English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 126339 CVE descriptions
and 74190 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

===========================================================
Ubuntu Security Notice USN-742-1             March 19, 2009
jasper vulnerabilities
CVE-2008-3520, CVE-2008-3521, CVE-2008-3522
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.10
Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  libjasper-1.701-1               1.701.0-2ubuntu0.6.06.1

Ubuntu 7.10:
  libjasper1                      1.900.1-3ubuntu0.7.10.1

Ubuntu 8.04 LTS:
  libjasper1                      1.900.1-3ubuntu0.8.04.1

Ubuntu 8.10:
  libjasper1                      1.900.1-5ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

It was discovered that JasPer did not correctly handle memory allocation
when parsing certain malformed JPEG2000 images. If a user were tricked into
opening a specially crafted image with an application that uses libjasper,
an attacker could cause a denial of service and possibly execute arbitrary
code with the user's privileges. (CVE-2008-3520)

It was discovered that JasPer created temporary files in an insecure way.
Local users could exploit a race condition and cause a denial of service in
libjasper applications.
(CVE-2008-3521)

It was discovered that JasPer did not correctly handle certain formatting
operations. If a user were tricked into opening a specially crafted image
with an application that uses libjasper, an attacker could cause a denial
of service and possibly execute arbitrary code with the user's privileges.
(CVE-2008-3522)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/jasper_1.701.0-2ubuntu0.6.06.1.diff.gz
      Size/MD5:    34544 cce3c647820e55fae518eb081a77545a
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/jasper_1.701.0-2ubuntu0.6.06.1.dsc
      Size/MD5:      715 3f7c5d2155ab4f259aab9bcc8aa64c0a
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/jasper_1.701.0.orig.tar.gz
      Size/MD5:  1084413 ceed8e5e4fc58ac8faca0bd4be8a7b7d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-1.701-1_1.701.0-2ubuntu0.6.06.1_amd64.deb
      Size/MD5:   146814 020471e3651a9c2fafd6eefedadb3f75
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-1.701-dev_1.701.0-2ubuntu0.6.06.1_amd64.deb
      Size/MD5:   636044 a614b7cd20832821f75ae66bcf639675
    http://security.ubuntu.com/ubuntu/pool/universe/j/jasper/libjasper-runtime_1.701.0-2ubuntu0.6.06.1_amd64.deb
      Size/MD5:    24296 a799121b0c020afa47dda1454c777aa8

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-1.701-1_1.701.0-2ubuntu0.6.06.1_i386.deb
      Size/MD5:   133552 7b3aebd21e1506b8cde1d0ab2602b685
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-1.701-dev_1.701.0-2ubuntu0.6.06.1_i386.deb
      Size/MD5:   619430 c5739e01e9d69506da8e6d956d05af96
    http://security.ubuntu.com/ubuntu/pool/universe/j/jasper/libjasper-runtime_1.701.0-2ubuntu0.6.06.1_i386.deb
      Size/MD5:    21890 6f01dc80f5a3dbd14325935e755301ee

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-1.701-1_1.701.0-2ubuntu0.6.06.1_powerpc.deb
      Size/MD5:   142700 e1253e0a77c84326db1dac4317ca196d
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-1.701-dev_1.701.0-2ubuntu0.6.06.1_powerpc.deb
      Size/MD5:   624160 fec9bc6cacf18fb5fbe42183e9dbdf08
    http://security.ubuntu.com/ubuntu/pool/universe/j/jasper/libjasper-runtime_1.701.0-2ubuntu0.6.06.1_powerpc.deb
      Size/MD5:    27932 31413f853f0a0ce38ed6355200f377f5

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-1.701-1_1.701.0-2ubuntu0.6.06.1_sparc.deb
      Size/MD5:   133302 a9f4ba112f2bf58554120454072b57a8
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-1.701-dev_1.701.0-2ubuntu0.6.06.1_sparc.deb
      Size/MD5:   623384 a5863b651eaedfdff5c9deaacb26dbb9
    http://security.ubuntu.com/ubuntu/pool/universe/j/jasper/libjasper-runtime_1.701.0-2ubuntu0.6.06.1_sparc.deb
      Size/MD5:    22492 f711a38841e73fd99ef8146d8aca8eae

