Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

===========================================================
Ubuntu Security Notice USN-691-1          December 16, 2008
ruby1.9 vulnerability
CVE-2008-3443, CVE-2008-3790
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.10:
  ruby1.9                         1.9.0.2-7ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Laurent Gaffie discovered that Ruby did not properly check for memory
allocation failures. If a user or automated system were tricked into
running a malicious script, an attacker could cause a denial of
service. (CVE-2008-3443)

This update also fixes a regression in the upstream patch previously
applied to fix CVE-2008-3790. The regression would cause parsing of
some XML documents to fail.


Updated packages for Ubuntu 8.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1.diff.gz
      Size/MD5:    49454 02828291d0b8db94d06dbc6be804b58b
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1.dsc
      Size/MD5:     1771 5d3434eeadde20df96b78b4a959112f2
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2.orig.tar.gz
      Size/MD5:  6407910 2a848b81ed1d6393b88eec8aa6173b75

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/irb1.9_1.9.0.2-7ubuntu1.1_all.deb
      Size/MD5:    57440 7c3c984736fd87485a9dfa0e8065afcc
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/rdoc1.9_1.9.0.2-7ubuntu1.1_all.deb
      Size/MD5:   112262 a2afb0c815463a14b51eff6199d10661
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/ri1.9_1.9.0.2-7ubuntu1.1_all.deb
      Size/MD5:   971786 57646618dddada4562990b3eb1c787b6
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/ruby1.9-elisp_1.9.0.2-7ubuntu1.1_all.deb
      Size/MD5:    31094 4e2ac93f161570ff11b5d39d5912bfce
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/ruby1.9-examples_1.9.0.2-7ubuntu1.1_all.deb
      Size/MD5:    64354 8a9aca7db601358141fd19d85ea45751

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_amd64.deb
      Size/MD5:  2113618 bc410c5116879cd05234451e2fbc1447
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
      Size/MD5:  2275308 5863e492367db5313ac068c5dde703e9
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_amd64.deb
      Size/MD5:   943252 1c8a27569a60edf9e4aabb7b7716967f
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
      Size/MD5:    26536 86aa87a261a57d1d67edb397671b20b4
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
      Size/MD5:    12544 eeb030e448f92081b3c05fe696011142
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
      Size/MD5:    11838 b8c61c3b7435de2752b46bb75331ca3c
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
      Size/MD5:   134340 258bed110d062a4b96b02b558b08a412
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
      Size/MD5:    11638 6e3898a64f7dcccf444be54599313a17
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
      Size/MD5:  1745708 58a02a0dfa5d27ff0bb011acb635ed80

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_i386.deb
      Size/MD5:  1921126 690079b204fc118f99876ed462371de5
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
      Size/MD5:  2127706 3dd6e4cd3c8adf46db14d45574ffd0ec
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_i386.deb
      Size/MD5:   889504 c2fe2150cb1c8a15f855c42a52c424ef
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
      Size/MD5:    26324 97f33c71e37213e31af3e400e3687a9d
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
      Size/MD5:    11186 4f749b40168d0b0235d49082b981694f
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
      Size/MD5:    10598 44b212294eb892c174bde278bb9e97cb
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
      Size/MD5:   118168 178e91fd4562e351835bfb9902ba4c61
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
      Size/MD5:    10818 8c041f2499bb45935b185e82a8e40b3a
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
      Size/MD5:  1738394 8c37885e72e5f00d7b4281885478bc6c

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_lpia.deb
      Size/MD5:  1951024 4f5e0733a3f49d53ca008ffcecf0c2de
    http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
      Size/MD5:  2105434 535e2f90d7471df4fbdb766e48bf8c91
    http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_lpia.deb
      Size/MD5:   874130 473f3817d976736b04d4237e179a9c6f
    http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
      Size/MD5:    26300 6d016c54f454eb4654facd88c1ae0a13
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
      Size/MD5:    11248 44a9b7e75e49660021284d7d6604ccff
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
      Size/MD5:    10420 4f3e626250d8d16256e771135f80f4f4
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
      Size/MD5:   117570 b62300ef68d2655d837a0aed5d0bd054
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
      Size/MD5:    10746 a82cc7f12682aba7b583ec86cd13f55e
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
      Size/MD5:  1737900 60a1f240342ab4ec317c1c0cf9c6e288

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_powerpc.deb
      Size/MD5:  2091776 d37a509a3fc9bcbc145e645f7766f269
    http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
      Size/MD5:  2243518 af2e9a1ec3ca58e27f1f450d73fd9610
    http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_powerpc.deb
      Size/MD5:   901944 a7d7281252ec2325d634dd9857a80159
    http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
      Size/MD5:    28734 0ecd088dcfe450dc224550ff4cb2846a
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
      Size/MD5:    14040 e5d5eb44f95ab85d5219a98e1ef3ae37
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
      Size/MD5:    13318 e7e41a81b7155e3a8ab28f0905b0d084
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
      Size/MD5:   133012 25e742b2556294b87f8563be9f622f56
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
      Size/MD5:    13556 f1f4a0574e284023b1734d48db0f19c8
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
      Size/MD5:  1747252 33ef64fd198e65ee8919e8409aaea08d

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_sparc.deb
      Size/MD5:  1803982 09d9b480b214361a46549de31f99e849
    http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
      Size/MD5:  2109258 731ae4bcad17cf2f0fa70a3bbc0ed490
    http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_sparc.deb
      Size/MD5:   883296 2ee2efc0f3c6d42bbc3ef765e346bd7b
    http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
      Size/MD5:    26526 b2af0ad31ed80fa28cbdd24f5fabe6b7
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
      Size/MD5:    11212 c6dd5248b2680527df86081bbd7f58cc
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
      Size/MD5:    10430 e24df579da217e1a47a2d7010c9408f9
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
      Size/MD5:   124360 52fbc1543bdc80153b92113320a324c5
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
      Size/MD5:    10856 504a25a03a0a79818536e0f967b4b904
    http://ports.ubuntu.com/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
      Size/MD5:  1740490 df138fac9cfb1d0b5cbab685e8738167



--=-e2uKS+RMIdU9OmIXdpSo
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEABECAAYFAklHxtQACgkQLMAs/0C4zNpfPwCbBZiIDIpGtAQYuUCLFboosRVo
C7IAmwUIMDC+0Ay9aY6PYnHKREeDcLIj
=ZWBC
-----END PGP SIGNATURE-----

--=-e2uKS+RMIdU9OmIXdpSo--

From - Tue Dec 16 16:40:25 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051af
X-Mozilla-Status: 0011
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38950-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 1C8D3EC12C
for <lists@securityspace.com>; Tue, 16 Dec 2008 16:37:16 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 8CBF923706E; Tue, 16 Dec 2008 14:01:34 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 7025 invoked from network); 16 Dec 2008 17:35:01 -0000
Date: Tue, 16 Dec 2008 10:38:38 -0700
Message-Id: <200812161738.mBGHcckE007671@www3.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.420 (Entity 5.420)
From: philip.robertson@oovoo.com
To: bugtraq@securityfocus.com
Subject: Re: ooVoo 1.7.1.35 (URL Protocol) remote unicode buffer overflow poc
Status:   

The vulnerability you observed in ooVoo 1.7.1.57 was corrected in the updated 1.7.1.59 version of ooVoo. Please make the amendment to the advisory. 

Thank you for your assistance. 

Please feel free to contact me with any further updates or requests for information. I'm more than happy to help.

Best regards,

Philip Robertson
ooVoo
philip.robertson@oovoo.com

From - Tue Dec 16 17:00:26 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051b1
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38952-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id D4F41EC131
for <lists@securityspace.com>; Tue, 16 Dec 2008 16:54:49 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id DE41B237148; Tue, 16 Dec 2008 14:03:21 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 8864 invoked from network); 16 Dec 2008 18:56:00 -0000
X-EDSINT-Source-Ip: 205.142.126.149
From: zdi-disclosures@3com.com
To: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com
Cc: zdi-disclosures@3com.com
Subject: ZDI-08-088: Oracle E-Business Suite Business Intelligence SQL Injection
 Vulnerability
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 7.0.3 September 26, 2007
Message-ID: <OFA37A51A4.C327AA7C-ON85257521.006997E5-86257521.0069AC8C@3com.com>
Sender: Cameron_Hotchkies@3com.com
Date: Tue, 16 Dec 2008 13:14:14 -0600
X-MIMETrack: Serialize by Router on USUT001/US/3Com(Release 6.5.5FP2|October 23, 2006) at
 12/16/2008 11:14:18 AM,
Serialize complete at 12/16/2008 11:14:18 AM
Content-Type: text/plain;
charset="US-ASCII"
Content-Transfer-Encoding: base64
Status:   

WkRJLTA4LTA4ODogT3JhY2xlIEUtQnVzaW5lc3MgU3VpdGUgQnVzaW5lc3MgSW50ZWxsaWdlbmNl
IFNRTCBJbmplY3Rpb24gDQpWdWxuZXJhYmlsaXR5DQpodHRwOi8vd3d3Lnplcm9kYXlpbml0aWF0
aXZlLmNvbS9hZHZpc29yaWVzL1pESS0wOC0wODgNCkRlY2VtYmVyIDE2LCAyMDA4DQoNCi0tIEFm
ZmVjdGVkIFZlbmRvcnM6DQpPcmFjbGUNCg0KLS0gQWZmZWN0ZWQgUHJvZHVjdHM6DQpPcmFjbGUg
RGF0YWJhc2UgU2VydmVyDQoNCi0tIFRpcHBpbmdQb2ludChUTSkgSVBTIEN1c3RvbWVyIFByb3Rl
Y3Rpb246DQpUaXBwaW5nUG9pbnQgSVBTIGN1c3RvbWVycyBoYXZlIGJlZW4gcHJvdGVjdGVkIGFn
YWluc3QgdGhpcw0KdnVsbmVyYWJpbGl0eSBieSBEaWdpdGFsIFZhY2NpbmUgcHJvdGVjdGlvbiBm
aWx0ZXIgSUQgNDkyMS4gDQpGb3IgZnVydGhlciBwcm9kdWN0IGluZm9ybWF0aW9uIG9uIHRoZSBU
aXBwaW5nUG9pbnQgSVBTLCB2aXNpdDoNCg0KICAgIGh0dHA6Ly93d3cudGlwcGluZ3BvaW50LmNv
bQ0KDQotLSBWdWxuZXJhYmlsaXR5IERldGFpbHM6DQpUaGlzIHZ1bG5lcmFiaWxpdHkgYWxsb3dz
IHJlbW90ZSBhdHRhY2tlcnMgdG8gaW5qZWN0IGFyYml0cmFyeSBTUUwgb24NCnZ1bG5lcmFibGUg
aW5zdGFsbGF0aW9ucyBvZiBPcmFjbGUgRS1CdXNpbmVzcyBTdWl0ZSBCdXNpbmVzcw0KSW50ZWxs
aWdlbmNlLiBBdXRoZW50aWNhdGlvbiBpcyBub3QgcmVxdWlyZWQgdG8gZXhwbG9pdCB0aGlzDQp2
dWxuZXJhYmlsaXR5Lg0KDQpUaGUgc3BlY2lmaWMgZmxhdyBleGlzdHMgaW4gdGhlIEFQUFMuSUNY
U1VQV0YuRGlzcGxheUNvbnRhY3RzIHBhY2thZ2UuDQpUaGUgcHJvY2VkdXJlIGZhaWxzIHRvIHZh
bGlkYXRlIHRoZSBjb250ZW50cyBvZiBhIFdIRVJFIGNsYXVzZQ0KY29udGFpbmluZyB1c2VyLXN1
cHBsZWQgaW5wdXQuIFRoaXMgYWxsb3dzIGFuIGF0dGFja2VyIHRvIGV4ZWN1dGUNCmFyYml0cmFy
eSBTUUwgc3RhdGVtZW50cyBpbiB0aGUgY29udGV4dCBvZiB0aGUgQVBQUyB1c2VyLg0KDQotLSBW
ZW5kb3IgUmVzcG9uc2U6DQpPcmFjbGUgaGFzIGlzc3VlZCBhbiB1cGRhdGUgdG8gY29ycmVjdCB0
aGlzIHZ1bG5lcmFiaWxpdHkuIE1vcmUNCmRldGFpbHMgY2FuIGJlIGZvdW5kIGF0Og0KDQpodHRw
Oi8vd3d3Lm9yYWNsZS5jb20vdGVjaG5vbG9neS9kZXBsb3kvc2VjdXJpdHkvY3JpdGljYWwtcGF0
Y2gtdXBkYXRlcy9jcHVhcHIyMDA4Lmh0bWwNCg0KLS0gRGlzY2xvc3VyZSBUaW1lbGluZToNCjIw
MDctMDEtMjkgLSBWdWxuZXJhYmlsaXR5IHJlcG9ydGVkIHRvIHZlbmRvcg0KMjAwOC0xMi0xNiAt
IENvb3JkaW5hdGVkIHB1YmxpYyByZWxlYXNlIG9mIGFkdmlzb3J5DQoNCi0tIENyZWRpdDoNClRo
aXMgdnVsbmVyYWJpbGl0eSB3YXMgZGlzY292ZXJlZCBieToNCiAgICAqIEpveGVhbiBLb3JldA0K
DQotLSBBYm91dCB0aGUgWmVybyBEYXkgSW5pdGlhdGl2ZSAoWkRJKToNCkVzdGFibGlzaGVkIGJ5
IFRpcHBpbmdQb2ludCwgVGhlIFplcm8gRGF5IEluaXRpYXRpdmUgKFpESSkgcmVwcmVzZW50cyAN
CmEgYmVzdC1vZi1icmVlZCBtb2RlbCBmb3IgcmV3YXJkaW5nIHNlY3VyaXR5IHJlc2VhcmNoZXJz
IGZvciByZXNwb25zaWJseQ0KZGlzY2xvc2luZyBkaXNjb3ZlcmVkIHZ1bG5lcmFiaWxpdGllcy4N
Cg0KUmVzZWFyY2hlcnMgaW50ZXJlc3RlZCBpbiBnZXR0aW5nIHBhaWQgZm9yIHRoZWlyIHNlY3Vy
aXR5IHJlc2VhcmNoDQp0aHJvdWdoIHRoZSBaREkgY2FuIGZpbmQgbW9yZSBpbmZvcm1hdGlvbiBh
bmQgc2lnbi11cCBhdDoNCg0KICAgIGh0dHA6Ly93d3cuemVyb2RheWluaXRpYXRpdmUuY29tDQoN
ClRoZSBaREkgaXMgdW5pcXVlIGluIGhvdyB0aGUgYWNxdWlyZWQgdnVsbmVyYWJpbGl0eSBpbmZv
cm1hdGlvbiBpcw0KdXNlZC4gVGlwcGluZ1BvaW50IGRvZXMgbm90IHJlLXNlbGwgdGhlIHZ1bG5l
cmFiaWxpdHkgZGV0YWlscyBvciBhbnkNCmV4cGxvaXQgY29kZS4gSW5zdGVhZCwgdXBvbiBub3Rp
ZnlpbmcgdGhlIGFmZmVjdGVkIHByb2R1Y3QgdmVuZG9yLA0KVGlwcGluZ1BvaW50IHByb3ZpZGVz
IGl0cyBjdXN0b21lcnMgd2l0aCB6ZXJvIGRheSBwcm90ZWN0aW9uIHRocm91Z2gNCml0cyBpbnRy
dXNpb24gcHJldmVudGlvbiB0ZWNobm9sb2d5LiBFeHBsaWNpdCBkZXRhaWxzIHJlZ2FyZGluZyB0
aGUNCnNwZWNpZmljcyBvZiB0aGUgdnVsbmVyYWJpbGl0eSBhcmUgbm90IGV4cG9zZWQgdG8gYW55
IHBhcnRpZXMgdW50aWwNCmFuIG9mZmljaWFsIHZlbmRvciBwYXRjaCBpcyBwdWJsaWNseSBhdmFp
bGFibGUuIEZ1cnRoZXJtb3JlLCB3aXRoIHRoZQ0KYWx0cnVpc3RpYyBhaW0gb2YgaGVscGluZyB0
byBzZWN1cmUgYSBicm9hZGVyIHVzZXIgYmFzZSwgVGlwcGluZ1BvaW50DQpwcm92aWRlcyB0aGlz
IHZ1bG5lcmFiaWxpdHkgaW5mb3JtYXRpb24gY29uZmlkZW50aWFsbHkgdG8gc2VjdXJpdHkNCnZl
bmRvcnMgKGluY2x1ZGluZyBjb21wZXRpdG9ycykgd2hvIGhhdmUgYSB2dWxuZXJhYmlsaXR5IHBy
b3RlY3Rpb24gb3INCm1pdGlnYXRpb24gcHJvZHVjdC4NCg0KT3VyIHZ1bG5lcmFiaWxpdHkgZGlz
Y2xvc3VyZSBwb2xpY3kgaXMgYXZhaWxhYmxlIG9ubGluZSBhdDoNCg0KICAgIGh0dHA6Ly93d3cu
emVyb2RheWluaXRpYXRpdmUuY29tL2Fkdmlzb3JpZXMvZGlzY2xvc3VyZV9wb2xpY3kvDQoNCkNP
TkZJREVOVElBTElUWSBOT1RJQ0U6IFRoaXMgZS1tYWlsIG1lc3NhZ2UsIGluY2x1ZGluZyBhbnkg
YXR0YWNobWVudHMsDQppcyBiZWluZyBzZW50IGJ5IDNDb20gZm9yIHRoZSBzb2xlIHVzZSBvZiB0
aGUgaW50ZW5kZWQgcmVjaXBpZW50KHMpIGFuZA0KbWF5IGNvbnRhaW4gY29uZmlkZW50aWFsLCBw
cm9wcmlldGFyeSBhbmQvb3IgcHJpdmlsZWdlZCBpbmZvcm1hdGlvbi4NCkFueSB1bmF1dGhvcml6
ZWQgcmV2aWV3LCB1c2UsIGRpc2Nsb3N1cmUgYW5kL29yIGRpc3RyaWJ1dGlvbiBieSBhbnkgDQpy
ZWNpcGllbnQgaXMgcHJvaGliaXRlZC4gIElmIHlvdSBhcmUgbm90IHRoZSBpbnRlbmRlZCByZWNp
cGllbnQsIHBsZWFzZQ0KZGVsZXRlIGFuZC9vciBkZXN0cm95IGFsbCBjb3BpZXMgb2YgdGhpcyBt
ZXNzYWdlIHJlZ2FyZGxlc3Mgb2YgZm9ybSBhbmQNCmFueSBpbmNsdWRlZCBhdHRhY2htZW50cyBh
bmQgbm90aWZ5IDNDb20gaW1tZWRpYXRlbHkgYnkgY29udGFjdGluZyB0aGUNCnNlbmRlciB2aWEg
cmVwbHkgZS1tYWlsIG9yIGZvcndhcmRpbmcgdG8gM0NvbSBhdCBwb3N0bWFzdGVyQDNjb20uY29t
LiANCg=
From - Tue Dec 16 17:10:28 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051b2
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38953-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 3AD73EC131
for <lists@securityspace.com>; Tue, 16 Dec 2008 17:04:06 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 0D41F236F37; Tue, 16 Dec 2008 14:46:25 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 11286 invoked from network); 16 Dec 2008 21:07:46 -0000
Date: Tue, 16 Dec 2008 14:11:24 -0700
Message-Id: <200812162111.mBGLBOaM000724@www3.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.420 (Entity 5.420)
From: marian.ventuneac@ul.ie
To: bugtraq@securityfocus.com
Subject: CVE-2008-1094 - Barracuda Span Firewall SQL Injection Vulnerability
Status:   

