-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1046-1 security@xxxxxxxxxx http://www.debian.org/security/ Martin Schulze April 27th, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : mozilla Vulnerability : several Problem type : remote Debian-specific: no CVE IDs : CVE-2005-2353 CVE-2005-4134 CVE-2006-0292 CVE-2006-0293 CVE-2006-0296 CVE-2006-0748 CVE-2006-0749 CVE-2006-0884 CVE-2006-1045 CVE-2006-1529 CVE-2006-1530 CVE-2006-1531 CVE-2006-1723 CVE-2006-1724 CVE-2006-1727 CVE-2006-1728 CVE-2006-1729 CVE-2006-1730 CVE-2006-1731 CVE-2006-1733 CVE-2006-1734 CVE-2006-1735 CVE-2006-1736 CVE-2006-1737 CVE-2006-1738 CVE-2006-1739 CVE-2006-1740 CVE-2006-1741 CVE-2006-1742 CVE-2006-1790 CERT advisories: VU#179014 VU#252324 VU#329500 VU#350262 VU#488774 VU#492382 VU#592425 VU#736934 VU#813230 VU#842094 VU#932734 VU#935556 BugTraq IDs : 15773 16476 16476 16770 16881 17516 Several security related problems have been discovered in Mozilla. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2005-2353 The "run-mozilla.sh" script allows local users to create or overwrite arbitrary files when debugging is enabled via a symlink attack on temporary files. CVE-2005-4134 Web pages with extremely long titles cause subsequent launches of the browser to appear to "hang" for up to a few minutes, or even crash if the computer has insufficient memory. [MFSA-2006-03] CVE-2006-0292 The Javascript interpreter does not properly dereference objects, which allows remote attackers to cause a denial of service or execute arbitrary code. [MFSA-2006-01] CVE-2006-0293 The function allocation code allows attackers to cause a denial of service and possibly execute arbitrary code. [MFSA-2006-01] CVE-2006-0296 XULDocument.persist() did not validate the attribute name, allowing an attacker to inject arbitrary XML and JavaScript code into localstore.rdf that would be read and acted upon during startup. [MFSA-2006-05] CVE-2006-0748 An anonymous researcher for TippingPoint and the Zero Day Initiative reported that an invalid and nonsensical ordering of table-related tags can be exploited to execute arbitrary code. [MFSA-2006-27] CVE-2006-0749 A particular sequence of HTML tags can cause memory corruption that can be exploited to exectute arbitary code. [MFSA-2006-18] CVE-2006-0884 Georgi Guninski reports that forwarding mail in-line while using the default HTML "rich mail" editor will execute JavaScript embedded in the e-mail message with full privileges of the client. [MFSA-2006-21] CVE-2006-1045 The HTML rendering engine does not properly block external images from inline HTML attachments when "Block loading of remote images in mail messages" is enabled, which could allow remote attackers to obtain sensitive information. [MFSA-2006-26] CVE-2006-1529 A vulnerability potentially allows remote attackers to cause a denial of service and possibly execute arbitrary. [MFSA-2006-20] CVE-2006-1530 A vulnerability potentially allows remote attackers to cause a denial of service and possibly execute arbitrary. [MFSA-2006-20] CVE-2006-1531 A vulnerability potentially allows remote attackers to cause a denial of service and possibly execute arbitrary. [MFSA-2006-20] CVE-2006-1723 A vulnerability potentially allows remote attackers to cause a denial of service and possibly execute arbitrary. [MFSA-2006-20] CVE-2006-1724 A vulnerability potentially allows remote attackers to cause a denial of service and possibly execute arbitrary. [MFSA-2006-20] CVE-2006-1725 Due to an interaction between XUL content windows and the history mechanism, some windows may to become translucent, which might allow remote attackers to execute arbitrary code. [MFSA-2006-29] CVE-2006-1726 "shutdown" discovered that the security check of the function js_ValueToFunctionObject() can be circumvented and exploited to allow the installation of malware. [MFSA-2006-28] CVE-2006-1727 Georgi Guninski reported two variants of using scripts in an XBL control to gain chrome privileges when the page is viewed under "Print Preview".under "Print Preview". [MFSA-2006-25] CVE-2006-1728 "shutdown" discovered that the crypto.generateCRMFRequest method can be used to run arbitrary code with the privilege of the user running the browser, which could enable an attacker to install malware. [MFSA-2006-24] CVE-2006-1729 Claus Jørgensen reported that a text input box can be pre-filled with a filename and then turned into a file-upload control, allowing a malicious website to steal any local file whose name they can guess. [MFSA-2006-23] CVE-2006-1730 An anonymous researcher for TippingPoint and the Zero Day Initiative discovered an integer overflow triggered by the CSS letter-spacing property, which could be exploited to execute arbitrary code. [MFSA-2006-22] CVE-2006-1731 "moz_bug_r_a4" discovered that