Updated packages for Ubuntu 7.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/jasper_1.900.1-3ubuntu0.7.10.1.diff.gz
      Size/MD5:    49782 f6b41bf096b45f95964bde8822419e22
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/jasper_1.900.1-3ubuntu0.7.10.1.dsc
      Size/MD5:      787 84f1be39211afbf546f4865aa2c93b93
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/jasper_1.900.1.orig.tar.gz
      Size/MD5:  1143400 4ae3dd938fd15f22f30577db5c9f27e9

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-dev_1.900.1-3ubuntu0.7.10.1_amd64.deb
      Size/MD5:   560066 121337bb5de35638aee77f2e6f5b4175
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper1_1.900.1-3ubuntu0.7.10.1_amd64.deb
      Size/MD5:   151764 304a3001b55dda77b03b87b58dcce17e
    http://security.ubuntu.com/ubuntu/pool/universe/j/jasper/libjasper-runtime_1.900.1-3ubuntu0.7.10.1_amd64.deb
      Size/MD5:    25552 6cf1e402a960a58ee076513f7224bd93

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-dev_1.900.1-3ubuntu0.7.10.1_i386.deb
      Size/MD5:   548268 51fd5964f1593d5c5652d82f94be2f65
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper1_1.900.1-3ubuntu0.7.10.1_i386.deb
      Size/MD5:   144134 4051b7784cf9167f394bc0543758aadc
    http://security.ubuntu.com/ubuntu/pool/universe/j/jasper/libjasper-runtime_1.900.1-3ubuntu0.7.10.1_i386.deb
      Size/MD5:    23126 f1c103e3b437b004c62044e77a6fd789

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/j/jasper/libjasper-dev_1.900.1-3ubuntu0.7.10.1_lpia.deb
      Size/MD5:   548046 03c662544f78e41aa52b4eb0cef88f5e
    http://ports.ubuntu.com/pool/main/j/jasper/libjasper1_1.900.1-3ubuntu0.7.10.1_lpia.deb
      Size/MD5:   145604 f163501caa0ec88be92150e27177be07
    http://ports.ubuntu.com/pool/universe/j/jasper/libjasper-runtime_1.900.1-3ubuntu0.7.10.1_lpia.deb
      Size/MD5:    23288 b231d9da0cd70d816dc8aa0324d02f81

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-dev_1.900.1-3ubuntu0.7.10.1_powerpc.deb
      Size/MD5:   554840 6ed5498df3429753a6b8149ff35d9713
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper1_1.900.1-3ubuntu0.7.10.1_powerpc.deb
      Size/MD5:   156696 6d6301d54dcfcb54351c8b7a29cd0e98
    http://security.ubuntu.com/ubuntu/pool/universe/j/jasper/libjasper-runtime_1.900.1-3ubuntu0.7.10.1_powerpc.deb
      Size/MD5:    31970 64002762586577cd40494a75daf072c6

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-dev_1.900.1-3ubuntu0.7.10.1_sparc.deb
      Size/MD5:   546862 bad1d4f79ac9a0abfe4b722ca94299a9
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper1_1.900.1-3ubuntu0.7.10.1_sparc.deb
      Size/MD5:   138864 059db193b061fe0152be74ff6f7afe0d
    http://security.ubuntu.com/ubuntu/pool/universe/j/jasper/libjasper-runtime_1.900.1-3ubuntu0.7.10.1_sparc.deb
      Size/MD5:    24654 3f7c1c3623b76ef1bf87a4e269ce0959

Updated packages for Ubuntu 8.04 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/jasper_1.900.1-3ubuntu0.8.04.1.diff.gz
      Size/MD5:    49784 140289a8237818c78c094142470562be
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/jasper_1.900.1-3ubuntu0.8.04.1.dsc
      Size/MD5:      787 d110d94a13ba861e16d5a53d2fa06a0d
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/jasper_1.900.1.orig.tar.gz
      Size/MD5:  1143400 4ae3dd938fd15f22f30577db5c9f27e9