CVE Number: CVE-2008-1094
Vulnerability: SQL Injection 
Risk: Medium
Attack vector: From Remote

Vulnerability Discovered: 16th June 2008
Vendor Notified: 16th June 2008
Advisory Released: 15th December 2008


Abstract

Barracuda Networks Spam Firewall is vulnerable to various SQL Injection attacks. When exploited by an authenticated user, the identified vulnerability can lead to Denial of Service, Database Information Disclosure, etc.


Description

The index.cgi resource was identified as being susceptible to SQL Injection attacks. 
When filtering user accounts in Users->Account View section, the pattern_x parameter (where x = 0..n) allows inserting arbitrary SQL code once filter_x parameter is set to search_count_equals� value.

/cgi-bin/index.cgi?&user=&password=&et=&auth_type=Local&locale=en_US&realm=&primary_tab=USERS&secondary_tabper_user_account_view&boolean_0=boolean_and&filter_0=search_count_equals&pattern_0=if(database() like concat(char(99),char(37)),5,0)

An attacker can exploit this vulnerability by injecting arbitrary SQL code to be executed as part of the SQL query.


Original Advisory:

http://dcsl.ul.ie/advisories/02.htm


Barracuda Networks Technical Alert

http://www.barracudanetworks.com/ns/support/tech_alert.php


Affected Versions

Barracuda Spam Firewall (Firmware v3.5.11.020, Model 600)

Other products/versions might be affected.


Mitigation

Vendor recommends to the following firmware version

Barracuda Spam Firewall (Firmware v3.5.12.001)

Alternatively, please contact Barracuda Networks for technical support.


Credits

Dr. Marian Ventuneac, marian.ventuneac@ul.ie
Data Communication Security Laboratory, Department of Electronic & Computer Engineering, University of Limerick


Disclaimer

Data Communication Security Laboratory releases this information with the vendor acceptance. DCSL is not responsible for any malicious application of the information presented in this advisory. 

From - Tue Dec 16 17:20:25 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051b4
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38954-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 515AEEC131
for <lists@securityspace.com>; Tue, 16 Dec 2008 17:13:48 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 7695D2371BB; Tue, 16 Dec 2008 14:47:04 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 11401 invoked from network); 16 Dec 2008 21:10:57 -0000
Date: 16 Dec 2008 21:29:33 -0000
Message-ID: <20081216212933.8608.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.411 (Entity 5.404)
From: marian.ventuneac@ul.ie
To: bugtraq@securityfocus.com
Subject: CVE-2008-0971 - Barracuda Networks products Multiple Cross-Site
 Scripting Vulnerabilities
Status:   


CVE Numbers: CVE-2008-0971
Vulnerabilities: Multiple Cross-Site Scripting (Persistent & Reflected)
Risk: Medium
Attack vector: From Remote

Vulnerabilities Discovered: 16th June 2008
Vendor Notified: 16th June 2008
Advisory Released: 15th December 2008


Abstract

Barracuda Networks Message Archiver product is vulnerable to persistent and reflected Cross-Site Scripting (XSS) attacks. Barracuda Spam Firewall, IM Firewall and Web Filter products are vulnerable to multiple reflected XSS attacks. When exploited by an authenticated user, the identified vulnerabilities can lead to Information Disclosure, Session Hijack, 
access to Intranet available servers, etc.


Description

The index.cgi resource was identified as being susceptible to multiple persistent and reflected Cross Site Scripting (XSS) 
attacks. 

a. Persistent XSS in Barracuda Message Archiver 

In Search Based Retention Policy, the Policy Name field allows persistent XSS when set to something like policy_name" onblur="alert('xss')

b. Reflected XSS in Barracuda Message Archiver 

Setting various parameters in IP Configuration, Administration, Journal Accounts, Retention Policy, and GroupWise Sync allow 
reflected XSS attacks.

c. Reflected XSS in Barracuda Spam Firewall, IM Firewall and Web Filter

  �  User provided input is not sanitised when displayed as part of error messages - identified in all verified products.
  �  User provided input is not sanitised when used to perform various searches - identified in Barracuda Web Filter.
  �  Manipulation of HTML INPUT hidden elements - identified in all verified products.
  e.g auth_type INPUT hidden element allows a reflected XSS attack when set to something like 
 Local"><script>alert('xss')</script>


Original Advisory:

http://dcsl.ul.ie/advisories/03.htm


Barracuda Networks Technical Alert

http://www.barracudanetworks.com/ns/support/tech_alert.php


Affected Versions

Barracuda Message Archiver (Firmware v1.1.0.010, Model 350)
Barracuda Spam Firewall (Firmware v3.5.11.020, Model 600)
Barracuda Web Filter (Firmware v3.3.0.038, Model 910)
Barracuda IM Firewall (Firmware v3.0.01.008, Model 420)

Other models/firmware versions might be affected.


Mitigation

Vendor recommends upgrading to the following firmware version:

Barracuda Message Archiver Release 1.2.1.002 (2008-07-22)
Barracuda Spam Firewall Release 3.5.12.007 (2008-10-24)
Barracuda Web Filter Release 3.3.0.052 (2008-08-04)
Barracuda IM Firewall Release 3.1.01.017 (2008-07-02)
Barracuda Load Balancer Release 2.3.024 (2008-10-20)

Alternatively, please contact Barracuda Networks for technical support.


Credits

Dr. Marian Ventuneac, marian.ventuneac@ul.ie
Data Communication Security Laboratory, Department of Electronic & Computer Engineering, University of Limerick


Disclaimer

Data Communication Security Laboratory releases this information with the vendor acceptance. DCSL is not responsible for any malicious application of the information presented in this advisory. 

From - Tue Dec 16 18:40:24 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051b8
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38955-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id AC32EEC131
for <lists@securityspace.com>; Tue, 16 Dec 2008 18:34:30 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 4D36A143C94; Tue, 16 Dec 2008 15:24:47 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 13290 invoked from network); 16 Dec 2008 21:38:37 -0000
From: Hanno =?utf-8?q?Böck?= <hanno@hboeck.de>
To: bugtraq@securityfocus.com
Subject: Joomla: Session hijacking vulnerability, CVE-2008-4122
Date: Tue, 16 Dec 2008 22:56:23 +0100
User-Agent: KMail/1.9.10
Cc: full-disclosure@lists.grok.org.uk
MIME-Version: 1.0
Content-Type: multipart/signed;
  boundary="nextPart1388685.UiXGmvIMN5";
  protocol="application/pgp-signature";
  micalg=pgp-sha1
Content-Transfer-Encoding: 7bit
Message-Id: <200812162256.23578.hanno@hboeck.de>
Status:   

--nextPart1388685.UiXGmvIMN5
Content-Type: text/plain;
  charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

Joomla: Session hijacking vulnerability, CVE-2008-4122

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4122
http://int21.de/cve/CVE-2008-4122-joomla.html
http://enablesecurity.com/2008/08/11/surf-jack-https-will-not-save-you/
https://www.defcon.org/html/defcon-16/dc-16-speakers.html#Perry

Description

When configuring a web application to use only ssl (e. g. by forwarding all 
http-requests to https), a user would expect that sniffing and hijacking the 
session is impossible.

Though, for this to be secure, one needs to set the session cookie to have the 
secure flag. Else the cookie will be transferred through http if the victim's 
browser does a single http-request on the same domain.

Joomla 1.5.8 does not set that flag. I've contacted the Joomla security team 
in advance but got no reply.

Disclosure Timeline

2008-11-18: Vendor contacted
2008-12-16 Published advisory

Credits and copyright

This vulnerability was discovered by Hanno Boeck of schokokeks.org webhosting. 
It's licensed under the creative commons attribution license.

Hanno Boeck, http://www.hboeck.de

-- 
Hanno Böck Blog: http://www.hboeck.de/
GPG: 3DBD3B20 Jabber/Mail: hanno@hboeck.de

--nextPart1388685.UiXGmvIMN5
Content-Type: application/pgp-signature; name=signature.asc 
Content-Description: This is a digitally signed message part.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEABECAAYFAklIJAcACgkQr2QksT29OyB0/wCdHLkQ4SD9fW7Zj1+mWGaPGjrZ
yjkAn2u+GaZBF1KO8TOK6iy9kHT/SdfT
=+W1N
-----END PGP SIGNATURE-----

--nextPart1388685.UiXGmvIMN5--

From - Tue Dec 16 18:50:24 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051ba
X-Mozilla-Status: 0011
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38949-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 4AB0BEC131
for <lists@securityspace.com>; Tue, 16 Dec 2008 18:48:24 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 18C32236FBC; Tue, 16 Dec 2008 14:00:57 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 6892 invoked from network); 16 Dec 2008 17:29:55 -0000
Date: Tue, 16 Dec 2008 10:34:48 -0700
Message-Id: <200812161734.mBGHYmIV015021@www5.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.420 (Entity 5.420)
From: frisk@f-prot.com
To: bugtraq@securityfocus.com
Subject: Re: [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted
 ELF header Security Bypass
Status:   

Version 4.6.8 is an old, obsolete version of F-PROT that is no longer supported by the developers.

We no longer release regular virus definition updates for this version, and as far as we know, we have no paying customers of F-PROT 4.6.8 for Linux.

The security issue is not present in the current version.

From - Wed Dec 17 12:10:55 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051ea
X-Mozilla-Status: 0011
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38957-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id CE0A8EC1E2
for <lists@securityspace.com>; Wed, 17 Dec 2008 12:03:45 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 2546214386B; Wed, 17 Dec 2008 09:14:17 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 16273 invoked from network); 16 Dec 2008 22:42:45 -0000
From: "Integrigy Security" <intadmin@integrigy.com>
To: <full-disclosure@lists.grok.org.uk>, <bugtraq@securityfocus.com>
References: <OFA37A51A4.C327AA7C-ON85257521.006997E5-86257521.0069AC8C@3com.com>
In-Reply-To: <OFA37A51A4.C327AA7C-ON85257521.006997E5-86257521.0069AC8C@3com.com>
Subject: RE: [Full-disclosure] ZDI-08-088: Oracle E-Business Suite Self-Service Web Applications SQL Injection Vulnerability
Date: Tue, 16 Dec 2008 18:01:00 -0500
Message-ID: <006e01c95fd2$2a399f00$7eacdd00$@com>
MIME-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
Thread-Index: Aclfti2S4AEgGtUeT8WdpjCF/OdXNgAGR8Fw
Content-Language: en-us
Status:   

The Zero Day Initiative advisory ZDI-08-088 has several inaccuracies.
Oracle actually fixed this vulnerability as part of the April 2007 Critical
Patch Update and subsequently in ATG_PF.H RUP5 and later. The vulnerability
is a serious SQL injection bug in a Self-Service Web Application database
package that is called and accessible through mod_plsql.  Mod_plsql is an
Apache module and part of an Oracle web framework which allows database
packages to dynamically generate web pages. The vulnerable
schema.package.procedure name is APPS.ICXSUPWF.DISPLAYCONTACTS and all
versions 115.6 and prior are vulnerable.  When creating intrusion
detection/prevention rules for this vulnerability, the URL will normally
only include the package/procedure name ICXSUPWF.DISPLAYCONTACTS and
mod_plsql URLs are case-insensitive. This URL is normally blocked by the
Oracle E-Business Suite 11i URL Firewall and should not be externally
accessible.

