ID

VAR-201006-1188


CVE

CVE-2010-1205


TITLE

libpng fails to limit number of rows in header

Trust: 0.8

sources: CERT/CC: VU#643615

DESCRIPTION

Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row. Libpng contains a vulnerability in the way it handles images containing an extra row of image data beyond the height reported in the image header. libpng is a PNG reference library that can create, read and write PNG graphics files. There is a buffer overflow vulnerability in the libpng library when processing graphics row data. If the graphics file provides an extra graphics row that is higher than the height reported in the header, this overflow can be triggered, resulting in arbitrary code execution; in addition, when processing a certain There may be a memory leak when some sCAL blocks are used, and specially crafted PNG graphics may cause a denial of service. ---------------------------------------------------------------------- "From 2007 to 2009 vulnerabilities in a typical end-user PC almost doubled from about 220 to 420." Non-Microsoft software to blame for increase in vulnerabilities affecting typical Windows end-users, read more: http://secunia.com/gfx/pdf/Secunia_Half_Year_Report_2010.pdf ---------------------------------------------------------------------- TITLE: Mozilla SeaMonkey Multiple Vulnerabilities SECUNIA ADVISORY ID: SA40688 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40688/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40688 RELEASE DATE: 2010-07-22 DISCUSS ADVISORY: http://secunia.com/advisories/40688/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40688/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40688 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Some weaknesses and vulnerabilities have been reported in Mozilla SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, conduct spoofing attacks, and compromise a user's system. For more information: SA39925 SA40283 SOLUTION: Update to SeaMonkey 2.0.6. ORIGINAL ADVISORY: http://www.mozilla.org/security/announce/2010/mfsa2010-35.html http://www.mozilla.org/security/announce/2010/mfsa2010-36.html http://www.mozilla.org/security/announce/2010/mfsa2010-37.html http://www.mozilla.org/security/announce/2010/mfsa2010-39.html http://www.mozilla.org/security/announce/2010/mfsa2010-40.html http://www.mozilla.org/security/announce/2010/mfsa2010-41.html http://www.mozilla.org/security/announce/2010/mfsa2010-42.html http://www.mozilla.org/security/announce/2010/mfsa2010-45.html http://www.mozilla.org/security/announce/2010/mfsa2010-46.html http://www.mozilla.org/security/announce/2010/mfsa2010-47.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . CVE-2010-1208 "regenrecht" discovered that incorrect memory handling in DOM parsing could lead to the execution of arbitrary code. CVE-2010-1211 Jesse Ruderman, Ehsan Akhgari, Mats Palmgren, Igor Bukanov, Gary Kwong, Tobias Markus and Daniel Holbert discovered crashes in the layout engine, which might allow the execution of arbitrary code. CVE-2010-2751 Jordi Chancel discovered that the location could be spoofed to appear like a secured page. CVE-2010-2753 "regenrecht" discovered that incorrect memory handling in XUL parsing could lead to the execution of arbitrary code. CVE-2010-2754 Soroush Dalili discovered an information leak in script processing. For the stable distribution (lenny), these problems have been fixed in version 1.9.0.19-3. For the unstable distribution (sid), these problems have been fixed in version 1.9.1.11-1. For the experimental distribution, these problems have been fixed in version 1.9.2.7-1. We recommend that you upgrade your xulrunner packages. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 5.0 alias lenny - -------------------------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.19-3.diff.gz Size/MD5 checksum: 149955 e6ec4540373a8dfbea5c1e63f5b628b2 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.19-3.dsc Size/MD5 checksum: 1755 59f9033377f2450ad114d9ee4367f9c7 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.19.orig.tar.gz Size/MD5 checksum: 44174623 83667df1e46399960593fdd8832e958e Architecture independent packages: http://security.debian.org/pool/updates/main/x/xulrunner/libmozillainterfaces-java_1.9.0.19-3_all.deb Size/MD5 checksum: 1466246 a3b5c8b34df7e2077a5e3c5c0d911b85 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_alpha.deb Size/MD5 checksum: 165496 ad7c134eeadc1a2aa751c289052d32f1 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_alpha.deb Size/MD5 checksum: 433152 57f7a88c05eece5c0ea17517646267bb http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_alpha.deb Size/MD5 checksum: 72550 b581302383396b57f7e07aa4564245b3 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_alpha.deb Size/MD5 checksum: 51155444 37595efd28303ec3a88d294b58c1e7aa http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_alpha.deb Size/MD5 checksum: 9487312 452f2c3b26bb249711720ade76e77c3f http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_alpha.deb Size/MD5 checksum: 223422 9ce6e6f35412321405c27618a3550763 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_alpha.deb Size/MD5 checksum: 113478 f4946488381af317acb3bd27da3e372e http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_alpha.deb Size/MD5 checksum: 940250 abb2d020d4cce2e5547d17dd94323cee http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_alpha.deb Size/MD5 checksum: 3357434 a26b339fee481f1ae5494ee0983e3e75 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_amd64.deb Size/MD5 checksum: 50381710 4e6df9133e326ca7fe1d91adab87609b http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_amd64.deb Size/MD5 checksum: 3291324 01a75923a6b796c2e1f3c02e4584072f http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_amd64.deb Size/MD5 checksum: 152266 0a9e05d5e36920cf9cb6c9e39357679b http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_amd64.deb Size/MD5 checksum: 7735106 eedecb0183cd911bf7416be5f61cf88e http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_amd64.deb Size/MD5 checksum: 374604 7a71d4ce527727f43225fc1cdc6b3915 http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_amd64.deb Size/MD5 checksum: 70226 f8860e988f030333c59f893582e17da0 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_amd64.deb Size/MD5 checksum: 890738 0db2e5b458ae1495dce575688a27ef2a http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_amd64.deb Size/MD5 checksum: 223326 1d128ae917c5dab4e977ffb018cb704c http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_amd64.deb Size/MD5 checksum: 101830 2bb9a62d6454d0b7ef6da98cc07b4013 arm architecture (ARM) http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_arm.deb Size/MD5 checksum: 140950 d9044d5f823661f4a1ef11c47971d6e2 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_arm.deb Size/MD5 checksum: 3584768 6ff8221347684a334d6f358d2c8f2dcc http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_arm.deb Size/MD5 checksum: 6802070 e489c87976c243d040f568a8e04a7466 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_arm.deb Size/MD5 checksum: 351056 dd61fc5b425e296ef00120b4cfbc5604 http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_arm.deb Size/MD5 checksum: 68552 819703fc0550ee6473572ea3655ab1f5 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_arm.deb Size/MD5 checksum: 84224 f3915220a86a6a31e48b845d2af7f249 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_arm.deb Size/MD5 checksum: 222376 cb0563f3e5220ceb6f42b8e6471eb883 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_arm.deb Size/MD5 checksum: 49349776 4037a4ab7eeb964c24c95fbb905edbe6 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_arm.deb Size/MD5 checksum: 815334 c055e242c82b7643c67712602e4f3215 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_armel.deb Size/MD5 checksum: 822978 f8609edb961b6c71732c17575393644a http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_armel.deb Size/MD5 checksum: 6962470 fc143ac75279405ef99a3e045439adeb http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_armel.deb Size/MD5 checksum: 3583846 db81fc2e4c8a30fbaf0b176f6d7e77a5 http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_armel.deb Size/MD5 checksum: 142446 016a6aa2efa9e49788c97bc925d90bbb http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_armel.deb Size/MD5 checksum: 353294 65f40d8a434c6b430685ef1a54246888 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_armel.deb Size/MD5 checksum: 50182030 97009b62c3d65b5e715f363d7a5a2e0c http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_armel.deb Size/MD5 checksum: 223380 30fd707dea85e43894c84036115920a3 http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_armel.deb Size/MD5 checksum: 70694 e5892c32e9850d86138ebf15ad317b63 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_armel.deb Size/MD5 checksum: 84758 a94402fed374f82a1ffeb338cb2a4cbb hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_hppa.deb Size/MD5 checksum: 223614 ea284c98cc97b10b879d6174b81cb486 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_hppa.deb Size/MD5 checksum: 899460 290c89b8835d773b8fd240f5610dc63c http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_hppa.deb Size/MD5 checksum: 72280 1d32724f444212696e28d15dc22386af http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_hppa.deb Size/MD5 checksum: 413386 e78a2aabb581f3f7f8da9cb531d6a883 http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_hppa.deb Size/MD5 checksum: 158762 89855347fdf8833df8fd643cfd6a2f10 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_hppa.deb Size/MD5 checksum: 51267722 b51b03ef591a26a4bb72fb0c58e610c0 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_hppa.deb Size/MD5 checksum: 3632562 2d9a207f01319a7bd8f3eb72b3762c77 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_hppa.deb Size/MD5 checksum: 9523510 0f38b76b0074881d4b12823eedc40846 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_hppa.deb Size/MD5 checksum: 106998 32d701f55bd4cc6e0f7160c3b5db43aa i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_i386.deb Size/MD5 checksum: 49553140 cd9fb750075df895e2ad46a8fe4c8bdf http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_i386.deb Size/MD5 checksum: 852228 f04ee6f2c26e9bda77477d64a13f3c53 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_i386.deb Size/MD5 checksum: 79554 e69019a20fc3e8750faf73961cae8a38 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_i386.deb Size/MD5 checksum: 224454 c7e441828615fa66d9907b6407a2b1ad http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_i386.deb Size/MD5 checksum: 351828 85e4711445491850841c2f05102f2bd2 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_i386.deb Size/MD5 checksum: 6609818 b99e5d5f75686adcea1c3570fb82ead5 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_i386.deb Size/MD5 checksum: 3573826 2869c274453928b8b110d8aee7dcba96 http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_i386.deb Size/MD5 checksum: 142966 847a37421b7980378c81c5e818c2df3d http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_i386.deb Size/MD5 checksum: 68968 1eee7343caee6a8a23a141bf6b653fa4 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_ia64.deb Size/MD5 checksum: 224078 a9dc6949ac6ef39884d1cb58929e20fc http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_ia64.deb Size/MD5 checksum: 3693822 602f37b927bc425803730a66d17e8bec http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_ia64.deb Size/MD5 checksum: 542370 6015bef0d96154f73c32b2031c8bbf70 http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_ia64.deb Size/MD5 checksum: 77166 1a94ec379b6e210cf35c1116939fc5f7 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_ia64.deb Size/MD5 checksum: 813100 d0cdc640bf4a68973942cf563b7f7d7b http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_ia64.deb Size/MD5 checksum: 181192 54ef9505c0b0a0b62539dc3d983a8f83 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_ia64.deb Size/MD5 checksum: 11340432 b833d183a5337231c512aba60e733213 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_ia64.deb Size/MD5 checksum: 49734538 21b8086eb33e228f4a3800307a721558 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_ia64.deb Size/MD5 checksum: 121688 1e8f51c8c5d1097d5c0e4b8fd6743ec7 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_mips.deb Size/MD5 checksum: 3611102 8f2980b314f14ff7cf1c244ed11ee638 http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_mips.deb Size/MD5 checksum: 145574 f38aa4d16323e517d075d1de833a7a35 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_mips.deb Size/MD5 checksum: 380888 73bf50fdf8fd49a2251f3c13db9e0a2c http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_mips.deb Size/MD5 checksum: 7677088 d034f72357eb3276850bea226dfc3489 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_mips.deb Size/MD5 checksum: 