===========================================================
Ubuntu Security Notice USN-691-1 December 16, 2008
ruby1.9 vulnerability
CVE-2008-3443, CVE-2008-3790
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 8.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 8.10:
ruby1.9 1.9.0.2-7ubuntu1.1
In general, a standard system upgrade is sufficient to effect the
necessary changes.
Details follow:
Laurent Gaffie discovered that Ruby did not properly check for memory
allocation failures. If a user or automated system were tricked into
running a malicious script, an attacker could cause a denial of
service. (CVE-2008-3443)
This update also fixes a regression in the upstream patch previously
applied to fix CVE-2008-3790. The regression would cause parsing of
some XML documents to fail.
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1.diff.gz
Size/MD5: 49454 02828291d0b8db94d06dbc6be804b58b
http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1.dsc
Size/MD5: 1771 5d3434eeadde20df96b78b4a959112f2
http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2.orig.tar.gz
Size/MD5: 6407910 2a848b81ed1d6393b88eec8aa6173b75
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/irb1.9_1.9.0.2-7ubuntu1.1_all.deb
Size/MD5: 57440 7c3c984736fd87485a9dfa0e8065afcc
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/rdoc1.9_1.9.0.2-7ubuntu1.1_all.deb
Size/MD5: 112262 a2afb0c815463a14b51eff6199d10661
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/ri1.9_1.9.0.2-7ubuntu1.1_all.deb
Size/MD5: 971786 57646618dddada4562990b3eb1c787b6
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/ruby1.9-elisp_1.9.0.2-7ubuntu1.1_all.deb
Size/MD5: 31094 4e2ac93f161570ff11b5d39d5912bfce
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/ruby1.9-examples_1.9.0.2-7ubuntu1.1_all.deb
Size/MD5: 64354 8a9aca7db601358141fd19d85ea45751
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_amd64.deb
Size/MD5: 2113618 bc410c5116879cd05234451e2fbc1447
http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
Size/MD5: 2275308 5863e492367db5313ac068c5dde703e9
http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_amd64.deb
Size/MD5: 943252 1c8a27569a60edf9e4aabb7b7716967f
http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
Size/MD5: 26536 86aa87a261a57d1d67edb397671b20b4
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
Size/MD5: 12544 eeb030e448f92081b3c05fe696011142
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
Size/MD5: 11838 b8c61c3b7435de2752b46bb75331ca3c
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
Size/MD5: 134340 258bed110d062a4b96b02b558b08a412
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
Size/MD5: 11638 6e3898a64f7dcccf444be54599313a17
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb
Size/MD5: 1745708 58a02a0dfa5d27ff0bb011acb635ed80
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_i386.deb
Size/MD5: 1921126 690079b204fc118f99876ed462371de5
http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
Size/MD5: 2127706 3dd6e4cd3c8adf46db14d45574ffd0ec
http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_i386.deb
Size/MD5: 889504 c2fe2150cb1c8a15f855c42a52c424ef
http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
Size/MD5: 26324 97f33c71e37213e31af3e400e3687a9d
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
Size/MD5: 11186 4f749b40168d0b0235d49082b981694f
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
Size/MD5: 10598 44b212294eb892c174bde278bb9e97cb
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
Size/MD5: 118168 178e91fd4562e351835bfb9902ba4c61
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
Size/MD5: 10818 8c041f2499bb45935b185e82a8e40b3a
http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb
Size/MD5: 1738394 8c37885e72e5f00d7b4281885478bc6c
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_lpia.deb
Size/MD5: 1951024 4f5e0733a3f49d53ca008ffcecf0c2de
http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
Size/MD5: 2105434 535e2f90d7471df4fbdb766e48bf8c91
http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_lpia.deb
Size/MD5: 874130 473f3817d976736b04d4237e179a9c6f
http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
Size/MD5: 26300 6d016c54f454eb4654facd88c1ae0a13
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
Size/MD5: 11248 44a9b7e75e49660021284d7d6604ccff
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
Size/MD5: 10420 4f3e626250d8d16256e771135f80f4f4
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
Size/MD5: 117570 b62300ef68d2655d837a0aed5d0bd054
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
Size/MD5: 10746 a82cc7f12682aba7b583ec86cd13f55e
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb
Size/MD5: 1737900 60a1f240342ab4ec317c1c0cf9c6e288
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_powerpc.deb
Size/MD5: 2091776 d37a509a3fc9bcbc145e645f7766f269
http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
Size/MD5: 2243518 af2e9a1ec3ca58e27f1f450d73fd9610
http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_powerpc.deb
Size/MD5: 901944 a7d7281252ec2325d634dd9857a80159
http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
Size/MD5: 28734 0ecd088dcfe450dc224550ff4cb2846a
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
Size/MD5: 14040 e5d5eb44f95ab85d5219a98e1ef3ae37
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
Size/MD5: 13318 e7e41a81b7155e3a8ab28f0905b0d084
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
Size/MD5: 133012 25e742b2556294b87f8563be9f622f56
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
Size/MD5: 13556 f1f4a0574e284023b1734d48db0f19c8
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb
Size/MD5: 1747252 33ef64fd198e65ee8919e8409aaea08d
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_sparc.deb
Size/MD5: 1803982 09d9b480b214361a46549de31f99e849
http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
Size/MD5: 2109258 731ae4bcad17cf2f0fa70a3bbc0ed490
http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_sparc.deb
Size/MD5: 883296 2ee2efc0f3c6d42bbc3ef765e346bd7b
http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
Size/MD5: 26526 b2af0ad31ed80fa28cbdd24f5fabe6b7
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
Size/MD5: 11212 c6dd5248b2680527df86081bbd7f58cc
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
Size/MD5: 10430 e24df579da217e1a47a2d7010c9408f9
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
Size/MD5: 124360 52fbc1543bdc80153b92113320a324c5
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
Size/MD5: 10856 504a25a03a0a79818536e0f967b4b904
http://ports.ubuntu.com/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb
Size/MD5: 1740490 df138fac9cfb1d0b5cbab685e8738167
--=-e2uKS+RMIdU9OmIXdpSo
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEABECAAYFAklHxtQACgkQLMAs/0C4zNpfPwCbBZiIDIpGtAQYuUCLFboosRVo
C7IAmwUIMDC+0Ay9aY6PYnHKREeDcLIj
=ZWBC
-----END PGP SIGNATURE-----
--=-e2uKS+RMIdU9OmIXdpSo--
From - Tue Dec 16 16:40:25 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051af
X-Mozilla-Status: 0011
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38950-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 1C8D3EC12C
for <lists@securityspace.com>; Tue, 16 Dec 2008 16:37:16 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 8CBF923706E; Tue, 16 Dec 2008 14:01:34 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 7025 invoked from network); 16 Dec 2008 17:35:01 -0000
Date: Tue, 16 Dec 2008 10:38:38 -0700
Message-Id: <200812161738.mBGHcckE007671@www3.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.420 (Entity 5.420)
From: philip.robertson@oovoo.com
To: bugtraq@securityfocus.com
Subject: Re: ooVoo 1.7.1.35 (URL Protocol) remote unicode buffer overflow poc
Status:
The vulnerability you observed in ooVoo 1.7.1.57 was corrected in the updated 1.7.1.59 version of ooVoo. Please make the amendment to the advisory.
Thank you for your assistance.
Please feel free to contact me with any further updates or requests for information. I'm more than happy to help.
Best regards,
Philip Robertson
ooVoo
philip.robertson@oovoo.com
From - Tue Dec 16 17:00:26 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051b1
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38952-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id D4F41EC131
for <lists@securityspace.com>; Tue, 16 Dec 2008 16:54:49 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id DE41B237148; Tue, 16 Dec 2008 14:03:21 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 8864 invoked from network); 16 Dec 2008 18:56:00 -0000
X-EDSINT-Source-Ip: 205.142.126.149
From: zdi-disclosures@3com.com
To: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com
Cc: zdi-disclosures@3com.com
Subject: ZDI-08-088: Oracle E-Business Suite Business Intelligence SQL Injection
Vulnerability
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 7.0.3 September 26, 2007
Message-ID: <OFA37A51A4.C327AA7C-ON85257521.006997E5-86257521.0069AC8C@3com.com>
Sender: Cameron_Hotchkies@3com.com
Date: Tue, 16 Dec 2008 13:14:14 -0600
X-MIMETrack: Serialize by Router on USUT001/US/3Com(Release 6.5.5FP2|October 23, 2006) at
12/16/2008 11:14:18 AM,
Serialize complete at 12/16/2008 11:14:18 AM
Content-Type: text/plain;
charset="US-ASCII"
Content-Transfer-Encoding: base64
Status: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From - Tue Dec 16 17:10:28 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051b2
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38953-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 3AD73EC131
for <lists@securityspace.com>; Tue, 16 Dec 2008 17:04:06 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 0D41F236F37; Tue, 16 Dec 2008 14:46:25 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 11286 invoked from network); 16 Dec 2008 21:07:46 -0000
Date: Tue, 16 Dec 2008 14:11:24 -0700
Message-Id: <200812162111.mBGLBOaM000724@www3.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.420 (Entity 5.420)
From: marian.ventuneac@ul.ie
To: bugtraq@securityfocus.com
Subject: CVE-2008-1094 - Barracuda Span Firewall SQL Injection Vulnerability
Status:
CVE Number: CVE-2008-1094
Vulnerability: SQL Injection
Risk: Medium
Attack vector: From Remote
Vulnerability Discovered: 16th June 2008
Vendor Notified: 16th June 2008
Advisory Released: 15th December 2008
Abstract
Barracuda Networks Spam Firewall is vulnerable to various SQL Injection attacks. When exploited by an authenticated user, the identified vulnerability can lead to Denial of Service, Database Information Disclosure, etc.
Description
The index.cgi resource was identified as being susceptible to SQL Injection attacks.
When filtering user accounts in Users->Account View section, the pattern_x parameter (where x = 0..n) allows inserting arbitrary SQL code once filter_x parameter is set to search_count_equals� value.
/cgi-bin/index.cgi?&user=&password=&et=&auth_type=Local&locale=en_US&realm=&primary_tab=USERS&secondary_tabper_user_account_view&boolean_0=boolean_and&filter_0=search_count_equals&pattern_0=if(database() like concat(char(99),char(37)),5,0)
An attacker can exploit this vulnerability by injecting arbitrary SQL code to be executed as part of the SQL query.
Original Advisory:
http://dcsl.ul.ie/advisories/02.htm
Barracuda Networks Technical Alert
http://www.barracudanetworks.com/ns/support/tech_alert.php
Affected Versions
Barracuda Spam Firewall (Firmware v3.5.11.020, Model 600)
Other products/versions might be affected.
Mitigation
Vendor recommends to the following firmware version
Barracuda Spam Firewall (Firmware v3.5.12.001)
Alternatively, please contact Barracuda Networks for technical support.
Credits
Dr. Marian Ventuneac, marian.ventuneac@ul.ie
Data Communication Security Laboratory, Department of Electronic & Computer Engineering, University of Limerick
Disclaimer
Data Communication Security Laboratory releases this information with the vendor acceptance. DCSL is not responsible for any malicious application of the information presented in this advisory.
From - Tue Dec 16 17:20:25 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051b4
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38954-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 515AEEC131
for <lists@securityspace.com>; Tue, 16 Dec 2008 17:13:48 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 7695D2371BB; Tue, 16 Dec 2008 14:47:04 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 11401 invoked from network); 16 Dec 2008 21:10:57 -0000
Date: 16 Dec 2008 21:29:33 -0000
Message-ID: <20081216212933.8608.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.411 (Entity 5.404)
From: marian.ventuneac@ul.ie
To: bugtraq@securityfocus.com
Subject: CVE-2008-0971 - Barracuda Networks products Multiple Cross-Site
Scripting Vulnerabilities
Status:
CVE Numbers: CVE-2008-0971
Vulnerabilities: Multiple Cross-Site Scripting (Persistent & Reflected)
Risk: Medium
Attack vector: From Remote
Vulnerabilities Discovered: 16th June 2008
Vendor Notified: 16th June 2008
Advisory Released: 15th December 2008
Abstract
Barracuda Networks Message Archiver product is vulnerable to persistent and reflected Cross-Site Scripting (XSS) attacks. Barracuda Spam Firewall, IM Firewall and Web Filter products are vulnerable to multiple reflected XSS attacks. When exploited by an authenticated user, the identified vulnerabilities can lead to Information Disclosure, Session Hijack,
access to Intranet available servers, etc.
Description
The index.cgi resource was identified as being susceptible to multiple persistent and reflected Cross Site Scripting (XSS)
attacks.
a. Persistent XSS in Barracuda Message Archiver
In Search Based Retention Policy, the Policy Name field allows persistent XSS when set to something like policy_name" onblur="alert('xss')
b. Reflected XSS in Barracuda Message Archiver
Setting various parameters in IP Configuration, Administration, Journal Accounts, Retention Policy, and GroupWise Sync allow
reflected XSS attacks.
c. Reflected XSS in Barracuda Spam Firewall, IM Firewall and Web Filter
� User provided input is not sanitised when displayed as part of error messages - identified in all verified products.
� User provided input is not sanitised when used to perform various searches - identified in Barracuda Web Filter.
� Manipulation of HTML INPUT hidden elements - identified in all verified products.
e.g auth_type INPUT hidden element allows a reflected XSS attack when set to something like
Local"><script>alert('xss')</script>
Original Advisory:
http://dcsl.ul.ie/advisories/03.htm
Barracuda Networks Technical Alert
http://www.barracudanetworks.com/ns/support/tech_alert.php
Affected Versions
Barracuda Message Archiver (Firmware v1.1.0.010, Model 350)
Barracuda Spam Firewall (Firmware v3.5.11.020, Model 600)
Barracuda Web Filter (Firmware v3.3.0.038, Model 910)
Barracuda IM Firewall (Firmware v3.0.01.008, Model 420)
Other models/firmware versions might be affected.
Mitigation
Vendor recommends upgrading to the following firmware version:
Barracuda Message Archiver Release 1.2.1.002 (2008-07-22)
Barracuda Spam Firewall Release 3.5.12.007 (2008-10-24)
Barracuda Web Filter Release 3.3.0.052 (2008-08-04)
Barracuda IM Firewall Release 3.1.01.017 (2008-07-02)
Barracuda Load Balancer Release 2.3.024 (2008-10-20)
Alternatively, please contact Barracuda Networks for technical support.