Original Oracle Advisory:
Oracle Critical Patch Update April 2007 - APPS01

CVE Name:
CVE-2007-2126

Affected Product and Versions:
Oracle E-Business Suite 11.5.1 through 11.5.10.2 (CU2)

Affected Oracle E-Business Suite Modules:
Application Object Library (FND)/Self-Service Web Applications (ICX)

Patch Availability:
11.5.1 - 11.5.6 - No patches are available for unsupported versions of the
Oracle E-Business Suite
11.5.7 - 11.5.10.2 with ATG_PF.H RUP4 or prior - 5893391
11.5.9 - 11.5.10.2 with ATG_PF.H RUP5 or higher - No patch required as this
fix was included in RUP5 and higher

Additional information on the Oracle Critical Patch Update April 2007 and
the impact on the Oracle E-Business Suite 11i is available at -

http://www.integrigy.com/Integrigy_Oracle_CPU_April_2007_Analysis.pdf

Vulnerability "anthropologists" may be interested in the fact that this
vulnerability has existed since at least September 1999 and likely was
introduced several years earlier with the release of Oracle Applications
11.0.  Oracle fixed this bug in less than 2 months by simply stubbing the
procedure - clearly this was old code not used anymore by the application.
I wonder how much first generation web application code exists in the world
that is still accessible but automated scanning tools miss since it is not
directly accessible through a link?


-----Original Message-----
From: full-disclosure-bounces@lists.grok.org.uk
[mailto:full-disclosure-bounces@lists.grok.org.uk] On Behalf Of
zdi-disclosures@3com.com
Sent: Tuesday, December 16, 2008 2:14 PM
To: full-disclosure@lists.grok.org.uk; bugtraq@securityfocus.com
Subject: [Full-disclosure] ZDI-08-088: Oracle E-Business Suite Business
Intelligence SQL Injection Vulnerability

ZDI-08-088: Oracle E-Business Suite Business Intelligence SQL Injection 
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-08-088
December 16, 2008

-- Affected Vendors:
Oracle

-- Affected Products:
Oracle Database Server

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 4921. 
For further product information on the TippingPoint IPS, visit:

    http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to inject arbitrary SQL on
vulnerable installations of Oracle E-Business Suite Business
Intelligence. Authentication is not required to exploit this
vulnerability.

The specific flaw exists in the APPS.ICXSUPWF.DisplayContacts package.
The procedure fails to validate the contents of a WHERE clause
containing user-suppled input. This allows an attacker to execute
arbitrary SQL statements in the context of the APPS user.

-- Vendor Response:
Oracle has issued an update to correct this vulnerability. More
details can be found at:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpua
pr2008.html

-- Disclosure Timeline:
2007-01-29 - Vulnerability reported to vendor
2008-12-16 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
    * Joxean Koret

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

    http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

    http://www.zerodayinitiative.com/advisories/disclosure_policy/

CONFIDENTIALITY NOTICE: This e-mail message, including any attachments,
is being sent by 3Com for the sole use of the intended recipient(s) and
may contain confidential, proprietary and/or privileged information.
Any unauthorized review, use, disclosure and/or distribution by any 
recipient is prohibited.  If you are not the intended recipient, please
delete and/or destroy all copies of this message regardless of form and
any included attachments and notify 3Com immediately by contacting the
sender via reply e-mail or forwarding to 3Com at postmaster@3com.com. 
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

From - Wed Dec 17 12:20:55 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051ec
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38958-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id 6B2EAEC1E2
for <lists@securityspace.com>; Wed, 17 Dec 2008 12:17:51 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id BF10C14376F; Wed, 17 Dec 2008 09:19:42 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 3108 invoked from network); 17 Dec 2008 14:48:12 -0000
X-PGP-Universal: processed;
by wsehliesr on Wed, 17 Dec 2008 16:06:48 +0100
From: <security@nruns.com>
To: <full-disclosure@lists.grok.org.uk>, <bugtraq@securityfocus.com>
Cc: <cve@mitre.org>, <soc@us-cert.gov>, <cert@cert.org>,
<vuln@secunia.com>
Subject: n.runs-SA-2008.010 - Opera HTML parsing Code Execution
Date: Wed, 17 Dec 2008 16:06:27 +0100
Message-ID: <!&!AAAAAAAAAAAYAAAAAAAAAEqlc0sEqCZMjFiSy1tj+RPCgAAAEAAAAOn2ZlC3QNxEifjbeRIj9v0BAAAAAA==@nruns.com>
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook 11
Thread-Index: AclgV8VyTasY80P/SvyuaocdB38PbQ=X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579
X-PGP-Encoding-Format: Partitioned
X-PGP-Encoding-Version: 2.0.2
X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit
X-Content-PGP-Universal-Saved-Content-Type: text/plain;
charset="us-ascii"
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7BIT
X-Provags-ID: V01U2FsdGVkX1/g54VIkfmv6kU0+ifjatCd06CeOc6gXus3oeH
 0mmpTgdrY2HCA5syheD9yERdiPq/eb58IcNo3CNY8Rc7kevQxS
 WhlxDk58aW8nj5pBONuyA=Status:   

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

n.runs AG
http://www.nruns.com/                             security(at)nruns.com
n.runs-SA-2008.010                                          16-Dec-2008
_______________________________________________________________________

Vendor:                Opera Software ASA, http://www.opera.com
Affected Products:     Opera Browser all platforms
Vulnerability:         HTML parsing flaw lead to remote code execution
Risk:                  HIGH
_______________________________________________________________________

Vendor communication:

2008/11/10    Initial notification to Opera including n.runs RFP and 
              n.runs PGP public key
2008/11/12    Opera response and remarks to agree in general with 
              n.runs RFP but depending on the issue the timeline for a
              fix might have to be longer than the one mentioned in
              n.runs RFP (30 days)
2008/11/12    n.runs replies and outlines following a responsible
              disclosure policy as long as Opera keep n.runs in the
              loop. n.runs send with same email a zip archive including
              two PoC files and detailed crash log analysis
2008/11/14    n.runs resends the last email with a download link for
              the PoCs because Opera's MX Server did not accept the
              enclosed encrypted zip archive
2008/11/14    Opera acknowledges the PoC files
2008/11/24    Opera communicates to n.runs that they identified the
              nature of the issue and that they are looking into a fix
2008/12/12    Opera sends n.runs a current draft of the Opera advisory
              and notifies new version is scheduled to be released
              early next week
2008/12/16    Opera releases Opera 9.63 [1]
2008/12/16    n.runs releases this advisory

_______________________________________________________________________


Overview:

Quoting http://www.opera.com/company/:
"Opera started in 1994 as a research project within Norway's largest 
telecom company, Telenor. Within a year, it branched out to become an
independent development company named Opera Software ASA. 

Today, Opera Software develops the Opera Web browser, a high-quality,
multi-platform product for a wide range of platforms, operating systems
and embedded Internet products - including Mac, PC and Linux computers, 
mobile phones and PDAs,game consoles and other devices like the 
Nintendo Wii and DS, Sony Mylo and more. 

Opera's vision is to deliver the best Internet experience on any 
device. Opera's key business objective is to earn global leadership in
the market for PC / desktops and embedded products. Opera's main 
business strategy is to provide a browser that operates across devices,
platforms and operating systems, and can deliver a faster, more stable
and flexible Internet experience than its competitors."



Description:

A remotely exploitable vulnerability has been found in the
HTML parsing engine.

In detail, the following flaw was determined:

- - Certain HTML constructs affecting an internal heap structure. As a
result of a pointer calculation, memory may be corrupted in such a way
that an attacker could execute arbitrary code. 



Impact

An attacker could exploit the vulnerability by constructing a specially
prepared Websit. When a user views the Web page, the vulnerability
could allow remote code execution. An attacker who successfully
exploits this vulnerability could gain the same user rights as the
logged-on user. 



Solution:

Opera has issued an update to correct this vulnerability.
For detailed information about the fixes follow the link in
References [1] section of this document.

n.runs AG wants to highlight the fluent communication with Opera and
its very quick response to validate and fix the issue.
_______________________________________________________________________

Credit: 
Bugs found by Alexios Fakos of n.runs AG. 
_______________________________________________________________________

References: 
http://www.opera.com/support/kb/view/921/ [1]

This Advisory and Upcoming Advisories:
http://www.nruns.com/security_advisory.php
_______________________________________________________________________

Unaltered electronic reproduction of this advisory is permitted. For 
all other reproduction or publication, in printing or otherwise, 
contact security@nruns.com for permission. Use of the advisory 
constitutes acceptance for use in an "as is" condition. All warranties
are excluded. In no event shall n.runs be liable for any damages 
whatsoever including direct, indirect, incidental, consequential loss 
of business profits or special damages, even if n.runs has been advised
of the possibility of such damages. 

Copyright 2008 n.runs AG. All rights reserved. Terms of use apply.


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.1 (Build 2523)
Charset: us-ascii
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opn5
-----END PGP SIGNATURE-----

From - Wed Dec 17 13:30:55 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051ef
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38959-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id 44395EC1E4
for <lists@securityspace.com>; Wed, 17 Dec 2008 13:29:49 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id A04FA143ACA; Wed, 17 Dec 2008 09:22:03 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 2627 invoked from network); 17 Dec 2008 14:27:17 -0000
X-Virus-Scanned: by amavisd-new at intevation.de
Date: Wed, 17 Dec 2008 15:40:29 +0100
From: Michael Wiegand <michael.wiegand@intevation.de>
To: Full-Disclosure <full-disclosure@lists.grok.org.uk>,
Bugtraq <bugtraq@securityfocus.com>,
Pen-Test <pen-test@securityfocus.com>
Subject: Network Security Scanner OpenVAS 2.0.0 Released
Message-ID: <20081217144029.GG28795@intevation.de>
Mail-Followup-To: Full-Disclosure <full-disclosure@lists.grok.org.uk>,
Bugtraq <bugtraq@securityfocus.com>,
Pen-Test <pen-test@securityfocus.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-15
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
User-Agent: Mutt/1.5.16 (2007-06-11)
Status:   

Hello,

On December 17th, 2008, the OpenVAS[1] developer team released OpenVAS 2.0.0
which marks the start of the next generation of the Open Vulnerability
Assessment System for network security scanning.

OpenVAS is a fork of the Nessus security scanner which has continued development
under a proprietary license since late 2005. Since the release of OpenVAS 1.0.0
in October 2007, the OpenVAS developers continued the auditing of the code
inherited from Nessus and have added a variety of useful features for OpenVAS
users, for server adminstrators and for developers of Network Vulnerability
Tests (NVTs).

The main changes compared to the 1.0 series cover:

* OVAL Support:
  OpenVAS 2.0.0 introduces preliminary support for OVAL, the Open Vulnerability
  and Assessment Language[2]. OVAL is an international, information security,
  community standard to promote open, standardized and publicly available
  security content.  The OpenVAS server can now execute OVAL files just like its
  own Network Vulnerability Tests (NVTs) using the OVAL definitions interpreter
  "ovaldi".  While the plain ovaldi tool can only check local systems where it
  is installed, the combination with OpenVAS enables ovaldi to test any target
  system for which OpenVAS has collected information. OpenVAS 2.0.0 includes
  readily available support for Red Hat Enterprise Linux security announcements
  as published in OVAL format. OVAL support will expand to further platforms.

* OpenVAS Transfer Protocol (OTP):
  A comprehensive audit of the Nessus Transfer Protocol (NTP) resulted in
  numerous improvements and fixes and lead to the OpenVAS Transfer Protocol
  (OTP).  Since NTP support was dropped entirely, the 1.0 and 2.0 series of
  OpenVAS Server and Client can not operate in mixed mode.

* Object Identifiers (OIDs):
  In order to make identifying individual NVTs easier, OpenVAS adopted an
  OID-based numbering scheme for NVTs. OIDs in OpenVAS will start with the
  prefix 1.3.6.1.4.1.25623, backward compatibility in server and client has been
  ensured.

* 64-bit Support:
  Intensive work on 64-bit cleanliness has been undertaken. OpenVAS 2.0.0
  is expected be fully 64-bit compatible.

* Improved GUI Client:
  The OpenVAS-Client has seen a number of improvements and is now able to
  display NVT signature information in the GUI and in the various reports.
  Reporting has been improved as well as localization for various languages
  (best support in this order: German, Spanish/French, Swedish, Hebrew,
  Croatian).

* Bugfixes:
  Any spotted bugs have been fixed. Please refer to
  the CHANGES files supplied with the individual modules for details.

* Code Audit:
  A large amount of outdated or unused code has been idenfied and removed or
  replaced.

Compatibility of NASL NVTs and the OpenVAS Feed Service:
The available NVT package (openvas-plugins) and OpenVAS Feed which provides more
than 6000 NVTs are compatible for both the 1.0 and the 2.0 series of OpenVAS.

Migration from OpenVAS 1.0:
If you want to migrate your existing reports created with an 1.0 series client
to OpenVAS 2.0.0, please use the script provided in the openvas-client/tools
directory.
If you are currently using OpenVAS 1.0.x, we recommend that you install the
OpenVAS 2.0.0 source code relase seperately from your existing installation.

Documentation:
An extensive documentation for OpenVAS has been created as well and was recently
released. Users, adminstrators and developers can now access more than 100 pages
of the OpenVAS Compendium, available in English and German.

Downloads:
All download links for OpenVAS 2.0.0 and additional information can be found on
the OpenVAS website[1]. OpenVAS 2.0.0 is initially relased as a source code
release; packages for various distributions are expected to follow.

The OpenVAS team would like to thank everybody who has contributed to this
release. We have worked hard to bring you the best OpenVAS version. If you have
any questions or suggestions, please feel free to use the public mailing list
and our online chat. Please use the OpenVAS bug tracker[3] to report bugs.

The OpenVAS developers would like to wish all users a recreative holiday season
and a a happy new year.

[1] http://www.openvas.org
[2] http://oval.mitre.org
[3] http://bugs.openvas.org

-- 
Michael Wiegand |  OpenPGP key: D7D049EC  |  http://www.intevation.de/
Intevation GmbH, Neuer Graben 17, 49074 Osnabr�ck | AG Osnabr�ck, HR B 18998
Gesch�ftsf�hrer: Frank Koormann, Bernhard Reiter, Dr. Jan-Oliver Wagner

From - Wed Dec 17 18:30:55 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051f4
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38960-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id C17F9EC1E2
for <lists@securityspace.com>; Wed, 17 Dec 2008 18:23:38 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 3F3BE236FD9; Wed, 17 Dec 2008 16:09:40 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 30965 invoked from network); 17 Dec 2008 22:53:39 -0000
X-Cloudmark-SP-Filtered: true
X-Cloudmark-SP-Result: v=1.0 c=0 a=FLhA3KDuAAAA:8 a=sMBj6sIwAAAA:8 a=pQs5aej7AAAA:8 a=G4QFo8eNBwyg32XuI8UA:9 a=VQLGPvN4PNctk3HduqEA:7 a=U66rzqKuF4iU9wVte9ov4O835OAA:4 a=PRHNZNJDFyAA:10 a=R2VQutpenNgA:10 a=8UiCvUyRy1oA:10
To: bugtraq@securityfocus.com
Subject: [ MDVSA-2008:244 ] mozilla-firefox
Date: Wed, 17 Dec 2008 16:18:00 -0700
From: security@mandriva.com
Reply-To: <xsecurity@mandriva.com>
Message-Id: <E1LD5eS-00088e-UN@titan.mandriva.com>
Status:   


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2008:244
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : mozilla-firefox
 Date    : December 17, 2008
 Affected: 2008.1, Corporate 3.0, Corporate 4.0
 _______________________________________________________________________

 Problem Description:

 Security vulnerabilities have been discovered and corrected in
 the latest Mozilla Firefox 2.x, version 2.0.0.19 (CVE-2008-5500,
 CVE-2008-5503, CVE-2008-5504, CVE-2008-5506, CVE-2008-5507,
 CVE-2008-5508, CVE-2008-5510, CVE-2008-5511, CVE-2008-5512,
 CVE-2008-5513).
 