some internal functions return prototypes instead of objects, which allows remote attackers to conduct cross-site scripting attacks. [MFSA-2006-19] CVE-2006-1732 "shutdown" discovered that it is possible to bypass same-origin protections, allowing a malicious site to inject script into content from another site, which could allow the malicious page to steal information such as cookies or passwords from the other site, or perform transactions on the user's behalf if the user were already logged in. [MFSA-2006-17] CVE-2006-1733 "moz_bug_r_a4" discovered that the compilation scope of privileged built-in XBL bindings is not fully protected from web content and can still be executed which could be used to execute arbitrary JavaScript, which could allow an attacker to install malware such as viruses and password sniffers. [MFSA-2006-16] CVE-2006-1734 "shutdown" discovered that it is possible to access an internal function object which could then be used to run arbitrary JavaScriptcode with full permissions of the user running the browser, which could be used to install spyware or viruses. [MFSA-2006-15] CVE-2006-1735 It is possible to create JavaScript functions that would get compiled with the wrong privileges, allowing an attacker to run code of their choice with full permissions of the user running the browser, which could be used to install spyware or viruses. [MFSA-2006-14] CVE-2006-1736 It is possible to trick users into downloading and saving an executable file via an image that is overlaid by a transparent image link that points to the executable. [MFSA-2006-13] CVE-2006-1737 An integer overflow allows remote attackers to cause a denial of service and possibly execute arbitrary bytecode via JavaScript with a large regular expression. [MFSA-2006-11] CVE-2006-1738 An unspecified vulnerability allows remote attackers to cause a denial of service. [MFSA-2006-11] CVE-2006-1739 Certain Cascading Style Sheets (CSS) can cause an out-of-bounds array write and buffer overflow that could lead to a denial of service and the possible execution of arbitrary code. [MFSA-2006-11] CVE-2006-1740 It is possible for remote attackers to spoof secure site indicators such as the locked icon by opening the trusted site in a popup window, then changing the location to a malicious site. [MFSA-2006-12] CVE-2006-1741 "shutdown" discovered that it is possible to inject arbitrary JavaScript code into a page on another site using a modal alert to suspend an event handler while a new page is being loaded. This could be used to steal confidential information. [MFSA-2006-09] CVE-2006-1742 Igor Bukanov discovered that the JavaScript engine does not properly handle temporary variables, which might allow remote attackers to trigger operations on freed memory and cause memory corruption, causing memory corruption. [MFSA-2006-10] CVE-2006-1790 A regression fix that could lead to memory corruption allows remote attackers to cause a denial of service and possibly execute arbitrary code. [MFSA-2006-11] For the stable distribution (sarge) these problems have been fixed in version 1.7.8-1sarge5. For the unstable distribution (sid) these problems will be fixed in version 1.7.13-1. We recommend that you upgrade your Mozilla packages. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5.dsc Size/MD5 checksum: 1123 b486e464eae65686c7b15f50f77cb767 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5.diff.gz Size/MD5 checksum: 472258 0aa0d6b2edcd13fa83ce9ed271a0724f http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8.orig.tar.gz Size/MD5 checksum: 30589520 13c0f0331617748426679e8f2e9f537a Alpha architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 168068 7ed348802218aae8f17044f1938ad609 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 146702 f3229e78b1ad87a9c8e2bad153faa5a3 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 184934 6f62bafa779c954315d04b385eeded59 http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 856276 ab399c2ed74a5b13deb58aaad3d49087 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 1032 e4569c9693441a0edb94ee11912dad30 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 11477828 62b8bda344ef70da1c47de2adc23dd4a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 403276 2978138077e4a2ecad90dd0e8c856709 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 158332 364e72f576f30e42fe8bfa8e1fba365c http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 3357226 6956cd03cbeda6aa147c984e5fd8317d http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 122282 ac007b2334d2c4f61585b9059e2c8ab3 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 204160 bb0fc8af6b06e34ac81a32d04c9c3cef http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 1937094 f7881427bd1afc9371f2a577a02080e9 