Credits
Dr. Marian Ventuneac, marian.ventuneac@ul.ie
Data Communication Security Laboratory, Department of Electronic & Computer Engineering, University of Limerick
Disclaimer
Data Communication Security Laboratory releases this information with the vendor acceptance. DCSL is not responsible for any malicious application of the information presented in this advisory.
From - Tue Dec 16 18:40:24 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051b8
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38955-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id AC32EEC131
for <lists@securityspace.com>; Tue, 16 Dec 2008 18:34:30 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 4D36A143C94; Tue, 16 Dec 2008 15:24:47 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 13290 invoked from network); 16 Dec 2008 21:38:37 -0000
From: Hanno =?utf-8?q?Böck?= <hanno@hboeck.de>
To: bugtraq@securityfocus.com
Subject: Joomla: Session hijacking vulnerability, CVE-2008-4122
Date: Tue, 16 Dec 2008 22:56:23 +0100
User-Agent: KMail/1.9.10
Cc: full-disclosure@lists.grok.org.uk
MIME-Version: 1.0
Content-Type: multipart/signed;
boundary="nextPart1388685.UiXGmvIMN5";
protocol="application/pgp-signature";
micalg=pgp-sha1
Content-Transfer-Encoding: 7bit
Message-Id: <200812162256.23578.hanno@hboeck.de>
Status:
--nextPart1388685.UiXGmvIMN5
Content-Type: text/plain;
charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
Joomla: Session hijacking vulnerability, CVE-2008-4122
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4122
http://int21.de/cve/CVE-2008-4122-joomla.html
http://enablesecurity.com/2008/08/11/surf-jack-https-will-not-save-you/
https://www.defcon.org/html/defcon-16/dc-16-speakers.html#Perry
Description
When configuring a web application to use only ssl (e. g. by forwarding all
http-requests to https), a user would expect that sniffing and hijacking the
session is impossible.
Though, for this to be secure, one needs to set the session cookie to have the
secure flag. Else the cookie will be transferred through http if the victim's
browser does a single http-request on the same domain.
Joomla 1.5.8 does not set that flag. I've contacted the Joomla security team
in advance but got no reply.
Disclosure Timeline
2008-11-18: Vendor contacted
2008-12-16 Published advisory
Credits and copyright
This vulnerability was discovered by Hanno Boeck of schokokeks.org webhosting.
It's licensed under the creative commons attribution license.
Hanno Boeck,
http://www.hboeck.de
--
Hanno Böck Blog:
http://www.hboeck.de/
GPG: 3DBD3B20 Jabber/Mail: hanno@hboeck.de
--nextPart1388685.UiXGmvIMN5
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iEYEABECAAYFAklIJAcACgkQr2QksT29OyB0/wCdHLkQ4SD9fW7Zj1+mWGaPGjrZ
yjkAn2u+GaZBF1KO8TOK6iy9kHT/SdfT
=+W1N
-----END PGP SIGNATURE-----
--nextPart1388685.UiXGmvIMN5--
From - Tue Dec 16 18:50:24 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051ba
X-Mozilla-Status: 0011
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38949-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 4AB0BEC131
for <lists@securityspace.com>; Tue, 16 Dec 2008 18:48:24 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 18C32236FBC; Tue, 16 Dec 2008 14:00:57 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 6892 invoked from network); 16 Dec 2008 17:29:55 -0000
Date: Tue, 16 Dec 2008 10:34:48 -0700
Message-Id: <200812161734.mBGHYmIV015021@www5.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.420 (Entity 5.420)
From: frisk@f-prot.com
To: bugtraq@securityfocus.com
Subject: Re: [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted
ELF header Security Bypass
Status:
Version 4.6.8 is an old, obsolete version of F-PROT that is no longer supported by the developers.
We no longer release regular virus definition updates for this version, and as far as we know, we have no paying customers of F-PROT 4.6.8 for Linux.
The security issue is not present in the current version.
From - Wed Dec 17 12:10:55 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051ea
X-Mozilla-Status: 0011
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38957-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id CE0A8EC1E2
for <lists@securityspace.com>; Wed, 17 Dec 2008 12:03:45 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 2546214386B; Wed, 17 Dec 2008 09:14:17 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 16273 invoked from network); 16 Dec 2008 22:42:45 -0000
From: "Integrigy Security" <intadmin@integrigy.com>
To: <full-disclosure@lists.grok.org.uk>, <bugtraq@securityfocus.com>
References: <OFA37A51A4.C327AA7C-ON85257521.006997E5-86257521.0069AC8C@3com.com>
In-Reply-To: <OFA37A51A4.C327AA7C-ON85257521.006997E5-86257521.0069AC8C@3com.com>
Subject: RE: [Full-disclosure] ZDI-08-088: Oracle E-Business Suite Self-Service Web Applications SQL Injection Vulnerability
Date: Tue, 16 Dec 2008 18:01:00 -0500
Message-ID: <006e01c95fd2$2a399f00$7eacdd00$@com>
MIME-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
Thread-Index: Aclfti2S4AEgGtUeT8WdpjCF/OdXNgAGR8Fw
Content-Language: en-us
Status:
The Zero Day Initiative advisory ZDI-08-088 has several inaccuracies.
Oracle actually fixed this vulnerability as part of the April 2007 Critical
Patch Update and subsequently in ATG_PF.H RUP5 and later. The vulnerability
is a serious SQL injection bug in a Self-Service Web Application database
package that is called and accessible through mod_plsql. Mod_plsql is an
Apache module and part of an Oracle web framework which allows database
packages to dynamically generate web pages. The vulnerable
schema.package.procedure name is APPS.ICXSUPWF.DISPLAYCONTACTS and all
versions 115.6 and prior are vulnerable. When creating intrusion
detection/prevention rules for this vulnerability, the URL will normally
only include the package/procedure name ICXSUPWF.DISPLAYCONTACTS and
mod_plsql URLs are case-insensitive. This URL is normally blocked by the
Oracle E-Business Suite 11i URL Firewall and should not be externally
accessible.
Original Oracle Advisory:
Oracle Critical Patch Update April 2007 - APPS01
CVE Name:
CVE-2007-2126
Affected Product and Versions:
Oracle E-Business Suite 11.5.1 through 11.5.10.2 (CU2)
Affected Oracle E-Business Suite Modules:
Application Object Library (FND)/Self-Service Web Applications (ICX)
Patch Availability:
11.5.1 - 11.5.6 - No patches are available for unsupported versions of the
Oracle E-Business Suite
11.5.7 - 11.5.10.2 with ATG_PF.H RUP4 or prior - 5893391
11.5.9 - 11.5.10.2 with ATG_PF.H RUP5 or higher - No patch required as this
fix was included in RUP5 and higher
Additional information on the Oracle Critical Patch Update April 2007 and
the impact on the Oracle E-Business Suite 11i is available at -
http://www.integrigy.com/Integrigy_Oracle_CPU_April_2007_Analysis.pdf
Vulnerability "anthropologists" may be interested in the fact that this
vulnerability has existed since at least September 1999 and likely was
introduced several years earlier with the release of Oracle Applications
11.0. Oracle fixed this bug in less than 2 months by simply stubbing the
procedure - clearly this was old code not used anymore by the application.
I wonder how much first generation web application code exists in the world
that is still accessible but automated scanning tools miss since it is not
directly accessible through a link?
-----Original Message-----
From: full-disclosure-bounces@lists.grok.org.uk
[mailto:full-disclosure-bounces@lists.grok.org.uk] On Behalf Of
zdi-disclosures@3com.com
Sent: Tuesday, December 16, 2008 2:14 PM
To: full-disclosure@lists.grok.org.uk; bugtraq@securityfocus.com
Subject: [Full-disclosure] ZDI-08-088: Oracle E-Business Suite Business
Intelligence SQL Injection Vulnerability
ZDI-08-088: Oracle E-Business Suite Business Intelligence SQL Injection
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-08-088
December 16, 2008
-- Affected Vendors:
Oracle
-- Affected Products:
Oracle Database Server
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 4921.
For further product information on the TippingPoint IPS, visit:
http://www.tippingpoint.com
-- Vulnerability Details:
This vulnerability allows remote attackers to inject arbitrary SQL on
vulnerable installations of Oracle E-Business Suite Business
Intelligence. Authentication is not required to exploit this
vulnerability.
The specific flaw exists in the APPS.ICXSUPWF.DisplayContacts package.
The procedure fails to validate the contents of a WHERE clause
containing user-suppled input. This allows an attacker to execute
arbitrary SQL statements in the context of the APPS user.
-- Vendor Response:
Oracle has issued an update to correct this vulnerability. More
details can be found at:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpua
pr2008.html
-- Disclosure Timeline:
2007-01-29 - Vulnerability reported to vendor
2008-12-16 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by:
* Joxean Koret
-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.
Our vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
CONFIDENTIALITY NOTICE: This e-mail message, including any attachments,
is being sent by 3Com for the sole use of the intended recipient(s) and
may contain confidential, proprietary and/or privileged information.
Any unauthorized review, use, disclosure and/or distribution by any
recipient is prohibited. If you are not the intended recipient, please
delete and/or destroy all copies of this message regardless of form and
any included attachments and notify 3Com immediately by contacting the
sender via reply e-mail or forwarding to 3Com at postmaster@3com.com.
_______________________________________________
Full-Disclosure - We believe in it.
Charter:
http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia -
http://secunia.com/
From - Wed Dec 17 12:20:55 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051ec
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38958-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id 6B2EAEC1E2
for <lists@securityspace.com>; Wed, 17 Dec 2008 12:17:51 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id BF10C14376F; Wed, 17 Dec 2008 09:19:42 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 3108 invoked from network); 17 Dec 2008 14:48:12 -0000
X-PGP-Universal: processed;
by wsehliesr on Wed, 17 Dec 2008 16:06:48 +0100
From: <security@nruns.com>
To: <full-disclosure@lists.grok.org.uk>, <bugtraq@securityfocus.com>
Cc: <cve@mitre.org>, <soc@us-cert.gov>, <cert@cert.org>,
<vuln@secunia.com>
Subject: n.runs-SA-2008.010 - Opera HTML parsing Code Execution
Date: Wed, 17 Dec 2008 16:06:27 +0100
Message-ID: <!&!AAAAAAAAAAAYAAAAAAAAAEqlc0sEqCZMjFiSy1tj+RPCgAAAEAAAAOn2ZlC3QNxEifjbeRIj9v0BAAAAAA==@nruns.com>
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook 11
Thread-Index: AclgV8VyTasY80P/SvyuaocdB38PbQ=X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579
X-PGP-Encoding-Format: Partitioned
X-PGP-Encoding-Version: 2.0.2
X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit
X-Content-PGP-Universal-Saved-Content-Type: text/plain;
charset="us-ascii"
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7BIT
X-Provags-ID: V01U2FsdGVkX1/g54VIkfmv6kU0+ifjatCd06CeOc6gXus3oeH
0mmpTgdrY2HCA5syheD9yERdiPq/eb58IcNo3CNY8Rc7kevQxS
WhlxDk58aW8nj5pBONuyA=Status:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
n.runs AG
http://www.nruns.com/ security(at)nruns.com
n.runs-SA-2008.010 16-Dec-2008
_______________________________________________________________________
Vendor: Opera Software ASA,
http://www.opera.com
Affected Products: Opera Browser all platforms
Vulnerability: HTML parsing flaw lead to remote code execution
Risk: HIGH
_______________________________________________________________________
Vendor communication:
2008/11/10 Initial notification to Opera including n.runs RFP and
n.runs PGP public key
2008/11/12 Opera response and remarks to agree in general with
n.runs RFP but depending on the issue the timeline for a
fix might have to be longer than the one mentioned in
n.runs RFP (30 days)
2008/11/12 n.runs replies and outlines following a responsible
disclosure policy as long as Opera keep n.runs in the
loop. n.runs send with same email a zip archive including
two PoC files and detailed crash log analysis
2008/11/14 n.runs resends the last email with a download link for
the PoCs because Opera's MX Server did not accept the
enclosed encrypted zip archive
2008/11/14 Opera acknowledges the PoC files
2008/11/24 Opera communicates to n.runs that they identified the
nature of the issue and that they are looking into a fix
2008/12/12 Opera sends n.runs a current draft of the Opera advisory
and notifies new version is scheduled to be released
early next week
2008/12/16 Opera releases Opera 9.63 [1]
2008/12/16 n.runs releases this advisory
_______________________________________________________________________
Overview:
Quoting
http://www.opera.com/company/:
"Opera started in 1994 as a research project within Norway's largest
telecom company, Telenor. Within a year, it branched out to become an
independent development company named Opera Software ASA.
Today, Opera Software develops the Opera Web browser, a high-quality,
multi-platform product for a wide range of platforms, operating systems
and embedded Internet products - including Mac, PC and Linux computers,
mobile phones and PDAs,game consoles and other devices like the
Nintendo Wii and DS, Sony Mylo and more.
Opera's vision is to deliver the best Internet experience on any
device. Opera's key business objective is to earn global leadership in
the market for PC / desktops and embedded products. Opera's main
business strategy is to provide a browser that operates across devices,
platforms and operating systems, and can deliver a faster, more stable
and flexible Internet experience than its competitors."
Description:
A remotely exploitable vulnerability has been found in the
HTML parsing engine.
In detail, the following flaw was determined:
- - Certain HTML constructs affecting an internal heap structure. As a
result of a pointer calculation, memory may be corrupted in such a way
that an attacker could execute arbitrary code.
Impact
An attacker could exploit the vulnerability by constructing a specially
prepared Websit. When a user views the Web page, the vulnerability
could allow remote code execution. An attacker who successfully
exploits this vulnerability could gain the same user rights as the
logged-on user.
Solution:
Opera has issued an update to correct this vulnerability.
For detailed information about the fixes follow the link in
References [1] section of this document.
n.runs AG wants to highlight the fluent communication with Opera and
its very quick response to validate and fix the issue.
_______________________________________________________________________
Credit:
Bugs found by Alexios Fakos of n.runs AG.