 This update provides the latest Mozilla Firefox 2.x to correct
 these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5504
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513
 http://www.mozilla.org/security/known-vulnerabilities/firefox20.html#firefox2.0.0.19
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 7f8addc0fc247ef9bd733736e0073ba1  2008.1/i586/devhelp-0.19-3.6mdv2008.1.i586.rpm
 a6e1937e7b0c45bebcf5d98803eb0494  2008.1/i586/devhelp-plugins-0.19-3.6mdv2008.1.i586.rpm
 55b8c8e37e4ce64e60142b6737690705  2008.1/i586/epiphany-2.22.0-4.6mdv2008.1.i586.rpm
 0c217f86408d4419e27d22aef775d6da  2008.1/i586/epiphany-devel-2.22.0-4.6mdv2008.1.i586.rpm
 60f64aad8ce848e969a8fe18cba79204  2008.1/i586/galeon-2.0.4-3.6mdv2008.1.i586.rpm
 7f32328e0f534178b4a802b0bfa9ebe6  2008.1/i586/gnome-python-extras-2.19.1-10.6mdv2008.1.i586.rpm
 8d5a7c2f9bde5f633a2b31cde538ceb6  2008.1/i586/gnome-python-gda-2.19.1-10.6mdv2008.1.i586.rpm
 0ae91b7fc58689ad7fc78aca511d1473  2008.1/i586/gnome-python-gda-devel-2.19.1-10.6mdv2008.1.i586.rpm
 15726fe08bde35037bad8acab9c66f50  2008.1/i586/gnome-python-gdl-2.19.1-10.6mdv2008.1.i586.rpm
 544418a2e56393ea38fd3a8c5de099c0  2008.1/i586/gnome-python-gksu-2.19.1-10.6mdv2008.1.i586.rpm
 1b10bbce9204be69622ed24be81a2c46  2008.1/i586/gnome-python-gtkhtml2-2.19.1-10.6mdv2008.1.i586.rpm
 1a12b611693611bcec69be8bce034f2c  2008.1/i586/gnome-python-gtkmozembed-2.19.1-10.6mdv2008.1.i586.rpm
 ad9f4dc989f6725044733a8e806ba5d5  2008.1/i586/gnome-python-gtkspell-2.19.1-10.6mdv2008.1.i586.rpm
 17b7b784a72db58f46e2e67ac60fffc4  2008.1/i586/libdevhelp-1_0-0.19-3.6mdv2008.1.i586.rpm
 00596cab51923af07c279be332cc271d  2008.1/i586/libdevhelp-1-devel-0.19-3.6mdv2008.1.i586.rpm
 8e0bf3dfc7d882fdd06671eded809a6e  2008.1/i586/libgluezilla0-1.2.6.1-2.6mdv2008.1.i586.rpm
 cffccf85e222828b46af77b7f2d28146  2008.1/i586/libmozilla-firefox2.0.0.19-2.0.0.19-1.1mdv2008.1.i586.rpm
 4596f1d84b137113c28b90b6196aa9d9  2008.1/i586/libmozilla-firefox-devel-2.0.0.19-1.1mdv2008.1.i586.rpm
 20d16b0cec438f771b7b968b654768bd  2008.1/i586/mozilla-firefox-2.0.0.19-1.1mdv2008.1.i586.rpm
 48a84ff1a5d0a152a2fd432fe6604fbd  2008.1/i586/mozilla-firefox-af-2.0.0.19-1.1mdv2008.1.i586.rpm
 da5e5f2c1de6d0adae84fe0cae1ee586  2008.1/i586/mozilla-firefox-ar-2.0.0.19-1.1mdv2008.1.i586.rpm
 94d52eebf9d87481e07be3ff4bbe7d67  2008.1/i586/mozilla-firefox-be-2.0.0.19-1.1mdv2008.1.i586.rpm
 be0a8cbe5a57bf221c54a93aff527d6c  2008.1/i586/mozilla-firefox-bg-2.0.0.19-1.1mdv2008.1.i586.rpm
 0695d12cab500b072c49b036cd51f6ac  2008.1/i586/mozilla-firefox-br_FR-2.0.0.19-1.1mdv2008.1.i586.rpm
 5b660a17e526253c33d6e00bd68f3269  2008.1/i586/mozilla-firefox-ca-2.0.0.19-1.1mdv2008.1.i586.rpm
 baf0feba0f8f56e8738fb09ead69b4b8  2008.1/i586/mozilla-firefox-cs-2.0.0.19-1.1mdv2008.1.i586.rpm
 063e442a8f0c0a068ded60eba73dab53  2008.1/i586/mozilla-firefox-da-2.0.0.19-1.1mdv2008.1.i586.rpm
 e27139fae9ff249b70e8737ac6ea0d47  2008.1/i586/mozilla-firefox-de-2.0.0.19-1.1mdv2008.1.i586.rpm
 d5b254ef9a4e903a5ec6057ed890fdf8  2008.1/i586/mozilla-firefox-el-2.0.0.19-1.1mdv2008.1.i586.rpm
 24bcf5364c3fe535968519a5cf84d794  2008.1/i586/mozilla-firefox-en_GB-2.0.0.19-1.1mdv2008.1.i586.rpm
 3312c2ee3ff8297c7b5909f5d0839075  2008.1/i586/mozilla-firefox-es_AR-2.0.0.19-1.1mdv2008.1.i586.rpm
 8534b0f7290a4c80a394b90661515258  2008.1/i586/mozilla-firefox-es_ES-2.0.0.19-1.1mdv2008.1.i586.rpm
 04703ad6ada3f71b96f66a3e770b7826  2008.1/i586/mozilla-firefox-et_EE-2.0.0.19-1.1mdv2008.1.i586.rpm
 a7efc391c7d77bc0a32803f776b61fde  2008.1/i586/mozilla-firefox-eu-2.0.0.19-1.1mdv2008.1.i586.rpm
 d0e65ae65b0d5f26335cb1f27e838ac0  2008.1/i586/mozilla-firefox-ext-blogrovr-1.1.779-2.4mdv2008.1.i586.rpm
 1512bbaff2548011d585d63bc97817b6  2008.1/i586/mozilla-firefox-ext-foxmarks-2.0.47.4-2.4mdv2008.1.i586.rpm
 a3cf91c324e08de846fa54015f347700  2008.1/i586/mozilla-firefox-ext-scribefire-2.2.7-2.4mdv2008.1.i586.rpm
 835809d497f255919ec678bf675a522f  2008.1/i586/mozilla-firefox-fi-2.0.0.19-1.1mdv2008.1.i586.rpm
 83d2406e0a323ee0711c760dad3c64c2  2008.1/i586/mozilla-firefox-fr-2.0.0.19-1.1mdv2008.1.i586.rpm
 495876bb28e2041d0f48e53c3bba0ea5  2008.1/i586/mozilla-firefox-fy-2.0.0.19-1.1mdv2008.1.i586.rpm
 124d59678923d85a69d611fab147654b  2008.1/i586/mozilla-firefox-ga-2.0.0.19-1.1mdv2008.1.i586.rpm
 1f920d856f4c043a97e04bffa4ee5bbc  2008.1/i586/mozilla-firefox-gnome-support-2.0.0.19-1.1mdv2008.1.i586.rpm
 717bbdd1eb47ee8130fe67d1368f9358  2008.1/i586/mozilla-firefox-gu_IN-2.0.0.19-1.1mdv2008.1.i586.rpm
 62d91e021f670efeb8b29ec99142780b  2008.1/i586/mozilla-firefox-he-2.0.0.19-1.1mdv2008.1.i586.rpm
 b2a50d9861bcc85fdf91139e47a50dff  2008.1/i586/mozilla-firefox-hu-2.0.0.19-1.1mdv2008.1.i586.rpm
 044c638a5b67bc3093bd25cba67772c0  2008.1/i586/mozilla-firefox-it-2.0.0.19-1.1mdv2008.1.i586.rpm
 5fdbad0aafcc7a4092afecbae298353a  2008.1/i586/mozilla-firefox-ja-2.0.0.19-1.1mdv2008.1.i586.rpm
 99cefaf816469ecf0a173809b1ba772b  2008.1/i586/mozilla-firefox-ka-2.0.0.19-1.1mdv2008.1.i586.rpm
 5d1b7e4da47ef7914b7bccb9af9849ca  2008.1/i586/mozilla-firefox-ko-2.0.0.19-1.1mdv2008.1.i586.rpm
 a91c8eba69988dad66a3072dbf843103  2008.1/i586/mozilla-firefox-ku-2.0.0.19-1.1mdv2008.1.i586.rpm
 e8762edcb0620de40f5e118b87bb42b3  2008.1/i586/mozilla-firefox-lt-2.0.0.19-1.1mdv2008.1.i586.rpm
 7078aa8233f9ba58bea8dfa50425ba41  2008.1/i586/mozilla-firefox-mk-2.0.0.19-1.1mdv2008.1.i586.rpm
 3ef1178d7bfc289aa09636245c1bce00  2008.1/i586/mozilla-firefox-mn-2.0.0.19-1.1mdv2008.1.i586.rpm
 f466ef8c248af5fd45916fbcd3e6c609  2008.1/i586/mozilla-firefox-nb_NO-2.0.0.19-1.1mdv2008.1.i586.rpm
 1491c0c7e023310d3440f94914c99e97  2008.1/i586/mozilla-firefox-nl-2.0.0.19-1.1mdv2008.1.i586.rpm
 14f7282dd94c39e33568f631ba4e01ca  2008.1/i586/mozilla-firefox-nn_NO-2.0.0.19-1.1mdv2008.1.i586.rpm
 1caa427450224d989ce1ff563b4ee5ca  2008.1/i586/mozilla-firefox-pa_IN-2.0.0.19-1.1mdv2008.1.i586.rpm
 b2afee6749fa46d885375882e48c92ea  2008.1/i586/mozilla-firefox-pl-2.0.0.19-1.1mdv2008.1.i586.rpm
 ce3b41c988a62ef6321e4332cbd5d63e  2008.1/i586/mozilla-firefox-pt_BR-2.0.0.19-1.1mdv2008.1.i586.rpm
 d531870efc8f43e35f305d65472fce7d  2008.1/i586/mozilla-firefox-pt_PT-2.0.0.19-1.1mdv2008.1.i586.rpm
 407cfd2d31ece17be76f316833713487  2008.1/i586/mozilla-firefox-ro-2.0.0.19-1.1mdv2008.1.i586.rpm
 b522d8a77d029ea0fc34fff834f58ffe  2008.1/i586/mozilla-firefox-ru-2.0.0.19-1.1mdv2008.1.i586.rpm
 2d51d367cda6b7eccc04449928884bf9  2008.1/i586/mozilla-firefox-sk-2.0.0.19-1.1mdv2008.1.i586.rpm
 0f78263377eca7e4a06697ded706a555  2008.1/i586/mozilla-firefox-sl-2.0.0.19-1.1mdv2008.1.i586.rpm
 5965bdeafd790a57956659244893fccb  2008.1/i586/mozilla-firefox-sv_SE-2.0.0.19-1.1mdv2008.1.i586.rpm
 935b8d41febea5d2df9ed407a30f664b  2008.1/i586/mozilla-firefox-theme-gnome-2.0.0-7.4mdv2008.1.i586.rpm
 b7ffe23251f4774fbbcda6c4c805839c  2008.1/i586/mozilla-firefox-theme-kdeff-0.4-7.4mdv2008.1.i586.rpm
 6cf739c4c27f421c65ce77f5d11f2404  2008.1/i586/mozilla-firefox-tr-2.0.0.19-1.1mdv2008.1.i586.rpm
 149bfa9bdbe2518c31f3df46b4a39153  2008.1/i586/mozilla-firefox-uk-2.0.0.19-1.1mdv2008.1.i586.rpm
 2677c44e4a92739274d0aa9572df5142  2008.1/i586/mozilla-firefox-zh_CN-2.0.0.19-1.1mdv2008.1.i586.rpm
 c18af87ebefdb885d8871285d39d6728  2008.1/i586/mozilla-firefox-zh_TW-2.0.0.19-1.1mdv2008.1.i586.rpm
 c92cd4a33069a6da7d8d390d34b8b2f6  2008.1/i586/totem-2.22.0-4.6mdv2008.1.i586.rpm
 f84174eb140bdc76acafc1fd93674188  2008.1/i586/totem-common-2.22.0-4.6mdv2008.1.i586.rpm
 c2e56fcc951d72102bc3adea0caf1044  2008.1/i586/totem-gstreamer-2.22.0-4.6mdv2008.1.i586.rpm
 f6d7dfab5635f25c6c28cbacdc91ebaa  2008.1/i586/totem-mozilla-2.22.0-4.6mdv2008.1.i586.rpm
 90625ed3d474bb26600ccd7af02665be  2008.1/i586/totem-mozilla-gstreamer-2.22.0-4.6mdv2008.1.i586.rpm
 2384cf75422553652ee783b3cfe1adc3  2008.1/i586/yelp-2.22.0-2.7mdv2008.1.i586.rpm 
 bbd14449827df2c7d84427430d7c7e57  2008.1/SRPMS/devhelp-0.19-3.6mdv2008.1.src.rpm
 f0fb48ec7c2f73df643d79d3eead06fa  2008.1/SRPMS/epiphany-2.22.0-4.6mdv2008.1.src.rpm
 a7e4e1126481763b00d672aa2e5c65e0  2008.1/SRPMS/galeon-2.0.4-3.6mdv2008.1.src.rpm
 cdea7603720727b8285a85e96baaa6da  2008.1/SRPMS/gluezilla-1.2.6.1-2.6mdv2008.1.src.rpm
 6f22974bed5335f06568db0baa892059  2008.1/SRPMS/gnome-python-extras-2.19.1-10.6mdv2008.1.src.rpm
 3d915c1141aa275df291212a4e6bcca5  2008.1/SRPMS/mozilla-firefox-2.0.0.19-1.1mdv2008.1.src.rpm
 8f56891a87fd79c5c2d57b48fcb9dccb  2008.1/SRPMS/mozilla-firefox-ext-blogrovr-1.1.779-2.4mdv2008.1.src.rpm
 f6a815f7c838689da4d67d7d126cbace  2008.1/SRPMS/mozilla-firefox-ext-foxmarks-2.0.47.4-2.4mdv2008.1.src.rpm
 e934487b170fe4d6eb70c7f6881f2108  2008.1/SRPMS/mozilla-firefox-ext-scribefire-2.2.7-2.4mdv2008.1.src.rpm
 943c17d626499280bc99ec649ce9a16d  2008.1/SRPMS/mozilla-firefox-l10n-2.0.0.19-1.1mdv2008.1.src.rpm
 074a41eb9fdffc2445b37c67c38f4e76  2008.1/SRPMS/mozilla-firefox-theme-gnome-2.0.0-7.4mdv2008.1.src.rpm
 8b49b3452479db908e070f2bbdca14f0  2008.1/SRPMS/mozilla-firefox-theme-kdeff-0.4-7.4mdv2008.1.src.rpm
 aab17d9315430d71ea5107c0c2a1c893  2008.1/SRPMS/totem-2.22.0-4.6mdv2008.1.src.rpm
 299f7185a89651607ea697160ef9ffc4  2008.1/SRPMS/yelp-2.22.0-2.7mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 ffd41f689116a8474539a082aa3f1349  2008.1/x86_64/devhelp-0.19-3.6mdv2008.1.x86_64.rpm
 66864a0c536cd155923ec3c5e2b5202c  2008.1/x86_64/devhelp-plugins-0.19-3.6mdv2008.1.x86_64.rpm
 a1835f86d29a6da588ab2c432a208eb8  2008.1/x86_64/epiphany-2.22.0-4.6mdv2008.1.x86_64.rpm
 d5b940fa89bcb43aee7e169fb1f62e28  2008.1/x86_64/epiphany-devel-2.22.0-4.6mdv2008.1.x86_64.rpm
 659c4030a10fcc9235808d8b7201d283  2008.1/x86_64/galeon-2.0.4-3.6mdv2008.1.x86_64.rpm
 10e260e057d54ac972629ae71c2f4350  2008.1/x86_64/gnome-python-extras-2.19.1-10.6mdv2008.1.x86_64.rpm
 f538ac55b541e7b9421c6eed8bf24259  2008.1/x86_64/gnome-python-gda-2.19.1-10.6mdv2008.1.x86_64.rpm
 d9769379d26a1682111ef3ff59c98b92  2008.1/x86_64/gnome-python-gda-devel-2.19.1-10.6mdv2008.1.x86_64.rpm
 2de54d350a3653e00f67260aa9458954  2008.1/x86_64/gnome-python-gdl-2.19.1-10.6mdv2008.1.x86_64.rpm
 eb05d6e4f392a245103a276ecc051167  2008.1/x86_64/gnome-python-gksu-2.19.1-10.6mdv2008.1.x86_64.rpm
 f722b683dd0d70483945fe582b56667f  2008.1/x86_64/gnome-python-gtkhtml2-2.19.1-10.6mdv2008.1.x86_64.rpm
 61619ccb7c46a625badfb1d73b07ef91  2008.1/x86_64/gnome-python-gtkmozembed-2.19.1-10.6mdv2008.1.x86_64.rpm
 0bbb8e4590654a0879c1a7b0d4493b08  2008.1/x86_64/gnome-python-gtkspell-2.19.1-10.6mdv2008.1.x86_64.rpm
 e354d21910f391792e2f976daa588479  2008.1/x86_64/lib64devhelp-1_0-0.19-3.6mdv2008.1.x86_64.rpm
 9e395009e077608b242db8ca63080755  2008.1/x86_64/lib64devhelp-1-devel-0.19-3.6mdv2008.1.x86_64.rpm
 870c7ac086da1f015d2f4ae4b3cd0bb5  2008.1/x86_64/lib64gluezilla0-1.2.6.1-2.6mdv2008.1.x86_64.rpm
 e871aa452fb5e4c819fa4003835cf73d  2008.1/x86_64/lib64mozilla-firefox2.0.0.19-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 0e83338325243315c8231b2f6f60ee35  2008.1/x86_64/lib64mozilla-firefox-devel-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 c3dbc02dfa25467fbdbbbb04c76b83e2  2008.1/x86_64/mozilla-firefox-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 0680eeaa3abf8250463345cae8f4d493  2008.1/x86_64/mozilla-firefox-af-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 6a2813270f16aecd2a55d548cb23fd94  2008.1/x86_64/mozilla-firefox-ar-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 87f57dba9af7ad13974f4dab19b2913d  2008.1/x86_64/mozilla-firefox-be-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 5da07b7840c7e416072f46e362461419  2008.1/x86_64/mozilla-firefox-bg-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 5adc9ddb40574267cee69e60004da816  2008.1/x86_64/mozilla-firefox-br_FR-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 7f551f779de33d462e154408089e6c9a  2008.1/x86_64/mozilla-firefox-ca-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 a41ccf5e7ac105cfdfa61cf998c7727d  2008.1/x86_64/mozilla-firefox-cs-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 aa6e534726abeded21f1e7ffcd078e34  2008.1/x86_64/mozilla-firefox-da-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 cacefd7637cb7991dd6943c376e2c264  2008.1/x86_64/mozilla-firefox-de-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 51ed21e354e0b9198a5014bf9508dddf  2008.1/x86_64/mozilla-firefox-el-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 4abb39cc9606e88ad6053369372948e4  2008.1/x86_64/mozilla-firefox-en_GB-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 dc44554dca1b5be617d84f9f21270d34  2008.1/x86_64/mozilla-firefox-es_AR-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 0ed37e13965fc68e24173fae9053e5c9  2008.1/x86_64/mozilla-firefox-es_ES-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 3ec9246bf2d109972788fd286f7d6e8d  2008.1/x86_64/mozilla-firefox-et_EE-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 4684214bc36736f5fe1fd3fdfe6588d2  2008.1/x86_64/mozilla-firefox-eu-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 115b3f029de1c354a25822f45873f688  2008.1/x86_64/mozilla-firefox-ext-blogrovr-1.1.779-2.4mdv2008.1.x86_64.rpm
 e740fb9e394f017cc2e0cfbeaf33a2f4  2008.1/x86_64/mozilla-firefox-ext-foxmarks-2.0.47.4-2.4mdv2008.1.x86_64.rpm
 36486539b6f1354826acc2ba5ae9dbae  2008.1/x86_64/mozilla-firefox-ext-scribefire-2.2.7-2.4mdv2008.1.x86_64.rpm
 f95f9a1e9a79cb33da33c9193c7f1d8d  2008.1/x86_64/mozilla-firefox-fi-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 5894f9d99e186dc1bfc100e3d4c7c5ba  2008.1/x86_64/mozilla-firefox-fr-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 4a6159e0f78cbb6655f9817127ed6d74  2008.1/x86_64/mozilla-firefox-fy-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 859146ebe437f428ba44b7bf598ac49f  2008.1/x86_64/mozilla-firefox-ga-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 4d8d7d371746c9209733d7c27fc5de54  2008.1/x86_64/mozilla-firefox-gnome-support-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 c2fa7795cda3112dd971224273b1df5d  2008.1/x86_64/mozilla-firefox-gu_IN-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 a815e8346458afcb3f8810ec4d3547c9  2008.1/x86_64/mozilla-firefox-he-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 0a122db9686cede7f5ad055d23c08a32  2008.1/x86_64/mozilla-firefox-hu-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 7744693aa8e95d554395193f790018cd  2008.1/x86_64/mozilla-firefox-it-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 22f8da02b7facf8ea06f74a87d283be7  2008.1/x86_64/mozilla-firefox-ja-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 fff4c829cc2d65a1ec7516536dcde8df  2008.1/x86_64/mozilla-firefox-ka-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 17232c455a0cf9d800a10b004ba06af7  2008.1/x86_64/mozilla-firefox-ko-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 34b439e8534f942da72cfa1c7526d834  2008.1/x86_64/mozilla-firefox-ku-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 2c4f9d93b3e827e90cc94762f617a168  2008.1/x86_64/mozilla-firefox-lt-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 f6bfb93dad2b9272cc35c02c9339aee2  2008.1/x86_64/mozilla-firefox-mk-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 5a4f646d67a7a46969e10cc5cea997c2  2008.1/x86_64/mozilla-firefox-mn-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 734908dbf333203532718f95f7f47a5b  2008.1/x86_64/mozilla-firefox-nb_NO-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 7818f6b5629845d37bf9f2daf52d7917  2008.1/x86_64/mozilla-firefox-nl-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 d52b7c003c1eae366929f4951775e00f  2008.1/x86_64/mozilla-firefox-nn_NO-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 fbabb6550e210d4f1ce5c14fdd8bd7c6  2008.1/x86_64/mozilla-firefox-pa_IN-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 a747b2a28f5555b599cfa9bc12af06a9  2008.1/x86_64/mozilla-firefox-pl-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 8883641123603549e6fb83ef001dad2b  2008.1/x86_64/mozilla-firefox-pt_BR-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 66400a7a508bf4911c90f2006d3a2bb2  2008.1/x86_64/mozilla-firefox-pt_PT-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 16869fa6a90d146f98c6b9cb32dae5d0  2008.1/x86_64/mozilla-firefox-ro-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 9c9e4b362c7bbc383ad87ebbd50e6f1e  2008.1/x86_64/mozilla-firefox-ru-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 f6e53c85519fb841c8da5520ce545dc6  2008.1/x86_64/mozilla-firefox-sk-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 29bbcb6e5fdae4cda5facace510a9405  2008.1/x86_64/mozilla-firefox-sl-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 2f4fe5a1d97bab6132d474175d5901a4  2008.1/x86_64/mozilla-firefox-sv_SE-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 ba635049a6ac540eb63ba84e68e3afc4  2008.1/x86_64/mozilla-firefox-theme-gnome-2.0.0-7.4mdv2008.1.x86_64.rpm
 643b661b52dc7666976d9f77331e2b53  2008.1/x86_64/mozilla-firefox-theme-kdeff-0.4-7.4mdv2008.1.x86_64.rpm
 bde8b65d609c60edd5a1baede2d01957  2008.1/x86_64/mozilla-firefox-tr-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 7ff74f11cf8664ce11ee7ee596bfc366  2008.1/x86_64/mozilla-firefox-uk-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 d676f12dcc1f98c80b632d90ce093c11  2008.1/x86_64/mozilla-firefox-zh_CN-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 ca0ebe74cc3d7743cbff0fe333cf4f7b  2008.1/x86_64/mozilla-firefox-zh_TW-2.0.0.19-1.1mdv2008.1.x86_64.rpm
 78a3957aa974d12877d57ca91c45c9c0  2008.1/x86_64/totem-2.22.0-4.6mdv2008.1.x86_64.rpm
 acb95916f5f3f9a0b749322d5a4fe4b4  2008.1/x86_64/totem-common-2.22.0-4.6mdv2008.1.x86_64.rpm
 a23fc879d5e9742aba21ad50afdc5c13  2008.1/x86_64/totem-gstreamer-2.22.0-4.6mdv2008.1.x86_64.rpm
 48ecccd72cb0164604e17fded37c3347  2008.1/x86_64/totem-mozilla-2.22.0-4.6mdv2008.1.x86_64.rpm
 dad4fb7733a84f9498faaf12453eefc9  2008.1/x86_64/totem-mozilla-gstreamer-2.22.0-4.6mdv2008.1.x86_64.rpm
 614dc8690c676f2eb2802cf0cb25483f  2008.1/x86_64/yelp-2.22.0-2.7mdv2008.1.x86_64.rpm 
 bbd14449827df2c7d84427430d7c7e57  2008.1/SRPMS/devhelp-0.19-3.6mdv2008.1.src.rpm
 f0fb48ec7c2f73df643d79d3eead06fa  2008.1/SRPMS/epiphany-2.22.0-4.6mdv2008.1.src.rpm
 a7e4e1126481763b00d672aa2e5c65e0  2008.1/SRPMS/galeon-2.0.4-3.6mdv2008.1.src.rpm
 cdea7603720727b8285a85e96baaa6da  2008.1/SRPMS/gluezilla-1.2.6.1-2.6mdv2008.1.src.rpm
 6f22974bed5335f06568db0baa892059  2008.1/SRPMS/gnome-python-extras-2.19.1-10.6mdv2008.1.src.rpm
 3d915c1141aa275df291212a4e6bcca5  2008.1/SRPMS/mozilla-firefox-2.0.0.19-1.1mdv2008.1.src.rpm
 8f56891a87fd79c5c2d57b48fcb9dccb  2008.1/SRPMS/mozilla-firefox-ext-blogrovr-1.1.779-2.4mdv2008.1.src.rpm
 f6a815f7c838689da4d67d7d126cbace  2008.1/SRPMS/mozilla-firefox-ext-foxmarks-2.0.47.4-2.4mdv2008.1.src.rpm
 e934487b170fe4d6eb70c7f6881f2108  2008.1/SRPMS/mozilla-firefox-ext-scribefire-2.2.7-2.4mdv2008.1.src.rpm
 943c17d626499280bc99ec649ce9a16d  2008.1/SRPMS/mozilla-firefox-l10n-2.0.0.19-1.1mdv2008.1.src.rpm
 074a41eb9fdffc2445b37c67c38f4e76  2008.1/SRPMS/mozilla-firefox-theme-gnome-2.0.0-7.4mdv2008.1.src.rpm
 8b49b3452479db908e070f2bbdca14f0  2008.1/SRPMS/mozilla-firefox-theme-kdeff-0.4-7.4mdv2008.1.src.rpm
 aab17d9315430d71ea5107c0c2a1c893  2008.1/SRPMS/totem-2.22.0-4.6mdv2008.1.src.rpm
 299f7185a89651607ea697160ef9ffc4  2008.1/SRPMS/yelp-2.22.0-2.7mdv2008.1.src.rpm

