exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Linux Security Advisory 1820-1

Debian Linux Security Advisory 1820-1
Posted Jun 19, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1820-1 - Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser.

tags | advisory, remote, web, vulnerability
systems | linux, debian
advisories | CVE-2009-1392, CVE-2009-1832, CVE-2009-1833, CVE-2009-1834, CVE-2009-1835, CVE-2009-1836, CVE-2009-1837, CVE-2009-1838, CVE-2009-1839, CVE-2009-1840, CVE-2009-1841
SHA-256 | 7b5d3b0a439f9bf630e0430301b87524237426c51c21e9ac498ad7d2f0f32c39

Debian Linux Security Advisory 1820-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1820-1 security@debian.org
https://www.debian.org/security/ Steffen Joeris
June 18, 2009 https://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : xulrunner
Vulnerability : several vulnerabilities
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2009-1392 CVE-2009-1832 CVE-2009-1833 CVE-2009-1834 CVE-2009-1835
CVE-2009-1836 CVE-2009-1837 CVE-2009-1838 CVE-2009-1839 CVE-2009-1840
CVE-2009-1841

Several remote vulnerabilities have been discovered in Xulrunner, a
runtime environment for XUL applications, such as the Iceweasel web
browser. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2009-1392

Several issues in the browser engine have been discovered, which can
result in the execution of arbitrary code. (MFSA 2009-24)

CVE-2009-1832

It is possible to execute arbitrary code via vectors involving "double
frame construction." (MFSA 2009-24)

CVE-2009-1833

Jesse Ruderman and Adam Hauner discovered a problem in the JavaScript
engine, which could lead to the execution of arbitrary code.
(MFSA 2009-24)

CVE-2009-1834

Pavel Cvrcek discovered a potential issue leading to a spoofing attack
on the location bar related to certain invalid unicode characters.
(MFSA 2009-25)

CVE-2009-1835

Gregory Fleischer discovered that it is possible to read arbitrary
cookies via a crafted HTML document. (MFSA 2009-26)

CVE-2009-1836

Shuo Chen, Ziqing Mao, Yi-Min Wang and Ming Zhang reported a potential
man-in-the-middle attack, when using a proxy due to insufficient checks
on a certain proxy response. (MFSA 2009-27)

CVE-2009-1837

Jakob Balle and Carsten Eiram reported a race condition in the
NPObjWrapper_NewResolve function that can be used to execute arbitrary
code. (MFSA 2009-28)

CVE-2009-1838

moz_bug_r_a4 discovered that it is possible to execute arbitrary
JavaScript with chrome privileges due to an error in the
garbage-collection implementation. (MFSA 2009-29)

CVE-2009-1839

Adam Barth and Collin Jackson reported a potential privilege escalation
when loading a file::resource via the location bar. (MFSA 2009-30)

CVE-2009-1840

Wladimir Palant discovered that it is possible to bypass access
restrictions due to a lack of content policy check, when loading a
script file into a XUL document. (MFSA 2009-31)

CVE-2009-1841

moz_bug_r_a4 reported that it is possible for scripts from page content
to run with elevated privileges and thus potentially executing arbitrary
code with the object's chrome privileges. (MFSA 2009-32)



For the stable distribution (lenny), these problems have been fixed in
version 1.9.0.11-0lenny1.

As indicated in the Etch release notes, security support for the
Mozilla products in the oldstable distribution needed to be stopped
before the end of the regular Etch security maintenance life cycle.
You are strongly encouraged to upgrade to stable or switch to a still
supported browser.

For the testing distribution (squeeze), these problems will be fixed
soon.

For the unstable distribution (sid), these problems have been fixed in
version 1.9.0.11-1.

We recommend that you upgrade your xulrunner packages.


Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.11.orig.tar.gz
Size/MD5 checksum: 43878486 54e05857f54ecaaf8c18a8ff8977ede9
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.11-0lenny1.diff.gz
Size/MD5 checksum: 116016 9e90e48c64a417b432c07204a0cca3c7
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.11-0lenny1.dsc
Size/MD5 checksum: 1784 9da4109122928e729c43e1ad227ef3ee

Architecture independent packages:

https://security.debian.org/pool/updates/main/x/xulrunner/libmozillainterfaces-java_1.9.0.11-0lenny1_all.deb
Size/MD5 checksum: 1481072 a2c38ce502706675d7e19b6cfec10322

alpha architecture (DEC Alpha)

https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.11-0lenny1_alpha.deb
Size/MD5 checksum: 220876 b9c7195b3e22cb49b804bcdc98a5f29a
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.11-0lenny1_alpha.deb
Size/MD5 checksum: 111596 d8bf448a074e007530fcbdc2ace286e2
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.11-0lenny1_alpha.deb
Size/MD5 checksum: 429342 3100f5645733df46d6ee8a9328d71551
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.11-0lenny1_alpha.deb
Size/MD5 checksum: 51057266 d4ff87cf5448643ec1257907b7b08320
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.11-0lenny1_alpha.deb
Size/MD5 checksum: 3648766 d150d9e0dd5b51c8d7cef73885708f95
https://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.11-0lenny1_alpha.deb
Size/MD5 checksum: 71262 a468cff5e3a9d9ae2a7ecdafa3ef6aa1
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.11-0lenny1_alpha.deb
Size/MD5 checksum: 933344 433a560fa4008f875d82263f5f27a522
https://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.11-0lenny1_alpha.deb
Size/MD5 checksum: 163490 0c7a249d86b2d65e132e3a6116fecc31
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.11-0lenny1_alpha.deb
Size/MD5 checksum: 9484858 c7fceefe6a70c5077aef044262ffcee3

amd64 architecture (AMD x86_64 (AMD64))

https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.11-0lenny1_amd64.deb
Size/MD5 checksum: 885336 0719dd55e918cd43d5f8bb28453d1ee8
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.11-0lenny1_amd64.deb
Size/MD5 checksum: 223278 6ce156d2bd8d5cec60c3322bd10277ea
https://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.11-0lenny1_amd64.deb
Size/MD5 checksum: 69806 5b58470d7a139f1de45d37dd894711fd
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.11-0lenny1_amd64.deb
Size/MD5 checksum: 3587810 6563cb58d7d914ac16948cd30a981f92
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.11-0lenny1_amd64.deb
Size/MD5 checksum: 373314 406f78cdf84f1cbe75a57aee36eaa1d4
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.11-0lenny1_amd64.deb
Size/MD5 checksum: 101190 417ca47d52a6f0b874dee0473d520f10
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.11-0lenny1_amd64.deb
Size/MD5 checksum: 50305324 4a56a34e5287acbf6643a94481e4a53e
https://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.11-0lenny1_amd64.deb
Size/MD5 checksum: 151070 37a3d7bac733f0fe022a60642204d490
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.11-0lenny1_amd64.deb
Size/MD5 checksum: 7733630 1bd17ebcf26b1b69960654134b222367

arm architecture (ARM)

https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.11-0lenny1_arm.deb
Size/MD5 checksum: 348214 aaf36fcde01af6ab9c8910c74eca24ec
https://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.11-0lenny1_arm.deb
Size/MD5 checksum: 140298 b0e59d229b23a7ae778d9cd669fee278
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.11-0lenny1_arm.deb
Size/MD5 checksum: 6781858 23d3f3b80b854b493df8a5b4b0d74573
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.11-0lenny1_arm.deb
Size/MD5 checksum: 3577702 8d722a076134736a4d4071c8d54a6c01
https://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.11-0lenny1_arm.deb
Size/MD5 checksum: 67532 0771c01c13443b2c8c1ad638bc02efa4
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.11-0lenny1_arm.deb
Size/MD5 checksum: 221312 c61bafa4cc40e8111b2ecae730ef2512
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.11-0lenny1_arm.deb
Size/MD5 checksum: 813238 9c9019b072ffe9aabe4595de5f61239d
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.11-0lenny1_arm.deb
Size/MD5 checksum: 83454 39562d358d257270b4a35a0857d39d84
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.11-0lenny1_arm.deb
Size/MD5 checksum: 49242060 82a8c186e6243aa8d26177c9ea17f84f

