Linux Security
    Linux Security
    Linux Security

    Debian: New curl packages fix potential security problem

    Date 10 Mar 2006
    3770
    Posted By LinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 919-2                     This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                             Martin Schulze
    Marth 10th, 2006                        https://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : curl
    Vulnerability  : buffer overflow
    Problem type   : local (remote)
    Debian-specific: no
    CVE ID         : CVE-2005-4077
    BugTraq ID     : 15756
    Debian Bugs    : 342339 342696
    
    The upstream developer of curl, a multi-protocol file transfer
    library, informed us that the former correction to several off-by-one
    errors are not sufficient.  For completeness please find the original
    bug description below:
    
        Stefan Esser discovered several off-by-one errors that allows
        local users to trigger a buffer overflow and cause a denial of
        service or bypass PHP security restrictions via certain URLs.
    
    For the old stable distribution (woody) these problems have been fixed in
    version 7.9.5-1woody2.
    
    For the stable distribution (sarge) these problems have been fixed in
    version 7.13.2-2sarge5.
    
    For the unstable distribution (sid) these problems have been fixed in
    version 7.15.1-1.
    
    We recommend that you upgrade your libcurl packages.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2.dsc
          Size/MD5 checksum:      603 62a08f0dff0d09e2cfb773c04ec9cb39
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2.diff.gz
          Size/MD5 checksum:    16679 4f4699069b8b03a75561c00ae346266c
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5.orig.tar.gz
          Size/MD5 checksum:   682397 a4df6bb5aa8962c204e73c8f98077928
    
      Alpha architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2_alpha.deb
          Size/MD5 checksum:   118546 80578b5149b1f85908250d189ffe4fc1
        https://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody2_alpha.deb
          Size/MD5 checksum:   195952 762e8471239a92b0c45b44e0379877f4
        https://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody2_alpha.deb
          Size/MD5 checksum:   116624 fe65a65b7ec0529ee5778f703f45de3d
    
      ARM architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2_arm.deb
          Size/MD5 checksum:   114494 568f2949df218f0bdc77315eca6bcdc9
        https://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody2_arm.deb
          Size/MD5 checksum:   172996 7d0e29244038b8587dc4f393b800a19e
        https://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody2_arm.deb
          Size/MD5 checksum:   101892 36ded7c5e5844d79bb53b64b0a1e70c6
    
      Intel IA-32 architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2_i386.deb
          Size/MD5 checksum:   113024 0a4bea4409c4b15554af6d063deff9e6
        https://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody2_i386.deb
          Size/MD5 checksum:   163738 c91953e3083d813d51bc7d28c21cbb26
        https://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody2_i386.deb
          Size/MD5 checksum:   100544 860e88b6f23f13beb96d1adb7e23ccc3
    
      Intel IA-64 architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2_ia64.deb
          Size/MD5 checksum:   122108 feb536a863d0d317a7fa2ddd05c91ccd
        https://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody2_ia64.deb
          Size/MD5 checksum:   210346 d371446a9efe8b55b22a891599ca0e34
        https://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody2_ia64.deb
          Size/MD5 checksum:   139470 6b282c866dc3d439b54565a85672f73e
    
      HP Precision architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2_hppa.deb
          Size/MD5 checksum:   116474 6def03bfd72095d967e130947160e149
        https://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody2_hppa.deb
          Size/MD5 checksum:   186410 8a92f7a10893e0e870c3de0008fdb7fb
        https://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody2_hppa.deb
          Size/MD5 checksum:   113016 a1c4e05ee3a19ceb7c501e7a15c79472
    
      Motorola 680x0 architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2_m68k.deb
          Size/MD5 checksum:   112814 fe14e982348adcd471dac277c64318d7
        https://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody2_m68k.deb
          Size/MD5 checksum:   159174 101573ffa60ada3919244812c3e549a4
        https://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody2_m68k.deb
          Size/MD5 checksum:    97210 a679640f9f2a15ebc4cf7ecaab294b17
    
      Big endian MIPS architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2_mips.deb
          Size/MD5 checksum:   115508 e64d4b2a5f2ca190b5c6d2c35c612875
        https://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody2_mips.deb
          Size/MD5 checksum:   183998 fe09a440ee83320deb8c87e145d5dd1c
        https://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody2_mips.deb
          Size/MD5 checksum:   105278 0a986bde9d964600488d46f86cc13796
    