_______________________________________________________________________
References:
http://www.opera.com/support/kb/view/921/ [1]
This Advisory and Upcoming Advisories:
http://www.nruns.com/security_advisory.php
_______________________________________________________________________
Unaltered electronic reproduction of this advisory is permitted. For
all other reproduction or publication, in printing or otherwise,
contact security@nruns.com for permission. Use of the advisory
constitutes acceptance for use in an "as is" condition. All warranties
are excluded. In no event shall n.runs be liable for any damages
whatsoever including direct, indirect, incidental, consequential loss
of business profits or special damages, even if n.runs has been advised
of the possibility of such damages.
Copyright 2008 n.runs AG. All rights reserved. Terms of use apply.
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.1 (Build 2523)
Charset: us-ascii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opn5
-----END PGP SIGNATURE-----
From - Wed Dec 17 13:30:55 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051ef
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38959-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id 44395EC1E4
for <lists@securityspace.com>; Wed, 17 Dec 2008 13:29:49 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id A04FA143ACA; Wed, 17 Dec 2008 09:22:03 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 2627 invoked from network); 17 Dec 2008 14:27:17 -0000
X-Virus-Scanned: by amavisd-new at intevation.de
Date: Wed, 17 Dec 2008 15:40:29 +0100
From: Michael Wiegand <michael.wiegand@intevation.de>
To: Full-Disclosure <full-disclosure@lists.grok.org.uk>,
Bugtraq <bugtraq@securityfocus.com>,
Pen-Test <pen-test@securityfocus.com>
Subject: Network Security Scanner OpenVAS 2.0.0 Released
Message-ID: <20081217144029.GG28795@intevation.de>
Mail-Followup-To: Full-Disclosure <full-disclosure@lists.grok.org.uk>,
Bugtraq <bugtraq@securityfocus.com>,
Pen-Test <pen-test@securityfocus.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-15
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
User-Agent: Mutt/1.5.16 (2007-06-11)
Status:
Hello,
On December 17th, 2008, the OpenVAS[1] developer team released OpenVAS 2.0.0
which marks the start of the next generation of the Open Vulnerability
Assessment System for network security scanning.
OpenVAS is a fork of the Nessus security scanner which has continued development
under a proprietary license since late 2005. Since the release of OpenVAS 1.0.0
in October 2007, the OpenVAS developers continued the auditing of the code
inherited from Nessus and have added a variety of useful features for OpenVAS
users, for server adminstrators and for developers of Network Vulnerability
Tests (NVTs).
The main changes compared to the 1.0 series cover:
* OVAL Support:
OpenVAS 2.0.0 introduces preliminary support for OVAL, the Open Vulnerability
and Assessment Language[2]. OVAL is an international, information security,
community standard to promote open, standardized and publicly available
security content. The OpenVAS server can now execute OVAL files just like its
own Network Vulnerability Tests (NVTs) using the OVAL definitions interpreter
"ovaldi". While the plain ovaldi tool can only check local systems where it
is installed, the combination with OpenVAS enables ovaldi to test any target
system for which OpenVAS has collected information. OpenVAS 2.0.0 includes
readily available support for Red Hat Enterprise Linux security announcements
as published in OVAL format. OVAL support will expand to further platforms.
* OpenVAS Transfer Protocol (OTP):
A comprehensive audit of the Nessus Transfer Protocol (NTP) resulted in
numerous improvements and fixes and lead to the OpenVAS Transfer Protocol
(OTP). Since NTP support was dropped entirely, the 1.0 and 2.0 series of
OpenVAS Server and Client can not operate in mixed mode.
* Object Identifiers (OIDs):
In order to make identifying individual NVTs easier, OpenVAS adopted an
OID-based numbering scheme for NVTs. OIDs in OpenVAS will start with the
prefix 1.3.6.1.4.1.25623, backward compatibility in server and client has been
ensured.
* 64-bit Support:
Intensive work on 64-bit cleanliness has been undertaken. OpenVAS 2.0.0
is expected be fully 64-bit compatible.
* Improved GUI Client:
The OpenVAS-Client has seen a number of improvements and is now able to
display NVT signature information in the GUI and in the various reports.
Reporting has been improved as well as localization for various languages
(best support in this order: German, Spanish/French, Swedish, Hebrew,
Croatian).
* Bugfixes:
Any spotted bugs have been fixed. Please refer to
the CHANGES files supplied with the individual modules for details.
* Code Audit:
A large amount of outdated or unused code has been idenfied and removed or
replaced.
Compatibility of NASL NVTs and the OpenVAS Feed Service:
The available NVT package (openvas-plugins) and OpenVAS Feed which provides more
than 6000 NVTs are compatible for both the 1.0 and the 2.0 series of OpenVAS.
Migration from OpenVAS 1.0:
If you want to migrate your existing reports created with an 1.0 series client
to OpenVAS 2.0.0, please use the script provided in the openvas-client/tools
directory.
If you are currently using OpenVAS 1.0.x, we recommend that you install the
OpenVAS 2.0.0 source code relase seperately from your existing installation.
Documentation:
An extensive documentation for OpenVAS has been created as well and was recently
released. Users, adminstrators and developers can now access more than 100 pages
of the OpenVAS Compendium, available in English and German.
Downloads:
All download links for OpenVAS 2.0.0 and additional information can be found on
the OpenVAS website[1]. OpenVAS 2.0.0 is initially relased as a source code
release; packages for various distributions are expected to follow.
The OpenVAS team would like to thank everybody who has contributed to this
release. We have worked hard to bring you the best OpenVAS version. If you have
any questions or suggestions, please feel free to use the public mailing list
and our online chat. Please use the OpenVAS bug tracker[3] to report bugs.
The OpenVAS developers would like to wish all users a recreative holiday season
and a a happy new year.
[1]
http://www.openvas.org
[2]
http://oval.mitre.org
[3]
http://bugs.openvas.org
--
Michael Wiegand | OpenPGP key: D7D049EC |
http://www.intevation.de/
Intevation GmbH, Neuer Graben 17, 49074 Osnabr�ck | AG Osnabr�ck, HR B 18998
Gesch�ftsf�hrer: Frank Koormann, Bernhard Reiter, Dr. Jan-Oliver Wagner
From - Wed Dec 17 18:30:55 2008
X-Account-Key: account7
X-UIDL: 4909bb8c000051f4
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38960-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id C17F9EC1E2
for <lists@securityspace.com>; Wed, 17 Dec 2008 18:23:38 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id 3F3BE236FD9; Wed, 17 Dec 2008 16:09:40 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 30965 invoked from network); 17 Dec 2008 22:53:39 -0000
X-Cloudmark-SP-Filtered: true
X-Cloudmark-SP-Result: v=1.0 c=0 a=FLhA3KDuAAAA:8 a=sMBj6sIwAAAA:8 a=pQs5aej7AAAA:8 a=G4QFo8eNBwyg32XuI8UA:9 a=VQLGPvN4PNctk3HduqEA:7 a=U66rzqKuF4iU9wVte9ov4O835OAA:4 a=PRHNZNJDFyAA:10 a=R2VQutpenNgA:10 a=8UiCvUyRy1oA:10
To: bugtraq@securityfocus.com
Subject: [ MDVSA-2008:244 ] mozilla-firefox
Date: Wed, 17 Dec 2008 16:18:00 -0700
From: security@mandriva.com
Reply-To: <xsecurity@mandriva.com>
Message-Id: <E1LD5eS-00088e-UN@titan.mandriva.com>
Status:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:244
http://www.mandriva.com/security/
_______________________________________________________________________
Package : mozilla-firefox
Date : December 17, 2008
Affected: 2008.1, Corporate 3.0, Corporate 4.0
_______________________________________________________________________
Problem Description:
Security vulnerabilities have been discovered and corrected in
the latest Mozilla Firefox 2.x, version 2.0.0.19 (CVE-2008-5500,
CVE-2008-5503, CVE-2008-5504, CVE-2008-5506, CVE-2008-5507,
CVE-2008-5508, CVE-2008-5510, CVE-2008-5511, CVE-2008-5512,
CVE-2008-5513).
This update provides the latest Mozilla Firefox 2.x to correct
these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5504
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513
http://www.mozilla.org/security/known-vulnerabilities/firefox20.html#firefox2.0.0.19
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2008.1:
7f8addc0fc247ef9bd733736e0073ba1 2008.1/i586/devhelp-0.19-3.6mdv2008.1.i586.rpm
a6e1937e7b0c45bebcf5d98803eb0494 2008.1/i586/devhelp-plugins-0.19-3.6mdv2008.1.i586.rpm
55b8c8e37e4ce64e60142b6737690705 2008.1/i586/epiphany-2.22.0-4.6mdv2008.1.i586.rpm
0c217f86408d4419e27d22aef775d6da 2008.1/i586/epiphany-devel-2.22.0-4.6mdv2008.1.i586.rpm
60f64aad8ce848e969a8fe18cba79204 2008.1/i586/galeon-2.0.4-3.6mdv2008.1.i586.rpm
7f32328e0f534178b4a802b0bfa9ebe6 2008.1/i586/gnome-python-extras-2.19.1-10.6mdv2008.1.i586.rpm
8d5a7c2f9bde5f633a2b31cde538ceb6 2008.1/i586/gnome-python-gda-2.19.1-10.6mdv2008.1.i586.rpm
0ae91b7fc58689ad7fc78aca511d1473 2008.1/i586/gnome-python-gda-devel-2.19.1-10.6mdv2008.1.i586.rpm
15726fe08bde35037bad8acab9c66f50 2008.1/i586/gnome-python-gdl-2.19.1-10.6mdv2008.1.i586.rpm
544418a2e56393ea38fd3a8c5de099c0 2008.1/i586/gnome-python-gksu-2.19.1-10.6mdv2008.1.i586.rpm
1b10bbce9204be69622ed24be81a2c46 2008.1/i586/gnome-python-gtkhtml2-2.19.1-10.6mdv2008.1.i586.rpm
1a12b611693611bcec69be8bce034f2c 2008.1/i586/gnome-python-gtkmozembed-2.19.1-10.6mdv2008.1.i586.rpm
ad9f4dc989f6725044733a8e806ba5d5 2008.1/i586/gnome-python-gtkspell-2.19.1-10.6mdv2008.1.i586.rpm
17b7b784a72db58f46e2e67ac60fffc4 2008.1/i586/libdevhelp-1_0-0.19-3.6mdv2008.1.i586.rpm
00596cab51923af07c279be332cc271d 2008.1/i586/libdevhelp-1-devel-0.19-3.6mdv2008.1.i586.rpm
8e0bf3dfc7d882fdd06671eded809a6e 2008.1/i586/libgluezilla0-1.2.6.1-2.6mdv2008.1.i586.rpm
cffccf85e222828b46af77b7f2d28146 2008.1/i586/libmozilla-firefox2.0.0.19-2.0.0.19-1.1mdv2008.1.i586.rpm