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge5_alpha.deb Size/MD5 checksum: 212402 1df52addc8f7c47b6681abd51e331f41 AMD64 architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 168066 bd11d5d2dcd7e78621de4ae0c03ed6b8 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 145798 518a796a9423412004eed5ac6c756d61 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 184930 b6d7c90efdfe1c52bfbb6c47cdcf1244 http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 714636 086b722ae6d2aa33ebcaa4101fd0751b http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 1030 d62e40f94f76fe6780cd517eaceeec7d http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 10945270 2abf8d616e8b889e29f4afea01032679 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 403266 66e021c850ef757ce9a2a0ebf30e462a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 158326 14b7ddf2988885d66b85bd7458fa98ad http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 3351216 9221380d16e886cae475efb410429c3f http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 121176 98f3f0e73d27e92d2f951c892b528bbe http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 204152 ef08d9bbbb26b9c6bdda0bbf8e698299 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 1936008 339c98bcc87876a27b0ca0dacb6ef0cc http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge5_amd64.deb Size/MD5 checksum: 204336 b25851b6c4ae6818918a0b80507eec2d ARM architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 168068 863d83042249fbb53cb5570a5fd03f12 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 124162 eed0ab266786523a435d87925369370f http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 184952 2d6919422ee7aa37b28d2bf6bc942f5f http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 631844 c44b2cf0e0ae4ccc927a41ab6eb25380 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 1030 4d0eb279d61409bb9bbcaa7e8f785471 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 9207420 46aff4f2b0913d187048f19bc59f6e1e http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 403314 17d6accdd639278bad64e9e4042013e2 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 158382 5f900a4d4627d27289dc53aaa32e90da http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 3340838 a4ce703b7b9f05440ba72b7dd177cdd9 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 112674 8426b940dab4c2339a2894dc09584028 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 204184 e0f3e9a65adb373574cafe68b75a7f57 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 1604382 43b950f85fb316f1bc0d773ef25c6a85 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge5_arm.deb Size/MD5 checksum: 168862 6245436dde393fbb8526d622d6372b96 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 170350 1890d8f6cf1f6d7d3f24862b8b236d5e http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 136640 cb2ab0bf38cc5afff64327cbf4f79fbe http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 187128 af578fd816c0534baa15529168dd1170 http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 661394 3a94641ec0f1b8bebbed0b428f40e3e8 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 1030 42b5cb15c988c9d2328e6be2266dda42 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 10332780 89748f75d483a5b4905e842cf85081a6 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 403506 3b03c89eec36142148548f7cd64e5d12 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 158344 d36c1032ddd6ba8051ad27786662525a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 3592688 f30a67ca521067cde834d346b4646c1b http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 116678 dda364a06fa45c104c5222988b826a6b http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 204156 2a7e71b2393ddee06457536053b6f426 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 1816066 cdc0f8d06a00c14337ad20178284685c http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge5_i386.deb Size/MD5 checksum: 192632 26c12b2f1e572cc70ab80fae0a20d75f Intel IA-64 architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 168070 088af473a08b7478a172e483ffe0a3cb http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 174160 255499b7e29813343a088957bc4e450e http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 184942 6ebb70d67e23a8ff659ec788048c558d http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 966574 fa7081da19e2c59b89c5b47d70314a38 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 1032 dac2c365bc58d57275205fbecd04d2f2 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 12943234 f0e1ea934e597443636be3dc1f8323bc http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 403274 d519dfad807b19794742e6723f6872c8 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 158334 c729929af3c1879ab058541227487677 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 