armel architecture (ARM EABI)

https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.11-0lenny1_armel.deb
Size/MD5 checksum: 3577974 10ad8d802b67feac72288b50f8982913
https://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.11-0lenny1_armel.deb
Size/MD5 checksum: 141760 cb82f05c2a7d0f2bcf59dc312f046861
https://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.11-0lenny1_armel.deb
Size/MD5 checksum: 69730 b2dee532d05c0d2c142f19291752b6ef
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.11-0lenny1_armel.deb
Size/MD5 checksum: 84048 c27d4e1db5d11e1c0cc5b52154d8ccf3
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.11-0lenny1_armel.deb
Size/MD5 checksum: 819430 f0dd69de275b66c8ac477dcc35c53f7f
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.11-0lenny1_armel.deb
Size/MD5 checksum: 6945398 623a2422199fecf2b0789be43b45a1e1
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.11-0lenny1_armel.deb
Size/MD5 checksum: 350732 9e8b7c5f70580b9c83de8388bb3c8282
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.11-0lenny1_armel.deb
Size/MD5 checksum: 222338 d0b32bbf4683bed84f47e64b882e2803
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.11-0lenny1_armel.deb
Size/MD5 checksum: 50082962 9441b288c89302e95521eeb771033e76

hppa architecture (HP PA RISC)

https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.11-0lenny1_hppa.deb
Size/MD5 checksum: 409254 cdaf90024b3ee42d93e4b47396c4e2c8
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.11-0lenny1_hppa.deb
Size/MD5 checksum: 3619220 486dcd3039366608220bde599536fd3f
https://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.11-0lenny1_hppa.deb
Size/MD5 checksum: 158366 edbfe8b6a65138e17a6749f1f9f74f6e
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.11-0lenny1_hppa.deb
Size/MD5 checksum: 896076 4e7bf4b3b346406b242799492d7c52d7
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.11-0lenny1_hppa.deb
Size/MD5 checksum: 9498572 ac01a178199d355ca14acfbe694dd5ff
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.11-0lenny1_hppa.deb
Size/MD5 checksum: 105466 16dde9161789bfa5ecdff4b33699ba0b
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.11-0lenny1_hppa.deb
Size/MD5 checksum: 51178368 ab80ce0bfcad0c4ba7f6a8e1696f18c1
https://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.11-0lenny1_hppa.deb
Size/MD5 checksum: 70546 480722ae9b031c03e1b160b5d3d9c8b0
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.11-0lenny1_hppa.deb
Size/MD5 checksum: 222064 2ab947cf77e78386a2b6026a1d04ce67

i386 architecture (Intel ia32)

https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.11-0lenny1_i386.deb
Size/MD5 checksum: 3562742 14cd4e8f8a92e112f9bdc70785b2c366
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.11-0lenny1_i386.deb
Size/MD5 checksum: 6592362 7cda737dd6f323028419ae3335c1f735
https://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.11-0lenny1_i386.deb
Size/MD5 checksum: 140928 bca0b8180b6154e0614fbbba62b723d2
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.11-0lenny1_i386.deb
Size/MD5 checksum: 849710 51452041e9c71287ef7cc84efd6e9075
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.11-0lenny1_i386.deb
Size/MD5 checksum: 78724 d4cb9e6cdc3ed15a5f8ee090641f7077
https://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.11-0lenny1_i386.deb
Size/MD5 checksum: 67420 3496ca0c0579daa3071699492cee80f2
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.11-0lenny1_i386.deb
Size/MD5 checksum: 49453720 d066dfc3d56bf77cd6e819bebc92530b
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.11-0lenny1_i386.deb
Size/MD5 checksum: 222484 7f7935702977c7873521e24655c83224
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.11-0lenny1_i386.deb
Size/MD5 checksum: 348428 aa075e8a873ba8794dead19b05dbfeef