96932 9c55e0f731b1a507e77abb54ea7c2b08 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_mips.deb Size/MD5 checksum: 223126 cc6d3e47d51d4a15cd05ef6af47560c2 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_mips.deb Size/MD5 checksum: 51902590 b9cafda15eba1ae28b5b054bd82e9d62 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_mips.deb Size/MD5 checksum: 919306 764f458b99647036fbdb1b36768e9b99 http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_mips.deb Size/MD5 checksum: 70412 c674d096e73e7f353733e502bbc9cd05 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_mipsel.deb Size/MD5 checksum: 378984 c66e5ff8815e2386755ece9c9a34b820 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_mipsel.deb Size/MD5 checksum: 50034074 88479753fa54a417df183b78d0bb6ed1 http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_mipsel.deb Size/MD5 checksum: 145324 a801aeefc7fbf555ab407eaeb4c35295 http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_mipsel.deb Size/MD5 checksum: 70170 3145be02d89d6e205de5d89b269b9d8d http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_mipsel.deb Size/MD5 checksum: 3311114 4dac1eff7f53b49976d984606e76afe6 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_mipsel.deb Size/MD5 checksum: 900836 6727b545324904a39f31261db59f516b http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_mipsel.deb Size/MD5 checksum: 97046 2953be8b2d4df3994abd68d6f95de215 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_mipsel.deb Size/MD5 checksum: 7384772 6666f68f98fa2cc81d9e3106c958360b http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_mipsel.deb Size/MD5 checksum: 223416 a3ad25d92dc8f8e09352bc1fbce07989 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_powerpc.deb Size/MD5 checksum: 95068 18f76fe7d470194c6320df8b42e7b09b http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_powerpc.deb Size/MD5 checksum: 888120 b426372622e1ac0164db3f25589a5447 http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_powerpc.deb Size/MD5 checksum: 152544 e3b9205b45b66a3fcf4937c44897a7d8 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_powerpc.deb Size/MD5 checksum: 3285670 a63c4ce33c3f482584b32cfe50488700 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_powerpc.deb Size/MD5 checksum: 7287440 f9d042196ccedd4dfb4da6d3e45ca2b1 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_powerpc.deb Size/MD5 checksum: 51458688 a669258d296192b6bd48b68006f9b618 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_powerpc.deb Size/MD5 checksum: 223412 b900b19a182c059590bfcdb9495851ef http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_powerpc.deb Size/MD5 checksum: 73306 94fdad8b176e63c0c791d19a026ce4b0 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_powerpc.deb Size/MD5 checksum: 362778 79f1ea4633cf0147da60871533750312 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_s390.deb Size/MD5 checksum: 156410 6e986f5714d7052295a32253daea02a9 http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_s390.deb Size/MD5 checksum: 73182 f3b9b343586f554ac37e5c7c8970a28a http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_s390.deb Size/MD5 checksum: 407006 5919961e64253609b9eacc6a31a19b87 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_s390.deb Size/MD5 checksum: 8401766 a23f6d0b7ac0b83997635feff3977ac2 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_s390.deb Size/MD5 checksum: 223402 f08c12d85314436f6331b75e2e18b1c7 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_s390.deb Size/MD5 checksum: 909824 8c8c3aa62be4c19e97351562dcbe1694 http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_s390.deb Size/MD5 checksum: 3308768 50226e505e97362404ffbe3e770775fe http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_s390.deb Size/MD5 checksum: 105828 1e5fc5d7be3c5ab803dd71e8391c06bb http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_s390.deb Size/MD5 checksum: 51242096 ebae3e5b1eb3fd2d9470cbe117b8ced9 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_sparc.deb Size/MD5 checksum: 49406432 caf251c788fe4f76679f600bd1d7b1c0 http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_sparc.deb Size/MD5 checksum: 70192 33434a3b887ac076d88c0a4e425b3c29 http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_sparc.deb Size/MD5 checksum: 144136 359a3cac1ee340f79eb9a53ac65f62ed http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_sparc.deb Size/MD5 checksum: 7181582 4b0f8aaf9a51e7c76073afbb7ea33c6e http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_sparc.deb Size/MD5 checksum: 3583844 11cb9b988b9eac3564f11ed310a8d77e http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_sparc.deb Size/MD5 checksum: 84544 0646f157f384a6a1ffcc3052035d1789 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_sparc.deb Size/MD5 checksum: 350470 1c643effc57e45c6afc964f2284cda7e http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_sparc.deb Size/MD5 checksum: 223260 77281a13fcc78aacd93cf479621ccf74 http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_sparc.deb Size/MD5 checksum: 821854 32eba751571daa1dcd4db30e7a3b7b2c These files will probably be moved into the stable distribution on its next update. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . Background ========== AMD64 x86 emulation base libraries provides pre-compiled 32-bit libraries. They are included in this advisory for the sake of completeness. CVE-2010-2249 It was discovered a memory leak in libpng which allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks For the stable distribution (lenny), these problems have been fixed in version 1.2.27-2+lenny4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2010-0014 Synopsis: VMware Workstation, Player, and ACE address several security issues. Issue date: 2010-09-23 Updated on: 2010-09-23 (initial release of advisory) CVE numbers: CVE-2010-3277 CVE-2010-1205 CVE-2010-0205 CVE-2010-2249 CVE-2010-0434 CVE-2010-0425 - ------------------------------------------------------------------------ 1. Summary VMware Workstation and Player address a potential installer security issue and security issues in libpng. VMware ACE Management Server (AMS) for Windows updates Apache httpd. 2. Relevant releases VMware Workstation 7.1.1 and earlier, VMware Player 3.1.1 and earlier, VMware ACE Management Server 2.7.1 and earlier, Note: VMware Server was declared End Of Availability on January 2010, support will be limited to Technical Guidance for the duration of the support term. 3. Problem Description a. VMware Workstation and Player installer security issue The Workstation 7.x and Player 3.x installers will load an index.htm file located in the current working directory on which Workstation 7.x or Player 3.x is being installed. This may allow an attacker to display a malicious file if they manage to get their file onto the system prior to installation. The issue can only be exploited at the time that Workstation 7.x or Player 3.x is being installed. Installed versions of Workstation and Player are not affected. The security issue is no longer present in the installer of the new versions of Workstation 7.x and Player 3.x (see table below for the version numbers). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-3277 to this issue. VMware would like to thank Alexander Trofimov and Marc Esher for independently reporting this issue to VMware. The following table lists what action remediates the vulnerability (column 4) if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 7.x any 7.1.2 build 301548 or later * Workstation 6.5.x any not affected Player 3.x any 3.1.2 build 301548 or later * Player 2.5.x any not affected AMS any any not affected Server any any not affected Fusion any Mac OS/X not affected ESXi any ESXi not affected ESX any ESX not affected * Note: This only affects the installer, if you have a version of Workstation or Player installed you are not vulnerable. Third party libpng updated to version 1.2.44 A buffer overflow condition in libpng is addressed that could potentially lead to code execution with the privileges of the application using libpng. Two potential denial of service issues are also addressed in the update. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-1205, CVE-2010-0205, CVE-2010-2249 to these issues. The following table lists what action remediates the vulnerability (column 4) if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 7.1.x any 7.1.2 build 301548 or later Workstation 6.5.x any affected, patch pending Player 3.1.x any 3.1.2 build 301548 or later Player 2.5.x any affected, patch pending AMS any any not affected Server any any affected, no patch planned Fusion any Mac OS/X not affected ESXi any ESXi not affected ESX any ESX not affected c. VMware ACE Management Server (AMS) for Windows updates Apache httpd version 2.2.15. A function in Apache HTTP Server when multithreaded MPM is used does not properly handle headers in subrequests in certain circumstances which may allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request. The Apache mod_isapi module can be forced to unload a specific library before the processing of a request is complete, resulting in memory corruption. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-0434 and CVE-2010-0425 to the issues addressed in this update. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation any any not affected Player any any not affected AMS any Windows 2.7.2 build 301548 or later AMS any Linux affected, patch pending * Server any any not affected Fusion any Mac OS/X not affected ESXi any ESXi not affected ESX any ESX not affected * Note CVE-2010-0425 is not applicable to AMS running on Linux 4. Solution Please review the patch/release notes for your product and version and verify the md5sum and/or the sha1sum of your downloaded file. VMware Workstation 7.1.2 ------------------------ http://www.vmware.com/download/ws/ Release notes: http://downloads.vmware.com/support/ws71/doc/releasenotes_ws712.html Workstation for Windows 32-bit and 64-bit with VMware Tools md5sum: 2e9715ec297dc3ca904ad2707d3e2614 sha1sum: 55b2b99f67c3dacd402fb9880999086efd264e7a Workstation for Windows 32-bit and 64-bit without VMware Tools md5sum: 066929f59aef46f11f4d9fd6c6b36e4d sha1sum: def776a28ee1a21b1ad26e836ae868551fff6fc3 VMware Player 3.1.2 ------------------- http://www.vmware.com/download/player/ Release notes: http://downloads.vmware.com/support/player31/doc/releasenotes_player312.html VMware Player for Windows 32-bit and 64-bit md5sum: 3f289cb33af5e425c92d8512fb22a7ba sha1sum: bf67240c1f410ebeb8dcb4f6d7371334bf9a6b70 VMware Player for Linux 32-bit md5sum: 11e3e3e8753e1d9abbbb92c4e3c1dfe8 sha1sum: dd1dbcdb1f4654eefc11472b68934dcb69842749 VMware Player for Linux 64-bit md5sum: 2ab08e0d4050719845a64d334ca15bb1 sha1sum: f024ad84ec831fce8667dfa9601851da5d9fa59c VMware ACE Management Server 2.7.2 ---------------------------------- http://downloads.vmware.com/d/info/desktop_downloads/vmware_ace/2_7 Release notes: http://downloads.vmware.com/support/ace27/doc/releasenotes_ace272.html ACE Management Server for Windows md5sum: 02f0072b8e48a98ed914b633f070d550 sha1sum: 94a68eac4a328d21a741879b9d063227c0dc1ce4 5. References CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3277 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0425 - ------------------------------------------------------------------------ 6. Change log 2010-09-23 VMSA-2010-0014 Initial security advisory after release of Workstation 7.1.2, Player 3.1.2 and ACE Management Server 2.7.2 on 2010-09-23 - ----------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * full-disclosure at lists.grok.org.uk E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Center http://www.vmware.com/security VMware Security Advisories http://www.vmware.com/security/advisoiries VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2010 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) iEYEARECAAYFAkycSrQACgkQS2KysvBH1xmT9wCfbBUS4GYrJohz+QMLYcoiFmSh eTgAoIAmx+ilbe2myj02daLjFrVQfQII =5jlh -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201412-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Multiple packages, Multiple vulnerabilities fixed in 2010 Date: December 11, 2014 Bugs: #159556, #208464, #253822, #259968, #298067, #300375, #300943, #302478, #307525, #307633, #315235, #316697, #319719, #320961, #322457, #325507, #326759, #326953, #329125, #329939, #331421, #332527, #333661 ID: 201412-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== This GLSA contains notification of vulnerabilities found in several Gentoo packages which have been fixed prior to January 1, 2011. Please see the package list and CVE identifiers below for more information. Background ========== For more information on the packages listed in this GLSA, please see their homepage referenced in the ebuild. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-util/insight < 6.7.1-r1 >= 6.7.1-r1 2 dev-perl/perl-tk < 804.028-r2 >= 804.028-r2 3 dev-util/sourcenav < 5.1.4 >= 5.1.4 4 dev-lang/tk < 8.4.18-r1 >= 8.4.18-r1 5 sys-block/partimage < 0.6.8 >= 0.6.8 6 app-antivirus/bitdefender-console <= 7.1 Vulnerable! 7 net-mail/mlmmj < 1.2.17.1 >= 1.2.17.1 8 sys-apps/acl < 2.2.49 >= 2.2.49 9 x11-apps/xinit < 1.2.0-r4 >= 1.2.0-r4 10 app-arch/gzip < 1.4 >= 1.4 11 app-arch/ncompress < 4.2.4.3 >= 4.2.4.3 12 dev-libs/liblzw < 0.2 >= 0.2 13 media-gfx/splashutils < 1.5.4.3-r3 >= 1.5.4.3-r3 14 sys-devel/m4 < 1.4.14-r1 >= 1.4.14-r1 15 kde-base/kdm < 4.3.5-r1 >= 4.3.5-r1 16 x11-libs/gtk+ < 2.18.7 >= 2.18.7 17 kde-base/kget < 4.3.5-r1 >= 4.3.5-r1 18 app-text/dvipng < 1.13 >= 1.13 19 app-misc/beanstalkd < 1.4.6 >= 1.4.6 20 sys-apps/pmount < 0.9.23 >= 0.9.23 21 sys-auth/pam_krb5 < 4.3 >= 4.3 22 app-text/gv < 3.7.1 >= 3.7.1 23 net-ftp/lftp < 4.0.6 >= 4.0.6 24 www-client/uzbl < 2010.08.05 >= 2010.08.05 25 x11-misc/slim < 1.3.2 >= 1.3.2 26 net-misc/iputils < 20100418 >= 20100418 27 media-tv/dvbstreamer < 1.1-r1 >= 1.1-r1 ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers. ------------------------------------------------------------------- 27 affected packages Description =========== Vulnerabilities have been discovered in the packages listed below. Please review the CVE identifiers in the Reference section for details. * Insight * Perl Tk Module * Source-Navigator * Tk * Partimage * Mlmmj * acl * Xinit * gzip * ncompress * liblzw * splashutils * GNU M4 * KDE Display Manager * GTK+ * KGet * dvipng * Beanstalk * Policy Mount * pam_krb5 * GNU gv * LFTP * Uzbl * Slim * Bitdefender Console * iputils * DVBStreamer Impact ====== A context-dependent attacker may be able to gain escalated privileges, execute arbitrary code, cause Denial of Service, obtain sensitive information, or otherwise bypass security restrictions. Workaround ========== There are no known workarounds at this time. Resolution ========== All Insight users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-util/insight-6.7.1-r1" All Perl Tk Module users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-perl/perl-tk-804.028-r2" All Source-Navigator users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-util/sourcenav-5.1.4" All Tk users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/tk-8.4.18-r1" All Partimage users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=sys-block/partimage-0.6.8" All Mlmmj users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-mail/mlmmj-1.2.17.1" All acl users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/acl-2.2.49" All Xinit users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=x11-apps/xinit-1.2.0-r4" All gzip users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-arch/gzip-1.4" All ncompress users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-arch/ncompress-4.2.4.3" All liblzw users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/liblzw-0.2" All splashutils users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=media-gfx/splashutils-1.5.4.3-r3" All GNU M4 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=sys-devel/m4-1.4.14-r1" All KDE Display Manager users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=kde-base/kdm-4.3.5-r1" All GTK+ users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=x11-libs/gtk+-2.18.7" All KGet 4.3 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=kde-base/kget-4.3.5-r1" All dvipng users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-text/dvipng-1.13" All Beanstalk users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-misc/beanstalkd-1.4.6" All Policy Mount users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/pmount-0.9.23" All pam_krb5 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=sys-auth/pam_krb5-4.3" All GNU gv users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-text/gv-3.7.1" All LFTP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-ftp/lftp-4.0.6" All Uzbl users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/uzbl-2010.08.05" All Slim users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=x11-misc/slim-1.3.2" All iputils users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/iputils-20100418" All DVBStreamer users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-tv/dvbstreamer-1.1-r1" Gentoo has discontinued support for Bitdefender Console. We recommend that users unmerge Bitdefender Console: # emerge --unmerge "app-antivirus/bitdefender-console" NOTE: This is a legacy GLSA. Updates for all affected architectures have been available since 2011. It is likely that your system is already no longer affected by these issues. References ========== [ 1 ] CVE-2006-3005 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-3005 [ 2 ] CVE-2007-2741 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2741 [ 3 ] CVE-2008-0553 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0553 [ 4 ] CVE-2008-1382 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1382 [ 5 ] CVE-2008-5907 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5907 [ 6 ] CVE-2008-6218 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6218 [ 7 ] CVE-2008-6661 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6661 [ 8 ] CVE-2009-0040 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0040 [ 9 ] CVE-2009-0360 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0360 [ 10 ] CVE-2009-0361 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0361 [ 11 ] CVE-2009-0946 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0946 [ 12 ] CVE-2009-2042 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2042 [ 13 ] CVE-2009-2624 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2624 [ 14 ] CVE-2009-3736 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3736 [ 15 ] CVE-2009-4029 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4029 [ 16 ] CVE-2009-4411 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4411 [ 17 ] CVE-2009-4896 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4896 [ 18 ] CVE-2010-0001 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0001 [ 19 ] CVE-2010-0436 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0436 [ 20 ] CVE-2010-0732 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0732 [ 21 ] CVE-2010-0829 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0829 [ 22 ] CVE-2010-1000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1000 [ 23 ] CVE-2010-1205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205 [ 24 ] CVE-2010-1511 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1511 [ 25 ] CVE-2010-2056 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2056 [ 26 ] CVE-2010-2060 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2060 [ 27 ] CVE-2010-2192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2192 [ 28 ] CVE-2010-2251 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2251 [ 29 ] CVE-2010-2529 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2529 [ 30 ] CVE-2010-2809 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2809 [ 31 ] CVE-2010-2945 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2945 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201412-08.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . =========================================================== Ubuntu Security Notice USN-930-4 July 23, 2010 firefox-3.0, firefox-3.5, xulrunner-1.9.2 vulnerabilities CVE-2008-5913, CVE-2010-0654, CVE-2010-1121, CVE-2010-1125, CVE-2010-1196, CVE-2010-1197, CVE-2010-1198, CVE-2010-1199, CVE-2010-1200, CVE-2010-1201, CVE-2010-1202, CVE-2010-1203, CVE-2010-1205, CVE-2010-1206, CVE-2010-1207, CVE-2010-1208, CVE-2010-1209, CVE-2010-1210, CVE-2010-1211, CVE-2010-1212, CVE-2010-1213, CVE-2010-1214, CVE-2010-1215, CVE-2010-2751, CVE-2010-2752, CVE-2010-2753, CVE-2010-2754 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 9.04 Ubuntu 9.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 9.04: abrowser 3.6.7+build2+nobinonly-0ubuntu0.9.04.1 firefox-3.0 3.6.7+build2+nobinonly-0ubuntu0.9.04.1 xulrunner-1.9.2 1.9.2.7+build2+nobinonly-0ubuntu0.9.04.2 Ubuntu 9.10: firefox-3.5 3.6.7+build2+nobinonly-0ubuntu0.9.10.1 xulrunner-1.9.2 1.9.2.7+build2+nobinonly-0ubuntu0.9.10.2 Mozilla has changed the support model for Firefox and they no longer support version 3.0 of the browser and will only support version 3.5 of the browser for a while longer. As a result, Ubuntu is providing an upgrade to Firefox 3.6 for Ubuntu 9.04 and 9.10 users, which is the most current stable release of Firefox supported by Mozilla. When upgrading, users should be aware of the following: - Firefox 3.6 does not support version 5 of the Sun Java plugin. Please use icedtea6-plugin or sun-java6-plugin instead. - After upgrading to Firefox 3.6.6, users may be prompted to upgrade 3rd party Add-Ons. In some cases, an Add-On will not be compatible with Firefox 3.6.6 and have no update available. In these cases, Firefox will notify the user that it is disabling the Add-On. - Font configuration cannot be controlled via Gnome settings. This is a known issue being tracked in https://launchpad.net/bugs/559149 and will be fixed in a later update. - helix-player is not currently supported in Firefox 3.6. This is a known issue and may be fixed in a future update. - Plugins using external helpers (such as Totem) may not close when using the Epiphany browser. This is a known issue being tracked in https://launchpad.net/bugs/599796 and will be fixed in a later update. This issue only affects Ubuntu 9.04. - The OpenJDK java plugin is not available in Ubuntu 9.04 on Sparc hardware. This will be fixed in a future update. After a standard system upgrade you need to restart Firefox and any applications that use Xulrunner to effect the necessary changes. Details follow: USN-930-1 fixed vulnerabilities in Firefox and Xulrunner. This update provides the corresponding updates for Ubuntu 9.04 and 9.10, along with additional updates affecting Firefox 3.6.6. Several flaws were discovered in the browser engine of Firefox. If a user were tricked into viewing a malicious site, a remote attacker could use this to crash the browser or possibly run arbitrary code as the user invoking the program. (CVE-2010-1208, CVE-2010-1209, CVE-2010-1211, CVE-2010-1212) An integer overflow was discovered in how Firefox processed plugin parameters. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. (CVE-2010-1214) A flaw was discovered in the Firefox JavaScript engine. If a user were tricked into viewing a malicious site, a remote attacker code execute arbitrary JavaScript with chrome privileges. (CVE-2010-1215) An integer overflow was discovered in how Firefox processed CSS values. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. (CVE-2010-2752) An integer overflow was discovered in how Firefox interpreted the XUL <tree> element. If a user were tricked into viewing a malicious site, a remote attacker could use this to crash the browser or possibly run arbitrary code as the user invoking the program. (CVE-2010-2753) Aki Helin discovered that libpng did not properly handle certain malformed PNG images. If a user were tricked into opening a crafted PNG file, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2010-1205) Yosuke Hasegawa and Vladimir Vukicevic discovered that the same-origin check in Firefox could be bypassed by utilizing the importScripts Web Worker method. If a user were tricked into viewing a malicious website, an attacker could exploit this to read data from other domains. (CVE-2010-1213, CVE-2010-1207) O. Andersen that Firefox did not properly map undefined positions within certain 8 bit encodings. An attacker could utilize this to perform cross-site scripting attacks. (CVE-2010-1210) Michal Zalewski discovered flaws in how Firefox processed the HTTP 204 (no content) code. An attacker could exploit this to spoof the location bar, such as in a phishing attack. (CVE-2010-1206) Jordi Chancel discovered that Firefox did not properly handle when a server responds to an HTTPS request with plaintext and then processes JavaScript history events. An attacker could exploit this to spoof the location bar, such as in a phishing attack. (CVE-2010-2751) Chris Evans discovered that Firefox did not properly process improper CSS selectors. If a user were tricked into viewing a malicious website, an attacker could exploit this to read data from other domains. (CVE-2010-0654) Soroush Dalili discovered that Firefox did not properly handle script error output. An attacker could use this to access URL parameters from other domains. (CVE-2010-2754) Original advisory details: If was discovered that Firefox could be made to access freed memory. If a user were tricked