 Corporate 3.0:
 a7e09a8f7ff8b1f769f6dff00ff03a2a  corporate/3.0/i586/libnspr4-2.0.0.19-0.1.C30mdk.i586.rpm
 1560d370f5b9c71ad3559a82e411882b  corporate/3.0/i586/libnspr4-devel-2.0.0.19-0.1.C30mdk.i586.rpm
 4def5dab8d75be3cf1883bb75344e743  corporate/3.0/i586/libnspr4-static-devel-2.0.0.19-0.1.C30mdk.i586.rpm
 dc976c542521ec7784d01d3f802dfa50  corporate/3.0/i586/libnss3-2.0.0.19-0.1.C30mdk.i586.rpm
 3b1e684357b83be52aa6bdd98d9230df  corporate/3.0/i586/libnss3-devel-2.0.0.19-0.1.C30mdk.i586.rpm
 62e3f5b57c22474c6037c2f8ec03f3e7  corporate/3.0/i586/mozilla-firefox-2.0.0.19-0.1.C30mdk.i586.rpm
 86e71b51e38f1d1b4fd9832bed08ed8f  corporate/3.0/i586/mozilla-firefox-ar-2.0.0.19-0.1.C30mdk.i586.rpm
 876bcf93e0fa980c84cfcc4eca4dfa98  corporate/3.0/i586/mozilla-firefox-bg-2.0.0.19-0.1.C30mdk.i586.rpm
 194db53017c9276f2219590098982a3d  corporate/3.0/i586/mozilla-firefox-br-2.0.0.19-0.1.C30mdk.i586.rpm
 4610fc64255e0d04b3fd2b19d72f554d  corporate/3.0/i586/mozilla-firefox-ca-2.0.0.19-0.1.C30mdk.i586.rpm
 872a988396a8b5aabd8bf22a77b0c5d8  corporate/3.0/i586/mozilla-firefox-cs-2.0.0.19-0.1.C30mdk.i586.rpm
 55ff35bee3671d069a768a68b912e31d  corporate/3.0/i586/mozilla-firefox-da-2.0.0.19-0.1.C30mdk.i586.rpm
 49cdf7d73e6dd5bbe85069eb2d37829e  corporate/3.0/i586/mozilla-firefox-de-2.0.0.19-0.1.C30mdk.i586.rpm
 c12b42d1d774dd768228faa21308645e  corporate/3.0/i586/mozilla-firefox-devel-2.0.0.19-0.1.C30mdk.i586.rpm
 f6db9c2b24e7052a7e86f0937cd97e0a  corporate/3.0/i586/mozilla-firefox-el-2.0.0.19-0.1.C30mdk.i586.rpm
 f4ea6d7dece2662985af5f74e9bcee09  corporate/3.0/i586/mozilla-firefox-es-2.0.0.19-0.1.C30mdk.i586.rpm
 d9caf8c487b9c1421dcf3547f09bc6dc  corporate/3.0/i586/mozilla-firefox-es_AR-2.0.0.19-0.1.C30mdk.i586.rpm
 796cd14856041e793012f8d200408c0a  corporate/3.0/i586/mozilla-firefox-eu-2.0.0.19-0.1.C30mdk.i586.rpm
 ffbe55ce250b12d5a75c84de2116bd9f  corporate/3.0/i586/mozilla-firefox-fi-2.0.0.19-0.1.C30mdk.i586.rpm
 132d2a2ff174ffa64d2e1f1f8f2a0271  corporate/3.0/i586/mozilla-firefox-fr-2.0.0.19-0.1.C30mdk.i586.rpm
 5095690dd40ae1ee9ea76a6cea6cfbb1  corporate/3.0/i586/mozilla-firefox-fy-2.0.0.19-0.1.C30mdk.i586.rpm
 860736d68f0e8b891cc4ad9e2c46ba21  corporate/3.0/i586/mozilla-firefox-ga-2.0.0.19-0.1.C30mdk.i586.rpm
 1593911e02df76a4549ca4ed74345624  corporate/3.0/i586/mozilla-firefox-gu_IN-2.0.0.19-0.1.C30mdk.i586.rpm
 65cc1724789d6da5b0fcb33bac405f0c  corporate/3.0/i586/mozilla-firefox-he-2.0.0.19-0.1.C30mdk.i586.rpm
 dd1cd6300f3118d5c45c9c1416371796  corporate/3.0/i586/mozilla-firefox-hu-2.0.0.19-0.1.C30mdk.i586.rpm
 eb31970460d1d20d26d20a213dcb3032  corporate/3.0/i586/mozilla-firefox-it-2.0.0.19-0.1.C30mdk.i586.rpm
 0bfdf586f72dd57bea948f5b16eb8c52  corporate/3.0/i586/mozilla-firefox-ja-2.0.0.19-0.1.C30mdk.i586.rpm
 8ed800d2af693007c60223a1f42f5617  corporate/3.0/i586/mozilla-firefox-ko-2.0.0.19-0.1.C30mdk.i586.rpm
 6165bffecb7f46ff934956ed976d4faf  corporate/3.0/i586/mozilla-firefox-lt-2.0.0.19-0.1.C30mdk.i586.rpm
 eaeb28b20754253cd7c3d88df79d923c  corporate/3.0/i586/mozilla-firefox-mk-2.0.0.19-0.1.C30mdk.i586.rpm
 5d38bde9a7404a2805c09bfbd1dfef77  corporate/3.0/i586/mozilla-firefox-nb-2.0.0.19-0.1.C30mdk.i586.rpm
 0e4b12df47f47e4513ab2837fa1f2fa5  corporate/3.0/i586/mozilla-firefox-nl-2.0.0.19-0.1.C30mdk.i586.rpm
 6df889907cabe064de4998c405dea090  corporate/3.0/i586/mozilla-firefox-pa_IN-2.0.0.19-0.1.C30mdk.i586.rpm
 26075d9742c8d25eaafc860413d8e2b2  corporate/3.0/i586/mozilla-firefox-pl-2.0.0.19-0.1.C30mdk.i586.rpm
 1f0f5fcbcfc3c0dfc4aabdf77205b922  corporate/3.0/i586/mozilla-firefox-pt-2.0.0.19-0.1.C30mdk.i586.rpm
 d63e8b362f61ff798cfb70bd097a62dc  corporate/3.0/i586/mozilla-firefox-pt_BR-2.0.0.19-0.1.C30mdk.i586.rpm
 a95dee84d19c52bf86057a18154c58b9  corporate/3.0/i586/mozilla-firefox-ro-2.0.0.19-0.1.C30mdk.i586.rpm
 84c4de6789445513f098fe547b6d3d95  corporate/3.0/i586/mozilla-firefox-ru-2.0.0.19-0.1.C30mdk.i586.rpm
 6d1b1ab4a4687b7f65c8411f7b825b38  corporate/3.0/i586/mozilla-firefox-sk-2.0.0.19-0.1.C30mdk.i586.rpm
 e59a753de270f146bcf683726b443107  corporate/3.0/i586/mozilla-firefox-sl-2.0.0.19-0.1.C30mdk.i586.rpm
 6870ac43aed65acbb7b7f7d2891ec89b  corporate/3.0/i586/mozilla-firefox-sv-2.0.0.19-0.1.C30mdk.i586.rpm
 03f6342751638a2e4a8e3e5cf3771ef5  corporate/3.0/i586/mozilla-firefox-tr-2.0.0.19-0.1.C30mdk.i586.rpm
 2dca90ec374e7e8165004ccdee1af78d  corporate/3.0/i586/mozilla-firefox-uk-2.0.0.19-0.1.C30mdk.i586.rpm
 909e512f57cd844f29c290f85a6fbbf5  corporate/3.0/i586/mozilla-firefox-zh_CN-2.0.0.19-0.1.C30mdk.i586.rpm
 70936825d35db564f47361f6ae73e2cc  corporate/3.0/i586/mozilla-firefox-zh_TW-2.0.0.19-0.1.C30mdk.i586.rpm 
 d1e98c49f5725212ae15d8af070c702f  corporate/3.0/SRPMS/mozilla-firefox-2.0.0.19-0.1.C30mdk.src.rpm
 ed1a740caabe90354f5f6d7af605e5d1  corporate/3.0/SRPMS/mozilla-firefox-l10n-2.0.0.19-0.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 843d34cfb5c9d8320269b2b21f7df0be  corporate/3.0/x86_64/lib64nspr4-2.0.0.19-0.1.C30mdk.x86_64.rpm
 2949f58175ab1f85acabd2a8486c1dba  corporate/3.0/x86_64/lib64nspr4-devel-2.0.0.19-0.1.C30mdk.x86_64.rpm
 4c8a13bb9a54788a948ee03db7e85159  corporate/3.0/x86_64/lib64nspr4-static-devel-2.0.0.19-0.1.C30mdk.x86_64.rpm
 ba5db109dd915f0785469a12ec2b9e5b  corporate/3.0/x86_64/lib64nss3-2.0.0.19-0.1.C30mdk.x86_64.rpm
 5dbff9684180d7e26dcd59e800115623  corporate/3.0/x86_64/lib64nss3-devel-2.0.0.19-0.1.C30mdk.x86_64.rpm
 98badb7d947fedb600307fe9962214e9  corporate/3.0/x86_64/mozilla-firefox-2.0.0.19-0.1.C30mdk.x86_64.rpm
 e45f2895e96a3e59d0eae600b7122ccc  corporate/3.0/x86_64/mozilla-firefox-ar-2.0.0.19-0.1.C30mdk.x86_64.rpm
 17641ae7a062077c876698caad16aa14  corporate/3.0/x86_64/mozilla-firefox-bg-2.0.0.19-0.1.C30mdk.x86_64.rpm
 1b61f648b2ac59d2efd6dbdf69fadd48  corporate/3.0/x86_64/mozilla-firefox-br-2.0.0.19-0.1.C30mdk.x86_64.rpm
 fc7217eea5e6e0794df714f3047a15d8  corporate/3.0/x86_64/mozilla-firefox-ca-2.0.0.19-0.1.C30mdk.x86_64.rpm
 8221335474e3df33357eef6241867f24  corporate/3.0/x86_64/mozilla-firefox-cs-2.0.0.19-0.1.C30mdk.x86_64.rpm
 2d5882d6fec5a58346e1ef534ffcc21f  corporate/3.0/x86_64/mozilla-firefox-da-2.0.0.19-0.1.C30mdk.x86_64.rpm
 32597cbfea4b9adf4d2fdcd405027f6c  corporate/3.0/x86_64/mozilla-firefox-de-2.0.0.19-0.1.C30mdk.x86_64.rpm
 5bfe4f243a4c51367f51eb3b21d3ee6c  corporate/3.0/x86_64/mozilla-firefox-devel-2.0.0.19-0.1.C30mdk.x86_64.rpm
 03140a5a0e69e7a93758ac419a28ee68  corporate/3.0/x86_64/mozilla-firefox-el-2.0.0.19-0.1.C30mdk.x86_64.rpm
 07ac14e68fc0a942ab258a40b7e6a592  corporate/3.0/x86_64/mozilla-firefox-es-2.0.0.19-0.1.C30mdk.x86_64.rpm
 986c71d25d213bc718cf5c2cd0f125a7  corporate/3.0/x86_64/mozilla-firefox-es_AR-2.0.0.19-0.1.C30mdk.x86_64.rpm
 f77490aae83e099f214f777eb9cecb60  corporate/3.0/x86_64/mozilla-firefox-eu-2.0.0.19-0.1.C30mdk.x86_64.rpm
 840ca2bd20bbb0a2384a6be4972224f8  corporate/3.0/x86_64/mozilla-firefox-fi-2.0.0.19-0.1.C30mdk.x86_64.rpm
 f58433299ca354c88d749a6dcf574012  corporate/3.0/x86_64/mozilla-firefox-fr-2.0.0.19-0.1.C30mdk.x86_64.rpm
 cbe8b0779040d261f6fe71069acc1857  corporate/3.0/x86_64/mozilla-firefox-fy-2.0.0.19-0.1.C30mdk.x86_64.rpm
 f33e7d6ea3b5fa793313c7695e8f271f  corporate/3.0/x86_64/mozilla-firefox-ga-2.0.0.19-0.1.C30mdk.x86_64.rpm
 d89f8b3356a816b4cf6c6526733a28ce  corporate/3.0/x86_64/mozilla-firefox-gu_IN-2.0.0.19-0.1.C30mdk.x86_64.rpm
 59773234356bdb67ea87523c78b59257  corporate/3.0/x86_64/mozilla-firefox-he-2.0.0.19-0.1.C30mdk.x86_64.rpm
 78f473b3a7ee937f26885234e8484ee6  corporate/3.0/x86_64/mozilla-firefox-hu-2.0.0.19-0.1.C30mdk.x86_64.rpm
 dbe51a0408862117f2bc8041e5bdf310  corporate/3.0/x86_64/mozilla-firefox-it-2.0.0.19-0.1.C30mdk.x86_64.rpm
 a4f505c8b42f40402a1ff8ed2ca95812  corporate/3.0/x86_64/mozilla-firefox-ja-2.0.0.19-0.1.C30mdk.x86_64.rpm
 878fdee3884852c3191792ecd8b2537d  corporate/3.0/x86_64/mozilla-firefox-ko-2.0.0.19-0.1.C30mdk.x86_64.rpm
 249ffbf12a1553b7b27abfd758326aa1  corporate/3.0/x86_64/mozilla-firefox-lt-2.0.0.19-0.1.C30mdk.x86_64.rpm
 b021b83b1da69e674eb283832ef3e705  corporate/3.0/x86_64/mozilla-firefox-mk-2.0.0.19-0.1.C30mdk.x86_64.rpm
 0b7cef1af7c21d0bba1463135b146df4  corporate/3.0/x86_64/mozilla-firefox-nb-2.0.0.19-0.1.C30mdk.x86_64.rpm
 4d3f8b7c25e48e6b2a55d3d9620f8fc0  corporate/3.0/x86_64/mozilla-firefox-nl-2.0.0.19-0.1.C30mdk.x86_64.rpm
 b6783a2b3ab8e6d9dbbf8ee77cb0915a  corporate/3.0/x86_64/mozilla-firefox-pa_IN-2.0.0.19-0.1.C30mdk.x86_64.rpm
 93823522e27098b97ca102b852ce7bef  corporate/3.0/x86_64/mozilla-firefox-pl-2.0.0.19-0.1.C30mdk.x86_64.rpm
 4bd135cc5e0f28b92dc2bc98943ff64c  corporate/3.0/x86_64/mozilla-firefox-pt-2.0.0.19-0.1.C30mdk.x86_64.rpm
 773bf683dcc172045f8cc00f1551138b  corporate/3.0/x86_64/mozilla-firefox-pt_BR-2.0.0.19-0.1.C30mdk.x86_64.rpm
 4c41a47368446fc7dbb5e37fd2df58db  corporate/3.0/x86_64/mozilla-firefox-ro-2.0.0.19-0.1.C30mdk.x86_64.rpm
 1a4c3aae60452cd23289e4169b830b9c  corporate/3.0/x86_64/mozilla-firefox-ru-2.0.0.19-0.1.C30mdk.x86_64.rpm
 09d09b484d32493d5e8aaf0b2f472bd1  corporate/3.0/x86_64/mozilla-firefox-sk-2.0.0.19-0.1.C30mdk.x86_64.rpm
 2261f8f0043be2a16fc8efa881fbbe13  corporate/3.0/x86_64/mozilla-firefox-sl-2.0.0.19-0.1.C30mdk.x86_64.rpm
 0d8a98d0aa4c3711cdd18d5f14c7756e  corporate/3.0/x86_64/mozilla-firefox-sv-2.0.0.19-0.1.C30mdk.x86_64.rpm
 8ede8ac94704c2c41f2545be957742f3  corporate/3.0/x86_64/mozilla-firefox-tr-2.0.0.19-0.1.C30mdk.x86_64.rpm
 9d057d749a4230c04d100b60d38e9257  corporate/3.0/x86_64/mozilla-firefox-uk-2.0.0.19-0.1.C30mdk.x86_64.rpm
 9361222edb190a2d9ea6f056d0b25228  corporate/3.0/x86_64/mozilla-firefox-zh_CN-2.0.0.19-0.1.C30mdk.x86_64.rpm
 49bf22c63ecbf9c04bd7eaa8a641f321  corporate/3.0/x86_64/mozilla-firefox-zh_TW-2.0.0.19-0.1.C30mdk.x86_64.rpm 
 d1e98c49f5725212ae15d8af070c702f  corporate/3.0/SRPMS/mozilla-firefox-2.0.0.19-0.1.C30mdk.src.rpm
 ed1a740caabe90354f5f6d7af605e5d1  corporate/3.0/SRPMS/mozilla-firefox-l10n-2.0.0.19-0.1.C30mdk.src.rpm

