a malicious remote mail server enables remote attackers either to\ncause denial of service and to read information from the process\nmemory of the client (CVE-2009-0582).\n\nMultiple integer overflows in Base64 encoding functions enables\nattackers either to cause denial of service and to execute arbitrary\ncode (CVE-2009-0587).\n\nThis update provides fixes for those vulnerabilities.\n\nUpdate :\n\nevolution-data-server packages from Mandriva Linux distributions\n2008.1 and 2009.0 are not affected by CVE-2009-0587.", "edition": 26, "published": "2009-04-23T00:00:00", "title": "Mandriva Linux Security Advisory : evolution-data-server (MDVSA-2009:078)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "modified": "2009-04-23T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:libcamel-provider11", "p-cpe:/a:mandriva:linux:libexchange-storage3", "p-cpe:/a:mandriva:linux:lib64edata-book2", "p-cpe:/a:mandriva:linux:libebook9", "p-cpe:/a:mandriva:linux:lib64camel-provider11", "p-cpe:/a:mandriva:linux:libedata-book2", "p-cpe:/a:mandriva:linux:libcamel-provider10", "p-cpe:/a:mandriva:linux:lib64egroupwise13", "cpe:/o:mandriva:linux:2009.0", "p-cpe:/a:mandriva:linux:lib64ebook9", "p-cpe:/a:mandriva:linux:libedataserver-devel", "p-cpe:/a:mandriva:linux:lib64edataserver9", "p-cpe:/a:mandriva:linux:libedataserver11", "cpe:/o:mandriva:linux:2008.1", "p-cpe:/a:mandriva:linux:libcamel10", "cpe:/o:mandriva:linux:2008.0", "p-cpe:/a:mandriva:linux:libcamel14", "p-cpe:/a:mandriva:linux:lib64edataserver11", "p-cpe:/a:mandriva:linux:libcamel11", "p-cpe:/a:mandriva:linux:lib64edata-cal6", "p-cpe:/a:mandriva:linux:lib64camel11", "p-cpe:/a:mandriva:linux:lib64camel10", "p-cpe:/a:mandriva:linux:lib64ecal7", "p-cpe:/a:mandriva:linux:libebackend0", "p-cpe:/a:mandriva:linux:libgdata1", "p-cpe:/a:mandriva:linux:lib64camel-provider10", "p-cpe:/a:mandriva:linux:lib64edataserver-devel", "p-cpe:/a:mandriva:linux:libedataserverui8", "p-cpe:/a:mandriva:linux:lib64gdata1", "p-cpe:/a:mandriva:linux:evolution-data-server", "p-cpe:/a:mandriva:linux:libecal7", "p-cpe:/a:mandriva:linux:libedataserver9", "p-cpe:/a:mandriva:linux:libegroupwise13", "p-cpe:/a:mandriva:linux:lib64exchange-storage3", "p-cpe:/a:mandriva:linux:lib64edataserverui8", "p-cpe:/a:mandriva:linux:lib64camel14", "p-cpe:/a:mandriva:linux:libedata-cal6", "p-cpe:/a:mandriva:linux:lib64ebackend0"], "id": "MANDRIVA_MDVSA-2009-078.NASL", "href": "https://www.tenable.com/plugins/nessus/37259", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2009:078. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(37259);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2009-0547\",\n \"CVE-2009-0582\",\n \"CVE-2009-0587\"\n );\n script_bugtraq_id(\n 33720,\n 34100,\n 34109\n );\n script_xref(name:\"MDVSA\", value:\"2009:078\");\n\n script_name(english:\"Mandriva Linux Security Advisory : evolution-data-server (MDVSA-2009:078)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A wrong handling of signed Secure/Multipurpose Internet Mail\nExtensions (S/MIME) e-mail messages enables attackers to spoof its\nsignatures by modifying the latter copy (CVE-2009-0547).\n\nCrafted authentication challange packets (NT Lan Manager type 2) sent\nby a malicious remote mail server enables remote attackers either to\ncause denial of service and to read information from the process\nmemory of the client (CVE-2009-0582).\n\nMultiple integer overflows in Base64 encoding functions enables\nattackers either to cause denial of service and to execute arbitrary\ncode (CVE-2009-0587).\n\nThis update provides fixes for those vulnerabilities.\n\nUpdate :\n\nevolution-data-server packages from Mandriva Linux distributions\n2008.1 and 2009.0 are not affected by CVE-2009-0587.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 189, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:evolution-data-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64camel-provider10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64camel-provider11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64camel10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64camel11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64camel14\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ebackend0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ebook9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ecal7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64edata-book2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64edata-cal6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64edataserver-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64edataserver11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64edataserver9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64edataserverui8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64egroupwise13\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64exchange-storage3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64gdata1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libcamel-provider10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libcamel-provider11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libcamel10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libcamel11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libcamel14\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libebackend0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libebook9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libecal7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libedata-book2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libedata-cal6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libedataserver-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libedataserver11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libedataserver9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libedataserverui8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libegroupwise13\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libexchange-storage3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libgdata1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2008.0\", reference:\"evolution-data-server-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64camel-provider10-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64camel10-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64ebook9-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64ecal7-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64edata-book2-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64edata-cal6-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64edataserver-devel-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64edataserver9-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64edataserverui8-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64egroupwise13-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64exchange-storage3-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libcamel-provider10-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libcamel10-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libebook9-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libecal7-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libedata-book2-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libedata-cal6-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libedataserver-devel-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libedataserver9-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libedataserverui8-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libegroupwise13-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libexchange-storage3-1.12.2-1.2mdv2008.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2008.1\", reference:\"evolution-data-server-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64camel-provider11-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64camel11-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64ebook9-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64ecal7-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64edata-book2-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64edata-cal6-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64edataserver-devel-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64edataserver9-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64edataserverui8-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64egroupwise13-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64exchange-storage3-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64gdata1-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libcamel-provider11-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libcamel11-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libebook9-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libecal7-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libedata-book2-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libedata-cal6-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libedataserver-devel-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libedataserver9-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libedataserverui8-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libegroupwise13-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libexchange-storage3-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libgdata1-2.22.3-1.2mdv2008.1\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2009.0\", reference:\"evolution-data-server-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64camel14-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64ebackend0-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64ebook9-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64ecal7-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64edata-book2-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64edata-cal6-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64edataserver-devel-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64edataserver11-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64edataserverui8-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64egroupwise13-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64exchange-storage3-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64gdata1-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libcamel14-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libebackend0-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libebook9-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libecal7-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libedata-book2-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libedata-cal6-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libedataserver-devel-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libedataserver11-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libedataserverui8-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libegroupwise13-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libexchange-storage3-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libgdata1-2.24.2-2.2mdv2009.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T13:44:09", "description": "Evolution Data Server did not properly check the Secure/Multipurpose\nInternet Mail Extensions (S/MIME) signatures used for public key\nencryption and signing of e-mail messages. An attacker could use this\nflaw to spoof a signature by modifying the text of the e-mail message\ndisplayed to the user. (CVE-2009-0547)\n\nIt was discovered that Evolution Data Server did not properly validate\nNTLM (NT LAN Manager) authentication challenge packets. A malicious\nserver using NTLM authentication could cause an application using\nEvolution Data Server to disclose portions of its memory or crash\nduring user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by Evolution\nData Server. This could cause an application using Evolution Data\nServer to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll running instances of Evolution Data Server and applications using\nit (such as Evolution) must be restarted for the update to take\neffect.", "edition": 25, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : evolution-data-server on SL5.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20090316_EVOLUTION_DATA_SERVER_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60545", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60545);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0547\", \"CVE-2009-0582\", \"CVE-2009-0587\");\n\n script_name(english:\"Scientific Linux Security Update : evolution-data-server on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Evolution Data Server did not properly check the Secure/Multipurpose\nInternet Mail Extensions (S/MIME) signatures used for public key\nencryption and signing of e-mail messages. An attacker could use this\nflaw to spoof a signature by modifying the text of the e-mail message\ndisplayed to the user. (CVE-2009-0547)\n\nIt was discovered that Evolution Data Server did not properly validate\nNTLM (NT LAN Manager) authentication challenge packets. A malicious\nserver using NTLM authentication could cause an application using\nEvolution Data Server to disclose portions of its memory or crash\nduring user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by Evolution\nData Server. This could cause an application using Evolution Data\nServer to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll running instances of Evolution Data Server and applications using\nit (such as Evolution) must be restarted for the update to take\neffect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0903&L=scientific-linux-errata&T=0&P=1720\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?aeccb682\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected evolution-data-server, evolution-data-server-devel\nand / or evolution-data-server-doc packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(20, 189, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"evolution-data-server-1.12.3-10.el5_3.3\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"evolution-data-server-devel-1.12.3-10.el5_3.3\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"evolution-data-server-doc-1.12.3-10.el5_3.3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T09:25:35", "description": "Updated evolution-data-server and evolution28-evolution-data-server\npackages that fix multiple security issues are now available for Red\nHat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution Data Server provides a unified back-end for applications\nwhich interact with contacts, task, and calendar information.\nEvolution Data Server was originally developed as a back-end for\nEvolution, but is now used by multiple other applications.\n\nEvolution Data Server did not properly check the Secure/Multipurpose\nInternet Mail Extensions (S/MIME) signatures used for public key\nencryption and signing of e-mail messages. An attacker could use this\nflaw to spoof a signature by modifying the text of the e-mail message\ndisplayed to the user. (CVE-2009-0547)\n\nIt was discovered that Evolution Data Server did not properly validate\nNTLM (NT LAN Manager) authentication challenge packets. A malicious\nserver using NTLM authentication could cause an application using\nEvolution Data Server to disclose portions of its memory or crash\nduring user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by Evolution\nData Server. This could cause an application using Evolution Data\nServer to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution-data-server and\nevolution28-evolution-data-server are advised to upgrade to these\nupdated packages, which contain backported patches to correct these\nissues. All running instances of Evolution Data Server and\napplications using it (such as Evolution) must be restarted for the\nupdate to take effect.", "edition": 27, "published": "2009-05-26T00:00:00", "title": "CentOS 4 : evolution-data-server (CESA-2009:0354)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "modified": "2009-05-26T00:00:00", "cpe": ["p-cpe:/a:centos:centos:evolution28-evolution-data-server", "cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:evolution28-evolution-data-server-devel"], "id": "CENTOS_RHSA-2009-0354.NASL", "href": "https://www.tenable.com/plugins/nessus/38893", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2009:0354 and \n# CentOS Errata and Security Advisory 2009:0354 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(38893);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2009-0547\", \"CVE-2009-0582\", \"CVE-2009-0587\");\n script_bugtraq_id(33720, 34100, 34109);\n script_xref(name:\"RHSA\", value:\"2009:0354\");\n\n script_name(english:\"CentOS 4 : evolution-data-server (CESA-2009:0354)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated evolution-data-server and evolution28-evolution-data-server\npackages that fix multiple security issues are now available for Red\nHat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution Data Server provides a unified back-end for applications\nwhich interact with contacts, task, and calendar information.\nEvolution Data Server was originally developed as a back-end for\nEvolution, but is now used by multiple other applications.\n\nEvolution Data Server did not properly check the Secure/Multipurpose\nInternet Mail Extensions (S/MIME) signatures used for public key\nencryption and signing of e-mail messages. An attacker could use this\nflaw to spoof a signature by modifying the text of the e-mail message\ndisplayed to the user. (CVE-2009-0547)\n\nIt was discovered that Evolution Data Server did not properly validate\nNTLM (NT LAN Manager) authentication challenge packets. A malicious\nserver using NTLM authentication could cause an application using\nEvolution Data Server to disclose portions of its memory or crash\nduring user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by Evolution\nData Server. This could cause an application using Evolution Data\nServer to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution-data-server and\nevolution28-evolution-data-server are advised to upgrade to these\nupdated packages, which contain backported patches to correct these\nissues. All running instances of Evolution Data Server and\napplications using it (such as Evolution) must be restarted for the\nupdate to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-March/015681.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c8fc5c78\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-May/015900.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?da15765b\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-May/015901.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7462337e\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected evolution-data-server packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 189, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:evolution28-evolution-data-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:evolution28-evolution-data-server-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/02/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/05/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"evolution28-evolution-data-server-1.8.0-37.el4_7.2\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"evolution28-evolution-data-server-devel-1.8.0-37.el4_7.2\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"evolution28-evolution-data-server / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T12:44:24", "description": "From Red Hat Security Advisory 2009:0354 :\n\nUpdated evolution-data-server and evolution28-evolution-data-server\npackages that fix multiple security issues are now available for Red\nHat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution Data Server provides a unified back-end for applications\nwhich interact with contacts, task, and calendar information.\nEvolution Data Server was originally developed as a back-end for\nEvolution, but is now used by multiple other applications.