4596f1d84b137113c28b90b6196aa9d9 2008.1/i586/libmozilla-firefox-devel-2.0.0.19-1.1mdv2008.1.i586.rpm
20d16b0cec438f771b7b968b654768bd 2008.1/i586/mozilla-firefox-2.0.0.19-1.1mdv2008.1.i586.rpm
48a84ff1a5d0a152a2fd432fe6604fbd 2008.1/i586/mozilla-firefox-af-2.0.0.19-1.1mdv2008.1.i586.rpm
da5e5f2c1de6d0adae84fe0cae1ee586 2008.1/i586/mozilla-firefox-ar-2.0.0.19-1.1mdv2008.1.i586.rpm
94d52eebf9d87481e07be3ff4bbe7d67 2008.1/i586/mozilla-firefox-be-2.0.0.19-1.1mdv2008.1.i586.rpm
be0a8cbe5a57bf221c54a93aff527d6c 2008.1/i586/mozilla-firefox-bg-2.0.0.19-1.1mdv2008.1.i586.rpm
0695d12cab500b072c49b036cd51f6ac 2008.1/i586/mozilla-firefox-br_FR-2.0.0.19-1.1mdv2008.1.i586.rpm
5b660a17e526253c33d6e00bd68f3269 2008.1/i586/mozilla-firefox-ca-2.0.0.19-1.1mdv2008.1.i586.rpm
baf0feba0f8f56e8738fb09ead69b4b8 2008.1/i586/mozilla-firefox-cs-2.0.0.19-1.1mdv2008.1.i586.rpm
063e442a8f0c0a068ded60eba73dab53 2008.1/i586/mozilla-firefox-da-2.0.0.19-1.1mdv2008.1.i586.rpm
e27139fae9ff249b70e8737ac6ea0d47 2008.1/i586/mozilla-firefox-de-2.0.0.19-1.1mdv2008.1.i586.rpm
d5b254ef9a4e903a5ec6057ed890fdf8 2008.1/i586/mozilla-firefox-el-2.0.0.19-1.1mdv2008.1.i586.rpm
24bcf5364c3fe535968519a5cf84d794 2008.1/i586/mozilla-firefox-en_GB-2.0.0.19-1.1mdv2008.1.i586.rpm
3312c2ee3ff8297c7b5909f5d0839075 2008.1/i586/mozilla-firefox-es_AR-2.0.0.19-1.1mdv2008.1.i586.rpm
8534b0f7290a4c80a394b90661515258 2008.1/i586/mozilla-firefox-es_ES-2.0.0.19-1.1mdv2008.1.i586.rpm
04703ad6ada3f71b96f66a3e770b7826 2008.1/i586/mozilla-firefox-et_EE-2.0.0.19-1.1mdv2008.1.i586.rpm
a7efc391c7d77bc0a32803f776b61fde 2008.1/i586/mozilla-firefox-eu-2.0.0.19-1.1mdv2008.1.i586.rpm
d0e65ae65b0d5f26335cb1f27e838ac0 2008.1/i586/mozilla-firefox-ext-blogrovr-1.1.779-2.4mdv2008.1.i586.rpm
1512bbaff2548011d585d63bc97817b6 2008.1/i586/mozilla-firefox-ext-foxmarks-2.0.47.4-2.4mdv2008.1.i586.rpm
a3cf91c324e08de846fa54015f347700 2008.1/i586/mozilla-firefox-ext-scribefire-2.2.7-2.4mdv2008.1.i586.rpm
835809d497f255919ec678bf675a522f 2008.1/i586/mozilla-firefox-fi-2.0.0.19-1.1mdv2008.1.i586.rpm
83d2406e0a323ee0711c760dad3c64c2 2008.1/i586/mozilla-firefox-fr-2.0.0.19-1.1mdv2008.1.i586.rpm
495876bb28e2041d0f48e53c3bba0ea5 2008.1/i586/mozilla-firefox-fy-2.0.0.19-1.1mdv2008.1.i586.rpm
124d59678923d85a69d611fab147654b 2008.1/i586/mozilla-firefox-ga-2.0.0.19-1.1mdv2008.1.i586.rpm
1f920d856f4c043a97e04bffa4ee5bbc 2008.1/i586/mozilla-firefox-gnome-support-2.0.0.19-1.1mdv2008.1.i586.rpm
717bbdd1eb47ee8130fe67d1368f9358 2008.1/i586/mozilla-firefox-gu_IN-2.0.0.19-1.1mdv2008.1.i586.rpm
62d91e021f670efeb8b29ec99142780b 2008.1/i586/mozilla-firefox-he-2.0.0.19-1.1mdv2008.1.i586.rpm
b2a50d9861bcc85fdf91139e47a50dff 2008.1/i586/mozilla-firefox-hu-2.0.0.19-1.1mdv2008.1.i586.rpm
044c638a5b67bc3093bd25cba67772c0 2008.1/i586/mozilla-firefox-it-2.0.0.19-1.1mdv2008.1.i586.rpm
5fdbad0aafcc7a4092afecbae298353a 2008.1/i586/mozilla-firefox-ja-2.0.0.19-1.1mdv2008.1.i586.rpm
99cefaf816469ecf0a173809b1ba772b 2008.1/i586/mozilla-firefox-ka-2.0.0.19-1.1mdv2008.1.i586.rpm
5d1b7e4da47ef7914b7bccb9af9849ca 2008.1/i586/mozilla-firefox-ko-2.0.0.19-1.1mdv2008.1.i586.rpm
a91c8eba69988dad66a3072dbf843103 2008.1/i586/mozilla-firefox-ku-2.0.0.19-1.1mdv2008.1.i586.rpm
e8762edcb0620de40f5e118b87bb42b3 2008.1/i586/mozilla-firefox-lt-2.0.0.19-1.1mdv2008.1.i586.rpm
7078aa8233f9ba58bea8dfa50425ba41 2008.1/i586/mozilla-firefox-mk-2.0.0.19-1.1mdv2008.1.i586.rpm
3ef1178d7bfc289aa09636245c1bce00 2008.1/i586/mozilla-firefox-mn-2.0.0.19-1.1mdv2008.1.i586.rpm
f466ef8c248af5fd45916fbcd3e6c609 2008.1/i586/mozilla-firefox-nb_NO-2.0.0.19-1.1mdv2008.1.i586.rpm
1491c0c7e023310d3440f94914c99e97 2008.1/i586/mozilla-firefox-nl-2.0.0.19-1.1mdv2008.1.i586.rpm
14f7282dd94c39e33568f631ba4e01ca 2008.1/i586/mozilla-firefox-nn_NO-2.0.0.19-1.1mdv2008.1.i586.rpm
1caa427450224d989ce1ff563b4ee5ca 2008.1/i586/mozilla-firefox-pa_IN-2.0.0.19-1.1mdv2008.1.i586.rpm
b2afee6749fa46d885375882e48c92ea 2008.1/i586/mozilla-firefox-pl-2.0.0.19-1.1mdv2008.1.i586.rpm
ce3b41c988a62ef6321e4332cbd5d63e 2008.1/i586/mozilla-firefox-pt_BR-2.0.0.19-1.1mdv2008.1.i586.rpm
d531870efc8f43e35f305d65472fce7d 2008.1/i586/mozilla-firefox-pt_PT-2.0.0.19-1.1mdv2008.1.i586.rpm
407cfd2d31ece17be76f316833713487 2008.1/i586/mozilla-firefox-ro-2.0.0.19-1.1mdv2008.1.i586.rpm
b522d8a77d029ea0fc34fff834f58ffe 2008.1/i586/mozilla-firefox-ru-2.0.0.19-1.1mdv2008.1.i586.rpm
2d51d367cda6b7eccc04449928884bf9 2008.1/i586/mozilla-firefox-sk-2.0.0.19-1.1mdv2008.1.i586.rpm
0f78263377eca7e4a06697ded706a555 2008.1/i586/mozilla-firefox-sl-2.0.0.19-1.1mdv2008.1.i586.rpm
5965bdeafd790a57956659244893fccb 2008.1/i586/mozilla-firefox-sv_SE-2.0.0.19-1.1mdv2008.1.i586.rpm
935b8d41febea5d2df9ed407a30f664b 2008.1/i586/mozilla-firefox-theme-gnome-2.0.0-7.4mdv2008.1.i586.rpm
b7ffe23251f4774fbbcda6c4c805839c 2008.1/i586/mozilla-firefox-theme-kdeff-0.4-7.4mdv2008.1.i586.rpm
6cf739c4c27f421c65ce77f5d11f2404 2008.1/i586/mozilla-firefox-tr-2.0.0.19-1.1mdv2008.1.i586.rpm
149bfa9bdbe2518c31f3df46b4a39153 2008.1/i586/mozilla-firefox-uk-2.0.0.19-1.1mdv2008.1.i586.rpm
2677c44e4a92739274d0aa9572df5142 2008.1/i586/mozilla-firefox-zh_CN-2.0.0.19-1.1mdv2008.1.i586.rpm
c18af87ebefdb885d8871285d39d6728 2008.1/i586/mozilla-firefox-zh_TW-2.0.0.19-1.1mdv2008.1.i586.rpm
c92cd4a33069a6da7d8d390d34b8b2f6 2008.1/i586/totem-2.22.0-4.6mdv2008.1.i586.rpm
f84174eb140bdc76acafc1fd93674188 2008.1/i586/totem-common-2.22.0-4.6mdv2008.1.i586.rpm
c2e56fcc951d72102bc3adea0caf1044 2008.1/i586/totem-gstreamer-2.22.0-4.6mdv2008.1.i586.rpm
f6d7dfab5635f25c6c28cbacdc91ebaa 2008.1/i586/totem-mozilla-2.22.0-4.6mdv2008.1.i586.rpm
90625ed3d474bb26600ccd7af02665be 2008.1/i586/totem-mozilla-gstreamer-2.22.0-4.6mdv2008.1.i586.rpm
2384cf75422553652ee783b3cfe1adc3 2008.1/i586/yelp-2.22.0-2.7mdv2008.1.i586.rpm
bbd14449827df2c7d84427430d7c7e57 2008.1/SRPMS/devhelp-0.19-3.6mdv2008.1.src.rpm
f0fb48ec7c2f73df643d79d3eead06fa 2008.1/SRPMS/epiphany-2.22.0-4.6mdv2008.1.src.rpm
a7e4e1126481763b00d672aa2e5c65e0 2008.1/SRPMS/galeon-2.0.4-3.6mdv2008.1.src.rpm
cdea7603720727b8285a85e96baaa6da 2008.1/SRPMS/gluezilla-1.2.6.1-2.6mdv2008.1.src.rpm
6f22974bed5335f06568db0baa892059 2008.1/SRPMS/gnome-python-extras-2.19.1-10.6mdv2008.1.src.rpm
3d915c1141aa275df291212a4e6bcca5 2008.1/SRPMS/mozilla-firefox-2.0.0.19-1.1mdv2008.1.src.rpm
8f56891a87fd79c5c2d57b48fcb9dccb 2008.1/SRPMS/mozilla-firefox-ext-blogrovr-1.1.779-2.4mdv2008.1.src.rpm
f6a815f7c838689da4d67d7d126cbace 2008.1/SRPMS/mozilla-firefox-ext-foxmarks-2.0.47.4-2.4mdv2008.1.src.rpm
e934487b170fe4d6eb70c7f6881f2108 2008.1/SRPMS/mozilla-firefox-ext-scribefire-2.2.7-2.4mdv2008.1.src.rpm
943c17d626499280bc99ec649ce9a16d 2008.1/SRPMS/mozilla-firefox-l10n-2.0.0.19-1.1mdv2008.1.src.rpm
074a41eb9fdffc2445b37c67c38f4e76 2008.1/SRPMS/mozilla-firefox-theme-gnome-2.0.0-7.4mdv2008.1.src.rpm
8b49b3452479db908e070f2bbdca14f0 2008.1/SRPMS/mozilla-firefox-theme-kdeff-0.4-7.4mdv2008.1.src.rpm
aab17d9315430d71ea5107c0c2a1c893 2008.1/SRPMS/totem-2.22.0-4.6mdv2008.1.src.rpm
299f7185a89651607ea697160ef9ffc4 2008.1/SRPMS/yelp-2.22.0-2.7mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64:
ffd41f689116a8474539a082aa3f1349 2008.1/x86_64/devhelp-0.19-3.6mdv2008.1.x86_64.rpm
66864a0c536cd155923ec3c5e2b5202c 2008.1/x86_64/devhelp-plugins-0.19-3.6mdv2008.1.x86_64.rpm
a1835f86d29a6da588ab2c432a208eb8 2008.1/x86_64/epiphany-2.22.0-4.6mdv2008.1.x86_64.rpm
d5b940fa89bcb43aee7e169fb1f62e28 2008.1/x86_64/epiphany-devel-2.22.0-4.6mdv2008.1.x86_64.rpm
659c4030a10fcc9235808d8b7201d283 2008.1/x86_64/galeon-2.0.4-3.6mdv2008.1.x86_64.rpm
10e260e057d54ac972629ae71c2f4350 2008.1/x86_64/gnome-python-extras-2.19.1-10.6mdv2008.1.x86_64.rpm
f538ac55b541e7b9421c6eed8bf24259 2008.1/x86_64/gnome-python-gda-2.19.1-10.6mdv2008.1.x86_64.rpm
d9769379d26a1682111ef3ff59c98b92 2008.1/x86_64/gnome-python-gda-devel-2.19.1-10.6mdv2008.1.x86_64.rpm
2de54d350a3653e00f67260aa9458954 2008.1/x86_64/gnome-python-gdl-2.19.1-10.6mdv2008.1.x86_64.rpm
eb05d6e4f392a245103a276ecc051167 2008.1/x86_64/gnome-python-gksu-2.19.1-10.6mdv2008.1.x86_64.rpm
f722b683dd0d70483945fe582b56667f 2008.1/x86_64/gnome-python-gtkhtml2-2.19.1-10.6mdv2008.1.x86_64.rpm
61619ccb7c46a625badfb1d73b07ef91 2008.1/x86_64/gnome-python-gtkmozembed-2.19.1-10.6mdv2008.1.x86_64.rpm
0bbb8e4590654a0879c1a7b0d4493b08 2008.1/x86_64/gnome-python-gtkspell-2.19.1-10.6mdv2008.1.x86_64.rpm
e354d21910f391792e2f976daa588479 2008.1/x86_64/lib64devhelp-1_0-0.19-3.6mdv2008.1.x86_64.rpm
9e395009e077608b242db8ca63080755 2008.1/x86_64/lib64devhelp-1-devel-0.19-3.6mdv2008.1.x86_64.rpm
870c7ac086da1f015d2f4ae4b3cd0bb5 2008.1/x86_64/lib64gluezilla0-1.2.6.1-2.6mdv2008.1.x86_64.rpm
e871aa452fb5e4c819fa4003835cf73d 2008.1/x86_64/lib64mozilla-firefox2.0.0.19-2.0.0.19-1.1mdv2008.1.x86_64.rpm
0e83338325243315c8231b2f6f60ee35 2008.1/x86_64/lib64mozilla-firefox-devel-2.0.0.19-1.1mdv2008.1.x86_64.rpm
c3dbc02dfa25467fbdbbbb04c76b83e2 2008.1/x86_64/mozilla-firefox-2.0.0.19-1.1mdv2008.1.x86_64.rpm
0680eeaa3abf8250463345cae8f4d493 2008.1/x86_64/mozilla-firefox-af-2.0.0.19-1.1mdv2008.1.x86_64.rpm
6a2813270f16aecd2a55d548cb23fd94 2008.1/x86_64/mozilla-firefox-ar-2.0.0.19-1.1mdv2008.1.x86_64.rpm
87f57dba9af7ad13974f4dab19b2913d 2008.1/x86_64/mozilla-firefox-be-2.0.0.19-1.1mdv2008.1.x86_64.rpm
5da07b7840c7e416072f46e362461419 2008.1/x86_64/mozilla-firefox-bg-2.0.0.19-1.1mdv2008.1.x86_64.rpm
5adc9ddb40574267cee69e60004da816 2008.1/x86_64/mozilla-firefox-br_FR-2.0.0.19-1.1mdv2008.1.x86_64.rpm
7f551f779de33d462e154408089e6c9a 2008.1/x86_64/mozilla-firefox-ca-2.0.0.19-1.1mdv2008.1.x86_64.rpm
a41ccf5e7ac105cfdfa61cf998c7727d 2008.1/x86_64/mozilla-firefox-cs-2.0.0.19-1.1mdv2008.1.x86_64.rpm
aa6e534726abeded21f1e7ffcd078e34 2008.1/x86_64/mozilla-firefox-da-2.0.0.19-1.1mdv2008.1.x86_64.rpm
cacefd7637cb7991dd6943c376e2c264 2008.1/x86_64/mozilla-firefox-de-2.0.0.19-1.1mdv2008.1.x86_64.rpm
51ed21e354e0b9198a5014bf9508dddf 2008.1/x86_64/mozilla-firefox-el-2.0.0.19-1.1mdv2008.1.x86_64.rpm
4abb39cc9606e88ad6053369372948e4 2008.1/x86_64/mozilla-firefox-en_GB-2.0.0.19-1.1mdv2008.1.x86_64.rpm
dc44554dca1b5be617d84f9f21270d34 2008.1/x86_64/mozilla-firefox-es_AR-2.0.0.19-1.1mdv2008.1.x86_64.rpm