 Corporate 4.0:
 d4cb3bd4d726b06ddaab5190b0c749fa  corporate/4.0/i586/libnspr4-2.0.0.19-0.1.20060mlcs4.i586.rpm
 5b2e82b25652a5ed134a33273385748c  corporate/4.0/i586/libnspr4-devel-2.0.0.19-0.1.20060mlcs4.i586.rpm
 4640c4ec70e464a6262a1a1e6d0dec84  corporate/4.0/i586/libnspr4-static-devel-2.0.0.19-0.1.20060mlcs4.i586.rpm
 592f1be6b8de7e4e82993680fe096762  corporate/4.0/i586/libnss3-2.0.0.19-0.1.20060mlcs4.i586.rpm
 0fe64c2ac08ddd0ab3bca5be9edfa3c3  corporate/4.0/i586/libnss3-devel-2.0.0.19-0.1.20060mlcs4.i586.rpm
 5156aacca7670d32a98987503b45f8a1  corporate/4.0/i586/mozilla-firefox-2.0.0.19-0.1.20060mlcs4.i586.rpm
 f698550b05f7b24aab0115d29c5ad501  corporate/4.0/i586/mozilla-firefox-af-2.0.0.19-0.1.20060mlcs4.i586.rpm
 1c67a70194b8ab4545868108dc4cccc4  corporate/4.0/i586/mozilla-firefox-ar-2.0.0.19-0.1.20060mlcs4.i586.rpm
 17b070507cfa9017d04737f52eff38d9  corporate/4.0/i586/mozilla-firefox-be-2.0.0.19-0.1.20060mlcs4.i586.rpm
 892d8c38889952737d65850db8bed7a9  corporate/4.0/i586/mozilla-firefox-bg-2.0.0.19-0.1.20060mlcs4.i586.rpm
 660dfda8217385eae3c276fed641c499  corporate/4.0/i586/mozilla-firefox-br_FR-2.0.0.19-0.1.20060mlcs4.i586.rpm
 f50d79c831f9765809a91706947f8d59  corporate/4.0/i586/mozilla-firefox-ca-2.0.0.19-0.1.20060mlcs4.i586.rpm
 f971ce7e079986cb8be0d1efaeaefa97  corporate/4.0/i586/mozilla-firefox-cs-2.0.0.19-0.1.20060mlcs4.i586.rpm
 5bfbca68b5824a3eaa81b559fd99c398  corporate/4.0/i586/mozilla-firefox-da-2.0.0.19-0.1.20060mlcs4.i586.rpm
 49e86f863afaa55b0e83a69d588a883f  corporate/4.0/i586/mozilla-firefox-de-2.0.0.19-0.1.20060mlcs4.i586.rpm
 f0469e4e3923161093adee1ff46b9093  corporate/4.0/i586/mozilla-firefox-devel-2.0.0.19-0.1.20060mlcs4.i586.rpm
 e3dce53d5a4bc6af63fd7c4ec3a4f7d2  corporate/4.0/i586/mozilla-firefox-el-2.0.0.19-0.1.20060mlcs4.i586.rpm
 b28a40484f46c2bbfc8d12ec3f5adf62  corporate/4.0/i586/mozilla-firefox-en_GB-2.0.0.19-0.1.20060mlcs4.i586.rpm
 9652694d3e8340becd4af74af125cf7b  corporate/4.0/i586/mozilla-firefox-es_AR-2.0.0.19-0.1.20060mlcs4.i586.rpm
 8e8a1352df61ca93357c15ba94dcf9e3  corporate/4.0/i586/mozilla-firefox-es_ES-2.0.0.19-0.1.20060mlcs4.i586.rpm
 35b488c1999ba644e16bc8fbaebb444b  corporate/4.0/i586/mozilla-firefox-et_EE-2.0.0.19-0.1.20060mlcs4.i586.rpm
 fcb7794c20e3063f53dae155a8b07294  corporate/4.0/i586/mozilla-firefox-eu-2.0.0.19-0.1.20060mlcs4.i586.rpm
 13c02a4abf963c8f00481efafc80ba60  corporate/4.0/i586/mozilla-firefox-fi-2.0.0.19-0.1.20060mlcs4.i586.rpm
 a1330810355ea568f7821eb45cfc7fce  corporate/4.0/i586/mozilla-firefox-fr-2.0.0.19-0.1.20060mlcs4.i586.rpm
 d381c9d11fc12e2ce07cacd065a3e3b7  corporate/4.0/i586/mozilla-firefox-fy-2.0.0.19-0.1.20060mlcs4.i586.rpm
 df50934b1f50399d27795409e434df0f  corporate/4.0/i586/mozilla-firefox-ga-2.0.0.19-0.1.20060mlcs4.i586.rpm
 b80216bd4fce56a756ab57a403c92b6c  corporate/4.0/i586/mozilla-firefox-gu_IN-2.0.0.19-0.1.20060mlcs4.i586.rpm
 f776b39bca14c1e0647dc0a9a8c4526d  corporate/4.0/i586/mozilla-firefox-he-2.0.0.19-0.1.20060mlcs4.i586.rpm
 057032a70e8c4820f50207f5b7c16063  corporate/4.0/i586/mozilla-firefox-hu-2.0.0.19-0.1.20060mlcs4.i586.rpm
 eb528e4465f9bf16bb43ab8817568158  corporate/4.0/i586/mozilla-firefox-it-2.0.0.19-0.1.20060mlcs4.i586.rpm
 34e0f3bbeef0ccc78083de6c1ee7af78  corporate/4.0/i586/mozilla-firefox-ja-2.0.0.19-0.1.20060mlcs4.i586.rpm
 4a3de02c3076eb279d58ffde92bc6e2e  corporate/4.0/i586/mozilla-firefox-ka-2.0.0.19-0.1.20060mlcs4.i586.rpm
 292feaf38d5b4472fd08e50f3b0127db  corporate/4.0/i586/mozilla-firefox-ko-2.0.0.19-0.1.20060mlcs4.i586.rpm
 e672eae350456ee541bd6950d4f14e35  corporate/4.0/i586/mozilla-firefox-ku-2.0.0.19-0.1.20060mlcs4.i586.rpm
 c422029dd8b0d17ebe2019b3bab29c87  corporate/4.0/i586/mozilla-firefox-lt-2.0.0.19-0.1.20060mlcs4.i586.rpm
 847e53d7bae6f328113176c049766fb9  corporate/4.0/i586/mozilla-firefox-mk-2.0.0.19-0.1.20060mlcs4.i586.rpm
 2fd3d55e31a9e1140822d7257f34a69d  corporate/4.0/i586/mozilla-firefox-mn-2.0.0.19-0.1.20060mlcs4.i586.rpm
 3a1126205f8f268b0277b2b7736aeeab  corporate/4.0/i586/mozilla-firefox-nb_NO-2.0.0.19-0.1.20060mlcs4.i586.rpm
 8cceb66283fc4b50f8484769894c30b7  corporate/4.0/i586/mozilla-firefox-nl-2.0.0.19-0.1.20060mlcs4.i586.rpm
 a5c700a733c754d387ee5d9484d711df  corporate/4.0/i586/mozilla-firefox-nn_NO-2.0.0.19-0.1.20060mlcs4.i586.rpm
 6d298de171571eccfe1612c56b1e9981  corporate/4.0/i586/mozilla-firefox-pa_IN-2.0.0.19-0.1.20060mlcs4.i586.rpm
 6df4d174aa7ae064be8f8d1d8c843d17  corporate/4.0/i586/mozilla-firefox-pl-2.0.0.19-0.1.20060mlcs4.i586.rpm
 150da7b5f103afa8ce2b957dabd45a9c  corporate/4.0/i586/mozilla-firefox-pt_BR-2.0.0.19-0.1.20060mlcs4.i586.rpm
 b9b12041dd102a81def9634d98829a12  corporate/4.0/i586/mozilla-firefox-pt_PT-2.0.0.19-0.1.20060mlcs4.i586.rpm
 2633bfb572cb43a3a346510b30659767  corporate/4.0/i586/mozilla-firefox-ro-2.0.0.19-0.1.20060mlcs4.i586.rpm
 c3cdec2cb36d86ca435b8b4fd7d050b6  corporate/4.0/i586/mozilla-firefox-ru-2.0.0.19-0.1.20060mlcs4.i586.rpm
 b18f6e51b03aefa86c80a5d8cc837364  corporate/4.0/i586/mozilla-firefox-sk-2.0.0.19-0.1.20060mlcs4.i586.rpm
 b55c21b09a195e23ecce040c29ca8d99  corporate/4.0/i586/mozilla-firefox-sl-2.0.0.19-0.1.20060mlcs4.i586.rpm
 baeee02e3ccc8dac85a44844914dff3c  corporate/4.0/i586/mozilla-firefox-sv_SE-2.0.0.19-0.1.20060mlcs4.i586.rpm
 816d0a2fbc5d6542df70acf341cf3cbc  corporate/4.0/i586/mozilla-firefox-tr-2.0.0.19-0.1.20060mlcs4.i586.rpm
 0f6805b0258a96394f8fb716a2c25615  corporate/4.0/i586/mozilla-firefox-uk-2.0.0.19-0.1.20060mlcs4.i586.rpm
 49f1016eeaed4249bac26e1e4eddd847  corporate/4.0/i586/mozilla-firefox-zh_CN-2.0.0.19-0.1.20060mlcs4.i586.rpm
 6796e061850e9010567a92206262f39a  corporate/4.0/i586/mozilla-firefox-zh_TW-2.0.0.19-0.1.20060mlcs4.i586.rpm 
 1c09017810522b17122227f7b6b61a47  corporate/4.0/SRPMS/mozilla-firefox-2.0.0.19-0.1.20060mlcs4.src.rpm
 a2ee0895eb2196e83e07cb5bc0781310  corporate/4.0/SRPMS/mozilla-firefox-l10n-2.0.0.19-0.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 08a8604f90713669f4e1190607a6d08a  corporate/4.0/x86_64/lib64nspr4-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 36b80b972057761306e2f225235821c8  corporate/4.0/x86_64/lib64nspr4-devel-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 ff4e835db60fe8541aedcbf9c4501ca1  corporate/4.0/x86_64/lib64nspr4-static-devel-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 68beed272e2c5e85d13d48d1a343e810  corporate/4.0/x86_64/lib64nss3-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 a5f7691d64fb1b70d82de84062a10d97  corporate/4.0/x86_64/lib64nss3-devel-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 425fd3aa739ee88bb798804936252a08  corporate/4.0/x86_64/mozilla-firefox-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 963a5dadd99b05165d5415b1bb31cfd9  corporate/4.0/x86_64/mozilla-firefox-af-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 16739a31d46401245ae8cd0c81d527b3  corporate/4.0/x86_64/mozilla-firefox-ar-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 c2bc77371bf03cfe8aa167126f94c9e2  corporate/4.0/x86_64/mozilla-firefox-be-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 cb78331dba10b326579d36af99e6732b  corporate/4.0/x86_64/mozilla-firefox-bg-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 159b2f61d5b0643e3891521da80207a6  corporate/4.0/x86_64/mozilla-firefox-br_FR-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 7dc141016e6af5be3a7740fa16b87ca0  corporate/4.0/x86_64/mozilla-firefox-ca-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 2ae66a133bd61dc2164a226782b08f78  corporate/4.0/x86_64/mozilla-firefox-cs-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 e47ad63990d5703a580f2d9362f784da  corporate/4.0/x86_64/mozilla-firefox-da-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 8874bfabdd13df5fcc556775bcc9c1d9  corporate/4.0/x86_64/mozilla-firefox-de-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 2cf386ec0b49c409c7f8efcb8e1daee9  corporate/4.0/x86_64/mozilla-firefox-devel-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 d84ad1a3d782ee92b0893100444dcd1e  corporate/4.0/x86_64/mozilla-firefox-el-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 85a9eca8956786c854648eedf8ea832e  corporate/4.0/x86_64/mozilla-firefox-en_GB-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 e13b105a087bc918f7d8d5b47702ffab  corporate/4.0/x86_64/mozilla-firefox-es_AR-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 789cfe7fa6643b9091532b5f771ef156  corporate/4.0/x86_64/mozilla-firefox-es_ES-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 98cab609371ae0fec1df19b310532ba2  corporate/4.0/x86_64/mozilla-firefox-et_EE-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 cb83ae2eb3bffa0400d257fa6a63d0d1  corporate/4.0/x86_64/mozilla-firefox-eu-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 05d74ca9aabe0f37ad46427578c998e9  corporate/4.0/x86_64/mozilla-firefox-fi-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 07ec77773c87bd2c2cb460845a552502  corporate/4.0/x86_64/mozilla-firefox-fr-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 5d86bb729e13aa45a0e6ba98ea6fe7cf  corporate/4.0/x86_64/mozilla-firefox-fy-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 c5747925339a84303a2436dab4e9e3af  corporate/4.0/x86_64/mozilla-firefox-ga-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 3cdc7291338451a40b7f68735041184b  corporate/4.0/x86_64/mozilla-firefox-gu_IN-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 9c13c775b20a66dc5e7de40c00e2a381  corporate/4.0/x86_64/mozilla-firefox-he-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 c376685454c1e6762216ff2777afdead  corporate/4.0/x86_64/mozilla-firefox-hu-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 89588e24f0090101e215bef06575c903  corporate/4.0/x86_64/mozilla-firefox-it-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 55d73f42bd999de4a7624f626ad6bbaf  corporate/4.0/x86_64/mozilla-firefox-ja-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 bc7bd65dedd37b6c061cabc5f0b7fdc2  corporate/4.0/x86_64/mozilla-firefox-ka-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 49e25880bea3eb589b0d7fd76d3d4507  corporate/4.0/x86_64/mozilla-firefox-ko-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 be2e3da875eabd0df6675358239bf491  corporate/4.0/x86_64/mozilla-firefox-ku-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 ce57f8aa97ed6df332184284ce8162bb  corporate/4.0/x86_64/mozilla-firefox-lt-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 1130b569e4fbf81eee595c02fc1e7e2a  corporate/4.0/x86_64/mozilla-firefox-mk-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 7968ad74724eca4d8a9ac6349a91226a  corporate/4.0/x86_64/mozilla-firefox-mn-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 ebb183c1df2e537c0d80a9a5eb16e2c4  corporate/4.0/x86_64/mozilla-firefox-nb_NO-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 69477b6ee4f5bcb52d9ade783ef9ca07  corporate/4.0/x86_64/mozilla-firefox-nl-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 a2d1cd1daa4b0da3ca86220c6e6fcf4b  corporate/4.0/x86_64/mozilla-firefox-nn_NO-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 5461b070c6a7cdc445b26c5a86fad4ad  corporate/4.0/x86_64/mozilla-firefox-pa_IN-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 f15ec6611a130a3f7ffbca04cd0b8168  corporate/4.0/x86_64/mozilla-firefox-pl-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 7b1567c1a8ce872cb1ca45acd1aea848  corporate/4.0/x86_64/mozilla-firefox-pt_BR-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 3098b39980684944b46d203083addf72  corporate/4.0/x86_64/mozilla-firefox-pt_PT-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 e4ae9273d7d44be3dab809528374cd34  corporate/4.0/x86_64/mozilla-firefox-ro-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 e033cc9e774f18d645aca65d91af1887  corporate/4.0/x86_64/mozilla-firefox-ru-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 967a07be298b4708f7102fa9a5f4a212  corporate/4.0/x86_64/mozilla-firefox-sk-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 ef051ddb22b177bcf2e2d5408b258fc1  corporate/4.0/x86_64/mozilla-firefox-sl-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 c52709df45b95663c42d65fe3cc29367  corporate/4.0/x86_64/mozilla-firefox-sv_SE-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 00dd7e52781bee4476c4a2f5bdf42a4e  corporate/4.0/x86_64/mozilla-firefox-tr-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 3191ac84cc2e4a9c00169cdef62f5d13  corporate/4.0/x86_64/mozilla-firefox-uk-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 b43739e74f0aed412bc8f92044068ec2  corporate/4.0/x86_64/mozilla-firefox-zh_CN-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
 c8a3df4ac8c548cec72499df61b32219  corporate/4.0/x86_64/mozilla-firefox-zh_TW-2.0.0.19-0.1.20060mlcs4.x86_64.rpm 
 1c09017810522b17122227f7b6b61a47  corporate/4.0/SRPMS/mozilla-firefox-2.0.0.19-0.1.20060mlcs4.src.rpm
 a2ee0895eb2196e83e07cb5bc0781310  corporate/4.0/SRPMS/mozilla-firefox-l10n-2.0.0.19-0.1.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJSVt8mqjQ0CJFipgRAjVhAKCmLNHHWzvsMAYUPQ1FnvhWVj7E9gCg2RFg
SHHOhE0nqOalwRNqRwY1rv4=q77o
-----END PGP SIGNATURE-----

