The OVAL Repository5.102015-09-03T10:48:08.492-04:00USN-1234-1 -- acpid vulnerabilityUbuntu 11.04Ubuntu 10.10Ubuntu 10.04acpidacpid could be made to stall under certain conditions.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1238-1 -- puppet vulnerabilityUbuntu 11.10Ubuntu 11.04Ubuntu 10.10Ubuntu 10.04puppetThe Puppet master server could be impersonated in certain configurations.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1226-2 -- cifs-utils vulnerabilitiesUbuntu 11.04Ubuntu 10.10cifs-utilsAn attacker could trick cifs-utils into corrupting the system mtab file.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1061-1 -- italc vulnerabilityUbuntu 9.10Ubuntu 10.04Ubuntu 10.10italcStphane Graber discovered that the iTALC private keys shipped with the Edubuntu Live DVD were not correctly regenerated once Edubuntu was installed.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1237-1 -- pam vulnerabilitiesUbuntu 11.10Ubuntu 11.04Ubuntu 10.10Ubuntu 10.04Ubuntu 8.04pamPAM could be made to crash or run programs as an administrator.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1233-1 -- krb5 vulnerabilitiesUbuntu 11.10Ubuntu 11.04Ubuntu 10.10Ubuntu 10.04krb5Several denial of service issues were fixed in the Kerberos Key Distribution Center (KDC).Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1232-3 -- xorg-server vulnerabilityUbuntu 10.10Ubuntu 10.04xorg-serverThe X server could be made to crash or run programs as an administrator.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1091-1 -- firefox, firefox-{3.0,3.5}, xulrunner-1.9.2 vulnerabilitiesUbuntu 8.04Ubuntu 9.10Ubuntu 10.04Ubuntu 10.10firefoxfirefox-3.0firefox-3.5xulrunner-1.9.2It was discovered that several invalid HTTPS certificates were issued and revoked.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDUSN-1209-1 -- ffmpeg vulnerabilitiesUbuntu 10.10Ubuntu 10.04ffmpegFFmpeg could be made to run programs as your login if it opened a specially crafted file.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1213-1 -- thunderbird vulnerabilitiesUbuntu 11.04Ubuntu 10.10Ubuntu 10.04thunderbirdMultiple vulnerabilities were fixed in Thunderbird.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1227-1 -- linux vulnerabilitiesUbuntu 10.10linuxMultiple kernel flaws have been fixed.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1231-1 -- php5 vulnerabilitiesUbuntu 11.10Ubuntu 11.04Ubuntu 10.10Ubuntu 10.04Ubuntu 8.04php5Several security issues were fixed in PHP.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1221-1 -- mutt vulnerabilityUbuntu 11.04Ubuntu 10.10Ubuntu 10.04muttAn attacker could trick mutt into trusting a rogue server.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1214-1 -- gimp vulnerabilityUbuntu 11.04Ubuntu 10.10Ubuntu 10.04gimpGIMP could be made to run programs as your login if it opened a specially crafted GIF file.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1215-1 -- apt vulnerabilitiesUbuntu 11.04Ubuntu 10.10Ubuntu 10.04Ubuntu 8.04aptAn attacker could trick APT into installing altered packages.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1223-1 -- puppet vulnerabilitiesUbuntu 11.04Ubuntu 10.10Ubuntu 10.04puppetPuppet could be made to overwrite files and run programs with administrator privileges.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1230-1 -- quassel vulnerabilityUbuntu 11.04Ubuntu 10.10Ubuntu 10.04quasselAn unprivileged user could read files in the data and logging directories, including an automatically generated SSL certificate, used by the quasselcore daemon.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDUSN-1244-1 -- linux-ti-omap4 vulnerabilitiesUbuntu 10.10linux-ti-omap4Several security issues were fixed in the kernel.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1197-6 -- qt4-x11 vulnerabilityUbuntu 11.04Ubuntu 10.10Ubuntu 10.04qt4-x11A certificate authority mis-issued fraudulent certificates.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDUSN-1232-1 -- xorg-server vulnerabilitiesUbuntu 11.10Ubuntu 11.04Ubuntu 10.10Ubuntu 10.04xorg-serverThe X server could be made to crash, run programs as an administrator, or read arbitrary files.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1220-1 -- linux-ti-omap4 vulnerabilitiesUbuntu 10.10linux-ti-omap4Multiple kernel flaws have been fixed.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1137-1 -- eucalyptus, rampart vulnerabilityUbuntu 11.04Ubuntu 10.10Ubuntu 10.04eucalyptusrampartAn attacker could send crafted input to Eucalyptus to run commands as a valid user.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1210-1 -- firefox, xulrunner-1.9.2 vulnerabilitiesUbuntu 10.10Ubuntu 10.04firefoxxulrunner-1.9.2Multiple vulnerabilities have been fixed in Firefox and Xulrunner.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1229-1 -- postgresql-8.3, postgresql-8.4 vulnerabilityUbuntu 11.04Ubuntu 10.10Ubuntu 10.04Ubuntu 8.04postgresql-8.4postgresql-8.3PostgreSQL incorrectly handled blowfish passwords.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1217-1 -- puppet vulnerabilityUbuntu 11.04Ubuntu 10.10Ubuntu 10.04puppetAn attacker could send crafted input to puppet and cause it to overwrite files.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1250-1 -- empathy vulnerabilitiesUbuntu 11.10Ubuntu 11.04Ubuntu 10.10Ubuntu 10.04empathyEmpathy could be made to run programs or display webpages via specially crafted nicknames.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1243-1 -- linux vulnerabilitiesUbuntu 10.10linuxSeveral security issues were fixed in the kernel.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1197-7 -- ca-certificates-java vulnerabilityUbuntu 11.10Ubuntu 11.04Ubuntu 10.10Ubuntu 10.04ca-certificates-javaA certificate authority mis-issued fraudulent certificates.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1415-1 -- linux-mvl-dove vulnerabilityUbuntu 10.10linux-mvl-doveThe system could be made to crash under certain conditions.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1248-1 -- kde4libs vulnerabilityUbuntu 11.04Ubuntu 10.10Ubuntu 10.04kde4libsKDE-Libs could improperly display fraudulent security certificates.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1418-1 -- gnutls13, gnutls26 vulnerabilitiesUbuntu 11.10Ubuntu 11.04Ubuntu 10.10Ubuntu 10.04Ubuntu 8.04gnutls26gnutls13The GnuTLS library could be made to crash under certain conditions.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1245-1 -- linux-mvl-dove vulnerabilitiesUbuntu 10.10linux-mvl-doveSeveral security issues were fixed in the kernel.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1416-1 -- tiff vulnerabilitiesUbuntu 11.10Ubuntu 11.04Ubuntu 10.10Ubuntu 10.04Ubuntu 8.04tiffThe TIFF library could be made to crash or run programs as your login if it opened a specially crafted file.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1249-1 -- backuppc vulnerabilitesUbuntu 11.10Ubuntu 11.04Ubuntu 10.10Ubuntu 10.04Ubuntu 8.04backuppcBackupPC could be made to expose sensitive information over the network.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1417-1 -- libpng vulnerabilityUbuntu 11.10Ubuntu 11.04Ubuntu 10.10Ubuntu 10.04Ubuntu 8.04libpnglibpng could be made to crash or run programs as your login if it opened a specially crafted file.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1391-1 -- Linux kernel (Marvell DOVE) vulnerabilityUbuntu 10.10Linuxlinux-mvl-dove: Linux kernel for DOVE The system could be made to crash or run programs as an administrator.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1407-1 -- Linux kernel vulnerabilitiesUbuntu 10.10Linuxlinux: Linux kernel Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1394-1 -- linux-ti-omap4 vulnerabilitiesUbuntu 10.10linux-ti-omap4linux-ti-omap4: Linux kernel for OMAP4 Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1358-2 -- PHP regressionUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10PHPphp5: HTML-embedded scripting language interpreter Details: USN 1358-1 fixed multiple vulnerabilities in PHP. The fix for CVE-2012-0831 introduced a regression where the state of the magic_quotes_gpc setting was not correctly reflected when calling the ini_get function. We apologize for the inconvenience. Original advisory USN 1358-1 introduced a regression in PHP.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1357-1 -- OpenSSL vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10OpenSSLopenssl: Secure Socket Layer binary and related cryptographic tools Multiple vulnerabilities exist in OpenSSL that could expose sensitive information or cause applications to crash.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1347-1 -- Evince vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10Evinceevince: Document viewer Evince could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1402-1 -- libpng vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10libpnglibpng: PNG file library libpng could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1367-3 -- Thunderbird vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10Thunderbirdthunderbird: Mozilla Open Source mail and newsgroup client Details: USN-1367-1 fixed vulnerabilities in libpng. This provides the corresponding update for Thunderbird. Original advisory Thunderbird could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1373-2 -- OpenJDK 6 (ARM) vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10OpenJDKopenjdk-6b18: Open Source Java implementation Details: USN 1373-1 fixed vulnerabilities in OpenJDK 6 in Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04 for all architectures except for ARM . This provides the corresponding OpenJDK 6 update for use with the ARM architecture in Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. Original advisory Multiple vulnerabilities in OpenJDK 6 for the ARM architecture have been fixed.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1376-1 -- libxml2 vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10libxml2libxml2: GNOME XML library libxml2 could be made to cause a denial of service by consuming excessive CPU resources.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1353-1 -- Xulrunnner vulnerabilitiesUbuntu 10.10Ubuntu 10.04Xulrunnnerxulrunner-1.9.2: Mozilla Gecko runtime environment Several security issues were fixed in Xulrunner.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1307-1 -- PHP vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10PHPphp5: HTML-embedded scripting language interpreter PHP could be made to crash or disclose sensitive information if it processed a specially crafted image file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1334-1 -- libxml2 vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10libxml2libxml2: GNOME XML library Applications using libxml2 could be made to crash or run programs as your login if they opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1297-1 -- Django vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10Djangopython-django: High-level Python web development framework Applications using Django could be made to crash or expose sensitive information.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1293-1 -- Linux kernel vulnerabilitiesUbuntu 10.10Linuxlinux: Linux kernel Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1267-1 -- FreeType vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10FreeTypefreetype: FreeType 2 is a font engine library FreeType could be made to crash or run programs as your login if it opened a specially crafted font file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1341-1 -- Linux kernel vulnerabilitiesUbuntu 10.10Linuxlinux: Linux kernel Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1316-1 -- t1lib vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10t1libt1lib: Type 1 font rasterizer library - runtime t1lib could be made to crash or run programs as your login if it opened a specially crafted font file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1252-1 -- Tomcat vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10Tomcattomcat6: Servlet and JSP engine Tomcat could be made to crash or expose sensitive information over the network.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1266-1 -- OpenLDAP vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10OpenLDAPopenldap: OpenLDAP utilities An OpenLDAP server could potentially be made to crash if it received specially crafted network traffic from an authenticated user.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1367-1 -- libpng vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10libpnglibpng: PNG file library libpng could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1355-3 -- ubufox and webfav updateUbuntu 10.10Ubuntu 10.04ubufoxubufox: Ubuntu Firefox specific configuration defaults and apt support - webfav: Firefox extension for saving web favorites Details: USN-1355-1 fixed vulnerabilities in Firefox. This update provides updated ubufox and webfav packages for use with the latest Firefox. Original advisory This update provides compatible ubufox and webfav packages for the latest Firefox.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1371-1 -- cvs vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10cvscvs: Concurrent Versions System cvs could be made to crash or run programs as your login if it connected to a malicious proxy server.SecPod TeamDRAFTINTERIMACCEPTEDChandan SINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1348-1 -- ICU vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10ICUicu: International Components for Unicode library ICU could be made to crash or run programs as your login if it opened specially crafted data.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1370-1 -- libvorbis vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10libvorbislibvorbis: The Vorbis General Audio Compression Codec libvorbis could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1202-1 -- Linux kernel (OMAP4) vulnerabilitiesUbuntu 10.10Linuxlinux-ti-omap4: Linux kernel for OMAP4 Multiple kernel flaws have been fixed.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1355-2 -- Mozvoikko updateUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10Mozvoikkomozvoikko: Finnish spell-checker extension for Firefox Details: USN-1355-1 fixed vulnerabilities in Firefox. This update provides an updated Mozvoikko package for use with the latest Firefox. Original advisory This update provides compatible Mozvoikko packages for the latest Firefox.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1308-1 -- bzip2 vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10bzip2bzip2: high-quality block-sorting file compressor - utilities Executables compressed by bzexe could be made to run programs as your login.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1185-1 -- Thunderbird vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10Thunderbirdthunderbird: Mozilla Open Source mail and newsgroup client Multiple vulnerabilities have been fixed in Thunderbird.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1251-1 -- Firefox and Xulrunner vulnerabilitiesUbuntu 10.10Ubuntu 10.04Firefoxfirefox: Mozilla Open Source web browser - xulrunner-1.9.2: Mozilla Gecko runtime environment Multiple vulnerabilities have been fixed in Firefox and Xulrunner.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1206-1 -- librsvg vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10librsvglibrsvg: Rendering library for SVG files SVG image rendering library has had flaws fixed.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1264-1 -- Bind vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10Bindbind9: Internet Domain Name Server Bind could be made to crash if it received specially crafted network traffic.SecPod TeamDRAFTINTERIMACCEPTEDChandan SINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1325-1 -- Linux kernel (OMAP4) vulnerabilitiesUbuntu 10.10Linuxlinux-ti-omap4: Linux kernel for OMAP4 Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1199-1 -- Apache vulnerabilityUbuntu 11.04Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10Apacheapache2: Apache HTTP server A remote attacker could send crafted input to Apache and cause it to crash.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1314-1 -- Python 3 vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10Pythonpython3.1: An interactive high-level object-oriented language - python3.2: An interactive high-level object-oriented language Applications using certain Python 3 modules could be made to crash or expose sensitive information over the network.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1263-2 -- OpenJDK 6 regressionUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10OpenJDKopenjdk-6: Open Source Java implementation - openjdk-6b18: Open Source Java implementation Details: USN-1263-1 fixed vulnerabilities in OpenJDK 6. The upstream patch for the chosen plaintext attack on the block-wise AES encryption algorithm introduced a regression that caused TLS/SSL connections to fail when using certain algorithms. This update fixes the problem. We apologize for the inconvenience. Original advisory USN-1263-1 caused a regression when using OpenJDK 6�s SSL/TLS implementation.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1373-1 -- OpenJDK 6 vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10OpenJDKopenjdk-6: Open Source Java implementation Multiple OpenJDK 6 vulnerabilities have been fixed.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1400-1 -- Firefox vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10Firefoxfirefox: Mozilla Open Source web browser Several security issues were fixed in Firefox.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1263-1 -- IcedTea-Web, OpenJDK 6 vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10IcedTea-Webicedtea-web: A web browser plugin to execute Java applets - openjdk-6: Open Source Java implementation - openjdk-6b18: Open Source Java implementation Multiple OpenJDK 6 and IcedTea-Web vulnerabilities have been fixed.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1368-1 -- Apache HTTP Server vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10Apacheapache2: Apache HTTP server Several security issues were fixed in the Apache HTTP Server.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1399-1 -- gdm-guest-session vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10gdm-guest-sessiongdm-guest-session: gdm extension for guest session gdm-guest-session could be made to delete files as the administrator.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1270-1 -- Software Center vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.10Softwaresoftware-center: Utility for browsing, installing, and removing software An attacker could trick Software Center into installing altered packages and repositories or exposing sensitive information over the network.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1328-1 -- Linux kernel (Marvell DOVE) vulnerabilitiesUbuntu 10.10Linuxlinux-mvl-dove: Linux kernel for DOVE Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1201-1 -- Linux kernel vulnerabilitiesUbuntu 10.10Linuxlinux: Linux kernel Multiple kernel flaws have been fixed.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1400-2 -- ubufox updateUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10ubufoxubufox: Finnish spell-checker extension for Firefox Details: USN-1400-1 fixed vulnerabilities in Firefox. This update provides an updated ubufox package for use with the latest Firefox. Original advisory This update provides compatible ubufox packages for the latest Firefox.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1284-2 -- Update Manager regressionUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10Update-Managerupdate-manager: GNOME application that manages apt updates Details: USN-1284-1 fixed vulnerabilities in Update Manager. One of the fixes introduced a regression for Kubuntu users attempting to upgrade to a newer Ubuntu release. This update fixes the problem. We apologize for the inconvenience. Original advisory USN-1284-1 introduced a regression in Update Manager.SecPod TeamDRAFTINTERIMACCEPTEDChandan SINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1200-1 -- Quassel vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10Quasselquassel: KDE/Qt-based IRC client A remote attacker could send crafted input to Quassel and cause it to crash.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1315-1 -- JasPer vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10JasPerjasper: Library for manipulating JPEG-2000 files JasPer could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1365-1 -- Puppet vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.10Puppetpuppet: Centralized configuration management Puppet would allow unintended access to resources over the network.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1375-1 -- httplib2 vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10httplib2python-httplib2: comprehensive HTTP client library written for Python httplib2 could be made to expose sensitive information over the network.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1184-1 -- Firefox and Xulrunner vulnerabilitiesUbuntu 10.10Ubuntu 10.04Firefoxfirefox: Mozilla Open Source web browser - xulrunner-1.9.2: Mozilla Gecko runtime environment Multiple vulnerabilities have been fixed in Firefox and Xulrunner.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1396-1 -- GNU C Library vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10GNUeglibc: Embedded GNU C Library: sources - glibc: GNU C Library: Documentation Multiple vulnerabilities were discovered and fixed in the GNU C Library.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1358-1 -- PHP vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10PHPphp5: HTML-embedded scripting language interpreter Multiple vulnerabilities in PHP.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1350-1 -- Thunderbird vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10Thunderbirdthunderbird: Mozilla Open Source mail and newsgroup client Several security issues were fixed in Thunderbird.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1261-1 -- Quagga vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10Quaggaquagga: BGP/OSPF/RIP routing daemon Quagga could be made to crash or run programs if it received specially crafted network traffic.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1372-1 -- Puppet vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10Puppetpuppet: Centralized configuration management Puppet could be made to overwrite files and run programs with administrator privileges.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1259-1 -- Apache vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10Apacheapache2: Apache HTTP server - apache2-mpm-itk: multiuser MPM for Apache 2.2 Details: It was discovered that the mod_proxy module in Apache did not properly interact with the RewriteRule and ProxyPassMatch pattern matches in the configuration of a reverse proxy. This could allow remote attackers to contact internal webservers behind the proxy that were not intended for external exposure. Stefano Nichele discovered that the mod_proxy_ajp module in Apache when used with mod_proxy_balancer in certain configurations could allow remote attackers to cause a denial of service via a malformed HTTP request. Samuel Montosa discovered that the ITK Multi-Processing Module for Apache did not properly handle certain configuration sections that specify NiceValue but not AssignUserID, preventing Apache from dropping privileges correctly. This issue only affected Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. USN 1199-1 fixed a vulnerability in the byterange filter of Apache. The upstream patch introduced a regression in Apache when handling specific byte range requests. This update fixes the issue. Original advisory Multiple vulnerabilities and a regression were fixed in the Apache HTTP server.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1296-1 -- acpid vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10acpidacpid: Advanced Configuration and Power Interface daemon Several security issues were fixed in acpid.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1288-1 -- vsftpd vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10vsftpdvsftpd: FTP server written for security Vsftpd or other applications could be made to crash if vsftpd received specially crafted network traffic.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1303-1 -- Linux kernel (Marvell DOVE) vulnerabilitiesUbuntu 10.10Linuxlinux-mvl-dove: Linux kernel for DOVE Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1367-4 -- Xulrunner vulnerabilityUbuntu 10.10Ubuntu 10.04Xulrunnerxulrunner-1.9.2: Mozilla Gecko runtime environment Details: USN-1367-1 fixed vulnerabilities in libpng. This provides the corresponding update for Xulrunner. Original advisory Xulrunner based applications could be made to crash or run programs as your login if they opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1302-1 -- Linux kernel (OMAP4) vulnerabilitiesUbuntu 10.10Linuxlinux-ti-omap4: Linux kernel for OMAP4 Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1197-5 -- CA Certificates vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10CAca-certificates: Common CA certificates Details: USN-1197-1 addressed an issue in Firefox and Xulrunner pertaining to the Dutch Certificate Authority DigiNotar mis-issuing fraudulent certificates. This update provides the corresponding update for ca-certificates. Original advisory A certificate authority mis-issued fraudulent certificates.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1378-1 -- PostgreSQL vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10PostgreSQLpostgresql-9.1: Object-relational SQL database - postgresql-8.4: Object-relational SQL database - postgresql-8.3: Object-relational SQL database Several security issues were fixed in PostgreSQL.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1377-1 -- Ruby vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10Rubyruby1.8: Interpreter of object-oriented scripting language Ruby 1.8 Several security issues were fixed in ruby1.8.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1317-1 -- Ghostscript vulnerabilitiesUbuntu 10.10Ubuntu 8.04Ubuntu 10.04Ghostscriptghostscript: The GPL Ghostscript PostScript/PDF interpreter Ghostscript could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1366-1 -- devscripts vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10devscriptsdevscripts: scripts to make the life of a Debian Package maintainer easier debdiff, a part of devscripts, could be made to run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1284-1 -- Update Manager vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10Updateupdate-manager: GNOME application that manages apt updates - update-notifier: Daemon which notifies about package updates Update Manager could be made to overwrite files as the administrator.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1403-1 -- FreeType vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10FreeTypefreetype: FreeType 2 is a font engine library FreeType could be made to crash or run programs as your login if it opened a specially crafted font file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1273-1 -- Pidgin vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10Pidginpidgin: multi-protocol instant messaging client Pidgin could be made to crash if it received specially crafted network traffic.SecPod TeamDRAFTINTERIMACCEPTEDChandan SINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1272-1 -- Linux kernel vulnerabilitiesUbuntu 10.10Linuxlinux: Linux kernel Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1335-1 -- t1lib vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10t1libt1lib: Type 1 font rasterizer library - runtime t1lib could be made to crash or run programs as your login if it opened a specially crafted font file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1188-1 -- eCryptfs vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10eCryptfsecryptfs-utils: ecryptfs cryptographic filesystem eCryptfs could be tricked into mounting and unmounting arbitrary locations, and possibly disclose confidential information.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1280-1 -- Linux (OMAP4) vulnerabilitiesUbuntu 10.10Linuxlinux-ti-omap4: Linux kernel for OMAP4 Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1207-1 -- CUPS vulnerabilitiesUbuntu 11.04Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10CUPScups: Common UNIX Printing System - server - cupsys: Common UNIX Printing System - server An attacker could send crafted print jobs to CUPS and cause it to crash or run programs.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1359-1 -- Tomcat vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10Tomcattomcat6: Servlet and JSP engine Tomcat could be made to crash or expose sensitive information if it received specially crafted network traffic.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1276-1 -- KDE Utilities vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10KDEkdeutils: KDE general-purpose utilities Ark could be made to remove files.SecPod TeamDRAFTINTERIMACCEPTEDChandan SINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1339-1 -- QEMU vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10QEMUqemu-kvm: Machine emulator and virtualizer A remote attacker could cause QEMU to crash.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1197-3 -- Firefox and Xulrunner vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10Firefoxfirefox: Mozilla Open Source web browser - xulrunner-1.9.2: Mozilla Gecko runtime environment Details: USN-1197-1 partially addressed an issue with Dutch Certificate Authority DigiNotar mis-issuing fraudulent certificates. This update actively distrusts the DigiNotar root certificate as well as several intermediary certificates. Also included in this list of distrusted certificates are the Staat der Nederlanden root certificates. Original advisory A certificate authority issued fraudulent certificates.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1346-1 -- curl vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.10curlcurl: HTTP, HTTPS, and FTP client and client libraries curl could be tricked into injecting arbitrary data if it handled a malicious URL.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1367-2 -- Firefox vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10Firefoxfirefox: Mozilla Open Source web browser Details: USN-1367-1 fixed vulnerabilities in libpng. This provides the corresponding update for Firefox. Original advisory Firefox could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1274-1 -- Linux kernel (Marvell DOVE) vulnerabilitiesUbuntu 10.10Linuxlinux-mvl-dove: Linux kernel for DOVE Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1208-1 -- Linux kernel (Marvel DOVE) vulnerabilitiesUbuntu 10.10Linuxlinux-mvl-dove: Linux kernel for DOVE Multiple kernel flaws have been fixed.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1401-2 -- Thunderbird vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10Thunderbirdthunderbird: Mozilla Open Source mail and newsgroup client Details: USN-1401-1 fixed vulnerabilities in Xulrunner. This update provides the corresponding fixes for Thunderbird. Original advisory Several security issues were fixed in Thunderbird.