ia64 architecture (Intel ia64)

https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.11-0lenny1_ia64.deb
Size/MD5 checksum: 49623688 6afd6469c2c80b0d3d973d8a50d31e8b
https://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.11-0lenny1_ia64.deb
Size/MD5 checksum: 179684 f7d0307dffc0aaad7cff3e78e92cd41c
https://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.11-0lenny1_ia64.deb
Size/MD5 checksum: 75646 b88ac5a740b258d93f2a19850751aa13
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.11-0lenny1_ia64.deb
Size/MD5 checksum: 3393510 d6bfd74513c42b56100c9593ad0f95e8
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.11-0lenny1_ia64.deb
Size/MD5 checksum: 121130 7687535ccc491bddd3f73f840e7e20e1
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.11-0lenny1_ia64.deb
Size/MD5 checksum: 222480 b784a7c95fcaf07b6da14317c4b0c069
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.11-0lenny1_ia64.deb
Size/MD5 checksum: 539108 d20da7adc0bf340bf9fd809569be6579
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.11-0lenny1_ia64.deb
Size/MD5 checksum: 809520 51774edfca03bc47a3f3d68923fcec60
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.11-0lenny1_ia64.deb
Size/MD5 checksum: 11286510 dcac7e53599a26f69dd54a76de139842

mips architecture (MIPS (Big Endian))

https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.11-0lenny1_mips.deb
Size/MD5 checksum: 51812570 d3d0183f3132a16f446bcdd78ab75967
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.11-0lenny1_mips.deb
Size/MD5 checksum: 3610174 4c156e4001e6016d937dd0b76ed580dc
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.11-0lenny1_mips.deb
Size/MD5 checksum: 915412 c1bfe8ad7c499582ef8c977ccef65f27
https://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.11-0lenny1_mips.deb
Size/MD5 checksum: 144332 77ee78102394d802e258082f7addbcbe
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.11-0lenny1_mips.deb
Size/MD5 checksum: 96722 56777daacaa360b84b4e3aa05edecd71
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.11-0lenny1_mips.deb
Size/MD5 checksum: 222244 fbdd53f3ff72b6a29c8ce39cc3cfe10f
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.11-0lenny1_mips.deb
Size/MD5 checksum: 7658916 408c0db56ae40697122fd88f50193934
https://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.11-0lenny1_mips.deb
Size/MD5 checksum: 69514 d0e2e575d784499420754c8abd9af50a
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.11-0lenny1_mips.deb
Size/MD5 checksum: 377778 a5ab1e24584957a6cb1cb666457c0a89

mipsel architecture (MIPS (Little Endian))

https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.11-0lenny1_mipsel.deb
Size/MD5 checksum: 897114 87ae9cba0faeb97a2687345e87adf392
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.11-0lenny1_mipsel.deb
Size/MD5 checksum: 49926646 89fa718bb331b75385eeae8c9801a67c
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.11-0lenny1_mipsel.deb
Size/MD5 checksum: 222480 dbc4aa1edc02a0ec874f0bfaebfbdee8
https://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.11-0lenny1_mipsel.deb
Size/MD5 checksum: 69156 0ad7389bc3f06f24e767737fbc52e9fc
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.11-0lenny1_mipsel.deb
Size/MD5 checksum: 7368776 93e78ea1a6712faab89a33c1e4dfaab6
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.11-0lenny1_mipsel.deb
Size/MD5 checksum: 3304946 aa29a73dcd93f7fc4dfec2265f75490d
https://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.11-0lenny1_mipsel.deb
Size/MD5 checksum: 144620 9b45d1a05b6f6fb36785ecc078718da5
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.11-0lenny1_mipsel.deb
Size/MD5 checksum: 96374 b9f28757e4af8d8de9c625e33127b371
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.11-0lenny1_mipsel.deb
Size/MD5 checksum: 375560 c8896414f96b935e06e84183dcfdbe59

powerpc architecture (PowerPC)