\n\nEvolution Data Server did not properly check the Secure/Multipurpose\nInternet Mail Extensions (S/MIME) signatures used for public key\nencryption and signing of e-mail messages. An attacker could use this\nflaw to spoof a signature by modifying the text of the e-mail message\ndisplayed to the user. (CVE-2009-0547)\n\nIt was discovered that Evolution Data Server did not properly validate\nNTLM (NT LAN Manager) authentication challenge packets. A malicious\nserver using NTLM authentication could cause an application using\nEvolution Data Server to disclose portions of its memory or crash\nduring user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by Evolution\nData Server. This could cause an application using Evolution Data\nServer to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution-data-server and\nevolution28-evolution-data-server are advised to upgrade to these\nupdated packages, which contain backported patches to correct these\nissues. All running instances of Evolution Data Server and\napplications using it (such as Evolution) must be restarted for the\nupdate to take effect.", "edition": 25, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 4 / 5 : evolution-data-server (ELSA-2009-0354)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:evolution-data-server-doc", "p-cpe:/a:oracle:linux:evolution-data-server", "p-cpe:/a:oracle:linux:evolution-data-server-devel", "p-cpe:/a:oracle:linux:evolution28-evolution-data-server", "cpe:/o:oracle:linux:5", "cpe:/o:oracle:linux:4", "p-cpe:/a:oracle:linux:evolution28-evolution-data-server-devel"], "id": "ORACLELINUX_ELSA-2009-0354.NASL", "href": "https://www.tenable.com/plugins/nessus/67825", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2009:0354 and \n# Oracle Linux Security Advisory ELSA-2009-0354 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67825);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0547\", \"CVE-2009-0582\", \"CVE-2009-0587\");\n script_bugtraq_id(33720, 34100, 34109);\n script_xref(name:\"RHSA\", value:\"2009:0354\");\n\n script_name(english:\"Oracle Linux 4 / 5 : evolution-data-server (ELSA-2009-0354)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2009:0354 :\n\nUpdated evolution-data-server and evolution28-evolution-data-server\npackages that fix multiple security issues are now available for Red\nHat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution Data Server provides a unified back-end for applications\nwhich interact with contacts, task, and calendar information.\nEvolution Data Server was originally developed as a back-end for\nEvolution, but is now used by multiple other applications.\n\nEvolution Data Server did not properly check the Secure/Multipurpose\nInternet Mail Extensions (S/MIME) signatures used for public key\nencryption and signing of e-mail messages. An attacker could use this\nflaw to spoof a signature by modifying the text of the e-mail message\ndisplayed to the user. (CVE-2009-0547)\n\nIt was discovered that Evolution Data Server did not properly validate\nNTLM (NT LAN Manager) authentication challenge packets. A malicious\nserver using NTLM authentication could cause an application using\nEvolution Data Server to disclose portions of its memory or crash\nduring user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by Evolution\nData Server. This could cause an application using Evolution Data\nServer to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution-data-server and\nevolution28-evolution-data-server are advised to upgrade to these\nupdated packages, which contain backported patches to correct these\nissues. All running instances of Evolution Data Server and\napplications using it (such as Evolution) must be restarted for the\nupdate to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2009-March/000915.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2009-March/000917.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected evolution-data-server packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 189, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:evolution-data-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:evolution-data-server-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:evolution-data-server-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:evolution28-evolution-data-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:evolution28-evolution-data-server-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/02/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 4 / 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL4\", reference:\"evolution28-evolution-data-server-1.8.0-37.el4_7.2\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"evolution28-evolution-data-server-devel-1.8.0-37.el4_7.2\")) flag++;\n\nif (rpm_check(release:\"EL5\", reference:\"evolution-data-server-1.12.3-10.el5_3.3\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"evolution-data-server-devel-1.12.3-10.el5_3.3\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"evolution-data-server-doc-1.12.3-10.el5_3.3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"evolution-data-server / evolution-data-server-devel / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T13:06:34", "description": "Updated evolution-data-server and evolution28-evolution-data-server\npackages that fix multiple security issues are now available for Red\nHat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution Data Server provides a unified back-end for applications\nwhich interact with contacts, task, and calendar information.\nEvolution Data Server was originally developed as a back-end for\nEvolution, but is now used by multiple other applications.\n\nEvolution Data Server did not properly check the Secure/Multipurpose\nInternet Mail Extensions (S/MIME) signatures used for public key\nencryption and signing of e-mail messages. An attacker could use this\nflaw to spoof a signature by modifying the text of the e-mail message\ndisplayed to the user. (CVE-2009-0547)\n\nIt was discovered that Evolution Data Server did not properly validate\nNTLM (NT LAN Manager) authentication challenge packets. A malicious\nserver using NTLM authentication could cause an application using\nEvolution Data Server to disclose portions of its memory or crash\nduring user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by Evolution\nData Server. This could cause an application using Evolution Data\nServer to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution-data-server and\nevolution28-evolution-data-server are advised to upgrade to these\nupdated packages, which contain backported patches to correct these\nissues. All running instances of Evolution Data Server and\napplications using it (such as Evolution) must be restarted for the\nupdate to take effect.", "edition": 27, "published": "2009-03-17T00:00:00", "title": "RHEL 4 / 5 : evolution-data-server (RHSA-2009:0354)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "modified": "2009-03-17T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:4", "cpe:/o:redhat:enterprise_linux:5", "cpe:/o:redhat:enterprise_linux:5.3", "p-cpe:/a:redhat:enterprise_linux:evolution-data-server", "p-cpe:/a:redhat:enterprise_linux:evolution-data-server-doc", "p-cpe:/a:redhat:enterprise_linux:evolution28-evolution-data-server", "p-cpe:/a:redhat:enterprise_linux:evolution-data-server-devel", "cpe:/o:redhat:enterprise_linux:4.7", "p-cpe:/a:redhat:enterprise_linux:evolution28-evolution-data-server-devel"], "id": "REDHAT-RHSA-2009-0354.NASL", "href": "https://www.tenable.com/plugins/nessus/35945", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2009:0354. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(35945);\n script_version(\"1.28\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0547\", \"CVE-2009-0582\", \"CVE-2009-0587\");\n script_bugtraq_id(33720, 34100, 34109);\n script_xref(name:\"RHSA\", value:\"2009:0354\");\n\n script_name(english:\"RHEL 4 / 5 : evolution-data-server (RHSA-2009:0354)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated evolution-data-server and evolution28-evolution-data-server\npackages that fix multiple security issues are now available for Red\nHat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nEvolution Data Server provides a unified back-end for applications\nwhich interact with contacts, task, and calendar information.\nEvolution Data Server was originally developed as a back-end for\nEvolution, but is now used by multiple other applications.\n\nEvolution Data Server did not properly check the Secure/Multipurpose\nInternet Mail Extensions (S/MIME) signatures used for public key\nencryption and signing of e-mail messages. An attacker could use this\nflaw to spoof a signature by modifying the text of the e-mail message\ndisplayed to the user. (CVE-2009-0547)\n\nIt was discovered that Evolution Data Server did not properly validate\nNTLM (NT LAN Manager) authentication challenge packets. A malicious\nserver using NTLM authentication could cause an application using\nEvolution Data Server to disclose portions of its memory or crash\nduring user authentication. (CVE-2009-0582)\n\nMultiple integer overflow flaws which could cause heap-based buffer\noverflows were found in the Base64 encoding routines used by Evolution\nData Server. This could cause an application using Evolution Data\nServer to crash, or, possibly, execute an arbitrary code when large\nuntrusted data blocks were Base64-encoded. (CVE-2009-0587)\n\nAll users of evolution-data-server and\nevolution28-evolution-data-server are advised to upgrade to these\nupdated packages, which contain backported patches to correct these\nissues. All running instances of Evolution Data Server and\napplications using it (such as Evolution) must be restarted for the\nupdate to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2009-0547\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2009-0582\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2009-0587\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2009:0354\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 189, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:evolution-data-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:evolution-data-server-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:evolution-data-server-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:evolution28-evolution-data-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:evolution28-evolution-data-server-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4.7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/02/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/03/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x / 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2009:0354\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"evolution28-evolution-data-server-1.8.0-37.el4_7.2\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"evolution28-evolution-data-server-devel-1.8.0-37.el4_7.2\")) flag++;\n\n\n if (rpm_check(release:\"RHEL5\", reference:\"evolution-data-server-1.12.3-10.el5_3.3\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"evolution-data-server-devel-1.12.3-10.el5_3.3\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"evolution-data-server-doc-1.12.3-10.el5_3.3\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"evolution-data-server-doc-1.12.3-10.el5_3.3\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"evolution-data-server-doc-1.12.3-10.el5_3.3\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"evolution-data-server / evolution-data-server-devel / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:37:27", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "description": "evolution:\n[2.0.2-41.el4_7.2]\n- Add patch for RH bug #488439 (CVE-2009-0547, S/MIME signatures).\n[2.0.2-41.el4_7.1]\n- Add patch for RH bug #488439 (CVE-2009-0582, NTLM authentication).\n- Add patch for RH bug #488439 (CVE-2009-0587, Base64 encoding).\nevolution-data-server:\n[1.0.2-14.el4_7.1]\n- Add patch for RH bug #488278 (CVE-2009-0587, Base64 encoding).", "edition": 4, "modified": "2009-03-16T00:00:00", "published": "2009-03-16T00:00:00", "id": "ELSA-2009-0355", "href": "http://linux.oracle.com/errata/ELSA-2009-0355.html", "title": "evolution and evolution-data-server security update", "type": "oraclelinux", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:25", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "description": "[1.12.3-10.el5_3.3]\n- Add patch for RH bug #488280 (CVE-2009-0547, S/MIME signatures).\n[1.12.3-10.el5_3.2]\n- Add patch for RH bug #488280 (CVE-2009-0582, NTLM authentication).\n[1.12.3-10.el5_3.1]\n- Add patch for RH bug #488280 (CVE-2009-0587, Base64 encoding).", "edition": 4, "modified": "2009-03-16T00:00:00", "published": "2009-03-16T00:00:00", "id": "ELSA-2009-0354", "href": "http://linux.oracle.com/errata/ELSA-2009-0354.html", "title": "evolution-data-server security update", "type": "oraclelinux", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:24", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0587"], "description": "[1.4.5-25]\n- Fix some typos in the NTLM patch.\n[1.4.5-24]\n- Add patch for RH bug #488923 (CVE-2009-0587, NTLM authentication).\n[1.4.5-23]\n- Add patch for RH bug #488293 (CVE-2009-0587, Base64 encoding). ", "edition": 4, "modified": "2009-03-16T00:00:00", "published": "2009-03-16T00:00:00", "id": "ELSA-2009-0358", "href": "http://linux.oracle.com/errata/ELSA-2009-0358.html", "title": "evolution security update", "type": "oraclelinux", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2019-05-30T02:21:22", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1813-2 security@debian.org\nhttp://www.debian.org/security/ Steffen Joeris\nJuly 22, 2009 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : evolution-data-server \nVulnerability : Several vulnerabilities \nProblem type : local (remote) \nDebian-specific: no \nCVE Ids : CVE-2009-0587 CVE-2009-0547 CVE-2009-0582 \nDebian Bug : 508479 533386 536694\n\nThe previous update introduced a regression that stopped encrypted and\nsigned S/MIME messages to work properly. Also, there have been other\nregressions caused by the introduction of an undefined symbol.\nThis update corrects these flaws. For reference the original advisory\ntext is below.\n\nSeveral vulnerabilities have been found in evolution-data-server, the\ndatabase backend server for the evolution groupware suite. The Common\nVulnerabilities and Exposures project identifies the following problems:\n\n\nCVE-2009-0587\n\nIt was discovered that evolution-data-server is prone to integer\noverflows triggered by large base64 strings.\n\nCVE-2009-0547\n\nJoachim Breitner discovered that S/MIME signatures are not verified\nproperly, which can lead to spoofing attacks.\n\nCVE-2009-0582\n\nIt was discovered that NTLM authentication challenge packets are not\nvalidated properly when using the NTLM authentication method, which\ncould lead to an information disclosure or a denial of service.\n\n\nFor the oldstable distribution (etch), these problems have been fixed in\nversion 1.6.3-5etch3.\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 2.22.3-1.1+lenny2.\n\nFor the testing distribution (squeeze) and the unstable distribution\n(sid), these problems have been fixed in version 2.26.1.1-1.\n\n\nWe recommend that you upgrade your evolution-data-server packages.\n\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nDebian (oldstable)\n- ------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3.orig.tar.gz\n Size/MD5 checksum: 9912159 b68864722532715d721f32e8a10660a1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3.diff.gz\n Size/MD5 checksum: 55940 cdcaf125d790e45ba4d960f0695cee77\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3.dsc\n Size/MD5 checksum: 1737 b0a4a4e14dd4e3971f5cc9f42d9a9b7a\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-common_1.6.3-5etch3_all.deb\n Size/MD5 checksum: 1924580 eb5af23eab34ae96663788d53e5f7d37\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 116988 0a188cec30e48c32108fcc82a1fb66d2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 61278 a4293c396ba630753059e1baa64f7bba\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 62074 ebf44190389188f0519604a2b87e1855\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 3260538 c0f66b14c32903e142854603c56bc664\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 112828 62742c83b3b34a2e49f29aa2aec04d0e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 120436 25c66f774cdadcc8e70055768083d70f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 112072 a7aed4a1065d15a41882b347fa01ec33\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 54262 4f47895931149cbba4104800a956bd6d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 69494 66582e324c36b1e1131a8212d9fd2d34\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 169060 d13becc86573b381a72a4a9c5f5087e1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 382822 dd6d3da720bcfb7a255c9299af8dfa34\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 120202 5c42020d07a34e92ff90a67b91477e90\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 194198 f9d5e8bcdfc132f0d22b0567fea82c5d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 127520 898e5e04774746623755962e8b31bbde\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 128556 8061a2759339382153591d7cff2e990a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 93204 2fcc7a9740e97138b1a50a334eac2c07\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 140330 3c0f4c77ee3872a6f0ad50675286fd8d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 101964 9148624349626eab8768747bf644842c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 332966 b7933999a1572afe17aff125ffa2e21c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 557014 533f8680a017bc073b6fd725924f18c9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch3_alpha.deb\n Size/MD5 checksum: 105332 067a361409801ca5a78d9c3c13e2a767\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 54152 e458c301cb6ed48bb4fa7e09d98dd46a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 68748 c92fd532b925ac8e3fa9df223e0beaef\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 112978 ac4fdfeec74cd8a8c5e96cd86ebe0b10\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 93582 260130774bc5298338f72ac625a08bbc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 123736 7d4b75752ded2af25022ea4a73813ca8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 526850 97b809f73bec9bad57642e1b4035f3e4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 61682 bd3a5682156c1626995325ef924d960f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 106572 bf396288646930296acbf9ad21970558\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 180972 f2ce142e5549daa9d097cc3f3b268984\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 310210 7be124e3fb1383369ed36834a148e0b9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 122572 7592c4db9ce890c28f7fdc3be1a05f64\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 353586 0bb7e2b88f7efcdd74bc92ac5b5d6695\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 122898 6413cee21602547450e18e1323521044\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 117854 2aaf5d4ad9d24f95ef0a2beae9d9055d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 174228 091eda1768ab57fd8a5fbeb676df6e17\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 60876 e839b44664ce7676fae085a3a5743d8e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 100130 a9f949b09cc868aa950ac0b772bce9de\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 3286920 9e0e01b79b9eac403ce014173c74a45d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 110670 b797e61c2696343807e8c10f25003810\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 139282 f39ae360eca042232cf93d4282b2c0de\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch3_amd64.deb\n Size/MD5 checksum: 122090 049fa2d582fda21c1c8529dbe8726d43\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 174750 5888781eb17e2d3068e0d0de87d935ff\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 307874 3d51e0d0afcc27f27e24316c7a30615e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 