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1352-1 -- Software Properties vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10Softwaresoftware-properties: manage the repositories that you install software from Software Properties could be tricked into installing arbitrary PPA GPG keys.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1255-1 -- libmodplug vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10libmodpluglibmodplug: Library for mod music based on ModPlug libmodplug could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDChandan SINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1397-1 -- MySQL vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10MySQLmysql-5.1: MySQL database - mysql-dfsg-5.1: MySQL database - mysql-dfsg-5.0: MySQL database Several security issues were fixed in MySQL.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1379-1 -- Linux kernel vulnerabilitiesUbuntu 10.10Linuxlinux: Linux kernel Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1361-1 -- Linux kernel vulnerabilitiesUbuntu 10.10Linuxlinux: Linux kernel Several security issues were fixed in the kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1395-1 -- PyPAM vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10PyPAMpython-pam: A Python interface to the PAM library PyPAM could be made to crash or possibly run programs if it processed a specially crafted password.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1310-1 -- libarchive vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10libarchivelibarchive: Library to read/write archive files libarchive could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1254-1 -- Thunderbird vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10Thunderbirdthunderbird: Mozilla Open Source mail and newsgroup client Multiple vulnerabilities have been fixed in Thunderbird.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1197-2 -- Thunderbird vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10Thunderbirdthunderbird: Mozilla Open Source mail and newsgroup client Details: USN-1197-1 fixed a vulnerability in Firefox with regard to the DigiNotar certificate authority. This update provides the corresponding updates for Thunderbird. We are aware that the DigiNotar Root CA Certificate is still shown as trusted in the Thunderbird certificate manager. This is due to Thunderbird using the system version of the Network Security Service libraries . Thunderbird will actively distrust any certificate signed by this DigiNotar Root CA certificate. This means that users will still get an untrusted certificate warning when accessing a service through Thunderbird that presents a certificate signed by this DigiNotar Root CA certificate. Original advisory A certificate authority issued fraudulent certificates.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1197-4 -- NSS vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10NSSnss: Network Security Service libraries Details: USN-1197-1 and USN-1197-3 addressed an issue in Firefox and Xulrunner pertaining to the Dutch Certificate Authority DigiNotar mis-issuing fraudulent certificates. This update provides the corresponding update for the Network Security Service libraries . Original advisory A certificate authority mis-issued fraudulent certificates.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1360-1 -- Firefox vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10Firefoxfirefox: Mozilla Open Source web browser A security vulnerability has been fixed in Firefox.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1190-1 -- DHCP vulnerabilitiesUbuntu 11.04Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10DHCPisc-dhcp: DHCP server and client - dhcp3: DHCP server and client An attacker could send crafted input to DHCP and cause it to crash.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1401-1 -- Xulrunner vulnerabilitiesUbuntu 10.10Ubuntu 10.04Xulrunnerxulrunner-1.9.2: Mozilla Gecko runtime environment Several security issues were fixed in Firefox.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1257-1 -- radvd vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10radvdradvd: Router Advertisement Daemon radvd could be made to crash or overwrite certain files if it received specially crafted network traffic.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1320-1 -- FFmpeg vulnerabilitiesUbuntu 10.10Ubuntu 10.04FFmpegffmpeg: multimedia player, server and encoder FFmpeg could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDChandan SINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1191-1 -- libXfont vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10libXfontlibxfont: X11 font rasterisation library libXfont could be made to run programs as an administrator if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1283-1 -- APT vulnerabilityUbuntu 11.04Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10APTapt: Advanced front-end for dpkg Details: It was discovered that APT incorrectly handled the Verify-Host configuration option. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to steal repository credentials. This issue only affected Ubuntu 10.04 LTS and 10.10. USN-1215-1 fixed a vulnerability in APT by disabling the apt-key net-update option. This update re-enables the option with corrected verification. Original advisory APT could be made to expose sensitive information over the network.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1355-1 -- Firefox vulnerabilitiesUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10Firefoxfirefox: Mozilla Open Source web browser Several security issues were fixed in Firefox.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1349-1 -- X.Org vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10X.Orgxorg: X.Org X Window System X could be made to start by a user who lacked appropriate permissions.SecPod TeamDRAFTINTERIMACCEPTEDChandan SINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1258-1 -- ClamAV vulnerabilityUbuntu 11.04Ubuntu 11.10Ubuntu 10.04Ubuntu 10.10ClamAVclamav: Anti-virus utility for Unix ClamAV could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUbuntu 11.10 is installedUbuntu 11.10Ubuntu 11.10 is installedSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1197-1 -- Firefox and Xulrunner vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10Firefoxfirefox: Mozilla Open Source web browser - xulrunner-1.9.2: Mozilla Gecko runtime environment A certificate authority issued fraudulent certificates.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1163-1 -- bind9 vulnerabilityUbuntu 11.04Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10bind9bind9: Internet Domain Name Server An attacker could send crafted input to Bind and cause it to crash.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1195-1 -- webkit vulnerabilitiesUbuntu 10.10Ubuntu 10.04webkitwebkit: Web content engine library for GTK+ Multiple security vulnerabilities were fixed in WebKit.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1177-1 -- qemu-kvm vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10qemu-kvmqemu-kvm: Machine emulator and virtualizer QEMU could be made to run with adminstrator group privileges under certain circumstances.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1196-1 -- ecryptfs-utils vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10ecryptfs-utilsecryptfs-utils: ecryptfs cryptographic filesystem An attacker could use eCryptfs to unmount arbitrary locations and cause a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1174-1 -- libsndfile vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10libsndfilelibsndfile: Library for reading/writing audio files An application using libsndfile could be made to crash or possibly run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1149-1 -- firefox, xulrunner-1.9.2 vulnerabilitiesUbuntu 10.10Ubuntu 10.04firefoxxulrunner-1.9.2firefox: safe and easy web browser from Mozilla - xulrunner-1.9.2: XUL + XPCOM application runner Multiple Vulnerabilities were fixed in Firefox and XulrunnerSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1154-1 -- openjdk-6, openjdk-6b18 vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10openjdk-6openjdk-6b18openjdk-6: Open Source Java implementation - openjdk-6b18: Open Source Java implementation Multiple OpenJDK 6 vulnerabilities have been fixed.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1175-1 -- libpng vulnerabilitiesUbuntu 11.04Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10libpnglibpng: PNG file library Libpng could be made to run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1147-1 -- gimp vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10gimpgimp: The GNU Image Manipulation Program GIMP could be made to run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1171-1 -- likewise-open vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10likewise-openlikewise-open: Authentication services for Active Directory domains Local SQL injection vulnerabilitySecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1178-1 -- icedtea-web, openjdk-6, openjdk-6b18 vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10icedtea-webopenjdk-6openjdk-6b18icedtea-web: An implementation of the Java Network Launching Protocol - openjdk-6: Open Source Java implementation - openjdk-6b18: Open Source Java implementation An attacker could discover a user�s name or confuse a user into granting unintended access to files.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1124-1 -- rsync vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04rsyncrsync: fast remote file copy program rsync could be made to crash or run programs as your login if it connected to a malicious server.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1130-1 -- exim4 vulnerabilityUbuntu 10.10Ubuntu 10.04exim4exim4: Exim mail transfer agent Exim could be made to run arbitrary code under some conditions.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1194-1 -- foomatic-filters vulnerabilitiesUbuntu 11.04Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10foomatic-filtersfoomatic-filters: OpenPrinting printer support - filters An attacker could send crafted input to Foomatic and cause it to run programs as the "lp" user.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1143-1 -- dovecot vulnerabilityUbuntu 10.10Ubuntu 10.04dovecotdovecot: IMAP and POP3 email server an attacker could send a crafted email message that could disrupt email service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1145-1 -- qemu-kvm vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10qemu-kvmqemu-kvm: Machine emulator and virtualizer a privileged attacker within a QEMU guest could cause QEMU to crash.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1112-1 -- firefox, firefox-3.0, firefox-3.5, xulrunner-1.9.2 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04firefoxfirefox-3.0firefox-3.5xulrunner-1.9.2firefox: safe and easy web browser from Mozilla - xulrunner-1.9.2: XUL + XPCOM application runner - firefox-3.5: safe and easy web browser from Mozilla - firefox-3.0: safe and easy web browser from Mozilla Multiple vulnerabilities in Firefox and XulrunnerSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1122-1 -- thunderbird vulnerabilitiesUbuntu 10.10Ubuntu 10.04thunderbirdthunderbird: mail/news client with RSS and integrated spam filter support Thunderbird could be made to run programs as your login if it opened specially crafted mail.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1126-1 -- php5 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 6.06Ubuntu 9.10Ubuntu 10.04php5php5: HTML-embedded scripting language interpreter Multiple vulnerabilities in PHP.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1118-1 -- openslp, openslp-dfsg vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 6.06Ubuntu 9.10Ubuntu 10.04openslpopenslp-dfsgopenslp-dfsg: OpenSLP is an implementation of the Service Location Protocol - openslp: OpenSLP is an implementation of the Service Location Protocol An attacker could send crafted input to OpenSLP and cause it to hang.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1149-2 -- firefox regressionUbuntu 10.10Ubuntu 10.04firefoxfirefox: safe and easy web browser from Mozilla Details: USN-1149-1 fixed vulnerabilities in Firefox. Unfortunately, a regression was introduced that prevented cookies from being stored properly when the hostname was a single character. This update fixes the problem. We apologize for the inconvenience. Original advisory In rare instances, Firefox could have trouble accessing some websites.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1140-1 -- pam vulnerabilitiesUbuntu 10.10Ubuntu 8.04Ubuntu 10.04pampam: Pluggable Authentication Modules An attacker could cause PAM to read or delete arbitrary files or cause it to crash.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1152-1 -- libvirt vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10libvirtlibvirt: Libvirt virtualization toolkit Libvirt could be made to crash or read arbitrary files on the host.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1165-1 -- qemu-kvm vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10qemu-kvmqemu-kvm: Machine emulator and virtualizer A privileged attacker within a QEMU guest could cause QEMU to crash.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1131-1 -- postfix vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 6.06Ubuntu 10.04postfixpostfix: High-performance mail transport agent An attacker could send crafted input to Postfix and cause it to crash or run programs.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1180-1 -- libvirt vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10libvirtlibvirt: Libvirt virtualization toolkit An authenticated attacker could send crafted input to libvirt and cause it to crash.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1126-2 -- php5 regressionsUbuntu 8.04Ubuntu 10.10Ubuntu 6.06Ubuntu 9.10Ubuntu 10.04phpphp5: HTML-embedded scripting language interpreter Details: USN 1126-1 fixed several vulnerabilities in PHP. The fix for CVE-2010-4697 introduced an incorrect reference counting regression in the Zend engine that caused the PHP interpreter to segfault. This regression affects Ubuntu 6.06 LTS and Ubuntu 8.04 LTS. The fixes for CVE-2011-1072 and CVE-2011-1144 introduced a regression in the PEAR installer that prevented it from creating its cache directory and reporting errors correctly. We apologize for the inconvenience. Original advisory USN 1126-1 introduced two regressions in PHP.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1119-1 -- linux-ti-omap4 vulnerabilitiesUbuntu 10.10linux-ti-omap4linux-ti-omap4: Linux kernel for OMAP4 devices Multiple security flaws have been fixed in the OMAP4 port of the Linux kernel.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1108-2 -- dhcp3 vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04dhcp3dhcp3: DHCP Client Details: USN-1108-1 fixed vulnerabilities in DHCP. Due to an error, the patch to fix the vulnerability was not properly applied on Ubuntu 9.10 and higher. This update fixes the problem. Original advisory An attacker�s DHCP server could send crafted responses to your computer and cause it to run programs as root.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1129-1 -- perl vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 6.06Ubuntu 10.04perlperl: Larry Wall�s Practical Extraction and Report Language An attacker could send crafted input to Perl and bypass intended restrictions.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1127-1 -- usb-creator vulnerabilityUbuntu 10.10Ubuntu 10.04usb-creatorusb-creator: create a startup disk using a CD or disc image An attacker could use usb-creator to unmount arbitrary disks or perform other unauthorized disk operations.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1183-1 -- linux vulnerabilitiesUbuntu 10.10linuxlinux: Linux kernel Multiple kernel flaws have been fixed.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1159-1 -- linux-mvl-dove vulnerabilitiesUbuntu 10.10linux-mvl-dovelinux-mvl-dove: Linux kernel for DOVE Multiple kernel flaws have been fixed.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1114-1 -- kdenetwork vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04kdenetworkkdenetwork: networking applications for KDE 4 An attacker could overwrite files owned by the user if KGet opened a crafted metalink file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1173-1 -- freetype vulnerabilityUbuntu 11.04Ubuntu 10.10freetypefreetype: FreeType 2 is a font engine library FreeType could be made to run programs as your login if it opened a specially crafted font file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1132-1 -- apturl vulnerabilityUbuntu 10.10Ubuntu 10.04apturlapturl: installs packages using the apt protocol apturl could be made to cause your desktop to crash if it opened a very long URL.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1110-1 -- kde4libs vulnerabilitiesUbuntu 10.10Ubuntu 9.10Ubuntu 10.04kde4libskde4libs: KDE 4 core applications An attacker could send crafted input to Konqueror to view sensitive information.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1128-1 -- vino vulnerabilitiesUbuntu 10.10Ubuntu 8.04Ubuntu 10.04vinovino: VNC server for GNOME An attacker could send crafted input to Vino and cause it to crash.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1155-1 -- nbd vulnerabilityUbuntu 10.10Ubuntu 8.04Ubuntu 10.04nbdnbd: Network Block Device protocol An attacker could send crafted input to NBD and cause it to crash or to run arbitrary programs.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1136-1 -- rdesktop vulnerabilityUbuntu 10.10Ubuntu 10.04rdesktoprdesktop: RDP client for Windows NT/2000 Terminal Server An attacker could access your files if rdesktop connected to a malicious server.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1108-1 -- dhcp3 vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06dhcp3Sebastian Krahmer discovered that the dhclient utility incorrectly filtered crafted responses. An attacker could use this flaw with a malicious DHCP server to execute arbitrary code, resulting in root privilege escalation.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1101-1 -- qt4-x11 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04qt4-x11It was discovered that several invalid HTTPS certificates were issued and revoked. An attacker could exploit these to perform a man in the middle attack to view sensitive information or alter encrypted communications. These were placed on the certificate blacklist to prevent their misuse.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1097-1 -- tomcat6 vulnerabilitiesUbuntu 10.10Ubuntu 9.10Ubuntu 10.04tomcat6It was discovered that the Tomcat SecurityManager did not properly restrict the working directory. An attacker could use this flaw to read or write files outside of the intended working directory. It was discovered that Tomcat did not properly escape certain parameters in the Manager application which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. It was discovered that Tomcat incorrectly enforced the maxHttpHeaderSize limit in certain configurations. A remote attacker could use this flaw to cause Tomcat to consume all available memory, resulting in a denial of serviceSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1094-1 -- libvirt vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04libvirtPetr Matousek discovered that libvirt did not always honor read-only connections. An attacker who is authorized to connect to the libvirt daemon could exploit this to cause a denial of service via application crash.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1099-1 -- gdm vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04gdmSebastian Krahmer discovered that GDM did not properly drop privileges when handling the cache directories used to store users" dmrc and face icon files. This could allow a local attacker to change the ownership of arbitrary files, thereby gaining root privileges.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1098-1 -- vsftpd vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06vsftpdIt was discovered that vsftpd incorrectly handled certain glob expressions. A remote authenticated user could use a crafted glob expression to cause vftpd to consume all resources, leading to a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1144-1 -- subversion vulnerabilitiesUbuntu 10.10Ubuntu 10.04subversionsubversion: Advanced version control system an attacker could send crafted input to the Subversion mod_dav_svn module for Apache and cause it to crash or gain access to restricted files.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1109-1 -- gimp vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04gimpIt was discovered that GIMP incorrectly handled malformed data in certain plugin configuration files. If a user were tricked into opening a specially crafted plugin configuration file, an attacker could cause GIMP to crash, or possibly execute arbitrary code with the user�s privileges. The default compiler options for affected releases should reduce the vulnerability to a denial of service. It was discovered that GIMP incorrectly handled malformed PSP image files. If a user were tricked into opening a specially crafted PSP image file, an attacker could cause GIMP to crash, or possibly execute arbitrary code with the user�s privilegesSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1096-1 -- subversion vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06subversionPhilip Martin discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain requests containing a lock token. A remote attacker could use this flaw to cause the service to crash, leading to a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1103-1 -- tex-common vulnerabilityUbuntu 10.10Ubuntu 10.04tex-commonMathias Svensson discovered that the tex-common package contains an insecure shell_escape_commands configuration item. If a user or automated system were tricked into opening a specially crafted TeX file, a remote attacker could execute arbitrary code with user privileges.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1115-1 -- language-selector vulnerabilityUbuntu 10.10language-selectorlanguage-selector: Language selector for Ubuntu Linux Local users could gain root access via the language-selector.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1117-1 -- policykit-1 vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04policykit-1policykit-1: framework for managing administrative policies and privileges Local users could gain root access by using the pkexec tool in PolicyKit.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1181-1 -- libsoup2.4 vulnerabilityUbuntu 11.04Ubuntu 10.04Ubuntu 10.10libsoup2.4libsoup2.4: HTTP client/server library for GNOME An attacker could send crafted URLs to a SoupServer application and obtain unintended access to files.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1120-1 -- tiff vulnerabilityUbuntu 10.10Ubuntu 10.04tifftiff: TIFF manipulation and conversion tools The TIFF library could be made to run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1148-1 -- libmodplug vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10libmodpluglibmodplug: Library for mod music based on ModPlug libmodplug could be made to run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1090-1 -- linux vulnerabilitiesUbuntu 10.10Ubuntu 10.04linuxDan Rosenberg discovered that multiple terminal ioctls did not correctly initialize structure memory. A local attacker could exploit this to read portions of kernel stack memory, leading to a loss of privacy. Dan Rosenberg discovered that the socket filters did not correctly initialize structure memory. A local attacker could create malicious filters to read portions of kernel stack memory, leading to a loss of privacy. Dan Rosenberg discovered that the SCSI subsystem did not correctly validate iov segments. A local attacker with access to a SCSI device could send specially crafted requests to crash the system, leading to a denial of service. Dan Rosenberg discovered that the RDS protocol did not correctly check ioctl arguments. A local attacker could exploit this to crash the system, leading to a denial of serviceSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1056-1 -- openoffice.org vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04openoffice.orgCharlie Miller discovered several heap overflows in PPT processing. If a user or automated system were tricked into opening a specially crafted PPT document, a remote attacker could execute arbitrary code with user privileges. Ubuntu 10.10 was not affected. Marc Schoenefeld discovered that directory traversal was not correctly handled in XSLT, OXT, JAR, or ZIP files. If a user or automated system were tricked into opening a specially crafted document, a remote attacker overwrite arbitrary files, possibly leading to arbitrary code execution with user privileges. Dan Rosenberg discovered multiple heap overflows in RTF and DOC processing. If a user or automated system were tricked into opening a specially crafted RTF or DOC document, a remote attacker could execute arbitrary code with user privileges. Dmitri Gribenko discovered that OpenOffice.org did not correctly handle LD_LIBRARY_PATH in various tools. If a local attacker tricked a user or automated system into using OpenOffice.org from an attacker-controlled directory, they could execute arbitrary code with user privileges. Marc Schoenefeld discovered that OpenOffice.org did not correctly process PNG images. If a user or automated system were tricked into opening a specially crafted document, a remote attacker could execute arbitrary code with user privileges. It was discovered that OpenOffice.org did not correctly process TGA images. If a user or automated system were tricked into opening a specially crafted document, a remote attacker could execute arbitrary code with user privilegesSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1060-1 -- exim4 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06exim4It was discovered that Exim contained a design flaw in the way it processed alternate configuration files. An attacker that obtained privileges of the "Debian-exim" user could use an alternate configuration file to obtain root privileges. It was discovered that Exim incorrectly handled certain return values when handling logging. A local attacker could use this flaw to obtain root privileges. Dan Rosenberg discovered that Exim incorrectly handled writable sticky-bit mail directories. If Exim were configured in this manner, a local user could use this flaw to cause a denial of service or possibly gain privileges. This issue only applied to Ubuntu 6.06 LTS, 8.04 LTS, 9.10, and 10.04 LTS. Dan Rosenberg discovered that Exim incorrectly handled MBX locking. If Exim were configured in this manner, a local user could use this flaw to cause a denial of service or possibly gain privileges. This issue only applied to Ubuntu 6.06 LTS, 8.04 LTS, 9.10, and 10.04 LTSSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1176-1 -- dbus vulnerabilityUbuntu 11.04Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10dbusdbus: simple interprocess messaging system DBus could be made to crash if it processed a specially crafted message.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1140-2 -- pam regressionUbuntu 10.10Ubuntu 8.04Ubuntu 10.04pampam: Pluggable Authentication Modules Details: USN-1140-1 fixed vulnerabilities in PAM. A regression was found that caused cron to stop working with a "Module is unknown" error. As a result, systems configured with automatic updates will not receive updates until cron is restarted, these updates are installed or the system is rebooted. This update fixes the problem. We apologize for the inconvenience. Original advisory The USN-1140-1 PAM update caused cron to stop working.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1069-1 -- mailman vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06mailmanIt was discovered that Mailman did not properly sanitize certain fields, resulting in cross-site scripting vulnerabilities. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1100-1 -- openldap, openldap2.3 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04openldapopenldap2.3It was discovered that OpenLDAP did not properly check forwarded authentication failures when using a slave server and chain overlay. If OpenLDAP were configured in this manner, an attacker could bypass authentication checks by sending an invalid password to a slave server. It was discovered that OpenLDAP did not properly perform authentication checks to the rootdn when using the back-ndb backend. An attacker could exploit this to access the directory by sending an arbitrary password. Ubuntu does not ship OpenLDAP with back-ndb support by default. This issue did not affect Ubuntu 8.04 LTS. It was discovered that OpenLDAP did not properly validate modrdn requests. An unauthenticated remote user could use this to cause a denial of service via application crashSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1049-1 -- firefox, firefox-{3.0,3.5}, xulrunner-1.9.2 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04firefoxfirefox-3.0firefox-3.5xulrunner-1.9.2Jesse Ruderman, Igor Bukanov, Olli Pettay, Gary Kwong, Jeff Walden, Henry Sivonen, Martijn Wargers, David Baron and Marcia Knous discovered several memory issues in the browser engine. An attacker could exploit these to crash the browser or possibly run arbitrary code as the user invoking the program. Zach Hoffman discovered that a recursive call to eval wrapped in a try/catch statement places the browser into a inconsistent state. An attacker could exploit this to force a user to accept any dialog. It was discovered that memory was used after being freed in a method used by JSON.stringify. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. Christian Holler discovered multiple buffer overflows in the JavaScript engine. An attacker could exploit these to crash the browser or possibly run arbitrary code as the user invoking the program. Daniel Kozlowski discovered that a JavaScript Worker kept a reference to memory after it was freed. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. Alex Miller discovered a buffer overflow in the browser rendering engine. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. Roberto Suggi Liverani discovered a possible issue with unsafe JavaScript execution in chrome documents. A malicious extension could exploit this to execute arbitrary code with chrome privlieges. Jordi Chancel discovered a buffer overlow in the JPEG decoding engine. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. Peleus Uhley discovered a CSRF vulnerability in the plugin code related to 307 redirects. This could allow custom headers to be forwarded across originsSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1058-1 -- postgresql-8.1, postgresql-8.3, postgresql-8.4 vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06postgresql-8.1postgresql-8.3postgresql-8.4Geoff Keating reported that a buffer overflow exists in the intarray module�s input function for the query_int type. This could allow an attacker to cause a denial of service or possibly execute arbitrary code as the postgres user.