News

Thursday, September 25, 2008

ubuntu-security-announce Digest, Vol 48, Issue 9

Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com

To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com

You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."


Today's Topics:

1. [USN-645-3] Firefox and xulrunner regression (Jamie Strandboge)
2. [USN-647-1] Thunderbird vulnerabilities (Jamie Strandboge)


----------------------------------------------------------------------

Message: 1
Date: Thu, 25 Sep 2008 13:32:04 -0500
From: Jamie Strandboge <jamie@canonical.com>
Subject: [USN-645-3] Firefox and xulrunner regression
To: ubuntu-security-announce@lists.ubuntu.com
Cc: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com
Message-ID: <20080925183203.GC8797@severus.strandboge.com>
Content-Type: text/plain; charset="us-ascii"

===========================================================
Ubuntu Security Notice USN-645-3 September 25, 2008
firefox-3.0, xulrunner-1.9 regression
https://launchpad.net/bugs/270429
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 8.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
firefox 3.0.3+build1+nobinonly-0ubuntu0.8.04.1
xulrunner-1.9 1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1

After a standard system upgrade you need to restart Firefox and any
applications that use xulrunner, such as Epiphany, to effect the
necessary changes.

Details follow:

USN-645-1 fixed vulnerabilities in Firefox and xulrunner. The upstream
patches introduced a regression in the saved password handling. While
password data was not lost, if a user had saved any passwords with
non-ASCII characters, Firefox could not access the password database.
This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Justin Schuh, Tom Cross and Peter Williams discovered errors in the
Firefox URL parsing routines. If a user were tricked into opening a
crafted hyperlink, an attacker could overflow a stack buffer and
execute arbitrary code. (CVE-2008-0016)

It was discovered that the same-origin check in Firefox could be
bypassed. If a user were tricked into opening a malicious website,
an attacker may be able to execute JavaScript in the context of a
different website. (CVE-2008-3835)

Several problems were discovered in the JavaScript engine. This
could allow an attacker to execute scripts from page content with
chrome privileges. (CVE-2008-3836)

Paul Nickerson discovered Firefox did not properly process mouse
click events. If a user were tricked into opening a malicious web
page, an attacker could move the content window, which could
potentially be used to force a user to perform unintended drag and
drop operations. (CVE-2008-3837)

Several problems were discovered in the browser engine. This could
allow an attacker to execute code with chrome privileges.
(CVE-2008-4058, CVE-2008-4059, CVE-2008-4060)

Drew Yao, David Maciejak and other Mozilla developers found several
problems in the browser engine of Firefox. If a user were tricked
into opening a malicious web page, an attacker could cause a denial
of service or possibly execute arbitrary code with the privileges
of the user invoking the program. (CVE-2008-4061, CVE-2008-4062,
CVE-2008-4063, CVE-2008-4064)

Dave Reed discovered a flaw in the JavaScript parsing code when
processing certain BOM characters. An attacker could exploit this
to bypass script filters and perform cross-site scripting attacks.
(CVE-2008-4065)

Gareth Heyes discovered a flaw in the HTML parser of Firefox. If a
user were tricked into opening a malicious web page, an attacker
could bypass script filtering and perform cross-site scripting
attacks. (CVE-2008-4066)

Boris Zbarsky and Georgi Guninski independently discovered flaws in
the resource: protocol. An attacker could exploit this to perform
directory traversal, read information about the system, and prompt
the user to save information in a file. (CVE-2008-4067,
CVE-2008-4068)

Billy Hoffman discovered a problem in the XBM decoder. If a user were
tricked into opening a malicious web page or XBM file, an attacker
may be able to cause a denial of service via application crash.
(CVE-2008-4069)


Updated packages for Ubuntu 8.04 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.3+build1+nobinonly-0ubuntu0.8.04.1.diff.gz
Size/MD5: 105898 8e9d91766d1673d85b4e2e60f09ffbb6
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.3+build1+nobinonly-0ubuntu0.8.04.1.dsc
Size/MD5: 2760 57a929804f986040bc7227fe3009156c
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.3+build1+nobinonly.orig.tar.gz
Size/MD5: 11573662 bcf09e18019b2f2cbb8517932c891485
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1.diff.gz
Size/MD5: 77467 f5a62ff3d325e95c5120cc22bda2d554
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1.dsc
Size/MD5: 2825 ab55f7ea35f9ee735528805831854977
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.3+build1+nobinonly.orig.tar.gz
Size/MD5: 40164202 72a5e40dda74d050021677f1b3ebabcc

