"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1922-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
October 28, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : xulrunner
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE Id(s) : CVE-2009-3274 CVE-2009-3370 CVE-2009-3372 CVE-2009-3373 CVE-2009-3374 CVE-2009-3375 CVE-2009-3376 CVE-2009-3380 CVE-2009-3382
Several remote vulnerabilities have been discovered in Xulrunner, a
runtime environment for XUL applications, such as the Iceweasel web
browser. The Common Vulnerabilities and Exposures project identifies
the following problems:
CVE-2009-3380
Vladimir Vukicevic, Jesse Ruderman, Martijn Wargers, Daniel
Banchero, David Keeler and Boris Zbarsky reported crashes in
layout engine, which might allow the execution of arbitrary code.
CVE-2009-3382
Carsten Book reported a crash in the layout engine, which might
allow the execution of arbitrary code.
CVE-2009-3376
Jesse Ruderman and Sid Stamm discovered spoofing vulnerability
in the file download dialog.
CVE-2009-3375
Gregory Fleischer discovered a bypass of the same-origin policy
using the document.getSelection() function.
CVE-2009-3374
"moz_bug_r_a4" discovered a privilege escalation to Chrome status
in the XPCOM utility XPCVariant::VariantDataToJS.
CVE-2009-3373
"regenrecht" discovered a buffer overflow in the GIF parser, which
might lead to the execution of arbitrary code.
CVE-2009-3372
Marco C. discovered that a programming error in the proxy auto
configuration code might lead to denial of service or the
execution of arbitrary code.
CVE-2009-3274
Jeremy Brown discovered that the filename of a downloaded file
which is opened by the user is predictable, which might lead to
tricking the user into a malicious file if the attacker has local
access to the system.
CVE-2009-3370
Paul Stone discovered that history information from web forms
could be stolen.
For the stable distribution (lenny), these problems have been fixed
in version 1.9.0.15-0lenny1.
As indicated in the Etch release notes, security support for the
Mozilla products in the oldstable distribution needed to be stopped
before the end of the regular Etch security maintenance life cycle.
You are strongly encouraged to upgrade to stable or switch to a still
supported browser.
For the unstable distribution (sid), these problems have been fixed in
version 1.9.1.4-1.
We recommend that you upgrade your xulrunner packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.15-0lenny1.diff.gz
Size/MD5 checksum: 116164 3d995b59ffe890d36117f3103f38b9b1
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.15-0lenny1.dsc
Size/MD5 checksum: 1779 7e8392a8b59ef9064df564ee03c23b14
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.15.orig.tar.gz
Size/MD5 checksum: 44085950 49aa2aee64997f9e802cf386d038d2d7
Architecture independent packages:
http://security.debian.org/pool/updates/main/x/xulrunner/libmozillainterfaces-java_1.9.0.15-0lenny1_all.deb
Size/MD5 checksum: 1464278 ea66718b41a4c282284d37672d0e7078
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.15-0lenny1_alpha.deb
Size/MD5 checksum: 9494314 8cd7366b90d39c5c64064d1fb17c1022
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.15-0lenny1_alpha.deb
Size/MD5 checksum: 938304 bf39af51a378ed039c545730664857aa
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.15-0lenny1_alpha.deb
Size/MD5 checksum: 221588 1dd219c2812ca8d23fff415c9555d3db
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.15-0lenny1_alpha.deb
Size/MD5 checksum: 432182 5d32bfa9665c32fb1738f416f739b3ae
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.15-0lenny1_alpha.deb
Size/MD5 checksum: 3651374 14dd5f555695db43b94ceab3260c680d
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.15-0lenny1_alpha.deb
Size/MD5 checksum: 51089582 fa7f8faad8460d1049e9fb8f6fd1f7bb
http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.15-0lenny1_alpha.deb
Size/MD5 checksum: 163912 d488634f9d36f6d0afcc7b27ee6699a0
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.15-0lenny1_alpha.deb
Size/MD5 checksum: 112022 9666fd74cd00bc0643993acc22d40c91
http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.15-0lenny1_alpha.deb
Size/MD5 checksum: 71980 602c6780c2328141871f5d94b8a163f4
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.15-0lenny1_amd64.deb
Size/MD5 checksum: 69898 c0295f0b7e6957f236d769dc8bdfd2ca
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.15-0lenny1_amd64.deb
Size/MD5 checksum: 890260 2d4cb08b3e886e06be04ec7e43a82b0f