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1062-1 -- krb5 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04krb5Keiichi Mori discovered that the MIT krb5 KDC database propagation daemon is vulnerable to a denial of service attack due to improper logic when a worker child process exited because of invalid network input. This could only occur when kpropd is running in standalone mode; kpropd was not affected when running in incremental propagation mode or as an inetd server. This issue only affects Ubuntu 9.10, Ubuntu 10.04 LTS, and Ubuntu 10.10. Kevin Longfellow and others discovered that the MIT krb5 Key Distribution Center daemon is vulnerable to denial of service attacks when using an LDAP back end due to improper handling of network inputSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1082-1 -- pango1.0 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04pango1.0Marc Schoenefeld discovered that Pango incorrectly handled certain Glyph Definition tables. If a user were tricked into displaying text with a specially-crafted font, an attacker could cause Pango to crash, resulting in a denial of service. This issue only affected Ubuntu 8.04 LTS and 9.10. Dan Rosenberg discovered that Pango incorrectly handled certain FT_Bitmap objects. If a user were tricked into displaying text with a specially- crafted font, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. The default compiler options for affected releases should reduce the vulnerability to a denial of service. It was discovered that Pango incorrectly handled certain memory reallocation failures. If a user were tricked into displaying text in a way that would cause a reallocation failure, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. This issue only affected Ubuntu 9.10, 10.04 LTS and 10.10SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1035-1 -- evince vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04evinceJon Larimer discovered that Evince�s font parsers incorrectly handled certain buffer lengths when rendering a DVI file. By tricking a user into opening or previewing a DVI file that uses a specially crafted font file, an attacker could crash evince or execute arbitrary code with the user�s privileges. In the default installation of Ubuntu 9.10 and later, attackers would be isolated by the Evince AppArmor profile.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1049-2 -- firefox, firefox-{3.0,3.5}, xulrunner-1.9.2 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04firefoxfirefox-3.0firefox-3.5xulrunner-1.9.2USN-1049-1 fixed vulnerabilities in Firefox and Xulrunner. That update introduced a regression where some Java applets would fail to load. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Jesse Ruderman, Igor Bukanov, Olli Pettay, Gary Kwong, Jeff Walden, Henry Sivonen, Martijn Wargers, David Baron and Marcia Knous discovered several memory issues in the browser engine. An attacker could exploit these to crash the browser or possibly run arbitrary code as the user invoking the program. Zach Hoffman discovered that a recursive call to eval wrapped in a try/catch statement places the browser into a inconsistent state. An attacker could exploit this to force a user to accept any dialog. It was discovered that memory was used after being freed in a method used by JSON.stringify. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. Christian Holler discovered multiple buffer overflows in the JavaScript engine. An attacker could exploit these to crash the browser or possibly run arbitrary code as the user invoking the program. Daniel Kozlowski discovered that a JavaScript Worker kept a reference to memory after it was freed. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. Alex Miller discovered a buffer overflow in the browser rendering engine. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. Roberto Suggi Liverani discovered a possible issue with unsafe JavaScript execution in chrome documents. A malicious extension could exploit this to execute arbitrary code with chrome privlieges. Jordi Chancel discovered a buffer overlow in the JPEG decoding engine. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. Peleus Uhley discovered a CSRF vulnerability in the plugin code related to 307 redirects. This could allow custom headers to be forwarded across originsSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1046-1 -- sudo vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04sudoAlexander Kurtz discovered that sudo would not prompt for a password when a group was specified in the Runas_Spec. A local attacker could exploit this to execute arbitrary code as the specified group if sudo was configured to allow the attacker to use a program as this group. The group Runas_Spec is not used in the default installation of Ubuntu.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1104-1 -- ffmpeg vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04ffmpegCesar Bernardini and Felipe Andres Manzano discovered that FFmpeg incorrectly handled certain malformed flic files. If a user were tricked into opening a crafted flic file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. This issue only affected Ubuntu 8.04 LTS, 9.10 and 10.04 LTS. Dan Rosenberg discovered that FFmpeg incorrectly handled certain malformed wmv files. If a user were tricked into opening a crafted wmv file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. This issue only affected Ubuntu 8.04 LTS, 9.10 and 10.04 LTS. It was discovered that FFmpeg incorrectly handled certain malformed ogg files. If a user were tricked into opening a crafted ogg file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. It was discovered that FFmpeg incorrectly handled certain malformed WebM files. If a user were tricked into opening a crafted WebM file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. Dan Rosenberg discovered that FFmpeg incorrectly handled certain malformed RealMedia files. If a user were tricked into opening a crafted RealMedia file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. This issue only affected Ubuntu 8.04 LTS, 9.10 and 10.04 LTS. Dan Rosenberg discovered that FFmpeg incorrectly handled certain malformed VC1 files. If a user were tricked into opening a crafted VC1 file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the programSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1066-1 -- python-django vulnerabilitiesUbuntu 10.10Ubuntu 9.10Ubuntu 10.04python-djangoIt was discovered that Django did not properly validate HTTP requests that contain an X-Requested-With header. An attacker could exploit this vulnerability to perform cross-site request forgery attacks. It was discovered that Django did not properly sanitize its input when performing file uploads, resulting in cross-site scripting vulnerabilities. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domainSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1064-1 -- openssl vulnerabilityUbuntu 10.10Ubuntu 10.04opensslNeel Mehta discovered that incorrectly formatted ClientHello handshake messages could cause OpenSSL to parse past the end of the message. This could allow a remote attacker to cause a crash and denial of service by triggering invalid memory accesses.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1150-1 -- thunderbird vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10thunderbirdthunderbird: Mozilla Open Source mail and newsgroup client Multiple vulnerabilities were fixed in Thunderbird.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1017-1 -- mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06mysql-5.1mysql-dfsg-5.0mysql-dfsg-5.1It was discovered that MySQL incorrectly handled certain requests with the UPGRADE DATA DIRECTORY NAME command. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 9.10 and 10.04 LTS. It was discovered that MySQL incorrectly handled joins involving a table with a unique SET column. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. It was discovered that MySQL incorrectly handled NULL arguments to IN or CASE operations. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 9.10 and 10.04 LTS. It was discovered that MySQL incorrectly handled malformed arguments to the BINLOG statement. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 9.10 and 10.04 LTS. It was discovered that MySQL incorrectly handled the use of TEMPORARY InnoDB tables with nullable columns. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. It was discovered that MySQL incorrectly handled alternate reads from two indexes on a table using the HANDLER interface. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. It was discovered that MySQL incorrectly handled use of EXPLAIN with certain queries. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. It was discovered that MySQL incorrectly handled error reporting when using LOAD DATA INFILE and would incorrectly raise an assert in certain circumstances. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 9.10 and 10.04 LTS. It was discovered that MySQL incorrectly handled propagation during evaluation of arguments to extreme-value functions. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10. It was discovered that MySQL incorrectly handled materializing a derived table that required a temporary table for grouping. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled certain user-variable assignment expressions that are evaluated in a logical expression context. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10. It was discovered that MySQL incorrectly handled pre-evaluation of LIKE predicates during view preparation. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled using GROUP_CONCAT and WITH ROLLUP together. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled certain queries using a mixed list of numeric and LONGBLOB arguments to the GREATEST or LEAST functions. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled queries with nested joins when used from stored procedures and prepared statements. An authenticated user could exploit this to make MySQL hang, causing a denial of service. This issue only affected Ubuntu 9.10, 10.04 LTS and 10.10. It was discovered that MySQL incorrectly handled improper WKB data passed to the PolyFromWKB function. An authenticated user could exploit this to make MySQL crash, causing a denial of serviceSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1041-1 -- linux, linux-ec2 vulnerabilitiesUbuntu 10.10Ubuntu 9.10Ubuntu 10.04linuxlinux-ec2Dan Rosenberg discovered that the btrfs filesystem did not correctly validate permissions when using the clone function. A local attacker could overwrite the contents of file handles that were opened for append-only, or potentially read arbitrary contents, leading to a loss of privacy. Only Ubuntu 9.10 was affected. Dave Chinner discovered that the XFS filesystem did not correctly order inode lookups when exported by NFS. A remote attacker could exploit this to read or write disk blocks that had changed file assignement or had become unlinked, leading to a loss of privacy. Kees Cook discovered that the Intel i915 graphics driver did not correctly validate memory regions. A local attacker with access to the video card could read and write arbitrary kernel memory to gain root privileges. Ubuntu 10.10 was not affected. Robert Swiecki discovered that ftrace did not correctly handle mutexes. A local attacker could exploit this to crash the kernel, leading to a denial of service. Dan Rosenberg discovered that several network ioctls did not clear kernel memory correctly. A local user could exploit this to read kernel stack memory, leading to a loss of privacy. Ben Hawkes discovered that the Linux kernel did not correctly filter registers on 64bit kernels when performing 32bit system calls. On a 64bit system, a local attacker could manipulate 32bit system calls to gain root privileges. The Ubuntu EC2 kernels needed additional fixing. Brad Spengler discovered that stack memory for new a process was not correctly calculated. A local attacker could exploit this to crash the system, leading to a denial of service. Kees Cook discovered that the ethtool interface did not correctly clear kernel memory. A local attacker could read kernel heap memory, leading to a loss of privacy. Kees Cook and Vasiliy Kulikov discovered that the shm interface did not clear kernel memory correctly. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacySecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1156-1 -- tgt vulnerabilitiesUbuntu 11.04Ubuntu 10.10tgttgt: Linux SCSI target user-space tools An attacker could send crafted input to tgt and cause it to crash or run arbitrary programs.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1042-2 -- php5 regressionUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06php5USN-1042-1 fixed vulnerabilities in PHP5. The fix for CVE-2010-3436 introduced a regression in the open_basedir restriction handling code. This update fixes the problem. We apologize for the inconvenience. Original advisory details: It was discovered that attackers might be able to bypass open_basedir restrictions by passing a specially crafted filenameSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1107-1 -- x11-xserver-utils vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04x11-xserver-utilsSebastian Krahmer discovered that the xrdb utility incorrectly filtered crafted hostnames. An attacker could use this flaw with a malicious DHCP server or with a remote xdmcp login and execute arbitrary code, resulting in root privilege escalation.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1153-1 -- libxml2 vulnerabilityUbuntu 11.04Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10libxml2libxml2: GNOME XML library libxml2 could be made to crash or run programs as your login if it opened a specially crafted file.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1059-1 -- dovecot vulnerabilitiesUbuntu 10.10Ubuntu 10.04dovecotIt was discovered that the ACL plugin in Dovecot would incorrectly propagate ACLs to new mailboxes. A remote authenticated user could possibly read new mailboxes that were created with the wrong ACL. It was discovered that the ACL plugin in Dovecot would incorrectly merge ACLs in certain circumstances. A remote authenticated user could possibly bypass intended access restrictions and gain access to mailboxes. It was discovered that the ACL plugin in Dovecot would incorrectly grant the admin permission to owners of certain mailboxes. A remote authenticated user could possibly bypass intended access restrictions and gain access to mailboxes. It was discovered that Dovecot incorrecly handled the simultaneous disconnect of a large number of sessions. A remote authenticated user could use this flaw to cause Dovecot to crash, resulting in a denial of serviceSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1043-1 -- lcms vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04lcmsIt was discovered that a NULL pointer dereference in the code for handling transformations of monochrome profiles could allow an attacker to cause a denial of service through a specially crafted imageSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1172-1 -- logrotate vulnerabilitiesUbuntu 11.04Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10logrotatelogrotate: Log rotation utility An attacker could cause logrotate to run programs, stop working, or read and write arbitrary files.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1011-3 -- xulrunner-1.9.1, xulrunner-1.9.2 vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04xulrunner-1.9.1xulrunner-1.9.2USN-1011-1 fixed a vulnerability in Firefox. This update provides the corresponding update for Xulrunner. Original advisory details: Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a user were tricked into navigating to a malicious site, an attacker could cause a denial of service or possibly execute arbitrary code as the user invoking the program.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-998-1 -- thunderbird vulnerabilitiesUbuntu 10.10Ubuntu 10.04thunderbirdPaul Nickerson, Jesse Ruderman, Olli Pettay, Igor Bukanov, Josh Soref, Gary Kwong, Martijn Wargers, Siddharth Agarwal and Michal Zalewski discovered various flaws in the browser engine. An attacker could exploit this to crash Thunderbird or possibly run arbitrary code as the user invoking the program. Alexander Miller, Sergey Glazunov, and others discovered several flaws in the JavaScript engine. If JavaScript were enabled, an attacker could exploit this to crash Thunderbird or possibly run arbitrary code as the user invoking the program. Eduardo Vela Nava discovered that Thunderbird could be made to violate the same-origin policy by using modal calls with JavaScript. If JavaScript were enabled, an attacker could exploit this to steal information from another site. Dmitri GribenkoDmitri Gribenko discovered that Thunderbird did not properly setup the LD_LIBRARY_PATH environment variable. A local attacker could exploit this to execute arbitrary code as the user invoking the programSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1135-1 -- exim4 vulnerabilityUbuntu 10.10Ubuntu 10.04exim4exim4: metapackage to ease Exim MTA installation an attacker could send crafted input to Exim and cause it to run programs as the Exim user.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1048-1 -- tomcat6 vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04tomcat6It was discovered that Tomcat did not properly escape certain parameters in the Manager application which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1009-1 -- glibc, eglibc vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.04Ubuntu 9.10glibceglibcTavis Ormandy discovered multiple flaws in the GNU C Library�s handling of the LD_AUDIT environment variable when running a privileged binary. A local attacker could exploit this to gain root privilegesSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1063-1 -- qemu-kvm vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04qemu-kvmNeil Wilson discovered that if VNC passwords were blank in QEMU configurations, access to VNC sessions was allowed without a password instead of being disabled. A remote attacker could connect to running VNC sessions of QEMU and directly control the system. By default, QEMU does not start VNC sessions.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1045-2 -- util-linux updateUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04util-linuxUSN-1045-1 fixed vulnerabilities in FUSE. This update to util-linux adds support for new options required by the FUSE update. Original advisory details: It was discovered that FUSE could be tricked into incorrectly updating the mtab file when mounting filesystems. A local attacker, with access to use FUSE, could unmount arbitrary locations, leading to a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1038-1 -- dpkg vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04dpkgJakub Wilk and Raphaël Hertzog discovered that dpkg-source did not correctly handle certain paths and symlinks when unpacking source-format version 3.0 packages. If a user or an automated system were tricked into unpacking a specially crafted source package, a remote attacker could modify files outside the target unpack directory, leading to a denial of service or potentially gaining access to the system.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1151-1 -- nagios3 vulnerabilitiesUbuntu 11.04Ubuntu 10.04Ubuntu 10.10nagios3nagios3: A host/service/network monitoring and management system an attacker could modify or steal data if you were tricked into clicking on a special link to Nagios.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-999-1 -- krb5 vulnerabilityUbuntu 10.10Ubuntu 10.04krb5Mike Roszkowski discovered that the Kerberos KDC did not correctly validate the contents of certain messages. If an authenticated remote attacker sent specially crafted TGS requests, the KDC service would crash, leading to a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1085-2 -- tiff regressionUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06tiffUSN-1085-1 fixed vulnerabilities in the system TIFF library. The upstream fixes were incomplete and created problems for certain CCITTFAX4 files. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Sauli Pahlman discovered that the TIFF library incorrectly handled invalid td_stripbytecount fields. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS and 10.10. Sauli Pahlman discovered that the TIFF library incorrectly handled TIFF files with an invalid combination of SamplesPerPixel and Photometric values. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. This issue only affected Ubuntu 10.10. Nicolae Ghimbovschi discovered that the TIFF library incorrectly handled invalid ReferenceBlackWhite values. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. Sauli Pahlman discovered that the TIFF library incorrectly handled certain default fields. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. It was discovered that the TIFF library incorrectly validated certain data types. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. It was discovered that the TIFF library incorrectly handled downsampled JPEG data. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could execute arbitrary code with user privileges, or crash the application, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS and 10.10. It was discovered that the TIFF library incorrectly handled certain JPEG data. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could execute arbitrary code with user privileges, or crash the application, leading to a denial of service. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS and 9.10. It was discovered that the TIFF library incorrectly handled certain TIFF FAX images. If a user or automated system were tricked into opening a specially crafted TIFF FAX image, a remote attacker could execute arbitrary code with user privileges, or crash the application, leading to a denial of serviceSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1029-1 -- openssl vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06opensslIt was discovered that an old bug workaround in the SSL/TLS server code allowed an attacker to modify the stored session cache ciphersuite. This could possibly allow an attacker to downgrade the ciphersuite to a weaker one on subsequent connections. It was discovered that an old bug workaround in the SSL/TLS server code allowed allowed an attacker to modify the stored session cache ciphersuite. An attacker could possibly take advantage of this to force the use of a disabled cipher. This vulnerability only affects the versions of OpenSSL in Ubuntu 6.06 LTS, Ubuntu 8.04 LTS, and Ubuntu 9.10SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1005-1 -- poppler vulnerabilitiesUbuntu 9.04Ubuntu 9.10Ubuntu 6.06Ubuntu 8.04Ubuntu 10.10Ubuntu 10.04popplerIt was discovered that poppler contained multiple security issues when parsing malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1075-1 -- samba vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06sambaVolker Lendecke discovered that Samba incorrectly handled certain file descriptors. A remote attacker could send a specially crafted request to the server and cause Samba to crash or hang, resulting in a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1093-1 -- linux-mvl-dove vulnerabilitiesUbuntu 10.10Ubuntu 10.04linux-mvl-doveJoel Becker discovered that OCFS2 did not correctly validate on-disk symlink structures. If an attacker were able to trick a user or automated system into mounting a specially crafted filesystem, it could crash the system or exposde kernel memory, leading to a loss of privacy. Ben Hutchings discovered that the ethtool interface did not correctly check certain sizes. A local attacker could perform malicious ioctl calls that could crash the system, leading to a denial of service. Eric Dumazet discovered that many network functions could leak kernel stack contents. A local attacker could exploit this to read portions of kernel memory, leading to a loss of privacy. Dave Chinner discovered that the XFS filesystem did not correctly order inode lookups when exported by NFS. A remote attacker could exploit this to read or write disk blocks that had changed file assignment or had become unlinked, leading to a loss of privacy. Tavis Ormandy discovered that the IRDA subsystem did not correctly shut down. A local attacker could exploit this to cause the system to crash or possibly gain root privileges. Brad Spengler discovered that the wireless extensions did not correctly validate certain request sizes. A local attacker could exploit this to read portions of kernel memory, leading to a loss of privacy. Tavis Ormandy discovered that the session keyring did not correctly check for its parent. On systems without a default session keyring, a local attacker could exploit this to crash the system, leading to a denial of service. Kees Cook discovered that the Intel i915 graphics driver did not correctly validate memory regions. A local attacker with access to the video card could read and write arbitrary kernel memory to gain root privileges. Kees Cook discovered that the V4L1 32bit compat interface did not correctly validate certain parameters. A local attacker on a 64bit system with access to a video device could exploit this to gain root privileges. Tavis Ormandy discovered that the AIO subsystem did not correctly validate certain parameters. A local attacker could exploit this to crash the system or possibly gain root privileges. Dan Rosenberg discovered that certain XFS ioctls leaked kernel stack contents. A local attacker could exploit this to read portions of kernel memory, leading to a loss of privacy. Robert Swiecki discovered that ftrace did not correctly handle mutexes. A local attacker could exploit this to crash the kernel, leading to a denial of service. Tavis Ormandy discovered that the OSS sequencer device did not correctly shut down. A local attacker could exploit this to crash the system or possibly gain root privileges. Dan Rosenberg discovered that several network ioctls did not clear kernel memory correctly. A local user could exploit this to read kernel stack memory, leading to a loss of privacy. Dan Rosenberg discovered that the ROSE driver did not correctly check parameters. A local attacker with access to a ROSE network device could exploit this to crash the system or possibly gain root privileges. Thomas Dreibholz discovered that SCTP did not correctly handle appending packet chunks. A remote attacker could send specially crafted traffic to crash the system, leading to a denial of service. Dan Rosenberg discovered that the CD driver did not correctly check parameters. A local attacker could exploit this to read arbitrary kernel memory, leading to a loss of privacy. Dan Rosenberg discovered that the Sound subsystem did not correctly validate parameters. A local attacker could exploit this to crash the system, leading to a denial of service. Dan Rosenberg discovered that SCTP did not correctly handle HMAC calculations. A remote attacker could send specially crafted traffic that would crash the system, leading to a denial of service. Nelson Elhage discovered several problems with the Acorn Econet protocol driver. A local user could cause a denial of service via a NULL pointer dereference, escalate privileges by overflowing the kernel stack, and assign Econet addresses to arbitrary interfaces. Brad Spengler discovered that stack memory for new a process was not correctly calculated. A local attacker could exploit this to crash the system, leading to a denial of service. Dan Rosenberg discovered that the Linux kernel TIPC implementation contained multiple integer signedness errors. A local attacker could exploit this to gain root privileges. Kees Cook discovered that the ethtool interface did not correctly clear kernel memory. A local attacker could read kernel heap memory, leading to a loss of privacy. Thomas Pollet discovered that the RDS network protocol did not check certain iovec buffers. A local attacker could exploit this to crash the system or possibly execute arbitrary code as the root user. Dan Rosenberg discovered that the Linux kernel X.25 implementation incorrectly parsed facilities. A remote attacker could exploit this to crash the kernel, leading to a denial of service. Dan Rosenberg discovered that the CAN protocol on 64bit systems did not correctly calculate the size of certain buffers. A local attacker could exploit this to crash the system or possibly execute arbitrary code as the root user. Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. Vasiliy Kulikov discovered that the Linux kernel sockets implementation did not properly initialize certain structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. Vasiliy Kulikov discovered that the TIPC interface did not correctly initialize certain structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. Nelson Elhage discovered that the Linux kernel IPv4 implementation did not properly audit certain bytecodes in netlink messages. A local attacker could exploit this to cause the kernel to hang, leading to a denial of service. Dan Rosenberg discovered that the RDS network protocol did not correctly check certain parameters. A local attacker could exploit this gain root privileges. Kees Cook and Vasiliy Kulikov discovered that the shm interface did not clear kernel memory correctly. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. Dan Rosenberg discovered that multiple terminal ioctls did not correctly initialize structure memory. A local attacker could exploit this to read portions of kernel stack memory, leading to a loss of privacy. Dan Rosenberg discovered that the socket filters did not correctly initialize structure memory. A local attacker could create malicious filters to read portions of kernel stack memory, leading to a loss of privacy. Dan Rosenberg discovered that the SCSI subsystem did not correctly validate iov segments. A local attacker with access to a SCSI device could send specially crafted requests to crash the system, leading to a denial of service. Steve Chen discovered that setsockopt did not correctly check MSS values. A local attacker could make a specially crafted socket call to crash the system, leading to a denial of service. Dave Jones discovered that the mprotect system call did not correctly handle merged VMAs. A local attacker could exploit this to crash the system, leading to a denial of service. Dan Rosenberg discovered that the RDS protocol did not correctly check ioctl arguments. A local attacker could exploit this to crash the system, leading to a denial of service. Vegard Nossum discovered that memory garbage collection was not handled correctly for active sockets. A local attacker could exploit this to allocate all available kernel memory, leading to a denial of service. It was discovered that multithreaded exec did not handle CPU timers correctly. A local attacker could exploit this to crash the system, leading to a denial of service. Krishna Gudipati discovered that the bfa adapter driver did not correctly initialize certain structures. A local attacker could read files in /sys to crash the system, leading to a denial of service. Tavis Ormandy discovered that the install_special_mapping function could bypass the mmap_min_addr restriction. A local attacker could exploit this to mmap 4096 bytes below the mmap_min_addr area, possibly improving the chances of performing NULL pointer dereference attacks. It was discovered that the ICMP stack did not correctly handle certain unreachable messages. If a remote attacker were able to acquire a socket lock, they could send specially crafted traffic that would crash the system, leading to a denial of service. Dan Rosenberg discovered that the OSS subsystem did not handle name termination correctly. A local attacker could exploit this crash the system or gain root privileges. Dan Carpenter discovered that the Infiniband driver did not correctly handle certain requests. A local user could exploit this to crash the system or potentially gain root privilegesSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1077-1 -- fuse vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04fuseIt was discovered that FUSE would incorrectly follow symlinks when checking mountpoints under certain conditions. A local attacker, with access to use FUSE, could unmount arbitrary locations, leading to a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1067-1 -- telepathy-gabble vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04telepathy-gabbleIt was discovered that Gabble did not verify the from field of google jingleinfo updates. This could allow a remote attacker to perform man in the middle attacks on streamed media.