into viewing a malicious site, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2010-1121) Several flaws were discovered in the browser engine of Firefox. If a user were tricked into viewing a malicious site, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2010-1200, CVE-2010-1201, CVE-2010-1202, CVE-2010-1203) A flaw was discovered in the way plugin instances interacted. An attacker could potentially exploit this and use one plugin to access freed memory from a second plugin to execute arbitrary code with the privileges of the user invoking the program. (CVE-2010-1198) An integer overflow was discovered in Firefox. If a user were tricked into viewing a malicious site, an attacker could overflow a buffer and cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2010-1196) Martin Barbella discovered an integer overflow in an XSLT node sorting routine. An attacker could exploit this to overflow a buffer and cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2010-1199) Michal Zalewski discovered that the focus behavior of Firefox could be subverted. If a user were tricked into viewing a malicious site, a remote attacker could use this to capture keystrokes. (CVE-2010-1125) Ilja van Sprundel discovered that the 'Content-Disposition: attachment' HTTP header was ignored when 'Content-Type: multipart' was also present. Under certain circumstances, this could potentially lead to cross-site scripting attacks. (CVE-2010-1197) Amit Klein discovered that Firefox did not seed its random number generator often enough. An attacker could exploit this to identify and track users across different web sites. (CVE-2008-5913) Updated packages for Ubuntu 9.04: Source archives: http://security.ubuntu.com/ubuntu/pool/ Size/MD5: 67119 0d7f276c870914e97be8016c470c0acc http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.6.7+build2+nobinonly-0ubuntu0.9.04.1.diff.gz Size/MD5: 144826 b71440bbda1a9a19aa3434ad6a00c486 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.6.7+build2+nobinonly-0ubuntu0.9.04.1.dsc Size/MD5: 2552 0e63965d7e1ba8d0c024793dae18a651 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.6.7+build2+nobinonly.orig.tar.gz Size/MD5: 49883446 e3bdceebdf5bcc94f0f901ce8744a6df Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/abrowser-3.0-branding_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72226 e41f4ba0e1ee2812d09f178ce649be97 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/abrowser_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72392 fb339d706ee66252e70e96d62c33b305 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-branding_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72228 d3b045b5cafba2c50b75eb3c5c0a590a http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72218 6a5c7d950490e1b8265bac1bc15abeb1 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72240 e1de71fa375ab4896e29dafcca783dba http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72574 f4cb1ee7572ed2ab316313ecbb3ed84f http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-granparadiso-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72236 2dece76f652e27494e7487f4e68f646a http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-trunk-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72222 c4aebcd1ce9c8b621b7297b7088d2ef4 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72256 3caf1296c3c06121157b6614170e1083 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72226 d1f70077a0e3ed2fee170c02bfb03e7c http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-libthai_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72212 133df734e76a4477af91dec984aa2694 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72240 6efcfef2ed5164204686ce075d23332d http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb Size/MD5: 72210 07339b8304124d7afbacf53943f0500f amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/ Size/MD5: 7798876 759f27c1d6635a6d04b07c9a73f54f3c http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_amd64.deb Size/MD5: 72330 b9692de7b7947e32c1f678a9d554effa http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_amd64.deb Size/MD5: 72764 706e5682afbbc54334bb823fe92e9d0c http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_amd64.deb Size/MD5: 12504700 0c81c0201b8a6b3aef72d2213d9d38b2 http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.04.2_amd64.deb Size/MD5: 29308 4174c5e062a927f5f4fd445bc3f2b7ce i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/ Size/MD5: 9913748 ad706c2a0c670ea9bc6de7109211c8e4 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_i386.deb Size/MD5: 72340 b19f20096548fc8981367cd9d431379f http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_i386.deb Size/MD5: 72762 faaacee4aa7e2fd7fa961a88c4b86d0f http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_i386.deb Size/MD5: 11192572 5adae55773b0ca8e438c7252046f705b http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.04.2_i386.deb Size/MD5: 29308 ca6a787a65220583746b55366ae9ac44 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/ Size/MD5: 4830218 0d3caf5b20aba2975f9f7e423c6b3b69 http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_lpia.deb Size/MD5: 72332 099275f779e538dc54e913593084b7bc http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_lpia.deb Size/MD5: 72762 ee7361261892014edfc1a69365672c17 http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_lpia.deb Size/MD5: 10687418 2a010333c02ed1112cbef0544cf73cf1 http://ports.ubuntu.com/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.04.2_lpia.deb Size/MD5: 29308 5fb3d21190e1e8012b08b694c4b9239c powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/ Size/MD5: 4812772 94b728d013dee6371b8cc4ebef11430c http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_powerpc.deb Size/MD5: 72340 6318359d26cfa32d4e1eeda6c8916aa4 http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_powerpc.deb Size/MD5: 72770 e5449bcbe442fa1385d7b2ecbc8c1831 http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_powerpc.deb Size/MD5: 11583662 a73467d63e46af2f21b2e46fa0f29797 http://ports.ubuntu.com/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.04.2_powerpc.deb Size/MD5: 29310 69a2c47902bb366a50c2bb3fa9053131 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/ Size/MD5: 75512 a49a96a5d589e39a77720fe70706da03 http://ports.ubuntu.com/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.04.2_sparc.deb Size/MD5: 29312 e66a94b78d1d6476b05736a82c4ed49c Updated packages for Ubuntu 9.10: Source archives: http://security.ubuntu.com/ubuntu/pool/ Size/MD5: 2621 74297592edce6f55313193967daaebeb http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5_3.6.7+build2+nobinonly-0ubuntu0.9.10.1.diff.gz Size/MD5: 155727 0e58cb5f9e5293c40564e944e50437a6 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5_3.6.7+build2+nobinonly-0ubuntu0.9.10.1.dsc Size/MD5: 2758 e6647365f000313a96f9a72b4dc8022f http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5_3.6.7+build2+nobinonly.orig.tar.gz Size/MD5: 49883446 e3bdceebdf5bcc94f0f901ce8744a6df Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/ Size/MD5: 29714 b4ee604ee0d4dbdc448a74f6f746528c http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/abrowser-3.5-branding_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75716 8ec52b07f2b60dbb381909a6b7e5f039 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/abrowser_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75964 69b4baf1c2b4ce75ced092dbdb44266b http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.0-dev_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75700 22bd34473ba1abe7501b247f7d8980b5 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.1-dbg_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75702 3dc765e62e9300dd5a57d512be2e3c3b http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.1-dev_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75700 1ae9b7c023259e8f9fa994c24efeb07f http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5-branding_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75706 f4a1b34f657927ca5eaf15cf9976e336 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5-dbg_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75704 80434fb6b98bd5ddafbd0d9d472b9416 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5-dev_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75698 1e6cffa413775771f086d3238ed84a6b http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75722 b3dea417d76e06235b1f7c267d4871fe http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 76052 9c59d599f01a4af2337515c224164b11 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/abrowser-3.0-branding_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75718 70e6d5d57e356e78500d8558e6ec7f72 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/abrowser-3.0_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 8938 3085a96f8f815fbb01b21dd67d4b423d http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/abrowser-3.1-branding_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75710 45b7c94ece697097b83adb8bc09b5769 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/abrowser-3.1_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 8940 8d60975aeb324b31426a64d0a1485320 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/abrowser-3.5_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 8930 e9c41de371986cf16137aa0a8baa1635 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.0-branding_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75710 191d51d184569650814b7d1e87e808a3 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.0-dom-inspector_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75720 f18da780b4b8e57685667bb94faeac19 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.0-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75726 6bef8a651c1763ca5fdd3140bd7ae915 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.0-venkman_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75714 408c0fa73ac828fa9acae2a7ff02e6f7 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.0_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75692 3c4f3ef8332997b0a72bda0e436ab0fe http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.1-branding_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75708 c3f238accf868508d1d44a3984a0deda http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.1-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75722 41bf0606552717a9988db2bd929b3862 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.1_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75692 e27ae8b4a4875eff55fedd2c3da9499e http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-dom-inspector_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb Size/MD5: 75710 49ada82e615b86ac74f5880b656d8914 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/ Size/MD5: 10675764 276cf6fd80197d8edf64b2c885c5e540 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_amd64.deb Size/MD5: 76196 ec574586607cd1da65dd5ee7c1f17317 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_amd64.deb Size/MD5: 12502768 ef8749c8ba4b15a29631f69baccf6984 http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.10.2_amd64.deb Size/MD5: 29196 766569469e7d1d805a16b659607cb228 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/ Size/MD5: 43286 e1e37c33ecc0918fcd518e5748c767e2 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_i386.deb Size/MD5: 76198 06d415ebee45883afa9de06a4bf00ba2 http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_i386.deb Size/MD5: 11217372 c3ddffd8a035d3be397ffc112c17e0a9 http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.10.2_i386.deb Size/MD5: 29190 c59e1bbc03df75b63c72a956530ecdff lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/ Size/MD5: 4794796 0f04c58b1898ef6ff8c42e9f696cf943 http://ports.ubuntu.com/pool/main/f/firefox-3.5/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_lpia.deb Size/MD5: 76192 ac0e4a03520b896085dbc4b1e524c397 http://ports.ubuntu.com/pool/main/f/firefox-3.5/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_lpia.deb Size/MD5: 10720482 e9459f2ddd0b28adc40e37bc46de87d8 http://ports.ubuntu.com/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.10.2_lpia.deb Size/MD5: 29194 b5c356758ef5adb4468c85577660061a powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/ Size/MD5: 64642040 19a96c0ae2726790da3efb566ac4fdb0 http://ports.ubuntu.com/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.10.2_powerpc.deb Size/MD5: 29200 69d071a75fcd766841f7f428ec9eb806 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/ Size/MD5: 7629538 5042de0cdebf36ad17e6485b966ec94f http://ports.ubuntu.com/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.10.2_sparc.deb Size/MD5: 29194 f154cda4e06288f639db4d6024c26695