http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.15-0lenny1_amd64.deb
Size/MD5 checksum: 151952 3e20640a2f4eb68a58731bba532aedb0
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.15-0lenny1_amd64.deb
Size/MD5 checksum: 50327552 5779e5efb1f7b6612bf8a774a8e8cd6a
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.15-0lenny1_amd64.deb
Size/MD5 checksum: 374218 86b4b4a30f5f30f4492fe11eca93dace
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.15-0lenny1_amd64.deb
Size/MD5 checksum: 3287960 741031dbbba1f6c6e8fe045d71547905
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.15-0lenny1_amd64.deb
Size/MD5 checksum: 222992 3e801bb57c442128512e599af5c9547e
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.15-0lenny1_amd64.deb
Size/MD5 checksum: 7722556 cc9b8e7ac989143255cb6ad53ce84884
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.15-0lenny1_amd64.deb
Size/MD5 checksum: 101512 396f03e0770dd73cf5820354a8b94a0f
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.15-0lenny1_armel.deb
Size/MD5 checksum: 223358 a881797fcf62521c0ab538e72b33bb70
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.15-0lenny1_armel.deb
Size/MD5 checksum: 84272 1602bc59310724ee0f20d8f5a0ac0a8c
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.15-0lenny1_armel.deb
Size/MD5 checksum: 821892 79baa048d939ac77273ac50237c7bfe3
http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.15-0lenny1_armel.deb
Size/MD5 checksum: 69726 cd5970b1776e5777686ce9208c074e79
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.15-0lenny1_armel.deb
Size/MD5 checksum: 6954730 a8a092eab78826ef9ed0e98e8d7251bb
http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.15-0lenny1_armel.deb
Size/MD5 checksum: 141248 47668db41fd86750793bae3f59ff623e
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.15-0lenny1_armel.deb
Size/MD5 checksum: 352870 99357abd251ccfe354b28ed441256eb4
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.15-0lenny1_armel.deb
Size/MD5 checksum: 50116888 a19877e49d8d1037458d2531873181e0
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.15-0lenny1_armel.deb
Size/MD5 checksum: 3579420 9091ebebb2d0b23a8f10300ff7340c16
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.15-0lenny1_hppa.deb
Size/MD5 checksum: 105902 14573c4144b48dfcdeadca11dbf28fd1
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.15-0lenny1_hppa.deb
Size/MD5 checksum: 412252 703d501036427f18e6ffc3841c0434e7
http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.15-0lenny1_hppa.deb
Size/MD5 checksum: 158830 9c6c95e2c55a59adaa4314022adaba97
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.15-0lenny1_hppa.deb
Size/MD5 checksum: 9512434 b479cbca6e9244681e8acf58afba706e
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.15-0lenny1_hppa.deb
Size/MD5 checksum: 51210900 7b5ae111a77a354adadb9a019892970b
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.15-0lenny1_hppa.deb
Size/MD5 checksum: 3621952 4a3cef66aa1b240f42c4c4c4de41ca64
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.15-0lenny1_hppa.deb
Size/MD5 checksum: 222858 1f6d47dc993cbc9a068517a06492beb9
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.15-0lenny1_hppa.deb
Size/MD5 checksum: 898430 c63b30f2604b2a08d9fed108253b6b5b
http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.15-0lenny1_hppa.deb
Size/MD5 checksum: 71384 50c3026bc0d90b912e74c0892ac3cd8c
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.15-0lenny1_i386.deb
Size/MD5 checksum: 851844 28f3d2c286d83a90df609b21699baf97
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.15-0lenny1_i386.deb
Size/MD5 checksum: 79142 61aff31316b603d03921eb89b5df073b
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.15-0lenny1_i386.deb
Size/MD5 checksum: 3565362 fd8674b08b704e5f0f9ef790da65b7f8
http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.15-0lenny1_i386.deb
Size/MD5 checksum: 141410 0182fcff2acf3987fa15128659fe7b38
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.15-0lenny1_i386.deb
Size/MD5 checksum: 6602586 03aed73b528a0e36cef99361ae9da656
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.15-0lenny1_i386.deb
Size/MD5 checksum: 49492306 82d2789b64cedcbf2406a09131032764
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.15-0lenny1_i386.deb
Size/MD5 checksum: 223182 1872e9d86b45cb1b29f20c4d75467200
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.15-0lenny1_i386.deb
Size/MD5 checksum: 350814 4e647513b860210f0c1bc1caef893e9f
http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.15-0lenny1_i386.deb
Size/MD5 checksum: 68094 f9e97cd83f976afa8959ea9f774f1994