0ed37e13965fc68e24173fae9053e5c9 2008.1/x86_64/mozilla-firefox-es_ES-2.0.0.19-1.1mdv2008.1.x86_64.rpm
3ec9246bf2d109972788fd286f7d6e8d 2008.1/x86_64/mozilla-firefox-et_EE-2.0.0.19-1.1mdv2008.1.x86_64.rpm
4684214bc36736f5fe1fd3fdfe6588d2 2008.1/x86_64/mozilla-firefox-eu-2.0.0.19-1.1mdv2008.1.x86_64.rpm
115b3f029de1c354a25822f45873f688 2008.1/x86_64/mozilla-firefox-ext-blogrovr-1.1.779-2.4mdv2008.1.x86_64.rpm
e740fb9e394f017cc2e0cfbeaf33a2f4 2008.1/x86_64/mozilla-firefox-ext-foxmarks-2.0.47.4-2.4mdv2008.1.x86_64.rpm
36486539b6f1354826acc2ba5ae9dbae 2008.1/x86_64/mozilla-firefox-ext-scribefire-2.2.7-2.4mdv2008.1.x86_64.rpm
f95f9a1e9a79cb33da33c9193c7f1d8d 2008.1/x86_64/mozilla-firefox-fi-2.0.0.19-1.1mdv2008.1.x86_64.rpm
5894f9d99e186dc1bfc100e3d4c7c5ba 2008.1/x86_64/mozilla-firefox-fr-2.0.0.19-1.1mdv2008.1.x86_64.rpm
4a6159e0f78cbb6655f9817127ed6d74 2008.1/x86_64/mozilla-firefox-fy-2.0.0.19-1.1mdv2008.1.x86_64.rpm
859146ebe437f428ba44b7bf598ac49f 2008.1/x86_64/mozilla-firefox-ga-2.0.0.19-1.1mdv2008.1.x86_64.rpm
4d8d7d371746c9209733d7c27fc5de54 2008.1/x86_64/mozilla-firefox-gnome-support-2.0.0.19-1.1mdv2008.1.x86_64.rpm
c2fa7795cda3112dd971224273b1df5d 2008.1/x86_64/mozilla-firefox-gu_IN-2.0.0.19-1.1mdv2008.1.x86_64.rpm
a815e8346458afcb3f8810ec4d3547c9 2008.1/x86_64/mozilla-firefox-he-2.0.0.19-1.1mdv2008.1.x86_64.rpm
0a122db9686cede7f5ad055d23c08a32 2008.1/x86_64/mozilla-firefox-hu-2.0.0.19-1.1mdv2008.1.x86_64.rpm
7744693aa8e95d554395193f790018cd 2008.1/x86_64/mozilla-firefox-it-2.0.0.19-1.1mdv2008.1.x86_64.rpm
22f8da02b7facf8ea06f74a87d283be7 2008.1/x86_64/mozilla-firefox-ja-2.0.0.19-1.1mdv2008.1.x86_64.rpm
fff4c829cc2d65a1ec7516536dcde8df 2008.1/x86_64/mozilla-firefox-ka-2.0.0.19-1.1mdv2008.1.x86_64.rpm
17232c455a0cf9d800a10b004ba06af7 2008.1/x86_64/mozilla-firefox-ko-2.0.0.19-1.1mdv2008.1.x86_64.rpm
34b439e8534f942da72cfa1c7526d834 2008.1/x86_64/mozilla-firefox-ku-2.0.0.19-1.1mdv2008.1.x86_64.rpm
2c4f9d93b3e827e90cc94762f617a168 2008.1/x86_64/mozilla-firefox-lt-2.0.0.19-1.1mdv2008.1.x86_64.rpm
f6bfb93dad2b9272cc35c02c9339aee2 2008.1/x86_64/mozilla-firefox-mk-2.0.0.19-1.1mdv2008.1.x86_64.rpm
5a4f646d67a7a46969e10cc5cea997c2 2008.1/x86_64/mozilla-firefox-mn-2.0.0.19-1.1mdv2008.1.x86_64.rpm
734908dbf333203532718f95f7f47a5b 2008.1/x86_64/mozilla-firefox-nb_NO-2.0.0.19-1.1mdv2008.1.x86_64.rpm
7818f6b5629845d37bf9f2daf52d7917 2008.1/x86_64/mozilla-firefox-nl-2.0.0.19-1.1mdv2008.1.x86_64.rpm
d52b7c003c1eae366929f4951775e00f 2008.1/x86_64/mozilla-firefox-nn_NO-2.0.0.19-1.1mdv2008.1.x86_64.rpm
fbabb6550e210d4f1ce5c14fdd8bd7c6 2008.1/x86_64/mozilla-firefox-pa_IN-2.0.0.19-1.1mdv2008.1.x86_64.rpm
a747b2a28f5555b599cfa9bc12af06a9 2008.1/x86_64/mozilla-firefox-pl-2.0.0.19-1.1mdv2008.1.x86_64.rpm
8883641123603549e6fb83ef001dad2b 2008.1/x86_64/mozilla-firefox-pt_BR-2.0.0.19-1.1mdv2008.1.x86_64.rpm
66400a7a508bf4911c90f2006d3a2bb2 2008.1/x86_64/mozilla-firefox-pt_PT-2.0.0.19-1.1mdv2008.1.x86_64.rpm
16869fa6a90d146f98c6b9cb32dae5d0 2008.1/x86_64/mozilla-firefox-ro-2.0.0.19-1.1mdv2008.1.x86_64.rpm
9c9e4b362c7bbc383ad87ebbd50e6f1e 2008.1/x86_64/mozilla-firefox-ru-2.0.0.19-1.1mdv2008.1.x86_64.rpm
f6e53c85519fb841c8da5520ce545dc6 2008.1/x86_64/mozilla-firefox-sk-2.0.0.19-1.1mdv2008.1.x86_64.rpm
29bbcb6e5fdae4cda5facace510a9405 2008.1/x86_64/mozilla-firefox-sl-2.0.0.19-1.1mdv2008.1.x86_64.rpm
2f4fe5a1d97bab6132d474175d5901a4 2008.1/x86_64/mozilla-firefox-sv_SE-2.0.0.19-1.1mdv2008.1.x86_64.rpm
ba635049a6ac540eb63ba84e68e3afc4 2008.1/x86_64/mozilla-firefox-theme-gnome-2.0.0-7.4mdv2008.1.x86_64.rpm
643b661b52dc7666976d9f77331e2b53 2008.1/x86_64/mozilla-firefox-theme-kdeff-0.4-7.4mdv2008.1.x86_64.rpm
bde8b65d609c60edd5a1baede2d01957 2008.1/x86_64/mozilla-firefox-tr-2.0.0.19-1.1mdv2008.1.x86_64.rpm
7ff74f11cf8664ce11ee7ee596bfc366 2008.1/x86_64/mozilla-firefox-uk-2.0.0.19-1.1mdv2008.1.x86_64.rpm
d676f12dcc1f98c80b632d90ce093c11 2008.1/x86_64/mozilla-firefox-zh_CN-2.0.0.19-1.1mdv2008.1.x86_64.rpm
ca0ebe74cc3d7743cbff0fe333cf4f7b 2008.1/x86_64/mozilla-firefox-zh_TW-2.0.0.19-1.1mdv2008.1.x86_64.rpm
78a3957aa974d12877d57ca91c45c9c0 2008.1/x86_64/totem-2.22.0-4.6mdv2008.1.x86_64.rpm
acb95916f5f3f9a0b749322d5a4fe4b4 2008.1/x86_64/totem-common-2.22.0-4.6mdv2008.1.x86_64.rpm
a23fc879d5e9742aba21ad50afdc5c13 2008.1/x86_64/totem-gstreamer-2.22.0-4.6mdv2008.1.x86_64.rpm
48ecccd72cb0164604e17fded37c3347 2008.1/x86_64/totem-mozilla-2.22.0-4.6mdv2008.1.x86_64.rpm
dad4fb7733a84f9498faaf12453eefc9 2008.1/x86_64/totem-mozilla-gstreamer-2.22.0-4.6mdv2008.1.x86_64.rpm
614dc8690c676f2eb2802cf0cb25483f 2008.1/x86_64/yelp-2.22.0-2.7mdv2008.1.x86_64.rpm
bbd14449827df2c7d84427430d7c7e57 2008.1/SRPMS/devhelp-0.19-3.6mdv2008.1.src.rpm
f0fb48ec7c2f73df643d79d3eead06fa 2008.1/SRPMS/epiphany-2.22.0-4.6mdv2008.1.src.rpm
a7e4e1126481763b00d672aa2e5c65e0 2008.1/SRPMS/galeon-2.0.4-3.6mdv2008.1.src.rpm
cdea7603720727b8285a85e96baaa6da 2008.1/SRPMS/gluezilla-1.2.6.1-2.6mdv2008.1.src.rpm
6f22974bed5335f06568db0baa892059 2008.1/SRPMS/gnome-python-extras-2.19.1-10.6mdv2008.1.src.rpm
3d915c1141aa275df291212a4e6bcca5 2008.1/SRPMS/mozilla-firefox-2.0.0.19-1.1mdv2008.1.src.rpm
8f56891a87fd79c5c2d57b48fcb9dccb 2008.1/SRPMS/mozilla-firefox-ext-blogrovr-1.1.779-2.4mdv2008.1.src.rpm
f6a815f7c838689da4d67d7d126cbace 2008.1/SRPMS/mozilla-firefox-ext-foxmarks-2.0.47.4-2.4mdv2008.1.src.rpm
e934487b170fe4d6eb70c7f6881f2108 2008.1/SRPMS/mozilla-firefox-ext-scribefire-2.2.7-2.4mdv2008.1.src.rpm
943c17d626499280bc99ec649ce9a16d 2008.1/SRPMS/mozilla-firefox-l10n-2.0.0.19-1.1mdv2008.1.src.rpm
074a41eb9fdffc2445b37c67c38f4e76 2008.1/SRPMS/mozilla-firefox-theme-gnome-2.0.0-7.4mdv2008.1.src.rpm
8b49b3452479db908e070f2bbdca14f0 2008.1/SRPMS/mozilla-firefox-theme-kdeff-0.4-7.4mdv2008.1.src.rpm
aab17d9315430d71ea5107c0c2a1c893 2008.1/SRPMS/totem-2.22.0-4.6mdv2008.1.src.rpm
299f7185a89651607ea697160ef9ffc4 2008.1/SRPMS/yelp-2.22.0-2.7mdv2008.1.src.rpm
Corporate 3.0:
a7e09a8f7ff8b1f769f6dff00ff03a2a corporate/3.0/i586/libnspr4-2.0.0.19-0.1.C30mdk.i586.rpm
1560d370f5b9c71ad3559a82e411882b corporate/3.0/i586/libnspr4-devel-2.0.0.19-0.1.C30mdk.i586.rpm
4def5dab8d75be3cf1883bb75344e743 corporate/3.0/i586/libnspr4-static-devel-2.0.0.19-0.1.C30mdk.i586.rpm
dc976c542521ec7784d01d3f802dfa50 corporate/3.0/i586/libnss3-2.0.0.19-0.1.C30mdk.i586.rpm
3b1e684357b83be52aa6bdd98d9230df corporate/3.0/i586/libnss3-devel-2.0.0.19-0.1.C30mdk.i586.rpm
62e3f5b57c22474c6037c2f8ec03f3e7 corporate/3.0/i586/mozilla-firefox-2.0.0.19-0.1.C30mdk.i586.rpm
86e71b51e38f1d1b4fd9832bed08ed8f corporate/3.0/i586/mozilla-firefox-ar-2.0.0.19-0.1.C30mdk.i586.rpm
876bcf93e0fa980c84cfcc4eca4dfa98 corporate/3.0/i586/mozilla-firefox-bg-2.0.0.19-0.1.C30mdk.i586.rpm
194db53017c9276f2219590098982a3d corporate/3.0/i586/mozilla-firefox-br-2.0.0.19-0.1.C30mdk.i586.rpm
4610fc64255e0d04b3fd2b19d72f554d corporate/3.0/i586/mozilla-firefox-ca-2.0.0.19-0.1.C30mdk.i586.rpm
872a988396a8b5aabd8bf22a77b0c5d8 corporate/3.0/i586/mozilla-firefox-cs-2.0.0.19-0.1.C30mdk.i586.rpm
55ff35bee3671d069a768a68b912e31d corporate/3.0/i586/mozilla-firefox-da-2.0.0.19-0.1.C30mdk.i586.rpm
49cdf7d73e6dd5bbe85069eb2d37829e corporate/3.0/i586/mozilla-firefox-de-2.0.0.19-0.1.C30mdk.i586.rpm
c12b42d1d774dd768228faa21308645e corporate/3.0/i586/mozilla-firefox-devel-2.0.0.19-0.1.C30mdk.i586.rpm
f6db9c2b24e7052a7e86f0937cd97e0a corporate/3.0/i586/mozilla-firefox-el-2.0.0.19-0.1.C30mdk.i586.rpm
f4ea6d7dece2662985af5f74e9bcee09 corporate/3.0/i586/mozilla-firefox-es-2.0.0.19-0.1.C30mdk.i586.rpm
d9caf8c487b9c1421dcf3547f09bc6dc corporate/3.0/i586/mozilla-firefox-es_AR-2.0.0.19-0.1.C30mdk.i586.rpm
796cd14856041e793012f8d200408c0a corporate/3.0/i586/mozilla-firefox-eu-2.0.0.19-0.1.C30mdk.i586.rpm
ffbe55ce250b12d5a75c84de2116bd9f corporate/3.0/i586/mozilla-firefox-fi-2.0.0.19-0.1.C30mdk.i586.rpm
132d2a2ff174ffa64d2e1f1f8f2a0271 corporate/3.0/i586/mozilla-firefox-fr-2.0.0.19-0.1.C30mdk.i586.rpm
5095690dd40ae1ee9ea76a6cea6cfbb1 corporate/3.0/i586/mozilla-firefox-fy-2.0.0.19-0.1.C30mdk.i586.rpm
860736d68f0e8b891cc4ad9e2c46ba21 corporate/3.0/i586/mozilla-firefox-ga-2.0.0.19-0.1.C30mdk.i586.rpm
1593911e02df76a4549ca4ed74345624 corporate/3.0/i586/mozilla-firefox-gu_IN-2.0.0.19-0.1.C30mdk.i586.rpm
65cc1724789d6da5b0fcb33bac405f0c corporate/3.0/i586/mozilla-firefox-he-2.0.0.19-0.1.C30mdk.i586.rpm
dd1cd6300f3118d5c45c9c1416371796 corporate/3.0/i586/mozilla-firefox-hu-2.0.0.19-0.1.C30mdk.i586.rpm
eb31970460d1d20d26d20a213dcb3032 corporate/3.0/i586/mozilla-firefox-it-2.0.0.19-0.1.C30mdk.i586.rpm
0bfdf586f72dd57bea948f5b16eb8c52 corporate/3.0/i586/mozilla-firefox-ja-2.0.0.19-0.1.C30mdk.i586.rpm
8ed800d2af693007c60223a1f42f5617 corporate/3.0/i586/mozilla-firefox-ko-2.0.0.19-0.1.C30mdk.i586.rpm
6165bffecb7f46ff934956ed976d4faf corporate/3.0/i586/mozilla-firefox-lt-2.0.0.19-0.1.C30mdk.i586.rpm
eaeb28b20754253cd7c3d88df79d923c corporate/3.0/i586/mozilla-firefox-mk-2.0.0.19-0.1.C30mdk.i586.rpm
5d38bde9a7404a2805c09bfbd1dfef77 corporate/3.0/i586/mozilla-firefox-nb-2.0.0.19-0.1.C30mdk.i586.rpm
0e4b12df47f47e4513ab2837fa1f2fa5 corporate/3.0/i586/mozilla-firefox-nl-2.0.0.19-0.1.C30mdk.i586.rpm
6df889907cabe064de4998c405dea090 corporate/3.0/i586/mozilla-firefox-pa_IN-2.0.0.19-0.1.C30mdk.i586.rpm
26075d9742c8d25eaafc860413d8e2b2 corporate/3.0/i586/mozilla-firefox-pl-2.0.0.19-0.1.C30mdk.i586.rpm
1f0f5fcbcfc3c0dfc4aabdf77205b922 corporate/3.0/i586/mozilla-firefox-pt-2.0.0.19-0.1.C30mdk.i586.rpm
d63e8b362f61ff798cfb70bd097a62dc corporate/3.0/i586/mozilla-firefox-pt_BR-2.0.0.19-0.1.C30mdk.i586.rpm
a95dee84d19c52bf86057a18154c58b9 corporate/3.0/i586/mozilla-firefox-ro-2.0.0.19-0.1.C30mdk.i586.rpm
84c4de6789445513f098fe547b6d3d95 corporate/3.0/i586/mozilla-firefox-ru-2.0.0.19-0.1.C30mdk.i586.rpm
6d1b1ab4a4687b7f65c8411f7b825b38 corporate/3.0/i586/mozilla-firefox-sk-2.0.0.19-0.1.C30mdk.i586.rpm
e59a753de270f146bcf683726b443107 corporate/3.0/i586/mozilla-firefox-sl-2.0.0.19-0.1.C30mdk.i586.rpm
6870ac43aed65acbb7b7f7d2891ec89b corporate/3.0/i586/mozilla-firefox-sv-2.0.0.19-0.1.C30mdk.i586.rpm
03f6342751638a2e4a8e3e5cf3771ef5 corporate/3.0/i586/mozilla-firefox-tr-2.0.0.19-0.1.C30mdk.i586.rpm
2dca90ec374e7e8165004ccdee1af78d corporate/3.0/i586/mozilla-firefox-uk-2.0.0.19-0.1.C30mdk.i586.rpm