Trust: 2.61

sources: NVD: CVE-2010-1205 // CERT/CC: VU#643615 // VULHUB: VHN-43810 // VULMON: CVE-2010-1205 // PACKETSTORM: 92112 // PACKETSTORM: 92064 // PACKETSTORM: 92229 // PACKETSTORM: 129524 // PACKETSTORM: 91973 // PACKETSTORM: 94244 // PACKETSTORM: 129513 // PACKETSTORM: 92111 // PACKETSTORM: 92156

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:ltversion:10.2

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:4.1

Trust: 1.0

vendor:applemodel:iphone osscope:gteversion:2.0

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.2

Trust: 1.0

vendor:vmwaremodel:playerscope:gteversion:2.5

Trust: 1.0

vendor:vmwaremodel:playerscope:ltversion:2.5.5

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:ltversion:2.0.6

Trust: 1.0

vendor:applemodel:safariscope:ltversion:5.0.4

Trust: 1.0

vendor:mozillamodel:firefoxscope:ltversion:3.5.11

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:gteversion:3.0.7

Trust: 1.0

vendor:libpngmodel:libpngscope:gteversion:1.4.0

Trust: 1.0

vendor:libpngmodel:libpngscope:ltversion:1.4.3

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:9.04

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.6.4

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:9.10

Trust: 1.0

vendor:vmwaremodel:workstationscope:gteversion:7.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:gteversion:10.6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:8.04

Trust: 1.0

vendor:mozillamodel:firefoxscope:ltversion:3.6.7

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:ltversion:3.1.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:6.06

Trust: 1.0

vendor:mozillamodel:firefoxscope:gteversion:3.5.12

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:12

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:13

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.1

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:5.0.375.99

Trust: 1.0

vendor:vmwaremodel:playerscope:gteversion:3.1

Trust: 1.0

vendor:vmwaremodel:workstationscope:ltversion:6.5.5

Trust: 1.0

vendor:vmwaremodel:playerscope:ltversion:3.1.2

Trust: 1.0

vendor:vmwaremodel:workstationscope:ltversion:7.1.2

Trust: 1.0

vendor:libpngmodel:libpngscope:ltversion:1.2.44

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:ltversion:3.0.6

Trust: 1.0

vendor:applemodel:mac os x serverscope:ltversion:10.6.4

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 1.0

vendor:vmwaremodel:workstationscope:gteversion:6.5.0

Trust: 1.0

vendor:libpngmodel: - scope: - version: -

Trust: 0.8

vendor:libpngmodel:libpngscope:eqversion:1.2.22

Trust: 0.6

vendor:libpngmodel:libpngscope:eqversion:1.0.47

Trust: 0.6

vendor:libpngmodel:libpngscope:eqversion:1.4.0

Trust: 0.6

sources: CERT/CC: VU#643615 // CNNVD: CNNVD-201006-473 // NVD: CVE-2010-1205

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-1205
value: CRITICAL

Trust: 1.0

CARNEGIE MELLON: VU#643615
value: 12.96

Trust: 0.8

CNNVD: CNNVD-201006-473
value: CRITICAL

Trust: 0.6

VULHUB: VHN-43810
value: HIGH

Trust: 0.1

VULMON: CVE-2010-1205
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-1205
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-43810
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2010-1205
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CERT/CC: VU#643615 // VULHUB: VHN-43810 // VULMON: CVE-2010-1205 // CNNVD: CNNVD-201006-473 // NVD: CVE-2010-1205

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.1

problemtype:CWE-119

Trust: 0.1

sources: VULHUB: VHN-43810 // NVD: CVE-2010-1205

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 92229 // PACKETSTORM: 129524 // CNNVD: CNNVD-201006-473

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201006-473

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-43810 // VULMON: CVE-2010-1205

PATCH

title:libpng Repair measures for memory corruption and denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=126302

Trust: 0.6

title:Red Hat: Critical: seamonkey security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20100546 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: libpng: CVE-2010-1205 and CVE-2010-2249url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=184c5adf52ad398a58919ac7993ba9b9

Trust: 0.1

title:Mozilla: Remote code execution using malformed PNG imageurl:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=d846dfedec9f2e8b79ff9b299c65c005

Trust: 0.1

title:Debian Security Advisories: DSA-2072-1 libpng -- several vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=3e96a347c5dea429ac96a3e5e90fb285

Trust: 0.1

title:Ubuntu Security Notice: libpng vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-960-1

Trust: 0.1

title:Red Hat: Critical: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20100547 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: thunderbird vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-958-1

Trust: 0.1

title:Debian Security Advisories: DSA-2075-1 xulrunner -- several vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=fa5c93137e44116ffb255e585f0961fc

Trust: 0.1

title:Ubuntu Security Notice: firefox, firefox-3.0, xulrunner-1.9.2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-957-1

Trust: 0.1

title:Ubuntu Security Notice: firefox, firefox-3.0, xulrunner-1.9.2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-957-2

Trust: 0.1

title:Ubuntu Security Notice: firefox-3.0, firefox-3.5, xulrunner-1.9.2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-930-4

Trust: 0.1

title:Ubuntu Security Notice: ant, apturl, epiphany-browser, gluezilla, gnome-python-extras, liferea, mozvoikko, openjdk-6, packagekit, ubufox, webfav, yelp updateurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-930-5

Trust: 0.1

title:Exploit Development: Case Studies Windows Unix-likeurl:https://github.com/dyjakan/exploit-development-case-studies

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/sambacha/mirror-radamsa

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/StephenHaruna/RADAMSA

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/benoit-a/radamsa

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/g60ocR/radamsa

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/sunzu94/radamsa-Fuzzer

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/nqwang/radamsa

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/Hwangtaewon/radamsa

Trust: 0.1

sources: VULMON: CVE-2010-1205 // CNNVD: CNNVD-201006-473

EXTERNAL IDS

db:NVDid:CVE-2010-1205

Trust: 2.6

db:VUPENid:ADV-2010-2491

Trust: 1.8

db:VUPENid:ADV-2010-1612

Trust: 1.8

db:VUPENid:ADV-2010-1837

Trust: 1.8

db:VUPENid:ADV-2010-1755

Trust: 1.8

db:VUPENid:ADV-2010-3046

Trust: 1.8

db:VUPENid:ADV-2010-1877

Trust: 1.8

db:VUPENid:ADV-2010-1637

Trust: 1.8

db:VUPENid:ADV-2010-3045

Trust: 1.8

db:VUPENid:ADV-2010-1846

Trust: 1.8

db:SECUNIAid:40472

Trust: 1.8

db:SECUNIAid:41574

Trust: 1.8

db:SECUNIAid:42317

Trust: 1.8

db:SECUNIAid:40547

Trust: 1.8

db:SECUNIAid:42314

Trust: 1.8

db:SECUNIAid:40302

Trust: 1.8

db:SECUNIAid:40336

Trust: 1.8

db:BIDid:41174

Trust: 1.8

db:CERT/CCid:VU#643615

Trust: 0.9

db:CNNVDid:CNNVD-201006-473

Trust: 0.7

db:NSFOCUSid:48909

Trust: 0.6

db:PACKETSTORMid:92011

Trust: 0.2

db:PACKETSTORMid:91973

Trust: 0.2

db:EXPLOIT-DBid:14422

Trust: 0.2

db:SEEBUGid:SSVID-69444

Trust: 0.1

db:PACKETSTORMid:91619

Trust: 0.1

db:VULHUBid:VHN-43810

Trust: 0.1

db:VULMONid:CVE-2010-1205

Trust: 0.1

db:PACKETSTORMid:92112

Trust: 0.1

db:SECUNIAid:40688

Trust: 0.1

db:PACKETSTORMid:92064

Trust: 0.1

db:PACKETSTORMid:92229

Trust: 0.1

db:PACKETSTORMid:129524

Trust: 0.1

db:PACKETSTORMid:94244

Trust: 0.1

db:PACKETSTORMid:129513

Trust: 0.1

db:PACKETSTORMid:92111

Trust: 0.1

db:PACKETSTORMid:92156

Trust: 0.1

sources: CERT/CC: VU#643615 // VULHUB: VHN-43810 // VULMON: CVE-2010-1205 // PACKETSTORM: 92112 // PACKETSTORM: 92064 // PACKETSTORM: 92229 // PACKETSTORM: 129524 // PACKETSTORM: 91973 // PACKETSTORM: 94244 // PACKETSTORM: 129513 // PACKETSTORM: 92111 // PACKETSTORM: 92156 // CNNVD: CNNVD-201006-473 // NVD: CVE-2010-1205

REFERENCES

url:https://bugzilla.redhat.com/show_bug.cgi?id=608238

Trust: 2.6

url:http://www.mozilla.org/security/announce/2010/mfsa2010-41.html

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2010//aug/msg00003.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2010//nov/msg00000.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2010//nov/msg00003.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2011/mar/msg00000.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2011//mar/msg00004.html

Trust: 1.8

url:http://www.securityfocus.com/bid/41174

Trust: 1.8

url:http://blackberry.com/btsc/kb27244

Trust: 1.8

url:http://code.google.com/p/chromium/issues/detail?id=45983

Trust: 1.8

url:http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html

Trust: 1.8

url:http://support.apple.com/kb/ht4312

Trust: 1.8

url:http://support.apple.com/kb/ht4435

Trust: 1.8

url:http://support.apple.com/kb/ht4456

Trust: 1.8

url:http://support.apple.com/kb/ht4457

Trust: 1.8

url:http://support.apple.com/kb/ht4554

Trust: 1.8

url:http://support.apple.com/kb/ht4566

Trust: 1.8

url:http://trac.webkit.org/changeset/61816

Trust: 1.8

url:http://www.libpng.org/pub/png/libpng.html

Trust: 1.8

url:http://www.vmware.com/security/advisories/vmsa-2010-0014.html

Trust: 1.8

url:https://bugs.webkit.org/show_bug.cgi?id=40798

Trust: 1.8

url:https://bugzilla.mozilla.org/show_bug.cgi?id=570451

Trust: 1.8

url:http://www.debian.org/security/2010/dsa-2072

Trust: 1.8

url:http://lists.fedoraproject.org/pipermail/package-announce/2010-july/044283.html

Trust: 1.8

url:http://lists.fedoraproject.org/pipermail/package-announce/2010-july/044397.html