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1020-1 -- thunderbird, thunderbird-locales vulnerabilitiesUbuntu 10.10Ubuntu 10.04thunderbirdthunderbird-localesJesse Ruderman, Andreas Gal, Nils, Brian Hackett, and Igor Bukanov discovered several memory issues in the browser engine. An attacker could exploit these to crash THunderbird or possibly run arbitrary code as the user invoking the program. Marc Schoenefeld and Christoph Diehl discovered several problems when handling downloadable fonts. The new OTS font sanitizing library was added to mitigate these issuesSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1050-1 -- thunderbird vulnerabilitiesUbuntu 10.10Ubuntu 10.04thunderbirdJesse Ruderman, Igor Bukanov, Olli Pettay, Gary Kwong, Jeff Walden, Henry Sivonen, Martijn Wargers, David Baron and Marcia Knous discovered several memory issues in the browser engine. An attacker could exploit these to crash the browser or possibly run arbitrary code as the user invoking the program. Roberto Suggi Liverani discovered a possible issue with unsafe JavaScript execution in chrome documents. A malicious extension could exploit this to execute arbitrary code with chrome privlieges. Jordi Chancel discovered a buffer overlow in the JPEG decoding engine. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the programSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1023-1 -- linux, linux-{ec2,source-2.6.15} vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06linuxlinux-ec2linux-source-2.6.15Nelson Elhage discovered several problems with the Acorn Econet protocol driver. A local user could cause a denial of service via a NULL pointer dereference, escalate privileges by overflowing the kernel stack, and assign Econet addresses to arbitrary interfaces.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1052-1 -- openjdk-6, openjdk-6b18 vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04openjdk-6openjdk-6b18It was discovered that the JNLP SecurityManager in IcedTea for Java OpenJDK in some instances failed to properly apply the intended scurity policy in its checkPermission method. This could allow an attacker execute code with privileges that should have been preventedSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1079-3 -- openjdk-6b18 vulnerabilitiesUbuntu 10.10openjdk-6b18USN-1079-2 fixed vulnerabilities in OpenJDK 6 for armel architectures in Ubuntu 9.10 and Ubuntu 10.04 LTS. This update fixes vulnerabilities in OpenJDK 6 for armel architectures for Ubuntu 10.10. Original advisory details: It was discovered that untrusted Java applets could create domain name resolution cache entries, allowing an attacker to manipulate name resolution within the JVM. It was discovered that the Java launcher did not did not properly setup the LD_LIBRARY_PATH environment variable. A local attacker could exploit this to execute arbitrary code as the user invoking the program. It was discovered that within the Swing library, forged timer events could allow bypass of SecurityManager checks. This could allow an attacker to access restricted resources. It was discovered that certain bytecode combinations confused memory management within the HotSpot JVM. This could allow an attacker to cause a denial of service through an application crash or possibly inject code. It was discovered that the way JAXP components were handled allowed them to be manipulated by untrusted applets. An attacker could use this to bypass XML processing restrictions and elevate privileges. It was discovered that the Java2D subcomponent, when processing broken CFF fonts could leak system properties. It was discovered that a flaw in the XML Digital Signature component could allow an attacker to cause untrusted code to replace the XML Digital Signature Transform or C14N algorithm implementations. Konstantin Preißer and others discovered that specific double literals were improperly handled, allowing a remote attacker to cause a denial of service. It was discovered that the JNLPClassLoader class when handling multiple signatures allowed remote attackers to gain privileges due to the assignment of an inappropriate security descriptorSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1006-1 -- webkit vulnerabilitiesUbuntu 10.10Ubuntu 9.10Ubuntu 10.04webkitA large number of security issues were discovered in the WebKit browser and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Please consult the bug listed at the top of this advisory to get the exact list of CVE numbers fixed for each release.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-997-1 -- firefox, firefox-3.0, firefox-3.5, xulrunner-1.9.1, xulrunner-1.9.2 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.04Ubuntu 9.10firefoxfirefox-3.0firefox-3.5xulrunner-1.9.1xulrunner-1.9.2Paul Nickerson, Jesse Ruderman, Olli Pettay, Igor Bukanov, Josh Soref, Gary Kwong, Martijn Wargers, Siddharth Agarwal and Michal Zalewski discovered various flaws in the browser engine. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. Alexander Miller, Sergey Glazunov, and others discovered several flaws in the JavaScript engine. An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. Robert Swiecki discovered that Firefox did not properly validate Gopher URLs. If a user were tricked into opening a crafted file via Gopher, an attacker could possibly run arbitrary JavaScript. Eduardo Vela Nava discovered that Firefox could be made to violate the same-origin policy by using modal calls with JavaScript. An attacker could exploit this to steal information from another site. Dmitri GribenkoDmitri Gribenko discovered that Firefox did not properly setup the LD_LIBRARY_PATH environment variable. A local attacker could exploit this to execute arbitrary code as the user invoking the programSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1028-1 -- imagemagick vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04imagemagickIt was discovered that ImageMagick would search for configuration files in the current directory. If a user were tricked into opening or processing an image in an arbitrary directory, a local attacker could execute arbitrary code with the user�s privileges.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1182-1 -- samba vulnerabilitiesUbuntu 11.04Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10sambasamba: SMB/CIFS file, print, and login server for Unix An attacker could use a malicious URL to reconfigure Samba or steal information.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1018-1 -- openssl vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04opensslRob Hulswit discovered a race condition in the OpenSSL TLS server extension parsing code when used within a threaded server. A remote attacker could trigger this flaw to cause a denial of service or possibly execute arbitrary code with application privilegesSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1055-1 -- openjdk-6, openjdk-6b18 vulnerabilitiesUbuntu 10.10Ubuntu 9.10Ubuntu 10.04openjdk-6openjdk-6b18It was discovered that IcedTea for Java did not properly verify signatures when handling multiply signed or partially signed JAR files, allowing an attacker to cause code to execute that appeared to come from a verified source. USN 1052-1 fixed a vulnerability in OpenJDK for Ubuntu 9.10 and Ubuntu 10.04 LTS on all architectures, and Ubuntu 10.10 for all architectures except for the armel architecture. This update provides the corresponding update for Ubuntu 10.10 on the armel architecture. Original advisory details: It was discovered that the JNLP SecurityManager in IcedTea for Java OpenJDK in some instances failed to properly apply the intended scurity policy in its checkPermission method. This could allow an attacker to execute code with privileges that should have been preventedSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1000-1 -- linux, linux-ec2, linux-source-2.6.15 vulnerabilitiesUbuntu 9.04Ubuntu 9.10Ubuntu 6.06Ubuntu 8.04Ubuntu 10.10Ubuntu 10.04linuxlinux-ec2linux-source-2.6.15Joel Becker discovered that OCFS2 did not correctly validate on-disk symlink structures. If an attacker were able to trick a user or automated system into mounting a specially crafted filesystem, it could crash the system or exposde kernel memory, leading to a loss of privacy. Al Viro discovered a race condition in the TTY driver. A local attacker could exploit this to crash the system, leading to a denial of service. Dan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not correctly check file permissions. A local attacker could overwrite append-only files, leading to potential data loss. Dan Rosenberg discovered that the swapexit xfs ioctl did not correctly check file permissions. A local attacker could exploit this to read from write-only files, leading to a loss of privacy. Suresh Jayaraman discovered that CIFS did not correctly validate certain response packats. A remote attacker could send specially crafted traffic that would crash the system, leading to a denial of service. Ben Hutchings discovered that the ethtool interface did not correctly check certain sizes. A local attacker could perform malicious ioctl calls that could crash the system, leading to a denial of service. James Chapman discovered that L2TP did not correctly evaluate checksum capabilities. If an attacker could make malicious routing changes, they could crash the system, leading to a denial of service. Neil Brown discovered that NFSv4 did not correctly check certain write requests. A remote attacker could send specially crafted traffic that could crash the system or possibly gain root privileges. David Howells discovered that DNS resolution in CIFS could be spoofed. A local attacker could exploit this to control DNS replies, leading to a loss of privacy and possible privilege escalation. Bob Peterson discovered that GFS2 rename operations did not correctly validate certain sizes. A local attacker could exploit this to crash the system, leading to a denial of service. Eric Dumazet discovered that many network functions could leak kernel stack contents. A local attacker could exploit this to read portions of kernel memory, leading to a loss of privacy. Sergey Vlasov discovered that JFS did not correctly handle certain extended attributes. A local attacker could bypass namespace access rules, leading to a loss of privacy. Tavis Ormandy discovered that the IRDA subsystem did not correctly shut down. A local attacker could exploit this to cause the system to crash or possibly gain root privileges. Brad Spengler discovered that the wireless extensions did not correctly validate certain request sizes. A local attacker could exploit this to read portions of kernel memory, leading to a loss of privacy. Tavis Ormandy discovered that the session keyring did not correctly check for its parent. On systems without a default session keyring, a local attacker could exploit this to crash the system, leading to a denial of service. Kees Cook discovered that the V4L1 32bit compat interface did not correctly validate certain parameters. A local attacker on a 64bit system with access to a video device could exploit this to gain root privileges. Toshiyuki Okajima discovered that ext4 did not correctly check certain parameters. A local attacker could exploit this to crash the system or overwrite the last block of large files. Tavis Ormandy discovered that the AIO subsystem did not correctly validate certain parameters. A local attacker could exploit this to crash the system or possibly gain root privileges. Dan Rosenberg discovered that certain XFS ioctls leaked kernel stack contents. A local attacker could exploit this to read portions of kernel memory, leading to a loss of privacy. Tavis Ormandy discovered that the OSS sequencer device did not correctly shut down. A local attacker could exploit this to crash the system or possibly gain root privileges. Dan Rosenberg discovered that the ROSE driver did not correctly check parameters. A local attacker with access to a ROSE network device could exploit this to crash the system or possibly gain root privileges. Thomas Dreibholz discovered that SCTP did not correctly handle appending packet chunks. A remote attacker could send specially crafted traffic to crash the system, leading to a denial of service. Dan Rosenberg discovered that the CD driver did not correctly check parameters. A local attacker could exploit this to read arbitrary kernel memory, leading to a loss of privacy. Dan Rosenberg discovered that the Sound subsystem did not correctly validate parameters. A local attacker could exploit this to crash the system, leading to a denial of service. Dan Rosenberg discovered that SCTP did not correctly handle HMAC calculations. A remote attacker could send specially crafted traffic that would crash the system, leading to a denial of service. Dan Rosenberg discovered that the RDS network protocol did not correctly check certain parameters. A local attacker could exploit this gain root privilegesSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1010-1 -- openjdk-6, openjdk-6b18 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04openjdk-6openjdk-6b18SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1085-1 -- tiff vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06tiffSauli Pahlman discovered that the TIFF library incorrectly handled invalid td_stripbytecount fields. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS and 10.10. Sauli Pahlman discovered that the TIFF library incorrectly handled TIFF files with an invalid combination of SamplesPerPixel and Photometric values. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. This issue only affected Ubuntu 10.10. Nicolae Ghimbovschi discovered that the TIFF library incorrectly handled invalid ReferenceBlackWhite values. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. Sauli Pahlman discovered that the TIFF library incorrectly handled certain default fields. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. It was discovered that the TIFF library incorrectly validated certain data types. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. It was discovered that the TIFF library incorrectly handled downsampled JPEG data. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could execute arbitrary code with user privileges, or crash the application, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS and 10.10. It was discovered that the TIFF library incorrectly handled certain JPEG data. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could execute arbitrary code with user privileges, or crash the application, leading to a denial of service. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS and 9.10. It was discovered that the TIFF library incorrectly handled certain TIFF FAX images. If a user or automated system were tricked into opening a specially crafted TIFF FAX image, a remote attacker could execute arbitrary code with user privileges, or crash the application, leading to a denial of serviceSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1007-1 -- nss vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.04Ubuntu 9.10nssRichard Moore discovered that NSS would sometimes incorrectly match an SSL certificate which had a Common Name that used a wildcard followed by a partial IP address. While it is very unlikely that a Certificate Authority would issue such a certificate, if an attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to view sensitive information. Nelson Bolyard discovered a weakness in the Diffie-Hellman Ephemeral mode key exchange implementation which allowed servers to use a too small key lengthSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1113-1 -- postfix vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 6.06Ubuntu 9.10Ubuntu 10.04postfixpostfix: High-performance mail transport agent An attacker could send crafted input to Postfix and cause it to reveal confidential information.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1004-1 -- python-django vulnerabilityUbuntu 10.10python-djangoIt was discovered that Django did not properly sanitize the cookie value when applying CSRF protections resulting in a cross-site scripting vulnerability. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1068-1 -- aptdaemon vulnerabilityUbuntu 10.10aptdaemonSergey Nizovtsev discovered that Aptdaemon incorrectly filtered certain arguments when using its D-Bus interface. A local attacker could use this flaw to bypass security restrictions and view sensitive information by reading arbitrary files.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1039-1 -- apparmor updateUbuntu 10.10Ubuntu 9.10Ubuntu 10.04apparmorIt was discovered that if AppArmor was misconfigured, under certain circumstances the parser could generate policy using an unconfined fallback execute transition when one was not specified.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1016-1 -- libxml2 vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06libxml2Bui Quang Minh discovered that libxml2 did not properly process XPath namespaces and attributes. If an application using libxml2 opened a specially crafted XML file, an attacker could cause a denial of service or possibly execute code as the user invoking the program.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1009-2 -- eglibc, glibc vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04eglibcglibcUSN-1009-1 fixed vulnerabilities in the GNU C library. Colin Watson discovered that the fixes were incomplete and introduced flaws with setuid programs loading libraries that used dynamic string tokens in their RPATH. If the "man" program was installed setuid, a local attacker could exploit this to gain "man" user privileges, potentially leading to further privilege escalations. Default Ubuntu installations were not affected. Original advisory details: Tavis Ormandy discovered multiple flaws in the GNU C Library�s handling of the LD_AUDIT environment variable when running a privileged binary. A local attacker could exploit this to gain root privilegesSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1079-1 -- openjdk-6 vulnerabilitiesUbuntu 10.10Ubuntu 9.10Ubuntu 10.04openjdk-6It was discovered that untrusted Java applets could create domain name resolution cache entries, allowing an attacker to manipulate name resolution within the JVM. It was discovered that the Java launcher did not did not properly setup the LD_LIBRARY_PATH environment variable. A local attacker could exploit this to execute arbitrary code as the user invoking the program. It was discovered that within the Swing library, forged timer events could allow bypass of SecurityManager checks. This could allow an attacker to access restricted resources. It was discovered that certain bytecode combinations confused memory management within the HotSpot JVM. This could allow an attacker to cause a denial of service through an application crash or possibly inject code. It was discovered that the way JAXP components were handled allowed them to be manipulated by untrusted applets. An attacker could use this to bypass XML processing restrictions and elevate privileges. It was discovered that the Java2D subcomponent, when processing broken CFF fonts could leak system properties. It was discovered that a flaw in the XML Digital Signature component could allow an attacker to cause untrusted code to replace the XML Digital Signature Transform or C14N algorithm implementations. Konstantin Preißer and others discovered that specific double literals were improperly handled, allowing a remote attacker to cause a denial of service. It was discovered that the JNLPClassLoader class when handling multiple signatures allowed remote attackers to gain privileges due to the assignment of an inappropriate security descriptorSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1160-1 -- linux vulnerabilitiesUbuntu 10.10linuxlinux: Linux kernel Multiple kernel vulnerabilities have been fixed.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1051-1 -- hplip vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04hplipSebastian Krahmer discovered that HPLIP incorrectly handled certain long SNMP responses. A remote attacker could send malicious SNMP replies to certain HPLIP tools and cause them to crash or possibly execute arbitrary code.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1033-1 -- eucalyptus vulnerabilityUbuntu 10.10eucalyptusIt was discovered that Eucalyptus did not verify password resets from the Admin UI correctly. An unauthenticated remote attacker could issue password reset requests to gain admin privileges in the Eucalyptus environment.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1011-1 -- firefox, firefox-3.0, firefox-3.5 vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04firefoxfirefox-3.0firefox-3.5Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a user were tricked into navigating to a malicious site, an attacker could cause a denial of service or possibly execute arbitrary code as the user invoking the program.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1084-1 -- avahi vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04avahiIt was discovered that Avahi incorrectly handled empty UDP packets. A remote attacker could send a specially-crafted packet and cause Avahi to hang, resulting in a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1070-1 -- bind9 vulnerabilityUbuntu 10.10bind9It was discovered that Bind incorrectly handled IXFR transfers and dynamic updates while under heavy load when used as an authoritative server. A remote attacker could use this flaw to cause Bind to stop responding, resulting in a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1158-1 -- curl vulnerabilitiesUbuntu 11.04Ubuntu 8.04Ubuntu 10.04Ubuntu 10.10curlcurl: HTTP, HTTPS, and FTP client and client libraries Details: Richard Silverman discovered that when doing GSSAPI authentication, libcurl unconditionally performs credential delegation, handing the server a copy of the client�s security credential. Wesley Miaw discovered that when zlib is enabled, libcurl does not properly restrict the amount of callback data sent to an application that requests automatic decompression. This might allow an attacker to cause a denial of service via an application crash or possibly execute arbitrary code with the privilege of the application. This issue only affected Ubuntu 8.04 LTS and Ubuntu 10.04 LTS. USN 818-1 fixed an issue with curl�s handling of SSL certificates with zero bytes in the Common Name. Due to a packaging error, the fix for this issue was not being applied during the build. This issue only affected Ubuntu 8.04 LTS. We apologize for the error. Original advisory Multiple vulnerabilities in curl.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUbuntu 11.04 is installedUbuntu 11.04Ubuntu 11.04 is installedSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1095-1 -- quagga vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06quaggaIt was discovered that Quagga incorrectly parsed certain malformed extended communities. A remote attacker could use this flaw to cause Quagga to crash, resulting in a denial of service. It was discovered that Quagga resets BGP sessions when encountering malformed AS_PATHLIMIT attributes. A remote attacker could use this flaw to disrupt BGP sessions, resulting in a denial of service. This update removes AS_PATHLIMIT support from Quagga. This issue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1065-1 -- shadow vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04shadowKees Cook discovered that some shadow utilities did not correctly validate user input. A local attacker could exploit this flaw to inject newlines into the /etc/passwd file. If the system was configured to use NIS, this could lead to existing NIS groups or users gaining or losing access to the system, resulting in a denial of service or unauthorized access.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1021-1 -- apache2 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06apache2It was discovered that Apache�s mod_cache and mod_dav modules incorrectly handled requests that lacked a path. A remote attacker could exploit this with a crafted request and cause a denial of service. This issue affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. It was discovered that Apache did not properly handle memory when destroying APR buckets. A remote attacker could exploit this with crafted requests and cause a denial of service via memory exhaustion. This issue affected Ubuntu 6.06 LTS and 10.10SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1025-1 -- bind9 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06bind9It was discovered that Bind would incorrectly allow a ncache entry and a rrsig for the same type. A remote attacker could exploit this to cause Bind to crash, resulting in a denial of service. It was discovered that Bind would incorrectly mark zone data as insecure when the zone is undergoing a key algorithm rolloverSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1139-1 -- bind9 vulnerabilitiesUbuntu 10.10Ubuntu 8.04Ubuntu 10.04bind9bind9: Internet Domain Name Server An attacker could send crafted input to Bind and cause it to crash.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1037-1 -- ifupdown updateUbuntu 10.10Ubuntu 10.04ifupdownUnder certain circumstances, the DHCP client could start before its AppArmor profile was loaded and therefore run unconfined. This update ensures the AppArmor profile is loaded before DHCP client starts.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1087-1 -- libvpx vulnerabilityUbuntu 10.10libvpxChris Evans discovered that libvpx did not properly perform bounds checking. If an application using libvpx opened a specially crafted WebM file, an attacker could cause a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1024-2 -- openjdk-6 regressionUbuntu 10.10openjdk-6USN-1024-1 fixed vulnerabilities in OpenJDK. Some of the additional backported improvements could interfere with the compilation of certain Java software. This update fixes the problem. We apologize for the inconvenience. Original advisory details: It was discovered that certain system property information was being leaked, which could allow an attacker to obtain sensitive information.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1040-1 -- python-django vulnerabilitiesUbuntu 10.10Ubuntu 9.10Ubuntu 10.04python-djangoAdam Baldwin discovered that Django did not properly validate query string lookups. This could be exploited to provide an information leak to an attacker with admin privilieges. Paul McMillan discovered that Django did not validate the length of the token used when generating a password reset. An attacker could exploit this to cause a denial of service via resource exhaustionSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1013-1 -- freetype vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06freetypeMarc Schoenefeld discovered that FreeType did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. Chris Evans discovered that FreeType did not correctly handle certain malformed TrueType font files. If a user were tricked into using a specially crafted TrueType file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges. This issue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10. It was discovered that FreeType did not correctly handle certain malformed TrueType font files. If a user were tricked into using a specially crafted TrueType file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privilegesSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1036-1 -- cups updateUbuntu 10.10cupsUnder certain circumstances, CUPS could start before its AppArmor profile was loaded and therefore run unconfined. This update ensures the AppArmor profile is loaded before CUPS starts.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1045-1 -- fuse vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04fuseIt was discovered that FUSE could be tricked into incorrectly updating the mtab file when mounting filesystems. A local attacker, with access to use FUSE, could unmount arbitrary locations, leading to a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1019-1 -- firefox, firefox-{3.0,3.5}, xulrunner-1.9.{1,2} vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04firefoxfirefox-3.0firefox-3.5xulrunner-1.9.1xulrunner-1.9.2Jesse Ruderman, Andreas Gal, Nils, Brian Hackett, and Igor Bukanov discovered several memory issues in the browser engine. An attacker could exploit these to crash the browser or possibly run arbitrary code as the user invoking the program. It was discovered that Firefox did not properly verify the about:blank location elements when it was opened via window.open. An attacker could exploit this to run arbitrary code with chrome privileges. It was discovered that Firefox did not properly handle <div> elements when processing a XUL tree. If a user were tricked into opening a malicious web page, an attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. Marc Schoenefeld and Christoph Diehl discovered several problems when handling downloadable fonts. The new OTS font sanitizing library was added to mitigate these issues. Gregory Fleischer discovered that the Java LiveConnect script could be made to run in the wrong security context. An attacker could exploit this to read local files and run arbitrary code as the user invoking the program. Several problems were discovered in the JavaScript engine. If a user were tricked into opening a malicious web page, an attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. Michal Zalewski discovered that Firefox did not always properly handle displaying pages from network or certificate errors. An attacker could exploit this to spoof the location bar, such as in a phishing attack. Yosuke Hasegawa and Masatoshi Kimura discovered that several character encodings would have some characters converted to angle brackets. An attacker could utilize this to perform cross-site scripting attacksSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1134-1 -- apache2, apr vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 6.06Ubuntu 10.04apache2aprapr: The Apache Portable Runtime Library - apache2: a scalable, extensible web server A denial of service issue exists that affects the Apache web server.