104126 20bcd8dc6e8cb0181f308c8f96aba491\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 61728 d86dafba05c7eeb0a5add83f086bfac3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 122778 c811f25dd23c7ac6920826391f5aeffb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 118118 cae4f11e28c27fb7477b373c4abb7664\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 101346 30c450f47c3df32d6b11f1119cd249ae\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 111912 dd708f587954b84d034938d4fc1a9201\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 93874 a08fbf7c724d7983d5d44a509345780e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 60918 7aaf82cf3af0d3c013152792beadc8c6\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 269246 b858e14f63b42ddb4055afa47bf5609e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 70576 233e71da035b422df675d18be8cea88d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 3070974 e939ed4c41be21322e68fe98fdd8cc98\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 123956 d4a4a771eac08ffa12db90865fa6028c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 54160 979c7554b1fd1a07e52e6bf208a1456d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 113212 7cbb2f4c712ebcfdce0da1efdf3e49da\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 92116 5a4fcd1446734a3a32056fa6c885e221\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 107794 3bb605aff5f0f855bc39bf53598b1bcc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 457238 a8f099f4e6139f9072bc886786409d5f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 166014 e7ebb14f567173ec10552c0830aad480\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch3_arm.deb\n Size/MD5 checksum: 125096 57161d5f53cce25c6749649845cbc8f0\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 3233288 7ede3f58077a09255cf3912ba89ad205\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 123224 1f256cf8960c784cff620ab8bb1e4cd4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 115776 81f60dbecf5b88489eec4ef5dcf920a8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 93106 bbb7601bc6b067d797215430cacd6ea0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 142572 8c977f18c44447d1b39587d8d47ae206\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 131890 6194e9839cafe6ad7460a26e9e7a71fb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 118548 018826576b40a2b7cd352234d3dafe51\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 123228 14c2300b424b993ea26babc0692462ef\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 582680 ab56b89612635cadbbe83a5e8c8ef603\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 107780 7530dc7853a010aad04bb51ae437a8fc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 129830 7abee87ef909eed3605e8253a59815dd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 61994 4a39876e0073da768d8e4d41aacbd44b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 115604 298d00d86aaab66c295550158d6a02ea\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 61190 5fe8718dcf7b31d8413ed4702474d10e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 174756 6b707028fcbc32246537441dfa2f4fc1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 197910 4a34bce3bcf000ebac5960edea53333f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 392650 26f1107952970c9dca2fb20b27003c97\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 69128 3ece8cbd48c4fda0960dc0a5a934edc2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 54286 402297b30c28646015134f527f055513\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 319110 ac147f16bb1e566c31aeeec1e1932988\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch3_hppa.deb\n Size/MD5 checksum: 103174 9b7815c9f438d40ef7bbd8906355491d\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 325038 ceaf891a7d0ff9a20de5b3eb060d03d1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 169452 f23c43849b377f9ae148c622f94490c1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 54290 9e8625ce8c486f6c0119a2a40e823840\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 128938 1db6af1f23ba758b521b0c4e4742060a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 171996 af55e1848731a7b75ae0ea5ffb98f863\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 483730 7b91ffbcc89ef59a1b3bc46e913218db\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 93266 985916b2f7fb9423635539c69aac09a8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 117046 9a5f44611d778bdf5f09ab399efee976\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 107112 cb29eb66ad12a2e6bc5108238aa81250\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 62174 fa0968affa7586e0c30958f9b639960d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 106442 65915abd893162667b676946257ed753\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 102726 052ae4d26e4ec6e1ded2101f45a95ece\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 280340 858c4bc9a82c1feedad81e4bc1637fa5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 92648 071302d61b9608a0c0218ca7c4cc0303\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 61336 6f90c50a3f0517d395c17e3498512691\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 123514 036584b4ddeb75f81089e373e4f09bf9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 123148 4887d5c244afc7e4191f8a5e57db96aa\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 70292 00d41364e3283e486c30c2fd21613841\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 118744 f86e05c81e0fc26f3526fc90a6389f07\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 117626 969d3677fa1dd080192f7dcdd8b68fb5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch3_i386.deb\n Size/MD5 checksum: 3068700 308ecb33c93be68eaf3f71a1d29e096e\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 105316 48d3bf2c3e4bb86a0ab0c2ed7f8f5cbd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 123062 a21b512be7574520d6c2fc271ac8d891\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 149176 3d26133037219472bd312cb4219275d9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 3042660 626552bc24a027ad0c3383cbde1e135a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 120190 6f639463c92c06150bc085cd1bcd7557\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 404336 5da2673e3337a42ef30d8bd8d245839d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 54262 37a950707d447aad526ae640c6daa466\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 116990 5005475c2687c13a78924efe8c1f55e3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 93188 97b1231d4df1b57091fd21c297f494ba\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 230060 03bce5e8699db51755953d123d9359ea\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 111312 57f7750d800c4886f86ab55deb8b48c3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 148190 e50bff4500d71588326905bf0abfb27f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 722556 21713948e9f0dc5ffdbfc019f083dd5b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 165702 d9b25926242daeb5e31363b3a4b1ffda\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 127396 cd4776e9a6174f5d13911dbd11bd26d4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 169048 6ab99d8617849a5fb7ebf9addfdaa34d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 61272 9356266c241e346d79a2c5056ac56f16\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 62078 89106f651ba8012b9c64c21e1e64e92f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 69484 072cd3522897b51bdad6a70197e3b3b7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 485544 187a8b9fd8ce02d89bc25fa62c3b540c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch3_ia64.deb\n Size/MD5 checksum: 120422 632448455de821c067c4e8d757d45810\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 3354526 0c2fcb9a60bba066ae0a39b3bb66ddaa\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 120192 c697e8b507173e2a73f90a0ba2319bb7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 105322 391192ce23225862ffdccd25d2524b8b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 61278 250d86a1015b0aae3c49e6540d4756b2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 113922 b0d63cb9faacdd87bb27220b0688a26d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 169184 7b8535cd2f533fa10f7161af4bbec043\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 120442 17c9135371807986c4c3c67f054143c1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 93194 9620b8e3f691cba59f0a859546c512e4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 98732 303f325bca18f936d4d7a505a6192bca\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 69490 af67fcbd3a4bfa5668db495f0fd0b0f8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 279074 f76a5298a8b9b078291e06f387cdb3c7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 99674 699cdd9d428f59676b81a0c83850c239\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 117002 048c52e5888b34606f47480b8a50ef5b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 62074 5f6afedbf48d8ce6535994c7bd37b5a1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 169054 41b8de0a4832fac44905090b19c3958a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 123724 5fd2ad5db88b8e0bb450f7a4ed21117d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 54264 8f11a6005c84a003a80296bd5016d842\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 115028 7a1b7a32cb855f2c345bcc91f5204447\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 90966 fdfa29fd0748998a9b311d7dbd12a5ba\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 475376 4958d5652f5447cf0347c44a0434adbe\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch3_mips.deb\n Size/MD5 checksum: 321800 17544cd0b0baf3d6fda4ddbe8e10c388\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 93192 6709fce84abfab1fbcdc0da662fd6db5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 98876 eda60f064ae2a0d80e3cf70bb2b71eee\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 277372 f1303e4bba07dddd1187d49a644a914e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 169066 802d80453fa8fb9ab2106d6ca7e30976\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 321418 cbd73dc557fcfefe71604178de26f363\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 120188 721379a6240a9b6ca3362bbc2ff61c5c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 62074 70500a7b3d658f5bc706e894b3d64642\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 69486 64f74bdb21fbed65c9e57cc69694d530\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 474404 b66c90ba76c5b199182e25e066b79927\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 91180 00c0414030f30abc6fce1bfcf1949beb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 105314 499c3d87c1ab649e63ccfb456eb8c9db\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 123074 dc9372781b21215190661a698443971a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 113726 78d41cb5755996ea3243fcbb8656d90c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 3276862 6e5424f32f038ff6966d5945c46ca6e4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 99274 f9577fd92d47a684209109f00cc0f240\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 114872 c854f9f8227d14f1f922ec79905ea127\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 61282 955036ae2bd849286245228e9ea835db\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 120440 444d5c780f0216dcc55c7122e766e818\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 116988 7b60486be5ccd031541f2210398bed77\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 168544 39824b96b925a0790a701ae1a5ee0d9f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch3_mipsel.deb\n Size/MD5 checksum: 54268 44acb04d45cca38ba62e871a928f6099\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 129460 8e7afc82f2d4e620dc3f986a49af81fe\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 94698 56d0269c418bfb0bc779f272f5852de6\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 69420 8ac8fc2d9bbc45a90dd7d4428562a19c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 107930 2dee9281d31da5dd27725bb48d69d078\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 107918 ffa6d2843a2f38d8b58d9bbdb08324c2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 123040 80222c02de3a811858cab7834fee617b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 61316 0affd1647d4211d378d3c334abcd59d1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 105028 f3b91d9a3314e387a5e4e22014bd8235\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 54226 41f7493dfab4694940de3969abe18946\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 118912 bacf94cb9b4dc1f5013dd38fef364162\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 3282082 183d9ae5a7f56237569fbdcaddac3cfb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 336302 bc4ffd78a51c8ecc730a15aec7616755\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 121180 55d85adc08d08de6cdc90ead1113f63b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 174060 39f1a860254453eef19010fd70fe15bd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 118608 6b61d3ad5b7b5bec8bbcf78530a69c88\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 284046 eb7d8f75ab957e8cdc43ef3effb89ba1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 511094 668135fe5431abdb9dbedc17b8561504\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 94016 6fe9c7ec9c7ae8d40bfbd1043573e29e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 176624 b55a98e873a9c2581e848196f69e733a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 116888 0cd44fcea290807cfe884c07be1afd4c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch3_powerpc.deb\n Size/MD5 checksum: 62024 d73f64abbba27bf9146f4c0c4a912e52\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 105306 6ea48c7ef60abd2e2ed76e3047413b87\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 110812 23b053018bc683b7904b5ac45c473f26\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 93178 be541d973e6093be597cac77d8fbda7d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 54256 042a9eb9f66a26e59cdc7786e0b4601e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 110934 464517147f23967e7c8bce2479e6a14f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 69474 79fe9bab6c28159e94e45a9fcb925aff\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 120178 d10abf0b81e02549b03908db4fded3a8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 547580 31e39bf80190503295d8c78d47363def\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 120414 35afd65a72e620915f99ef353da50b1c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 127588 69cae12899cefa09c73f75995a50b890\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 99904 80e35ecba3bfabf072b8e1023297cbec\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 190454 36100faecf05ddf9b4c17b31a1a8d586\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 127344 e2987d319b6bbf734fbc0126224e033c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 138814 cebb538b1fdc9d2e5a708db0e497718f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 62064 4e3ddf84bb398c5d82addae0efc74ef9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 3222518 e2ac25fb5195dcff31e6deaf969a8f4c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 61262 7a7372c9be2d63a27c1e765c70f7ea92\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 377492 397ff60325c6073640f5e37613bbb993\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 169036 3b7df4e5ab86b2af694f01b7f1241905\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 116976 716903bbee4b6116be1e4fa1f824ae51\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch3_s390.deb\n Size/MD5 checksum: 312028 08dcd0c88480dac4ff377bc122814fd5\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 92500 56f26f1381e68bc3947bfc8e1f5656aa\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 54394 1b6acbbaf2e7474cb6610a257e94cd09\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 118692 32222023549bfecd08db38e86b5bbeea\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 275680 a3e892f795be22e17006d94b958fd708\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 474650 0aba70c66b41863f16cf726eeab26e20\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 110768 fa2d45247ca8225ad4fc17a1e53c867f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 2930200 2fe1466a73d47aa911ba169020b6a7ec\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 115612 6ed92c007a8bf00d3e87b3eded1f52b0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 323078 65a3ab4fe2d51b2b840f992f8c50ef9b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 174884 ca073a3e6eaa5d9dcc5d232d328730eb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 62928 e769034c1299360ca3a03ce375876858\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 107446 613fcee82220aa614981a8d6fcd7f37b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 62084 00127ade865672e7e4d989bd9829c135\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 70778 6c1373f94958e7759579ce806d01f7c2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 125932 d534c26ed7de831b134ebef03e3917df\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 126456 5ea8bc5289c8ee6ea837fb37ff13002b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 127668 ef24d19440189e829897a8ba90797bf0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 94012 092a7bda4a462e9b8c2e74b34172294d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 116500 38c3f2d09f2e4fffe1c084abb9ba7a95\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 172236 652b6397d86922fd08132c2bb8fba395\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch3_sparc.deb\n Size/MD5 checksum: 103364 6cd296694dab091a2b272b49688d772e\n\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nDebian (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2.dsc\n Size/MD5 checksum: 2718 31019e028845b5f1e3da2df243f2783f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2.diff.gz\n Size/MD5 checksum: 23123 6d38af62b75d46b9fd2523dd773e62ec\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3.orig.tar.gz\n Size/MD5 checksum: 10903459 c401c0a912d24c3262580de6caf088eb\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-common_2.22.3-1.1+lenny2_all.deb\n Size/MD5 checksum: 2148128 0f586f71e52e33be568748dd5e9e009a\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 156920 aabe09b7b361e04f0d34b61ebb0b64c4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 161608 2d4119e5da8f952562926ad279336955\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 80056 cabc197cc4a0bc162d3a52ea09fda018\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 84728 2d5da3664e6837327c1057e527e71ed3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 93982 d8205c2fcd21d779d45f63f38bd2f08c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 561752 a31035a5e69a9a7fd1ad639555a1472f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 87142 2764cd4ef7e697d339bbcf94571722ca\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 140778 b59cb037f27758793d820a2a3f31844d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 77166 60f0b64db8f59dcadea63f90ae320ac8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 145108 2bdf965b3c0874a78f2ccb6441f5844f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 135780 5b5b6e2c3abe9801307cf28ab531f8a0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 165702 3469a9246b1224cffcc6bc745347a6d7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 197970 0c2f9a776aa7661ffe57e0709cd7bf04\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 117722 69e4bd3e05ce09792a2ddf87e467f65e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 3486764 d7166d59722b2ae2c7f2142e39e435b8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 144368 0cfeb17470cc283adf0ceccf940df99b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 441458 2902df142b0fd8e8516197f5475914d2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 78686 e880f15f7932242f7c2c634231374f03\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 369902 048dedbf52cd0dc6cb57ac399bafc1c8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 153100 3242303f4214286f7816888ef49834ff\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 163244 