      Little endian MIPS architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2_mipsel.deb
          Size/MD5 checksum:   115536 0a953c3fb64b1c2a717bbbedc4590930
        https://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody2_mipsel.deb
          Size/MD5 checksum:   183894 28c9494b916c4f5930fb36a24a9cb15d
        https://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody2_mipsel.deb
          Size/MD5 checksum:   105362 fa9855c9c542dfe80279debbd5c8fe58
    
      PowerPC architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2_powerpc.deb
          Size/MD5 checksum:   115104 fdd19cc3dc041b832f1400b3095e3272
        https://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody2_powerpc.deb
          Size/MD5 checksum:   181524 ec2f58f83023187dacb2dc28732db05f
        https://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody2_powerpc.deb
          Size/MD5 checksum:   106436 b64010ddab81b1658992b226a644b7b8
    
      IBM S/390 architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2_s390.deb
          Size/MD5 checksum:   114424 a5651846cf7bbda1fe3bc7a7da2283e2
        https://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody2_s390.deb
          Size/MD5 checksum:   167550 dabb8ea718530f9dbdd8858619c53157
        https://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody2_s390.deb
          Size/MD5 checksum:   104400 81aa237a8b00e4e418d5a0a85d35e32b
    
      Sun Sparc architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody2_sparc.deb
          Size/MD5 checksum:   114254 9df1a25a6dccea83b7a6cc7868c37247
        https://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody2_sparc.deb
          Size/MD5 checksum:   173320 948d75e0202f6fda494d6fae9d122940
        https://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody2_sparc.deb
          Size/MD5 checksum:   107996 2d5dade7d687ac5391bdca26016dd28e
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5.dsc
          Size/MD5 checksum:      810 5189493504485c0048f38809d1f71eb2
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5.diff.gz
          Size/MD5 checksum:   172234 344704b789a63e17795dd47475af6519
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2.orig.tar.gz
          Size/MD5 checksum:  2201086 b3bd4a303f35f9a2a3ed3671cedf8329
    
      Alpha architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5_alpha.deb
          Size/MD5 checksum:   150912 bb6f21223e11353d7d1b373e3d832395
        https://security.debian.org/pool/updates/main/c/curl/libcurl3_7.13.2-2sarge5_alpha.deb
          Size/MD5 checksum:   251302 5a594c2e2b9e0e5697ae933cc9710ff2
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dbg_7.13.2-2sarge5_alpha.deb
          Size/MD5 checksum:  1010904 9c1ae1862d7dbf45310c42ad1fb7bf29
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dev_7.13.2-2sarge5_alpha.deb
          Size/MD5 checksum:  1279442 0effd00cd0ec6d923e9694ceb7b8347b
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-gssapi_7.13.2-2sarge5_alpha.deb
          Size/MD5 checksum:   132196 e09c305798f2ef2d5232fefc1138743b
    
      AMD64 architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5_amd64.deb
          Size/MD5 checksum:   148046 72b46b62bb3f3d461b4d6a5734098b9b
        https://security.debian.org/pool/updates/main/c/curl/libcurl3_7.13.2-2sarge5_amd64.deb
          Size/MD5 checksum:   239294 121956fb9aae3348fa9a493cdea79740
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dbg_7.13.2-2sarge5_amd64.deb
          Size/MD5 checksum:  1004132 0f8d808b09bd0ab935beb218a7e53630
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dev_7.13.2-2sarge5_amd64.deb
          Size/MD5 checksum:  1238024 a447b1dd774b1f4e07b4fc5fefccef5d
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-gssapi_7.13.2-2sarge5_amd64.deb
          Size/MD5 checksum:   119350 fa2554b51b070c1d6fd2d3f76f5038d5
    