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-dev_1.900.1-3ubuntu0.8.04.1_amd64.deb
      Size/MD5:   560628 5ad790436c98d5b9cf0a6d4b31676999
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper1_1.900.1-3ubuntu0.8.04.1_amd64.deb
      Size/MD5:   149284 3e91312e9bfec2f8f15cbb6c7137276c
    http://security.ubuntu.com/ubuntu/pool/universe/j/jasper/libjasper-runtime_1.900.1-3ubuntu0.8.04.1_amd64.deb
      Size/MD5:    25430 b587ab277fd41171e0f1f1576e2d9ca8

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-dev_1.900.1-3ubuntu0.8.04.1_i386.deb
      Size/MD5:   548014 81bfeab149dd028ab86b682910248264
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper1_1.900.1-3ubuntu0.8.04.1_i386.deb
      Size/MD5:   140772 099c812e2107df16ec5f448fd4dd24ee
    http://security.ubuntu.com/ubuntu/pool/universe/j/jasper/libjasper-runtime_1.900.1-3ubuntu0.8.04.1_i386.deb
      Size/MD5:    23250 5c4bb207c9eab2d64e7d2012f2adebe7

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/j/jasper/libjasper-dev_1.900.1-3ubuntu0.8.04.1_lpia.deb
      Size/MD5:   547934 4f03a5626dde55be41d3403b07aacb27
    http://ports.ubuntu.com/pool/main/j/jasper/libjasper1_1.900.1-3ubuntu0.8.04.1_lpia.deb
      Size/MD5:   142492 a07e3596c6b2d436402a1658582b3e06
    http://ports.ubuntu.com/pool/universe/j/jasper/libjasper-runtime_1.900.1-3ubuntu0.8.04.1_lpia.deb
      Size/MD5:    23258 e280973f4522be895b4e3c06fcdf7a6f

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/j/jasper/libjasper-dev_1.900.1-3ubuntu0.8.04.1_powerpc.deb
      Size/MD5:   554736 e51d72ed422e517dd93602585732713a
    http://ports.ubuntu.com/pool/main/j/jasper/libjasper1_1.900.1-3ubuntu0.8.04.1_powerpc.deb
      Size/MD5:   151722 c11f4cdae73aac0cb3b265ba59fbfff0
    http://ports.ubuntu.com/pool/universe/j/jasper/libjasper-runtime_1.900.1-3ubuntu0.8.04.1_powerpc.deb
      Size/MD5:    32328 d168c11f56f84810e7ed072c615497a3

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/j/jasper/libjasper-dev_1.900.1-3ubuntu0.8.04.1_sparc.deb
      Size/MD5:   545368 e32366827751c4747af02d1706f23192
    http://ports.ubuntu.com/pool/main/j/jasper/libjasper1_1.900.1-3ubuntu0.8.04.1_sparc.deb
      Size/MD5:   136120 f6b6f67d4d6ce88fb1edc6f4528bb678
    http://ports.ubuntu.com/pool/universe/j/jasper/libjasper-runtime_1.900.1-3ubuntu0.8.04.1_sparc.deb
      Size/MD5:    24538 f8aba59b6f69e220cf6e68a3bfb71d37

Updated packages for Ubuntu 8.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/jasper_1.900.1-5ubuntu0.1.diff.gz
      Size/MD5:    52688 1b4d2d4ee9a459a451913b675b263d62
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/jasper_1.900.1-5ubuntu0.1.dsc
      Size/MD5:     1187 fb314df8a6f5247edb747987f8d76f02
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/jasper_1.900.1.orig.tar.gz
      Size/MD5:  1143400 4ae3dd938fd15f22f30577db5c9f27e9

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-dev_1.900.1-5ubuntu0.1_amd64.deb
      Size/MD5:   562142 c2f25e04c912a1b64c4dfce1eb7dd3d5
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper1_1.900.1-5ubuntu0.1_amd64.deb
      Size/MD5:   151868 6e8b66b557cc7a794c6c14fb6d588d81
    http://security.ubuntu.com/ubuntu/pool/universe/j/jasper/libjasper-runtime_1.900.1-5ubuntu0.1_amd64.deb
      Size/MD5:    25758 ca74bf783944c89242555b641b2e5f90