0a788196d0fcca60c1fc8a0472c7e9a8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 90772 f3c23c704365859e192bb6c26f0a4bd8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 219484 c43a46ba9f6551ac074b1291291001db\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 129584 eea17bf4a238e031ed049e560b7180b8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny2_alpha.deb\n Size/MD5 checksum: 85930 b18b457a09b5f4fc67a29571017e1664\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 161954 1a7b605dd2e4ddc54abb1ef8bb2e983a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 539950 c36cdff13f38c8a3ea2f4ac5c675e4e6\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 157910 169f8bc80ff7fa720492e5bd97123d7c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 128020 aa1baafd0aeeb1b65ece5d754b16ec2a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 77032 c62e282c81dc6758c74202827c95d3e2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 3553746 b176f90a85e1f4282617f56d8326b745\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 89660 747c854e005ac22a542d87489dc2928f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 353276 83beb37d89e7211460724177e452a639\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 85878 4dbe05010454b84a89d3d3368dab1aac\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 84670 4b30a73a91d12301920630fd55904434\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 79342 f5ed9e2366036f5dde6329d561e47313\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 207966 b85cfbaa940a087150a092b58bd563cb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 78098 a7aef2f1bf8e61da05fd7629aa9abad7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 143848 12c23788d2df878d827ec1c851c1f4f3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 134344 ce3086d9885cda7ee7ff884d5ef9c120\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 152758 c8dc5c26821f0587eb781c5d6e26f902\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 164278 cd119ca25f56803bc47e8473bdba9030\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 140472 e6151797a5af9b0e0f195cc946b2225d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 142952 3a244e36ba878e35b385888e4a2e30c0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 198524 a868dc0a72c3e340832c0d1a70b4a4d2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 92036 b8b154638b4c173bf47b012c25ef095b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 84118 4f669ffbd8e470f62548b78dab21d7ce\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 153134 0e6335acc7f1f80bdc84262b92d5d658\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 116572 dd121898245a17160da734cf921972eb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny2_amd64.deb\n Size/MD5 checksum: 418956 0f96eebacc8cadcadbbe723bce209d90\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 83616 8ecd41a9ebc46b391ba4537b9004c507\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 364096 03adde591c3dafee78ce60146b8f1715\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 79330 7ffddffb2870fb932621748208f6c65a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 143708 b3375bcf1bb5f81fa7a04557937c072c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 88438 c49313ca17793fb92c71799f0e425d4d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 297818 7a5d6f5eb600d6454124cd6a531e0a29\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 86652 83c1fd164b0090cb37ed778d3fa2e9ce\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 3332960 8f71b24bbf94b4b19e7fb38cd2b03912\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 78076 23ebf0b9fcbd352b528aec1b4b8ca87a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 126308 180aa5838c420aba203708161f5ffaa5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 140738 255fc6bde40f991d68210376e6f7ab65\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 189452 23b714b9817e39933c4a269434da5538\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 117386 fe224b4d63c46ec5c677893ebc242700\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 85236 494ca9b88de6eb042f1395817f651d0c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 149144 8f99e189f96e23f4a291510ca9190e59\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 134310 6a92123119fe810870ef210b16d5e91d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 135394 814c1bd3eafcbbae12d1965a7d527c05\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 154456 8ffaab14f9ba982abd937f126d6b197a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 117100 3eca0d0fd8e231a5c3a9485812ec78aa\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 76988 d2feba130525f7764eedf4ca321b8968\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 162034 7c01cee3e94ebe7b670b8f01c9c08a3b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 146324 629b21fd46fa4dbbce5ecc6ce3f422d5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 472654 cd86617c9f5edc12ccb32526fcb4d3e9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 198940 405194271400bf6c5a5c26798e4b0c47\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny2_arm.deb\n Size/MD5 checksum: 93908 efed38d80d65e7bbe6c1bbe41cb7ea64\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 192088 319203a797ce3bafce4c46c48cc9778e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 87292 5630dfca81727c821ac5c486244dd9f9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 94364 66aa6907567ea363822d05f1c939dfbf\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 78796 663b4dcce172387629765b65bd665ea5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 144668 f2f1df377d91caae5b484885bcc5b71e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 83620 8d987c6ac0f0017e1b304c52e2c999cb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 136012 e5e802d30f7201024066d61d93345196\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 301470 54c85a147ea3548b7823281b7850b759\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 88660 b375cde103aa9fc3ce97bd3944df0071\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 149542 f12de7a00e9961ac3a1495379444c417\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 116808 044e31487fb6ac05c1d1a589a282bb0a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 86022 513b90808ba30d86503d5451571af4c3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 117608 bf6978bf6ce7da51485ba65b901a2cc3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 163240 2b174bd2b5338131cd71a528f4db1aec\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 80214 5a18da7e8a13df18b980f90d27f20c6c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 135568 6e377f5c035c774d6f09a72c95450f19\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 198640 515f9ee67805f271a0794ff09fed9319\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 140846 0465e92b4b6d21c2dac9b23bd408febe\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 154510 255669548a25e821e863f1159885dda6\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 77288 38b0956c106423993d73b24c94be8a27\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 483472 7f55adfb811a18937d0689c99514047f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 366874 18bbbd851642ad1078df6b9252c7a852\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 3360242 80185a5d571de398ebf0b991dfd2f079\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 127660 0945dc5bfdd254bcae7223981cdc5983\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny2_armel.deb\n Size/MD5 checksum: 149348 796a3526ee57ca7df733c58290777fac\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 165024 2c945d62a23042e4e37b037fb9b5deb1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 152988 3db2e6d69b21373a6e70e541b6ff34b1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 85726 5aee7490bfbdb01fa175d076357d8dd2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 3446542 83fd329c2209e365e3edfc5c3b2377d8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 154964 ff907bf5ad4c1a6333ee43f86f982859\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 128132 ced8337dc1ab86206f64c628601f4a90\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 84446 d94e75c2058aed3658039488b2e5961c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 87028 c6f5da498adc6f68f7164b62a4748555\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 198906 9fdec832965bdc94c5bab63a0b4aa4c7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 117480 8d4efcffc3a0d0716e6f93b791f6b20c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 144028 056405dfea6ca57d228a0b8dfd1b34fb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 342836 fad62ad549ed0123bc610df4100ef65a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 79798 61d577fae45c58bdf9e96b9df418a483\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 443102 771e6f3eaee69de305b738ccf01dce3d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 93974 1391e3e27f103dfa51647e3707b9fb56\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 76800 23c67df31bb2248997366407bb359e23\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 135190 bdcbbee80eff8edb297e9e92fd09a220\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 91208 569a09a7674ac17815057de1d56e5fed\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 217656 ec396c55829d093352aceef64d859a9c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 140588 2d3b08623fefa8677fb67b717f9fa650\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 78352 09797e72c5015d9b3001c4aeb38a8de7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 146012 57b143dc75890aab81ce9f05ce11b460\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 164828 45144f9905cf6b333d64d3d4948e7d8a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 160958 6e48ef800a40648d59518bb8a39e3270\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2_hppa.deb\n Size/MD5 checksum: 582726 81719d88a3c122ef27499e60e0d5cb7e\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 493966 8247a897ca84df8e7abe2fe23d308cc1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 3341592 0163527c3fd40461bc2b2dc87ae8051d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 163072 3511c547134afcc386b1f5880050aa0a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 119636 78175e9182b0cddc4390da1d39782a17\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 194370 6fa41e13a4a8e031a8f1f6abb7c8d05c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 116352 77ffbd49babbcc6a957ad7df2e37c44b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 85702 bac66db85f3eb4024c4c767515755433\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 139008 b5d2f951e8022cf75cc469525277ceff\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 197174 6c0abd7d2388d9d398a4e8d6cb0e1c6c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 144672 268df54b65caf21b3abe454bd76c5480\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 77136 9d93030302ffead57d7fa984e51fcc3e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 144160 f66664f218a99a4948b6d85480384697\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 89222 c0126b7852568ae94d3b7c689a878308\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 87038 41ab227f742899d6829672461d993108\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 326368 e1f8e4e587f32b309541b6d174b49575\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 149942 908be845f432b6b4a634b8813bbd4b63\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 152472 ae2b8fc64976d6e8a45e15510c822c81\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 80050 19b709dffda180de0bff9d01e0a54d0d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 83894 923529928b68835fa31278e1a4240167\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 78700 039c752870945345bfbdd759837590c9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 136830 4cfa49c1fdf8094ec638424a7b82b437\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 94380 f1e42e6fdeb8e20dd2fa65154d1e1043\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 129640 d0de58d17bc30d44d92917ee3efed3ab\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 384264 3d1e6212b283cff033f3474ce9d0ccb4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny2_i386.deb\n Size/MD5 checksum: 154998 fb613e678ef61557b1c11537483cbb20\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 160334 96c7e5acb81f29b0fe8dc8c358c497aa\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 138928 70ea5e56d30896da30dc654fd884f1dc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 77220 0a146475230fb66194f0ef260d768107\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 546490 be43471724ff8df3754f0c116f5d8cf0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 117034 c90ab00ef9f05582d6d214d31589f778\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 195336 ea942e2b2e3412055aa2b575f926ea0a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 3209792 6589d4893591c0dfbc2d1fa4893f4672\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 188280 45d6f8cf70474cb67d754b95b7fd07c9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 86416 dfff9f359b4f54cb280facae91d54c44\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 133322 99a52fc0c0468b761ec8204359f1934f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 143014 d7c3cd24696af04a8fd64d78c8109048\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 80006 ad3bc149ef14f6195afb7633c042a0c9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 152870 06891b2b083c43b4374b2f60cac99f12\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 177704 b168238b3741f6c0b9480a7f87967ec8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 714234 887efe15efdde524431da81917428191\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 151098 4d8d77e4900eaa31bc8d4dbd63571786\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 86950 85c13a34e08daf67210e722926f25b8e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 93654 924824414376fe435cc3fc2be0a9c518\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 78696 978917b20eca9475d25cb5ed037fa2a0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 253418 1eb2da35c5c291e356f5e84a158962d3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 85654 151ca61f27114a28bd3f9dbce60bb2cd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 441274 332cedb8ad6e349de9259da82871d8cf\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 187100 ff79a6a1106ba2ed1aacde2f93f22f86\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 94132 30bccbbec595607407fb2a5ed295670d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny2_ia64.deb\n Size/MD5 checksum: 160744 74a3c384236b076eca83316415d231ab\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 482596 8e0f48af70b613a7264b264c6a0bef80\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 145916 aa8edec150c7bba260f031b189ce89ad\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 82914 ce0fe448179b4f80b839c1de4a029674\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 3567092 675c6e0ab3eecbeafb6b370a1fc24ddb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 373906 12e3e2846f1fa4bd7fece7df910c74a3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 87088 d1bcd50f81a97e59c2c07c7032e19c8b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 79798 1d2ab849e5d46e7ad84119c573a22e8a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 145342 d0fa110207a6f31739cedcc81769acab\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 191088 6b7bf55a09f7913f14707c1c2f595135\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 76806 0808be8f0a0d8669bab6eaa007290add\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 144224 c297bfa95b7ba722c75e637be1e5f2f0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 162400 cefebe2c7fdc2e4207de0f4190333717\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 124048 29489a4d30c85763a5078f9f46afb744\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 196858 c34d8ad5b930b90ea3e13a19fb571a3b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 153990 7010ca8eeabddb6663cdfae00561bbbe\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 78368 0c7f88aeaffe4e6aacdb098dbed6a904\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 93484 3162e47e74c8923b86dd59b5f1d41157\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 86780 2dd92d3347e740c101484b3fb76f15a2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 126772 a96a614b4a7ed7cbb34c22d83e1880af\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 117328 54cbf09b8be33a397b012a378db391aa\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 306130 25f7b9ed3e4b23d8fb6d4d7071169372\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 115586 0299a11f66141ea63d64a4391c026347\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 85678 19aa5a78190bf862794c0a6aa2a41c7b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 140278 8fa72626d4e69af8886fa65979dbd64e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny2_mips.deb\n Size/MD5 checksum: 134968 a99f9ce458326ce14caa54094a423d32\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 3501676 a42c97ddddc52448de1c2ee4c3751c37\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 117054 371b6c2fbccee84c8d5b1a332edfcd63\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 145232 ef1b620b17c581bf1b22d2b68be70f72\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 124252 102d7993f26332cd23089e5be2dfa1cb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 160326 00d36bee393053f03506f5a2d6747eca\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 195326 83b900e2e6813b98b15fbe27127d591c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 152846 4834b8b25a9fdac2aa063a11682ef057\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 77226 31b847a6ff4794b14ed5bb24a5ca3a50\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 140780 06925a0e75d708c9c77393c86ef05fd4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 116438 d6da42315e5bc996e1fc796bbd97f7cb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 83602 4fecad5d0ea5d489a23499539532b99c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 133298 00efd1d2f74d8b8d31dbbfb2eeae0f86\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 78700 f373c1cd693dbd8417402e1a1d9e2ff8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 85664 c43b89a3f595f37f228ade67d5be6b00\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 304446 2e2a3ecb301dfec9aa61fe9c989c398c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 87520 402ceded3f5da9d2b7db04b4860c6b53\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 190958 0598535914816884d50a662f2a19de0b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 146378 d992840a2391ecdf94130c823b7dcc01\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 86956 0731c2decc7abd0b59280e1a1b30fbf6\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 127616 d77af8b1191f692be167fa1eff444f89\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 482276 b0828658a511b41393762cf60a941038\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 373008 b49978a1b71ce6c793e9cbbd8e93bfbe\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 93660 c4b518bb2e85fe92cd7e9a679eb596f4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 80018 ccd0d24b09ca8b4107497e6501795890\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny2_mipsel.deb\n Size/MD5 checksum: 143030 98d45be0c1682cf2ef8ae0d49952f00c\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 117046 945c82ef514d3f51b50a75283d5daa9a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 159458 5e78a1b10bfd1ba885abb6b5c41c45e1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 420010 6b71bc8603ff009924ab34da443ee683\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 576556 6969f2c86b9550133af3f1d5e0086cb4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 195322 8e02239048ff37028c5f0da554837f0c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 86272 637ec1eccb87aef7c9de7f735fb0c9f5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 152868 7066aac3a314b16fc804cd4d010ac880\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 92146 197becce88adc9c75a75c7c4066b7864\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 342112 77d8d6e3b84c5bc7a03df950343f07bc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 85668 