From - Thu Dec 18 11:40:56 2008
X-Account-Key: account7
X-UIDL: 4909bb8c0000526c
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38961-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 2768DEC142
for <lists@securityspace.com>; Thu, 18 Dec 2008 11:39:17 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id BB3DC237203; Thu, 18 Dec 2008 09:20:26 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 1437 invoked from network); 17 Dec 2008 23:36:08 -0000
Date: Wed, 17 Dec 2008 17:54:48 -0600
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Cc: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk
Subject: [USN-690-1] Firefox and xulrunner vulnerabilities
Message-ID: <20081217235447.GC16973@severus.strandboge.com>
Reply-To: Jamie Strandboge <jamie@canonical.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="24zk1gE8NUlDmwG9"
Content-Disposition: inline
User-Agent: Mutt/1.5.18 (2008-05-17)
Status:   


--24zk1gE8NUlDmwG9
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================Ubuntu Security Notice USN-690-1          December 17, 2008
firefox-3.0, xulrunner-1.9 vulnerabilities
CVE-2008-5500, CVE-2008-5501, CVE-2008-5502, CVE-2008-5505,
CVE-2008-5506, CVE-2008-5507, CVE-2008-5508, CVE-2008-5510,
CVE-2008-5511, CVE-2008-5512, CVE-2008-5513
==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
  firefox-3.0                     3.0.5+nobinonly-0ubuntu0.8.04.1
  xulrunner-1.9                   1.9.0.5+nobinonly-0ubuntu0.8.04.1

Ubuntu 8.10:
  abrowser                        3.0.5+nobinonly-0ubuntu0.8.10.1
  firefox-3.0                     3.0.5+nobinonly-0ubuntu0.8.10.1
  xulrunner-1.9                   1.9.0.5+nobinonly-0ubuntu0.8.10.1

After a standard system upgrade you need to restart Firefox and any
applications that use xulrunner, such as Epiphany, to effect the necessary
changes.