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper-dev_1.900.1-5ubuntu0.1_i386.deb
      Size/MD5:   550168 812497f62590b915fd0329e810295675
    http://security.ubuntu.com/ubuntu/pool/main/j/jasper/libjasper1_1.900.1-5ubuntu0.1_i386.deb
      Size/MD5:   143290 d9c1b2e6abca55d5fc8bd2a0408887d9
    http://security.ubuntu.com/ubuntu/pool/universe/j/jasper/libjasper-runtime_1.900.1-5ubuntu0.1_i386.deb
      Size/MD5:    23616 af8d3d8dcdf8ec7e92b470bd3e0edfc5

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/j/jasper/libjasper-dev_1.900.1-5ubuntu0.1_lpia.deb
      Size/MD5:   549832 8be0a5f2995b25b20cdb0bd8608a9b2d
    http://ports.ubuntu.com/pool/main/j/jasper/libjasper1_1.900.1-5ubuntu0.1_lpia.deb
      Size/MD5:   144942 6655936af1cd1a43455b25b5fca92c7e
    http://ports.ubuntu.com/pool/universe/j/jasper/libjasper-runtime_1.900.1-5ubuntu0.1_lpia.deb
      Size/MD5:    23516 dc7791cea2c443a07c9eba67944873b8

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/j/jasper/libjasper-dev_1.900.1-5ubuntu0.1_powerpc.deb
      Size/MD5:   557240 da2293d915a7fe54cb28af6d1c492dda
    http://ports.ubuntu.com/pool/main/j/jasper/libjasper1_1.900.1-5ubuntu0.1_powerpc.deb
      Size/MD5:   154072 885f88a8d11e3b2375fd7633b0d18f60
    http://ports.ubuntu.com/pool/universe/j/jasper/libjasper-runtime_1.900.1-5ubuntu0.1_powerpc.deb
      Size/MD5:    31458 f17ad2b7f030b844ef1bc01db1b07cd5

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/j/jasper/libjasper-dev_1.900.1-5ubuntu0.1_sparc.deb
      Size/MD5:   545474 cb6fdbec36215740768dde9466434151
    http://ports.ubuntu.com/pool/main/j/jasper/libjasper1_1.900.1-5ubuntu0.1_sparc.deb
      Size/MD5:   136986 1940aab6c284ec22bd70b4a5ee6b432a
    http://ports.ubuntu.com/pool/universe/j/jasper/libjasper-runtime_1.900.1-5ubuntu0.1_sparc.deb
      Size/MD5:    24666 2716a795c39dea1835cd9f69f9e061c3



--=-rdsP2lTg6iYlEkxNthlC
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEABECAAYFAknCiMMACgkQLMAs/0C4zNprRQCgu9+DT5m99kENUs/hxgYFZFH9
WFEAniCbVFlDKQi6L9ptrF99qSp1lqsI
=v6/Q
-----END PGP SIGNATURE-----

--=-rdsP2lTg6iYlEkxNthlC--

From - Thu Mar 19 17:11:46 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00006b4d
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-39796-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 33FD6EC8DD
for <lists@securityspace.com>; Thu, 19 Mar 2009 17:03:18 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id DF7C423709C; Thu, 19 Mar 2009 13:49:28 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 18567 invoked from network); 19 Mar 2009 19:57:57 -0000
X-Authentication-Warning: logo.rdu.rpath.com: elliot set sender to rPath Update Announcements <announce-noreply@rpath.com> using -r
Date: Thu, 19 Mar 2009 15:52:09 -0400
From: rPath Update Announcements <announce-noreply@rpath.com>
To: security-announce@lists.rpath.com,
update-announce@lists.rpath.com
Cc: full-disclosure@lists.grok.org.uk, vulnwatch@vulnwatch.org,
bugtraq@securityfocus.com, lwn@lwn.net
Subject: rPSA-2009-0050-1 ghostscript
Message-ID: <49c2a269.WAwxZmHM1ps0LV0y%announce-noreply@rpath.com>
User-Agent: nail 11.22 3/20/05
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Status:   

rPath Security Advisory: 2009-0050-1
Published: 2009-03-19
Products:
    rPath Linux 2