be6bd8f7c6303a4f55c15a294af158a7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 80012 dec008670897991338beac6142779d03\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 78698 8b0e9a4f36f411691c6f52996104dd27\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 211546 2fbe9beced0a40ea52063aec4242142b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 160338 18acdff003d26059246449a9cbb13924\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 143038 4f25124ca87021b81901aa30839efe5b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 125430 64b623473918d3d0676d7dff0ff15a36\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 143244 47e78c3cd1e000ca1dc01afbd1846a56\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 136680 c3f4bee50c9d1cdc31fc1d5feb7a1c54\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 93668 01bdf74df8732bbf7f2780144aea2ea9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 158774 43349eb4fd24e476a4eed565f0d8d1cb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 77216 6f9187f8762316fc9d21210184f55d31\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 152832 8edc7edd3b4e3c3fb006bac9bbc7d080\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 133298 81ef8e4882b06f6e96492c771ad13588\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 3496350 b9ce0fadf132be5270b943fe567746fb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny2_powerpc.deb\n Size/MD5 checksum: 86956 1ab11274ae355f39deaad312edd1f417\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 195318 d5e4ffdce541c7163474a904b32806a7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 555994 95e7a8d216f30d6dabdd1876eff1bb04\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 143006 c395bdc6ef94bcbf493be6f124ae562e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 162050 3dab3fe70ddd01d93520eb34af26ba7b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 86938 e0a413a2d26f55f4e7c7a191b129fc75\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 139050 e49cbfb69f1b9b4280ebd9e9741a47c8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 117036 d5d93c0c73c262d68bb92a5c740b125b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 84532 ab681b765f62f056f0e4a319601bf325\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 164400 20827c9ded7045ce15f2bb5b0e6b3bd3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 3502220 58dd00c291cd48e53e83323a01c37b25\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 85656 5529456555c2f49e8eb9393c615989e3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 142750 ea49d00dd74197daaeafd4a37fe74e78\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 152838 96bbcee37f59025882093581507871d7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 437832 cb5d68bf6aee61589f6729ebcd62159c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 216230 8e210e8b4d15f908e68b795cea5cbb50\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 127358 d57d85ebebafad19cbaa80160e012999\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 160314 56b28a1caece2ca19995f715ad47db73\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 93652 12db660df070d73121f4589faff2fac9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 78690 1ef61b2bf51bc40300286408a0043d10\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 80010 9e9a1845fd99e759d0dfc0fbd51b7c6a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 77214 3dff90deffc2d7841bf76bd7c831e2e5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 351230 d7e1c1606b5e07ce96e7398ea5a8f3b3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 90076 f1bcac8db92ebc3095637ab8fcd10df8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 133288 7d9bd9af4325fafabb0176fe5e08eb91\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny2_s390.deb\n Size/MD5 checksum: 156070 1e8bb05490b76c9ba9136fd05112ad7a\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 137734 840b821007114f007c84e1a2823e4c6b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 162054 fa22f57d3ea36b9c37c6cdc5543c20c7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 144190 67333af5e45c9478ea7f75490c504d44\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 154552 b6eec60b8d31842dea5e52d9b003e564\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 312408 bcdb326c0009cd4997734069ce6cef73\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 89430 7e1dfa3f43e6bdf98e3916761178d11c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 83730 997d9334faca3dc9ac2e968d84feedd9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 94340 15e5819c55aa33558339403415ce99c1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 148764 0b2bb1498aa4240c29b8c02a0704e4af\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 3142620 f0b3094e825a0487e73f7179e7de75b6\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 87172 d1567402a504f9eee2ed3d7139a2653f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 130140 e657c077437dd79536fe0ed48d5c5224\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 484620 6dccded30be53d7a52207bad9e72dceb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 143794 667ea9d109daca6f3a9a326adf11860b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 380164 abeddd6966dd788db793ef5028bee5da\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 85876 c98ceb2499b102423f3cb1391451cded\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 197268 6e62565d5bc5ddc2c315f48e7c561408\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 78706 4998a7af8f74f700131f913a897a0cd7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 119718 b01885e44c0662547e97116f20c7adbd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 138832 810de4ac52789fb3bc9275cf03ba8785\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 117354 f5281b75ded0216f97f11e0090102fe9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 80070 9d23b8dc897ff7cdcf73048695aee4a9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 199884 768592f1db28f2b883fc8348b94ac82d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 151558 7dd5796e81ede341796cee84011c1a5b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny2_sparc.deb\n Size/MD5 checksum: 77112 83a35a807910cb92b5a37faf6245e566\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 2, "modified": "2009-07-22T01:30:57", "published": "2009-07-22T01:30:57", "id": "DEBIAN:DSA-1813-2:A4368", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2009/msg00154.html", "title": "[SECURITY] [DSA 1813-2] New evolution-data-server packages fix regression", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-11T13:12:15", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1813-1 security@debian.org\nhttp://www.debian.org/security/ Steffen Joeris\nJune 08, 2009 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : evolution-data-server\nVulnerability : Several vulnerabilities\nProblem type : local (remote)\nDebian-specific: no\nCVE Ids : CVE-2009-0587 CVE-2009-0547 CVE-2009-0582\nDebian Bug : 508479\n\nSeveral vulnerabilities have been found in evolution-data-server, the\ndatabase backend server for the evolution groupware suite. The Common\nVulnerabilities and Exposures project identifies the following problems:\n\n\nCVE-2009-0587\n\nIt was discovered that evolution-data-server is prone to integer\noverflows triggered by large base64 strings.\n\nCVE-2009-0547\n\nJoachim Breitner discovered that S/MIME signatures are not verified\nproperly, which can lead to spoofing attacks.\n\nCVE-2009-0582\n\nIt was discovered that NTLM authentication challenge packets are not\nvalidated properly when using the NTLM authentication method, which\ncould lead to an information disclosure or a denial of service.\n\n\nFor the oldstable distribution (etch), these problems have been fixed in\nversion 1.6.3-5etch2.\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 2.22.3-1.1+lenny1.\n\nFor the testing distribution (squeeze) and the unstable distribution\n(sid), these problems have been fixed in version 2.26.1.1-1.\n\n\nWe recommend that you upgrade your evolution-data-server packages.\n\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nDebian (oldstable)\n- ------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3.orig.tar.gz\n Size/MD5 checksum: 9912159 b68864722532715d721f32e8a10660a1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch2.diff.gz\n Size/MD5 checksum: 55652 3336b8da8370ab02a680be211b4e64a2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch2.dsc\n Size/MD5 checksum: 1737 86a1bbac9201c5d9c9daf3807babbc55\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-common_1.6.3-5etch2_all.deb\n Size/MD5 checksum: 1924450 fc7d2aa9d8bc57a8bd3615f39499e8b9\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 556836 2da3535c9476102271b19459b0d9c758\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 127370 6bd295ecce5bc819413cdb686658f210\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 140162 431114bf0d9815df8531b301b79cd367\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 61912 41e221d593bd8a2be1dcb7445e682405\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 3260412 4dbece9fc0df602b5735851888e00cc8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 168898 1a9bb3e6d3c5cf5631d72fcc62c68658\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 116812 a2795fda7918ecc8b9c34e450479601f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 61112 c4a94f63aa476f12746483a428fe0050\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 120290 4459eb92ea2cc9ef9b18bf91775c685a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 382694 caf5f65f5d5127577bc3ad33d996bd71\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 54116 53a9fcda014e065daaa574e5f5b9ecbf\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 194024 220c8980c2ee0a660c8e6c4ebc107486\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 332832 30512d1f7210ba031a256c9386b54204\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 112674 68505d405f946ea2394193fd8edc8272\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 105148 058bfacc9d06ac03ee3f198e3b5880fb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 101810 f0eb97816dd3a3a3c6f8e9b8937f951b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 128404 ba040cdd95d3006ffb297ecf32898439\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 120012 e949a294a53c315e7ce096a1d6ab8f36\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 69322 e54cdb9662883aa8c732df8c490dd296\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 111922 cdcb8886d4855e4c738cd333918fc6af\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch2_alpha.deb\n Size/MD5 checksum: 93012 d47e831b37c3926727096f837d868b5a\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 122764 62534b9f9acef1d023a9e94b31fe3ffd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 121946 a657a8e05c64d7241fd7d47072525201\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 61538 25ae20c5ad07a852c99b82b48ee0601f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 110522 dcfe2cd6d430e1cb6eb82ff7a172a7cd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 106440 b8e508a33be78b59bcfe50c5a7d7fcf0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 99978 08bd851a82e4fe02638af29717670a2f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 139142 abbd0eb2dbdaf6c8e6319070f28a461c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 353594 8c73e8bd513cc59a31f5404ceae71ddb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 54016 3f05f91f4b5bc7740de5bdebb6ba8b88\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 68606 9cabbb763b7bac32ba6e445d23230a49\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 93446 3c86a9ef703e4d1d8e3a052ed4992cb6\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 117696 b77585298bbbdb718c116ed2810b7d90\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 123590 f0833d47566a7f96b3addbf79f05bd09\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 526700 422e0c5baa53d55aebeadaec61eb11a7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 310072 9bfa7490aa16d6040de7e7746347c32a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 180826 2a345f4f6a936da6e288bcabefff33e9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 122352 63d1cf9208ffaa44f3624b76aab62c9b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 112836 39ccf0c988d6e9a3ade19e09c7a53b13\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 174072 8ece292448deb46febc198e3ab808aec\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 60740 d4f27e50f7046f722601febd6a559550\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch2_amd64.deb\n Size/MD5 checksum: 3286796 0375d081dc67b73e68962364e1df0e7c\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 117976 fa796bbb217e429314de5aeebe178a64\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 93686 750baac41ac4f1a755221c8cc48333ec\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 3070918 82f2f4bc3a46af1bf352693520a0a26e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 269116 83d503af67602e14626cc3353929bfa4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 174556 f572b3b93008005ef4ff335155bd4322\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 111778 74948e55f6e5ac8d9a07ce2c0f1c77ff\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 60772 93791fef0534794c67ef68d5015bca80\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 54014 67c861904cde5a1a124c1113a61ee9d7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 61582 6ee40300c9c793f76f8bfba9ed69dd59\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 70426 f5abb67bd73d7ae1d758a90844eee054\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 91976 8634ab125f26fb8b2eacfcbabce79b9e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 307798 a67aeccbef193b163d93963aa5f746ae\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 113048 bb4a5345ba8df9cc3678a0a5610976b9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 165844 9353eca48d50d4714af75740d393e78a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 107652 c1d7e902372b90320b2877be05e25987\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 122598 d537bb14fbaf2fe083753c280a20ff99\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 124960 72a8f45a81efe30dd02baeafb6511bf1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 101206 42c7e41c149295ce0660dfd1f3c2dd08\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 103966 c27772fbed1f546202116551c45f71c1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 457108 c4a577a8a5ba95f4c409385c274115e4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch2_arm.deb\n Size/MD5 checksum: 123788 f2218b5ef26f0f2d710f086b6cf5f5dd\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 92502 e54b2f50c59e9e8cd9e07e6ef287d954\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 280222 dd795b7eead811e800bb66571afa37ef\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 70124 f9c51893d69371580e2ed99995632edc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 93126 8774008cf81c8b6d2339bd15000bc334\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 483610 06dbce45de54afc31cca2090b08b9458\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 169320 280b6fd5a88e4469fa7094f74f47c396\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 54160 8eb2842e4647a01f6dedb1e74cfccb74\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 118584 198a3c180291f61a3b5f5abdecc9e875\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 3068782 4bfc9f736e04389f53bd16b23d222afb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 106942 91f4baa85e03fa962851e1dbb1a35b4a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 61194 0ca7607366d79a56be2c1837f0da03f0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 117480 65bfc28056ba3b4a66fda1fbd4bf5bcd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 128798 280bcbc2b03d2ae6448b009b2d06c74d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 325036 707a0f4e5f95fd352d355072048f3d02\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 171810 26a2bd06d0e329ac1f81c968dfcbe18c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 122994 19b27177e23b27f61603c202f4f8e76a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 116900 5e91dd39b49cd3669227079ca43b88ef\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 123350 cf269e8439c7f9826f4f9c944c916a98\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 62030 ab45c1c3963e8a6156d861f383c3e6eb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 106310 7549bf2d3fd8c2014ef4749bbfaf53f5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch2_i386.deb\n Size/MD5 checksum: 102584 8ae979a0e7e1e3b1ee504c9f70ec2e05\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 3042598 a366d4e36b0333b6775b25a0ad64fd3a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 229920 bd4d8be75e952e6052a80b084585af19\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 116804 cdc5c9efd959354eeac6ca78e4e92fa0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 69312 1562271f25c0d03e0f71122a22435738\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 120004 d03b8be2f6367a7406445de60703fc9c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 54114 68c3c5ef15107e51a374c43b2420c77c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 122886 053a9189ca276bacc80410f9d19b79fa\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 485436 b120439f541f40c18c2f17b664efa95e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 61120 d5e83a912b763ab556da9a47bf26f29f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 168864 2bc0127908b653c0661cf5058900fb44\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 149018 b2c4182227fa7dbf7190b057eef0602b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 127230 4c05e5f0a27871a9c134326f522dbc36\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 120264 4a8ad7a8a69dd32ee9d72dcb1f2feccd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 61906 3ceee5a3926770c52f46d7278732ffeb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 148012 c56f17f40fd23b1ee6c71c68a5753c01\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 722380 e6604090d6f3109b04d6a485af8c8536\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 105148 c7d2c85894db937c080891bf6ec35815\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 111150 efebb13bc567634911d5c6c715d87db1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 165526 058469b6626f32e13222084b6cddb56e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 93014 782226f0552751eb4692bd262a41d7bd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch2_ia64.deb\n Size/MD5 checksum: 404242 6dbb35c1945a022679dea21e26f19434\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 113486 bffe2838dd5dc79a8b4bbd6c3ac411d8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 61132 c0dae4bae4443ee6065d8b6a84e86b91\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 124266 b2ea26be0993cca99ed9d6e5d82bc470\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 118030 fa40668bcceb2f32335b493671c60e6e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 108024 a3d6b6c6e00aa3ee2426a4900c58db02\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 99234 0733f0a6dabe0798e9cf9b7bd475e2f5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 173992 b8f6846d9ece2173c6998a7b324d26a7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 321444 1a5559dd5848cdb6e494f2bef1d16d07\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 69598 d38010bf20086aad80e9c3212015da58\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 53862 03394c629c01febf1249e5cf547521f0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 473748 ebb2b0027ebbb71a8aaf8452cf10df4a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 90496 d1bea3696b2b69547380872495567f40\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 114542 e1d8c1dabae25d2794e4179a1e7a3cc7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 168720 b5617eb63cc88e16559c146aa12524ed\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 3353746 6cc024d3f1af397e21b6deee242a0162\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 98246 3a04cacb504294514262d5c8610812b5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 62228 d59e1bed058304dd3fde20772bd884ee\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 