909e512f57cd844f29c290f85a6fbbf5 corporate/3.0/i586/mozilla-firefox-zh_CN-2.0.0.19-0.1.C30mdk.i586.rpm
70936825d35db564f47361f6ae73e2cc corporate/3.0/i586/mozilla-firefox-zh_TW-2.0.0.19-0.1.C30mdk.i586.rpm
d1e98c49f5725212ae15d8af070c702f corporate/3.0/SRPMS/mozilla-firefox-2.0.0.19-0.1.C30mdk.src.rpm
ed1a740caabe90354f5f6d7af605e5d1 corporate/3.0/SRPMS/mozilla-firefox-l10n-2.0.0.19-0.1.C30mdk.src.rpm
Corporate 3.0/X86_64:
843d34cfb5c9d8320269b2b21f7df0be corporate/3.0/x86_64/lib64nspr4-2.0.0.19-0.1.C30mdk.x86_64.rpm
2949f58175ab1f85acabd2a8486c1dba corporate/3.0/x86_64/lib64nspr4-devel-2.0.0.19-0.1.C30mdk.x86_64.rpm
4c8a13bb9a54788a948ee03db7e85159 corporate/3.0/x86_64/lib64nspr4-static-devel-2.0.0.19-0.1.C30mdk.x86_64.rpm
ba5db109dd915f0785469a12ec2b9e5b corporate/3.0/x86_64/lib64nss3-2.0.0.19-0.1.C30mdk.x86_64.rpm
5dbff9684180d7e26dcd59e800115623 corporate/3.0/x86_64/lib64nss3-devel-2.0.0.19-0.1.C30mdk.x86_64.rpm
98badb7d947fedb600307fe9962214e9 corporate/3.0/x86_64/mozilla-firefox-2.0.0.19-0.1.C30mdk.x86_64.rpm
e45f2895e96a3e59d0eae600b7122ccc corporate/3.0/x86_64/mozilla-firefox-ar-2.0.0.19-0.1.C30mdk.x86_64.rpm
17641ae7a062077c876698caad16aa14 corporate/3.0/x86_64/mozilla-firefox-bg-2.0.0.19-0.1.C30mdk.x86_64.rpm
1b61f648b2ac59d2efd6dbdf69fadd48 corporate/3.0/x86_64/mozilla-firefox-br-2.0.0.19-0.1.C30mdk.x86_64.rpm
fc7217eea5e6e0794df714f3047a15d8 corporate/3.0/x86_64/mozilla-firefox-ca-2.0.0.19-0.1.C30mdk.x86_64.rpm
8221335474e3df33357eef6241867f24 corporate/3.0/x86_64/mozilla-firefox-cs-2.0.0.19-0.1.C30mdk.x86_64.rpm
2d5882d6fec5a58346e1ef534ffcc21f corporate/3.0/x86_64/mozilla-firefox-da-2.0.0.19-0.1.C30mdk.x86_64.rpm
32597cbfea4b9adf4d2fdcd405027f6c corporate/3.0/x86_64/mozilla-firefox-de-2.0.0.19-0.1.C30mdk.x86_64.rpm
5bfe4f243a4c51367f51eb3b21d3ee6c corporate/3.0/x86_64/mozilla-firefox-devel-2.0.0.19-0.1.C30mdk.x86_64.rpm
03140a5a0e69e7a93758ac419a28ee68 corporate/3.0/x86_64/mozilla-firefox-el-2.0.0.19-0.1.C30mdk.x86_64.rpm
07ac14e68fc0a942ab258a40b7e6a592 corporate/3.0/x86_64/mozilla-firefox-es-2.0.0.19-0.1.C30mdk.x86_64.rpm
986c71d25d213bc718cf5c2cd0f125a7 corporate/3.0/x86_64/mozilla-firefox-es_AR-2.0.0.19-0.1.C30mdk.x86_64.rpm
f77490aae83e099f214f777eb9cecb60 corporate/3.0/x86_64/mozilla-firefox-eu-2.0.0.19-0.1.C30mdk.x86_64.rpm
840ca2bd20bbb0a2384a6be4972224f8 corporate/3.0/x86_64/mozilla-firefox-fi-2.0.0.19-0.1.C30mdk.x86_64.rpm
f58433299ca354c88d749a6dcf574012 corporate/3.0/x86_64/mozilla-firefox-fr-2.0.0.19-0.1.C30mdk.x86_64.rpm
cbe8b0779040d261f6fe71069acc1857 corporate/3.0/x86_64/mozilla-firefox-fy-2.0.0.19-0.1.C30mdk.x86_64.rpm
f33e7d6ea3b5fa793313c7695e8f271f corporate/3.0/x86_64/mozilla-firefox-ga-2.0.0.19-0.1.C30mdk.x86_64.rpm
d89f8b3356a816b4cf6c6526733a28ce corporate/3.0/x86_64/mozilla-firefox-gu_IN-2.0.0.19-0.1.C30mdk.x86_64.rpm
59773234356bdb67ea87523c78b59257 corporate/3.0/x86_64/mozilla-firefox-he-2.0.0.19-0.1.C30mdk.x86_64.rpm
78f473b3a7ee937f26885234e8484ee6 corporate/3.0/x86_64/mozilla-firefox-hu-2.0.0.19-0.1.C30mdk.x86_64.rpm
dbe51a0408862117f2bc8041e5bdf310 corporate/3.0/x86_64/mozilla-firefox-it-2.0.0.19-0.1.C30mdk.x86_64.rpm
a4f505c8b42f40402a1ff8ed2ca95812 corporate/3.0/x86_64/mozilla-firefox-ja-2.0.0.19-0.1.C30mdk.x86_64.rpm
878fdee3884852c3191792ecd8b2537d corporate/3.0/x86_64/mozilla-firefox-ko-2.0.0.19-0.1.C30mdk.x86_64.rpm
249ffbf12a1553b7b27abfd758326aa1 corporate/3.0/x86_64/mozilla-firefox-lt-2.0.0.19-0.1.C30mdk.x86_64.rpm
b021b83b1da69e674eb283832ef3e705 corporate/3.0/x86_64/mozilla-firefox-mk-2.0.0.19-0.1.C30mdk.x86_64.rpm
0b7cef1af7c21d0bba1463135b146df4 corporate/3.0/x86_64/mozilla-firefox-nb-2.0.0.19-0.1.C30mdk.x86_64.rpm
4d3f8b7c25e48e6b2a55d3d9620f8fc0 corporate/3.0/x86_64/mozilla-firefox-nl-2.0.0.19-0.1.C30mdk.x86_64.rpm
b6783a2b3ab8e6d9dbbf8ee77cb0915a corporate/3.0/x86_64/mozilla-firefox-pa_IN-2.0.0.19-0.1.C30mdk.x86_64.rpm
93823522e27098b97ca102b852ce7bef corporate/3.0/x86_64/mozilla-firefox-pl-2.0.0.19-0.1.C30mdk.x86_64.rpm
4bd135cc5e0f28b92dc2bc98943ff64c corporate/3.0/x86_64/mozilla-firefox-pt-2.0.0.19-0.1.C30mdk.x86_64.rpm
773bf683dcc172045f8cc00f1551138b corporate/3.0/x86_64/mozilla-firefox-pt_BR-2.0.0.19-0.1.C30mdk.x86_64.rpm
4c41a47368446fc7dbb5e37fd2df58db corporate/3.0/x86_64/mozilla-firefox-ro-2.0.0.19-0.1.C30mdk.x86_64.rpm
1a4c3aae60452cd23289e4169b830b9c corporate/3.0/x86_64/mozilla-firefox-ru-2.0.0.19-0.1.C30mdk.x86_64.rpm
09d09b484d32493d5e8aaf0b2f472bd1 corporate/3.0/x86_64/mozilla-firefox-sk-2.0.0.19-0.1.C30mdk.x86_64.rpm
2261f8f0043be2a16fc8efa881fbbe13 corporate/3.0/x86_64/mozilla-firefox-sl-2.0.0.19-0.1.C30mdk.x86_64.rpm
0d8a98d0aa4c3711cdd18d5f14c7756e corporate/3.0/x86_64/mozilla-firefox-sv-2.0.0.19-0.1.C30mdk.x86_64.rpm
8ede8ac94704c2c41f2545be957742f3 corporate/3.0/x86_64/mozilla-firefox-tr-2.0.0.19-0.1.C30mdk.x86_64.rpm
9d057d749a4230c04d100b60d38e9257 corporate/3.0/x86_64/mozilla-firefox-uk-2.0.0.19-0.1.C30mdk.x86_64.rpm
9361222edb190a2d9ea6f056d0b25228 corporate/3.0/x86_64/mozilla-firefox-zh_CN-2.0.0.19-0.1.C30mdk.x86_64.rpm
49bf22c63ecbf9c04bd7eaa8a641f321 corporate/3.0/x86_64/mozilla-firefox-zh_TW-2.0.0.19-0.1.C30mdk.x86_64.rpm
d1e98c49f5725212ae15d8af070c702f corporate/3.0/SRPMS/mozilla-firefox-2.0.0.19-0.1.C30mdk.src.rpm
ed1a740caabe90354f5f6d7af605e5d1 corporate/3.0/SRPMS/mozilla-firefox-l10n-2.0.0.19-0.1.C30mdk.src.rpm
Corporate 4.0:
d4cb3bd4d726b06ddaab5190b0c749fa corporate/4.0/i586/libnspr4-2.0.0.19-0.1.20060mlcs4.i586.rpm
5b2e82b25652a5ed134a33273385748c corporate/4.0/i586/libnspr4-devel-2.0.0.19-0.1.20060mlcs4.i586.rpm
4640c4ec70e464a6262a1a1e6d0dec84 corporate/4.0/i586/libnspr4-static-devel-2.0.0.19-0.1.20060mlcs4.i586.rpm
592f1be6b8de7e4e82993680fe096762 corporate/4.0/i586/libnss3-2.0.0.19-0.1.20060mlcs4.i586.rpm
0fe64c2ac08ddd0ab3bca5be9edfa3c3 corporate/4.0/i586/libnss3-devel-2.0.0.19-0.1.20060mlcs4.i586.rpm
5156aacca7670d32a98987503b45f8a1 corporate/4.0/i586/mozilla-firefox-2.0.0.19-0.1.20060mlcs4.i586.rpm
f698550b05f7b24aab0115d29c5ad501 corporate/4.0/i586/mozilla-firefox-af-2.0.0.19-0.1.20060mlcs4.i586.rpm
1c67a70194b8ab4545868108dc4cccc4 corporate/4.0/i586/mozilla-firefox-ar-2.0.0.19-0.1.20060mlcs4.i586.rpm
17b070507cfa9017d04737f52eff38d9 corporate/4.0/i586/mozilla-firefox-be-2.0.0.19-0.1.20060mlcs4.i586.rpm
892d8c38889952737d65850db8bed7a9 corporate/4.0/i586/mozilla-firefox-bg-2.0.0.19-0.1.20060mlcs4.i586.rpm
660dfda8217385eae3c276fed641c499 corporate/4.0/i586/mozilla-firefox-br_FR-2.0.0.19-0.1.20060mlcs4.i586.rpm
f50d79c831f9765809a91706947f8d59 corporate/4.0/i586/mozilla-firefox-ca-2.0.0.19-0.1.20060mlcs4.i586.rpm
f971ce7e079986cb8be0d1efaeaefa97 corporate/4.0/i586/mozilla-firefox-cs-2.0.0.19-0.1.20060mlcs4.i586.rpm
5bfbca68b5824a3eaa81b559fd99c398 corporate/4.0/i586/mozilla-firefox-da-2.0.0.19-0.1.20060mlcs4.i586.rpm
49e86f863afaa55b0e83a69d588a883f corporate/4.0/i586/mozilla-firefox-de-2.0.0.19-0.1.20060mlcs4.i586.rpm
f0469e4e3923161093adee1ff46b9093 corporate/4.0/i586/mozilla-firefox-devel-2.0.0.19-0.1.20060mlcs4.i586.rpm
e3dce53d5a4bc6af63fd7c4ec3a4f7d2 corporate/4.0/i586/mozilla-firefox-el-2.0.0.19-0.1.20060mlcs4.i586.rpm
b28a40484f46c2bbfc8d12ec3f5adf62 corporate/4.0/i586/mozilla-firefox-en_GB-2.0.0.19-0.1.20060mlcs4.i586.rpm
9652694d3e8340becd4af74af125cf7b corporate/4.0/i586/mozilla-firefox-es_AR-2.0.0.19-0.1.20060mlcs4.i586.rpm
8e8a1352df61ca93357c15ba94dcf9e3 corporate/4.0/i586/mozilla-firefox-es_ES-2.0.0.19-0.1.20060mlcs4.i586.rpm
35b488c1999ba644e16bc8fbaebb444b corporate/4.0/i586/mozilla-firefox-et_EE-2.0.0.19-0.1.20060mlcs4.i586.rpm
fcb7794c20e3063f53dae155a8b07294 corporate/4.0/i586/mozilla-firefox-eu-2.0.0.19-0.1.20060mlcs4.i586.rpm
13c02a4abf963c8f00481efafc80ba60 corporate/4.0/i586/mozilla-firefox-fi-2.0.0.19-0.1.20060mlcs4.i586.rpm
a1330810355ea568f7821eb45cfc7fce corporate/4.0/i586/mozilla-firefox-fr-2.0.0.19-0.1.20060mlcs4.i586.rpm
d381c9d11fc12e2ce07cacd065a3e3b7 corporate/4.0/i586/mozilla-firefox-fy-2.0.0.19-0.1.20060mlcs4.i586.rpm
df50934b1f50399d27795409e434df0f corporate/4.0/i586/mozilla-firefox-ga-2.0.0.19-0.1.20060mlcs4.i586.rpm
b80216bd4fce56a756ab57a403c92b6c corporate/4.0/i586/mozilla-firefox-gu_IN-2.0.0.19-0.1.20060mlcs4.i586.rpm
f776b39bca14c1e0647dc0a9a8c4526d corporate/4.0/i586/mozilla-firefox-he-2.0.0.19-0.1.20060mlcs4.i586.rpm
057032a70e8c4820f50207f5b7c16063 corporate/4.0/i586/mozilla-firefox-hu-2.0.0.19-0.1.20060mlcs4.i586.rpm
eb528e4465f9bf16bb43ab8817568158 corporate/4.0/i586/mozilla-firefox-it-2.0.0.19-0.1.20060mlcs4.i586.rpm
34e0f3bbeef0ccc78083de6c1ee7af78 corporate/4.0/i586/mozilla-firefox-ja-2.0.0.19-0.1.20060mlcs4.i586.rpm
4a3de02c3076eb279d58ffde92bc6e2e corporate/4.0/i586/mozilla-firefox-ka-2.0.0.19-0.1.20060mlcs4.i586.rpm
292feaf38d5b4472fd08e50f3b0127db corporate/4.0/i586/mozilla-firefox-ko-2.0.0.19-0.1.20060mlcs4.i586.rpm
e672eae350456ee541bd6950d4f14e35 corporate/4.0/i586/mozilla-firefox-ku-2.0.0.19-0.1.20060mlcs4.i586.rpm
c422029dd8b0d17ebe2019b3bab29c87 corporate/4.0/i586/mozilla-firefox-lt-2.0.0.19-0.1.20060mlcs4.i586.rpm
847e53d7bae6f328113176c049766fb9 corporate/4.0/i586/mozilla-firefox-mk-2.0.0.19-0.1.20060mlcs4.i586.rpm
2fd3d55e31a9e1140822d7257f34a69d corporate/4.0/i586/mozilla-firefox-mn-2.0.0.19-0.1.20060mlcs4.i586.rpm
3a1126205f8f268b0277b2b7736aeeab corporate/4.0/i586/mozilla-firefox-nb_NO-2.0.0.19-0.1.20060mlcs4.i586.rpm
8cceb66283fc4b50f8484769894c30b7 corporate/4.0/i586/mozilla-firefox-nl-2.0.0.19-0.1.20060mlcs4.i586.rpm
a5c700a733c754d387ee5d9484d711df corporate/4.0/i586/mozilla-firefox-nn_NO-2.0.0.19-0.1.20060mlcs4.i586.rpm
6d298de171571eccfe1612c56b1e9981 corporate/4.0/i586/mozilla-firefox-pa_IN-2.0.0.19-0.1.20060mlcs4.i586.rpm
6df4d174aa7ae064be8f8d1d8c843d17 corporate/4.0/i586/mozilla-firefox-pl-2.0.0.19-0.1.20060mlcs4.i586.rpm
150da7b5f103afa8ce2b957dabd45a9c corporate/4.0/i586/mozilla-firefox-pt_BR-2.0.0.19-0.1.20060mlcs4.i586.rpm
b9b12041dd102a81def9634d98829a12 corporate/4.0/i586/mozilla-firefox-pt_PT-2.0.0.19-0.1.20060mlcs4.i586.rpm
2633bfb572cb43a3a346510b30659767 corporate/4.0/i586/mozilla-firefox-ro-2.0.0.19-0.1.20060mlcs4.i586.rpm
c3cdec2cb36d86ca435b8b4fd7d050b6 corporate/4.0/i586/mozilla-firefox-ru-2.0.0.19-0.1.20060mlcs4.i586.rpm