Rating: Minor
Exposure Level Classification:
    Indirect Deterministic Vulnerability
Updated Versions:
    ghostscript=conary.rpath.com@rpl:devel/8.61-2.1-1

rPath Issue Tracking System:
    https://issues.rpath.com/browse/RPL-2991

References:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584

Description:
    Previous versions of Ghostscript are potentially vulnerable to
    context-dependent attacks via integer overflows and missing upper
    bounds checks in Ghostscript's ICC library causing application
    crashes or even arbitrary code execution.

http://wiki.rpath.com/Advisories:rPSA-2009-0050

Copyright 2009 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html

From - Thu Mar 19 18:11:47 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00006b4f
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-39797-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id BECC4EC80B
for <lists@securityspace.com>; Thu, 19 Mar 2009 18:04:52 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 2617D143E8D; Thu, 19 Mar 2009 13:57:52 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 25733 invoked from network); 19 Mar 2009 20:50:40 -0000
Message-ID: <49C2B057.20502@ucon-conference.org>
Date: Thu, 19 Mar 2009 17:51:35 -0300
From: uCon Security Conference <ucon@ucon-conference.org>
MIME-Version: 1.0
To: bugtraq@securityfocus.com
Subject: Slides from uCon Security Conference 2009 available online
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Status:   

For those of you who were unable to attend to uCon 2009, speaker
presentations from this year's event
have been made available online.

Materials can be found at http://www.ucon-conference.org/archives.php

We also would like to thank all of you who joined us at the conference
and helped us make uCon a blast.

Best,
Organizing committee, uCon Security Conference
http://www.ucon-conference.org

From - Fri Mar 20 11:32:17 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00006b77
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-39798-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 8B753374027
for <lists@securityspace.com>; Fri, 20 Mar 2009 11:26:38 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 1A0D62370BD; Fri, 20 Mar 2009 08:15:08 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 27395 invoked from network); 19 Mar 2009 21:33:45 -0000
To: bugtraq@securityfocus.com
Subject: [ MDVSA-2009:060-1 ] nfs-utils
Date: Thu, 19 Mar 2009 22:35:00 +0100
From: security@mandriva.com
Reply-To: <xsecurity@mandriva.com>
Message-Id: <E1LkPtE-0005Tl-QR@titan.mandriva.com>
Status:   


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                       MDVSA-2009:060-1
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : nfs-utils
 Date    : March 19, 2009
 Affected: Corporate 4.0
 _______________________________________________________________________

 Problem Description:

 A security vulnerability has been identified and fixed in nfs-utils,
 which caused TCP Wrappers to ignore netgroups and allows remote
 attackers to bypass intended access restrictions (CVE-2008-4552).
 
 The updated packages have been patched to prevent this.

 Update:

 The Corporate Server 4 packages had the wrong release number (lower
 than before) which prevented the update packages from being installed
 automatically. This problem has now been solved with new packages
 with the correct release number.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4552
 _______________________________________________________________________

 Updated Packages:

 Corporate 4.0:
 1bb92fc5f96eed86f9fbb3ae3261de37  corporate/4.0/i586/nfs-utils-1.0.9-1.1.20060mlcs4.i586.rpm
 226ce45a4dc354996b6868410ac05591  corporate/4.0/i586/nfs-utils-clients-1.0.9-1.1.20060mlcs4.i586.rpm 
 945c778a1301d0b403eca96100327328  corporate/4.0/SRPMS/nfs-utils-1.0.9-1.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 433180096c5ec6346b205d5892fc19e6  corporate/4.0/x86_64/nfs-utils-1.0.9-1.1.20060mlcs4.x86_64.rpm
 40c5eccc5e8d6aa4bdab94737df05f10  corporate/4.0/x86_64/nfs-utils-clients-1.0.9-1.1.20060mlcs4.x86_64.rpm 
 945c778a1301d0b403eca96100327328  corporate/4.0/SRPMS/nfs-utils-1.0.9-1.1.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJwpADmqjQ0CJFipgRAlW7AKDtWCNjxmX0ScTaFbR6tkJl/KU6CACeIwpk
OqW8mHlmCoBNHC06RMO2GtE=eV
-----END PGP SIGNATURE-----