123420 1ec73d33fbfaa09902f0fa642125ec30\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 123268 cda3edceba8dcbe9d233388815a22262\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 278796 53715da4dda1840349d0fc0cad6ae1a7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch2_mips.deb\n Size/MD5 checksum: 94454 71315d8fa1355980f1b89431cd5638f2\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 105154 724211ab42a0bafa349686fad26e53c9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 61120 a420f741a297e0f011a998330db81275\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 3276772 05005f29704081283c94254d1b890b86\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 321296 bba4560f5b3cb3a844a10c0def1a3882\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 168886 b71edc32545f53289cc617cb3ae70536\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 277232 22afc6103f8364381e0c13f493ebf70d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 122898 bd696d3f1533f9944fd94a0224aed708\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 98704 ecb6066357c17a785f7a087361967ffb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 93022 4d881c684ca7b566082073dbc720365c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 116816 7c7cdf899807385947505555cb287f21\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 69316 14ddf4376d20a019512824837a6e5a0b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 114698 5687548493d73d348e7f5eb50c5c5a6b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 91010 9a01e4e3309d3ae001b55a4cf7bc3087\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 474210 fcc09f9eba4747bc06cdbbff1cb58f50\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 120012 f4eab180a2376aa20e811f5f66a4df9b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 54122 26c585234463fb042473f35aa301eb9d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 113586 46a005b4d22946c05c3865c01f3b364e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 99112 7d49ad7cb883137332eee8d67bbb542e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 120276 b1ec7a3927ed62d251647654f3f2c701\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 61914 1ab6d655564f28a1a640b4bf83a2b286\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch2_mipsel.deb\n Size/MD5 checksum: 168382 76f5909c7124c5bc267d4ca837d68946\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 116820 cf92e1c1c43ff392d558c436a4c51dfb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 118792 212935a1290cfbcb75449410a6e96291\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 61118 c9c03db85ebbc204fe5785a50a02964d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 120284 ad9433ff89b436983da48e19c1aff50a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 129354 40b5667614e4d526e9c6676f6da24297\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 176482 b7262800fb62e3a601e00d10e178f307\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 107838 a7ce7192dcb605b279225977f91d6ec2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 512938 5846897648d5848cc7fea38159568391\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 105154 2129dfd5a2fc42f47aee1bdec5f78d97\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 94578 927a72fcf026c4d479c57d7c324d5062\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 283932 d85e3296e6fb6eec1c1d2d9506d2ae12\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 93018 0a50fe86096f4e28a85e52d8e5f65021\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 61914 dc177e17cc81db02aadc8e0762906039\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 69310 70bd1440ba9ed28ddf16223529ca6df1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 3278616 0b2382eb9503dd613907c6e73497af60\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 54118 d7c7165c487f6ffe2d2172d873ea0db6\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 116770 ef93d684d23a9ee3227d06ccf09b377d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 104940 81156ebd81d2b9cfc85dedd5b0227d30\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 336182 5efc8e9f080e9a2b40554d300d8a8a8e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 168894 6253082193738b6fd22b0c0dac02ad9f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch2_powerpc.deb\n Size/MD5 checksum: 120018 6f93dc829bdf25a979bfffd05d078ac5\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 127408 dcec45e458559712c1241ab5b6c062f9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 54110 a9642fe27f11ecb64977eb445bf3e750\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 190284 04fc158cfd150a51b7abf86254da1cc0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 93008 67d68742417fe9ac79da2a26bb5eb704\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 120004 521501055b5fbca8e0ed4ebc7396ec0e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 69304 0fc8db009581bd90144bf26df0f34b7a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 311880 df50df743b96d1bb86d7079feedae673\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 138670 63bb3f6fb14f693af7a6254bbdd77f92\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 127178 4fb13268d9f3a8a87f1a9175c3294579\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 547424 59f8197e0e62c5b2cbb1eeb8a4ccb591\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 168874 e24c2d93368743bc7a8b9b9641d997be\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 377322 0081431d07c190dde5c3f297a88baec9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 3222370 2545b73b985bdf409199d4b5fb4c7a20\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 61104 27267e3476625956dccf9d0a6590ac2b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 110670 0ef5e480f11b512c032a882e83ddf6ff\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 99744 b6a370720a76379eb054008817a4b8b4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 105144 2ee90aa50d16c3a1ef6cb0a74889a3f0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 116798 fddbc79a1e25d28df881356887de97d6\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 110756 97f38e89d5ce477d947e2db148ac5077\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 61900 e0901e974167b14f98ad20fd7d207d63\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch2_s390.deb\n Size/MD5 checksum: 120266 2bfc926a053f91477b758a29fa5da430\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-6_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 115986 58d611a53cefd94eba81fc4411b5d4df\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 176224 f4eb1cc4dd3925d9f25deeaa980e5568\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-8_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 323692 c726832b9a76e7ae600e039d21209e5a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-10_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 107422 faad6d7767aee04048bbd3c6d80d948b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 94412 18fa35d7959f7320062a27d8cb928810\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-5_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 103162 61bcc10964d9468726303d3401df4582\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-6_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 275898 08b85c740b084f6e41a8a0c376889195\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 123910 556c2becbb6151637a19fd695e0849c7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-1_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 172508 db15ccc9f6983a9ebd5b65349582e80d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 123124 d146e9a1b0549308f223c7bae69ab86e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 61528 0006452fb0fb8daede5d1c643283ebeb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 474786 a33b42139cdd421b7287ed47c6fb212f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 117808 eaea0148fb69a3baee23c86a0db5c77f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 109826 ab38282258a9aecb92b3728d83bac405\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-5_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 127512 cce5538d21c3ca0ca4b66e857acfd393\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 54078 2f66cd3f4b6eb663c1a3e2794e705647\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-7_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 116966 e8c82b81d2ceb7cd5c171b9954b9e50c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 2931446 78545322bac50fce0039ade26937c68a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 93102 8a5ec67e8c75cb633d7384da8ec8bd6d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 71090 bf4eac8bac2f4c2aa4ef3fdf9e3a8e32\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_1.6.3-5etch2_sparc.deb\n Size/MD5 checksum: 62726 28cd0441b75de0df956c2614a86ce33d\n\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nDebian (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1.dsc\n Size/MD5 checksum: 2718 e7d5694c57b4a078ecc06f4f22ddf107\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1.diff.gz\n Size/MD5 checksum: 22847 a6220da9cbeb3cf4be29f459ee3fc1e4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3.orig.tar.gz\n Size/MD5 checksum: 10903459 c401c0a912d24c3262580de6caf088eb\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-common_2.22.3-1.1+lenny1_all.deb\n Size/MD5 checksum: 2148028 0d3c0234a08991082b31547d81de04a8\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 219368 2ca9203e47ceac82751e75be53b66c3b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 85816 2c81b1f0077c7514cb5ea5a3601d5b40\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 165594 86807788a20144ded916df071fb051df\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 163132 1582cc7ae3130279f5696551155cfeb3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 79946 8443298220d767e36942d95768b56395\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 156816 d3cf30f7e6ded12d8112ba307e3ffc9c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 84616 e06a4821d4a9a5ae276462ab9e283c39\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 144186 8229c919de059ba921f33045222bd0c8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 78562 f2c9bb153dde6d5b0876b2d08d220738\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 3486834 e5d1add21d81176260979c5c03551d25\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 152966 1da939eaf10b45fd538bdd545831a54c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 197822 fef886e553f48b7813327f7531ffa900\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 93874 b35b8ec4da580adf0d88e3d4769cee76\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 117618 77897ad10e76ddc0af3fadf3b702b550\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 140674 56472b28d7e5f4f6dcadfa0432e020c3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 369778 f8d9e75277657db75e77a0766582fd02\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 90680 50a550d6bb0d18382ea80540e62cebae\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 441522 cc026a824fdd10f3e79cd3e489230799\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 129470 df8f9c0916541f300a5dec8ecd4f61cc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 145006 92da651bc2891162c13dc65d5a791b14\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 87036 42116c76a3e4f7e6aea9a07b05a11e1d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 77046 0ec8c072dbe74ad377365492a89ee214\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 135646 c33530ff1a7c288bf7159b32d3c3645c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 561622 b11b2061a56f7cb471edf24af82a48ac\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 161506 b7288d0c359f5afdcf3b9b3702e6a20e\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 132982 d6bca9eabfe35127ec32aa45febd8e0d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 77046 7f564fe5eebe84d05bd02b058eda53ed\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 93466 907f589d377c7b526bd18545b348aa25\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 159486 4c2dd084b46501d138d1b8fb8e4a6014\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 79814 22c818efcdee07e9de799c5ccc8d7790\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 84500 6c15d015b81fd76bfac63ae282131916\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 152550 72ab0faa22bb4f9df4984869f1c1107a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 3549662 64b2cdc55ce06a11fa0d111ae7735d2a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 540166 8d2e35deccf3d7afe2ae4165c33c8b29\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 85460 e6d8f47ea68ebc86fb24cbdf2ed08949\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 78492 2c3b866aa0365263ddf711e251d546e4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 141480 099b0cf059efe0b3f2c30732cbe7429d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 142794 2e4c26636b4218ed25a65ff59ca29312\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 144746 4139b3e996d35e68634a166ff2e70e6a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 165076 99b2644b1ee4d1876087f0f25ea16179\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 353772 03122f96b43c90889332e6d2a77fe010\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 90292 d0551d8f1551046e9d35219d4a283ffb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 86736 864c90f615173533534e2ff9a10930fe\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 127728 d4deab6593776a3a38696b75cc20121a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 116826 4bc533730007ddbbcf753efe60c121c0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 418988 bfc90f8d1d33b5860fd80261dc4c2dd8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 157794 c7672c59389693a2f40e30171225d2d5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 208198 def1fa307546006697f7410b0148ba33\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 152022 0bd83229f280373001c838ae4511c732\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 194812 d80780fac2e4ec3544d472a80b8e017f\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 134202 381624a565ce9ba4d4dffb19118683f3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 364046 d78f7b3d6478b7529c9cf251318f15ee\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 189330 cc07ad7075c14fcd7cdb9b38e6df5c2e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 79206 f223b5cb6eafb2010f46413a9ab9e53e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 143516 c81cfc3aed80b398773c2b1ab9de711a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 93794 12b99da822b8e7d896f60ff622e99ddc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 3332876 9fa201381bba4f986b45b8525dd3a62a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 472520 f8ae5aec89272a413fec07646d3e2ed8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 85094 ba8bedff1703212cdf4693a331332908\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 149022 170f1514945bc2d76ae0e50bc42bfc33\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 86516 602e53257540d77876c1ed9054da1c3e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 76866 dd0052b37f5c01e02c1830cd705bc2bf\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 126196 5132734a0bbc18b63a8797758bb93427\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 83500 a5b25c899dcbc94cb8c60b00975c4a81\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 154320 3cbcf97af2bd09e6216fdedcc69c5d5d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 116964 a200a5de4ca2b57e32ed55619985877e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 135256 c8f5005fe0ae10288f38d0725293feb2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 117278 3bcbe0a08f24b9e32d16ea904ad58191\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 77958 f1f3f34e8e72f73b65ed37a9403f0cfc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 146208 1fb0cd14e3569e80b7cbb600b1e58020\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 161920 b82a4c45c1ea5d7a93c8cdff19f61e81\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 297692 158e1f8bbd2f423099fba814cffa5151\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 198820 800ebde77dab4986b47292fbafe66d0e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 88330 63ca0ef3a4594c00f9c61335af4e4bac\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny1_arm.deb\n Size/MD5 checksum: 140610 90ab658959b07e9ab46763b39bda6bec\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 83430 9a7e14beecc072840e50e988ffbba7b3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 76742 8d22abd13d73d63e02e5f75c301f9d53\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 126596 409c5d6711043b62b8d00330a3110470\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 143638 e120d5eeeb3794d067748586e9ffc8d5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 134968 690d8c06adca1dd66eaeb01de4b4bf7a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 196052 8b27ac62b42d64d8b8f553b8dacfaa59\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 482478 58696339e03fa236aae06c6e8f8d2a00\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 93118 6f0315879d62ab55b1ea39f3b825c55e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 87008 6478937234605b6163583efbc98cd8b7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 116694 5615318ca347b5e68e861ebd3f161eb5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 140560 dfb249045a29cb1219cb99342e38bf87\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 148748 e6210a53cf7adbc825bd160c457fab66\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 135816 d9b31094020cda0ec8c4f90397b6fd8b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 148496 455834e37cc65f158ca64148d6207666\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 191584 c6a2ffc6419115aa52f2c8483cbdbae3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 79714 7e5817dd0be182806d560d60ea935a24\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 78304 21c5469c4f7f8039a07b64f380621bae\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 154378 0ade140beaa46d3e083d695215ba1032\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 88476 736ffc20bddd391ccaf9643d0a433b1a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 366930 eb7eed0bf12018b757fe035d61dcdf75\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 3360876 289bc0857cd7b352ae685a25bbb7473c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 85760 370bccb09a9cbe0e4a7c28e3e3dfe8f4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 117186 5bec20c93f76d9599c3fe68ac212b8fe\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 162954 63914b44361db02fda753e7b3733fc22\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny1_armel.deb\n Size/MD5 checksum: 300012 9a75614d6c5385ec6051f9d934fb7863\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 128938 b8b120b70506f673fd5170fac32b522e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 3451696 1c01af7b3b86b0eb1c8dc3549ec80b45\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 144538 821af4aee6c4d25a1e64f33843b64ade\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 85128 8ab141458674ef5822565008d2ac4e84\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 164280 c86de740011270b7712499ab6413b54f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 146716 361419547e0005461469812affe19d49\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 165622 1c7e8162d5112a5c2da00c96e76d7d19\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 93286 649e4568c4db99767893b5cb58bf56ad\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 141410 dd3f57fac3f7ad4157d73a1fa42de1ca\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 137276 2893395322081b7ff1017607224bfe54\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 198522 fcff2ecd471206129ca0ada77c423b96\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 154368 7176b037fb68e3a10772a491f1410681\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 155728 f8ceddc6ac9c4fa01b08c54e5f537d93\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 116790 2aa1f627ec9beabdc1e922602a360b10\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 443378 b670820e21cb9e0c1d770d2f06f4b4f6\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 86822 