Trust: 1.8

url:http://www.mandriva.com/security/advisories?name=mdvsa-2010:133

Trust: 1.8

url:http://lists.vmware.com/pipermail/security-announce/2010/000105.html

Trust: 1.8

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11851

Trust: 1.8

url:http://secunia.com/advisories/40302

Trust: 1.8

url:http://secunia.com/advisories/40336

Trust: 1.8

url:http://secunia.com/advisories/40472

Trust: 1.8

url:http://secunia.com/advisories/40547

Trust: 1.8

url:http://secunia.com/advisories/41574

Trust: 1.8

url:http://secunia.com/advisories/42314

Trust: 1.8

url:http://secunia.com/advisories/42317

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html

Trust: 1.8

url:http://www.ubuntu.com/usn/usn-960-1

Trust: 1.8

url:http://www.vupen.com/english/advisories/2010/1612

Trust: 1.8

url:http://www.vupen.com/english/advisories/2010/1637

Trust: 1.8

url:http://www.vupen.com/english/advisories/2010/1755

Trust: 1.8

url:http://www.vupen.com/english/advisories/2010/1837

Trust: 1.8

url:http://www.vupen.com/english/advisories/2010/1846

Trust: 1.8

url:http://www.vupen.com/english/advisories/2010/1877

Trust: 1.8

url:http://www.vupen.com/english/advisories/2010/2491

Trust: 1.8

url:http://www.vupen.com/english/advisories/2010/3045

Trust: 1.8

url:http://www.vupen.com/english/advisories/2010/3046

Trust: 1.8

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/59815

Trust: 1.8

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.613061

Trust: 1.7

url:http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commitdiff;h=188eb6b42602bf7d7ae708a21897923b6a83fe7c#patch18

Trust: 1.5

url:http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3ba=commitdiff%3bh=188eb6b42602bf7d7ae708a21897923b6a83fe7c#patch18

Trust: 1.1

url:http://libpng.org/pub/png/libpng.html

Trust: 0.8

url:http://admin.fedoraproject.org/updates/libpng-1.2.44-1.fc13

Trust: 0.8

url:http://admin.fedoraproject.org/updates/libpng-1.2.44-1.fc12

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2010-1205

Trust: 0.8

url:https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerability-has-been-identified-in-bigfix-platform-shipped-with-ibm-license-metric-tool-2/

Trust: 0.6

url:http://www.nsfocus.net/vulndb/48909

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2010-0654

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2010-1208

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2010-1121

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1202

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2008-5913

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1125

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1207

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1196

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1206

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1201

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1198

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1200

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1199

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1203

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1210

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1209

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1197

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-2754

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-2753

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.2

url:http://security.debian.org/

Trust: 0.2

url:http://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1211

Trust: 0.2

url:http://packages.debian.org/<pkg>

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-2741

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2741

Trust: 0.2

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:http://security.gentoo.org/

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1205

Trust: 0.2

url:https://bugs.gentoo.org.

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-2249

Trust: 0.2

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2010&amp;m=slackware-security.613061

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/120.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2010:0546

Trust: 0.1

url:https://packetstormsecurity.com/files/92011/libpng-1.4.2-denial-of-service.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/960-1/

Trust: 0.1

url:https://www.exploit-db.com/exploits/14422/

Trust: 0.1

url:https://www.kb.cert.org/vuls/id/643615

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gnome2-extras_2.19.1-0ubuntu14.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b18-1.8-4ubuntu3~9.10.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser-data_2.26.1-0ubuntu1.9.04.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b18-1.8-4ubuntu3~9.10.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gluezilla/libgluezilla_2.0-1ubuntu1.9.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gnome2-extras_2.19.1-0ubuntu14.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant-gcj_1.7.1-4ubuntu0.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/m/mozvoikko/mozvoikko_0.9.5-1ubuntu2.9.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b18-1.8-4ubuntu3~9.10.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/p/packagekit/packagekit-backend-smart_0.3.14-0ubuntu5.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/gnome-python-extras_2.19.1.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/l/liferea/liferea-dbg_1.4.26-0ubuntu1.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/gnome-python-extras_2.25.3-3ubuntu1.9.10.1.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b18-1.8-4ubuntu3~9.10.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkspell_2.25.3-3ubuntu1.9.10.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant-optional-gcj_1.7.1-0ubuntu2.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gksu2_2.25.3-3ubuntu1.9.10.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gksu2_2.25.3-3ubuntu1.9.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/gnome-python-extras_2.19.1-0ubuntu14.9.04.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/m/mozvoikko/mozvoikko_0.9.5-1ubuntu2.9.04.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-eggtrayicon_2.25.3-3ubuntu1.9.10.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/e/epiphany-browser/epiphany-browser-dbg_2.26.1-0ubuntu1.9.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkmozembed_2.25.3-3ubuntu1.9.10.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/y/yelp/yelp_2.25.1-0ubuntu5.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant_1.7.1.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-source_6b18-1.8-4ubuntu3~9.04.2_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gluezilla/libgluezilla_2.0-1ubuntu1.9.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gdl_2.25.3-3ubuntu1.9.10.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b18-1.8-4ubuntu3~9.10.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b18-1.8-4ubuntu3~9.10.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/ant/ant-optional-gcj_1.7.1-0ubuntu2.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/p/packagekit/mozilla-packagekit_0.3.14-0ubuntu5.9.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b18-1.8-4ubuntu3~9.04.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/libpackagekit-qt11_0.3.14-0ubuntu5.9.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b18-1.8-4ubuntu3~9.10.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b18-1.8-4ubuntu3~9.10.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/liferea/liferea-dbg_1.4.26-0ubuntu1.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/m/mozvoikko/mozvoikko_1.0-1ubuntu3.9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/liferea/liferea_1.4.26-0ubuntu1.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser_2.26.1-0ubuntu1.9.04.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/python-packagekit_0.3.14-0ubuntu5.9.04.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gksu2_2.25.3-3ubuntu1.9.10.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/packagekit_0.3.14.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-lib_6b18-1.8-4ubuntu3~9.04.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/u/ubufox/ubufox_0.9~rc2-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser_2.26.1.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/e/epiphany-browser/epiphany-gecko_2.26.1-0ubuntu1.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webfav/webfav_1.16-0ubuntu1.9.10.1.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b18-1.8-4ubuntu3~9.04.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/p/packagekit/packagekit-backend-smart_0.3.14-0ubuntu5.9.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/m/mozvoikko/mozvoikko_1.0-1ubuntu3.9.10.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/packagekit_0.3.14-0ubuntu5.9.04.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/libpackagekit-glib-dev_0.3.14-0ubuntu5.9.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/ant/ant-gcj_1.7.1-4ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b18-1.8-4ubuntu3~9.10.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/e/epiphany-browser/epiphany-browser-dbg_2.26.1-0ubuntu1.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gksu2_2.25.3-3ubuntu1.9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/u/ubufox/ubufox_0.9~rc2-0ubuntu0.9.04.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apturl/apturl_0.3.3ubuntu1.2.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-eggtrayicon_2.25.3-3ubuntu1.9.10.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/p/packagekit/packagekit-backend-smart_0.3.14-0ubuntu5.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gtkmozembed_2.25.3-3ubuntu1.9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webfav/webfav_1.16-0ubuntu1.9.10.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/p/packagekit/packagekit-backend-yum_0.3.14-0ubuntu5.9.04.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/libpackagekit-glib11_0.3.14-0ubuntu5.9.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gnome2-extras-dev_2.25.3-3ubuntu1.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gluezilla/gluezilla_2.0.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gnome2-extras-dbg_2.19.1-0ubuntu14.9.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/u/ubufox/ubufox_0.9~rc2-0ubuntu0.9.04.2.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/libpackagekit-glib11_0.3.14-0ubuntu5.9.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gdl_2.25.3-3ubuntu1.9.10.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkmozembed_2.25.3-3ubuntu1.9.10.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/p/packagekit/gstreamer0.10-packagekit_0.3.14-0ubuntu5.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant_1.7.1-4ubuntu0.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b18-1.8-4ubuntu3~9.04.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/y/yelp/yelp_2.25.1.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b18-1.8-4ubuntu3~9.04.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b18-1.8-4ubuntu3~9.04.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gnome2-extras-dbg_2.19.1-0ubuntu14.9.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b18-1.8-4ubuntu3~9.10.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gnome2-extras_2.25.3-3ubuntu1.9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b18-1.8-4ubuntu3~9.10.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gnome2-extras-doc_2.19.1-0ubuntu14.9.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant-gcj_1.7.1-0ubuntu2.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b18-1.8-4ubuntu3~9.10.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b18-1.8-4ubuntu3~9.10.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gtkspell_2.25.3-3ubuntu1.9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/w/webfav/webfav_1.11-0ubuntu1.9.04.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/m/mozvoikko/mozvoikko_0.9.5-1ubuntu2.9.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/ant/ant-optional-gcj_1.7.1-0ubuntu2.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/p/packagekit/mozilla-packagekit_0.3.14-0ubuntu5.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/gnome-python-extras_2.25.3.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b18-1.8-4ubuntu3~9.04.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/libpackagekit-glib-dev_0.3.14-0ubuntu5.9.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/p/packagekit/mozilla-packagekit_0.3.14-0ubuntu5.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gtkspell_2.25.3-3ubuntu1.9.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gluezilla/gluezilla_2.0-1ubuntu1.9.04.1.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b18-1.8-4ubuntu3~9.04.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gda_2.25.3-3ubuntu1.9.10.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant-optional_1.7.1-0ubuntu2.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/w/webfav/webfav_1.11-0ubuntu1.9.04.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b18-1.8-4ubuntu3~9.04.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b18-1.8-4ubuntu3~9.04.2.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/y/yelp/yelp_2.28.0-0ubuntu2.9.10.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/y/yelp/yelp_2.25.1-0ubuntu5.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/libpackagekit-qt11_0.3.14-0ubuntu5.9.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkhtml2-dbg_2.19.1-0ubuntu14.9.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gnome2-extras_2.25.3-3ubuntu1.9.10.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b18-1.8-4ubuntu3~9.10.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-doc_6b18-1.8-4ubuntu3~9.04.2_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gnome2-extras_2.19.1-0ubuntu14.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-lib_6b18-1.8-4ubuntu3~9.10.2_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/ant/ant-optional-gcj_1.7.1-4ubuntu0.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b18-1.8-4ubuntu3~9.10.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b18-1.8-4ubuntu3~9.04.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkhtml2_2.19.1-0ubuntu14.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b18-1.8-4ubuntu3~9.04.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b18-1.8-4ubuntu3~9.04.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b18-1.8-4ubuntu3~9.10.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b18-1.8-4ubuntu3~9.04.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/l/liferea/liferea-dbg_1.4.26-0ubuntu1.9.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/ant/ant-gcj_1.7.1-0ubuntu2.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/m/mozvoikko/mozvoikko_1.0.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant_1.7.1-0ubuntu2.2.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser_2.26.1-0ubuntu1.9.04.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b18-1.8-4ubuntu3~9.04.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant-gcj_1.7.1-4ubuntu0.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/p/packagekit/packagekit-backend-yum_0.3.14-0ubuntu5.9.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b18-1.8-4ubuntu3~9.10.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant_1.7.1-0ubuntu2.2_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gnome2-extras_2.25.3-3ubuntu1.9.10.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b18-1.8-4ubuntu3~9.10.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/liferea/liferea_1.4.26-0ubuntu1.9.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/libpackagekit-glib11_0.3.14-0ubuntu5.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant-optional-gcj_1.7.1-4ubuntu0.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/u/ubufox/ubufox_0.9~rc2-0ubuntu0.9.10.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gtkhtml2-dbg_2.19.1-0ubuntu14.9.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b18-1.8-4ubuntu3~9.10.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/packagekit-backend-apt_0.3.14-0ubuntu5.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/m/mozvoikko/mozvoikko_0.9.5-1ubuntu2.9.04.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apturl/apturl_0.3.3ubuntu1.2.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gnome2-extras-dbg_2.25.3-3ubuntu1.9.10.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gnome2-extras_2.19.1-0ubuntu14.9.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b18-1.8-4ubuntu3~9.10.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/y/yelp/yelp_2.28.0-0ubuntu2.9.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/liferea/liferea_1.4.26.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-gecko_2.26.1-0ubuntu1.9.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/ant/ant-gcj_1.7.1-0ubuntu2.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/m/mozvoikko/mozvoikko_1.0-1ubuntu3.9.10.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/m/mozvoikko/mozvoikko_0.9.5-1ubuntu2.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/libpackagekit-qt-dev_0.3.14-0ubuntu5.9.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/packagekit-backend-apt_0.3.14-0ubuntu5.9.04.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkhtml2_2.19.1-0ubuntu14.9.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gnome2-extras-dbg_2.25.3-3ubuntu1.9.10.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/packagekit_0.3.14-0ubuntu5.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/u/ubufox/ubufox_0.9~rc2-0ubuntu0.9.04.2.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b18-1.8-4ubuntu3~9.04.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b18-1.8-4ubuntu3~9.04.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gdl_2.25.3-3ubuntu1.9.10.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/y/yelp/yelp_2.28.0-0ubuntu2.9.10.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/libpackagekit-glib-dev_0.3.14-0ubuntu5.9.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser-dbg_2.26.1-0ubuntu1.9.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/m/mozvoikko/mozvoikko_0.9.5-1ubuntu2.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/gnome-python-extras_2.19.1-0ubuntu14.9.04.1.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/packagekit-backend-apt_0.3.14-0ubuntu5.9.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/p/packagekit/gstreamer0.10-packagekit_0.3.14-0ubuntu5.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b18-1.8-4ubuntu3~9.04.2.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gnome2-extras_2.25.3-3ubuntu1.9.10.1_amd64.deb