b18f6e51b03aefa86c80a5d8cc837364 corporate/4.0/i586/mozilla-firefox-sk-2.0.0.19-0.1.20060mlcs4.i586.rpm
b55c21b09a195e23ecce040c29ca8d99 corporate/4.0/i586/mozilla-firefox-sl-2.0.0.19-0.1.20060mlcs4.i586.rpm
baeee02e3ccc8dac85a44844914dff3c corporate/4.0/i586/mozilla-firefox-sv_SE-2.0.0.19-0.1.20060mlcs4.i586.rpm
816d0a2fbc5d6542df70acf341cf3cbc corporate/4.0/i586/mozilla-firefox-tr-2.0.0.19-0.1.20060mlcs4.i586.rpm
0f6805b0258a96394f8fb716a2c25615 corporate/4.0/i586/mozilla-firefox-uk-2.0.0.19-0.1.20060mlcs4.i586.rpm
49f1016eeaed4249bac26e1e4eddd847 corporate/4.0/i586/mozilla-firefox-zh_CN-2.0.0.19-0.1.20060mlcs4.i586.rpm
6796e061850e9010567a92206262f39a corporate/4.0/i586/mozilla-firefox-zh_TW-2.0.0.19-0.1.20060mlcs4.i586.rpm
1c09017810522b17122227f7b6b61a47 corporate/4.0/SRPMS/mozilla-firefox-2.0.0.19-0.1.20060mlcs4.src.rpm
a2ee0895eb2196e83e07cb5bc0781310 corporate/4.0/SRPMS/mozilla-firefox-l10n-2.0.0.19-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
08a8604f90713669f4e1190607a6d08a corporate/4.0/x86_64/lib64nspr4-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
36b80b972057761306e2f225235821c8 corporate/4.0/x86_64/lib64nspr4-devel-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
ff4e835db60fe8541aedcbf9c4501ca1 corporate/4.0/x86_64/lib64nspr4-static-devel-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
68beed272e2c5e85d13d48d1a343e810 corporate/4.0/x86_64/lib64nss3-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
a5f7691d64fb1b70d82de84062a10d97 corporate/4.0/x86_64/lib64nss3-devel-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
425fd3aa739ee88bb798804936252a08 corporate/4.0/x86_64/mozilla-firefox-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
963a5dadd99b05165d5415b1bb31cfd9 corporate/4.0/x86_64/mozilla-firefox-af-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
16739a31d46401245ae8cd0c81d527b3 corporate/4.0/x86_64/mozilla-firefox-ar-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
c2bc77371bf03cfe8aa167126f94c9e2 corporate/4.0/x86_64/mozilla-firefox-be-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
cb78331dba10b326579d36af99e6732b corporate/4.0/x86_64/mozilla-firefox-bg-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
159b2f61d5b0643e3891521da80207a6 corporate/4.0/x86_64/mozilla-firefox-br_FR-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
7dc141016e6af5be3a7740fa16b87ca0 corporate/4.0/x86_64/mozilla-firefox-ca-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
2ae66a133bd61dc2164a226782b08f78 corporate/4.0/x86_64/mozilla-firefox-cs-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
e47ad63990d5703a580f2d9362f784da corporate/4.0/x86_64/mozilla-firefox-da-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
8874bfabdd13df5fcc556775bcc9c1d9 corporate/4.0/x86_64/mozilla-firefox-de-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
2cf386ec0b49c409c7f8efcb8e1daee9 corporate/4.0/x86_64/mozilla-firefox-devel-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
d84ad1a3d782ee92b0893100444dcd1e corporate/4.0/x86_64/mozilla-firefox-el-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
85a9eca8956786c854648eedf8ea832e corporate/4.0/x86_64/mozilla-firefox-en_GB-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
e13b105a087bc918f7d8d5b47702ffab corporate/4.0/x86_64/mozilla-firefox-es_AR-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
789cfe7fa6643b9091532b5f771ef156 corporate/4.0/x86_64/mozilla-firefox-es_ES-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
98cab609371ae0fec1df19b310532ba2 corporate/4.0/x86_64/mozilla-firefox-et_EE-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
cb83ae2eb3bffa0400d257fa6a63d0d1 corporate/4.0/x86_64/mozilla-firefox-eu-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
05d74ca9aabe0f37ad46427578c998e9 corporate/4.0/x86_64/mozilla-firefox-fi-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
07ec77773c87bd2c2cb460845a552502 corporate/4.0/x86_64/mozilla-firefox-fr-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
5d86bb729e13aa45a0e6ba98ea6fe7cf corporate/4.0/x86_64/mozilla-firefox-fy-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
c5747925339a84303a2436dab4e9e3af corporate/4.0/x86_64/mozilla-firefox-ga-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
3cdc7291338451a40b7f68735041184b corporate/4.0/x86_64/mozilla-firefox-gu_IN-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
9c13c775b20a66dc5e7de40c00e2a381 corporate/4.0/x86_64/mozilla-firefox-he-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
c376685454c1e6762216ff2777afdead corporate/4.0/x86_64/mozilla-firefox-hu-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
89588e24f0090101e215bef06575c903 corporate/4.0/x86_64/mozilla-firefox-it-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
55d73f42bd999de4a7624f626ad6bbaf corporate/4.0/x86_64/mozilla-firefox-ja-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
bc7bd65dedd37b6c061cabc5f0b7fdc2 corporate/4.0/x86_64/mozilla-firefox-ka-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
49e25880bea3eb589b0d7fd76d3d4507 corporate/4.0/x86_64/mozilla-firefox-ko-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
be2e3da875eabd0df6675358239bf491 corporate/4.0/x86_64/mozilla-firefox-ku-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
ce57f8aa97ed6df332184284ce8162bb corporate/4.0/x86_64/mozilla-firefox-lt-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
1130b569e4fbf81eee595c02fc1e7e2a corporate/4.0/x86_64/mozilla-firefox-mk-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
7968ad74724eca4d8a9ac6349a91226a corporate/4.0/x86_64/mozilla-firefox-mn-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
ebb183c1df2e537c0d80a9a5eb16e2c4 corporate/4.0/x86_64/mozilla-firefox-nb_NO-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
69477b6ee4f5bcb52d9ade783ef9ca07 corporate/4.0/x86_64/mozilla-firefox-nl-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
a2d1cd1daa4b0da3ca86220c6e6fcf4b corporate/4.0/x86_64/mozilla-firefox-nn_NO-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
5461b070c6a7cdc445b26c5a86fad4ad corporate/4.0/x86_64/mozilla-firefox-pa_IN-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
f15ec6611a130a3f7ffbca04cd0b8168 corporate/4.0/x86_64/mozilla-firefox-pl-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
7b1567c1a8ce872cb1ca45acd1aea848 corporate/4.0/x86_64/mozilla-firefox-pt_BR-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
3098b39980684944b46d203083addf72 corporate/4.0/x86_64/mozilla-firefox-pt_PT-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
e4ae9273d7d44be3dab809528374cd34 corporate/4.0/x86_64/mozilla-firefox-ro-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
e033cc9e774f18d645aca65d91af1887 corporate/4.0/x86_64/mozilla-firefox-ru-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
967a07be298b4708f7102fa9a5f4a212 corporate/4.0/x86_64/mozilla-firefox-sk-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
ef051ddb22b177bcf2e2d5408b258fc1 corporate/4.0/x86_64/mozilla-firefox-sl-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
c52709df45b95663c42d65fe3cc29367 corporate/4.0/x86_64/mozilla-firefox-sv_SE-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
00dd7e52781bee4476c4a2f5bdf42a4e corporate/4.0/x86_64/mozilla-firefox-tr-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
3191ac84cc2e4a9c00169cdef62f5d13 corporate/4.0/x86_64/mozilla-firefox-uk-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
b43739e74f0aed412bc8f92044068ec2 corporate/4.0/x86_64/mozilla-firefox-zh_CN-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
c8a3df4ac8c548cec72499df61b32219 corporate/4.0/x86_64/mozilla-firefox-zh_TW-2.0.0.19-0.1.20060mlcs4.x86_64.rpm
1c09017810522b17122227f7b6b61a47 corporate/4.0/SRPMS/mozilla-firefox-2.0.0.19-0.1.20060mlcs4.src.rpm
a2ee0895eb2196e83e07cb5bc0781310 corporate/4.0/SRPMS/mozilla-firefox-l10n-2.0.0.19-0.1.20060mlcs4.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFJSVt8mqjQ0CJFipgRAjVhAKCmLNHHWzvsMAYUPQ1FnvhWVj7E9gCg2RFg
SHHOhE0nqOalwRNqRwY1rv4=q77o
-----END PGP SIGNATURE-----
From - Thu Dec 18 11:40:56 2008
X-Account-Key: account7
X-UIDL: 4909bb8c0000526c
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <bugtraq-return-38961-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing3.securityfocus.com (outgoing.securityfocus.com [205.206.231.27])
by mx.securityspace.com (Postfix) with ESMTP id 2768DEC142
for <lists@securityspace.com>; Thu, 18 Dec 2008 11:39:17 -0500 (EST)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing3.securityfocus.com (Postfix) with QMQP
id BB3DC237203; Thu, 18 Dec 2008 09:20:26 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 1437 invoked from network); 17 Dec 2008 23:36:08 -0000
Date: Wed, 17 Dec 2008 17:54:48 -0600
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Cc: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk
Subject: [USN-690-1] Firefox and xulrunner vulnerabilities
Message-ID: <20081217235447.GC16973@severus.strandboge.com>
Reply-To: Jamie Strandboge <jamie@canonical.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="24zk1gE8NUlDmwG9"
Content-Disposition: inline
User-Agent: Mutt/1.5.18 (2008-05-17)
Status:
--24zk1gE8NUlDmwG9
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
==========================================================Ubuntu Security Notice USN-690-1 December 17, 2008
firefox-3.0, xulrunner-1.9 vulnerabilities
CVE-2008-5500, CVE-2008-5501, CVE-2008-5502, CVE-2008-5505,
CVE-2008-5506, CVE-2008-5507, CVE-2008-5508, CVE-2008-5510,
CVE-2008-5511, CVE-2008-5512, CVE-2008-5513
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 8.04 LTS
Ubuntu 8.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 8.04 LTS:
firefox-3.0 3.0.5+nobinonly-0ubuntu0.8.04.1
xulrunner-1.9 1.9.0.5+nobinonly-0ubuntu0.8.04.1
Ubuntu 8.10:
abrowser 3.0.5+nobinonly-0ubuntu0.8.10.1
firefox-3.0 3.0.5+nobinonly-0ubuntu0.8.10.1
xulrunner-1.9 1.9.0.5+nobinonly-0ubuntu0.8.10.1
After a standard system upgrade you need to restart Firefox and any
applications that use xulrunner, such as Epiphany, to effect the necessary
changes.