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.15-0lenny1_ia64.deb
Size/MD5 checksum: 223134 2ae79c69711959cb6cd75026882abd60
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.15-0lenny1_ia64.deb
Size/MD5 checksum: 542104 a8b314bf8ad3c48e1ab4ed231b83a450
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.15-0lenny1_ia64.deb
Size/MD5 checksum: 121518 18ec63c6f78623b2c744d9362d4b2be6
http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.15-0lenny1_ia64.deb
Size/MD5 checksum: 76492 22f1645790b9540cc1a3b795573b3e46
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.15-0lenny1_ia64.deb
Size/MD5 checksum: 49667940 d01b4ee9da9f802eb24749992dd14be2
http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.15-0lenny1_ia64.deb
Size/MD5 checksum: 180184 b26234c2f0d54a61e771ee478828c628
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.15-0lenny1_ia64.deb
Size/MD5 checksum: 11301676 95599d73eb33ae7e9613d92304b8d813
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.15-0lenny1_ia64.deb
Size/MD5 checksum: 811176 33ceb8965e9db8d79020777ab55e1838
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.15-0lenny1_ia64.deb
Size/MD5 checksum: 3397550 7eff41c031481161dfab1bc83cfa8450
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.15-0lenny1_mipsel.deb
Size/MD5 checksum: 49965510 8997b286648f39786e86826b5045e69d
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.15-0lenny1_mipsel.deb
Size/MD5 checksum: 223146 2bdf56823a2075c6bbd4fe3fc2e0646c
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.15-0lenny1_mipsel.deb
Size/MD5 checksum: 7375092 29d842979cbc5ee6ad659cf13927788b
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.15-0lenny1_mipsel.deb
Size/MD5 checksum: 96764 5fa81a5541ae261f0a72b91bb5bf6626
http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.15-0lenny1_mipsel.deb
Size/MD5 checksum: 144986 d3da343322c085f952511248e3a69345
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.15-0lenny1_mipsel.deb
Size/MD5 checksum: 900210 b87e5f91341b390cb2f1603a1071aff7
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.15-0lenny1_mipsel.deb
Size/MD5 checksum: 3308536 7c5f7065d8961c7fc0ca7fb974e6611c
http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.15-0lenny1_mipsel.deb
Size/MD5 checksum: 69836 ace8648bf416d4804db9644c487dcdf1
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.15-0lenny1_mipsel.deb
Size/MD5 checksum: 378586 18fd2ced744197472973e2cae61d4d64
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.15-0lenny1_powerpc.deb
Size/MD5 checksum: 362482 a0bf9d0ba7a4695378f7ea053cd9cc46
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.15-0lenny1_powerpc.deb
Size/MD5 checksum: 3283604 b98767e9b18704a2482c731309eef892
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.15-0lenny1_powerpc.deb
Size/MD5 checksum: 51378802 bed95771a8d00f88bedc12d480ed91f0
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.15-0lenny1_powerpc.deb
Size/MD5 checksum: 94786 fb7b21596585931a6edda7e2bebae561
http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.15-0lenny1_powerpc.deb
Size/MD5 checksum: 152276 d83cf113d2600c6ca9e691dfd25a1466
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.15-0lenny1_powerpc.deb
Size/MD5 checksum: 7275222 008f00164ecbc43c681f1743ba33c0e8
http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.15-0lenny1_powerpc.deb
Size/MD5 checksum: 72990 2982ec8818b1ae7b47241dcdb046c8e0
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.15-0lenny1_powerpc.deb
Size/MD5 checksum: 887776 9853592dc50b738bd7b223fc78c030c3
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.15-0lenny1_powerpc.deb
Size/MD5 checksum: 223140 96d915d392dbb2cdc3a09268d97a206f
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.15-0lenny1_s390.deb
Size/MD5 checksum: 3306276 95d049eaa0c2b95b8f98f2295d984454
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.15-0lenny1_s390.deb
Size/MD5 checksum: 406680 9efe79857bd5fc05bf567f4840109135
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.15-0lenny1_s390.deb
Size/MD5 checksum: 223124 ee4ed0dc817d276cbe22bcb5ef6314af
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.15-0lenny1_s390.deb
Size/MD5 checksum: 51172466 33aeec198869e5b92132775938f1dba6
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.15-0lenny1_s390.deb
Size/MD5 checksum: 8387566 5cf074573a634121d0981d927bdf8dc5
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.15-0lenny1_s390.deb
Size/MD5 checksum: 105540 ad95c071cf5d0f16301e004800626ab6