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-dev_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65954 3f06a1b75554d1d2340afc44b78022ac
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-gnome-support_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65968 6d8a8e29f0a7c87d2c8f179f574d7aa6
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-granparadiso-dev_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65924 3ac2f3dfa932bdc940950c0a894b9080
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-trunk-dev_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65912 e9e9a4746bec14f42b2450bea8225057
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 66064 6775e8fa75a92e1f33cc8ae5bb7f9e8a
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-3.0-dom-inspector_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65974 751dd3d6688c6639e9d0ec0da761cc5c
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-3.0-venkman_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65924 cfb57e23eb08498e16a6bbef2ca4238e
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-dom-inspector_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 8974 25f83a796d3169788d39ea68cd8635c6
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso-dom-inspector_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 8962 01cc668f88c84f91e2fd886d42d92f13
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso-gnome-support_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65948 c4718d66cfe19443c59978f4e39e7e41
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-granparadiso_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65914 71f6cddfc729e4018eefe95c79efd9df
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-libthai_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65906 97334f76bbbd654157c7c5aabf7e31c6
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-dom-inspector_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 8946 f9d779ba38a6e7732ad71bb751523a7a
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-gnome-support_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65936 4fa1a2d88890b85d3bce5cb045ec792b
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk-venkman_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 8936 700210f41bc608472f4fe88615dab81f
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox-3.0/firefox-trunk_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 65902 d907072601c66ad491d706566c2824de
http://security.ubuntu.com/ubuntu/pool/universe/x/xulrunner-1.9/xulrunner-1.9-dom-inspector_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 125194 abdbdf7f8a7597a88c60af6d98ad3be3
http://security.ubuntu.com/ubuntu/pool/universe/x/xulrunner-1.9/xulrunner-1.9-venkman_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 235304 8c3f950ba19f57700fb82918f343bed3

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 9028 45557a5d8f43797bebb0ee77783bdc87
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 29576 78c9677804c24f5b6d95e0eb6c7a7f38
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 1086672 7399df1205d00bd6124d03fc63cf6592
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 4035336 eaff46064356cea1e966ab221e45eb30
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 48656 41dc8e708b4972e61b2e12ab54c0c4fc
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 9031700 f608db020679c1a062deaf017d5defd2

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 9028 a8fd22201b420b5b0fa11fab1c9466d3
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 25726 823066888e006035bbe5f1eb790eccfa
http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 1065018 32827a47e8cd521d89391879a3d84d5c
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 4016914 4285536cc152b65fa881946890b44185
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 38514 04869df4ca726ad6c59d2e43383bf4f6
http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 7763786 685dc1eb5dce09d60c56ffa1c059735b

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 9028 2de0d8feb75644816867deec8668ec34
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 25342 5e70051d1c36fa4115ad1b569a57b290
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 1063126 4e9a3f4c3adaacb731b9d715e38fd3e2
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 4012342 92f97468c8260b9980d348024b3b6971
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 37610 88681831e70f2c7ab81da01928fcf09f
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 7650950 80ab78a657265b9cad8ec759ac8864e9

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-dev_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 9026 c90a944ecbc4366a54001c769d29e35b
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0-gnome-support_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 27502 d140872135657f26a214585501d48c8c
http://ports.ubuntu.com/pool/main/f/firefox-3.0/firefox-3.0_3.0.3+build1+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 1079210 2594afd5cad19bc4bee8f0bad4483c5c
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-dev_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 4023426 cb239f374f28f6b90ae9289240acf871
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9-gnome-support_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 43686 d176b974055a33ede0065b4c9f2047fd
http://ports.ubuntu.com/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.3+build1+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 8609908 8e66fdbd3106ee310b9e8591d5fc35ad


-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20080925/9e810cff/attachment-0001.pgp