3377040 de356df345ed8ab5ce2a970827990b0d http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 125582 9975c43ca6954d98309ab11ac03aadd4 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 204158 fa835bffaf5008bccdcd62ff2114a481 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 2302210 db2d6cd804c0372eafba307436cd9296 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge5_ia64.deb Size/MD5 checksum: 242664 b8a9d7bba6700b6cb700187bbed51102 HP Precision architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 168076 e744a5d49021e510fa29396332c5490f http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 156738 c856122cc9fa2e985882f624ec57df99 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 184946 74cb243dddf99e01bc525efebc9fd96b http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 754578 b940f076bd46aff2f6418828503a2afc http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 1036 37b2840edf5a86c22ba5dab71452f300 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 12162800 74b60c8375cc5d2c379fc4e586526bc7 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 403282 c138582e5075ee91ffbdba982acce035 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 158338 4ad85659f4aae7580c71a8457128e3c4 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 3357886 b8891334da36453c8e5619fe0896f2af http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 123502 195bf5cd60cabb129d9ed04bf100241d http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 204160 c26281b91291c131ad3fb2f1565caa6d http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 2135138 b0883259ed740bcd41bf43ae4680e1b8 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge5_hppa.deb Size/MD5 checksum: 216144 d73d1e1d42427175d865021d69422f8b Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 168092 398298d8ffad737508ed118d4d69d112 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 125818 2099631f9bd235623d98a32fa45b34d6 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 184984 542adc7ea5dac9443e87d2b72023fc80 http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 599936 fada9efe3f62935cbb4ea56cd889e73f http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 1046 2de17261893fc2e2697bbe35b59d768e http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 9703464 afcf7cec434793064c55e67cfea1f441 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 403358 3890cf07cef780ae34a7e294225db0db http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 158380 b213d524e1473ab78ee23a556afb48ac http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 3335462 13fc8f2927e661e55e6bd63490bbbab8 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 114470 14ec6e7861bf73f3b7f82b91b86cf567 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 204180 73817862c43af283a652039ba5b45cd1 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 1683074 ab15cea98788c380e269a94d2df5472a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge5_m68k.deb Size/MD5 checksum: 174748 23a6847a17c4d7e3bf6ef072798e8239 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 168074 958f2c3227b801f01d1166a54187ee41 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 140686 2244af2acdc2844be99005e4e3f0d121 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 184960 54829d9c8798df955039c7268b25392a http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 725672 2310546bc1cbe2df5a6c1fef62ce1ccf http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 1032 6a43b5ff3f81433a162dd200ea052fcb http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 10728020 4caf72ce0e493eaf1b9a5fdf0ae57d6e http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 403274 d4c7bd6d0638bffa0c5d2c23cf080611 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 158336 d1d77d961279da110d01de630e53846b http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 3357194 94993156be09ad11712075d917d21660 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 117610 77ca046034494b735a10028e5af8eed5 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 204150 f6b3f0d0bfc84aa27a24beee692c9932 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 1795504 2d34d3ff2dd99a2d0089c1eca53b0579 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge5_mips.deb Size/MD5 checksum: 189880 2cb68bac9a41b14e627426ebb1405fd1 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 168082 c1eba053c4a1c0421ea508b29fbaa683 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 140636 a2474b059a8c1e4845922102cc1d58d8 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 184940 4a7289c8753105101fe9b0862e3aad71 http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 715106 67e1dc2600da37597fb75e22b7875a6d http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 1038 d0f622dcb3b5b41b62986c3c7c338370 