From - Fri Mar 20 11:42:17 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00006b78
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-39799-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id A7B1AED341
for <lists@securityspace.com>; Fri, 20 Mar 2009 11:35:59 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 309A52370D5; Fri, 20 Mar 2009 08:15:27 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 28659 invoked from network); 19 Mar 2009 22:29:25 -0000
Date: Thu, 19 Mar 2009 17:30:32 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Cc: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk
Subject: [USN-741-1] Thunderbird vulnerabilities
Message-ID: <20090319223032.GI6143@severus.strandboge.com>
Reply-To: Jamie Strandboge <jamie@canonical.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="svExV93C05KqedWb"
Content-Disposition: inline
User-Agent: Mutt/1.5.18 (2008-05-17)
Status:   


--svExV93C05KqedWb
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================Ubuntu Security Notice USN-741-1             March 19, 2009
mozilla-thunderbird, thunderbird vulnerabilities
CVE-2009-0352, CVE-2009-0772, CVE-2009-0774, CVE-2009-0776
==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.10
Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  mozilla-thunderbird             1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1

Ubuntu 7.10:
  thunderbird                     2.0.0.21+nobinonly-0ubuntu0.7.10.1

Ubuntu 8.04 LTS:
  thunderbird                     2.0.0.21+nobinonly-0ubuntu0.8.04.1

Ubuntu 8.10:
  thunderbird                     2.0.0.21+nobinonly-0ubuntu0.8.10.1

After a standard system upgrade you need to restart Thunderbird to effect
the necessary changes.

Details follow:

Several flaws were discovered in the browser engine. If Javascript were
enabled, an attacker could exploit these flaws to crash Thunderbird and
possibly execute arbitrary code with user privileges. (CVE-2009-0352)

Jesse Ruderman and Gary Kwong discovered flaws in the browser engine. If a
user had Javascript enabled, these problems could allow a remote attacker to
cause a denial of service or possibly execute arbitrary code with the
privileges of the user invoking the program. (CVE-2009-0772, CVE-2009-0774)

Georgi Guninski discovered a flaw when Thunderbird performed a cross-domain
redirect. If a user had Javascript enabled, an attacker could bypass the
same-origin policy in Thunderbird by utilizing nsIRDFService and steal
private data from users authenticated to the redirected website.
(CVE-2009-0776)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1.diff.gz
      Size/MD5:   457824 144d15ccf9a7e28489c3f41a8aefe443
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1.dsc
      Size/MD5:     1688 225f20dff306611652e1b5e0e5d360c2
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614k.orig.tar.gz
      Size/MD5: 38724498 65b0015f87bc747b4cf0f04dc2b7e27d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_amd64.deb
      Size/MD5:  3594394 5a4c8b8e31439bcc050d6c281ca60254
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_amd64.deb
      Size/MD5:   195084 2902df0778522658df85879f54cfac60
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_amd64.deb
      Size/MD5:    60322 846098744687e2bd4595cfef13ad19c7
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_amd64.deb
      Size/MD5: 12123246 3ae785e21196bdd1c8222a2edf573955

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_i386.deb
      Size/MD5:  3588464 241cccce723c15b55ce4a1401b36d80d
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_i386.deb
      Size/MD5:   188526 d1f442802db68f5b1e5de805481c6e37
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_i386.deb
      Size/MD5:    55846 aab2beeb7e32cbb962e9c4a0c2a63881
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_i386.deb
      Size/MD5: 10392218 a5b70ef2eabd8e3181edad4a50d415dc

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_powerpc.deb
      Size/MD5:  3593750 f37628f7bf32eaa6e699f655b3befbf8
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_powerpc.deb
      Size/MD5:   191822 17a85da976cc03c494b393c0ff2bb3c4
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_powerpc.deb
      Size/MD5:    59500 8f40936424e6e74d51ac541da51ea89b
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_powerpc.deb
      Size/MD5: 11678748 7fb3d49ea6c5506137a6219bc52bafd9