http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.15-0lenny1_s390.deb
Size/MD5 checksum: 156084 69c04262268e1b13ffac80f8827e5776
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.15-0lenny1_s390.deb
Size/MD5 checksum: 909030 9d9a82bbaa3501f41dd810c3bf3e7b0b
http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.15-0lenny1_s390.deb
Size/MD5 checksum: 72868 738b9ff7dafce724b01f032e568d145d
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.15-0lenny1_sparc.deb
Size/MD5 checksum: 143228 8017cc9ebd542b69b5a33328e4db72fd
http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.15-0lenny1_sparc.deb
Size/MD5 checksum: 69342 2a626affc178cb0bed8bd8dc0302308b
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.15-0lenny1_sparc.deb
Size/MD5 checksum: 821126 3107a47d82efbaf745b0a7355df82271
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.15-0lenny1_sparc.deb
Size/MD5 checksum: 223230 41277488a9fbf77e3864848e36ad1040
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.15-0lenny1_sparc.deb
Size/MD5 checksum: 7174794 ff98cd42b01c1b6da7f443a8513ec516
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.15-0lenny1_sparc.deb
Size/MD5 checksum: 350084 53b49c566cc58af0976b24382a144a16
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.15-0lenny1_sparc.deb
Size/MD5 checksum: 88202 d8ed5ea8a627c996c8890521551e14b3
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.15-0lenny1_sparc.deb
Size/MD5 checksum: 49353618 3919a69140cbf1cc726b9142a7f33f23
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.15-0lenny1_sparc.deb
Size/MD5 checksum: 3577270 0709623512ba6d57f6a475f8382b20a2
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkros6gACgkQXm3vHE4uylr/RQCgwhehfCOIyVKztPYJ/vh7QGBz
qCQAoJGROnGKtVwmxsvUbWEqfwVct/EA
=DyyK
-----END PGP SIGNATURE-----
"
Ska Legends launch Liverpool Music WeekDSA 1902-1: New elinks packages fix arbitrary code execution
This entry was posted
on 4:04 PM
.
Archives
-
▼
2009
(488)
-
▼
November
(49)
- RHSA-2009:1620-01 Moderate: bind security update
- RHSA-2009:1615-01 Moderate: xerces-j2 security update
- DSA 1942-1: New wireshark packages fix several vul...
- GLSA 200911-04 dstat: Untrusted search path
- GLSA 200911-06 PEAR Net_Traceroute: Command injec...
- DSA 1939-1: New libvorbis packages fix several vul...
- DSA 1941-1: New poppler packages fix several vulne...
- RHSA-2009:1601-01 Critical: kdelibs security update
- GLSA 200911-05 Wireshark: Multiple vulnerabilities
- USN-861-1: libvorbis vulnerabilities
- DSA 1938-1: New php-mail packages fix insufficient...
- DSA 1937-1: New gforge packages fix cross-site scr...
- DSA-1934-1: New apache2 packages fix several issues
- USN-859-1: OpenJDK vulnerabilities
- USN-860-1: Apache vulnerabilities
- RHSA-2009:1595-01 Moderate: cups security update
- RHSA-2009:1587-01 Important: kernel security and b...
- GLSA 200911-02 Sun JDK/JRE: Multiple vulnerabilites
- DSA 1936-1: New libgd2 packages fix several vulner...
- RHSA-2009:1588-02 Important: kernel security update
- DSA 1935-1: New gnutls23/gnutls26 packages fix SSL...
- RHSA-2009:1585-01 Moderate: samba3x security and b...
- RHSA-2009:1584-01 Important: java-1.6.0-openjdk se...
- RHSA-2009:1580-02 Moderate: httpd security update
- DSA 1933-1: New cups packages fix cross-site scrip...
- USN-858-1: OpenLDAP vulnerability
- DSA 1932-1: New pidgin packages fix arbitrary code...
- RHSA-2009:1582-01 Critical: java-1.6.0-ibm securit...
- RHSA-2009:1561-01 Important: libvorbis security up...
- RHSA-2009:1562-01 Important: tomcat security update
- USN-853-2: Firefox and Xulrunner regression
- USN-854-1: GD library vulnerabilities
- DSA 1928-1: New Linux 2.6.24 packages fix several ...
- RHSA-2009:1540-01 Important: kernel-rt security, b...
- RHSA-2009:1550-01 Important: kernel security and b...
- RHSA-2009:1541-01 Important: kernel security update
- USN-850-3: poppler vulnerabilities
- DSA 1927-1: New Linux 2.6.26 packages fix several ...
- USN-855-1: libhtml-parser-perl vulnerability
- RHSA-2009:1548-01 Important: kernel security and b...
- RHSA-2009:1530-01 Critical: firefox security update
- DSA 1924-1: New mahara packages fix several vulner...
- USN-853-1: Firefox and Xulrunner vulnerabilities
- RHSA-2009:1528-01 Moderate: samba security and bug...
- RHSA-2009:1531-01 Critical: seamonkey security update
- DSA 1922-1: New xulrunner packages fix several vul...
- DSA 1923-1: New libhtml-parser-perl packages fix d...
- RHSA-2009:1535-01 Moderate: pidgin security update
- DSA 1921-1: New expat packages fix denial of service
-
▼
November
(49)