Trust: 0.1

url:https://launchpad.net/bugs/599954

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant-optional_1.7.1-4ubuntu0.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gnome2-extras-dbg_2.25.3-3ubuntu1.9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apturl/apturl_0.3.3ubuntu1.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gnome2-extras-dbg_2.19.1-0ubuntu14.9.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b18-1.8-4ubuntu3~9.04.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gda_2.25.3-3ubuntu1.9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/m/mozvoikko/mozvoikko_0.9.5.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant-optional-gcj_1.7.1-4ubuntu0.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/libpackagekit-qt-dev_0.3.14-0ubuntu5.9.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/y/yelp/yelp_2.25.1-0ubuntu5.9.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-eggtrayicon_2.25.3-3ubuntu1.9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b18-1.8-4ubuntu3~9.04.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b18-1.8-4ubuntu3~9.10.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkspell_2.25.3-3ubuntu1.9.10.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gda_2.25.3-3ubuntu1.9.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant_1.7.1-4ubuntu0.2.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-eggtrayicon_2.25.3-3ubuntu1.9.10.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/ant/ant-optional-gcj_1.7.1-4ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b18-1.8.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gtkmozembed_2.25.3-3ubuntu1.9.10.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/e/epiphany-browser/epiphany-gecko_2.26.1-0ubuntu1.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gnome2-extras_2.19.1-0ubuntu14.9.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/libpackagekit-qt11_0.3.14-0ubuntu5.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/gnome-python-extras_2.25.3-3ubuntu1.9.10.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/p/packagekit/mozilla-packagekit_0.3.14-0ubuntu5.9.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gksu2_2.25.3-3ubuntu1.9.10.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/packagekit-backend-apt_0.3.14-0ubuntu5.9.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/p/packagekit/packagekit-backend-yum_0.3.14-0ubuntu5.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/libpackagekit-glib-dev_0.3.14-0ubuntu5.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gnome2-extras-dbg_2.19.1-0ubuntu14.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gtkhtml2_2.19.1-0ubuntu14.9.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/u/ubufox/ubufox_0.9~rc2.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gnome2-extras-dbg_2.19.1-0ubuntu14.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/packagekit-backend-apt_0.3.14-0ubuntu5.9.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/m/mozvoikko/mozvoikko_1.0-1ubuntu3.9.10.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b18-1.8-4ubuntu3~9.10.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/liferea/liferea_1.4.26-0ubuntu1.9.04.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant_1.7.1-0ubuntu2.2.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/packagekit_0.3.14-0ubuntu5.9.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/y/yelp/yelp_2.25.1-0ubuntu5.9.04.1.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/e/epiphany-browser/epiphany-browser-dbg_2.26.1-0ubuntu1.9.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b18-1.8-4ubuntu3~9.10.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/y/yelp/yelp_2.28.0-0ubuntu2.9.10.1.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gnome2-extras_2.25.3-3ubuntu1.9.10.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b18-1.8-4ubuntu3~9.04.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b18-1.8-4ubuntu3~9.04.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/y/yelp/yelp_2.28.0-0ubuntu2.9.10.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b18-1.8-4ubuntu3~9.04.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gda_2.25.3-3ubuntu1.9.10.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b18-1.8-4ubuntu3~9.10.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b18-1.8-4ubuntu3~9.10.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/l/liferea/liferea_1.4.26-0ubuntu1.9.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/m/mozvoikko/mozvoikko_1.0-1ubuntu3.9.10.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkspell_2.25.3-3ubuntu1.9.10.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkhtml2-dbg_2.19.1-0ubuntu14.9.04.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkhtml2_2.25.3-3ubuntu1.9.10.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/y/yelp/yelp_2.28.0-0ubuntu2.9.10.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b18-1.8-4ubuntu3~9.04.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/l/liferea/liferea_1.4.26-0ubuntu1.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser-dbg_2.26.1-0ubuntu1.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b18-1.8-4ubuntu3~9.04.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/packagekit_0.3.14-0ubuntu5.9.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/p/packagekit/gstreamer0.10-packagekit_0.3.14-0ubuntu5.9.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gnome2-extras-dev_2.19.1-0ubuntu14.9.04.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/l/liferea/liferea-dbg_1.4.26-0ubuntu1.9.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gluezilla/gluezilla_2.0-1ubuntu1.9.04.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant-optional-gcj_1.7.1-0ubuntu2.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/p/packagekit/gstreamer0.10-packagekit_0.3.14-0ubuntu5.9.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gluezilla/libgluezilla_2.0-1ubuntu1.9.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b18-1.8-4ubuntu3~9.10.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gda_2.25.3-3ubuntu1.9.10.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/libpackagekit-qt-dev_0.3.14-0ubuntu5.9.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/p/packagekit/packagekit-backend-smart_0.3.14-0ubuntu5.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/packagekit_0.3.14-0ubuntu5.9.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gtkhtml2_2.25.3-3ubuntu1.9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b18-1.8-4ubuntu3~9.10.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gnome2-extras-dbg_2.25.3-3ubuntu1.9.10.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/y/yelp/yelp_2.25.1-0ubuntu5.9.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b18-1.8-4ubuntu3~9.04.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b18-1.8-4ubuntu3~9.10.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/m/mozvoikko/mozvoikko_1.0-1ubuntu3.9.10.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser-dev_2.26.1-0ubuntu1.9.04.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/libpackagekit-qt11_0.3.14-0ubuntu5.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/liferea/liferea_1.4.26-0ubuntu1.9.04.1.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/libpackagekit-qt-dev_0.3.14-0ubuntu5.9.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/ant/ant-gcj_1.7.1-4ubuntu0.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b18-1.8-4ubuntu3~9.04.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/ant/ant-optional-gcj_1.7.1-0ubuntu2.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/p/packagekit/packagekit-backend-yum_0.3.14-0ubuntu5.9.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/ant/ant-gcj_1.7.1-0ubuntu2.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gtkhtml2_2.19.1-0ubuntu14.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/m/mozvoikko/mozvoikko_0.9.5-1ubuntu2.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webfav/webfav_1.16-0ubuntu1.9.10.1.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b18-1.8-4ubuntu3~9.10.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b18-1.8-4ubuntu3~9.10.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b18-1.8-4ubuntu3~9.10.2.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gnome2-extras-dbg_2.25.3-3ubuntu1.9.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/liferea/liferea-dbg_1.4.26-0ubuntu1.9.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/packagekit_0.3.14-0ubuntu5.9.04.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkhtml2-dbg_2.19.1-0ubuntu14.9.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant_1.7.1-4ubuntu0.2.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b18-1.8-4ubuntu3~9.04.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-gecko_2.26.1-0ubuntu1.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b18-1.8-4ubuntu3~9.04.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/y/yelp/yelp_2.25.1-0ubuntu5.9.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/libpackagekit-glib-dev_0.3.14-0ubuntu5.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b18-1.8-4ubuntu3~9.10.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkhtml2_2.25.3-3ubuntu1.9.10.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b18-1.8-4ubuntu3~9.10.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/w/webfav/webfav_1.11.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkhtml2_2.19.1-0ubuntu14.9.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b18-1.8-4ubuntu3~9.04.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/p/packagekit/gstreamer0.10-packagekit_0.3.14-0ubuntu5.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gtkhtml2_2.25.3-3ubuntu1.9.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/w/webfav/webfav_1.11-0ubuntu1.9.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant-doc_1.7.1-0ubuntu2.2_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-eggtrayicon_2.25.3-3ubuntu1.9.10.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-source_6b18-1.8-4ubuntu3~9.10.2_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/libpackagekit-qt11_0.3.14-0ubuntu5.9.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/u/ubufox/ubufox_0.9~rc2-0ubuntu0.9.10.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/y/yelp/yelp_2.28.0.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant-doc_1.7.1-4ubuntu0.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b18-1.8-4ubuntu3~9.04.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b18-1.8-4ubuntu3~9.10.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/libpackagekit-glib11_0.3.14-0ubuntu5.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/ant/ant-gcj_1.7.1-0ubuntu2.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/m/mozvoikko/mozvoikko_1.0-1ubuntu3.9.10.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gdl_2.25.3-3ubuntu1.9.10.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/l/liferea/liferea_1.4.26-0ubuntu1.9.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkmozembed_2.25.3-3ubuntu1.9.10.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b18-1.8-4ubuntu3~9.10.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webfav/webfav_1.16.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/y/yelp/yelp_2.28.0-0ubuntu2.9.10.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/p/packagekit/mozilla-packagekit_0.3.14-0ubuntu5.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gluezilla/libgluezilla_2.0-1ubuntu1.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b18-1.8-4ubuntu3~9.10.2.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gtkhtml2_2.25.3-3ubuntu1.9.10.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/libpackagekit-qt-dev_0.3.14-0ubuntu5.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b18-1.8-4ubuntu3~9.04.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/packagekit/packagekit_0.3.14-0ubuntu5.9.04.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b18-1.8-4ubuntu3~9.10.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gnome-python-extras/python-gdl_2.25.3-3ubuntu1.9.10.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/packagekit/libpackagekit-glib11_0.3.14-0ubuntu5.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/p/packagekit/packagekit-backend-yum_0.3.14-0ubuntu5.9.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser_2.26.1-0ubuntu1.9.04.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b18-1.8-4ubuntu3~9.10.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-doc_6b18-1.8-4ubuntu3~9.10.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b18-1.8-4ubuntu3~9.10.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/y/yelp/yelp_2.25.1-0ubuntu5.9.04.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b18-1.8-4ubuntu3~9.04.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/e/epiphany-browser/epiphany-gecko_2.26.1-0ubuntu1.9.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/p/packagekit/packagekit-backend-smart_0.3.14-0ubuntu5.9.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b18-1.8-4ubuntu3~9.10.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/g/gluezilla/libgluezilla_2.0-1ubuntu1.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/g/gnome-python-extras/python-gtkhtml2-dbg_2.19.1-0ubuntu14.9.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b18-1.8-4ubuntu3~9.04.2_lpia.deb