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_sparc.deb
      Size/MD5:  3590326 d64a1ebdf60860d3c7fc539db0fe568f
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_sparc.deb
      Size/MD5:   189258 80649934d69244fb24aca9fffb7cab62
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_sparc.deb
      Size/MD5:    57328 0c7a072ab6c187cb078c772e5f02b505
    http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614k-0ubuntu0.6.06.1_sparc.deb
      Size/MD5: 10871856 49a20809bce51fae4aa21e8f1ba927a0

Updated packages for Ubuntu 7.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.7.10.1.diff.gz
      Size/MD5:   125774 220e3fea6369826758a4c35918172c0f
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.7.10.1.dsc
      Size/MD5:     2321 23dc369f38cdbd2a7eb25cf5a77f1b82
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly.orig.tar.gz
      Size/MD5: 37904706 37b085244fed28172a42744f16c2f105

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/mozilla-thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.7.10.1_all.deb
      Size/MD5:    59232 529687fb6744db8b8211eaca95c0d57c
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/mozilla-thunderbird_2.0.0.21+nobinonly-0ubuntu0.7.10.1_all.deb
      Size/MD5:    59218 a0b74e6067af1602fec9851ae8bc6fd9

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.7.10.1_amd64.deb
      Size/MD5:  3782668 10119ceeeab5fa6c1a080eb3688bbffa
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.7.10.1_amd64.deb
      Size/MD5:    85390 423affc0fcc0607909a7d91b27bbb43b
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.7.10.1_amd64.deb
      Size/MD5: 12429022 b34c5f45229f665387112324d5927463

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.7.10.1_i386.deb
      Size/MD5:  4001090 7be3c415ca8f823d5bd3068c6da1f493
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.7.10.1_i386.deb
      Size/MD5:    80246 57aa46088dfa3c0c3505182cdc5195fb
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.7.10.1_i386.deb
      Size/MD5: 11026334 eb1d1e71c07071b0a5b69b404e3a1d1e

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.7.10.1_lpia.deb
      Size/MD5:  3767712 1d0fc779f4f9fc6ce151e83e343fe7f1
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.7.10.1_lpia.deb
      Size/MD5:    80458 e91be09dcbab0502902a9ffe79cc920a
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.7.10.1_lpia.deb
      Size/MD5: 10837588 ab9f35953207e1ca2c38e6ae0fb1fb18

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.7.10.1_powerpc.deb
      Size/MD5:  3786732 a3f7f69db0eba57fb0e5eae419d9c9e2
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.7.10.1_powerpc.deb
      Size/MD5:    83786 b2e5e838dfcc98818b12236a62c9e531
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.7.10.1_powerpc.deb
      Size/MD5: 12272394 f91f7c4b6ada5298972b6f3f8ee8ddc0

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.7.10.1_sparc.deb
      Size/MD5:  3768028 fada7feaa42bbb99917a3d0a76adf4c8
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.7.10.1_sparc.deb
      Size/MD5:    80158 83fc5a17e6b15270097cdd3c81f2a4d3
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.7.10.1_sparc.deb
      Size/MD5: 11265358 e3630ccbcabd9b8437e8aa3eff46e77c

Updated packages for Ubuntu 8.04 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.04.1.diff.gz
      Size/MD5:   129331 b6c40e9e7f4868829ef64ca0feed2f04
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.04.1.dsc
      Size/MD5:     2319 8cab7e706371e4fd4fb7050a146ded64
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly.orig.tar.gz
      Size/MD5: 37904706 37b085244fed28172a42744f16c2f105

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/mozilla-thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    60532 9a7544291d592387b1b1b5301f77f740
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/mozilla-thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    60520 b389198436a712fbb96ddd7ed6f6c1a4

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.8.04.1_amd64.deb
      Size/MD5:  3783654 837816a7a8b527be51d46e1d434c9a47
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.8.04.1_amd64.deb
      Size/MD5:    85412 e76d5ad55d1866dcea849c05dbce4471
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.04.1_amd64.deb
      Size/MD5: 12410314 d7d829a49129462f1cf95a59242bf056