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1011-2 -- thunderbird vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04thunderbirdUSN-1011-1 fixed a vulnerability in Firefox. This update provides the corresponding update for Thunderbird. Original advisory details: Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a user were tricked into navigating to a malicious site, an attacker could cause a denial of service or possibly execute arbitrary code as the user invoking the program.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1030-1 -- krb5 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06krb5It was discovered that Kerberos did not properly determine the acceptability of certain checksums. A remote attacker could use certain checksums to alter the prompt message, modify a response to a Key Distribution Center or forge a KRB-SAFE message. It was discovered that Kerberos did not properly determine the acceptability of certain checksums. A remote attacker could use certain checksums to forge GSS tokens or gain privileges. This issue only affected Ubuntu 9.10, 10.04 LTS and 10.10. It was discovered that Kerberos did not reject RC4 key-derivation checksums. An authenticated remote user could use this issue to forge AD-SIGNEDPATH or AD-KDC-ISSUED signatures and possibly gain privileges. This issue only affected Ubuntu 10.04 LTS and 10.10. It was discovered that Kerberos did not properly restrict the use of TGT credentials for armoring TGS requests. A remote authenticated user could use this flaw to impersonate a client. This issue only affected Ubuntu 9.10SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1125-1 -- pcsc-lite vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04pcsc-litepcsc-lite: Middleware to access a smart card using PC/SC PCSC-Lite could be made to crash or run programs if it accessed a special smart card.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1116-1 -- krb5 vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04krb5krb5: MIT Kerberos services An unauthenticated remote user could crash the Kerberos service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1022-1 -- apr-util vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04apr-utilIt was discovered that APR-util did not properly handle memory when destroying APR buckets. An attacker could exploit this and cause a denial of service via memory exhaustion.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1012-1 -- cups, cupsys vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06cupscupsysEmmanuel Bouillon discovered that CUPS did not properly handle certain Internet Printing Protocol packets. A remote attacker could use this flaw to cause a denial of service or possibly execute arbitrary code. In the default installation in Ubuntu 8.04 LTS and later, attackers would be isolated by the CUPS AppArmor profile.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1042-1 -- php5 vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06php5It was discovered that an integer overflow in the XML UTF-8 decoding code could allow an attacker to bypass cross-site scripting protections. This issue only affected Ubuntu 6.06 LTS, Ubuntu 8.04 LTS, and Ubuntu 9.10. It was discovered that the XML UTF-8 decoding code did not properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data, which could allow an attacker to bypass cross-site scripting protections. It was discovered that attackers might be able to bypass open_basedir restrictions by passing a specially crafted filename. Maksymilian Arciemowicz discovered that a NULL pointer derefence in the ZIP archive handling code could allow an attacker to cause a denial of service through a specially crafted ZIP archive. This issue only affected Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, and Ubuntu 10.10. It was discovered that a stack consumption vulnerability in the filter_var PHP function when in FILTER_VALIDATE_EMAIL mode, could allow a remote attacker to cause a denial of service. This issue only affected Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, and Ubuntu 10.10. It was discovered that the mb_strcut function in the Libmbfl library within PHP could allow an attacker to read arbitrary memory within the application process. This issue only affected Ubuntu 10.10. Maksymilian Arciemowicz discovered that an integer overflow in the NumberFormatter::getSymbol function could allow an attacker to cause a denial of service. This issue only affected Ubuntu 10.04 LTS and Ubuntu 10.10. Rick Regan discovered that when handing PHP textual representations of the largest subnormal double-precision floating-point number, the zend_strtod function could go into an infinite loop on 32bit x86 processors, allowing an attacker to cause a denial of serviceSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1014-1 -- pidgin vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04pidginPierre Noguès discovered that Pidgin incorrectly handled malformed SLP messages in the MSN protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. This issue only affected Ubuntu 8.04 LTS, 9.10 and 10.04 LTS. Daniel Atallah discovered that Pidgin incorrectly handled the return code of the Base64 decoding function. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of serviceSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1002-2 -- postgresql-8.4 vulnerabilityUbuntu 10.10postgresql-8.4USN-1002-1 fixed vulnerabilities in PostgreSQL. This update provides the corresponding update for Ubuntu 10.10. Original advisory details: It was discovered that PostgreSQL did not properly enforce permissions within sessions when PL/Perl and PL/Tcl functions or operators were redefined. A remote authenticated attacker could exploit this to execute arbitrary code with permissions of a different user, possibly leading to privilege escalation.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1076-1 -- clamav vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04clamavIt was discovered that the Microsoft Office processing code in libclamav improperly handled certain Visual Basic for Applications data. This could allow a remote attacker to craft a document that could crash clamav or possibly execute arbitrary code. In the default installation, attackers would be isolated by the ClamAV AppArmor profile.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1081-1 -- linux vulnerabilitiesUbuntu 10.10linuxIt was discovered that KVM did not correctly initialize certain CPU registers. A local attacker could exploit this to crash the system, leading to a denial of service. Thomas Pollet discovered that the RDS network protocol did not check certain iovec buffers. A local attacker could exploit this to crash the system or possibly execute arbitrary code as the root user. Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. Vasiliy Kulikov discovered that the Linux kernel sockets implementation did not properly initialize certain structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. Vasiliy Kulikov discovered that the TIPC interface did not correctly initialize certain structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. Nelson Elhage discovered that the Linux kernel IPv4 implementation did not properly audit certain bytecodes in netlink messages. A local attacker could exploit this to cause the kernel to hang, leading to a denial of service. Dan Rosenberg discovered that the ivtv V4L driver did not correctly initialize certian structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. Dan Rosenberg discovered that the semctl syscall did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. It was discovered that multithreaded exec did not handle CPU timers correctly. A local attacker could exploit this to crash the system, leading to a denial of service. Nelson Elhage discovered that Econet did not correctly handle AUN packets over UDP. A local attacker could send specially crafted traffic to crash the system, leading to a denial of service. Tavis Ormandy discovered that the install_special_mapping function could bypass the mmap_min_addr restriction. A local attacker could exploit this to mmap 4096 bytes below the mmap_min_addr area, possibly improving the chances of performing NULL pointer dereference attacks. Dan Rosenberg discovered that the OSS subsystem did not handle name termination correctly. A local attacker could exploit this crash the system or gain root privileges. Dan Carpenter discovered that the Infiniband driver did not correctly handle certain requests. A local user could exploit this to crash the system or potentially gain root privilegesSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-959-2 -- pam vulnerabilityUbuntu 10.10pamUSN-959-1 fixed vulnerabilities in PAM. This update provides the corresponding updates for Ubuntu 10.10. Original advisory details: Denis Excoffier discovered that the PAM MOTD module in Ubuntu did not correctly handle path permissions when creating user file stamps. A local attacker could exploit this to gain root privilieges.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1047-1 -- awstats vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06awstatsIt was discovered that AWStats did not correctly filter the LoadPlugin configuration option. A local attacker on a shared system could use this to inject arbitrary code into AWStats.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1003-1 -- openssl vulnerabilitiesUbuntu 9.04Ubuntu 9.10Ubuntu 6.06Ubuntu 8.04Ubuntu 10.10Ubuntu 10.04opensslIt was discovered that OpenSSL incorrectly handled return codes from the bn_wexpand function calls. A remote attacker could trigger this flaw in services that used SSL to cause a denial of service or possibly execute arbitrary code with application privileges. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.04 and 9.10. It was discovered that OpenSSL incorrectly handled certain private keys with an invalid prime. A remote attacker could trigger this flaw in services that used SSL to cause a denial of service or possibly execute arbitrary code with application privileges. The default compiler options for affected releases should reduce the vulnerability to a denial of serviceSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUbuntu 9.04 is installedUbuntu 9.04Ubuntu 9.04 is installedSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1106-1 -- nss vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04nssIt was discovered that several invalid HTTPS certificates were issued and revoked. An attacker could exploit these to perform a man in the middle attack to view sensitive information or alter encrypted communications. These certificates were marked as explicitly not trusted to prevent their misuse.SecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1102-1 -- tiff vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06tiffMartin Barbella discovered that the thunder decoder in the TIFF library incorrectly handled an unexpected BitsPerSample value. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could execute arbitrary code with user privileges, or crash the application, leading to a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1088-1 -- krb5 vulnerabilityUbuntu 10.10Ubuntu 9.10Ubuntu 10.04krb5Cameron Meadors discovered that the MIT Kerberos 5 Key Distribution Center daemon is vulnerable to a double-free condition if the Public Key Cryptography for Initial Authentication capability is enabled. This could allow a remote attacker to cause a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1053-1 -- subversion vulnerabilitiesUbuntu 8.04Ubuntu 10.10Ubuntu 10.04Ubuntu 9.10Ubuntu 6.06subversionIt was discovered that Subversion incorrectly handled certain "partial access" privileges in rare scenarios. Remote authenticated users could use this flaw to obtain sensitive information . This issue only applied to Ubuntu 6.06 LTS. It was discovered that the Subversion mod_dav_svn module for Apache did not properly handle a named repository as a rule scope. Remote authenticated users could use this flaw to bypass intended restrictions. This issue only applied to Ubuntu 9.10, 10.04 LTS, and 10.10. It was discovered that the Subversion mod_dav_svn module for Apache incorrectly handled the walk function. Remote authenticated users could use this flaw to cause the service to crash, leading to a denial of service. It was discovered that Subversion incorrectly handled certain memory operations. Remote authenticated users could use this flaw to consume large quantities of memory and cause the service to crash, leading to a denial of service. This issue only applied to Ubuntu 9.10, 10.04 LTS, and 10.10SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUbuntu 6.06 is installedUbuntu 6.06Ubuntu 6.06 is installedSecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUSN-1078-1 -- logwatch vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04logwatchDominik George discovered that logwatch did not properly sanitize log file names that were passed to the shell as part of a command. If a remote attacker were able to generate specially crafted filenames, they could execute arbitrary code with root privileges.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1015-1 -- libvpx vulnerabilityUbuntu 10.10libvpxChristoph Diehl discovered that libvpx did not properly perform bounds checking. If an application using libvpx opened a specially crafted WebM file, an attacker could cause a denial of service or possibly execute code as the user invoking the program.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1054-1 -- linux, linux-ec2 vulnerabilitiesUbuntu 10.10Ubuntu 10.04linuxlinux-ec2Gleb Napatov discovered that KVM did not correctly check certain privileged operations. A local attacker with access to a guest kernel could exploit this to crash the host system, leading to a denial of service. Steve Chen discovered that setsockopt did not correctly check MSS values. A local attacker could make a specially crafted socket call to crash the system, leading to a denial of service. Dave Jones discovered that the mprotect system call did not correctly handle merged VMAs. A local attacker could exploit this to crash the system, leading to a denial of service. Vegard Nossum discovered that memory garbage collection was not handled correctly for active sockets. A local attacker could exploit this to allocate all available kernel memory, leading to a denial of serviceSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1044-1 -- dbus vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04dbusRemi Denis-Courmont discovered that D-Bus did not properly validate the number of nested variants when validating D-Bus messages. A local attacker could exploit this to cause a denial of service.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1031-1 -- clamav vulnerabilitiesUbuntu 10.10Ubuntu 10.04clamavArkadiusz Miskiewicz and others discovered that the PDF processing code in libclamav improperly validated input. This could allow a remote attacker to craft a PDF document that could crash clamav or possibly execute arbitrary code. It was discovered that an off-by-one error in the icon_cb function in pe_icons.c in libclamav could allow an attacker to corrupt memory, causing clamav to crash or possibly execute arbitrary code. In the default installation, attackers would be isolated by the clamav AppArmor profile.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUSN-1024-1 -- openjdk-6 vulnerabilityUbuntu 8.04Ubuntu 10.10Ubuntu 9.10Ubuntu 10.04openjdk-6It was discovered that certain system property information was being leaked, which could allow an attacker to obtain sensitive information.SecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUbuntu 8.04 is installedUbuntu 8.04Ubuntu 8.04 is installedSecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUbuntu 10.10 is installedUbuntu 10.10Ubuntu 10.10 is installedSecPod TeamDRAFTINTERIMACCEPTEDACCEPTEDUbuntu 10.04 is installedUbuntu 10.04Ubuntu 10.04 is installedSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDUbuntu 9.10 is installedUbuntu 9.10Ubuntu 9.10 is installedSecPod TeamDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDitalc-clientmutt-patchedmuttxserver-xorg-corelibrampart0empathylinux-image-2.6.35-30-versatilelinux-image-2.6.35-30-serverlinux-image-2.6.35-30-omaplinux-image-2.6.35-30-powerpclinux-image-2.6.35-30-powerpc-smplinux-image-2.6.35-30-virtuallinux-image-2.6.35-30-generic-paelinux-image-2.6.35-30-genericlinux-image-2.6.35-30-powerpc64-smpca-certificates-javalinux-image-2.6.32-423-dovekdelibs5libkio5libgnutls13libgnutls26linux-image-2.6.32-419-dovelibtiff4backuppclibpng12-0linux-image-2.6.32-423-dovelibssl1.0.0xul-ext-webfavcvslibicu42libicu44libvorbis0axul-ext-mozvoikkobzip2librsvg2-commonlibrsvg2-binlibrsvg2-2librsvg2-devpython3.2-minimalpython3.1-minimalicedtea-6-jre-jamvmicedtea-6-jre-jamvmgdm-guest-sessionsoftware-centerlinux-image-2.6.32-422-dovexul-ext-ubufoxupdate-manager-corequassel-corelibjasper1python-httplib2python3-httplib2puppet-commonacpidlinux-image-2.6.32-421-doveca-certificatespostgresql-9.1ruby1.8libruby1.8libgs8devscriptsauto-upgrade-testerupdate-managerupdate-notifierlinux-image-2.6.35-31-versatilelinux-image-2.6.35-31-generic-paelinux-image-2.6.35-31-powerpclinux-image-2.6.35-31-genericlinux-image-2.6.35-31-omaplinux-image-2.6.35-31-serverlinux-image-2.6.35-31-powerpc64-smplinux-image-2.6.35-31-virtuallinux-image-2.6.35-31-powerpc-smplibt1-5arklinux-image-2.6.32-420-dovelinux-image-2.6.32-418-dovepython-software-propertieslinux-image-2.6.35-32-generic-paelinux-image-2.6.35-32-virtuallinux-image-2.6.35-32-genericlinux-image-2.6.35-32-serverlinux-image-2.6.35-32-genericlinux-image-2.6.35-32-powerpclinux-image-2.6.35-32-serverlinux-image-2.6.35-32-virtuallinux-image-2.6.35-32-powerpc64-smplinux-image-2.6.35-32-powerpc-smplinux-image-2.6.35-32-omaplinux-image-2.6.35-32-generic-paelinux-image-2.6.35-32-versatilepython-pamlibarchive1libnss3isc-dhcp-serverradvdlibxfont1aptxserver-xorglibdns69ecryptfs-utilslibsndfile1libpng12-0likewise-openicedtea-netxicedtea-pluginrsyncfoomatic-filterslibslp1linux-image-2.6.35-903-omap4perlusb-creator-commonlinux-image-2.6.32-417-dovekgetapturl-commonlibkhtml5libkio5kdelibs5vinonbd-serverrdesktopdhcp3-server-ldapdhcp3-clientdhcp-clientdhcp3-relaydhcp3-devdhcp3-commondhcp3-client-udebdhcp3-serverqt4-dev-tools-dbglibqt4-dev-dbgphonon-dbglibqt4-declarative-particleslibqtcore4libqt4-sql-psqllibqt4-corelibqt4-designerlibqt4-networklibqt4-multimedialibqt4-declarative-folderlistmodellibqt4-debugqt4-demos-dbglibqt4-helplibphonon-devlibqt4-sql-odbcqt4-qmakelibqt4-devlibqt4-xmllibqt4-sqllibqt4-declarative-gestureslibqt4-sql-sqlitephononlibqt4-testqt4-qtconfiglibqt4-scripttoolslibqt4-sql-mysqllibqt4-sql-tdslibqt4-dbglibqt4-phononlibqt4-scriptlibphonon4libqt4-webkitlibqt4-phonon-devlibqtgui4libqt4-opengl-devlibqt4-xmlpatternsqt4-demoslibqt4-qt3supportlibqt4-declarativelibqt4-xmlpatterns-dbgqt4-designerqt4-qmlviewerlibqt4-openglqt4-dev-toolslibqt4-svgqt4-doc-htmllibqt4-guilibqt4-sql-sqlite2libqt4-webkit-dbglibqt4-assistantqt4-doclibvirt-doclibvirt0libvirt0-dbglibvirt-devpython-libvirtlibvirt-bingdmvsftpdgimp-gnomevfsgimp-pythonlibgimp2.0gimp-libcurllibgimp2.0-doclibgimp2.0-devgimpgimp-dbggimp-datatex-commonlanguage-selector-commonlibpolkit-backend-1-0libsoup2.4-1libmodplug0c2libmodplug1irda-modules-2.6.32-30-powerpc-dilinux-image-2.6.32-30-powerpcinput-modules-2.6.32-30-powerpc-dippp-modules-2.6.32-30-powerpc64-smp-diblock-modules-2.6.32-30-powerpc-dipcmcia-storage-modules-2.6.32-30-powerpc-disata-modules-2.6.32-30-powerpc64-smp-diplip-modules-2.6.32-30-powerpc64-smp-difs-core-modules-2.6.32-30-generic-dippp-modules-2.6.32-30-powerpc-diusb-modules-2.6.32-30-powerpc64-smp-difs-core-modules-2.6.32-30-powerpc-diusb-modules-2.6.32-30-generic-diplip-modules-2.6.32-30-sparc64-dimd-modules-2.6.32-30-generic-dipcmcia-modules-2.6.32-30-powerpc64-smp-diinput-modules-2.6.32-30-powerpc64-smp-difirewire-core-modules-2.6.32-30-powerpc64-smp-dipata-modules-2.6.32-30-powerpc-dikernel-image-2.6.32-30-generic-difs-secondary-modules-2.6.32-30-powerpc-divlan-modules-2.6.32-30-sparc64-dimd-modules-2.6.32-30-powerpc-disata-modules-2.6.32-30-sparc64-dinic-shared-modules-2.6.32-30-generic-difloppy-modules-2.6.32-30-generic-distorage-core-modules-2.6.32-30-generic-dilinux-image-2.6.32-30-genericchar-modules-2.6.32-30-generic-distorage-core-modules-2.6.32-30-powerpc64-smp-dinic-pcmcia-modules-2.6.32-30-generic-dinic-modules-2.6.32-30-powerpc-difs-secondary-modules-2.6.32-30-powerpc64-smp-diblock-modules-2.6.32-30-generic-dipcmcia-modules-2.6.32-30-generic-dimessage-modules-2.6.32-30-powerpc-dimessage-modules-2.6.32-30-sparc64-dimd-modules-2.6.32-30-powerpc64-smp-dinic-pcmcia-modules-2.6.32-30-powerpc64-smp-dipata-modules-2.6.32-30-generic-dimouse-modules-2.6.32-30-powerpc-disquashfs-modules-2.6.32-30-powerpc-dilinux-headers-2.6.32-30-sparc64fb-modules-2.6.32-30-generic-dicrypto-modules-2.6.32-30-powerpc-difs-secondary-modules-2.6.32-30-generic-dinic-shared-modules-2.6.32-30-sparc64-difat-modules-2.6.32-30-powerpc64-smp-dinic-usb-modules-2.6.32-30-powerpc-difirewire-core-modules-2.6.32-30-generic-dilinux-headers-2.6.32-30-genericparport-modules-2.6.35-28-generic-pae-disata-modules-2.6.32-30-generic-dipata-modules-2.6.32-30-sparc64-dinic-usb-modules-2.6.35-28-generic-diusb-modules-2.6.32-30-sparc64-dipcmcia-modules-2.6.32-30-powerpc-difb-modules-2.6.35-28-generic-disquashfs-modules-2.6.32-30-sparc64-dicrypto-modules-2.6.35-28-generic-diusb-modules-2.6.35-28-generic-dilinux-headers-2.6.32-30-powerpc64-smpblock-modules-2.6.35-28-virtual-dikernel-image-2.6.35-28-generic-difat-modules-2.6.32-30-powerpc-dimouse-modules-2.6.35-28-generic-pae-dicrypto-modules-2.6.32-30-sparc64-difloppy-modules-2.6.32-30-powerpc-dilinux-image-2.6.32-30-powerpc64-smplinux-image-2.6.35-28-virtualparport-modules-2.6.32-30-generic-difs-core-modules-2.6.32-30-powerpc64-smp-disquashfs-modules-2.6.35-28-virtual-difloppy-modules-2.6.35-28-generic-dimouse-modules-2.6.35-28-generic-difirewire-core-modules-2.6.35-28-powerpc64-smp-dimd-modules-2.6.32-30-sparc64-difirewire-core-modules-2.6.32-30-sparc64-dipcmcia-modules-2.6.35-28-generic-pae-dimouse-modules-2.6.32-30-sparc64-divirtio-modules-2.6.35-28-virtual-dinic-shared-modules-2.6.35-28-virtual-disquashfs-modules-2.6.32-30-powerpc64-smp-dikernel-image-2.6.32-30-powerpc64-smp-dinic-shared-modules-2.6.32-30-powerpc64-smp-distorage-core-modules-2.6.32-30-powerpc-diserial-modules-2.6.35-28-generic-pae-difat-modules-2.6.35-28-powerpc64-smp-dilinux-headers-2.6.35-28-serverstorage-core-modules-2.6.35-28-generic-dilinux-tools-2.6.32-30parport-modules-2.6.32-30-sparc64-dimessage-modules-2.6.32-30-generic-dipcmcia-storage-modules-2.6.35-28-generic-diserial-modules-2.6.32-30-generic-diinput-modules-2.6.35-28-powerpc-dinic-modules-2.6.35-28-powerpc64-smp-divirtio-modules-2.6.35-28-generic-dilinux-image-2.6.32-30-powerpc-smpchar-modules-2.6.35-28-generic-dicrypto-modules-2.6.32-30-generic-dikernel-image-2.6.35-28-generic-pae-disquashfs-modules-2.6.35-28-generic-difat-modules-2.6.32-30-sparc64-dilinux-headers-2.6.35-28-powerpc64-smpirda-modules-2.6.32-30-generic-dinfs-modules-2.6.35-28-generic-pae-dilinux-image-2.6.35-28-genericnic-usb-modules-2.6.35-28-generic-pae-diserial-modules-2.6.32-30-sparc64-dilinux-image-2.6.32-30-sparc64-smpstorage-core-modules-2.6.35-28-powerpc64-smp-distorage-core-modules-2.6.35-28-generic-pae-divlan-modules-2.6.35-28-generic-pae-dilinux-image-2.6.35-28-powerpc-smpnfs-modules-2.6.35-28-generic-dinic-shared-modules-2.6.35-28-powerpc64-smp-diusb-modules-2.6.35-28-powerpc64-smp-dinfs-modules-2.6.32-30-powerpc-difs-core-modules-2.6.35-28-generic-diblock-modules-2.6.35-28-generic-pae-divlan-modules-2.6.32-30-powerpc64-smp-dippp-modules-2.6.35-28-generic-pae-divlan-modules-2.6.35-28-virtual-dilinux-image-2.6.32-30-virtualfs-secondary-modules-2.6.35-28-generic-dilinux-image-2.6.35-28-generic-paelinux-tools-2.6.35-28nic-modules-2.6.32-30-generic-dinfs-modules-2.6.35-28-powerpc64-smp-difirewire-core-modules-2.6.32-30-powerpc-discsi-modules-2.6.32-30-generic-dicrypto-modules-2.6.32-30-powerpc64-smp-dipcmcia-storage-modules-2.6.35-28-powerpc-diirda-modules-2.6.35-28-powerpc-diserial-modules-2.6.32-30-powerpc-disata-modules-2.6.32-30-powerpc-diplip-modules-2.6.32-30-generic-diinput-modules-2.6.32-30-generic-dikernel-image-2.6.35-28-powerpc-dinic-pcmcia-modules-2.6.35-28-powerpc-difs-core-modules-2.6.35-28-powerpc-dimouse-modules-2.6.35-28-powerpc-difs-core-modules-2.6.35-28-generic-pae-dilinux-headers-2.6.35-28-virtualscsi-modules-2.6.35-28-powerpc64-smp-difloppy-modules-2.6.35-28-virtual-diplip-modules-2.6.35-28-powerpc64-smp-difloppy-modules-2.6.35-28-generic-pae-discsi-modules-2.6.35-28-generic-pae-disata-modules-2.6.35-28-virtual-disquashfs-modules-2.6.35-28-powerpc-dikernel-image-2.6.32-30-sparc64-disquashfs-modules-2.6.35-28-powerpc64-smp-dimouse-modules-2.6.32-30-powerpc64-smp-dilinux-headers-2.6.35-28-powerpcfirewire-core-modules-2.6.35-28-generic-dicrypto-modules-2.6.35-28-generic-pae-dilinux-headers-2.6.35-28-powerpc-smpfb-modules-2.6.35-28-generic-pae-dipata-modules-2.6.35-28-powerpc-divlan-modules-2.6.35-28-generic-difb-modules-2.6.35-28-virtual-difs-core-modules-2.6.35-28-powerpc64-smp-difs-core-modules-2.6.35-28-virtual-dimessage-modules-2.6.35-28-powerpc-difs-secondary-modules-2.6.35-28-generic-pae-diparport-modules-2.6.32-30-powerpc-dilinux-image-2.6.35-28-powerpc64-smpnic-pcmcia-modules-2.6.35-28-generic-pae-dichar-modules-2.6.35-28-generic-pae-diblock-modules-2.6.32-30-sparc64-dippp-modules-2.6.35-28-virtual-dinic-shared-modules-2.6.32-30-powerpc-dipcmcia-storage-modules-2.6.32-30-powerpc64-smp-dilinux-headers-2.6.35-28input-modules-2.6.32-30-sparc64-disquashfs-modules-2.6.32-30-generic-difloppy-modules-2.6.32-30-powerpc64-smp-diirda-modules-2.6.32-30-powerpc64-smp-dinfs-modules-2.6.32-30-powerpc64-smp-dinic-modules-2.6.32-30-powerpc64-smp-dicrypto-modules-2.6.35-28-powerpc64-smp-dipcmcia-storage-modules-2.6.32-30-generic-dimd-modules-2.6.35-28-generic-pae-dicrypto-modules-2.6.35-28-powerpc-discsi-modules-2.6.32-30-powerpc-dimessage-modules-2.6.35-28-generic-pae-divlan-modules-2.6.32-30-powerpc-dinic-modules-2.6.35-28-powerpc-dinic-usb-modules-2.6.32-30-powerpc64-smp-distorage-core-modules-2.6.32-30-sparc64-dinic-shared-modules-2.6.35-28-generic-dimd-modules-2.6.35-28-virtual-difat-modules-2.6.35-28-virtual-difs-secondary-modules-2.6.35-28-powerpc64-smp-discsi-modules-2.6.32-30-sparc64-dimd-modules-2.6.35-28-generic-dimd-modules-2.6.35-28-powerpc-dikernel-image-2.6.32-30-powerpc-diblock-modules-2.6.35-28-powerpc64-smp-difs-secondary-modules-2.6.35-28-powerpc-dikernel-image-2.6.35-28-virtual-diblock-modules-2.6.35-28-powerpc-diserial-modules-2.6.35-28-generic-disata-modules-2.6.35-28-powerpc64-smp-dippp-modules-2.6.32-30-generic-dinic-shared-modules-2.6.35-28-generic-pae-diparport-modules-2.6.35-28-virtual-dilinux-image-2.6.35-28-serversquashfs-modules-2.6.35-28-generic-pae-difirewire-core-modules-2.6.35-28-powerpc-distorage-core-modules-2.6.35-28-virtual-dilinux-headers-2.6.35-28-generic-paenfs-modules-2.6.32-30-generic-difat-modules-2.6.35-28-generic-dilinux-headers-2.6.35-28-genericparport-modules-2.6.35-28-powerpc-difs-core-modules-2.6.32-30-sparc64-dinic-usb-modules-2.6.32-30-generic-diserial-modules-2.6.32-30-powerpc64-smp-dimessage-modules-2.6.35-28-powerpc64-smp-diusb-modules-2.6.35-28-generic-pae-dipcmcia-modules-2.6.35-28-powerpc64-smp-distorage-core-modules-2.6.35-28-powerpc-diplip-modules-2.6.35-28-generic-discsi-modules-2.6.35-28-virtual-dilinux-headers-2.6.32-30serial-modules-2.6.35-28-powerpc64-smp-dimouse-modules-2.6.32-30-generic-dilinux-headers-2.6.32-30-sparc64-smpppp-modules-2.6.32-30-sparc64-divirtio-modules-2.6.35-28-generic-pae-difat-modules-2.6.32-30-generic-diinput-modules-2.6.35-28-powerpc64-smp-discsi-modules-2.6.35-28-powerpc-difs-secondary-modules-2.6.32-30-sparc64-diinput-modules-2.6.35-28-generic-dinfs-modules-2.6.35-28-powerpc-dinic-modules-2.6.35-28-virtual-difirewire-core-modules-2.6.35-28-generic-pae-disata-modules-2.6.35-28-generic-pae-diblock-modules-2.6.35-28-generic-dipata-modules-2.6.35-28-powerpc64-smp-dipcmcia-storage-modules-2.6.35-28-powerpc64-smp-dimd-modules-2.6.35-28-powerpc64-smp-divlan-modules-2.6.35-28-powerpc-dilinux-image-2.6.32-30-sparc64nic-usb-modules-2.6.32-30-sparc64-diserial-modules-2.6.35-28-powerpc-discsi-modules-2.6.32-30-powerpc64-smp-dinic-pcmcia-modules-2.6.35-28-powerpc64-smp-dilinux-headers-2.6.32-30-powerpcirda-modules-2.6.35-28-generic-pae-diusb-modules-2.6.35-28-powerpc-disata-modules-2.6.35-28-generic-dinic-pcmcia-modules-2.6.35-28-generic-dimessage-modules-2.6.35-28-virtual-dipcmcia-modules-2.6.35-28-powerpc-dimessage-modules-2.6.35-28-generic-divirtio-modules-2.6.32-30-generic-dinfs-modules-2.6.32-30-sparc64-dinic-usb-modules-2.6.35-28-powerpc-discsi-modules-2.6.35-28-generic-difs-secondary-modules-2.6.35-28-virtual-difat-modules-2.6.35-28-generic-pae-dinic-modules-2.6.32-30-sparc64-difloppy-modules-2.6.35-28-powerpc-diirda-modules-2.6.35-28-generic-divlan-modules-2.6.35-28-powerpc64-smp-diblock-modules-2.6.32-30-powerpc64-smp-diparport-modules-2.6.32-30-powerpc64-smp-dinic-modules-2.6.35-28-generic-dicrypto-modules-2.6.35-28-virtual-diplip-modules-2.6.35-28-powerpc-dipata-modules-2.6.35-28-generic-dilinux-image-2.6.35-28-powerpcinput-modules-2.6.35-28-generic-pae-divlan-modules-2.6.32-30-generic-dikernel-image-2.6.35-28-powerpc64-smp-dippp-modules-2.6.35-28-generic-diplip-modules-2.6.35-28-generic-pae-diirda-modules-2.6.35-28-powerpc64-smp-dinic-shared-modules-2.6.35-28-powerpc-diirda-modules-2.6.35-28-virtual-diplip-modules-2.6.32-30-powerpc-diparport-modules-2.6.35-28-generic-difloppy-modules-2.6.35-28-powerpc64-smp-dipcmcia-modules-2.6.35-28-generic-dimessage-modules-2.6.32-30-powerpc64-smp-dilinux-headers-2.6.32-30-powerpc-smppata-modules-2.6.32-30-powerpc64-smp-dinic-pcmcia-modules-2.6.32-30-powerpc-diusb-modules-2.6.32-30-powerpc-dinic-usb-modules-2.6.35-28-powerpc64-smp-dimouse-modules-2.6.35-28-virtual-dinic-modules-2.6.35-28-generic-pae-difat-modules-2.6.35-28-powerpc-disata-modules-2.6.35-28-powerpc-dipata-modules-2.6.35-28-generic-pae-dipcmcia-storage-modules-2.6.35-28-generic-pae-dippp-modules-2.6.35-28-powerpc64-smp-dippp-modules-2.6.35-28-powerpc-dimouse-modules-2.6.35-28-powerpc64-smp-diparport-modules-2.6.35-28-powerpc64-smp-diopenoffice.org-pdfimportopenoffice.org-calcopenoffice.org-qa-api-testslibuno-cli-basetypes1.0-cilopenoffice.org-mysql-connectorpython-unoopenoffice.org-presentation-minimizeropenoffice.org-qa-toolsopenoffice.org-baseopenoffice.org-coreopenoffice.org-java-commonlibuno-cilmozilla-openoffice.orgopenoffice.org-style-oxygenopenoffice.org-style-humanopenoffice.org-style-andromedaopenoffice.org-presenter-consoleuno-libs3cli-uno-bridgeopenoffice.org-filter-mobiledevopenoffice.org-headlessopenoffice.org-l10n-inopenoffice.org-dev-docopenoffice.org-emailmergeopenoffice.org-kdeopenoffice.org-dtd-officedocument1.0openoffice.org-style-crystallibuno-cli-ure1.0-cillibuno-cli-uretypes1.0-cilopenoffice.org-l10n-zattf-opensymbolopenoffice.org-base-coreopenoffice.orgbroffice.orgopenoffice.org-writeropenoffice.org-gcjure-dbgopenoffice.org-gnomeopenoffice.org-gtklibuno-cli-oootypes1.0-cillibmythes-devureopenoffice.org-report-builder-binuno-libs3-dbgopenoffice.org-report-builderopenoffice.org-officebeanopenoffice.org-style-hicontrastopenoffice.org-style-galaxyopenoffice.org-style-industrialopenoffice.org-ogltranslibuno-cli-cppuhelper1.0-cilopenoffice.org-style-tangoopenoffice.org-filter-binfilteropenoffice.org-mathopenoffice.org-evolutionopenoffice.org-impressopenoffice.org-devopenoffice.org-drawopenoffice.org-wiki-publisheropenoffice.org-sdbc-postgresqlopenoffice.org-commonexim4-deveximon4exim4-dbggforge-mta-exim4exim4-baseexim4-daemon-light-dbgexim4-daemon