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://www.mozilla.org/security/announce/2010/mfsa2010-40.html

Trust: 0.1

url:http://www.mozilla.org/security/announce/2010/mfsa2010-42.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.mozilla.org/security/announce/2010/mfsa2010-45.html

Trust: 0.1

url:http://www.mozilla.org/security/announce/2010/mfsa2010-39.html

Trust: 0.1

url:http://secunia.com/gfx/pdf/secunia_half_year_report_2010.pdf

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.mozilla.org/security/announce/2010/mfsa2010-35.html

Trust: 0.1

url:http://secunia.com/advisories/40688/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40688

Trust: 0.1

url:http://www.mozilla.org/security/announce/2010/mfsa2010-36.html

Trust: 0.1

url:http://www.mozilla.org/security/announce/2010/mfsa2010-47.html

Trust: 0.1

url:http://www.mozilla.org/security/announce/2010/mfsa2010-46.html

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/40688/#comments

Trust: 0.1

url:http://www.mozilla.org/security/announce/2010/mfsa2010-37.html

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_i386.deb

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2751

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.19-3.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozillainterfaces-java_1.9.0.19-3_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_amd64.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1214

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.19-3.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.19.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.19-3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_armel.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0182

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_powerpc.deb

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.19-3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.19-3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.19-3_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.19-3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.19-3_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.19-3_amd64.deb

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5116

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5269

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5135

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0160

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2026

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5268

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-3108

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5266

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2445

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0338

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5269

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5849

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-1536

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-3108

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1969

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-1536

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5266

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1664

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0338

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201412-11.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2026

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0720

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2877

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5135

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0339

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1969

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2445

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-0720

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-4995

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5849

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-4995

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2877

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5268

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0339

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5116

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1664

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0160

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.2.27-2+lenny4.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny4_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.2.27-2+lenny4.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny4_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny4_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny4_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny4_hppa.udeb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny4_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny4_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny4_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny4_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny4_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny4_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny4_arm.udeb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny4_sparc.udeb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny4_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny4_mipsel.udeb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny4_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny4_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny4_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.2.27.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng3_1.2.27-2+lenny4_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny4_s390.udeb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny4_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny4_mips.udeb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny4_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny4_ia64.udeb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny4_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny4_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny4_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny4_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny4_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny4_alpha.udeb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny4_armel.udeb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny4_powerpc.udeb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny4_amd64.udeb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny4_i386.udeb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny4_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny4_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny4_sparc.deb

Trust: 0.1

url:http://www.vmware.com/security/advisoiries

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0434

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0425

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3277

Trust: 0.1

url:http://www.vmware.com/download/player/

Trust: 0.1

url:http://www.vmware.com/security

Trust: 0.1

url:http://downloads.vmware.com/d/info/desktop_downloads/vmware_ace/2_7

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3277

Trust: 0.1

url:http://kb.vmware.com/kb/1055

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0434

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0205

Trust: 0.1

url:http://www.vmware.com/download/ws/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0425

Trust: 0.1

url:http://downloads.vmware.com/support/ws71/doc/releasenotes_ws712.html

Trust: 0.1

url:http://www.vmware.com/support/policies/security_response.html

Trust: 0.1

url:http://downloads.vmware.com/support/player31/doc/releasenotes_player312.html

Trust: 0.1

url:http://www.vmware.com/support/policies/eos.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2249

Trust: 0.1

url:http://downloads.vmware.com/support/ace27/doc/releasenotes_ace272.html

Trust: 0.1

url:http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.1

url:http://www.vmware.com/support/policies/eos_vi.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0360

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0361

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4029

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0001

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2251

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2060

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-6218

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0829

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-6218

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2042

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3736

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-6661

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201412-08.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1000

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2056

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2060

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2251

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0040

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2042

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-5907

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-6661

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-1382

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0553

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0946

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2056

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2529

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-4029

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0001

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1511

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3736

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1511

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3005

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0436

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0040

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0732

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2624

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0360

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0436

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2809

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0553

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0732

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-4896

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4896

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0829

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2945

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-3005

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-4411

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0946

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5907

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4411

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2624

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0361

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1000

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1382

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-trunk-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-branding_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.6.7+build2+nobinonly-0ubuntu0.9.04.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/abrowser_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.10.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:https://launchpad.net/bugs/599796

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/f/firefox-3.5/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5-dev_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.04.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-dom-inspector_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.1_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.10.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/f/firefox-3.5/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_lpia.deb

Trust: 0.1

url:https://launchpad.net/bugs/559149

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.0-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5-dbg_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.0-dev_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.04.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5-branding_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.0-branding_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5_3.6.7+build2+nobinonly-0ubuntu0.9.10.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/abrowser-3.0-branding_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/abrowser-3.1-branding_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/abrowser-3.5_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/abrowser-3.1_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.0-venkman_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.1-branding_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.10.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/abrowser-3.5-branding_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/abrowser-3.0-branding_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-granparadiso-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.1-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-dev_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/abrowser-3.0_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.10.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5_3.6.7+build2+nobinonly-0ubuntu0.9.10.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.0-dom-inspector_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.6.7+build2+nobinonly.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.04.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.1-dbg_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.5/firefox-3.0_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.1-dev_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-libthai_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-3.5_3.6.7+build2+nobinonly.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-gnome-support_3.6.7+build2+nobinonly-0ubuntu0.9.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.6.7+build2+nobinonly-0ubuntu0.9.04.1.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.04.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.04.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/x/xulrunner-1.9.2/xulrunner-dev_1.9.2.7+build2+nobinonly-0ubuntu0.9.10.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.5/abrowser_3.6.7+build2+nobinonly-0ubuntu0.9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_i386.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1212

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1213

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_3.0.6+build2+nobinonly-0ubuntu0.10.04.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_3.0.6+build2+nobinonly.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_3.0.6+build2+nobinonly-0ubuntu0.10.04.1.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dbg_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dbg_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support-dbg_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support-dbg_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support-dbg_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dbg_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support-dbg_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_sparc.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2752

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dbg_3.0.6+build2+nobinonly-0ubuntu0.10.04.1_powerpc.deb

Trust: 0.1

sources: CERT/CC: VU#643615 // VULHUB: VHN-43810 // VULMON: CVE-2010-1205 // PACKETSTORM: 92112 // PACKETSTORM: 92064 // PACKETSTORM: 92229 // PACKETSTORM: 129524 // PACKETSTORM: 91973 // PACKETSTORM: 94244 // PACKETSTORM: 129513 // PACKETSTORM: 92111 // PACKETSTORM: 92156 // CNNVD: CNNVD-201006-473 // NVD: CVE-2010-1205

CREDITS

Greg Roelofs

Trust: 0.6

sources: CNNVD: CNNVD-201006-473

SOURCES

db:CERT/CCid:VU#643615
db:VULHUBid:VHN-43810
db:VULMONid:CVE-2010-1205
db:PACKETSTORMid:92112
db:PACKETSTORMid:92064
db:PACKETSTORMid:92229
db:PACKETSTORMid:129524
db:PACKETSTORMid:91973
db:PACKETSTORMid:94244
db:PACKETSTORMid:129513
db:PACKETSTORMid:92111
db:PACKETSTORMid:92156
db:CNNVDid:CNNVD-201006-473
db:NVDid:CVE-2010-1205

LAST UPDATE DATE

2025-02-22T19:33:59.871000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#643615date:2010-07-12T00:00:00
db:VULHUBid:VHN-43810date:2020-08-14T00:00:00
db:VULMONid:CVE-2010-1205date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-201006-473date:2021-11-16T00:00:00
db:NVDid:CVE-2010-1205date:2024-11-21T01:13:52.653

SOURCES RELEASE DATE

db:CERT/CCid:VU#643615date:2010-07-02T00:00:00
db:VULHUBid:VHN-43810date:2010-06-30T00:00:00
db:VULMONid:CVE-2010-1205date:2010-06-30T00:00:00
db:PACKETSTORMid:92112date:2010-07-23T19:57:40
db:PACKETSTORMid:92064date:2010-07-22T14:16:36
db:PACKETSTORMid:92229date:2010-07-28T01:22:06
db:PACKETSTORMid:129524date:2014-12-12T17:43:12
db:PACKETSTORMid:91973date:2010-07-20T00:53:34
db:PACKETSTORMid:94244date:2010-09-25T18:50:30
db:PACKETSTORMid:129513date:2014-12-12T17:37:19
db:PACKETSTORMid:92111date:2010-07-23T19:51:43
db:PACKETSTORMid:92156date:2010-07-26T20:52:04
db:CNNVDid:CNNVD-201006-473date:2010-06-25T00:00:00
db:NVDid:CVE-2010-1205date:2010-06-30T18:30:01.333