https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.11-0lenny1_powerpc.deb
Size/MD5 checksum: 3577026 01717cbc10caefb1b0b01c0b5fd1f94d
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.11-0lenny1_powerpc.deb
Size/MD5 checksum: 7283612 316443439ef6ae959a35ea9f9f448f72
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.11-0lenny1_powerpc.deb
Size/MD5 checksum: 360002 b54823b9a6c42cc9e2fc96d20340b503
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.11-0lenny1_powerpc.deb
Size/MD5 checksum: 222826 92df5e4ac3c9c4c37d7569c768b2f888
https://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.11-0lenny1_powerpc.deb
Size/MD5 checksum: 72594 9c0f3abc92447af9b2729145f4665270
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.11-0lenny1_powerpc.deb
Size/MD5 checksum: 886178 6e0c34af00e47444c57dbdd74d7615bd
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.11-0lenny1_powerpc.deb
Size/MD5 checksum: 51355158 973470eacfa59e590390e02bbd594865
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.11-0lenny1_powerpc.deb
Size/MD5 checksum: 94292 8c5db950d96fc61804236569673d357e
https://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.11-0lenny1_powerpc.deb
Size/MD5 checksum: 152542 6c9e947aea31a946e2716d9b55638d9e

s390 architecture (IBM S/390)

https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.11-0lenny1_s390.deb
Size/MD5 checksum: 3302788 dee47f233c50057abf09e5711f4f81f6
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.11-0lenny1_s390.deb
Size/MD5 checksum: 222476 ebbc066f3849e6f76b4312220de0e541
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.11-0lenny1_s390.deb
Size/MD5 checksum: 51133352 668c4d6a8e1d07300f8c2dc167ed2565
https://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.11-0lenny1_s390.deb
Size/MD5 checksum: 72146 daa378828aa27c1bdb2bc156a44b6bd1
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.11-0lenny1_s390.deb
Size/MD5 checksum: 404426 d74cb3f836b87095737383827f830f93
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.11-0lenny1_s390.deb
Size/MD5 checksum: 105168 c9466fe1af7b4c52768a29d5a689f85e
https://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.11-0lenny1_s390.deb
Size/MD5 checksum: 155676 7aee79fa600cdbeb1331ab39afe4c58f
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.11-0lenny1_s390.deb
Size/MD5 checksum: 906764 d27506e74851bbbb7981906a82a9979a
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.11-0lenny1_s390.deb
Size/MD5 checksum: 8378072 b7a585304a0c7d6960d42837ecae5850

sparc architecture (Sun SPARC/UltraSPARC)

https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.11-0lenny1_sparc.deb
Size/MD5 checksum: 49318092 524a8852efe2065eba2903375f331bd2
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.11-0lenny1_sparc.deb
Size/MD5 checksum: 7159518 abb575798284a03076b980b581b05408
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.11-0lenny1_sparc.deb
Size/MD5 checksum: 346694 d1f904bb74f77b8a5336ca36d3e893fb
https://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.11-0lenny1_sparc.deb
Size/MD5 checksum: 141522 418022086d352f0be7ed5f578cf791dc
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.11-0lenny1_sparc.deb
Size/MD5 checksum: 87158 9b2c0c57e26431ba5f811e1bd871019d
https://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.11-0lenny1_sparc.deb
Size/MD5 checksum: 3573726 b49ea475fc28bc37b32c03ea6c89f6ec
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.11-0lenny1_sparc.deb
Size/MD5 checksum: 818434 5a0e97b8225bf527094d7bfb1452753a
https://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.11-0lenny1_sparc.deb
Size/MD5 checksum: 221162 87d61c492ba05a96c67832a1df421bf1
https://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.11-0lenny1_sparc.deb
Size/MD5 checksum: 68500 cd24b46bdd1061b1de29b6ed8df7ce2f


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb https://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and https://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAko6Rm8ACgkQ62zWxYk/rQe3qQCePBdJzV42RuLZUARi9h2Yy6+D
u10AoLaUHJi49Uv66D+wzfiiR5rf/Moi
=hP/9
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close