-heavy-dbgexim4-configdbusmailmanslapd-dbgldap-utilslibldap-2.4-2-dbglibldap-2.4-2slapdlibldap2-devpostgresql-contrib-8.1libecpg5postgresql-plpython-8.1postgresql-doc-8.1postgresql-pltcl-8.1postgresql-client-8.1libpgtypes2libecpg-compat2libpq4postgresql-plpython-8.3postgresql-server-dev-8.3postgresql-plperl-8.1postgresql-doc-8.3postgresql-contrib-8.3postgresql-plperl-8.3postgresql-8.1postgresql-client-8.3postgresql-pltcl-8.3postgresql-server-dev-8.1postgresql-8.3libpango1.0-udebgir1.0-pango-1.0libpango1.0-commonlibpango1.0-devlibpango1.0-0libpango1.0-doclibpango1.0-0-dbglibevview3libevdocument2evince-gtkevince-commonevince-gtk-dbgevince-dbglibevdocument3gir1.0-evince-2.32libevview-devlibevdocument-devlibevview1evincelibevdocument1libevview2firefoxfirefox-gnome-supportsudo-ldapsudolibavfilter1libavutil1dlibswscale1dlibavcodec1dffmpeg-doclibavfilter0libavutil49libavformat1dlibavdevice-devlibavutil-devlibpostproc1dlibavcodec52libavfilter-devlibswscale-devlibpostproc-devlibavcodec-devlibavformat52libavutil50libswscale0ffmpeglibpostproc51libavformat-devffmpeg-dbglibavdevice52mysql-server-5.1mysql-testsuitelibmysqld-piclibmysqlclient-devlibmysqlclient16-devmysql-server-5.0libmysqlclient15-devmysql-clientmysql-client-5.1mysql-server-core-5.1libmysqlclient15offmysql-commonlibmysqlclient16mysql-client-5.0mysql-client-core-5.1libmysqld-devmysql-servervlan-modules-2.6.32-27-powerpc-dipata-modules-2.6.32-27-powerpc-dilinux-headers-2.6.32-27-powerpc64-smpserial-modules-2.6.32-27-powerpc64-smp-dimouse-modules-2.6.32-27-powerpc-dinic-usb-modules-2.6.32-27-sparc64-diblock-modules-2.6.32-27-sparc64-dimd-modules-2.6.32-27-powerpc-discsi-modules-2.6.32-27-powerpc-dilinux-headers-2.6.32-27-sparc64-smpusb-modules-2.6.32-27-sparc64-distorage-core-modules-2.6.32-27-powerpc64-smp-dilinux-image-2.6.32-27-sparc64usb-modules-2.6.32-27-powerpc64-smp-diplip-modules-2.6.32-27-powerpc64-smp-dipata-modules-2.6.32-27-powerpc64-smp-difloppy-modules-2.6.32-27-powerpc64-smp-difs-core-modules-2.6.32-27-powerpc64-smp-dilinux-image-2.6.32-27-powerpc64-smpparport-modules-2.6.32-27-powerpc-dimouse-modules-2.6.32-27-sparc64-disata-modules-2.6.32-27-generic-diparport-modules-2.6.32-27-powerpc64-smp-discsi-modules-2.6.32-27-sparc64-disata-modules-2.6.32-27-powerpc-dipcmcia-modules-2.6.32-27-powerpc-dicrypto-modules-2.6.32-27-powerpc64-smp-diserial-modules-2.6.32-27-sparc64-dicrypto-modules-2.6.32-27-powerpc-disquashfs-modules-2.6.32-27-sparc64-dichar-modules-2.6.32-27-generic-dicrypto-modules-2.6.32-27-sparc64-dikernel-image-2.6.32-27-generic-dimessage-modules-2.6.32-27-powerpc-dinic-pcmcia-modules-2.6.32-27-generic-dipcmcia-storage-modules-2.6.32-27-powerpc64-smp-dinic-modules-2.6.32-27-powerpc-difs-secondary-modules-2.6.32-27-sparc64-difs-core-modules-2.6.32-27-sparc64-diinput-modules-2.6.32-27-powerpc-difirewire-core-modules-2.6.32-27-powerpc64-smp-diparport-modules-2.6.32-27-sparc64-dinic-usb-modules-2.6.32-27-powerpc-dipcmcia-storage-modules-2.6.32-27-powerpc-difloppy-modules-2.6.32-27-generic-dilinux-image-2.6.32-27-genericlinux-headers-2.6.32-311scsi-modules-2.6.32-27-generic-dipcmcia-storage-modules-2.6.32-27-generic-dilinux-image-2.6.32-27-powerpcmd-modules-2.6.32-27-powerpc64-smp-difat-modules-2.6.32-27-powerpc-difat-modules-2.6.32-27-sparc64-difirewire-core-modules-2.6.32-27-powerpc-disquashfs-modules-2.6.32-27-powerpc-dilinux-image-2.6.32-27-virtualsquashfs-modules-2.6.32-27-generic-dimessage-modules-2.6.32-27-sparc64-diblock-modules-2.6.32-27-powerpc-disquashfs-modules-2.6.35-24-generic-pae-diirda-modules-2.6.32-27-powerpc64-smp-dinic-modules-2.6.35-24-generic-pae-diinput-modules-2.6.32-27-powerpc64-smp-dilinux-headers-2.6.32-311-ec2fs-core-modules-2.6.35-24-virtual-discsi-modules-2.6.35-24-powerpc64-smp-dipcmcia-storage-modules-2.6.35-24-powerpc64-smp-difloppy-modules-2.6.35-24-virtual-dilinux-image-2.6.32-27-powerpc-smpsata-modules-2.6.35-24-powerpc64-smp-diirda-modules-2.6.35-24-generic-pae-dimouse-modules-2.6.35-24-virtual-discsi-modules-2.6.35-24-generic-pae-dimessage-modules-2.6.35-24-virtual-diusb-modules-2.6.32-27-powerpc-diblock-modules-2.6.35-24-powerpc64-smp-divirtio-modules-2.6.35-24-generic-dinic-usb-modules-2.6.35-24-generic-pae-diinput-modules-2.6.32-27-sparc64-dilinux-image-2.6.35-24-powerpc-smppata-modules-2.6.35-24-powerpc64-smp-difirewire-core-modules-2.6.35-24-generic-pae-difat-modules-2.6.35-24-virtual-diplip-modules-2.6.35-24-generic-pae-dinic-pcmcia-modules-2.6.35-24-generic-pae-diirda-modules-2.6.32-27-generic-divirtio-modules-2.6.35-24-virtual-difs-secondary-modules-2.6.32-27-powerpc64-smp-dimouse-modules-2.6.35-24-powerpc-difb-modules-2.6.35-24-generic-pae-dipcmcia-modules-2.6.35-24-generic-disquashfs-modules-2.6.35-24-virtual-diirda-modules-2.6.35-24-generic-difs-core-modules-2.6.32-27-powerpc-dipcmcia-modules-2.6.32-27-powerpc64-smp-dimd-modules-2.6.35-24-generic-pae-dinic-usb-modules-2.6.35-24-generic-dipcmcia-modules-2.6.35-24-generic-pae-disata-modules-2.6.35-24-generic-difloppy-modules-2.6.35-24-generic-pae-dipata-modules-2.6.32-27-generic-dikernel-image-2.6.32-27-powerpc64-smp-dinic-shared-modules-2.6.32-27-generic-dilinux-image-2.6.35-24-virtualnfs-modules-2.6.32-27-powerpc64-smp-difb-modules-2.6.32-27-generic-dikernel-image-2.6.35-24-powerpc-diblock-modules-2.6.35-24-virtual-difb-modules-2.6.35-24-virtual-dicrypto-modules-2.6.35-24-powerpc-distorage-core-modules-2.6.32-27-generic-distorage-core-modules-2.6.35-24-powerpc64-smp-dipcmcia-storage-modules-2.6.35-24-generic-discsi-modules-2.6.32-27-powerpc64-smp-dimouse-modules-2.6.32-27-powerpc64-smp-diplip-modules-2.6.32-27-powerpc-dinic-shared-modules-2.6.32-27-sparc64-dinic-shared-modules-2.6.32-27-powerpc-diserial-modules-2.6.35-24-powerpc64-smp-dinic-modules-2.6.35-24-virtual-dilinux-headers-2.6.35-24-virtualnic-modules-2.6.32-27-powerpc64-smp-diinput-modules-2.6.32-27-generic-difirewire-core-modules-2.6.32-27-generic-diirda-modules-2.6.32-27-powerpc-divirtio-modules-2.6.32-27-generic-dilinux-headers-2.6.32-27-sparc64usb-modules-2.6.35-24-generic-pae-dippp-modules-2.6.35-24-powerpc-dichar-modules-2.6.35-24-generic-diserial-modules-2.6.35-24-powerpc-divlan-modules-2.6.35-24-virtual-diplip-modules-2.6.32-27-generic-dimessage-modules-2.6.32-27-generic-dimessage-modules-2.6.32-27-powerpc64-smp-difs-core-modules-2.6.35-24-powerpc64-smp-dippp-modules-2.6.32-27-powerpc64-smp-dinfs-modules-2.6.35-24-generic-pae-dikernel-image-2.6.35-24-generic-pae-dinic-usb-modules-2.6.32-27-generic-dikernel-image-2.6.32-27-sparc64-dilinux-headers-2.6.32-27-powerpc-smplinux-headers-2.6.32-27sata-modules-2.6.35-24-powerpc-dimd-modules-2.6.32-27-generic-dinic-shared-modules-2.6.35-24-generic-dinic-modules-2.6.35-24-generic-dippp-modules-2.6.35-24-powerpc64-smp-dippp-modules-2.6.32-27-sparc64-disquashfs-modules-2.6.32-27-powerpc64-smp-disata-modules-2.6.35-24-generic-pae-difirewire-core-modules-2.6.35-24-powerpc64-smp-difs-core-modules-2.6.35-24-generic-diirda-modules-2.6.35-24-powerpc-divlan-modules-2.6.32-27-sparc64-difat-modules-2.6.32-27-generic-difat-modules-2.6.35-24-powerpc-dipcmcia-storage-modules-2.6.35-24-powerpc-dinic-pcmcia-modules-2.6.32-27-powerpc-diirda-modules-2.6.35-24-virtual-dilinux-image-2.6.35-24-genericnic-pcmcia-modules-2.6.35-24-powerpc-dipcmcia-modules-2.6.35-24-powerpc-diserial-modules-2.6.35-24-generic-pae-diparport-modules-2.6.35-24-generic-discsi-modules-2.6.35-24-generic-dilinux-tools-2.6.35-24usb-modules-2.6.35-24-powerpc-dilinux-headers-2.6.35-24-serverfs-secondary-modules-2.6.35-24-powerpc-difat-modules-2.6.35-24-generic-dippp-modules-2.6.32-27-generic-dipata-modules-2.6.35-24-powerpc-diblock-modules-2.6.35-24-generic-pae-dimd-modules-2.6.32-27-sparc64-difs-secondary-modules-2.6.35-24-generic-pae-disata-modules-2.6.35-24-virtual-diserial-modules-2.6.32-27-generic-dippp-modules-2.6.35-24-virtual-disata-modules-2.6.32-27-powerpc64-smp-difs-core-modules-2.6.35-24-powerpc-dinic-shared-modules-2.6.35-24-generic-pae-diblock-modules-2.6.32-27-powerpc64-smp-diirda-modules-2.6.35-24-powerpc64-smp-diplip-modules-2.6.32-27-sparc64-distorage-core-modules-2.6.35-24-powerpc-difb-modules-2.6.35-24-generic-difat-modules-2.6.35-24-powerpc64-smp-difs-secondary-modules-2.6.35-24-generic-difs-secondary-modules-2.6.35-24-virtual-dinic-usb-modules-2.6.35-24-powerpc64-smp-dippp-modules-2.6.35-24-generic-pae-divirtio-modules-2.6.35-24-generic-pae-dinfs-modules-2.6.35-24-generic-dicrypto-modules-2.6.35-24-generic-pae-diusb-modules-2.6.35-24-generic-difat-modules-2.6.35-24-generic-pae-diparport-modules-2.6.35-24-generic-pae-dimessage-modules-2.6.35-24-powerpc-disquashfs-modules-2.6.35-24-generic-dilinux-headers-2.6.35-24nic-modules-2.6.32-27-sparc64-dinic-modules-2.6.35-24-powerpc64-smp-diparport-modules-2.6.35-24-virtual-discsi-modules-2.6.35-24-virtual-difs-core-modules-2.6.32-27-generic-dicrypto-modules-2.6.35-24-generic-difirewire-core-modules-2.6.35-24-powerpc-divlan-modules-2.6.32-27-generic-diblock-modules-2.6.35-24-powerpc-dinic-shared-modules-2.6.32-27-powerpc64-smp-dinfs-modules-2.6.32-27-powerpc-dimouse-modules-2.6.35-24-powerpc64-smp-diparport-modules-2.6.35-24-powerpc64-smp-diusb-modules-2.6.32-27-generic-dikernel-image-2.6.35-24-powerpc64-smp-dinic-usb-modules-2.6.32-27-powerpc64-smp-dipcmcia-modules-2.6.32-27-generic-difirewire-core-modules-2.6.35-24-generic-dilinux-headers-2.6.35-24-powerpc64-smpmessage-modules-2.6.35-24-powerpc64-smp-diusb-modules-2.6.35-24-powerpc64-smp-diparport-modules-2.6.32-27-generic-diinput-modules-2.6.35-24-generic-difs-secondary-modules-2.6.32-27-generic-diparport-modules-2.6.35-24-powerpc-diplip-modules-2.6.35-24-generic-dicrypto-modules-2.6.35-24-virtual-dinic-pcmcia-modules-2.6.35-24-generic-dippp-modules-2.6.35-24-generic-diinput-modules-2.6.35-24-powerpc-diserial-modules-2.6.32-27-powerpc-diblock-modules-2.6.32-27-generic-diinput-modules-2.6.35-24-generic-pae-dilinux-image-2.6.35-24-generic-paestorage-core-modules-2.6.35-24-virtual-dicrypto-modules-2.6.32-27-generic-dilinux-image-2.6.35-24-powerpcfat-modules-2.6.32-27-powerpc64-smp-dinic-usb-modules-2.6.35-24-powerpc-dilinux-headers-2.6.35-24-generic-paenic-shared-modules-2.6.35-24-powerpc64-smp-dimd-modules-2.6.35-24-generic-dinic-pcmcia-modules-2.6.35-24-powerpc64-smp-dilinux-headers-2.6.35-24-powerpc-smppata-modules-2.6.35-24-generic-pae-dimouse-modules-2.6.32-27-generic-dinic-modules-2.6.32-27-generic-dichar-modules-2.6.35-24-generic-pae-dipcmcia-storage-modules-2.6.35-24-generic-pae-divlan-modules-2.6.35-24-powerpc-dipata-modules-2.6.32-27-sparc64-distorage-core-modules-2.6.32-27-powerpc-dimessage-modules-2.6.35-24-generic-dikernel-image-2.6.32-27-powerpc-dinic-shared-modules-2.6.35-24-virtual-distorage-core-modules-2.6.32-27-sparc64-dilinux-headers-2.6.32-27-genericcrypto-modules-2.6.35-24-powerpc64-smp-divlan-modules-2.6.32-27-powerpc64-smp-dimouse-modules-2.6.35-24-generic-pae-dimd-modules-2.6.35-24-virtual-dilinux-tools-2.6.32-27md-modules-2.6.35-24-powerpc-dikernel-image-2.6.35-24-virtual-dilinux-image-2.6.32-311-ec2fs-secondary-modules-2.6.32-27-powerpc-diplip-modules-2.6.35-24-powerpc-dilinux-image-2.6.35-24-servermd-modules-2.6.35-24-powerpc64-smp-distorage-core-modules-2.6.35-24-generic-dimouse-modules-2.6.35-24-generic-dipcmcia-modules-2.6.35-24-powerpc64-smp-dinic-shared-modules-2.6.35-24-powerpc-difs-core-modules-2.6.35-24-generic-pae-dilinux-image-2.6.32-27-sparc64-smpfloppy-modules-2.6.35-24-powerpc64-smp-dilinux-headers-2.6.35-24-powerpcvlan-modules-2.6.35-24-generic-diblock-modules-2.6.35-24-generic-disquashfs-modules-2.6.35-24-powerpc64-smp-difloppy-modules-2.6.35-24-generic-difs-secondary-modules-2.6.35-24-powerpc64-smp-diplip-modules-2.6.35-24-powerpc64-smp-difloppy-modules-2.6.35-24-powerpc-dinfs-modules-2.6.35-24-powerpc-diserial-modules-2.6.35-24-generic-dinic-pcmcia-modules-2.6.32-27-powerpc64-smp-dikernel-image-2.6.35-24-generic-divlan-modules-2.6.35-24-powerpc64-smp-dinfs-modules-2.6.32-27-sparc64-dinfs-modules-2.6.35-24-powerpc64-smp-distorage-core-modules-2.6.35-24-generic-pae-difloppy-modules-2.6.32-27-powerpc-dippp-modules-2.6.32-27-powerpc-dilinux-headers-2.6.32-27-powerpcfirewire-core-modules-2.6.32-27-sparc64-diinput-modules-2.6.35-24-powerpc64-smp-dilinux-headers-2.6.35-24-genericpata-modules-2.6.35-24-generic-disata-modules-2.6.32-27-sparc64-discsi-modules-2.6.35-24-powerpc-dinfs-modules-2.6.32-27-generic-divlan-modules-2.6.35-24-generic-pae-disquashfs-modules-2.6.35-24-powerpc-dimessage-modules-2.6.35-24-generic-pae-dilinux-image-2.6.35-24-powerpc64-smpnic-modules-2.6.35-24-powerpc-ditgtx11-xserver-utilsdovecot-imapddovecot-pop3dmail-stack-deliverydovecot-devdovecot-postfixdovecot-commondovecot-dbgpython-liblcmsliblcms1liblcms-utilsliblcms1-devlogrotateexim4-daemon-heavyexim4-daemon-customexim4-daemon-lightlibservlet2.5-java-doctomcat6-commontomcat6-usertomcat6tomcat6-docstomcat6-adminlibtomcat6-javalibservlet2.5-javatomcat6-examplesqemu-arm-staticqemu-commonqemu-kvm-extrasqemuqemu-kvm-extras-staticqemu-kvmkvmcfdisk-udeblibblkid1libblkid-devutil-linux-localesuuid-runtimelibuuid1bsdutilsutil-linuxfdisk-udebpmountutil-linux-udeblibblkid1-udeblibuuid1-udebuuid-devlibdpkg-perldpkg-devdpkglibdpkg-devdselectnagios3-cgilibpoppler1-qtlibpoppler7libpoppler-glib2libpoppler-qt4-2libpoppler-glib4libpoppler1libpoppler-cpp-devlibpoppler4libpoppler2libpoppler-qt4-3libpoppler1-glibpoppler-utilslibpoppler-glib-devlibpoppler-qt4-devlibpoppler-qt2libpoppler-devlibpoppler-cpp0libpoppler-qt-devpoppler-dbglibpoppler5libpoppler-glib5libsmbclientsamba-dbgsamba-common-binsamba-commonsmbclientwinbindsamba-doc-pdfsambalibwbclient0smbfssamba-toolslibpam-smbpasspython2.4-sambasamba-doclibsmbclient-devnic-shared-modules-2.6.32-216-dove-dilinux-image-2.6.32-216-dovelinux-headers-2.6.32-216parport-modules-2.6.32-216-dove-dinic-usb-modules-2.6.32-216-dove-dimd-modules-2.6.32-216-dove-dimouse-modules-2.6.32-216-dove-difs-core-modules-2.6.32-216-dove-difs-core-modules-2.6.32-416-dove-dinic-shared-modules-2.6.32-416-dove-dimd-modules-2.6.32-416-dove-dilinux-image-2.6.32-416-dovescsi-modules-2.6.32-216-dove-difirewire-core-modules-2.6.32-216-dove-dinfs-modules-2.6.32-416-dove-dilinux-headers-2.6.32-416scsi-modules-2.6.32-416-dove-diblock-modules-2.6.32-416-dove-diparport-modules-2.6.32-416-dove-dippp-modules-2.6.32-416-dove-dinfs-modules-2.6.32-216-dove-diusb-modules-2.6.32-216-dove-difat-modules-2.6.32-416-dove-dinic-modules-2.6.32-216-dove-difirewire-core-modules-2.6.32-416-dove-dimouse-modules-2.6.32-416-dove-diinput-modules-2.6.32-216-dove-dippp-modules-2.6.32-216-dove-dicrypto-modules-2.6.32-416-dove-dinic-usb-modules-2.6.32-416-dove-dinic-modules-2.6.32-416-dove-diblock-modules-2.6.32-216-dove-diplip-modules-2.6.32-216-dove-dikernel-image-2.6.32-416-dove-diplip-modules-2.6.32-416-dove-difat-modules-2.6.32-216-dove-difs-secondary-modules-2.6.32-216-dove-diusb-modules-2.6.32-416-dove-diinput-modules-2.6.32-416-dove-dicrypto-modules-2.6.32-216-dove-dikernel-image-2.6.32-216-dove-dilinux-headers-2.6.32-216-dovelinux-headers-2.6.32-416-dovefs-secondary-modules-2.6.32-416-dove-ditelepathy-gabbletelepathy-gabble-dbgthunderbird-locale-glthunderbird-locale-huthunderbird-locale-sv-sethunderbird-locale-nlthunderbird-locale-zh-twthunderbird-locale-arthunderbird-locale-isthunderbird-locale-itthunderbird-locale-dathunderbird-locale-hethunderbird-locale-plthunderbird-locale-bethunderbird-locale-mkthunderbird-locale-cathunderbird-locale-trthunderbird-locale-zh-cnthunderbird-locale-rothunderbird-locale-idthunderbird-locale-pa-inthunderbird-locale-afthunderbird-locale-ukthunderbird-locale-dethunderbird-locale-csthunderbird-locale-etthunderbird-locale-fithunderbird-locale-kathunderbird-locale-vithunderbird-locale-sithunderbird-locale-ruthunderbird-locale-frthunderbird-locale-pt-ptthunderbird-locale-euthunderbird-locale-ltthunderbird-locale-slthunderbird-locale-bgthunderbird-locale-pt-brthunderbird-locale-jathunderbird-locale-en-gbthunderbird-locale-srthunderbird-locale-bn-bdthunderbird-locale-ga-iethunderbird-locale-skthunderbird-locale-kothunderbird-locale-fy-nlthunderbird-locale-sqthunderbird-locale-ta-lkthunderbird-locale-es-arthunderbird-locale-es-esthunderbird-locale-nn-nothunderbird-locale-elthunderbird-locale-nb-nomessage-modules-2.6.31-22-powerpc-dipcmcia-modules-2.6.31-22-powerpc-diinput-modules-2.6.31-22-powerpc-difloppy-modules-2.6.31-22-powerpc64-smp-difs-secondary-modules-2.6.31-22-powerpc64-smp-dicrypto-modules-2.6.31-22-powerpc-dinfs-modules-2.6.31-22-powerpc64-smp-diirda-modules-2.6.31-22-powerpc-dinic-usb-modules-2.6.31-22-powerpc-diplip-modules-2.6.31-22-powerpc-dikernel-image-2.6.31-22-powerpc-dilinux-image-2.6.31-22-powerpc-smpblock-modules-2.6.31-22-powerpc64-smp-disata-modules-2.6.31-22-powerpc64-smp-discsi-modules-2.6.31-22-powerpc-diirda-modules-2.6.31-22-powerpc64-smp-dikernel-image-2.6.31-22-powerpc64-smp-distorage-core-modules-2.6.31-22-powerpc-diblock-modules-2.6.31-22-powerpc-distorage-core-modules-2.6.31-22-powerpc64-smp-dimouse-modules-2.6.32-26-powerpc-dinic-modules-2.6.32-26-powerpc-difs-core-modules-2.6.32-26-powerpc-disquashfs-modules-2.6.32-26-powerpc64-smp-dilinux-image-2.6.32-26-powerpcirda-modules-2.6.32-26-powerpc64-smp-dilinux-headers-2.6.32-26-powerpc-smpfs-core-modules-2.6.31-22-powerpc64-smp-dimouse-modules-2.6.31-22-powerpc-dipata-modules-2.6.32-26-powerpc64-smp-dimouse-modules-2.6.32-26-powerpc64-smp-diusb-modules-2.6.32-26-powerpc-dinfs-modules-2.6.31-22-powerpc-distorage-core-modules-2.6.32-26-powerpc64-smp-dimessage-modules-2.6.32-26-powerpc64-smp-disata-modules-2.6.32-26-powerpc64-smp-dinic-pcmcia-modules-2.6.31-22-powerpc-dipcmcia-storage-modules-2.6.31-22-powerpc64-smp-difat-modules-2.6.31-22-powerpc64-smp-dikernel-image-2.6.32-26-powerpc64-smp-dippp-modules-2.6.31-22-powerpc-dilinux-image-2.6.32-26-powerpc-smpppp-modules-2.6.32-26-powerpc-dicrypto-modules-2.6.32-26-sparc64-disquashfs-modules-2.6.32-26-generic-dinic-usb-modules-2.6.32-26-sparc64-diparport-modules-2.6.32-26-generic-dilinux-headers-2.6.31-22-powerpc64-smpmessage-modules-2.6.32-26-sparc64-dipata-modules-2.6.31-22-powerpc64-smp-dimouse-modules-2.6.32-26-sparc64-diserial-modules-2.6.32-26-powerpc64-smp-divlan-modules-2.6.32-26-powerpc-dinic-usb-modules-2.6.32-26-generic-divlan-modules-2.6.32-26-sparc64-diinput-modules-2.6.32-26-generic-dinfs-modules-2.6.32-26-powerpc-dikernel-image-2.6.32-26-sparc64-dippp-modules-2.6.32-26-sparc64-diserial-modules-2.6.32-26-generic-dichar-modules-2.6.32-26-generic-dinic-modules-2.6.32-26-powerpc64-smp-difs-core-modules-2.6.32-26-generic-dicrypto-modules-2.6.31-22-powerpc64-smp-dinfs-modules-2.6.32-26-powerpc64-smp-dilinux-image-2.6.32-26-sparc64nic-usb-modules-2.6.32-26-powerpc-diserial-modules-2.6.32-26-sparc64-distorage-core-modules-2.6.32-26-sparc64-disquashfs-modules-2.6.32-26-powerpc-difs-core-modules-2.6.31-22-powerpc-dipcmcia-modules-2.6.32-26-generic-diblock-modules-2.6.32-26-generic-discsi-modules-2.6.31-22-powerpc64-smp-difat-modules-2.6.32-26-sparc64-dilinux-image-2.6.31-22-powerpcscsi-modules-2.6.32-26-sparc64-dilinux-image-2.6.32-26-genericlinux-headers-2.6.32-26-sparc64linux-image-2.6.35-23-serverscsi-modules-2.6.35-23-virtual-diplip-modules-2.6.32-26-generic-dipcmcia-modules-2.6.32-26-powerpc-dinic-shared-modules-2.6.32-26-powerpc64-smp-dinic-pcmcia-modules-2.6.32-26-powerpc-dipata-modules-2.6.32-26-generic-difat-modules-2.6.35-23-generic-dichar-modules-2.6.35-23-generic-pae-dilinux-headers-2.6.35-23-virtualnic-modules-2.6.32-26-generic-dipata-modules-2.6.32-26-powerpc-dinic-pcmcia-modules-2.6.35-23-generic-pae-dicrypto-modules-2.6.32-26-generic-diusb-modules-2.6.32-26-sparc64-dilinux-tools-2.6.32-26virtio-modules-2.6.35-23-virtual-dimessage-modules-2.6.35-23-generic-dinic-modules-2.6.35-23-generic-diplip-modules-2.6.32-26-powerpc64-smp-dilinux-image-2.6.32-310-ec2fs-secondary-modules-2.6.32-26-powerpc-divirtio-modules-2.6.35-23-generic-diirda-modules-2.6.35-23-virtual-dinic-shared-modules-2.6.35-23-generic-diirda-modules-2.6.32-26-powerpc-dinic-shared-modules-2.6.31-22-powerpc-dinic-modules-2.6.32-26-sparc64-diinput-modules-2.6.32-26-powerpc-dipcmcia-storage-modules-2.6.31-22-powerpc-dinic-modules-2.6.31-22-powerpc-difirewire-core-modules-2.6.32-26-powerpc-dicrypto-modules-2.6.35-23-virtual-discsi-modules-2.6.35-23-generic-difloppy-modules-2.6.31-22-powerpc-dikernel-image-2.6.35-23-generic-diusb-modules-2.6.31-22-powerpc64-smp-dikernel-image-2.6.32-26-powerpc-dippp-modules-2.6.32-26-generic-difs-secondary-modules-2.6.35-23-generic-diusb-modules-2.6.35-23-generic-dinic-shared-modules-2.6.31-22-powerpc64-smp-dilinux-image-2.6.35-23-genericsata-modules-2.6.32-26-powerpc-difloppy-modules-2.6.35-23-generic-pae-dinic-shared-modules-2.6.32-26-sparc64-difirewire-core-modules-2.6.35-23-generic-pae-dicrypto-modules-2.6.32-26-powerpc64-smp-divirtio-modules-2.6.35-23-generic-pae-dinfs-modules-2.6.32-26-generic-dilinux-headers-2.6.35-23-generic-paefb-modules-2.6.32-26-generic-diparport-modules-2.6.35-23-generic-dilinux-headers-2.6.32-26-powerpc64-smppcmcia-modules-2.6.35-23-generic-pae-difloppy-modules-2.6.32-26-powerpc-diplip-modules-2.6.31-22-powerpc64-smp-dilinux-headers-2.6.32-26-genericmouse-modules-2.6.35-23-generic-pae-dikernel-image-2.6.35-23-virtual-dilinux-image-2.6.32-26-virtualsquashfs-modules-2.6.32-26-sparc64-diblock-modules-2.6.32-26-powerpc-dikernel-image-2.6.32-26-generic-dicrypto-modules-2.6.35-23-generic-pae-diirda-modules-2.6.32-26-generic-divlan-modules-2.6.35-23-generic-diparport-modules-2.6.31-22-powerpc-difloppy-modules-2.6.32-26-generic-difirewire-core-modules-2.6.31-22-powerpc64-smp-discsi-modules-2.6.32-26-generic-dilinux-headers-2.6.32-310-ec2linux-headers-2.6.35-23-genericlinux-image-2.6.35-23-virtualppp-modules-2.6.35-23-virtual-diparport-modules-2.6.32-26-sparc64-dinic-shared-modules-2.6.32-26-generic-dipata-modules-2.6.32-26-sparc64-dinic-modules-2.6.35-23-generic-pae-dipcmcia-modules-2.6.31-22-powerpc64-smp-difirewire-core-modules-2.6.32-26-sparc64-diparport-modules-2.6.35-23-generic-pae-dilinux-headers-2.6.32-26-sparc64-smpnic-pcmcia-modules-2.6.32-26-powerpc64-smp-dinic-shared-modules-2.6.32-26-powerpc-dippp-modules-2.6.35-23-generic-pae-diserial-modules-2.6.32-26-powerpc-difs-secondary-modules-2.6.35-23-virtual-divlan-modules-2.6.32-26-powerpc64-smp-diparport-modules-2.6.32-26-powerpc64-smp-diinput-modules-2.6.32-26-powerpc64-smp-diparport-modules-2.6.32-26-powerpc-diplip-modules-2.6.32-26-sparc64-dimd-modules-2.6.35-23-powerpc-dipcmcia-storage-modules-2.6.35-23-powerpc-dinfs-modules-2.6.32-26-sparc64-disata-modules-2.6.31-22-powerpc-diusb-modules-2.6.32-26-generic-dipata-modules-2.6.35-23-generic-disquashfs-modules-2.6.35-23-powerpc-diserial-modules-2.6.35-23-powerpc64-smp-dippp-modules-2.6.35-23-powerpc-dimessage-modules-2.6.32-26-generic-diparport-modules-2.6.35-23-powerpc64-smp-diserial-modules-2.6.31-22-powerpc64-smp-dimouse-modules-2.6.35-23-generic-dilinux-headers-2.6.31-22-powerpclinux-image-2.6.32-26-sparc64-smpnic-pcmcia-modules-2.6.35-23-generic-disquashfs-modules-2.6.35-23-virtual-dipata-modules-2.6.35-23-generic-pae-dimouse-modules-2.6.31-22-powerpc64-smp-diblock-modules-2.6.32-26-sparc64-dilinux-tools-2.6.35-23vlan-modules-2.6.35-23-powerpc64-smp-dilinux-headers-2.6.32-310block-modules-2.6.35-23-virtual-dinic-pcmcia-modules-2.6.32-26-generic-difs-secondary-modules-2.6.31-22-powerpc-difloppy-modules-2.6.35-23-generic-dinic-shared-modules-2.6.35-23-virtual-difs-secondary-modules-2.6.35-23-powerpc-dilinux-headers-2.6.35-23-powerpcinput-modules-2.6.35-23-generic-pae-distorage-core-modules-2.6.35-23-powerpc64-smp-difat-modules-2.6.32-26-powerpc-difat-modules-2.6.31-22-powerpc-dilinux-headers-2.6.31-22-powerpc-smpfs-core-modules-2.6.35-23-powerpc-dinic-shared-modules-2.6.35-23-powerpc64-smp-dipcmcia-modules-2.6.35-23-generic-dilinux-image-2.6.35-23-generic-paenic-usb-modules-2.6.35-23-generic-difs-core-modules-2.6.32-26-powerpc64-smp-difs-secondary-modules-2.6.32-26-powerpc64-smp-dicrypto-modules-2.6.35-23-generic-difb-modules-2.6.35-23-generic-pae-dilinux-headers-2.6.35-23ppp-modules-2.6.35-23-generic-dimouse-modules-2.6.35-23-powerpc64-smp-difirewire-core-modules-2.6.31-22-powerpc-diinput-modules-2.6.35-23-generic-dimd-modules-2.6.35-23-powerpc64-smp-diblock-modules-2.6.35-23-powerpc64-smp-difloppy-modules-2.6.32-26-powerpc64-smp-diirda-modules-2.6.35-23-generic-divlan-modules-2.6.32-26-generic-diinput-modules-2.6.35-23-powerpc64-smp-difs-core-modules-2.6.32-26-sparc64-diirda-modules-2.6.35-23-powerpc64-smp-disquashfs-modules-2.6.35-23-powerpc64-smp-difs-core-modules-2.6.35-23-powerpc64-smp-distorage-core-modules-2.6.35-23-powerpc-dipcmcia-storage-modules-2.6.35-23-generic-dimessage-modules-2.6.35-23-powerpc64-smp-difat-modules-2.6.35-23-generic-pae-difat-modules-2.6.35-23-powerpc64-smp-disata-modules-2.6.35-23-generic-pae-diblock-modules-2.6.35-23-generic-dinic-modules-2.6.35-23-virtual-difs-secondary-modules-2.6.32-26-generic-diusb-modules-2.6.35-23-generic-pae-dipata-modules-2.6.35-23-powerpc64-smp-dimouse-modules-2.6.35-23-powerpc-dinfs-modules-2.6.35-23-generic-diplip-modules-2.6.32-26-powerpc-dimessage-modules-2.6.32-26-powerpc-dilinux-headers-2.6.35-23-servervlan-modules-2.6.35-23-powerpc-difb-modules-2.6.35-23-virtual-dinic-usb-modules-2.6.32-26-powerpc64-smp-difirewire-core-modules-2.6.35-23-powerpc64-smp-dinic-usb-modules-2.6.35-23-powerpc-dimd-modules-2.6.32-26-sparc64-disquashfs-modules-2.6.35-23-generic-dippp-modules-2.6.35-23-powerpc64-smp-dinfs-modules-2.6.35-23-generic-pae-dimessage-modules-2.6.35-23-powerpc-dipcmcia-modules-2.6.35-23-powerpc64-smp-discsi-modules-2.6.32-26-powerpc-dimd-modules-2.6.32-26-generic-divlan-modules-2.6.35-23-virtual-dimd-modules-2.6.35-23-generic-pae-dimd-modules-2.6.32-26-powerpc-difirewire-core-modules-2.6.32-26-powerpc64-smp-dilinux-image-2.6.31-22-powerpc64-smpppp-modules-2.6.31-22-powerpc64-smp-diinput-modules-2.6.35-23-powerpc-difirewire-core-modules-2.6.35-23-generic-dimessage-modules-2.6.31-22-powerpc64-smp-dipcmcia-storage-modules-2.6.35-23-powerpc64-smp-diserial-modules-2.6.35-23-generic-diinput-modules-2.6.31-22-powerpc64-smp-diusb-modules-2.6.31-22-powerpc-dinic-modules-2.6.31-22-powerpc64-smp-dinic-usb-modules-2.6.35-23-generic-pae-dikernel-image-2.6.35-23-powerpc-dipcmcia-modules-2.6.32-26-powerpc64-smp-dinic-pcmcia-modules-2.6.31-22-powerpc64-smp-diparport-modules-2.6.31-22-powerpc64-smp-dipcmcia-storage-modules-2.6.32-26-powerpc64-smp-difat-modules-2.6.35-23-virtual-distorage-core-modules-2.6.35-23-generic-pae-dipata-modules-2.6.31-22-powerpc-diblock-modules-2.6.35-23-powerpc-dilinux-image-2.6.35-23-powerpc64-smppcmcia-modules-2.6.35-23-powerpc-diplip-modules-2.6.35-23-powerpc-discsi-modules-2.6.35-23-powerpc-dimd-modules-2.6.31-22-powerpc64-smp-difloppy-modules-2.6.35-23-virtual-dimd-modules-2.6.31-22-powerpc-dinic-usb-modules-2.6.31-22-powerpc64-smp-disata-modules-2.6.35-23-virtual-diserial-modules-2.6.31-22-powerpc-difirewire-core-modules-2.6.32-26-generic-difat-modules-2.6.32-26-powerpc64-smp-dipcmcia-storage-modules-2.6.32-26-powerpc-disata-modules-2.6.35-23-powerpc-difat-modules-2.6.32-26-generic-disquashfs-modules-2.6.35-23-generic-pae-dipcmcia-storage-modules-2.6.35-23-generic-pae-difs-secondary-modules-2.6.35-23-generic-pae-diusb-modules-2.6.35-23-powerpc-difat-modules-2.6.35-23-powerpc-difloppy-modules-2.6.35-23-powerpc64-smp-divirtio-modules-2.6.32-26-generic-diirda-modules-2.6.35-23-generic-pae-dilinux-headers-2.6.35-23-powerpc-smpplip-modules-2.6.35-23-generic-pae-dilinux-headers-2.6.32-26-powerpcmd-modules-2.6.32-26-powerpc64-smp-dicrypto-modules-2.6.32-26-powerpc-difs-core-modules-2.6.35-23-virtual-discsi-modules-2.6.32-26-powerpc64-smp-diusb-modules-2.6.35-23-powerpc64-smp-dinic-shared-modules-2.6.35-23-powerpc-dinic-modules-2.6.35-23-powerpc64-smp-diblock-modules-2.6.32-26-powerpc64-smp-dimessage-modules-2.6.35-23-generic-pae-dilinux-headers-2.6.35-23-powerpc64-smpmouse-modules-2.6.32-26-generic-difloppy-modules-2.6.35-23-powerpc-difb-modules-2.6.35-23-generic-dinic-modules-2.6.35-23-powerpc-dinfs-modules-2.6.35-23-powerpc64-smp-diirda-modules-2.6.35-23-powerpc-dimd-modules-2.6.35-23-generic-diblock-modules-2.6.35-23-generic-pae-diparport-modules-2.6.35-23-virtual-difs-secondary-modules-2.6.32-26-sparc64-dilinux-image-2.6.32-26-powerpc64-smppcmcia-storage-modules-2.6.32-26-generic-dimessage-modules-2.6.35-23-virtual-diusb-modules-2.6.32-26-powerpc64-smp-dippp-modules-2.6.32-26-powerpc64-smp-distorage-core-modules-2.6.32-26-powerpc-difs-core-modules-2.6.35-23-generic-discsi-modules-2.6.35-23-powerpc64-smp-diinput-modules-2.6.32-26-sparc64-disata-modules-2.6.32-26-sparc64-diplip-modules-2.6.35-23-powerpc64-smp-dicrypto-modules-2.6.35-23-powerpc64-smp-distorage-core-modules-2.6.32-26-generic-disata-modules-2.6.32-26-generic-dikernel-image-2.6.35-23-generic-pae-disata-modules-2.6.35-23-powerpc64-smp-dilinux-headers-2.6.32-26kernel-image-2.6.35-23-powerpc64-smp-dimouse-modules-2.6.35-23-virtual-dinic-shared-modules-2.6.35-23-generic-pae-disata-modules-2.6.35-23-generic-diparport-modules-2.6.35-23-powerpc-dinfs-modules-2.6.35-23-powerpc-diserial-modules-2.6.35-23-generic-pae-difs-secondary-modules-2.6.35-23-powerpc64-smp-dimd-modules-2.6.35-23-virtual-distorage-core-modules-2.6.35-23-generic-diplip-modules-2.6.35-23-generic-difs-core-modules-2.6.35-23-generic-pae-divlan-modules-2.6.35-23-generic-pae-discsi-modules-2.6.35-23-generic-pae-dichar-modules-2.6.35-23-generic-distorage-core-modules-2.6.35-23-virtual-difirewire-core-modules-2.6.35-23-powerpc-diserial-modules-2.6.35-23-powerpc-dilinux-image-2.6.35-23-powerpcpata-modules-2.6.35-23-powerpc-dilinux-image-2.6.35-23-powerpc-smpnic-usb-modules-2.6.35-23-powerpc64-smp-dinic-pcmcia-modules-2.6.35-23-powerpc-dinic-pcmcia-modules-2.6.35-23-powerpc64-smp-dicrypto-modules-2.6.35-23-powerpc-digir1.0-webkit-1.0libwebkit-1.0-2-dbglibwebkit-1.0-2libwebkit-devlibwebkit-1.0-commonlibmagick10libmagickwand3libmagickcore3libmagickcore3-extralibmagickcore-devperlmagickimagemagick-dbglibmagickwand2imagemagickimagemagick-doclibmagick++10libmagick++-devlibmagickwand-devlibmagick++2libmagickcore2libmagick++3libmagickcore2-extralibmagick++9-devlibmagick9-devswatstorage-core-modules-2.6.32-25-powerpc64-smp-dinic-shared-modules-2.6.32-25-powerpc64-smp-dippp-modules-2.6.32-25-powerpc64-smp-diserial-modules-2.6.32-25-powerpc-dilinux-headers-2.6.32-25-generic-paelinux-headers-2.6.32-25-powerpcpata-modules-2.6.32-25-generic-pae-diplip-modules-2.6.32-25-powerpc-diserial-modules-2.6.32-25-generic-diplip-modules-2.6.32-25-generic-pae-dinfs-modules-2.6.32-25-generic-dicrypto-modules-2.6.32-25-generic-difs-secondary-modules-2.6.32-25-powerpc-divlan-modules-2.6.32-25-generic-dinic-pcmcia-modules-2.6.32-25-powerpc-dicrypto-modules-2.6.32-25-powerpc-dichar-modules-2.6.32-25-generic-pae-dinic-usb-modules-2.6.32-25-powerpc-diirda-modules-2.6.32-25-powerpc64-smp-diblock-modules-2.6.32-25-powerpc-dimessage-modules-2.6.32-25-generic-dipata-modules-2.6.32-25-powerpc-dipcmcia-modules-2.6.32-25-generic-disata-modules-2.6.32-25-powerpc64-smp-dipata-modules-2.6.32-25-generic-disquashfs-modules-2.6.32-25-powerpc-divlan-modules-2.6.32-25-generic-pae-difloppy-modules-2.6.32-25-powerpc-dilinux-image-2.6.32-309-ec2crypto-modules-2.6.32-25-powerpc64-smp-dilinux-image-2.6.32-25-386floppy-modules-2.6.32-25-generic-diplip-modules-2.6.32-25-powerpc64-smp-dichar-modules-2.6.35-22-generic-pae-dimouse-modules-2.6.32-25-powerpc-distorage-core-modules-2.6.32-25-sparc64-dikernel-image-2.6.32-25-generic-pae-dinic-pcmcia-modules-2.6.32-25-powerpc64-smp-difs-core-modules-2.6.32-25-generic-dilinux-image-2.6.32-25-generic-paenic-usb-modules-2.6.32-25-powerpc64-smp-dilinux-headers-2.6.32-25-powerpc64-smpnic-modules-2.6.32-25-sparc64-discsi-modules-2.6.32-25-powerpc64-smp-dilinux-image-2.6.35-22-serverusb-modules-2.6.32-25-generic-diparport-modules-2.6.32-25-sparc64-diparport-modules-2.6.32-25-powerpc-dikernel-image-2.6.32-25-powerpc-diplip-modules-2.6.32-25-generic-disquashfs-modules-2.6.32-25-sparc64-dicrypto-modules-2.6.32-25-generic-pae-dikernel-image-2.6.32-25-generic-dimd-modules-2.6.32-25-sparc64-dilinux-headers-2.6.32-25-powerpc-smppcmcia-storage-modules-2.6.32-25-powerpc-disata-modules-2.6.32-25-generic-disata-modules-2.6.32-25-sparc64-dipcmcia-modules-2.6.32-25-generic-pae-divirtio-modules-2.6.32-25-generic-pae-dinic-modules-2.6.32-25-generic-dimouse-modules-2.6.35-22-virtual-difb-modules-2.6.35-22-virtual-diblock-modules-2.6.35-22-generic-pae-dilinux-image-2.6.32-25-powerpc64-smpnfs-modules-2.6.32-25-powerpc-diinput-modules-2.6.35-22-generic-diirda-modules-2.6.32-25-generic-pae-dimouse-modules-2.6.32-25-generic-difat-modules-2.6.32-25-sparc64-diserial-modules-2.6.32-25-sparc64-discsi-modules-2.6.35-22-virtual-dinic-modules-2.6.32-25-powerpc64-smp-difat-modules-2.6.32-25-powerpc64-smp-dipata-modules-2.6.32-25-powerpc64-smp-distorage-core-modules-2.6.35-22-virtual-dinic-shared-modules-2.6.35-22-generic-pae-dimd-modules-2.6.32-25-generic-dimd-modules-2.6.35-22-virtual-dilinux-tools-2.6.32-25kernel-image-2.6.35-22-generic-discsi-modules-2.6.32-25-powerpc-dinic-shared-modules-2.6.32-25-sparc64-dilinux-image-2.6.32-25-powerpcfat-modules-2.6.32-25-generic-pae-dilinux-image-2.6.35-22-virtualvirtio-modules-2.6.35-22-virtual-divlan-modules-2.6.35-22-virtual-dicrypto-modules-2.6.35-22-virtual-dimd-modules-2.6.35-22-generic-dimessage-modules-2.6.32-25-generic-pae-dimouse-modules-2.6.32-25-sparc64-difb-modules-2.6.32-25-generic-diirda-modules-2.6.35-22-generic-difs-core-modules-2.6.35-22-generic-pae-dikernel-image-2.6.35-22-virtual-dipata-modules-2.6.32-25-sparc64-dipcmcia-storage-modules-2.6.32-25-generic-pae-dimd-modules-2.6.32-25-powerpc-divlan-modules-2.6.35-22-generic-pae-dinic-shared-modules-2.6.32-25-powerpc-diplip-modules-2.6.35-22-generic-diusb-modules-2.6.32-25-powerpc64-smp-divirtio-modules-2.6.32-25-generic-dilinux-headers-2.6.32-25pcmcia-storage-modules-2.6.35-22-generic-pae-diusb-modules-2.6.35-22-generic-pae-diparport-modules-2.6.32-25-generic-dinic-pcmcia-modules-2.6.35-22-generic-pae-divlan-modules-2.6.35-22-powerpc-distorage-core-modules-2.6.35-22-generic-disata-modules-2.6.35-22-virtual-dinic-modules-2.6.35-22-virtual-disquashfs-modules-2.6.32-25-generic-pae-dinic-shared-modules-2.6.35-22-powerpc-dilinux-headers-2.6.35-22-generic-paeusb-modules-2.6.35-22-powerpc64-smp-dilinux-headers-2.6.35-22-powerpcppp-modules-2.6.35-22-generic-pae-dilinux-image-2.6.32-25-sparc64-smpfs-secondary-modules-2.6.35-22-virtual-difloppy-modules-2.6.35-22-powerpc-dimd-modules-2.6.32-25-generic-pae-diblock-modules-2.6.32-25-powerpc64-smp-difirewire-core-modules-2.6.32-25-generic-diblock-modules-2.6.35-22-generic-disquashfs-modules-2.6.35-22-generic-pae-disata-modules-2.6.35-22-powerpc-dicrypto-modules-2.6.35-22-powerpc-difloppy-modules-2.6.32-25-powerpc64-smp-diserial-modules-2.6.35-22-generic-diinput-modules-2.6.35-22-generic-pae-difirewire-core-modules-2.6.32-25-powerpc-dipcmcia-modules-2.6.35-22-powerpc64-smp-difirewire-core-modules-2.6.32-25-generic-pae-dichar-modules-2.6.35-22-generic-diinput-modules-2.6.32-25-sparc64-difat-modules-2.6.35-22-generic-pae-dimd-modules-2.6.35-22-powerpc64-smp-dilinux-headers-2.6.32-309ppp-modules-2.6.35-22-virtual-dilinux-image-2.6.35-22-genericfat-modules-2.6.32-25-generic-distorage-core-modules-2.6.35-22-generic-pae-diblock-modules-2.6.32-25-generic-pae-difloppy-modules-2.6.32-25-generic-pae-dilinux-headers-2.6.32-25-sparc64-smpmouse-modules-2.6.32-25-generic-pae-diusb-modules-2.6.32-25-powerpc-difs-core-modules-2.6.32-25-powerpc64-smp-discsi-modules-2.6.35-22-powerpc64-smp-dilinux-image-2.6.32-25-powerpc-smplinux-image-2.6.32-25-genericfs-secondary-modules-2.6.32-25-powerpc64-smp-dikernel-image-2.6.24-28-powerpc64-smp-dipcmcia-modules-2.6.32-25-powerpc-dilinux-image-2.6.35-22-generic-paepcmcia-modules-2.6.35-22-powerpc-dimessage-modules-2.6.32-25-sparc64-difat-modules-2.6.35-22-virtual-difat-modules-2.6.35-22-powerpc64-smp-dinic-shared-modules-2.6.35-22-powerpc64-smp-dilinux-image-2.6.32-25-sparc64nfs-modules-2.6.35-22-generic-pae-dilinux-headers-2.6.24-28-virtualsocket-modules-2.6.24-28-powerpc64-smp-diparport-modules-2.6.35-22-virtual-discsi-modules-2.6.35-22-powerpc-difloppy-modules-2.6.24-28-386-distorage-core-modules-2.6.32-25-generic-pae-diirda-modules-2.6.24-28-powerpc64-smp-diirda-modules-2.6.35-22-virtual-diirda-modules-2.6.35-22-powerpc64-smp-difloppy-modules-2.6.24-28-powerpc64-smp-dimessage-modules-2.6.32-25-powerpc-dipata-modules-2.6.35-22-generic-dimessage-modules-2.6.35-22-generic-divirtio-modules-2.6.35-22-generic-pae-diparport-modules-2.6.32-25-powerpc64-smp-dinic-modules-2.6.35-22-generic-pae-dinic-pcmcia-modules-2.6.24-28-386-dilinux-headers-2.6.35-22-genericpcmcia-storage-modules-2.6.35-22-generic-dippp-modules-2.6.35-22-generic-dilinux-image-debug-2.6.24-28-virtualserial-modules-2.6.32-25-generic-pae-dilinux-headers-2.6.32-25-386fs-core-modules-2.6.24-28-powerpc-dimessage-modules-2.6.32-25-powerpc64-smp-diirda-modules-2.6.32-25-generic-diblock-modules-2.6.24-28-powerpc-diipv6-modules-2.6.24-28-powerpc64-smp-diplip-modules-2.6.35-22-generic-pae-difs-secondary-modules-2.6.35-22-generic-dilinux-headers-2.6.35-22-virtualmouse-modules-2.6.35-22-generic-diparport-modules-2.6.24-28-386-diide-modules-2.6.24-28-386-diblock-modules-2.6.24-28-386-dipata-modules-2.6.24-28-powerpc-dinic-usb-modules-2.6.24-28-powerpc-dinic-shared-modules-2.6.24-28-powerpc64-smp-dimessage-modules-2.6.24-28-powerpc-diplip-modules-2.6.32-25-sparc64-dicrypto-modules-2.6.35-22-powerpc64-smp-dinfs-modules-2.6.24-28-powerpc-dipata-modules-2.6.24-28-386-dippp-modules-2.6.32-25-powerpc-dinic-usb-modules-2.6.35-22-generic-difs-secondary-modules-2.6.32-25-generic-disquashfs-modules-2.6.35-22-powerpc-diirda-modules-2.6.32-25-powerpc-difloppy-modules-2.6.35-22-powerpc64-smp-discsi-modules-2.6.32-25-generic-pae-dipcmcia-modules-2.6.24-28-powerpc64-smp-disata-modules-2.6.32-25-powerpc-dipata-modules-2.6.24-28-powerpc64-smp-diipv6-modules-2.6.24-28-powerpc-divlan-modules-2.6.32-25-powerpc-disata-modules-2.6.24-28-powerpc-diirda-modules-2.6.24-28-powerpc-difb-modules-2.6.24-28-386-difirewire-core-modules-2.6.32-25-sparc64-diacpi-modules-2.6.24-28-386-difs-secondary-modules-2.6.24-28-386-discsi-modules-2.6.32-25-generic-diblock-modules-2.6.35-22-powerpc-dilinux-image-2.6.24-28-powerpc-smpmd-modules-2.6.35-22-powerpc-difs-core-modules-2.6.24-28-386-diblock-modules-2.6.35-22-powerpc64-smp-dikernel-image-2.6.24-28-powerpc-divirtio-modules-2.6.35-22-generic-difirewire-core-modules-2.6.35-22-generic-difirewire-core-modules-2.6.35-22-powerpc64-smp-disquashfs-modules-2.6.35-22-powerpc64-smp-dinic-shared-modules-2.6.24-28-powerpc-diparport-modules-2.6.32-25-generic-pae-diide-modules-2.6.24-28-powerpc64-smp-dilinux-headers-2.6.35-22-serverlinux-image-2.6.24-28-powerpcpcmcia-modules-2.6.35-22-generic-pae-difs-secondary-modules-2.6.24-28-powerpc-diserial-modules-2.6.35-22-generic-pae-difat-modules-2.6.24-28-powerpc-dicrypto-modules-2.6.24-28-powerpc64-smp-diirda-modules-2.6.35-22-generic-pae-dinic-shared-modules-2.6.35-22-virtual-difs-secondary-modules-2.6.35-22-powerpc-dimouse-modules-2.6.35-22-generic-pae-diinput-modules-2.6.24-28-powerpc-dinic-shared-modules-2.6.24-28-386-dicrypto-modules-2.6.35-22-generic-diusb-modules-2.6.24-28-386-dilinux-headers-2.6.35-22-powerpc-smpnfs-modules-2.6.32-25-powerpc64-smp-dimessage-modules-2.6.35-22-virtual-dilinux-headers-2.6.35-22-powerpc64-smpsquashfs-modules-2.6.35-22-generic-dikernel-image-2.6.24-28-386-dilinux-headers-2.6.24-28-powerpclinux-image-2.6.24-28-virtuallinux-headers-2.6.35-22serial-modules-2.6.35-22-powerpc64-smp-dippp-modules-2.6.35-22-powerpc-dinic-usb-modules-2.6.35-22-powerpc64-smp-difirewire-core-modules-2.6.32-25-powerpc64-smp-distorage-core-modules-2.6.32-25-generic-diinput-modules-2.6.32-25-generic-dipcmcia-storage-modules-2.6.24-28-powerpc64-smp-dilinux-image-debug-2.6.24-28-386fs-secondary-modules-2.6.32-25-sparc64-difat-modules-2.6.24-28-386-diplip-modules-2.6.35-22-powerpc64-smp-dilinux-image-2.6.24-28-386input-modules-2.6.24-28-powerpc64-smp-difs-core-modules-2.6.35-22-powerpc-disocket-modules-2.6.24-28-generic-diserial-modules-2.6.24-28-powerpc64-smp-difirewire-core-modules-2.6.24-28-powerpc-dinic-usb-modules-2.6.35-22-generic-pae-dinic-modules-2.6.32-25-powerpc-dinic-pcmcia-modules-2.6.32-25-generic-pae-diinput-modules-2.6.35-22-powerpc-dicrypto-modules-2.6.32-25-sparc64-dinic-modules-2.6.35-22-powerpc64-smp-discsi-modules-2.6.35-22-generic-pae-dipcmcia-storage-modules-2.6.24-28-powerpc-dilinux-headers-2.6.24-28-386storage-core-modules-2.6.24-28-powerpc-disocket-modules-2.6.24-28-386-difs-core-modules-2.6.32-25-sparc64-disata-modules-2.6.35-22-powerpc64-smp-dinic-pcmcia-modules-2.6.35-22-generic-dilinux-headers-2.6.24-28-serverinput-modules-2.6.35-22-powerpc64-smp-divlan-modules-2.6.35-22-generic-discsi-modules-2.6.24-28-powerpc64-smp-dinfs-modules-2.6.32-25-generic-pae-diserial-modules-2.6.24-28-386-diirda-modules-2.6.24-28-386-dinic-usb-modules-2.6.24-28-386-diinput-modules-2.6.24-28-386-dinic-modules-2.6.24-28-386-dipcmcia-storage-modules-2.6.24-28-386-difb-modules-2.6.32-25-generic-pae-diblock-modules-2.6.32-25-sparc64-difirewire-core-modules-2.6.24-28-generic-disocket-modules-2.6.24-28-powerpc-difloppy-modules-2.6.35-22-generic-diparport-modules-2.6.35-22-powerpc-diinput-modules-2.6.32-25-powerpc64-smp-diirda-modules-2.6.35-22-powerpc-dipcmcia-modules-2.6.24-28-386-dipcmcia-modules-2.6.24-28-powerpc-diserial-modules-2.6.24-28-powerpc-dippp-modules-2.6.32-25-generic-dipata-modules-2.6.35-22-powerpc64-smp-discsi-modules-2.6.24-28-386-diusb-modules-2.6.32-25-sparc64-dilinux-headers-2.6.24-28-powerpc-smpfat-modules-2.6.24-28-powerpc64-smp-distorage-core-modules-2.6.35-22-powerpc-diplip-modules-2.6.24-28-generic-diirda-modules-2.6.24-28-generic-dichar-modules-2.6.32-25-generic-diinput-modules-2.6.24-28-generic-difirewire-core-modules-2.6.24-28-386-diplip-modules-2.6.24-28-powerpc64-smp-dipcmcia-storage-modules-2.6.32-25-powerpc64-smp-dilinux-image-2.6.24-28-serverfloppy-modules-2.6.35-22-virtual-difs-secondary-modules-2.6.35-22-generic-pae-dinfs-modules-2.6.24-28-powerpc64-smp-disata-modules-2.6.32-25-generic-pae-difs-secondary-modules-2.6.32-25-generic-pae-dinic-usb-modules-2.6.24-28-powerpc64-smp-dilinux-headers-2.6.24-28-rtblock-modules-2.6.24-28-generic-dinfs-modules-2.6.32-25-sparc64-diacpi-modules-2.6.24-28-generic-dipcmcia-modules-2.6.32-25-powerpc64-smp-diufs-modules-2.6.15-55-powerpc-difat-modules-2.6.35-22-generic-diide-modules-2.6.15-55-powerpc-dipata-modules-2.6.35-22-powerpc-diext2-modules-2.6.15-55-powerpc-dihfs-modules-2.6.15-55-powerpc64-smp-discsi-modules-2.6.35-22-generic-dinic-modules-2.6.15-55-powerpc64-smp-disata-modules-2.6.35-22-generic-dilinux-headers-2.6.15-55-powerpc64-smpnic-pcmcia-modules-2.6.24-28-powerpc64-smp-dilinux-headers-2.6.15-55-server-bigironnic-firmware-2.6.15-55-powerpc64-smp-disquashfs-modules-2.6.32-25-generic-dicrypto-modules-2.6.35-22-generic-pae-difs-secondary-modules-2.6.35-22-powerpc64-smp-dilinux-image-debug-2.6.24-28-genericserial-modules-2.6.15-55-powerpc64-smp-dilinux-headers-2.6.32-25-genericmd-modules-2.6.24-28-generic-direiserfs-modules-2.6.15-55-powerpc64-smp-difloppy-modules-2.6.24-28-generic-dilinux-headers-2.6.32-25-sparc64linux-doc-2.6.24irda-modules-2.6.15-55-powerpc-dinic-modules-2.6.24-28-generic-diaffs-modules-2.6.15-55-powerpc64-smp-discsi-modules-2.6.32-25-sparc64-diloop-modules-2.6.15-55-powerpc-dinic-usb-modules-2.6.15-55-powerpc-dilinux-image-2.6.15-55-powerpcext3-modules-2.6.15-55-powerpc-disata-modules-2.6.24-28-386-disocket-modules-2.6.15-55-powerpc64-smp-diusb-modules-2.6.24-28-powerpc-distorage-core-modules-2.6.24-28-386-dinfs-modules-2.6.35-22-powerpc64-smp-diext3-modules-2.6.15-55-powerpc64-smp-dimouse-modules-2.6.35-22-powerpc64-smp-diext2-modules-2.6.15-55-powerpc64-smp-dikernel-image-2.6.15-55-powerpc-diext2-modules-2.6.15-55-sparc64-dimd-modules-2.6.24-28-powerpc64-smp-direiserfs-modules-2.6.15-55-386-direiserfs-modules-2.6.15-55-powerpc-diipv6-modules-2.6.15-55-386-dilinux-source-2.6.24firewire-core-modules-2.6.15-55-386-diusb-storage-modules-2.6.15-55-powerpc64-smp-diufs-modules-2.6.15-55-386-dikernel-image-2.6.15-55-powerpc64-smp-diinput-modules-2.6.15-55-sparc64-diusb-modules-2.6.15-55-386-dintfs-modules-2.6.15-55-386-dinic-usb-modules-2.6.35-22-powerpc-dimessage-modules-2.6.35-22-powerpc-diinput-modules-2.6.15-55-386-dimd-modules-2.6.15-55-powerpc64-smp-dilinux-headers-2.6.15-55-k7message-modules-2.6.35-22-generic-pae-dikernel-image-2.6.32-25-sparc64-diplip-modules-2.6.24-28-powerpc-dilinux-headers-2.6.15-55-sparc64linux-headers-2.6.15-55-powerpc-smpnic-modules-2.6.15-55-386-dixfs-modules-2.6.15-55-sparc64-difb-modules-2.6.15-55-386-dikernel-image-2.6.35-22-generic-pae-diparport-modules-2.6.15-55-386-dikernel-image-2.6.35-22-powerpc64-smp-dicrc-modules-2.6.15-55-powerpc-dinic-usb-modules-2.6.32-25-sparc64-diipv6-modules-2.6.24-28-386-dilinux-headers-2.6.15-55-sparc64-smpmd-modules-2.6.32-25-powerpc64-smp-dilinux-headers-2.6.15-55-serveripv6-modules-2.6.15-55-powerpc-dinic-modules-2.6.15-55-sparc64-dilinux-headers-2.6.15-55-powerpcnic-shared-modules-2.6.15-55-sparc64-dikernel-image-2.6.15-55-386-diusb-storage-modules-2.6.15-55-sparc64-dilinux-headers-2.6.24-28vlan-modules-2.6.35-22-powerpc64-smp-dimd-modules-2.6.15-55-sparc64-difs-core-modules-2.6.35-22-powerpc64-smp-dicdrom-core-modules-2.6.15-55-powerpc-dinic-shared-modules-2.6.15-55-powerpc-difirewire-core-modules-2.6.15-55-powerpc64-smp-dijfs-modules-2.6.15-55-powerpc-dipcmcia-storage-modules-2.6.15-55-386-dippp-modules-2.6.15-55-powerpc-disquashfs-modules-2.6.35-22-virtual-disata-modules-2.6.15-55-386-dilinux-image-2.6.24-28-genericfs-secondary-modules-2.6.24-28-powerpc64-smp-diparport-modules-2.6.24-28-generic-discsi-modules-2.6.15-55-powerpc64-smp-dinic-firmware-2.6.15-55-powerpc-dipcmcia-modules-2.6.35-22-generic-dilinux-headers-2.6.32-309-ec2pcmcia-storage-modules-2.6.35-22-powerpc64-smp-dinic-pcmcia-modules-2.6.24-28-powerpc-dinfs-modules-2.6.15-55-powerpc-diide-modules-2.6.24-28-powerpc-dixfs-modules-2.6.15-55-powerpc-diipv6-modules-2.6.24-28-generic-dinic-shared-modules-2.6.15-55-386-dixfs-modules-2.6.15-55-386-discsi-modules-2.6.24-28-generic-dippp-modules-2.6.32-25-generic-pae-dilinux-image-2.6.15-55-powerpc-smpnic-modules-2.6.32-25-generic-pae-difb-modules-2.6.35-22-generic-diacpi-modules-2.6.15-55-386-dipcmcia-modules-2.6.15-55-386-dinic-pcmcia-modules-2.6.15-55-386-difat-modules-2.6.15-55-powerpc64-smp-dipcmcia-storage-modules-2.6.31-22-generic-dippp-modules-2.6.24-28-generic-dipcmcia-modules-2.6.15-55-powerpc-difs-core-modules-2.6.32-25-generic-pae-difs-core-modules-2.6.35-22-generic-diirda-modules-2.6.31-22-lpia-difs-core-modules-2.6.24-28-generic-difat-modules-2.6.15-55-sparc64-diblock-modules-2.6.31-22-lpia-diusb-storage-modules-2.6.15-55-powerpc-distorage-core-modules-2.6.31-22-lpia-dipata-modules-2.6.35-22-generic-pae-diparport-modules-2.6.31-22-lpia-diusb-modules-2.6.32-25-generic-pae-diext3-modules-2.6.15-55-sparc64-dinic-modules-2.6.24-28-powerpc-dilinux-image-2.6.32-25-virtualkernel-image-2.6.24-28-generic-discsi-modules-2.6.15-55-powerpc-discsi-modules-2.6.31-22-generic-dipcmcia-storage-modules-2.6.31-22-lpia-diserial-modules-2.6.15-55-powerpc-dipcmcia-storage-modules-2.6.32-25-generic-dinic-pcmcia-modules-2.6.35-22-powerpc-dilinux-headers-2.6.31-307ppp-modules-2.6.35-22-powerpc64-smp-diparport-modules-2.6.24-28-powerpc64-smp-dinic-pcmcia-modules-2.6.31-22-lpia-difloppy-modules-2.6.31-22-lpia-dilinux-image-2.6.15-55-sparc64loop-modules-2.6.15-55-386-divirtio-modules-2.6.31-22-generic-dilinux-image-2.6.31-22-genericfat-modules-2.6.32-25-powerpc-diusb-modules-2.6.28-19-lpia-divlan-modules-2.6.32-25-powerpc64-smp-difs-secondary-modules-2.6.28-19-lpia-dinic-usb-modules-2.6.32-25-generic-pae-dimd-modules-2.6.15-55-powerpc-difb-modules-2.6.31-22-generic-dipata-modules-2.6.31-22-lpia-difat-modules-2.6.31-22-generic-diserial-modules-2.6.35-22-powerpc-dipcmcia-modules-2.6.31-22-generic-dinic-pcmcia-modules-2.6.28-19-lpia-difs-core-modules-2.6.35-22-virtual-dipata-modules-2.6.31-22-generic-dilinux-image-2.6.24-28-xennic-pcmcia-modules-2.6.31-22-generic-dimessage-modules-2.6.24-28-powerpc64-smp-dilinux-headers-2.6.31-22-serveride-modules-2.6.15-55-386-diblock-modules-2.6.28-19-lpia-dimouse-modules-2.6.28-19-generic-diparport-modules-2.6.35-22-generic-dilinux-doc-2.6.28scsi-modules-2.6.31-22-lpia-dinic-usb-modules-2.6.28-19-lpia-diloop-modules-2.6.15-55-powerpc64-smp-diinput-modules-2.6.31-22-generic-dinic-usb-modules-2.6.24-28-generic-dimd-modules-2.6.31-22-lpia-difat-modules-2.6.35-22-powerpc-dicdrom-core-modules-2.6.15-55-sparc64-disata-modules-2.6.31-22-lpia-dikernel-image-2.6.31-22-lpia-difloppy-modules-2.6.15-55-powerpc64-smp-dilinux-source-2.6.31linux-image-2.6.15-55-sparc64-smpfat-modules-2.6.15-55-386-divirtio-modules-2.6.28-19-generic-difs-common-modules-2.6.15-55-powerpc64-smp-dinfs-modules-2.6.15-55-sparc64-dipcmcia-storage-modules-2.6.28-19-lpia-disata-modules-2.6.35-22-generic-pae-difloppy-modules-2.6.15-55-386-dinic-pcmcia-modules-2.6.35-22-powerpc64-smp-difirewire-core-modules-2.6.24-28-powerpc64-smp-dilinux-headers-2.6.15-55pata-modules-2.6.28-19-lpia-diusb-modules-2.6.15-55-sparc64-difs-secondary-modules-2.6.31-22-lpia-diusb-storage-modules-2.6.15-55-386-diplip-modules-2.6.28-19-lpia-diide-modules-2.6.24-28-generic-dilinux-image-2.6.31-22-virtualcrypto-modules-2.6.31-22-generic-diserial-modules-2.6.28-19-generic-difs-common-modules-2.6.15-55-powerpc-disata-modules-2.6.24-28-powerpc64-smp-dimouse-modules-2.6.31-22-lpia-diserial-modules-2.6.28-19-lpia-discsi-core-modules-2.6.15-55-sparc64-dilinux-headers-2.6.24-28-genericipv6-modules-2.6.15-55-powerpc64-smp-dipcmcia-modules-2.6.15-55-powerpc64-smp-disquashfs-modules-2.6.32-25-powerpc64-smp-direiserfs-modules-2.6.15-55-sparc64-dikernel-image-2.6.28-19-generic-dinic-usb-modules-2.6.32-25-generic-distorage-core-modules-2.6.35-22-powerpc64-smp-dinic-shared-modules-2.6.31-22-generic-dimouse-modules-2.6.31-22-generic-diplip-modules-2.6.15-55-sparc64-diloop-modules-2.6.15-55-sparc64-dicrc-modules-2.6.15-55-386-diparport-modules-2.6.35-22-generic-pae-dijfs-modules-2.6.15-55-386-diserial-modules-2.6.32-25-powerpc64-smp-diext3-modules-2.6.15-55-386-divirtio-modules-2.6.31-22-lpia-diparport-modules-2.6.28-19-lpia-dikernel-image-2.6.32-25-powerpc64-smp-dilinux-image-2.6.31-22-serverlinux-tools-2.6.35-22nic-pcmcia-modules-2.6.24-28-generic-difloppy-modules-2.6.15-55-powerpc-difirewire-core-modules-2.6.15-55-powerpc-dilinux-image-2.6.35-22-powerpc-smplinux-headers-2.6.28-19nic-usb-modules-2.6.31-22-lpia-dinfs-modules-2.6.35-22-generic-dicdrom-core-modules-2.6.15-55-powerpc64-smp-disata-modules-2.6.31-22-generic-diserial-modules-2.6.15-55-386-dinic-modules-2.6.15-55-powerpc-diusb-modules-2.6.31-22-lpia-diinput-modules-2.6.32-25-powerpc-diusb-modules-2.6.35-22-generic-distorage-core-modules-2.6.28-19-generic-dippp-modules-2.6.24-28-386-disata-modules-2.6.28-19-generic-discsi-modules-2.6.28-19-generic-dippp-modules-2.6.31-22-lpia-dinic-firmware-2.6.15-55-sparc64-diinput-modules-2.6.32-25-generic-pae-diusb-modules-2.6.28-19-generic-dippp-modules-2.6.15-55-386-dinic-modules-2.6.35-22-generic-dinic-modules-2.6.24-28-powerpc64-smp-diext2-modules-2.6.15-55-386-dippp-modules-2.6.28-19-lpia-diusb-modules-2.6.35-22-powerpc-dippp-modules-2.6.15-55-sparc64-dilinux-ec2-source-2.6.31fb-modules-2.6.31-22-lpia-dicrypto-modules-2.6.24-28-powerpc-diide-modules-2.6.15-55-sparc64-dilinux-headers-2.6.28-19-genericpcmcia-storage-modules-2.6.35-22-powerpc-diipv6-modules-2.6.15-55-sparc64-dilinux-image-2.6.31-22-lpiappp-modules-2.6.31-22-generic-dikernel-image-2.6.15-55-sparc64-difs-core-modules-2.6.32-25-powerpc-dilinux-image-2.6.15-55-386pcmcia-modules-2.6.28-19-generic-discsi-modules-2.6.15-55-386-dinfs-modules-2.6.28-19-generic-dimessage-modules-2.6.24-28-generic-dimouse-modules-2.6.32-25-powerpc64-smp-dinfs-modules-2.6.15-55-powerpc64-smp-dimd-modules-2.6.28-19-generic-dinic-modules-2.6.28-19-lpia-dimessage-modules-2.6.24-28-386-difat-modules-2.6.15-55-powerpc-diusb-modules-2.6.15-55-powerpc64-smp-dilinux-headers-2.6.31-22-genericmessage-modules-2.6.31-22-lpia-dicdrom-modules-2.6.15-55-386-difs-secondary-modules-2.6.31-22-generic-distorage-core-modules-2.6.32-25-powerpc-dimouse-modules-2.6.28-19-lpia-dinic-shared-modules-2.6.32-25-generic-dilinux-headers-2.6.31-22-lpiafb-modules-2.6.28-19-lpia-dilinux-headers-2.6.28-19-lpialinux-image-2.6.15-55-k7kernel-image-2.6.35-22-powerpc-dinfs-modules-2.6.35-22-powerpc-dicrc-modules-2.6.15-55-powerpc64-smp-dinic-pcmcia-modules-2.6.32-25-generic-dippp-modules-2.6.28-19-generic-diplip-modules-2.6.15-55-386-dinic-shared-modules-2.6.32-25-generic-pae-disata-modules-2.6.15-55-powerpc-diserial-modules-2.6.24-28-generic-dilinux-image-2.6.15-55-serverfb-modules-2.6.24-28-generic-difb-modules-2.6.35-22-generic-pae-dinic-shared-modules-2.6.28-19-lpia-difb-modules-2.6.15-55-powerpc-dinfs-modules-2.6.24-28-386-diblock-modules-2.6.32-25-generic-dilinux-image-2.6.24-28-rtchar-modules-2.6.31-22-lpia-difirewire-core-modules-2.6.35-22-powerpc-dippp-modules-2.6.32-25-sparc64-dilinux-image-2.6.31-307-ec2fat-modules-2.6.31-22-lpia-difs-core-modules-2.6.28-19-lpia-dimd-modules-2.6.24-28-386-dipcmcia-modules-2.6.24-28-generic-difloppy-modules-2.6.31-22-generic-dinic-usb-modules-2.6.31-22-generic-diblock-modules-2.6.24-28-powerpc64-smp-dicrc-modules-2.6.15-55-sparc64-diaffs-modules-2.6.15-55-powerpc-discsi-core-modules-2.6.15-55-386-dimd-modules-2.6.31-22-generic-dilinux-image-2.6.15-55-powerpc64-smpstorage-core-modules-2.6.28-19-lpia-dimd-modules-2.6.35-22-generic-pae-diparport-modules-2.6.31-22-generic-dikernel-image-2.6.28-19-lpia-dilinux-headers-2.6.15-55-386plip-modules-2.6.31-22-lpia-difs-core-modules-2.6.31-22-generic-dimessage-modules-2.6.28-19-lpia-divirtio-modules-2.6.28-19-lpia-dinic-firmware-2.6.15-55-386-diplip-modules-2.6.35-22-powerpc-dihfs-modules-2.6.15-55-powerpc-dilinux-image-2.6.24-28-powerpc64-smpppp-modules-2.6.24-28-powerpc-difirewire-core-modules-2.6.31-22-lpia-disocket-modules-2.6.15-55-powerpc-dicdrom-core-modules-2.6.15-55-386-diinput-modules-2.6.15-55-powerpc-difirewire-core-modules-2.6.28-19-lpia-diplip-modules-2.6.28-19-generic-difirewire-core-modules-2.6.35-22-generic-pae-distorage-core-modules-2.6.31-22-generic-dinic-usb-modules-2.6.28-19-generic-difb-modules-2.6.28-19-generic-divlan-modules-2.6.32-25-sparc64-diparport-modules-2.6.24-28-powerpc-difb-modules-2.6.15-55-powerpc64-smp-difat-modules-2.6.28-19-lpia-dilinux-image-2.6.35-22-powerpckernel-image-2.6.31-22-generic-dipata-modules-2.6.28-19-generic-diufs-modules-2.6.15-55-powerpc64-smp-diinput-modules-2.6.28-19-lpia-difs-core-modules-2.6.28-19-generic-diirda-modules-2.6.31-22-generic-dipcmcia-storage-modules-2.6.28-19-generic-difat-modules-2.6.24-28-generic-diblock-modules-2.6.35-22-virtual-dilinux-image-2.6.28-19-lpiafs-core-modules-2.6.31-22-lpia-dinic-shared-modules-2.6.15-55-powerpc64-smp-diplip-modules-2.6.24-28-386-dilinux-image-2.6.24-28-openvzirda-modules-2.6.15-55-powerpc64-smp-diparport-modules-2.6.15-55-sparc64-dilinux-headers-2.6.31-22usb-modules-2.6.15-55-powerpc-diblock-modules-2.6.28-19-generic-dilinux-image-2.6.28-19-serverserial-modules-2.6.31-22-generic-dippp-modules-2.6.24-28-powerpc64-smp-dicrypto-modules-2.6.28-19-generic-dinic-modules-2.6.31-22-lpia-dimd-modules-2.6.24-28-powerpc-dimessage-modules-2.6.35-22-powerpc64-smp-dilinux-headers-2.6.24-28-powerpc64-smpsocket-modules-2.6.15-55-386-difs-secondary-modules-2.6.24-28-generic-difloppy-modules-2.6.35-22-generic-pae-dixfs-modules-2.6.15-55-powerpc64-smp-diserial-modules-2.6.31-22-lpia-disata-modules-2.6.24-28-generic-disata-modules-2.6.15-55-powerpc64-smp-discsi-modules-2.6.28-19-lpia-difirewire-core-modules-2.6.28-19-generic-dilinux-kernel-develchar-modules-2.6.31-22-generic-dilinux-headers-2.6.28-19-servernic-pcmcia-modules-2.6.15-55-powerpc-dicrypto-modules-2.6.28-19-lpia-diblock-modules-2.6.31-22-generic-dinic-shared-modules-2.6.35-22-generic-dimessage-modules-2.6.28-19-generic-difirewire-core-modules-2.6.31-22-generic-distorage-core-modules-2.6.24-28-powerpc64-smp-dilinux-doc-2.6.15nic-modules-2.6.35-22-powerpc-diplip-modules-2.6.31-22-generic-dinic-shared-modules-2.6.31-22-lpia-diinput-modules-2.6.28-19-generic-dimouse-modules-2.6.35-22-powerpc-diusb-modules-2.6.31-22-generic-diirda-modules-2.6.15-55-386-dipcmcia-storage-modules-2.6.15-55-powerpc64-smp-dinfs-modules-2.6.28-19-lpia-dilinux-image-2.6.35-22-powerpc64-smpparport-modules-2.6.35-22-powerpc64-smp-dimd-modules-2.6.15-55-386-dilinux-image-2.6.28-19-virtualstorage-core-modules-2.6.24-28-generic-diparport-modules-2.6.28-19-generic-dilinux-image-debug-2.6.24-28-serverlinux-image-2.6.28-19-genericinput-modules-2.6.15-55-powerpc64-smp-dimd-modules-2.6.28-19-lpia-difloppy-modules-2.6.24-28-powerpc-diusb-modules-2.6.24-28-powerpc64-smp-dipcmcia-modules-2.6.28-19-lpia-difloppy-modules-2.6.28-19-lpia-difloppy-modules-2.6.28-19-generic-diide-modules-2.6.15-55-powerpc64-smp-dinic-usb-modules-2.6.15-55-386-discsi-modules-2.6.24-28-powerpc-dinfs-modules-2.6.31-22-generic-dimessage-modules-2.6.31-22-generic-dippp-modules-2.6.15-55-powerpc64-smp-dilinux-source-2.6.28fs-core-modules-2.6.24-28-powerpc64-smp-discsi-core-modules-2.6.15-55-powerpc64-smp-dicrypto-modules-2.6.24-28-386-difat-modules-2.6.28-19-generic-dinic-modules-2.6.28-19-generic-dicrypto-modules-2.6.31-22-lpia-dijfs-modules-2.6.15-55-powerpc64-smp-dinic-shared-modules-2.6.28-19-generic-dilinux-headers-2.6.31-307-ec2irda-modules-2.6.28-19-lpia-dinic-shared-modules-2.6.24-28-generic-dinic-modules-2.6.31-22-generic-diirda-modules-2.6.28-19-generic-dinic-pcmcia-modules-2.6.15-55-powerpc64-smp-dipcmcia-storage-modules-2.6.24-28-generic-dilinux-headers-2.6.24-28-openvzlinux-image-2.6.15-55-686scsi-core-modules-2.6.15-55-powerpc-difs-secondary-modules-2.6.28-19-generic-dicrypto-modules-2.6.24-28-generic-dinfs-modules-2.6.15-55-386-dipcmcia-modules-2.6.31-22-lpia-dinfs-modules-2.6.24-28-generic-dilinux-image-2.6.15-55-server-bigironlinux-headers-2.6.24-28-xeninput-modules-2.6.31-22-lpia-diusb-modules-2.6.24-28-generic-dipata-modules-2.6.24-28-generic-dipcmcia-storage-modules-2.6.15-55-powerpc-dinic-usb-modules-2.6.15-55-powerpc64-smp-dilinux-headers-2.6.15-55-686nic-pcmcia-modules-2.6.28-19-generic-discsi-modules-2.6.15-55-sparc64-dilinux-source-2.6.15nfs-modules-2.6.31-22-lpia-disata-modules-2.6.28-19-lpia-dilibnspr4-0dlibnspr4-devlibnspr4-0d-dbgpostfixaptdaemonpython-aptdaemon-gtkpython-aptdaemonlibapparmor-devapparmor-profileslibpam-apparmorapparmor-notifylibapparmor1libapache2-mod-apparmorapparmor-utilsapparmorlibapparmor-perlapparmor-docslibxml2-docpython2.4-libxml2libxml2python-libxml2libxml2-udeblibxml2-utilslibxml2-devlibxml2-dbgpython-libxml2-dbglibc6-sparcv9vlibc6-sparcv9v2libc6-dev-amd64libc6-sparc64bglibc-sourcelibc6-dev-i386libc-dev-binlibc6-i686libc6-dbglibc6-sparc64vlibc6-dev-ppc64libc6-sparcv9blibc6-sparc64v2libc6-udeblibc-binlibnss-files-udeblibc6-dev-sparc64libc6-xenlibc6-sparc64libc6-amd64libnss-dns-udeblibc6libc6-i386nscdlibc6-ppc64libc6-deveglibc-sourcelibc6-profglibc-doclibc6-piclinux-image-2.6.35-30-generic-paelinux-image-2.6.35-30-genericlinux-image-2.6.35-30-powerpc-smplinux-image-2.6.35-30-powerpc64-smplinux-image-2.6.35-30-virtuallinux-image-2.6.35-30-powerpclinux-image-2.6.35-30-omaplinux-image-2.6.35-30-versatilelinux-image-2.6.35-30-serverhpijshplip-datahplip-doclibhpmud0hpliphpijs-ppdshplip-dbghplip-cupslibsane-hpaiolibhpmud-devhplip-guieucalyptus-java-commoneucalyptus-sceucalyptus-gleucalyptus-cloudeucalyptus-udebeucalyptus-cceucalyptus-commoneucalyptus-nceucalyptus-walrusuec-component-listenerlibavahi-core7-udeblibavahi-glib-devlibavahi-common3-udebavahi-dnsconfdlibavahi-core6-udebavahi-autoipdlibavahi-glib1libavahi-qt3-1libavahi-core7libavahi-common3libavahi-core6libavahi-qt4-devavahi-daemonlibavahi-common-devlibavahi-common-datalibavahi-ui-devlibavahi-core5libavahi-compat-libdnssd-devlibavahi-compat-howl0libavahi-client-devavahi-utilslibavahi-qt3-devlibavahi-compat-howl-devlibavahi-ui0avahi-ui-utilslibavahi-qt4-1avahi-discoverlibavahi-gobject0avahi-dbglibavahi-gobject-devpython-avahilibavahi-core-devlibavahi-compat-libdnssd1libavahi-client3libcurl3-gnutlslibcurl3-nsslibcurl3quagga-docquaggakdepasswdloginapache2-srcapache2.2-binlibapr0-devapache2-suexec-customapache2-mpm-eventapache2-docapache2-mpm-workerapache2-mpm-itkapache2.2-commonapache2-suexecapache2-mpm-perchildmahara-apache2apache2-utilsapache2-threaded-devapache2-commonapache2-prefork-devapache2-mpm-preforklibbind9-50libdns50libbind9-0libdns21libisccfg50libisc11libdns23libisc35libisccfg1liblwres30libisc50liblwres60libisccc50libdns35liblwres9libisc60libbind9-30lwresdlibdns53libisccc0libisccfg60bind9-hostlighttpd-mod-mysql-vhostbind9utilslibisccc60libisccc30libbind-devbind9bind9-doclibisccfg30liblwres50libbind9-60dnsutilslibdns64libdns36libdns66ifupdownpython-django-docpython-djangofreetype2-demoslibfreetype6-devlibfreetype6-udeblibfreetype6libfuse-devfuse-utilsfuse-sourcelibfuse2-udebfuse-utils-udeblibfuse2xulrunner-1.9.1-testsuitexulrunner-1.9.1-testsuite-devabrowser-3.0xulrunner-1.9.1firefox-2-devfirefox-3.1firefox-3.0-venkmanabrowser-3.0-brandingfirefox-3.5-brandingabrowser-3.1-brandingxulrunner-1.9xulrunner-1.9.1-gnome-supportfirefox-3.5-dbgfirefox-granparadiso-devfirefox-3.0-dom-inspectorfirefox-3.5-devfirefox-dom-inspectorfirefox-2-libthaifirefox-3.0-brandingxulrunner-1.9.2-testsuite-devfirefox-trunkfirefox-2firefox-brandingfirefox-3.5-gnome-supportfirefox-3.1-devxulrunner-1.9.1-devfirefox-3.1-dbgfirefox-3.5firefox-trunk-gnome-supportabrowser-3.5firefox-2-gnome-supportfirefox-dbgabrowser-3.5-brandingfirefox-gnome-support-dbgfirefox-granparadiso-gnome-supportabrowser-3.1xulrunner-1.9.2-gnome-supportfirefox-2-dbgfirefox-trunk-devfirefox-3.0-gnome-supportxulrunner-1.9.2-devfirefox-3.1-brandingxulrunner-devfirefox-3.0xulrunner-1.9.2-dbgmozilla-firefox-gnome-supportfirefox-granparadisofirefox-2-dom-inspectorfirefox-libthaixulrunner-1.9.2firefox-devxulrunner-1.9.1-dbgabrowserxulrunner-1.9.2-testsuitefirefox-3.1-gnome-supportabrowser-brandingfirefox-mozsymbolsmozilla-firefoxfirefox-3.0-devlibapr1libapr0thunderbird-dbgthunderbird-gnome-supportmozilla-thunderbird-devthunderbirdthunderbird-gnome-support-dbgthunderbird-devmozilla-thunderbirdlibkrb53libkadm55libpcsclite1libaprutil1-dbd-sqlite3libaprutil1-dbglibaprutil1-devlibaprutil1-dbd-odbclibaprutil1-dbd-pgsqllibaprutil1-dbd-freetdslibaprutil1libaprutil1-ldaplibaprutil1-dbd-mysqlcupsys-dbglibcupsys2-devcups-clientlibcups2-devlibcups2cups-ppdclibcupsimage2libcupscgi1-devlibcupsys2-gnutls10cupsys-commoncupslibcupsdriver1-devcupsys-clientcups-dbglibcupsmime1libcupscgi1libcupsppdc1-devlibcupsys2libcupsdriver1cupsyscups-commoncupsddkcups-bsdcupsys-bsdlibcupsimage2-devlibcupsmime1-devlibcupsppdc1php5-dbgphp5-enchantphp5-mysqliphp5php5-sqlitephp5-ldaplibapache2-mod-php5php5-odbcphp5-snmpphp5-cgiphp5-gmplibapache2-mod-php5filterphp5-intlphp5-cliphp5-curlphp-pearphp5-xmlrpcphp5-pspellphp5-commonphp5-fpmphp5-mhashphp5-gdphp5-xslphp5-recodephp5-sybasephp5-devphp5-tidyphp5-mysqlphp5-pgsqlgaimlibpurple-devpidgin-devpidginpidgin-dbgfinch-devpidgin-datafinchlibpurple0libpurple-binpostgresql-contrib-8.4postgresql-plpython-8.4postgresql-contribpostgresqlpostgresql-pltcl-8.4libpq5libpgtypes3postgresql-server-dev-8.4postgresql-plperl-8.4libecpg-compat3postgresql-8.4postgresql-docpostgresql-clientlibecpg6libecpg-devpostgresql-client-8.4postgresql-doc-8.4libpq-devblock-modules-2.6.35-27-generic-dicrypto-modules-2.6.35-27-generic-pae-diusb-modules-2.6.35-27-generic-dimd-modules-2.6.35-27-virtual-difloppy-modules-2.6.35-27-generic-pae-dicrypto-modules-2.6.35-27-generic-dinfs-modules-2.6.35-27