a79fe0d59a9d7071fd2ef34614a79fdc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 77208 61e7d534a18e7f3cccaf99f0422f9dd0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 585038 f0322e45cd6fe76b3d41a557311e9383\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 91876 792c761f87bc60d31c637ad739f9ca6e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 218492 9ff31b99b394cd184179fb8193405a06\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 343418 f62994cb5054a9baafef96a62a693961\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 165816 c9a85dc4a225129d56188f22f6d71090\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 85652 ee0ea00a7608c34996ada534504e85aa\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 79976 9706bef3b8994990ec30f643abc67575\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 78668 9453aeae42ba3609148f54ac770ef235\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 119542 0678ff8f91a0fe160ec37131272d4abb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 3341504 77e6c072c1a95725dbcb0b7a05f6294d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 86904 0ac87676838c619925bb6f94499a5f20\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 149840 a054a9b4ff90d59181057576f2420440\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 154912 4053e1ceec15dc6e5b1e82634911097d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 194272 33d9001e9e3ad2c9a981b17c385e689b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 144060 374c4a51fcbe6c99eeb68d1e84bd7d58\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 136722 156a2fd8abb718014cf2a0a61f6266a4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 94280 dc95de0e9e7f8f2a433224b4e11e5ec5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 116222 93fb49e52d52665946f4c644fc9e6073\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 85580 f7a2ebac591b81cbff34716a7d561537\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 197040 e1ae800fd2b14581b9d1db37b76d8640\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 77020 14cf9e225d8d8bb15f1a34db76fd6819\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 78590 fbbb77175d9cd4d4e4946a619f622c6a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 79928 dad377bc8ecb44977ce1d9fb38d59d8a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 162988 4d58db9d7e291d0b489765f41f746775\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 326274 29a04d95b953b97854f733c88b1eb26d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 138926 1f2141636e2ce56dc17ee5b17947f65c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 89142 86d7da8eab27ddf13d876640f8f907d0\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 493848 3e1d7995eebe4a717079f07d58391f85\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 129530 cac5b5801c6a3276075c7219e543edbc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 144572 2deb43d5a336393ba9f7f2f85aa8bf8c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 384264 af137152064dbe0af21c9de598c8e386\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 83792 dbf81bcc971c69c68515eaeeae37121f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny1_i386.deb\n Size/MD5 checksum: 152370 3fa151bd706c9adca2031e7a5faf3602\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 253334 f59df1ce13b65e86669b238c5f76e04e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 186994 3dfcc17cec28f0552e2ec52e60c12925\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 77114 344148879a45b76da955ab3f318e2a71\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 177578 fc457418108e0ddef09593d025f6ca6d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 85530 879992914fea5993490053e7042f39a8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 86812 f8f46e79189021ac47d7e7cceb39b672\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 86302 175fe1f80ba0c1f6c73a8307d4f9c04e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 93538 2e27b783cf24a602005a63d9e968d93a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 138802 ad619037ceac374453417ac70809730d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 441216 6118db896c11c8268deabe23a37387cf\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 79888 f06745b0405a0d86a9d3c13f6ecb4c12\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 116914 9d84e4c3e0740da3e70b78d04e7d6856\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 188154 7084f6edfbc71773b635b5832ee45cc8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 3209742 33b377edbffaf0afd32b22c591fb7f26\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 94024 c7ab59b5af188ab4ada56c635f4dbd6c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 195222 10746dd59f27bca5a97b093c976959ee\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 78580 e5767d4a22bc46c06e43559e172cfa1c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 133182 cd118fd9fa731c8b0f7db1a0162562d1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 150994 2a6315c713638e7aa1239f01abd798f3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 714086 fc3fc836d17461a187ab2702a840f1bc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 546424 63b2edf35445d8e16a66359f00da32cc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 152748 6953c4f9cfb9c81a9d7822b02f80db6e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 142894 4239db1e01309e6eda8eb9eba826621b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 160622 c56cacf2a1a5690d59ad7a76c9188300\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 160220 790e20ec4190b6431bfa26bb37d4a41e\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 79684 391e7e0cb49f23ef7ca941733eda1c09\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 78244 fed0f63e2d7c2b0c2a1b55f6b7edfe54\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 162258 2c852caad1a9481579870260d84004ee\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 76688 993edf80c70da6a2a64a5381cf06be72\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 306000 6b9444d668ff8560d08cd4e393a82967\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 115478 178c218835cc6cfc267f4a144153c4c1\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 196740 67d9bfe10e2278fcfb33889e0b55c981\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 117204 f38d5e4b0a567ad612ffddbf2e1e8499\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 86672 091cbd8bbe600ab37bd52b53b9663826\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 144114 7e13644804d38d115aae3a218aabb9c7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 145242 8a8db0732c1c9b78267d886040eaecd5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 3567014 73e5a78d717fc65611e8f2fc6b8259eb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 140168 66bf141805ba869bf355333a6951ef84\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 123930 3d883a51abc5329284436d6211b10a56\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 373870 fdd52f1f68641727e8f28a50490aa8a4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 190974 a08016db7418dad33c330e2d3670a918\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 134836 4895381b67d77cc22161ed14910b6504\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 82792 8196abad2900b0c36c465b4fb99518c7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 153902 e2b42e653f8cae51236dbbbe833e1bef\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 93370 1cc69ee3d65a00c97b31436307bd4c34\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 145792 ff366a5ced8d52a4800ca9895051395f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 482472 593680dacb56f3bbbd207bceac51ca33\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 86964 49a256f519fa750c45d68bb462964e86\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 85570 8b378dc9e0b78b10ee9cfeab37761027\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny1_mips.deb\n Size/MD5 checksum: 126702 6014a44a630c4d91c02246c0d285679a\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 140658 d64075bdea5dd1ecaf4a641bd55b94ca\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 124126 e67c5ae26318813ddc47dd3b01768292\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 116324 7a894aff7f4aa26b8e962a760e8393d8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 195192 501bc01534769893f2161f865d3493a7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 146252 0daa764a30ec4e12659132d20f27aa2a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 142914 c206f040639af64ce5fdb626d599c9a8\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 86820 a0391bc584a5ee06508d45112789f4c9\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 152736 dac9563f18b7472044b30973942c269b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 3501364 dbf207cdd4d7e8505187944978cc064c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 145148 f43a7998212a321cc9d25b61b88a4013\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 133162 b23dcce3234a4bdd3076ba50c278f8fc\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 83482 7dd9372f636a829e599cc18ee471a919\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 127508 d369ea164d92a4754dc4db67f1baae80\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 116932 0c812705b5eac1c11accacb5f0a74bf3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 85538 1a70b64343d7003e13ceb61bbd46bf79\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 482130 eb4943615ad8a81a3e654e859a54af2e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 160204 f9bdc0cefb43e999a4a898b7d00897f4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 190828 d6b0db4fbd6c6ce5d392a882453fedfe\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 78582 12535ee07f0b6f93a7e532dbc8e66d0d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 372932 ec91f2972b7621192baf79051b35dafd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 77112 9aa73c112110c05c2c5152c4c37a2945\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 79906 bffa712fc5bf5a9c00d6ec0695b3153f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 93540 ecf1fdac724c0f50ffaf1c5febc16779\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 304350 41c9d119d65ac04dbffc36d69d29d442\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny1_mipsel.deb\n Size/MD5 checksum: 87404 e924350826810ce65190cdfd08c9fca6\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 77062 76a93c08eb11af475719f13682727a7b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 78498 13b5a18a7bd9b2ff9d0c066bbf8d97e3\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 3499138 7c41df131c82a29b613372ff514c6a02\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 86084 68fd79ee87917676b1ecc6f6f64e0fdf\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 91974 a1df0199ad63d3165a6854836846b83c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 136556 33ea8e2ed5dc2e3230424503b95a620b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 152622 3d3fff320447ce1492d09092065df0c4\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 136498 5a369a322c60b19869d995e448ee7f7f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 211366 a06af28716e152c28f9e1be498c885fd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 117620 4244dc06500040c8b076d356ee37e304\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 574572 4023c0e7bb748ca7f7bc07c9a0e2f500\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 158576 ba1633d88e8ac2ec750489069e05841a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 420006 edb5c3d5a50a40ac254823d1f54252ca\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 93840 720e266ffbd1d68529e4e18885ecf2d2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 85572 ad926e175ab1f21f1fd0322e44de4a55\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 198472 760d825510b80d2ca13734639866e5d2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 143098 848e9e27f3839d97bebdf7663ab0c74a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 144478 f616626a24777cb7d4e9dbf972ef34ac\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 159286 00d9ccb7bb09ec8bef3831e85c3042c7\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 163122 77d451a7fa75d71faede93fde568bbcd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 341950 9ca3e4e32b2f4a9f3199ee1176027dbd\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 86766 a6b9e834f7fff582301e4b7a252fbe40\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 125242 91717c950de7404bdfb409cf58a7f705\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 153142 de07fbeec65be676465344645723860e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 79808 2d7b0e4ad1c5f4f422b46dc55bb1457c\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 3502200 c553d00f03e43a5971af0b4c36d76616\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 78576 4c58288903c0d70d89c7ca7e23ab1abe\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 116922 d51e5c0d409f75111a016c97750a2824\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 164282 30802355e8cef049d3677191c3d21c5b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 160180 e67e35ddd1ef3a4d94054225d242afd6\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 79896 a5b37588be6b9bd61475d22e20e04bd5\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 195196 9b60eb40e66f44136908aa13a913efeb\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 89962 376783149d65a673f9b0657a81d11803\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 77110 39f623cc9fdb018eaaa3114268825e65\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 161890 c89a8207df24a8a087f7f7c46d1e1f03\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 152732 c4ef10ba7462244a2fbb45419901c46a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 138934 298ada271962d1fd43bfb90ae63ca204\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 142888 42ee7d1cdc8a9f6dc33f76513da933aa\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 127208 d581c4d928df4669f4289b68d9eb3232\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 84416 046ea643c993e4a29ace53d0bcfba723\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 85524 06662279b3a6d28701d6e798649db10e\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 216144 fd85534f991cfb9146758a14f192df37\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 86820 420c33c23087bc5bd417c3f672001c6d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 155950 085455197839a3f93b5fad3c626cb78d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 437754 6d478573f7203813e319ad579ff9528a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 133146 5e656f9b4f8483f5200049d972d82192\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 555890 e86f9d5aa7ea1c451fbb1204c7e1b923\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 142628 e80536501aeadec8ff9efb6581030ece\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 93530 f1376589016f67bfcdce4c7597d09dce\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny1_s390.deb\n Size/MD5 checksum: 351112 a35180dded1d74e5e5888965e04b0038\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-dev_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 152724 6d94a7ec0b21364d3cbc944c60da0265\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 482850 742a7d3b96f9f260d3d0b257b550a457\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-dev_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 142914 fe6433f8f58d689a725f271a496f5dd2\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-dev_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 93542 522be61a87c48f23f29bedf817e3537c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-dev_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 79910 85a69b1907c08108719bed984cd27792\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-3_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 196578 504d8afe5cf4cafaf15f72b16c42e272\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata1.2-1_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 89318 457cc184ad75a28e4b14d0b44174a03b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-dev_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 160204 79ef27af20e0e8059fcd5f8a45239967\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libcamel1.2-11_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 379764 1f17a7ccfaed755ec405db34360e9e1a\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-dev_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 195214 17810e754d12b2cc595f0b307841f51c\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libexchange-storage1.2-dev_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 116928 60c4b1db57fcaa028d13955a2323ce35\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-dev_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 78584 bd821ba0fa9983f9bf208b190e94935d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-6_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 130258 9abcff99875454c6d40424dd6a68003f\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-dev_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 85534 7efeb503920d8d968cc99d27813bb610\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-book1.2-2_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 119276 61097bba51d03446b89c455f2c1178b6\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libgdata-google1.2-1_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 83484 4c4a0ff9c0754c6350d3aaa7d4830c73\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserver1.2-9_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 143872 d7316bef3ddfe0aef2c90c05c17d0f54\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libecal1.2-7_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 312196 265579d7bf594b845811defa047f9746\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-dev_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 86818 afcb4c6b2a6b76e682ccd9405507571d\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libebook1.2-9_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 151664 71aed8a27327ebe4555148a162d71f06\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedataserverui1.2-8_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 148620 ed71ff4ea24b8fe1720364d5cb7f3f26\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libedata-cal1.2-dev_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 133172 a0eec671142b3b9e4bad7ac82dcba130\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dev_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 77120 4bfb809f80ce73d9cce935e5be883743\n http://security.debian.org/pool/updates/main/e/evolution-data-server/evolution-data-server-dbg_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 3136294 4c0058e3216169cc568615698904818b\n http://security.debian.org/pool/updates/main/e/evolution-data-server/libegroupwise1.2-13_2.22.3-1.1+lenny1_sparc.deb\n Size/MD5 checksum: 138556 c8b5e80d05326d0e384193a3ac5628cb\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 7, "modified": "2009-06-08T07:54:40", "published": "2009-06-08T07:54:40", "id": "DEBIAN:DSA-1813-1:869CC", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2009/msg00125.html", "title": "[SECURITY] [DSA 1813-1] New evolution-data-server packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:29", "bulletinFamily": "software", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "description": "\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2009:078\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n\r\n Package : evolution-data-server\r\n Date : March 23, 2009\r\n Affected: 2008.0, 2008.1, 2009.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n A wrong handling of signed Secure/Multipurpose Internet Mail Extensions\r\n (S/MIME) e-mail messages enables attackers to spoof its signatures\r\n by modifying the latter copy (CVE-2009-0547).\r\n \r\n Crafted authentication challange packets (NT Lan Manager type 2) sent\r\n by a malicious remote mail server enables remote attackers either\r\n to cause denial of service and to read information from the process\r\n memory of the client (CVE-2009-0582).\r\n \r\n Multiple integer overflows in Base64 encoding functions enables\r\n attackers either to cause denial of service and to execute arbitrary\r\n code (CVE-2009-0587).