Details follow:
Several flaws were discovered in the browser engine. These problems could allow
an attacker to crash the browser and possibly execute arbitrary code with user
privileges. (CVE-2008-5500, CVE-2008-5501, CVE-2008-5502)
It was discovered that Firefox did not properly handle persistent cookie data.
If a user were tricked into opening a malicious website, an attacker could
write persistent data in the user's browser and track the user across browsing
sessions. (CVE-2008-5505)
Marius Schilder discovered that Firefox did not properly handle redirects to
an outside domain when an XMLHttpRequest was made to a same-origin resource.
It's possible that sensitive information could be revealed in the
XMLHttpRequest response. (CVE-2008-5506)
Chris Evans discovered that Firefox did not properly protect a user's data when
accessing a same-domain Javascript URL that is redirected to an unparsable
Javascript off-site resource. If a user were tricked into opening a malicious
website, an attacker may be able to steal a limited amount of private data.
(CVE-2008-5507)
Chip Salzenberg, Justin Schuh, Tom Cross, and Peter William discovered Firefox
did not properly parse URLs when processing certain control characters.
(CVE-2008-5508)
Kojima Hajime discovered that Firefox did not properly handle an escaped null
character. An attacker may be able to exploit this flaw to bypass script
sanitization. (CVE-2008-5510)
Several flaws were discovered in the Javascript engine. If a user were tricked
into opening a malicious website, an attacker could exploit this to execute
arbitrary Javascript code within the context of another website or with chrome
privileges. (CVE-2008-5511, CVE-2008-5512)
Flaws were discovered in the session-restore feature of Firefox. If a user were
tricked into opening a malicious website, an attacker could exploit this to
perform cross-site scripting attacks or execute arbitrary Javascript code with
chrome privileges. (CVE-2008-5513)
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1.diff.gz
Size/MD5: 105923 f12b085d54cf9974f59417c819369f7b
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1.dsc
Size/MD5: 2073 f77df6017c984d30a3d94852d612592c
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly.orig.tar.gz
Size/MD5: 11578151 aab85acc009ddf9e0949f6ef8021c629
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1.diff.gz
Size/MD5: 77585 714fea2e00f4d2d225419b7714617379
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1.dsc
Size/MD5: 2138 29439d2544479c7d6071b77b5392beca
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly.orig.tar.gz
Size/MD5: 40094530 e717d276d7d511ec448c7a308ed38ea7
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 66036 1c795fc7e998798eb93166ad6749a782
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 66044 6a91da8f7b1e0f5e8bcee8290ffe8f79
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-granparadiso-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 66008 043213fede954207a951faa3fb3dbcef
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-trunk-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65996 39449a48e9cf507448f4fe112a9f56bc
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 66156 73604deb3466eaf56dc056d04e416822
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-3.0-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 66052 83fb81251f8b3f92c461ee635708820e
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-3.0-venkman_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 66008 f6362a50f39b38bd11cc941f8615fd49
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 8970 45df438b9017a5f95613f9f6291cf7cd
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 8958 eca17510d43167e2ad66b8599ad401cf
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 66022 0c93b1ea43acf714e17e54731b4569ce
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65998 92405ff0ca1ef276f55933550931ab95
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-libthai_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65988 b137cb25439d194b1c8e38869505c098
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 8944 be02daff747f512c21ed7a50653757bc
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 66018 3879e7321a0f861d4bce64eae8b8d623
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-venkman_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 8932 c24a7b83f085217e62b7f6f7bd151732
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65984 0e378bddf711e95f9895b952962594e4
http://security.ubuntu.com/ubuntu/pool/universe/x/xulrunner-1.9/xulrunner-1.9-dom-inspector_1.9.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 125348 33ff243ae638990d73446c96f403f4eb
http://security.ubuntu.com/ubuntu/pool/universe/x/xulrunner-1.9/xulrunner-1.9-venkman_1.9.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 235314 ad988c3c4f8be87f14c422c8a2cb107c
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 9030 e3b340d3ae143e9eae81f500a7b11077
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 29574 cbd4dbed6f4096b3445a460a06c43c23
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 1091122 700b3711b3eafe72f06dbd296f5ff38d
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 4040604 78ac96232377ba5edb4d9d2d8ff08bd9
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 48646 b22abb70c963fd8b16012a7026bea48a
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 9036702 a657caadf7d09cb666e23e5403ced1af
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 9026 a25a831bcf9987f805e5743a17172f9f
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 25728 2e8ef8a7a9121f643cf577cd7e5a6af4
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 1069810 fd85ceb052f5c4265185f356b0f6ecb8
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 4022272 94ec411ee9d57eaf7766bcdb204465c2
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 38502 3834df3ad8ee516ce6a2c7b4a8998248
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 7768580 d6fb4dec2238d7aef940d78a2b60c805
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 9026 7fe24779d67d50bf5d9e0792820b3e70
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 25342 a4ba8aab36015afafd94f33bdb77f251
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 1067000 905c0e506b30756e3f33f605fed4bf9d
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 4017332 2741a8cee9059d132cbfb8f9825ff29e
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 37600 8211098ce04cb914c30a5dd751787a22
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 7655022 41b7d3c30c3ec0425a9ae6f7c9e5aa96
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 9024 8b0948e68925ab362b02323ff8980565
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 27498 c8d00ee74d9c41f5531212097deffabf
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 1084140 242611e7a37838dd02b311d60b32102a
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 4028614 b1ce404c093b830dec1a7a763a4e44e1
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 43668 e4b818ef433243f1188808c242a6a0a8
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 8612226 03a50ddf14ac10c5448a9a70f80cb5b9
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1.diff.gz
Size/MD5: 123819 b26276997b7832f8deff25479cadc36c
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1.dsc
Size/MD5: 2128 c5c875ad949d7e14f2c7b69bb92aab49
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly.orig.tar.gz
Size/MD5: 11578151 aab85acc009ddf9e0949f6ef8021c629
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1.diff.gz
Size/MD5: 251178 3e361bba71a28e82ac6c8c87a32e695e
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1.dsc
Size/MD5: 2156 75e21bd096b069db82d0d601f26ca1a9
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly.orig.tar.gz
Size/MD5: 40094530 e717d276d7d511ec448c7a308ed38ea7
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/abrowser_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68832 a17c00ade509ee07eb84b3e44e993161
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68736 cbbf7badc50f34dc0f04cf37498ea137
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68746 3c108b3c47efdbea2d466bce80fd3df2
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-granparadiso-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68710 f16542e1c96efb239667686fd230a2b6
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-trunk-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68690 230313a66ccac9ecb0168086132c8754
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68828 f6f7b7b9a354232fa83657149673eec9
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-3.0-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68758 797bb994fb74066309109c926f2730e5
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-3.0-venkman_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68704 f4eb5d6a52dd1b2c6593d5fa696bd61e
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 8968 2372669d8f258023612668f4e6e83940
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 8962 e7df3bcb18e73499d586bbc5182c00c6
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68730 ef489a27b3aee1da8a200051bec6288a
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68696 6707a9bc2efb993c8a1520cbf3b9415c
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-libthai_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68690 0784cc95e2b0c677d0d104378fe2472e
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-dom-inspector_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 8946 45b017f290872bb395f9a9ed8782e9fa
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68716 d19947268cfa33c8b5ec5b9fba251509
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-venkman_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 8936 d6c2e934fe528b7775d383a475bc2660
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk_3.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 68682 31c3218d61ebce7622c920769feb74d1
http://security.ubuntu.com/ubuntu/pool/universe/x/xulrunner-1.9/xulrunner-1.9-dom-inspector_1.9.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 127356 96b6afcd843542ff5cf9b794481eb917
http://security.ubuntu.com/ubuntu/pool/universe/x/xulrunner-1.9/xulrunner-1.9-venkman_1.9.0.5+nobinonly-0ubuntu0.8.10.1_all.deb
Size/MD5: 237144 9687222fc13c98eb33a389cf7436de9f
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/abrowser-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
Size/MD5: 203568 ab3d2bf1e57510999d8f8b6931b151e7
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
Size/MD5: 201918 a82483844898613a853ebb3ae1931de4
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
Size/MD5: 68794 296d19503162b5a0bbf64203bf734c88
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
Size/MD5: 88232 cfb6a2b90ccf22879118229ac24e7eba
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
Size/MD5: 904660 9fbc37e8a2e300b4f50893bd3cb8be33
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
Size/MD5: 4557732 4ed9ecb6bd528dc3ff1dc78881bbc767
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
Size/MD5: 47104 597d270dc2ea88e88c25288c16525efa
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
Size/MD5: 8704984 b88caa34f6907339b2c747b536ecc977
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_amd64.deb
Size/MD5: 22452 f21a8578d4682d6ec6dfb5722ca7bcf5
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/abrowser-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
Size/MD5: 203566 e0779108ab88a324bf5e876debbdf9bc
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
Size/MD5: 201910 60b13ffa5693a02960447951be67efb6
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
Size/MD5: 68796 19d49197333232db191ace34bf789828
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
Size/MD5: 84282 719a8d695c8d2833330d878d1b463cad
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
Size/MD5: 886680 4949dce5a2c8998dbfec3d0391873f36
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
Size/MD5: 4534426 ce11a793e29ae66eaf5b4e1c9534435b
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
Size/MD5: 39372 ad427dd7cdd931b37924b7b8770f32e4
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
Size/MD5: 7536414 ce809475aebab883eea0fa3668d50e41
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_i386.deb
Size/MD5: 22450 93cef6499cf1738f2c0c0d20d9a44475
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/f/firefox-3.0/abrowser-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
Size/MD5: 203562 6a60fee763d775ac1e448b159e993def
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
Size/MD5: 201908 820b2f87fd26c6aff980ee88594e8a58
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
Size/MD5: 68794 ec0c6d8a9008ef3b69deaf70692f21b7
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
Size/MD5: 83692 f4b3ac017018b5d93003f94068c11f8c
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
Size/MD5: 883786 c251a0cf7c157a8700c74e83e3816fe3
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
Size/MD5: 4531200 1b91e0dcb6da9082047be8b08b393300
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
Size/MD5: 38408 093707eb9c1f5f5a79227a3e0784c466
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
Size/MD5: 7428760 41b49255d047cbe2b40a32f30c19a642
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_lpia.deb
Size/MD5: 22454 fd342c47c662c396fb0cf930680d1ee5
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/f/firefox-3.0/abrowser-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
Size/MD5: 203580 0a0c9cb64777717ce6ac7156f348d8e4
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
Size/MD5: 201916 3b8e02583e533687c1f601f542ac71b7
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
Size/MD5: 68800 1e9c80f34615ab5f467537115ae13384
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
Size/MD5: 85674 f7e9d073d0e7d5d06804280535e63a1d
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
Size/MD5: 898206 6b5965045934a26d2413118177618e83
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
Size/MD5: 4525324 f985f891118cc3596d050cae0936c4a3
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
Size/MD5: 42406 a573aecacb4666596a91890e7cf9aa4c
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
Size/MD5: 8270874 3502c2d0c9b10b2171c934c211b5eee4
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_powerpc.deb
Size/MD5: 22456 5191b9fd559e4752707f9a5ec552fcb5
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/f/firefox-3.0/abrowser-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
Size/MD5: 203560 20d718e426e621b2f9fc01db7d363f41
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-branding_3.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
Size/MD5: 201922 a2c148548d836a713868d77e93524d25
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
Size/MD5: 68798 83c481eb2b42d690601e7d1b5486bc53
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
Size/MD5: 83346 64533b3f9f06821a3a23b180b8556942
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
Size/MD5: 886616 f175f18d0f504db8422b7fd996102177
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
Size/MD5: 4511354 52e85b07a91b431f5276582dec6df47c
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
Size/MD5: 37870 bb831cf3b5eb3ef07dd2e6e6a7341e5b
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
Size/MD5: 8089008 96759018dcdb9ae7a2bbfd9b68e228dc
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-dev_1.9.0.5+nobinonly-0ubuntu0.8.10.1_sparc.deb
Size/MD5: 22454 b0d6337af6856ba7bdaad625a9fc306e