Details follow:

Several flaws were discovered in the browser engine. These problems could allow
an attacker to crash the browser and possibly execute arbitrary code with user
privileges. (CVE-2008-5500, CVE-2008-5501, CVE-2008-5502)

It was discovered that Firefox did not properly handle persistent cookie data.
If a user were tricked into opening a malicious website, an attacker could
write persistent data in the user's browser and track the user across browsing
sessions. (CVE-2008-5505)

Marius Schilder discovered that Firefox did not properly handle redirects to
an outside domain when an XMLHttpRequest was made to a same-origin resource.
It's possible that sensitive information could be revealed in the
XMLHttpRequest response. (CVE-2008-5506)

Chris Evans discovered that Firefox did not properly protect a user's data when
accessing a same-domain Javascript URL that is redirected to an unparsable
Javascript off-site resource. If a user were tricked into opening a malicious
website, an attacker may be able to steal a limited amount of private data.
(CVE-2008-5507)

Chip Salzenberg, Justin Schuh, Tom Cross, and Peter William discovered Firefox
did not properly parse URLs when processing certain control characters.
(CVE-2008-5508)

Kojima Hajime discovered that Firefox did not properly handle an escaped null
character. An attacker may be able to exploit this flaw to bypass script
sanitization. (CVE-2008-5510)

Several flaws were discovered in the Javascript engine. If a user were tricked
into opening a malicious website, an attacker could exploit this to execute
arbitrary Javascript code within the context of another website or with chrome
privileges. (CVE-2008-5511, CVE-2008-5512)

Flaws were discovered in the session-restore feature of Firefox. If a user were
tricked into opening a malicious website, an attacker could exploit this to
perform cross-site scripting attacks or execute arbitrary Javascript code with
chrome privileges. (CVE-2008-5513)


Updated packages for Ubuntu 8.04 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1.diff.gz
      Size/MD5:   105923 f12b085d54cf9974f59417c819369f7b
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1.dsc
      Size/MD5:     2073 f77df6017c984d30a3d94852d612592c
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly.orig.tar.gz
      Size/MD5: 11578151 aab85acc009ddf9e0949f6ef8021c629
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1.diff.gz
      Size/MD5:    77585 714fea2e00f4d2d225419b7714617379
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1.dsc
      Size/MD5:     2138 29439d2544479c7d6071b77b5392beca
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly.orig.tar.gz
      Size/MD5: 40094530 e717d276d7d511ec448c7a308ed38ea7

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    66036 1c795fc7e998798eb93166ad6749a782
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    66044 6a91da8f7b1e0f5e8bcee8290ffe8f79
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-granparadiso-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    66008 043213fede954207a951faa3fb3dbcef
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-trunk-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    65996 39449a48e9cf507448f4fe112a9f56bc
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    66156 73604deb3466eaf56dc056d04e416822
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-3.0-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    66052 83fb81251f8b3f92c461ee635708820e
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-3.0-venkman_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    66008 f6362a50f39b38bd11cc941f8615fd49
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:     8970 45df438b9017a5f95613f9f6291cf7cd
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:     8958 eca17510d43167e2ad66b8599ad401cf
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    66022 0c93b1ea43acf714e17e54731b4569ce
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    65998 92405ff0ca1ef276f55933550931ab95
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-libthai_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    65988 b137cb25439d194b1c8e38869505c098
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:     8944 be02daff747f512c21ed7a50653757bc
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    66018 3879e7321a0f861d4bce64eae8b8d623
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-venkman_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:     8932 c24a7b83f085217e62b7f6f7bd151732
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:    65984 0e378bddf711e95f9895b952962594e4
    http://security.ubuntu.com/ubuntu/pool/universe/x/xulrunner-1.9/xulrunner-1.9-dom-inspector_1.9.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:   125348 33ff243ae638990d73446c96f403f4eb
    http://security.ubuntu.com/ubuntu/pool/universe/x/xulrunner-1.9/xulrunner-1.9-venkman_1.9.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
      Size/MD5:   235314 ad988c3c4f8be87f14c422c8a2cb107c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_amd64.deb
      Size/MD5:     9030 e3b340d3ae143e9eae81f500a7b11077
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_amd64.deb
      Size/MD5:    29574 cbd4dbed6f4096b3445a460a06c43c23
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1_amd64.deb
      Size/MD5:  1091122 700b3711b3eafe72f06dbd296f5ff38d
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.04.1_amd64.deb
      Size/MD5:  4040604 78ac96232377ba5edb4d9d2d8ff08bd9
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.04.1_amd64.deb
      Size/MD5:    48646 b22abb70c963fd8b16012a7026bea48a
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1_amd64.deb
      Size/MD5:  9036702 a657caadf7d09cb666e23e5403ced1af

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_i386.deb
      Size/MD5:     9026 a25a831bcf9987f805e5743a17172f9f
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_i386.deb
      Size/MD5:    25728 2e8ef8a7a9121f643cf577cd7e5a6af4
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1_i386.deb
      Size/MD5:  1069810 fd85ceb052f5c4265185f356b0f6ecb8
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.04.1_i386.deb
      Size/MD5:  4022272 94ec411ee9d57eaf7766bcdb204465c2
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.04.1_i386.deb
      Size/MD5:    38502 3834df3ad8ee516ce6a2c7b4a8998248
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1_i386.deb
      Size/MD5:  7768580 d6fb4dec2238d7aef940d78a2b60c805

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_lpia.deb
      Size/MD5:     9026 7fe24779d67d50bf5d9e0792820b3e70
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_lpia.deb
      Size/MD5:    25342 a4ba8aab36015afafd94f33bdb77f251
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1_lpia.deb
      Size/MD5:  1067000 905c0e506b30756e3f33f605fed4bf9d
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.04.1_lpia.deb
      Size/MD5:  4017332 2741a8cee9059d132cbfb8f9825ff29e
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.04.1_lpia.deb
      Size/MD5:    37600 8211098ce04cb914c30a5dd751787a22
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1_lpia.deb
      Size/MD5:  7655022 41b7d3c30c3ec0425a9ae6f7c9e5aa96

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_powerpc.deb
      Size/MD5:     9024 8b0948e68925ab362b02323ff8980565
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_powerpc.deb
      Size/MD5:    27498 c8d00ee74d9c41f5531212097deffabf
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1_powerpc.deb
      Size/MD5:  1084140 242611e7a37838dd02b311d60b32102a
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.04.1_powerpc.deb
      Size/MD5:  4028614 b1ce404c093b830dec1a7a763a4e44e1
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.04.1_powerpc.deb
      Size/MD5:    43668 e4b818ef433243f1188808c242a6a0a8
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1_powerpc.deb
      Size/MD5:  8612226 03a50ddf14ac10c5448a9a70f80cb5b9

Updated packages for Ubuntu 8.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1.diff.gz
      Size/MD5:   123819 b26276997b7832f8deff25479cadc36c
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1.dsc
      Size/MD5:     2128 c5c875ad949d7e14f2c7b69bb92aab49
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly.orig.tar.gz
      Size/MD5: 11578151 aab85acc009ddf9e0949f6ef8021c629
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1.diff.gz
      Size/MD5:   251178 3e361bba71a28e82ac6c8c87a32e695e
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1.dsc
      Size/MD5:     2156 75e21bd096b069db82d0d601f26ca1a9
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly.orig.tar.gz
      Size/MD5: 40094530 e717d276d7d511ec448c7a308ed38ea7

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/abrowser_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68832 a17c00ade509ee07eb84b3e44e993161
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68736 cbbf7badc50f34dc0f04cf37498ea137
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68746 3c108b3c47efdbea2d466bce80fd3df2
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-granparadiso-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68710 f16542e1c96efb239667686fd230a2b6
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-trunk-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68690 230313a66ccac9ecb0168086132c8754
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68828 f6f7b7b9a354232fa83657149673eec9
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-3.0-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68758 797bb994fb74066309109c926f2730e5
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-3.0-venkman_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68704 f4eb5d6a52dd1b2c6593d5fa696bd61e
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:     8968 2372669d8f258023612668f4e6e83940
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:     8962 e7df3bcb18e73499d586bbc5182c00c6
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68730 ef489a27b3aee1da8a200051bec6288a
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68696 6707a9bc2efb993c8a1520cbf3b9415c
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-libthai_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68690 0784cc95e2b0c677d0d104378fe2472e
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:     8946 45b017f290872bb395f9a9ed8782e9fa
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68716 d19947268cfa33c8b5ec5b9fba251509
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-venkman_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:     8936 d6c2e934fe528b7775d383a475bc2660
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:    68682 31c3218d61ebce7622c920769feb74d1
    http://security.ubuntu.com/ubuntu/pool/universe/x/xulrunner-1.9/xulrunner-1.9-dom-inspector_1.9.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:   127356 96b6afcd843542ff5cf9b794481eb917
    http://security.ubuntu.com/ubuntu/pool/universe/x/xulrunner-1.9/xulrunner-1.9-venkman_1.9.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
      Size/MD5:   237144 9687222fc13c98eb33a389cf7436de9f

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/abrowser-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
      Size/MD5:   203568 ab3d2bf1e57510999d8f8b6931b151e7
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
      Size/MD5:   201918 a82483844898613a853ebb3ae1931de4
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
      Size/MD5:    68794 296d19503162b5a0bbf64203bf734c88
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
      Size/MD5:    88232 cfb6a2b90ccf22879118229ac24e7eba
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
      Size/MD5:   904660 9fbc37e8a2e300b4f50893bd3cb8be33
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
      Size/MD5:  4557732 4ed9ecb6bd528dc3ff1dc78881bbc767
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
      Size/MD5:    47104 597d270dc2ea88e88c25288c16525efa
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
      Size/MD5:  8704984 b88caa34f6907339b2c747b536ecc977
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
      Size/MD5:    22452 f21a8578d4682d6ec6dfb5722ca7bcf5

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/abrowser-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
      Size/MD5:   203566 e0779108ab88a324bf5e876debbdf9bc
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
      Size/MD5:   201910 60b13ffa5693a02960447951be67efb6
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
      Size/MD5:    68796 19d49197333232db191ace34bf789828
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
      Size/MD5:    84282 719a8d695c8d2833330d878d1b463cad
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
      Size/MD5:   886680 4949dce5a2c8998dbfec3d0391873f36
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
      Size/MD5:  4534426 ce11a793e29ae66eaf5b4e1c9534435b
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
      Size/MD5:    39372 ad427dd7cdd931b37924b7b8770f32e4
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
      Size/MD5:  7536414 ce809475aebab883eea0fa3668d50e41
    http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
      Size/MD5:    22450 93cef6499cf1738f2c0c0d20d9a44475

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/f/firefox-3.0/abrowser-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
      Size/MD5:   203562 6a60fee763d775ac1e448b159e993def
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
      Size/MD5:   201908 820b2f87fd26c6aff980ee88594e8a58
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
      Size/MD5:    68794 ec0c6d8a9008ef3b69deaf70692f21b7
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
      Size/MD5:    83692 f4b3ac017018b5d93003f94068c11f8c
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
      Size/MD5:   883786 c251a0cf7c157a8700c74e83e3816fe3
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
      Size/MD5:  4531200 1b91e0dcb6da9082047be8b08b393300
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
      Size/MD5:    38408 093707eb9c1f5f5a79227a3e0784c466
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
      Size/MD5:  7428760 41b49255d047cbe2b40a32f30c19a642
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
      Size/MD5:    22454 fd342c47c662c396fb0cf930680d1ee5

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/f/firefox-3.0/abrowser-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
      Size/MD5:   203580 0a0c9cb64777717ce6ac7156f348d8e4
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
      Size/MD5:   201916 3b8e02583e533687c1f601f542ac71b7
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
      Size/MD5:    68800 1e9c80f34615ab5f467537115ae13384
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
      Size/MD5:    85674 f7e9d073d0e7d5d06804280535e63a1d
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
      Size/MD5:   898206 6b5965045934a26d2413118177618e83
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
      Size/MD5:  4525324 f985f891118cc3596d050cae0936c4a3
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
      Size/MD5:    42406 a573aecacb4666596a91890e7cf9aa4c
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
      Size/MD5:  8270874 3502c2d0c9b10b2171c934c211b5eee4
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
      Size/MD5:    22456 5191b9fd559e4752707f9a5ec552fcb5

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/f/firefox-3.0/abrowser-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
      Size/MD5:   203560 20d718e426e621b2f9fc01db7d363f41
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
      Size/MD5:   201922 a2c148548d836a713868d77e93524d25
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
      Size/MD5:    68798 83c481eb2b42d690601e7d1b5486bc53
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
      Size/MD5:    83346 64533b3f9f06821a3a23b180b8556942
    http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
      Size/MD5:   886616 f175f18d0f504db8422b7fd996102177
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
      Size/MD5:  4511354 52e85b07a91b431f5276582dec6df47c
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
      Size/MD5:    37870 bb831cf3b5eb3ef07dd2e6e6a7341e5b
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
      Size/MD5:  8089008 96759018dcdb9ae7a2bbfd9b68e228dc
    http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
      Size/MD5:    22454 b0d6337af6856ba7bdaad625a9fc306e





© 1998-2025 E-Soft Inc. All rights reserved.