------------------------------

Message: 2
Date: Thu, 25 Sep 2008 21:34:25 -0500
From: Jamie Strandboge <jamie@canonical.com>
Subject: [USN-647-1] Thunderbird vulnerabilities
To: ubuntu-security-announce@lists.ubuntu.com
Cc: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com
Message-ID: <20080926023425.GG8797@severus.strandboge.com>
Content-Type: text/plain; charset="us-ascii"

===========================================================
Ubuntu Security Notice USN-647-1 September 26, 2008
mozilla-thunderbird, thunderbird vulnerabilities
CVE-2008-3835, CVE-2008-4058, CVE-2008-4059, CVE-2008-4060,
CVE-2008-4061, CVE-2008-4062, CVE-2008-4063, CVE-2008-4064,
CVE-2008-4065, CVE-2008-4066, CVE-2008-4067, CVE-2008-4068,
CVE-2008-4070
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.04
Ubuntu 7.10
Ubuntu 8.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
mozilla-thunderbird 1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1

Ubuntu 7.04:
mozilla-thunderbird 1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1

Ubuntu 7.10:
thunderbird 2.0.0.17+nobinonly-0ubuntu0.7.10.1

Ubuntu 8.04 LTS:
thunderbird 2.0.0.17+nobinonly-0ubuntu0.8.04.1

After a standard system upgrade you need to restart Thunderbird to
effect the necessary changes.

Details follow:

It was discovered that the same-origin check in Thunderbird could
be bypassed. If a user had JavaScript enabled and were tricked into
opening a malicious website, an attacker may be able to execute
JavaScript in the context of a different website. (CVE-2008-3835)

Several problems were discovered in the browser engine of
Thunderbird. If a user had JavaScript enabled, this could allow an
attacker to execute code with chrome privileges. (CVE-2008-4058,
CVE-2008-4059, CVE-2008-4060)

Drew Yao, David Maciejak and other Mozilla developers found several
problems in the browser engine of Thunderbird. If a user had
JavaScript enabled and were tricked into opening a malicious web
page, an attacker could cause a denial of service or possibly
execute arbitrary code with the privileges of the user invoking the
program. (CVE-2008-4061, CVE-2008-4062, CVE-2008-4063, CVE-2008-4064)

Dave Reed discovered a flaw in the JavaScript parsing code when
processing certain BOM characters. An attacker could exploit this
to bypass script filters and perform cross-site scripting attacks
if a user had JavaScript enabled. (CVE-2008-4065)

Gareth Heyes discovered a flaw in the HTML parser of Thunderbird. If
a user had JavaScript enabled and were tricked into opening a
malicious web page, an attacker could bypass script filtering and
perform cross-site scripting attacks. (CVE-2008-4066)

Boris Zbarsky and Georgi Guninski independently discovered flaws in
the resource: protocol. An attacker could exploit this to perform
directory traversal, read information about the system, and prompt
the user to save information in a file. (CVE-2008-4067,
CVE-2008-4068)

Georgi Guninski discovered that Thunderbird improperly handled
cancelled newsgroup messages. If a user opened a crafted newsgroup
message, an attacker could cause a buffer overrun and potentially
execute arbitrary code with the privileges of the user invoking the
program. (CVE-2008-4070)


Updated packages for Ubuntu 6.06 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1.diff.gz
Size/MD5: 457690 6d3b4e43ba967ab95fc6ad85fe595e12
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1.dsc
Size/MD5: 1688 9ed773039d32a90e73c6bd4e211f723e
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g.orig.tar.gz
Size/MD5: 38029718 4ae446c58ccde45cb8f156b395968d2b

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 3593958 4f8eb1f994751de1541bd53c7b3f8236
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 194972 9e89bd92215c471d5265d3866fdd8c52
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 60218 b30948cbd58517559134ad18a0d7f95e
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 12118598 f13001d92a989bc023fe16e3c02a0149

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_i386.deb
Size/MD5: 3587744 9058cf1a1de1fc9ca54052768c46b7a9
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_i386.deb
Size/MD5: 188392 d3ffb66f5bd3621fff5c9b648e01566b
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_i386.deb
Size/MD5: 55726 d3e7a142fc1d26727b54c4d0751d6feb
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_i386.deb
Size/MD5: 10391350 2b669a1e53d80a023d42f0e5aa00abcb