      ARM architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5_arm.deb
          Size/MD5 checksum:   147080 7b4cfc50771d62e0a76ccb6209fe449a
        https://security.debian.org/pool/updates/main/c/curl/libcurl3_7.13.2-2sarge5_arm.deb
          Size/MD5 checksum:   232270 e81f1ce1b439ce7778abdf60248f9a21
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dbg_7.13.2-2sarge5_arm.deb
          Size/MD5 checksum:  1006548 eb5d3cd6e480e053c835bc4a0e94e45c
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dev_7.13.2-2sarge5_arm.deb
          Size/MD5 checksum:  1236336 9552fc31cae7b84855459502c0f9185f
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-gssapi_7.13.2-2sarge5_arm.deb
          Size/MD5 checksum:   112884 9c790872f1108c9de8ad03581515cd3b
    
      Intel IA-32 architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5_i386.deb
          Size/MD5 checksum:   147610 950f7978ba6ee3b60416e9056438c6e0
        https://security.debian.org/pool/updates/main/c/curl/libcurl3_7.13.2-2sarge5_i386.deb
          Size/MD5 checksum:   237898 46d8c98384d1d545d3e4d58d26d0a94b
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dbg_7.13.2-2sarge5_i386.deb
          Size/MD5 checksum:  1003424 fe85527c93e5859685e72cd28ecaa15f
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dev_7.13.2-2sarge5_i386.deb
          Size/MD5 checksum:  1232116 2756464635b53395cbfda1ead83bfb62
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-gssapi_7.13.2-2sarge5_i386.deb
          Size/MD5 checksum:   118554 a977c4931ccbd0d7ab855d4463edabbc
    
      Intel IA-64 architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5_ia64.deb
          Size/MD5 checksum:   156722 f430eba0b5554535b21fa840baa0953b
        https://security.debian.org/pool/updates/main/c/curl/libcurl3_7.13.2-2sarge5_ia64.deb
          Size/MD5 checksum:   279222 57772e931a766e8611b41de5dd82fc44
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dbg_7.13.2-2sarge5_ia64.deb
          Size/MD5 checksum:  1014718 69aebd71a0c09184ee5745d38fbe5e57
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dev_7.13.2-2sarge5_ia64.deb
          Size/MD5 checksum:  1293798 072ac6f1e0b505991ded4340e71f3d2d
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-gssapi_7.13.2-2sarge5_ia64.deb
          Size/MD5 checksum:   160790 df3faf481671c5efb79bb4e43df0cd0f
    
      HP Precision architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5_hppa.deb
          Size/MD5 checksum:   150554 dcf951b1cdc8a8b2808b4ef5a6ed7a06
        https://security.debian.org/pool/updates/main/c/curl/libcurl3_7.13.2-2sarge5_hppa.deb
          Size/MD5 checksum:   251200 409ac37bb0adc4a4bd0542c1ac661ad3
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dbg_7.13.2-2sarge5_hppa.deb
          Size/MD5 checksum:  1002064 903885cbc63e47e1cca7cafe64d9061d
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dev_7.13.2-2sarge5_hppa.deb
          Size/MD5 checksum:  1253626 b09cfaed0c17cd06e69586d54d426256
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-gssapi_7.13.2-2sarge5_hppa.deb
          Size/MD5 checksum:   132284 33802a367e971182dfaac46ab2f2b3a0
    
      Motorola 680x0 architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5_m68k.deb
          Size/MD5 checksum:   144652 11be6a48cdb019c42852c2a29523c972
        https://security.debian.org/pool/updates/main/c/curl/libcurl3_7.13.2-2sarge5_m68k.deb
          Size/MD5 checksum:   227858 b58a8fa28732754776e30b478649262e
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dbg_7.13.2-2sarge5_m68k.deb
          Size/MD5 checksum:   998546 3392e518130e36eba7a9598f6308e8f9
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dev_7.13.2-2sarge5_m68k.deb
          Size/MD5 checksum:  1212010 5e901a9ab9336d22ce5bffec68ed3020
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-gssapi_7.13.2-2sarge5_m68k.deb
          Size/MD5 checksum:   108694 4f50040ed1dcb4a129b6cf5ef70196e2
    