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 10603070 6a6966022c2f8a8ab2807e656043e39a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 403296 6b7722ec5a34cae5f221c3958dc65bc1 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 158342 87c0d4a874ca1aa5e3be85e2249dbe6b http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 3357982 a7258380f1f7fcc380d2a8161cc1b803 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 117204 e77b1061daa3c8a762b9bd0a58f340ee http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 204162 b2e72e6b19f1092e84f2977291e782bf http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 1777610 f88abea35dc9ac1c7760d2ae8761303a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge5_mipsel.deb Size/MD5 checksum: 187444 37c35256b507720467747edfd7ad6606 PowerPC architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 168078 e8a320169dd21bd2653f2e1cceacaea8 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 131146 01deac585f851b2b22d117db76271f69 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 184928 69c925958815b6a0b66d67660e530d21 http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 718850 182c8077cedbd4b17e519bf9d4340ddf http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 1038 8492a6da8120bcd6498c1cf5b5e7bb29 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 9703116 df00589069a7994886b37154a83ba48a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 403294 3530285f43e66537f891885855b56a4a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 158344 f0158562b460aa36a08f24b3c6a828c5 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 3339658 0d6d999cd0559fd93be3257664ad9165 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 114598 bf235995c329c00a51416cb6d9996fad http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 204166 2156c81a5e15e4444d2c5be22ee066a8 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 1642978 409eb5485153365138f9d130db5a0bf5 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge5_powerpc.deb Size/MD5 checksum: 175672 d148c3a307177bd5a88d211c554c515f IBM S/390 architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 168062 f336a2de372d02f5dad5673afd3b6e19 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 156458 71cc856f65e80354b508799a720d2223 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 184956 46fe112fa61e011e2fb79cff847378cb http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 798872 7d02d09328a985bed9aaa3f603c56b72 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 1036 7d25a776a8f9e3467060085df346a772 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 11325484 cad88ede93803739d98498f4b43c74c2 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 403292 fc353648cb5e5fabf0b07211729fb8c7 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 158346 e173c32ab6b9a1904f0236fb00ce836f http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 3352214 ca96b4f7ee3c1498904a567a6462778d http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 121378 c33f1b9d5907dd6422a0ecb38c6f714a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 204166 e4f8a67148cf7b703c280ec91f289298 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 1944742 31da3121c50c27f4df3be7939cbe7324 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge5_s390.deb Size/MD5 checksum: 213446 4d431a25410f0e6039f4032c9acf3378 Sun Sparc architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 168070 0005424068108c85553255259aea5f5b http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 128364 0988e532f8ef63759610a007d07bf60b http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 184942 62e592a514e25e3c7c5420c5c53f3d8e http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 672638 f35942f6694b22af40973af8fb9058a5 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 1030 771b441d8c662e3db4c45646f4e6a99b http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 9373440 a4560f2a4bc80bbf93829f7bf0a1bc5d http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 403276 440bcce7ec880544cff5bba723239473 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 158336 d0ecad8b66d39437bec068ee8e182397 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 3340588 5f44ff3da184961882044aef4a46e696 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 112516 83e39c205c5098b2e0b58c1301a39705 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 204156 ae1c34bb6889e7912fb210d120f5d7f8 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 1583742 fa8be53ec188d2471269ea2b88142e51 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge5_sparc.deb Size/MD5 checksum: 168022 e8bd471a692f313db05316ecf5e4c7b8 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEUG3yW5ql+IAeqTIRAqvUAJoCh+Fw/iqxHDM7K0lRf1BOeedhUgCgm/HF deq39Cez7MKhcPK50z6aO+o= =OJBq -----END PGP SIGNATURE-----