\r\n \r\n This update provides fixes for those vulnerabilities.\r\n\r\n Update:\r\n\r\n evolution-data-server packages from Mandriva Linux distributions\r\n 2008.1 and 2009.0 are not affected by CVE-2009-0587.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0547\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0582\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0587\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Linux 2008.0:\r\n 6bd3e60d16d5aa9a9344b92fd07ce22a 2008.0/i586/evolution-data-server-1.12.2-1.2mdv2008.0.i586.rpm\r\n 292256ba96c4ac43e910c1fc9e4d8fbe 2008.0/i586/libcamel10-1.12.2-1.2mdv2008.0.i586.rpm\r\n 8f8334411c8485e14582df3e73c4a242 2008.0/i586/libcamel-provider10-1.12.2-1.2mdv2008.0.i586.rpm\r\n 554f16120b2c910306091ebc4f027c8e 2008.0/i586/libebook9-1.12.2-1.2mdv2008.0.i586.rpm\r\n d12b3caff29d424332eed92da50b014e 2008.0/i586/libecal7-1.12.2-1.2mdv2008.0.i586.rpm\r\n d2305fd2775aef20aa09822a18b23e20 2008.0/i586/libedata-book2-1.12.2-1.2mdv2008.0.i586.rpm\r\n 1ff922bf3b96e349e88b8a5098577fd3 2008.0/i586/libedata-cal6-1.12.2-1.2mdv2008.0.i586.rpm\r\n 7ad077472c308ba0a1eab267cf5f41d9 2008.0/i586/libedataserver9-1.12.2-1.2mdv2008.0.i586.rpm\r\n a1e5f6341427c8252ae2f5bb53abb864 2008.0/i586/libedataserver-devel-1.12.2-1.2mdv2008.0.i586.rpm\r\n f98aab2c87187723a91d63851dc7307b 2008.0/i586/libedataserverui8-1.12.2-1.2mdv2008.0.i586.rpm\r\n ad342077949f641b46f3d31336884565 2008.0/i586/libegroupwise13-1.12.2-1.2mdv2008.0.i586.rpm\r\n 1ea20abb0c00d4139c042db7562ad33e 2008.0/i586/libexchange-storage3-1.12.2-1.2mdv2008.0.i586.rpm \r\n 8f2762c4677d1dcec526d28634b1cdc8 2008.0/SRPMS/evolution-data-server-1.12.2-1.2mdv2008.0.src.rpm\r\n\r\n Mandriva Linux 2008.0/X86_64:\r\n a89eb6ee96b0885eaec6a3d0fcd402c4 2008.0/x86_64/evolution-data-server-1.12.2-1.2mdv2008.0.x86_64.rpm\r\n 5513ceadc9a7d771dd4bb631c5b1ac57 2008.0/x86_64/lib64camel10-1.12.2-1.2mdv2008.0.x86_64.rpm\r\n 41120c43bb29316bfb0d2dc80beaafcc 2008.0/x86_64/lib64camel-provider10-1.12.2-1.2mdv2008.0.x86_64.rpm\r\n 00d51e294ef4eb3edf7b489344bef709 2008.0/x86_64/lib64ebook9-1.12.2-1.2mdv2008.0.x86_64.rpm\r\n b314b6a23b6391e9e16717901ef116c2 2008.0/x86_64/lib64ecal7-1.12.2-1.2mdv2008.0.x86_64.rpm\r\n 564990bbcd635511e24526eadd7b6282 2008.0/x86_64/lib64edata-book2-1.12.2-1.2mdv2008.0.x86_64.rpm\r\n 74b630513512849237d91c8b5fd4cf3d 2008.0/x86_64/lib64edata-cal6-1.12.2-1.2mdv2008.0.x86_64.rpm\r\n cc2e43cfd37817b53693b33f53380df0 2008.0/x86_64/lib64edataserver9-1.12.2-1.2mdv2008.0.x86_64.rpm\r\n fcaa0d13f171907d85152c88c49baf75 2008.0/x86_64/lib64edataserver-devel-1.12.2-1.2mdv2008.0.x86_64.rpm\r\n e1e8a7e5cae46fb8ecc071f44b1e5357 2008.0/x86_64/lib64edataserverui8-1.12.2-1.2mdv2008.0.x86_64.rpm\r\n f2e8758d708c296f9768ac45b7a6997f 2008.0/x86_64/lib64egroupwise13-1.12.2-1.2mdv2008.0.x86_64.rpm\r\n e86333bb9e1ff53c17d24614c01f8d06 2008.0/x86_64/lib64exchange-storage3-1.12.2-1.2mdv2008.0.x86_64.rpm \r\n 8f2762c4677d1dcec526d28634b1cdc8 2008.0/SRPMS/evolution-data-server-1.12.2-1.2mdv2008.0.src.rpm\r\n\r\n Mandriva Linux 2008.1:\r\n 3be98e3222f18f7ad77f52cae18a3f53 2008.1/i586/evolution-data-server-2.22.3-1.2mdv2008.1.i586.rpm\r\n 46835255c35dfdaf1143fd55449d81b7 2008.1/i586/libcamel11-2.22.3-1.2mdv2008.1.i586.rpm\r\n a97c396fb8672423112ee79d6bc006da 2008.1/i586/libcamel-provider11-2.22.3-1.2mdv2008.1.i586.rpm\r\n 68bec1fe382f26707e631eb713225a49 2008.1/i586/libebook9-2.22.3-1.2mdv2008.1.i586.rpm\r\n 87c10b897330b34b3d07ef1b07cb4a9f 2008.1/i586/libecal7-2.22.3-1.2mdv2008.1.i586.rpm\r\n fd3fba7ea5451dce1d0df1bd3fc60a16 2008.1/i586/libedata-book2-2.22.3-1.2mdv2008.1.i586.rpm\r\n 64ca4e53ca5f7f4b2691b843953058ae 2008.1/i586/libedata-cal6-2.22.3-1.2mdv2008.1.i586.rpm\r\n 7f76ed81e4c5437de49d197101aa7332 2008.1/i586/libedataserver9-2.22.3-1.2mdv2008.1.i586.rpm\r\n 7f95a2a8b876df47c0b7ad62e8753160 2008.1/i586/libedataserver-devel-2.22.3-1.2mdv2008.1.i586.rpm\r\n 0b1ed9835be5d7e57dd66b9140dd2268 2008.1/i586/libedataserverui8-2.22.3-1.2mdv2008.1.i586.rpm\r\n bc8a216136da73264f106ebda24ccb5b 2008.1/i586/libegroupwise13-2.22.3-1.2mdv2008.1.i586.rpm\r\n 74ee765271a478ed654b75dee813256a 2008.1/i586/libexchange-storage3-2.22.3-1.2mdv2008.1.i586.rpm\r\n 633e1f092cf81c404c74bdcec4714703 2008.1/i586/libgdata1-2.22.3-1.2mdv2008.1.i586.rpm \r\n 49ea7ff50dfd16062fc0b67023849a54 2008.1/SRPMS/evolution-data-server-2.22.3-1.2mdv2008.1.src.rpm\r\n\r\n Mandriva Linux 2008.1/X86_64:\r\n 670373514981fcfd42704ff50bd981fa 2008.1/x86_64/evolution-data-server-2.22.3-1.2mdv2008.1.x86_64.rpm\r\n e2560387c8b8934baf25b4b2b2de9e74 2008.1/x86_64/lib64camel11-2.22.3-1.2mdv2008.1.x86_64.rpm\r\n fe118c0ea5cfe68d7097e620f57b1279 2008.1/x86_64/lib64camel-provider11-2.22.3-1.2mdv2008.1.x86_64.rpm\r\n 78585bbd328376b22f0c766a569647e7 2008.1/x86_64/lib64ebook9-2.22.3-1.2mdv2008.1.x86_64.rpm\r\n f45dee9d1bd98f426a0cf284a01c9397 2008.1/x86_64/lib64ecal7-2.22.3-1.2mdv2008.1.x86_64.rpm\r\n fcaad5ce1f9a45565b83f25c271601e5 2008.1/x86_64/lib64edata-book2-2.22.3-1.2mdv2008.1.x86_64.rpm\r\n d29452a6255e90a6c021e4262dca8797 2008.1/x86_64/lib64edata-cal6-2.22.3-1.2mdv2008.1.x86_64.rpm\r\n cb16a0e0c5a22c72d34b603122a81d24 2008.1/x86_64/lib64edataserver9-2.22.3-1.2mdv2008.1.x86_64.rpm\r\n 7f559ca0d7498fa7d70c4dab1f9cc8ae 2008.1/x86_64/lib64edataserver-devel-2.22.3-1.2mdv2008.1.x86_64.rpm\r\n a48581b50953bb080a40bbcd5e4b422e 2008.1/x86_64/lib64edataserverui8-2.22.3-1.2mdv2008.1.x86_64.rpm\r\n 6ec96948b374a44491d6659083ba76bd 2008.1/x86_64/lib64egroupwise13-2.22.3-1.2mdv2008.1.x86_64.rpm\r\n 3fa45afb3abbd3c77e254fda0da424eb 2008.1/x86_64/lib64exchange-storage3-2.22.3-1.2mdv2008.1.x86_64.rpm\r\n 23f73c9a1405c768a49f62552c680cfa 2008.1/x86_64/lib64gdata1-2.22.3-1.2mdv2008.1.x86_64.rpm \r\n 49ea7ff50dfd16062fc0b67023849a54 2008.1/SRPMS/evolution-data-server-2.22.3-1.2mdv2008.1.src.rpm\r\n\r\n Mandriva Linux 2009.0:\r\n 59ef53fa7d268e81f404ddc538c9ac26 2009.0/i586/evolution-data-server-2.24.2-2.2mdv2009.0.i586.rpm\r\n 3d84382377d27dad8d406d1d8a7d5eb2 2009.0/i586/libcamel14-2.24.2-2.2mdv2009.0.i586.rpm\r\n c27b63a7c1a85ca33615f70055cadf71 2009.0/i586/libebackend0-2.24.2-2.2mdv2009.0.i586.rpm\r\n 455a545fac4d7bec31b844ddebb57e0a 2009.0/i586/libebook9-2.24.2-2.2mdv2009.0.i586.rpm\r\n 1c4907ff88489011e8ab31c7394cdbef 2009.0/i586/libecal7-2.24.2-2.2mdv2009.0.i586.rpm\r\n d9984628bc49bfbebabc84ec1953d33c 2009.0/i586/libedata-book2-2.24.2-2.2mdv2009.0.i586.rpm\r\n fe22354397f7bf8d7957b4b13607e539 2009.0/i586/libedata-cal6-2.24.2-2.2mdv2009.0.i586.rpm\r\n 3f005b703bde0898ee545e5a0bbfc8e6 2009.0/i586/libedataserver11-2.24.2-2.2mdv2009.0.i586.rpm\r\n 7ebda4f39cf70f8a1729079b13b21ac0 2009.0/i586/libedataserver-devel-2.24.2-2.2mdv2009.0.i586.rpm\r\n aa13c35974f81f495e7ae6f4699750c7 2009.0/i586/libedataserverui8-2.24.2-2.2mdv2009.0.i586.rpm\r\n c9f7f0d15f501431ae541592eb142705 2009.0/i586/libegroupwise13-2.24.2-2.2mdv2009.0.i586.rpm\r\n 02b8b6603c16920b11cb2aa26b4c8b6a 2009.0/i586/libexchange-storage3-2.24.2-2.2mdv2009.0.i586.rpm\r\n d6724a2358dd27ef05b2a40678be46f7 2009.0/i586/libgdata1-2.24.2-2.2mdv2009.0.i586.rpm \r\n ffce99dbbd074a3a744f2470ee6bfe5b 2009.0/SRPMS/evolution-data-server-2.24.2-2.2mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.0/X86_64:\r\n 5ea4be495d706643ea838b66854e28f5 2009.0/x86_64/evolution-data-server-2.24.2-2.2mdv2009.0.x86_64.rpm\r\n 1398c10b38aabb1100b4dad6dd2b1086 2009.0/x86_64/lib64camel14-2.24.2-2.2mdv2009.0.x86_64.rpm\r\n 6ba652147caa5dab986a5b763e346b4d 2009.0/x86_64/lib64ebackend0-2.24.2-2.2mdv2009.0.x86_64.rpm\r\n bb6feb90ceb9b982ba99f374ecbcb2d2 2009.0/x86_64/lib64ebook9-2.24.2-2.2mdv2009.0.x86_64.rpm\r\n 0950c2b31de5c9ceb118912b6cd3faf0 2009.0/x86_64/lib64ecal7-2.24.2-2.2mdv2009.0.x86_64.rpm\r\n cd2681c502d794e8a2c408582e24537c 2009.0/x86_64/lib64edata-book2-2.24.2-2.2mdv2009.0.x86_64.rpm\r\n 9a4993b5402eb99b9687a648279bd3d0 2009.0/x86_64/lib64edata-cal6-2.24.2-2.2mdv2009.0.x86_64.rpm\r\n 3ecbd64eb57e83aeb58992d231c5ac87 2009.0/x86_64/lib64edataserver11-2.24.2-2.2mdv2009.0.x86_64.rpm\r\n d43c94570e8ad660ac2e62ee8760ea5b 2009.0/x86_64/lib64edataserver-devel-2.24.2-2.2mdv2009.0.x86_64.rpm\r\n 5d2a86d37af602f2ceaadf2c526d5261 2009.0/x86_64/lib64edataserverui8-2.24.2-2.2mdv2009.0.x86_64.rpm\r\n dd3a5396088eac43c0044cb454baebc2 2009.0/x86_64/lib64egroupwise13-2.24.2-2.2mdv2009.0.x86_64.rpm\r\n 77f85ad7cb6a82fdc1bb602649d43775 2009.0/x86_64/lib64exchange-storage3-2.24.2-2.2mdv2009.0.x86_64.rpm\r\n a341e5e2b653488c9853a20e037edcf8 2009.0/x86_64/lib64gdata1-2.24.2-2.2mdv2009.0.x86_64.rpm \r\n ffce99dbbd074a3a744f2470ee6bfe5b 2009.0/SRPMS/evolution-data-server-2.24.2-2.2mdv2009.0.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFJx5vemqjQ0CJFipgRAqAAAJ9Fw/DVMwRDkW7kTy4T8IQePfHVngCg0LPr\r\nV8zfxQ/wOKJQXeyG95vtR8I=\r\n=ZEsU\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2009-03-24T00:00:00", "published": "2009-03-24T00:00:00", "id": "SECURITYVULNS:DOC:21518", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:21518", "title": "[ MDVSA-2009:078 ] evolution-data-server", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:32", "bulletinFamily": "software", "cvelist": ["CVE-2009-0547", "CVE-2009-0587", "CVE-2009-0582"], "description": "Signature spoofing, DoS, process memory disclosure, integer overflows.", "edition": 1, "modified": "2009-03-24T00:00:00", "published": "2009-03-24T00:00:00", "id": "SECURITYVULNS:VULN:9770", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9770", "title": "Evolution Data Server multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:29", "bulletinFamily": "software", "cvelist": ["CVE-2009-0586", "CVE-2008-4316", "CVE-2009-0587", "CVE-2009-0585"], "description": "#2008-015 glib and glib-predecessors heap overflows\r\n\r\nDescription:\r\n\r\nBase64 encoding and decoding functions in glib suffer from\r\nvulnerabilities during memory allocation which may result in arbitrary\r\ncode execution when processing large strings. A number of other\r\nGNOME-related applications which predate glib are vulnerable due to the\r\ncommonality of this flawed code.\r\n\r\nIn all cases, heap memory is allocated using a length calculated with a\r\nuser-supplied, platform-specifc value. It follows the pattern below:\r\n\r\n g_malloc(user_supplied_length * 3 / 4 + some_small_num)\r\n\r\nDue to the evaluation order of arithmetic operations, the length is\r\nmultiplied by 3 prior to division by 4. This will allow the calculated\r\nargument used for allocation length to overflow resulting in a region\r\nwhich is smaller than expected.\r\n\r\n\r\nPatches:\r\nglib\r\n http://ocert.org/patches/2008-015/glib-CVE-2008-4316.diff\r\ngst-plugins-base\r\n http://ocert.org/patches/2008-015/gst-plugins-base-CVE-2009-0586.diff\r\nevolution-data-server\r\n http://ocert.org/patches/2008-015/camel-CVE-2009-0587.diff\r\n http://ocert.org/patches/2008-015/evc-CVE-2009-0587.diff\r\nlibsoup\r\n http://ocert.org/patches/2008-015/libsoup-base64-CVE-2009-0585.diff\r\n\r\n\r\nAffected version:\r\n\r\n(actively affected)\r\nglib >= 2.11 unstable\r\nglib >= 2.12 stable\r\ngstreamer-plugins-base < 0.10.23\r\n\r\n(older versions affected only)\r\nlibsoup < 2.2.x\r\nlibsoup < 2.24\r\nevolution-data-server < 2.24.5\r\n\r\n\r\nFixed version:\r\n\r\nglib >= 2.20 (svn revision >= 7973)\r\ngstreamer-plugins-base >= 0.10.23\r\n\r\n(Other identified packages are unaffected in current versions.)\r\n\r\n\r\nCredit: vulnerability report and initial analysis received from\r\n Diego Pettenò <flameeyes (at) gmail.com> with\r\n extended analysis, vulnerabilities, and patches for libsoup,\r\n gst-plugins-base, and evolution-data-server from\r\n Tomas Hoger <thoger (at) redhat.com>.\r\n\r\n\r\nCVE: CVE-2008-4316 (glib),\r\n CVE-2009-0585 (libsoup),\r\n CVE-2009-0586 (gstreamer-plugins-base),\r\n CVE-2009-0587 (evolution-data-server)\r\n\r\n\r\nTimeline:\r\n\r\n2008-10-22: vulnerability report received\r\n2008-11-11: failed to contact gnome-upstream privately (ml, bugs)\r\n2008-11-27: contacted vendor-sec as gnome-upstream\r\n2008-11-28: thoger confirms and assigns initial CVE\r\n2008-11-29: flameeyes notes other potentially affected libraries\r\n2008-12-05: thoger supplies glib patch expands scope to include eds, gst\r\n2009-01-14: patch review by mclasen; thoger analysis eds, soup\r\n2009-01-26: gst-plugins-base detailed analysis by thoger\r\n2009-02-22: gstreamer upstream contacted\r\n2009-03-03: gst-plugins-base patch from upstream\r\n2009-03-04: evolution data server lead contacted\r\n2009-03-05: final embargo lift date settled\r\n2009-03-12: glib. gst upstream patches public; advisory published\r\n\r\nReferences:\r\nglib update\r\n http://svn.gnome.org/viewvc/glib?view=revision&revision=7973\r\ngst-plugins-base update\r\n http://cgit.freedesktop.org/gstreamer/gst-plugins-base/commit/?id=566583e87147f774e7fc4c78b5f7e61d427e40a9\r\nhttp://www.gtk.org/\r\nhttp://www.gstreamer.net/\r\nhttp://www.go-evolution.org/Main_Page\r\nhttp://live.gnome.org/LibSoup\r\nhttp://www.go-evolution.org/Camel\r\n\r\nPermalink:\r\nhttp://www.ocert.org/advisories/ocert-2008-015.html\r\n\r\n--\r\nWill Drewry <redpig@ocert.org>\r\noCERT Team :: http://ocert.org", "edition": 1, "modified": "2009-03-15T00:00:00", "published": "2009-03-15T00:00:00", "id": "SECURITYVULNS:DOC:21483", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:21483", "title": "[oCERT-2008-015] glib and glib-predecessor heap overflows", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:32", "bulletinFamily": "software", "cvelist": ["CVE-2009-0586", "CVE-2008-4316", "CVE-2009-0587", "CVE-2009-0585"], "description": "Memory corruption on base64 encoding/decoding.", "edition": 1, "modified": "2009-03-15T00:00:00", "published": "2009-03-15T00:00:00", "id": "SECURITYVULNS:VULN:9743", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9743", "title": "glib library memory corruption", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "ubuntu": [{"lastseen": "2020-07-09T00:34:44", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0587"], "description": "It was discovered that the Base64 encoding functions in \nevolution-data-server did not properly handle large strings. If a user were \ntricked into opening a specially crafted image file, or tricked into \nconnecting to a malicious server, an attacker could possibly execute \narbitrary code with user privileges.", "edition": 5, "modified": "2009-03-16T00:00:00", "published": "2009-03-16T00:00:00", "id": "USN-733-1", "href": "https://ubuntu.com/security/notices/USN-733-1", "title": "evolution-data-server vulnerability", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "seebug": [{"lastseen": "2017-11-19T18:56:18", "description": "BUGTRAQ ID: 34109\r\nCVE(CAN) ID: CVE-2009-0582\r\n\r\nEvolution Data Server\u4e3a\u5730\u5740\u7c3f\u3001\u65e5\u5386\u4e8b\u4ef6\u7b49\u5e38\u89c1\u7684\u684c\u9762\u4fe1\u606f\u63d0\u4f9b\u5355\u4e00\u7684\u670d\u52a1\u5668\u3002\r\n\r\nEvolution Data Server\u6240\u6346\u7ed1\u7684Camel\u5e93\u6ca1\u6709\u6b63\u786e\u5730\u5904\u7406NTLM SASL\u62a5\u6587\u3002\u5728camel/camel-sasl-ntlm.c\u7684ntlm_challenge()\u51fd\u6570\u4e2d\uff0c\u6ca1\u6709\u5bf9\u4ecetype 2\u62f7\u8d1d\u5230type 3\u62a5\u6587\uff08\u5ba2\u6237\u7aef\u5bf9\u670d\u52a1\u5668\u6311\u6218\u7684\u54cd\u5e94\uff09\u7684\u57df\u5b57\u7b26\u4e32\u957f\u5ea6\u9a8c\u8bc1\u4ece\u670d\u52a1\u5668\u6240\u63a5\u6536\u5230\u7684\u5269\u4f59\u6570\u636e\uff1a\r\n\r\n127 ntlm_set_string (ret, NTLM_RESPONSE_DOMAIN_OFFSET,\r\n128 token->data + NTLM_CHALLENGE_DOMAIN_OFFSET,\r\n129 atoi (token->data + NTLM_CHALLENGE_DOMAIN_LEN_OFFSET));\r\n\r\n\u670d\u52a1\u5668\u53ef\u4ee5\u6307\u5b9a\u5927\u4e8e\u62a5\u6587\u4e2d\u5b9e\u9645\u53d1\u9001\u6570\u636e\u7684\u957f\u5ea6\u5bfc\u81f4\u5ba2\u6237\u7aef\u6cc4\u5bc6\u90e8\u5206\u5185\u5b58\u3002\n\nGNOME Evolution Data Server 2.24.5\n \u5382\u5546\u8865\u4e01\uff1a\r\n\r\nGNOME\r\n-----\r\n\u76ee\u524d\u5382\u5546\u8fd8\u6ca1\u6709\u63d0\u4f9b\u8865\u4e01\u6216\u8005\u5347\u7ea7\u7a0b\u5e8f\uff0c\u6211\u4eec\u5efa\u8bae\u4f7f\u7528\u6b64\u8f6f\u4ef6\u7684\u7528\u6237\u968f\u65f6\u5173\u6ce8\u5382\u5546\u7684\u4e3b\u9875\u4ee5\u83b7\u53d6\u6700\u65b0\u7248\u672c\uff1a\r\n\r\n<a href=http://www.gnome.org/ target=_blank rel=external nofollow>http://www.gnome.org/</a>", "published": "2009-03-17T00:00:00", "title": "Evolution Data Server ntlm_challenge()\u5185\u5b58\u5185\u5bb9\u6cc4\u9732\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2009-0582"], "modified": "2009-03-17T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-4920", "id": "SSV:4920", "sourceData": "", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:PARTIAL/"}, "sourceHref": ""}, {"lastseen": "2017-11-19T21:19:29", "description": "BUGTRAQ ID: 34100\r\nCVE(CAN) ID: CVE-2008-4316,CVE-2009-0586,CVE-2009-0587,CVE-2009-0585\r\n\r\nGLib\u662fGTK+\u548cGNOME\u5de5\u7a0b\u7684\u57fa\u7840\u5e95\u5c42\u6838\u5fc3\u7a0b\u5e8f\u5e93\uff0c\u662f\u4e00\u4e2a\u7efc\u5408\u7528\u9014\u7684\u8f7b\u91cf\u7ea7\u7684C\u7a0b\u5e8f\u5e93\u3002\r\n\r\nglib\u5e93\u7684Base64\u7f16\u7801\u89e3\u7801\u51fd\u6570\u5728\u5904\u7406\u8d85\u957f\u5b57\u7b26\u4e32\u65f6\u6ca1\u6709\u6b63\u786e\u5730\u5206\u914d\u5185\u5b58\uff0c\u5728\u6240\u6709\u60c5\u51b5\u4e0b\u90fd\u4f1a\u4f7f\u7528\u7528\u6237\u63d0\u4f9b\u503c\u6240\u8ba1\u7b97\u51fa\u7684\u957f\u5ea6\u5206\u914d\u5806\u5185\u5b58\uff1a\r\n\r\n g_malloc(user_supplied_length * 3 / 4 + some_small_num)\r\n\r\n\u7531\u4e8e\u7b97\u672f\u8fd0\u7b97\u7684\u8bc4\u4f30\u6b21\u5e8f\uff0c\u957f\u5ea6\u5728\u9664\u4ee54\u4e4b\u524d\u9996\u5148\u4e58\u4ee53\uff0c\u56e0\u6b64\u7528\u4e8e\u5206\u914d\u957f\u5ea6\u7684\u8ba1\u7b97\u53c2\u6570\u53ef\u80fd\u6ea2\u51fa\uff0c\u5bfc\u81f4\u5206\u914d\u4e0d\u8db3\u7684\u533a\u57df\u3002\r\n\n\nGNOME glib >= 2.12 stable\r\nGNOME glib >= 2.11 unstable\n \u5382\u5546\u8865\u4e01\uff1a\r\n\r\nGNOME\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n<a href=http://ocert.org/patches/2008-015/glib-CVE-2008-4316.diff target=_blank rel=external nofollow>http://ocert.org/patches/2008-015/glib-CVE-2008-4316.diff</a>\r\n<a href=http://ocert.org/patches/2008-015/gst-plugins-base-CVE-2009-0586.diff target=_blank rel=external nofollow>http://ocert.org/patches/2008-015/gst-plugins-base-CVE-2009-0586.diff</a>\r\n<a href=http://ocert.org/patches/2008-015/camel-CVE-2009-0587.diff target=_blank rel=external nofollow>http://ocert.org/patches/2008-015/camel-CVE-2009-0587.diff</a>\r\n<a href=http://ocert.org/patches/2008-015/evc-CVE-2009-0587.diff target=_blank rel=external nofollow>http://ocert.org/patches/2008-015/evc-CVE-2009-0587.diff</a>\r\n<a href=http://ocert.org/patches/2008-015/libsoup-base64-CVE-2009-0585.diff target=_blank rel=external nofollow>http://ocert.org/patches/2008-015/libsoup-base64-CVE-2009-0585.diff</a>", "published": "2009-03-14T00:00:00", "title": "GNOME glib Base64\u7f16\u7801\u89e3\u7801\u591a\u4e2a\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-4316", "CVE-2009-0585", "CVE-2009-0586", "CVE-2009-0587"], "modified": "2009-03-14T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-4913", "id": "SSV:4913", "sourceData": "", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": ""}], "fedora": [{"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0547", "CVE-2009-0582"], "description": "The evolution-data-server package provides a unified backend for programs t hat work with contacts, tasks, and calendar information. It was originally developed for Evolution (hence the name), but is now used by other packages. ", "modified": "2009-03-18T19:01:39", "published": "2009-03-18T19:01:39", "id": "FEDORA:BD982208503", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 9 Update: evolution-data-server-2.22.3-3.fc9", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0547", "CVE-2009-0582"], "description": "The evolution-data-server package provides a unified backend for programs t hat work with contacts, tasks, and calendar information. It was originally developed for Evolution (hence the name), but is now used by other packages. ", "modified": "2009-03-18T18:59:58", "published": "2009-03-18T18:59:58", "id": "FEDORA:8282A208503", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 10 Update: evolution-data-server-2.24.5-4.fc10", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}]}