      Big endian MIPS architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5_mips.deb
          Size/MD5 checksum:   149942 9c11cfcc6886af0114f97b2eddb428a7
        https://security.debian.org/pool/updates/main/c/curl/libcurl3_7.13.2-2sarge5_mips.deb
          Size/MD5 checksum:   237440 254e37aa6c1fcb96f53b3b38fb599142
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dbg_7.13.2-2sarge5_mips.deb
          Size/MD5 checksum:  1007564 fc4147e821a5908cd6b2a67f77fa55f4
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dev_7.13.2-2sarge5_mips.deb
          Size/MD5 checksum:  1246980 5e542160496f4cbe3475ad7f4c085f7e
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-gssapi_7.13.2-2sarge5_mips.deb
          Size/MD5 checksum:   118470 41ca8bc0fb17a1922ab864790a0b583e
    
      Little endian MIPS architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5_mipsel.deb
          Size/MD5 checksum:   150046 51a993203eefc459a63658dc80ff0fcc
        https://security.debian.org/pool/updates/main/c/curl/libcurl3_7.13.2-2sarge5_mipsel.deb
          Size/MD5 checksum:   238022 d52743d13cd115b6a893989af7aef032
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dbg_7.13.2-2sarge5_mipsel.deb
          Size/MD5 checksum:  1010958 d3158f45cf6e904681e90608fce6673c
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dev_7.13.2-2sarge5_mipsel.deb
          Size/MD5 checksum:  1247246 5569e170ef9bda1d904b5e7e2b979ef4
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-gssapi_7.13.2-2sarge5_mipsel.deb
          Size/MD5 checksum:   118942 d71e0823fadaeaafff74f3dfa0691621
    
      PowerPC architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5_powerpc.deb
          Size/MD5 checksum:   150664 2b46df904ee41bfb43c3c375cecd97dd
        https://security.debian.org/pool/updates/main/c/curl/libcurl3_7.13.2-2sarge5_powerpc.deb
          Size/MD5 checksum:   243472 ae29ca3aaca1c7b031eea79102315945
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dbg_7.13.2-2sarge5_powerpc.deb
          Size/MD5 checksum:  1640526 f9fe8c3eda4eff4db90b3b8a93c10403
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dev_7.13.2-2sarge5_powerpc.deb
          Size/MD5 checksum:  1245292 4fb803a4dba48d506d0aff115fa516de
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-gssapi_7.13.2-2sarge5_powerpc.deb
          Size/MD5 checksum:   124138 55b836d703e3d516fa2e75f018ddd8d8
    
      IBM S/390 architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5_s390.deb
          Size/MD5 checksum:   148640 bb07ba73b8e9d90b80fb1d36a1472db6
        https://security.debian.org/pool/updates/main/c/curl/libcurl3_7.13.2-2sarge5_s390.deb
          Size/MD5 checksum:   246640 93d40c902692d06f1d3a2d145b10474b
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dbg_7.13.2-2sarge5_s390.deb
          Size/MD5 checksum:  1025438 c0778b7435b21cf277a2656f134d47d4
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dev_7.13.2-2sarge5_s390.deb
          Size/MD5 checksum:  1240744 6da2e87d0e60701d03f3da1cc4bf8905
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-gssapi_7.13.2-2sarge5_s390.deb
          Size/MD5 checksum:   127458 80cf6d496e27df3765257fd1303eceb9
    
      Sun Sparc architecture:
    
        https://security.debian.org/pool/updates/main/c/curl/curl_7.13.2-2sarge5_sparc.deb
          Size/MD5 checksum:   147660 905b8cdc96289e709644da1addd5c7a3
        https://security.debian.org/pool/updates/main/c/curl/libcurl3_7.13.2-2sarge5_sparc.deb
          Size/MD5 checksum:   236994 8385a7c13cc40517b179cf21689db383
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dbg_7.13.2-2sarge5_sparc.deb
          Size/MD5 checksum:   996640 5d5cb641eca75a51659dad9f499673fa
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-dev_7.13.2-2sarge5_sparc.deb
          Size/MD5 checksum:  1232354 c8f891808cc67cf1756fe68898baf607
        https://security.debian.org/pool/updates/main/c/curl/libcurl3-gssapi_7.13.2-2sarge5_sparc.deb
          Size/MD5 checksum:   118006 5a4880af8b078ef38b148ba37ac4221a
    
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb https://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/49-tis-the-season-of-giving-how-have-you-given-back-to-the-open-source-community?task=poll.vote&format=json
    49
    radio
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.