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.8.04.1_i386.deb
      Size/MD5:  3770490 e89b5595146a414265c8725492bc7bb8
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.8.04.1_i386.deb
      Size/MD5:    80818 b46cffa37ed38bf1932af4da73012b8a
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.04.1_i386.deb
      Size/MD5: 10982186 c1dfe6e42c118517ad5e684112d97ec0

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.8.04.1_lpia.deb
      Size/MD5:  3768194 7bb50ae78ccf6de6e3b017ac80bd2993
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.8.04.1_lpia.deb
      Size/MD5:    80558 6f2c57cb545705ec7dcd11f6575235e4
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.04.1_lpia.deb
      Size/MD5: 10828284 473a4f1e04e87f4f095d54dbae1199d0

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.8.04.1_powerpc.deb
      Size/MD5:  3787486 940382362442149412f1f2cc3410c280
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.8.04.1_powerpc.deb
      Size/MD5:    83810 a521a98522fd1cbf799c3bead1dccfa3
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.04.1_powerpc.deb
      Size/MD5: 12254512 1ad70557833ee5fee0d823754d36daa4

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.8.04.1_sparc.deb
      Size/MD5:  3768708 f2ef9618b5402c3d6add76f4710de730
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.8.04.1_sparc.deb
      Size/MD5:    80260 5941e85bde6f1ba7eb87af5b970b576e
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.04.1_sparc.deb
      Size/MD5: 11255102 91126d6bed2f581bf6428f1452a3d6d5

Updated packages for Ubuntu 8.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.10.1.diff.gz
      Size/MD5:   130128 489090af195632bc0f5b2da9ef03135c
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.10.1.dsc
      Size/MD5:     2301 b95fa0c819729304e7e4e1914d28248c
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly.orig.tar.gz
      Size/MD5: 37904706 37b085244fed28172a42744f16c2f105

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/mozilla-thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    60834 b2e8e124904e847f8e9ae20fc76ec2be
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/mozilla-thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    60822 2f3c9e2df78c69dc4cae8f1e45b888f2

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.8.10.1_amd64.deb
      Size/MD5:  3737130 e886530814cd6e4328a2f36d491d6282
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.8.10.1_amd64.deb
      Size/MD5:    85576 7b1e37578dfcc61c337eabef0b0b042f
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.10.1_amd64.deb
      Size/MD5: 12437796 b670f40d4cda06dd244f958a6c3017c3

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.8.10.1_i386.deb
      Size/MD5:  3721708 f82aebb9b58c9cb3e2febf68dd151ad7
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.8.10.1_i386.deb
      Size/MD5:    81176 63ad7320a9cab551fc55b5c3b4bcdadf
    http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.10.1_i386.deb
      Size/MD5: 11042916 e5cc62bcae7bc3088b3c4441a4aac2f9

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.8.10.1_lpia.deb
      Size/MD5:  3718244 fd44cb9fe294e7a8a0074d79048e4c72
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.8.10.1_lpia.deb
      Size/MD5:    80862 c59d3623c493ae256791e7d01a413c20
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.10.1_lpia.deb
      Size/MD5: 10863820 524cf7ddfce3a84e4ead000a6d709aeb

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.8.10.1_powerpc.deb
      Size/MD5:  3736116 9772c5a74c2e54000edd941722c727b6
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.8.10.1_powerpc.deb
      Size/MD5:    84050 72e9368d17ec2c3e6ecd7f3967e84434
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.10.1_powerpc.deb
      Size/MD5: 12216224 a8228436f52aa5de5eebeec57f4c28e9

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_2.0.0.21+nobinonly-0ubuntu0.8.10.1_sparc.deb
      Size/MD5:  3724256 fecbfa0b07e847da2002c70eb39733b7
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.21+nobinonly-0ubuntu0.8.10.1_sparc.deb
      Size/MD5:    80888 c125eac7b058bbc56d65b08d3efd0941
    http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_2.0.0.21+nobinonly-0ubuntu0.8.10.1_sparc.deb
      Size/MD5: 11191468 dcc75b07a98e5b31a3df9d52eaf3bbf8


New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.