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 3592892 65270c28e26302af25047b8524240d0f
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 191696 96bb58a8aee5f4e5187a1785baf92707
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 59376 fbd562af8142453c88ce1bd8fe2c5749
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 11672836 ce1bcd19a1fa0a1004146034096d6944

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 3589568 820731692c8f9302538f38cefaeac3f9
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 189140 dac62e9cab6dee27d9f71500b77db030
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 57212 06bc96f9d4826515ffe1f6c2099399d3
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 10866068 15aa61ac5c6a4ad04b802a8db9c3c50a

Updated packages for Ubuntu 7.04:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1.diff.gz
Size/MD5: 126911 8ea6b26003fc64eeb6266772629a06bb
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1.dsc
Size/MD5: 2260 6b480908f2478bea5c1c92ca70899da4
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g.orig.tar.gz
Size/MD5: 38029718 4ae446c58ccde45cb8f156b395968d2b

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_amd64.deb
Size/MD5: 3594046 b179d32e1e4fb334af16c7c680562078
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_amd64.deb
Size/MD5: 195620 2d1d0135ce5e16313208743178b3e375
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_amd64.deb
Size/MD5: 60724 e6331e4bd6ba56c6299b395b206f058a
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_amd64.deb
Size/MD5: 12215314 9dd393ff33240485e361c4afce069ee6

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_i386.deb
Size/MD5: 3591778 b9c0987bf3fb49a829db450187058ffb
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_i386.deb
Size/MD5: 190254 4ad088e82ed097ab26322d1d7a8c08b2
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_i386.deb
Size/MD5: 57348 881b8d76656f5c206db67b0dbcc0bdc0
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_i386.deb
Size/MD5: 10935830 cf0457713bd283f6fdf21a08191661c3

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_powerpc.deb
Size/MD5: 3595060 607544786663ca4365a4a15f08d17bc6
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_powerpc.deb
Size/MD5: 193738 bef4987b005a61012a6d3891807529dd
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_powerpc.deb
Size/MD5: 60716 1364ae8b4391257f689280d75093ec47
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_powerpc.deb
Size/MD5: 12154624 1a051b08628cf992ac43f00ab5200753

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_sparc.deb
Size/MD5: 3591080 437d27480cafbb8aa00563c2a4bd6534
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_sparc.deb
Size/MD5: 190082 6507d507a87bdccd42ba5fb3c507e5f8
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_sparc.deb
Size/MD5: 57790 dc866218dc88863fb3040262e928e0e8
http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1_sparc.deb
Size/MD5: 11163522 9c8107978e5bee0998527a612a7bdd01

Updated packages for Ubuntu 7.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.7.10.1.diff.gz
Size/MD5: 125693 a74100031e75db6de34266b4599c463a
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.7.10.1.dsc
Size/MD5: 2321 db7c9b3c79d8fa06d047864f19e80ad5
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly.orig.tar.gz
Size/MD5: 37867495 28a872ebd677569f6f7e340f9a247f0e

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/mozilla-thunderbird-dev_2.0.0.17+nobinonly-0ubuntu0.7.10.1_all.deb
Size/MD5: 60136 faf7e4834c6adb29da55b46a0539d195
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/mozilla-thunderbird_2.0.0.17+nobinonly-0ubuntu0.7.10.1_all.deb
Size/MD5: 60120 1bcd9422bae0f739795bfda770019b28

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.17+nobinonly-0ubuntu0.7.10.1_amd64.deb
Size/MD5: 3777582 abc4f04a77bfe002b59c5bc0d163bd66
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.17+nobinonly-0ubuntu0.7.10.1_amd64.deb
Size/MD5: 85302 b1e62bc9c1d417a70486e3bb9b29c5b4
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.7.10.1_amd64.deb
Size/MD5: 12427100 383709c0916344ff68f4f249dde26148

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.17+nobinonly-0ubuntu0.7.10.1_i386.deb
Size/MD5: 3765864 5d2c0b0edc36c9385c4685b5e5d55c9e
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.17+nobinonly-0ubuntu0.7.10.1_i386.deb
Size/MD5: 80652 756e753fea709cb6e18c4bb5f546ea01
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.7.10.1_i386.deb
Size/MD5: 10996250 09ef12544ed1bf67fe158a2924bb16fd

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_2.0.0.17+nobinonly-0ubuntu0.7.10.1_lpia.deb
Size/MD5: 3763410 3ed2785a18d6bab7d011788e3272ff20
http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.17+nobinonly-0ubuntu0.7.10.1_lpia.deb
Size/MD5: 80340 aff494deb2f9e0af8abb090c6ce706ce
http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.7.10.1_lpia.deb
Size/MD5: 10833610 c055086b72752679c15534355ae9be9d

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.17+nobinonly-0ubuntu0.7.10.1_powerpc.deb
Size/MD5: 3781224 ffed854520ee045553dcdc54a839177b
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.17+nobinonly-0ubuntu0.7.10.1_powerpc.deb
Size/MD5: 83682 69652a9d04debe2b37a46389a1ad4aac
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.7.10.1_powerpc.deb
Size/MD5: 12272036 4aa9bea60b4d60d3bf99d71145c1b067

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.17+nobinonly-0ubuntu0.7.10.1_sparc.deb
Size/MD5: 3763452 5ce7b29a1fdc99f4d1ca4f6a6cfe0899
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.17+nobinonly-0ubuntu0.7.10.1_sparc.deb
Size/MD5: 80068 23560fd6f7bd66dde0b5dcdcfcad7505
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.7.10.1_sparc.deb
Size/MD5: 11264638 8124ba427d9cde6eac0bca875cc794a3

Updated packages for Ubuntu 8.04 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.8.04.1.diff.gz
Size/MD5: 129247 e95fcd549e87668b600192f2f3195f38
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.8.04.1.dsc
Size/MD5: 2319 60a1b2f776937320cf4e7d50acc27139
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly.orig.tar.gz
Size/MD5: 37867495 28a872ebd677569f6f7e340f9a247f0e

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/mozilla-thunderbird-dev_2.0.0.17+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 60438 e1843cd820549fee1bcd0e997114936c
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/mozilla-thunderbird_2.0.0.17+nobinonly-0ubuntu0.8.04.1_all.deb
Size/MD5: 60420 98644c43ea64a3cfc2c545560e696510

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.17+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 3778292 4181ea03dc4c8659765749cbba8b9762
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.17+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 85326 e5e1e8b1bf39185e32e1a9dab2d5abe5
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 12406704 3f337ee29d1e599892234c6498e7adeb

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-dev_2.0.0.17+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 3766262 bc355ec8523a06281d8e7a39ebec5555
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.17+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 80736 35a99547527b5833e4c597537c0a6735
http://security.ubuntu.com/ubuntu/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.8.04.1_i386.deb
Size/MD5: 10980452 4f753d15f88aec49e0f5863800bd0f9f

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_2.0.0.17+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 3764020 b3d26cd80965e257e4286ac183050d4a
http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.17+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 80472 9cfedeebdb429441a86a10d1d3cb72fe
http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 10825106 d5840b4c610a85ce95c6db6ac5dda0a4

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_2.0.0.17+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 3782130 a573a11a88bea1659a35a41581ddfb56
http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.17+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 83724 b6d7bf90279f89083be54883f8642365
http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 12253850 83659b4e1b069bf705789552cfe2076c

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-dev_2.0.0.17+nobinonly-0ubuntu0.8.04.1_sparc.deb
Size/MD5: 3764312 5a529bff8198a3259b616dcd3ed7d25a
http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird-gnome-support_2.0.0.17+nobinonly-0ubuntu0.8.04.1_sparc.deb
Size/MD5: 80190 bdc98a74366eb558b4cb269f062d13dc
http://ports.ubuntu.com/pool/main/t/thunderbird/thunderbird_2.0.0.17+nobinonly-0ubuntu0.8.04.1_sparc.deb
Size/MD5: 11251876 f92509c8a34bf841a7ee67a1fdad176e


-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20080925/abe1ea2c/attachment.pgp

------------------------------

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


End of ubuntu-security-announce Digest, Vol 48, Issue 9
*******************************************************

No comments:

Blog Archive