-generic-pae-difs-secondary-modules-2.6.35-27-generic-divirtio-modules-2.6.35-27-generic-diplip-modules-2.6.35-27-generic-dilinux-headers-2.6.35-27-servernic-shared-modules-2.6.35-27-virtual-dilinux-headers-2.6.35-27-genericfs-secondary-modules-2.6.35-27-virtual-dimessage-modules-2.6.35-27-generic-pae-diparport-modules-2.6.35-27-generic-dikernel-image-2.6.35-27-virtual-diirda-modules-2.6.35-27-virtual-difs-core-modules-2.6.35-27-generic-diserial-modules-2.6.35-27-generic-diblock-modules-2.6.35-27-generic-pae-dichar-modules-2.6.35-27-generic-pae-divlan-modules-2.6.35-27-virtual-dilinux-tools-2.6.35-27linux-image-2.6.35-27-virtuallinux-headers-2.6.35-27-powerpc-smpblock-modules-2.6.35-27-powerpc-disquashfs-modules-2.6.35-27-virtual-difloppy-modules-2.6.35-27-generic-difs-core-modules-2.6.35-27-powerpc64-smp-dikernel-image-2.6.35-27-generic-divirtio-modules-2.6.35-27-virtual-diserial-modules-2.6.35-27-generic-pae-dilinux-headers-2.6.35-27-virtualirda-modules-2.6.35-27-generic-diirda-modules-2.6.35-27-powerpc64-smp-dipcmcia-storage-modules-2.6.35-27-powerpc-dilinux-headers-2.6.35-27-powerpcparport-modules-2.6.35-27-generic-pae-dipcmcia-modules-2.6.35-27-powerpc-dicrypto-modules-2.6.35-27-powerpc64-smp-dilinux-image-2.6.35-27-powerpc-smpinput-modules-2.6.35-27-powerpc-disquashfs-modules-2.6.35-27-generic-dilinux-image-2.6.35-27-servermessage-modules-2.6.35-27-powerpc-dinic-usb-modules-2.6.35-27-generic-pae-difs-secondary-modules-2.6.35-27-generic-pae-diusb-modules-2.6.35-27-powerpc-distorage-core-modules-2.6.35-27-generic-pae-diparport-modules-2.6.35-27-virtual-diinput-modules-2.6.35-27-generic-pae-difb-modules-2.6.35-27-generic-difs-secondary-modules-2.6.35-27-powerpc64-smp-diirda-modules-2.6.35-27-generic-pae-difirewire-core-modules-2.6.35-27-generic-dippp-modules-2.6.35-27-generic-dippp-modules-2.6.35-27-powerpc-difs-core-modules-2.6.35-27-powerpc-diserial-modules-2.6.35-27-powerpc-dimouse-modules-2.6.35-27-generic-pae-disata-modules-2.6.35-27-virtual-dinic-pcmcia-modules-2.6.35-27-generic-dimouse-modules-2.6.35-27-powerpc-divlan-modules-2.6.35-27-generic-difirewire-core-modules-2.6.35-27-generic-pae-difloppy-modules-2.6.35-27-powerpc64-smp-dinic-pcmcia-modules-2.6.35-27-powerpc-difat-modules-2.6.35-27-powerpc64-smp-difb-modules-2.6.35-27-generic-pae-dilinux-image-2.6.35-27-powerpc64-smpfloppy-modules-2.6.35-27-powerpc-diblock-modules-2.6.35-27-powerpc64-smp-difat-modules-2.6.35-27-virtual-dipata-modules-2.6.35-27-generic-pae-discsi-modules-2.6.35-27-generic-pae-dipcmcia-modules-2.6.35-27-generic-dilinux-headers-2.6.35-27-generic-paenic-shared-modules-2.6.35-27-powerpc64-smp-dimouse-modules-2.6.35-27-powerpc64-smp-dimd-modules-2.6.35-27-powerpc64-smp-diblock-modules-2.6.35-27-virtual-dilinux-headers-2.6.35-27vlan-modules-2.6.35-27-powerpc-difs-core-modules-2.6.35-27-generic-pae-difat-modules-2.6.35-27-generic-pae-dinic-usb-modules-2.6.35-27-powerpc-difat-modules-2.6.35-27-powerpc-disquashfs-modules-2.6.35-27-powerpc-dilinux-image-2.6.35-27-generic-paepcmcia-storage-modules-2.6.35-27-generic-pae-dinic-shared-modules-2.6.35-27-powerpc-diirda-modules-2.6.35-27-powerpc-distorage-core-modules-2.6.35-27-virtual-dinic-usb-modules-2.6.35-27-powerpc64-smp-dinic-modules-2.6.35-27-virtual-difirewire-core-modules-2.6.35-27-powerpc64-smp-disata-modules-2.6.35-27-generic-pae-dimessage-modules-2.6.35-27-virtual-divirtio-modules-2.6.35-27-generic-pae-dippp-modules-2.6.35-27-powerpc64-smp-dinic-modules-2.6.35-27-powerpc-dinic-pcmcia-modules-2.6.35-27-generic-pae-dikernel-image-2.6.35-27-powerpc64-smp-disata-modules-2.6.35-27-generic-dinfs-modules-2.6.35-27-powerpc64-smp-divlan-modules-2.6.35-27-generic-pae-divlan-modules-2.6.35-27-powerpc64-smp-diplip-modules-2.6.35-27-generic-pae-dinic-pcmcia-modules-2.6.35-27-powerpc64-smp-dimouse-modules-2.6.35-27-generic-dinic-shared-modules-2.6.35-27-generic-pae-dippp-modules-2.6.35-27-generic-pae-discsi-modules-2.6.35-27-powerpc-dinic-modules-2.6.35-27-generic-difirewire-core-modules-2.6.35-27-powerpc-dinic-modules-2.6.35-27-generic-pae-diplip-modules-2.6.35-27-powerpc-dipata-modules-2.6.35-27-powerpc-dimessage-modules-2.6.35-27-generic-dikernel-image-2.6.35-27-generic-pae-dicrypto-modules-2.6.35-27-virtual-dinfs-modules-2.6.35-27-powerpc-discsi-modules-2.6.35-27-powerpc64-smp-dipcmcia-storage-modules-2.6.35-27-generic-dikernel-image-2.6.35-27-powerpc-diparport-modules-2.6.35-27-powerpc-dipata-modules-2.6.35-27-powerpc64-smp-dimd-modules-2.6.35-27-generic-pae-dipcmcia-modules-2.6.35-27-powerpc64-smp-dichar-modules-2.6.35-27-generic-dimouse-modules-2.6.35-27-virtual-dinic-shared-modules-2.6.35-27-generic-discsi-modules-2.6.35-27-virtual-dipcmcia-modules-2.6.35-27-generic-pae-distorage-core-modules-2.6.35-27-powerpc-difat-modules-2.6.35-27-generic-dinfs-modules-2.6.35-27-generic-diplip-modules-2.6.35-27-powerpc64-smp-dilinux-image-2.6.35-27-genericfb-modules-2.6.35-27-virtual-distorage-core-modules-2.6.35-27-generic-disquashfs-modules-2.6.35-27-generic-pae-dilinux-headers-2.6.35-27-powerpc64-smplinux-image-2.6.35-27-powerpcsquashfs-modules-2.6.35-27-powerpc64-smp-dipcmcia-storage-modules-2.6.35-27-powerpc64-smp-dipata-modules-2.6.35-27-generic-disata-modules-2.6.35-27-powerpc-dippp-modules-2.6.35-27-virtual-diserial-modules-2.6.35-27-powerpc64-smp-dimd-modules-2.6.35-27-powerpc-difloppy-modules-2.6.35-27-virtual-diinput-modules-2.6.35-27-generic-dimd-modules-2.6.35-27-generic-diusb-modules-2.6.35-27-powerpc64-smp-difs-secondary-modules-2.6.35-27-powerpc-discsi-modules-2.6.35-27-generic-diusb-modules-2.6.35-27-generic-pae-dinic-modules-2.6.35-27-powerpc64-smp-disata-modules-2.6.35-27-powerpc64-smp-difs-core-modules-2.6.35-27-virtual-dinic-usb-modules-2.6.35-27-generic-diinput-modules-2.6.35-27-powerpc64-smp-dimessage-modules-2.6.35-27-powerpc64-smp-diparport-modules-2.6.35-27-powerpc64-smp-distorage-core-modules-2.6.35-27-powerpc64-smp-dicrypto-modules-2.6.35-27-powerpc-dilibpam-moduleslibpam-crackliblibpam0glibpam-doclibpam-runtimelibpam0g-devawstatsopenssl-doclibssl0.9.8-udeblibssl0.9.8libcrypto0.9.8-udeblibssl0.9.8-dbglibssl-devopenssllibnss3-devlibnss3-1d-dbglibnss3-toolslibnss3-1dlibnss3-0dlibtiffxx0c2libtiff-opengllibtiff-toolslibtiff4libtiff-doclibtiff4-devkrb5-ftpdkrb5-doclibkadm5srv6libkdb5-4krb5-multidevlibkadm5srv-mit7krb5-telnetdlibkrb5-3libgssrpc4libkadm5clnt-mit7krb5-rsh-serverlibgssapi-krb5-2krb5-clientskrb5-userlibkadm5clnt6libkrb5support0libkrb5-dbglibkrb5-devkrb5-kdclibk5crypto3krb5-pkinitkrb5-kdc-ldapkrb5-admin-serverlibsvn0-devpython2.4-subversionlibsvn-core-perllibsvn1libsvn0libsvn-perlpython-subversionlibsvn-javasubversion-toolspython-subversion-dbglibsvn-javahllibsvn-rubylibsvn-doclibsvn-devlibsvn-ruby1.8subversionlibapache2-svnlogwatchlibvpx-doclibvpx0-dbglibvpx-devlibvpx0md-modules-2.6.32-28-powerpc64-smp-distorage-core-modules-2.6.32-28-powerpc-dinic-pcmcia-modules-2.6.32-28-powerpc-dipcmcia-modules-2.6.32-28-powerpc64-smp-dilinux-headers-2.6.32-28-powerpc64-smpmd-modules-2.6.32-28-powerpc-dipcmcia-storage-modules-2.6.32-28-powerpc-disata-modules-2.6.32-28-powerpc64-smp-dipata-modules-2.6.32-28-powerpc-dinic-modules-2.6.32-28-powerpc64-smp-discsi-modules-2.6.32-28-powerpc-dilinux-image-2.6.32-28-powerpc-smplinux-headers-2.6.32-28-powerpc-smpnfs-modules-2.6.32-28-powerpc64-smp-diusb-modules-2.6.32-28-powerpc-dipcmcia-modules-2.6.32-28-powerpc-diparport-modules-2.6.32-28-powerpc-dinfs-modules-2.6.32-28-sparc64-dinic-pcmcia-modules-2.6.32-28-powerpc64-smp-dikernel-image-2.6.32-28-sparc64-difs-secondary-modules-2.6.32-28-powerpc64-smp-difs-core-modules-2.6.32-28-powerpc-dinic-modules-2.6.32-28-powerpc-dinic-shared-modules-2.6.32-28-powerpc-dilinux-headers-2.6.32-28-powerpcppp-modules-2.6.32-28-powerpc-dimouse-modules-2.6.35-25-generic-disquashfs-modules-2.6.32-28-powerpc-difat-modules-2.6.32-28-powerpc64-smp-dinfs-modules-2.6.35-25-generic-pae-diusb-modules-2.6.32-28-sparc64-dinic-modules-2.6.32-28-generic-diirda-modules-2.6.35-25-virtual-dikernel-image-2.6.32-28-powerpc64-smp-difs-core-modules-2.6.32-28-sparc64-dimouse-modules-2.6.35-25-virtual-divirtio-modules-2.6.35-25-generic-pae-discsi-modules-2.6.32-28-generic-discsi-modules-2.6.32-28-sparc64-discsi-modules-2.6.35-25-virtual-dipata-modules-2.6.32-28-generic-difloppy-modules-2.6.35-25-virtual-dinic-modules-2.6.35-25-generic-pae-diblock-modules-2.6.35-25-generic-pae-difs-secondary-modules-2.6.32-28-sparc64-difirewire-core-modules-2.6.32-28-powerpc-diplip-modules-2.6.32-28-powerpc64-smp-difs-core-modules-2.6.35-25-virtual-diplip-modules-2.6.32-28-powerpc-discsi-modules-2.6.35-25-generic-pae-dikernel-image-2.6.35-25-generic-distorage-core-modules-2.6.35-25-generic-pae-dinic-usb-modules-2.6.35-25-generic-pae-diusb-modules-2.6.32-28-generic-dippp-modules-2.6.35-25-generic-pae-dilinux-source-2.6.32nic-pcmcia-modules-2.6.32-28-generic-dichar-modules-2.6.32-28-generic-dilinux-image-2.6.32-28-sparc64-smpppp-modules-2.6.35-25-virtual-dinic-modules-2.6.35-25-generic-dilinux-image-2.6.32-28-virtualfs-core-modules-2.6.32-28-generic-dinic-shared-modules-2.6.35-25-generic-difs-secondary-modules-2.6.32-28-powerpc-dilinux-image-2.6.35-25-generic-paestorage-core-modules-2.6.32-28-powerpc64-smp-dicrypto-modules-2.6.35-25-generic-dipcmcia-modules-2.6.35-25-generic-dipata-modules-2.6.35-25-powerpc64-smp-dimouse-modules-2.6.32-28-powerpc64-smp-difs-core-modules-2.6.35-25-generic-pae-diirda-modules-2.6.32-28-generic-dicrypto-modules-2.6.35-25-powerpc-disquashfs-modules-2.6.32-28-generic-dimessage-modules-2.6.32-28-powerpc64-smp-dippp-modules-2.6.32-28-sparc64-dilinux-image-2.6.32-312-ec2scsi-modules-2.6.32-28-powerpc64-smp-diinput-modules-2.6.35-25-powerpc-diplip-modules-2.6.35-25-generic-dinic-pcmcia-modules-2.6.35-25-generic-dipata-modules-2.6.32-28-powerpc64-smp-distorage-core-modules-2.6.35-25-powerpc-dikernel-image-2.6.35-25-powerpc64-smp-dimessage-modules-2.6.35-25-powerpc-divirtio-modules-2.6.35-25-virtual-dinic-usb-modules-2.6.32-28-powerpc-difb-modules-2.6.35-25-generic-pae-dilinux-headers-2.6.35-25-virtualirda-modules-2.6.35-25-generic-dipcmcia-modules-2.6.35-25-powerpc-divlan-modules-2.6.32-28-sparc64-difat-modules-2.6.32-28-generic-diirda-modules-2.6.32-28-powerpc64-smp-dilinux-headers-2.6.32-312nic-usb-modules-2.6.35-25-powerpc64-smp-dipcmcia-storage-modules-2.6.35-25-generic-pae-dimouse-modules-2.6.32-28-powerpc-dicrypto-modules-2.6.35-25-generic-pae-distorage-core-modules-2.6.35-25-virtual-dimouse-modules-2.6.35-25-generic-pae-dilinux-image-2.6.35-25-virtualpata-modules-2.6.32-28-sparc64-dilinux-image-2.6.32-28-sparc64sata-modules-2.6.32-28-generic-difloppy-modules-2.6.35-25-powerpc-dinic-usb-modules-2.6.32-28-sparc64-difs-core-modules-2.6.35-25-powerpc64-smp-difat-modules-2.6.35-25-generic-dilinux-headers-2.6.32-28-sparc64-smpparport-modules-2.6.35-25-generic-difloppy-modules-2.6.35-25-generic-diinput-modules-2.6.35-25-generic-pae-diserial-modules-2.6.32-28-powerpc-discsi-modules-2.6.35-25-powerpc-dimessage-modules-2.6.32-28-generic-diinput-modules-2.6.32-28-sparc64-dimd-modules-2.6.32-28-sparc64-diplip-modules-2.6.32-28-sparc64-dimd-modules-2.6.32-28-generic-diusb-modules-2.6.35-25-powerpc-distorage-core-modules-2.6.35-25-generic-difs-secondary-modules-2.6.32-28-generic-dinic-modules-2.6.35-25-powerpc64-smp-difirewire-core-modules-2.6.35-25-generic-diparport-modules-2.6.35-25-powerpc64-smp-distorage-core-modules-2.6.32-28-sparc64-dilinux-image-2.6.35-25-servernfs-modules-2.6.35-25-powerpc64-smp-diusb-modules-2.6.35-25-generic-pae-dimessage-modules-2.6.32-28-sparc64-dippp-modules-2.6.35-25-generic-divlan-modules-2.6.32-28-powerpc64-smp-discsi-modules-2.6.35-25-generic-dinic-pcmcia-modules-2.6.35-25-generic-pae-dilinux-tools-2.6.32-28parport-modules-2.6.35-25-virtual-disata-modules-2.6.35-25-virtual-dilinux-image-2.6.32-28-genericvlan-modules-2.6.35-25-powerpc64-smp-difloppy-modules-2.6.32-28-powerpc-difs-core-modules-2.6.35-25-generic-dilinux-ec2-source-2.6.32fat-modules-2.6.32-28-sparc64-dikernel-image-2.6.35-25-powerpc-dicrypto-modules-2.6.32-28-powerpc64-smp-diusb-modules-2.6.35-25-powerpc64-smp-dipata-modules-2.6.35-25-generic-pae-difs-secondary-modules-2.6.35-25-virtual-dilinux-image-2.6.35-25-powerpc-smplinux-headers-2.6.35-25-genericvlan-modules-2.6.35-25-virtual-diirda-modules-2.6.35-25-generic-pae-dinic-shared-modules-2.6.32-28-generic-dicrypto-modules-2.6.35-25-powerpc64-smp-disata-modules-2.6.35-25-powerpc-dilinux-headers-2.6.35-25firewire-core-modules-2.6.32-28-generic-dipcmcia-storage-modules-2.6.35-25-powerpc64-smp-disquashfs-modules-2.6.35-25-generic-diblock-modules-2.6.32-28-generic-disquashfs-modules-2.6.35-25-virtual-diblock-modules-2.6.35-25-generic-dilinux-image-2.6.35-25-powerpcirda-modules-2.6.35-25-powerpc-dikernel-image-2.6.35-25-virtual-difs-core-modules-2.6.32-28-powerpc64-smp-dilinux-ec2-docblock-modules-2.6.32-28-sparc64-difirewire-core-modules-2.6.35-25-generic-pae-distorage-core-modules-2.6.35-25-powerpc64-smp-difirewire-core-modules-2.6.35-25-powerpc-dimessage-modules-2.6.32-28-powerpc-dilinux-source-2.6.35irda-modules-2.6.32-28-powerpc-dipcmcia-storage-modules-2.6.35-25-powerpc-dicrypto-modules-2.6.32-28-powerpc-dilinux-tools-2.6.35-25pata-modules-2.6.35-25-powerpc-difat-modules-2.6.35-25-virtual-dinic-pcmcia-modules-2.6.35-25-powerpc64-smp-dinic-usb-modules-2.6.32-28-generic-difloppy-modules-2.6.32-28-generic-difs-secondary-modules-2.6.35-25-generic-pae-difloppy-modules-2.6.35-25-generic-pae-diserial-modules-2.6.32-28-generic-disata-modules-2.6.35-25-generic-pae-difs-core-modules-2.6.35-25-powerpc-dicrypto-modules-2.6.35-25-virtual-distorage-core-modules-2.6.32-28-generic-disquashfs-modules-2.6.35-25-powerpc-dimd-modules-2.6.35-25-powerpc-dinic-shared-modules-2.6.35-25-powerpc64-smp-dinfs-modules-2.6.35-25-generic-dimouse-modules-2.6.35-25-powerpc64-smp-dimessage-modules-2.6.35-25-generic-pae-disquashfs-modules-2.6.35-25-generic-pae-dilinux-headers-2.6.32-28md-modules-2.6.35-25-powerpc64-smp-dippp-modules-2.6.35-25-powerpc64-smp-dinfs-modules-2.6.32-28-generic-disata-modules-2.6.32-28-powerpc-dinic-usb-modules-2.6.35-25-powerpc-difb-modules-2.6.35-25-generic-dinic-modules-2.6.32-28-sparc64-dinfs-modules-2.6.32-28-powerpc-dimessage-modules-2.6.35-25-generic-difs-secondary-modules-2.6.35-25-powerpc64-smp-divirtio-modules-2.6.32-28-generic-dinic-pcmcia-modules-2.6.35-25-powerpc-dipata-modules-2.6.35-25-generic-difs-secondary-modules-2.6.35-25-generic-dilinux-tools-commonserial-modules-2.6.32-28-sparc64-dilinux-image-2.6.35-25-genericfat-modules-2.6.35-25-powerpc-diplip-modules-2.6.32-28-generic-difat-modules-2.6.32-28-powerpc-diirda-modules-2.6.35-25-powerpc64-smp-difat-modules-2.6.35-25-powerpc64-smp-dimd-modules-2.6.35-25-generic-pae-dipcmcia-modules-2.6.35-25-powerpc64-smp-diserial-modules-2.6.35-25-generic-pae-difs-secondary-modules-2.6.35-25-powerpc-dipcmcia-modules-2.6.35-25-generic-pae-diinput-modules-2.6.35-25-generic-diinput-modules-2.6.32-28-generic-dimouse-modules-2.6.35-25-powerpc-dicrypto-modules-2.6.32-28-sparc64-dilinux-image-2.6.32-28-powerpcnic-usb-modules-2.6.32-28-powerpc64-smp-diserial-modules-2.6.35-25-generic-dilinux-headers-2.6.32-312-ec2nfs-modules-2.6.35-25-powerpc-difirewire-core-modules-2.6.32-28-powerpc64-smp-diusb-modules-2.6.35-25-generic-difirewire-core-modules-2.6.35-25-powerpc64-smp-dinic-shared-modules-2.6.32-28-sparc64-diblock-modules-2.6.32-28-powerpc64-smp-dipcmcia-storage-modules-2.6.32-28-powerpc64-smp-dinic-modules-2.6.35-25-powerpc-dinic-shared-modules-2.6.35-25-generic-pae-dinic-shared-modules-2.6.35-25-virtual-dilinux-image-2.6.35-25-powerpc64-smpmessage-modules-2.6.35-25-virtual-dipcmcia-modules-2.6.32-28-generic-dilinux-headers-2.6.35-25-powerpc64-smpsata-modules-2.6.35-25-generic-divlan-modules-2.6.35-25-generic-pae-dimouse-modules-2.6.32-28-generic-dinic-shared-modules-2.6.35-25-powerpc-diusb-modules-2.6.32-28-powerpc64-smp-dilinux-headers-2.6.35-25-powerpcparport-modules-2.6.32-28-generic-diparport-modules-2.6.35-25-generic-pae-dilinux-headers-2.6.35-25-powerpc-smplinux-libc-devvlan-modules-2.6.35-25-powerpc-diplip-modules-2.6.35-25-generic-pae-dicrypto-modules-2.6.32-28-generic-divlan-modules-2.6.32-28-generic-dippp-modules-2.6.32-28-generic-dimd-modules-2.6.35-25-generic-dimd-modules-2.6.35-25-virtual-diblock-modules-2.6.35-25-powerpc-diserial-modules-2.6.32-28-powerpc64-smp-diblock-modules-2.6.35-25-virtual-diinput-modules-2.6.35-25-powerpc64-smp-diserial-modules-2.6.35-25-powerpc64-smp-dilinux-headers-2.6.35-25-serverppp-modules-2.6.35-25-powerpc-disata-modules-2.6.32-28-sparc64-dipcmcia-storage-modules-2.6.35-25-generic-dipcmcia-storage-modules-2.6.32-28-generic-dimessage-modules-2.6.35-25-powerpc64-smp-dinic-modules-2.6.35-25-virtual-disquashfs-modules-2.6.35-25-powerpc64-smp-dichar-modules-2.6.35-25-generic-pae-divlan-modules-2.6.35-25-generic-diplip-modules-2.6.35-25-powerpc-disquashfs-modules-2.6.32-28-powerpc64-smp-dichar-modules-2.6.35-25-generic-dikernel-image-2.6.32-28-generic-diblock-modules-2.6.32-28-powerpc-dinic-shared-modules-2.6.32-28-powerpc64-smp-disquashfs-modules-2.6.32-28-sparc64-difat-modules-2.6.35-25-generic-pae-dippp-modules-2.6.32-28-powerpc64-smp-difloppy-modules-2.6.35-25-powerpc64-smp-diinput-modules-2.6.32-28-powerpc64-smp-dikernel-image-2.6.35-25-generic-pae-difb-modules-2.6.32-28-generic-dilinux-headers-2.6.35-25-generic-paelinux-docplip-modules-2.6.35-25-powerpc64-smp-diinput-modules-2.6.32-28-powerpc-diblock-modules-2.6.35-25-powerpc64-smp-dilinux-headers-2.6.32-28-genericnic-usb-modules-2.6.35-25-generic-diparport-modules-2.6.32-28-powerpc64-smp-difloppy-modules-2.6.32-28-powerpc64-smp-divlan-modules-2.6.32-28-powerpc-diserial-modules-2.6.35-25-powerpc-dikernel-image-2.6.32-28-powerpc-dilinux-image-2.6.32-28-powerpc64-smpparport-modules-2.6.32-28-sparc64-dilinux-headers-2.6.32-28-sparc64firewire-core-modules-2.6.32-28-sparc64-dimouse-modules-2.6.32-28-sparc64-divirtio-modules-2.6.35-25-generic-difb-modules-2.6.35-25-virtual-diparport-modules-2.6.35-25-powerpc-disata-modules-2.6.35-25-powerpc64-smp-discsi-modules-2.6.35-25-powerpc64-smp-didbus-1-docdbus-x11libqt4-dbusdbus-1-dbglibdbus-1-3libdbus-1-devclamav-baseclamav-docslibclamav6clamav-freshclamclamav-milterclamavclamav-daemonclamav-testfilesclamav-dbglibclamav-dev/etclsb-release^.*Ubuntu.*\nDISTRIB_RELEASE=(\d{1,2}\.\d{1,2})$1icedtea-6-jre-cacaoicedtea6-pluginopenjdk-6-sourceopenjdk-6-jre-headlessopenjdk-6-jreopenjdk-6-demoopenjdk-6-jre-zeroopenjdk-6-docopenjdk-6-dbgopenjdk-6-jdkopenjdk-6-jre-lib0:1.0.10-5ubuntu4.10:1.0.10-5ubuntu2.21:2.0.7-1ubuntu2.10:2.6.4-2ubuntu2.50:0.25.4-2ubuntu6.50:2.7.1-1ubuntu3.20:2.6.1-0ubuntu2.42:4.5-2ubuntu0.10.10.12:4.5-2ubuntu0.11.04.11:1.0.9.1-0ubuntu16.11:1.0.9.1-0ubuntu18.10.10.11:1.0.9.1-0ubuntu18.10.04.10:0.99.7.1-5ubuntu6.50:1.1.3-2ubuntu2.10:1.1.1-2ubuntu5.40:1.1.2-2ubuntu8.40:1.1.1-4ubuntu2.40:1.9.1+dfsg-1ubuntu1.10:1.8.3+dfsg-5ubuntu2.20:1.8.1+dfsg-2ubuntu0.100:1.8.1+dfsg-5ubuntu0.82:1.7.6-2ubuntu7.102:1.9.0-0ubuntu7.60:1.9.2.16+build1+nobinonly-0ubuntu0.10.10.10:3.6.16+build1+nobinonly-0ubuntu0.8.04.10:1.9.2.16+build1+nobinonly-0ubuntu0.10.04.10:3.6.16+build1+nobinonly-0ubuntu0.10.04.10:3.6.16+build1+nobinonly-0ubuntu0.9.10.10:3.6.16+build1+nobinonly-0ubuntu0.10.10.14:0.5.1-1ubuntu1.24:0.6-2ubuntu6.20:3.1.15+build1+nobinonly-0ubuntu0.10.04.10:3.1.15+build1+nobinonly-0ubuntu0.10.10.10:3.1.15+build1+nobinonly-0ubuntu0.11.04.10:2.6.35-30.600:5.3.6-13ubuntu3.20:5.3.3-1ubuntu9.60:5.3.2-1ubuntu4.100:5.3.5-1ubuntu7.30:5.2.4-2ubuntu5.180:1.5.21-2ubuntu3.10:1.5.20-9ubuntu2.10:1.5.20-7ubuntu1.10:2.6.11-1ubuntu6.20:2.6.10-1ubuntu3.40:2.6.8-2ubuntu1.40:0.8.13.2ubuntu4.2-00:0.8.3ubuntu7.2-00:0.7.25.3ubuntu9.7-00:0.7.9ubuntu17.3-00:2.6.1-0ubuntu2.20:2.6.4-2ubuntu2.30:0.25.4-2ubuntu6.30:0.7.1-0ubuntu1.20:0.6.1-0ubuntu1.30:0.7.2-0ubuntu2.30:2.6.35-903.264:4.7.2-0ubuntu6.34:4.7.0-0ubuntu4.44:4.6.2-0ubuntu5.32:1.10.4-1ubuntu4.12:1.7.6-2ubuntu7.82:1.9.0-0ubuntu7.52:1.10.1-1ubuntu1.30:2.6.35-903.250:1.3.0-1ubuntu2.10:1.3.0-1ubuntu1.10:1.3.0-0ubuntu7.10:2.0.1+bzr1256-0ubuntu4.10:1.6.2-0ubuntu30.50:2.0+bzr1241-0ubuntu4.20:1.9.2.23+build1+nobinonly-0ubuntu0.10.10.10:3.6.23+build1+nobinonly-0ubuntu0.10.04.10:1.9.2.23+build1+nobinonly-0ubuntu0.10.04.10:3.6.23+build1+nobinonly-0ubuntu0.10.10.10:8.3.16-0ubuntu0.8.040:8.4.9-0ubuntu0.10.040:8.4.9-0ubuntu0.11.040:8.4.9-0ubuntu0.10.100:0.25.4-2ubuntu6.20:2.6.4-2ubuntu2.20:2.6.1-0ubuntu2.10:2.30.3-0ubuntu1.10:3.2.0.1-0ubuntu1.10:2.32.1-0ubuntu1.20:2.34.0-0ubuntu3.20:2.6.35-30.610:20110912ubuntu3.1-00:20100412ubuntu0.11.04.1-00:20100406ubuntu1.1-00:20100412ubuntu0.10.10.1-00:2.6.32-423.424:4.4.5-0ubuntu1.24:4.6.5-0ubuntu1.14:4.5.5-0ubuntu2.10:2.0.4-1ubuntu2.70:2.10.5-1ubuntu3.10:2.8.6-1ubuntu0.10:2.8.6-1ubuntu2.10:2.8.5-2ubuntu0.10:2.6.32-419.370:3.9.4-5ubuntu6.10:3.9.2-2ubuntu0.80:3.9.4-2ubuntu0.50:3.8.2-7ubuntu3.100:3.9.5-1ubuntu1.10:3.2.1-1ubuntu1.10:3.1.0-9ubuntu1.20:3.0.0-4ubuntu1.30:3.2.0-3ubuntu4.20:3.1.0-9ubuntu2.20:1.2.44-1ubuntu3.40:1.2.46-3ubuntu1.30:1.2.42-1ubuntu2.50:1.2.15~beta5-3ubuntu0.70:1.2.44-1ubuntu0.40:2.6.32-423.420:2.6.35-32.670:2.6.35-903.320:5.3.2-1ubuntu4.140:5.3.5-1ubuntu7.70:5.3.6-13ubuntu3.60:5.2.4-2ubuntu5.230:5.3.3-1ubuntu9.100:0.9.8o-5ubuntu1.20:1.0.0e-2ubuntu4.20:0.9.8k-7ubuntu8.80:0.9.8o-1ubuntu4.60:0.9.8g-4ubuntu3.150:2.32.0-0ubuntu1.20:2.30.3-0ubuntu1.30:2.32.0-0ubuntu12.40:1.2.46-3ubuntu1.20:1.2.42-1ubuntu2.40:1.2.44-1ubuntu0.30:1.2.15~beta5-3ubuntu0.60:1.2.44-1ubuntu3.30:3.1.19+build1+nobinonly-0ubuntu0.10.10.10:3.1.19+build1+nobinonly-0ubuntu0.10.04.10:3.1.19+build1+nobinonly-0ubuntu0.11.04.10:6b18-1.8.13-0ubuntu1~10.10.10:6b18-1.8.13-0ubuntu1~11.04.10:6b18-1.8.13-0ubuntu1~10.04.10:2.6.31.dfsg-2ubuntu1.80:2.7.8.dfsg-2ubuntu0.30:2.7.8.dfsg-4ubuntu0.20:2.7.7.dfsg-4ubuntu0.40:2.7.6.dfsg-1ubuntu1.40:1.9.2.26+build2+nobinonly-0ubuntu0.10.10.10:1.9.2.26+build2+nobinonly-0ubuntu0.10.04.10:5.3.3-1ubuntu9.70:5.3.2-1ubuntu4.110:5.3.5-1ubuntu7.40:5.3.6-13ubuntu3.30:5.2.4-2ubuntu5.190:2.7.7.dfsg-4ubuntu0.30:2.6.31.dfsg-2ubuntu1.70:2.7.8.dfsg-4ubuntu0.10:2.7.8.dfsg-2ubuntu0.20:2.7.6.dfsg-1ubuntu1.30:1.2.5-1ubuntu1.10:1.2.3-1ubuntu0.2.10.10.30:1.3-2ubuntu1.10:1.1.1-2ubuntu1.40:2.6.35-31.630:2.4.4-1ubuntu2.20:2.4.2-2ubuntu0.30:2.3.5-1ubuntu4.8.04.70:2.3.11-1ubuntu2.50:2.4.4-2ubuntu1.10:2.6.35-32.640:5.1.2-3ubuntu0.10.04.10:5.1.2-3ubuntu0.11.04.10:5.1.2-3ubuntu0.10.10.10:5.1.2-3ubuntu0.11.10.10:6.0.32-5ubuntu1.10:6.0.28-2ubuntu1.50:6.0.28-10ubuntu2.20:6.0.24-2ubuntu1.90:2.4.21-0ubuntu5.60:2.4.25-1.1ubuntu4.10:2.4.23-0ubuntu3.70:2.4.23-6ubuntu6.10:1.2.44-1ubuntu0.20:1.2.42-1ubuntu2.30:1.2.46-3ubuntu1.10:1.2.44-1ubuntu3.20:1.2.15~beta5-3ubuntu0.50:0.9.3-0ubuntu0.10.04.30:1.17-0ubuntu3.10:1.17-0ubuntu4.10:0.9.3-0ubuntu0.10.10.30:1:1.12.13-12ubuntu1.11.04.10:1:1.12.13-12ubuntu1.10.04.10:2:1.12.13+real-6ubuntu0.10:1:1.12.13-12ubuntu1.10.10.10:4.4.2-2ubuntu0.11.04.10:4.2.1-3ubuntu0.10.04.10:4.2.1-3ubuntu0.10.10.10:4.4.2-2ubuntu0.11.10.10:1.3.2-1ubuntu1.10:1.3.1-1ubuntu0.10:1.3.2-1ubuntu2.10:1.2.3-3ubuntu1.10:2.6.35-903.240:2.0.1-0ubuntu0.11.04.10:2.0.1-0ubuntu0.10.04.10:2.0.1-0ubuntu0.10.10.10:2.0.1-0ubuntu0.11.10.10:1.0.5-6ubuntu1.11.10.10:1.0.5-6ubuntu1.11.04.10:1.0.4-2ubuntu4.20:1.0.5-4ubuntu0.20:1.0.5-4ubuntu1.10:3.1.12+build1+nobinonly-0ubuntu0.10.10.10:3.1.12+build1+nobinonly-0ubuntu0.11.04.10:3.1.12+build1+nobinonly-0ubuntu0.10.04.10:1.9.2.24+build2+nobinonly-0ubuntu0.10.10.10:3.6.24+build2+nobinonly-0ubuntu0.10.04.10:3.6.24+build2+nobinonly-0ubuntu0.10.10.10:1.9.2.24+build2+nobinonly-0ubuntu0.10.04.10:2.32.0-0ubuntu1.10:2.26.3-0ubuntu1.10:2.32.1-0ubuntu3.10:1:9.4.2.dfsg.P2-2ubuntu0.90:1:9.7.0.dfsg.P1-1ubuntu0.40:1:9.7.3.dfsg-1ubuntu4.10:1:9.7.3.dfsg-1ubuntu2.30:1:9.7.1.dfsg.P2-2ubuntu0.50:2.6.35-903.290:2.2.17-1ubuntu1.20:2.2.8-1ubuntu0.210:2.2.14-5ubuntu8.60:2.2.16-1ubuntu3.30:3.2-1ubuntu1.10:3.1.2-0ubuntu3.10:3.1.3-1ubuntu1.10:3.1.2+20100915-0ubuntu4.10:6b22-1.10.4-0ubuntu1~11.04.20:6b20-1.9.10-0ubuntu1~10.10.30:6b23~pre11-0ubuntu1.11.10.10:6b20-1.9.10-0ubuntu1~10.04.30:6b22-1.10.6-0ubuntu10:6b23~pre11-0ubuntu1.11.10.20:6b20-1.9.13-0ubuntu1~10.04.10:6b20-1.9.13-0ubuntu1~10.10.10:11.0+build1-0ubuntu0.10.04.20:11.0+build1-0ubuntu0.10.10.20:11.0+build1-0ubuntu0.11.04.10:11.0+build1-0ubuntu0.11.10.10:6b23~pre11-0ubuntu1.11.100:6b22-1.10.4-0ubuntu1~11.04.10:1.1.3-1ubuntu1.10:1.1.1-0ubuntu1~11.04.20:6b20-1.9.10-0ubuntu1~10.04.20:6b20-1.9.10-0ubuntu1~10.10.20:2.2.20-1ubuntu1.20:2.2.17-1ubuntu1.50:2.2.8-1ubuntu0.230:2.2.16-1ubuntu3.50:2.2.14-5ubuntu8.80:0.24ubuntu0.1-00:0.15ubuntu0.1-00:0.17ubuntu0.1-00:3.0.10ubuntu0.1-00:4.0.5ubuntu0.1-00:5.0.2ubuntu0.1-00:2.6.32-422.400:2.6.35-30.590:0.9.4-0ubuntu0.10.04.10:0.9.4-0ubuntu10:0.9.4-0ubuntu0.10.10.10:1.0.3-0ubuntu11:0.142.23.2-01:0.87.33-01:0.134.11.2-01:0.152.25.8-01:0.150.5.2-00:0.7.1-0ubuntu1.10:0.7.2-0ubuntu2.20:0.6.1-0ubuntu1.20:1.900.1-7ubuntu0.10.04.10:1.900.1-7ubuntu0.10.10.10:1.900.1-7ubuntu2.11.10.10:1.900.1-7ubuntu2.11.04.10:2.6.1-0ubuntu2.50:2.6.4-2ubuntu2.70:2.7.1-1ubuntu3.40:0.7.2-1ubuntu2~0.10.10.10:0.7.2-1ubuntu2~0.11.04.10:0.7.2-1ubuntu2~0.10.04.10:0.7.2-1ubuntu2~0.11.10.10:1.9.2.20+build1+nobinonly-0ubuntu0.10.04.10:3.6.20+build1+nobinonly-0ubuntu0.10.04.10:1.9.2.20+build1+nobinonly-0ubuntu0.10.10.10:3.6.20+build1+nobinonly-0ubuntu0.10.10.10:2.7-10ubuntu8.10:2.13-20ubuntu5.10:2.13-0ubuntu13.10:2.11.1-0ubuntu7.100:2.12.1-0ubuntu10.40:5.3.3-1ubuntu9.90:5.3.5-1ubuntu7.60:5.2.4-2ubuntu5.220:5.3.2-1ubuntu4.130:5.3.6-13ubuntu3.50:3.1.18+build2+nobinonly-0ubuntu0.10.04.10:3.1.18+build2+nobinonly-0ubuntu0.10.10.10:3.1.18+build2+nobinonly-0ubuntu0.11.04.10:0.99.15-1ubuntu0.30:0.99.17-1ubuntu0.20:0.99.18-2ubuntu0.10:0.99.17-4ubuntu1.10:2.6.1-0ubuntu2.60:2.7.1-1ubuntu3.50:2.6.4-2ubuntu2.80:0.25.4-2ubuntu6.60:2.2.16-1ubuntu3.40:2.2.20-1ubuntu1.10:2.2.17-1ubuntu1.40:2.2.8-1ubuntu0.220:2.2.14-5ubuntu8.70:1.0.10-5ubuntu2.50:1:2.0.7-1ubuntu2.40:1:2.0.10-1ubuntu2.30:1.0.10-5ubuntu4.40:2.2.2-3ubuntu6.30:2.3.2-3ubuntu4.10:2.3.2-3ubuntu5.10:2.3.0~pre2-4ubuntu2.30:2.6.32-421.390:1.9.2.27+build1+nobinonly-0ubuntu0.10.04.10:1.9.2.27+build1+nobinonly-0ubuntu0.10.10.10:2.6.35-903.280:20090814ubuntu0.10.04.1-00:20090814ubuntu0.10.10.1-00:20090814+nmu2ubuntu0.1-00:8.4.11-0ubuntu0.11.040:8.4.11-0ubuntu0.10.040:8.3.18-0ubuntu0.8.040:8.4.11-0ubuntu0.10.100:9.1.3-0ubuntu0.11.100:1.8.7.249-2ubuntu0.10:1.8.7.302-2ubuntu0.10:1.8.7.299-2ubuntu0.10:1.8.7.352-2ubuntu0.10:8.61.dfsg.1-1ubuntu3.40:8.71.dfsg.2-0ubuntu7.10:8.71.dfsg.1-0ubuntu5.40:2.10.61ubuntu5.1-00:2.10.69ubuntu2.1-00:2.11.1ubuntu3.1-00:2.10.11ubuntu5.8.04.5-00:2.10.67ubuntu1.1-01:0.150.5.1-01:0.87.31.1-01:0.134.11.1-00:0.105ubuntu1.1-00:0.99.3ubuntu0.1-01:0.152.25.5-01:0.142.23.1-00:0.111ubuntu2.1-00:2.4.4-2ubuntu1.20:2.4.4-1ubuntu2.30:2.4.2-2ubuntu0.40:2.3.5-1ubuntu4.8.04.90:2.3.11-1ubuntu2.60:1:2.7.3-1ubuntu3.30:1:2.6.6-1ubuntu4.40:1:2.7.11-1ubuntu2.10:2.6.35-31.620:5.1.2-3ubuntu0.10.10.20:5.1.2-3ubuntu0.10.04.20:5.1.2-3ubuntu0.11.04.20:5.1.2-3ubuntu0.11.10.20:83-0ubuntu3.2.10.10.10:87-0ubuntu1.10:83-0ubuntu3.2.10.04.10:2.6.35-903.270:1.4.4-6ubuntu2.40:1.3.7-1ubuntu3.130:1.4.6-5ubuntu1.40:1.4.3-1ubuntu1.50:6.0.28-10ubuntu2.30:6.0.32-5ubuntu1.20:6.0.24-2ubuntu1.100:6.0.28-2ubuntu1.60:4:4.4.5-0ubuntu1.20:4:4.7.1-0ubuntu3.10:4:4.5.5-0ubuntu2.20:4:4.6.5-0ubuntu1.20:0.14.0+noroms-0ubuntu4.50:0.14.1+noroms-0ubuntu6.20:0.12.5+noroms-0ubuntu7.110:0.12.3+noroms-0ubuntu9.170:1.9.2.22+build2+nobinonly-0ubuntu0.10.04.10:3.6.22+build2+nobinonly-0ubuntu0.10.04.10:3.6.22+build2+nobinonly-0ubuntu0.10.10.10:1.9.2.22+build2+nobinonly-0ubuntu0.10.10.10:6.0.2+build2+nobinonly-0ubuntu0.11.04.10:7.21.0-1ubuntu1.30:7.21.6-3ubuntu3.20:7.21.3-1ubuntu1.50:10.0.2+build1-0ubuntu0.11.10.10:10.0.2+build1-0ubuntu0.10.10.10:10.0.2+build1-0ubuntu0.11.04.10:10.0.2+build1-0ubuntu0.10.04.10:2.6.32-420.380:2.6.32-418.360:3.1.20+build1+nobinonly-0ubuntu0.10.04.10:3.1.20+build1+nobinonly-0ubuntu0.11.04.10:3.1.20+build1+nobinonly-0ubuntu0.10.10.10:0.76.7.1-00:0.81.13.3-00:0.80.9.1-00:0.75.10.2-00:1:0.8.8.1-2ubuntu0.30:1:0.8.8.1-1ubuntu1.30:1:0.8.7-1ubuntu0.30:1:0.8.8.2-3ubuntu1.10:5.1.61-0ubuntu0.11.10.10:5.1.61-0ubuntu0.10.10.10:5.0.95-0ubuntu10:5.1.61-0ubuntu0.11.04.10:5.1.61-0ubuntu0.10.04.10:2.6.35-32.660:2.6.35-32.650:0.4.2-12.1ubuntu1.10.04.10:0.4.2-12.2ubuntu2.11.10.10:0.4.2-12.1ubuntu1.10.10.10:0.4.2-12.2ubuntu2.11.04.10:2.8.4-1ubuntu0.10.10.10:2.8.4-1ubuntu0.11.04.10:2.8.4-1ubuntu0.11.10.10:2.8.0-2ubuntu0.10:3.1.16+build2+nobinonly-0ubuntu0.11.04.10:3.1.16+build2+nobinonly-0ubuntu0.10.04.10:3.1.16+build2+nobinonly-0ubuntu0.10.10.10:3.1.13+build1+nobinonly-0ubuntu0.10.04.10:3.1.13+build1+nobinonly-0ubuntu0.11.04.10:3.1.13+build1+nobinonly-0ubuntu0.10.10.10:3.12.9+ckbi-1.82-0ubuntu0.10.04.30:3.12.9+ckbi-1.82-0ubuntu2.10:3.12.9+ckbi-1.82-0ubuntu0.10.10.30:10.0.1+build1-0ubuntu0.10.10.10:10.0.1+build1-0ubuntu0.10.04.10:10.0.1+build1-0ubuntu0.11.10.10:10.0.1+build1-0ubuntu0.11.04.10:3.1.3-2ubuntu3.30:4.1.1-P1-15ubuntu9.10:3.0.6.dfsg-1ubuntu9.30:3.1.3-2ubuntu6.30:1.9.2.28+build1+nobinonly-0ubuntu0.10.04.10:1.9.2.28+build1+nobinonly-0ubuntu0.10.10.10:1:1.7-1ubuntu0.10:1:1.3-1.1ubuntu0.10:1:1.8-1ubuntu0.10:1:1.6-1ubuntu0.10:4:0.5.1-1ubuntu1.30:4:0.6-2ubuntu6.30:1:1.4.1-1ubuntu0.10:1:1.4.3-2ubuntu0.10:1:1.4.2-1ubuntu0.10:0.7.9ubuntu17.4-00:0.8.3ubuntu7.3-00:0.8.13.2ubuntu4.3-00:0.7.25.3ubuntu9.9-00:10.0+build1-0ubuntu0.11.10.10:10.0+build1-0ubuntu0.11.04.10:10.0+build1-0ubuntu0.10.10.10:10.0+build1-0ubuntu0.10.04.21:7.5+5ubuntu1.1-01:7.5+6ubuntu3.1-01:7.6+4ubuntu3.2-01:7.6+7ubuntu7.1-011.100:0.96.5+dfsg-1ubuntu1.10.04.30:0.97.3+dfsg-1ubuntu0.11.04.10:0.96.5+dfsg-1ubuntu1.10.10.30:0.97.3+dfsg-1ubuntu0.11.10.10:3.6.21+build1+nobinonly-0ubuntu0.10.10.10:6.0.1+build1+nobinonly-0ubuntu0.11.04.10:3.6.21+build1+nobinonly-0ubuntu0.10.04.10:1.9.2.21+build1+nobinonly-0ubuntu0.10.10.10:1.9.2.21+build1+nobinonly-0ubuntu0.10.04.10:1:9.7.1.dfsg.P2-2ubuntu0.40:1:9.7.3.dfsg-1ubuntu2.20:1:9.4.2.dfsg.P2-2ubuntu0.80:1:9.7.0.dfsg.P1-1ubuntu0.30:1.2.7-0ubuntu0.10.04.10:1.2.7-0ubuntu0.10.10.10:0.14.0+noroms-0ubuntu4.40:0.12.3+noroms-0ubuntu9.150:0.12.5+noroms-0ubuntu7.100:83-0ubuntu3.2.10.04.20:83-0ubuntu3.2.10.10.20:87-0ubuntu1.20:1.0.23-1ubuntu0.10:1.0.21-2ubuntu0.10.10.10:1.0.21-2ubuntu0.10.04.10:1.9.2.18+build2+nobinonly-0ubuntu0.10.04.10:3.6.18+build2+nobinonly-0ubuntu0.10.04.10:1.9.2.18+build2+nobinonly-0ubuntu0.10.10.10:3.6.18+build2+nobinonly-0ubuntu0.10.10.10:6b20-1.9.8-0ubuntu1~10.10.10:6b20-1.9.8-0ubuntu1~10.04.10:6b22-1.10.2-0ubuntu1~11.04.10:1.2.44-1ubuntu0.10:1.2.15~beta5-3ubuntu0.40:1.2.42-1ubuntu2.20:1.2.44-1ubuntu3.10:2.6.11-1ubuntu6.10:2.6.10-1ubuntu3.30:2.6.8-2ubuntu1.30:6.0.0.53010-4ubuntu5.10:5.4.0.42111-2ubuntu1.30:5.4.0.42111-2ubuntu2.10:6b20-1.9.9-0ubuntu1~10.10.20:6b20-1.9.9-0ubuntu1~10.04.20:1.1.1-0ubuntu1~11.04.10:3.0.7-2ubuntu1.10:3.0.7-1ubuntu1.10:3.0.6-1ubuntu1.10:4.71-3ubuntu1.20:4.72-1ubuntu1.20:3.0.2-20071204-0ubuntu2.30:4.0.7-0ubuntu1.10:4.0.5-0ubuntu3.10:4.0.4-0ubuntu1.10:1:1.2.9-1ubuntu6.40:1:1.2.12-1ubuntu8.20:0.14.0+noroms-0ubuntu4.10:0.12.3+noroms-0ubuntu9.90:0.12.5+noroms-0ubuntu7.50:3.6.17+build3+nobinonly-0ubuntu0.10.10.10:1.9.2.17+build3+nobinonly-0ubuntu0.10.04.10:1.9.2.17+build3+nobinonly-0ubuntu0.8.04.10:3.6.17+build3+nobinonly-0ubuntu0.9.10.10:3.6.17+build3+nobinonly-0ubuntu0.8.04.10:1.9.2.17+build3+nobinonly-0ubuntu0.10.10.10:1.9.2.17+build3+nobinonly-0ubuntu0.9.10.10:3.6.17+build3+nobinonly-0ubuntu0.10.04.10:3.1.10+build1+nobinonly-0ubuntu0.10.10.10:3.1.10+build1+nobinonly-0ubuntu0.10.04.10:5.2.10.dfsg.1-2ubuntu6.90:5.3.2-1ubuntu4.80:5.1.2-1ubuntu3.220:5.2.4-2ubuntu5.150:5.3.3-1ubuntu9.40:1.2.1-7.6ubuntu0.10:1.2.1-7.5ubuntu0.10:1.2.1-7.1ubuntu0.20:1.2.1-5ubuntu0.20:1.2.1-7.7ubuntu0.10:3.6.18+build2+nobinonly-0ubuntu0.10.04.20:3.6.18+build2+nobinonly-0ubuntu0.10.10.20:1.1.1-4ubuntu2.20:0.99.7.1-5ubuntu6.30:1.1.1-2ubuntu5.20:0.7.5-5ubuntu27.130:0.8.8-1ubuntu6.20:0.8.3-1ubuntu180:0.12.5+noroms-0ubuntu7.80:0.14.0+noroms-0ubuntu4.30:0.12.3+noroms-0ubuntu9.120:2.7.0-1ubuntu0.20:2.2.10-1ubuntu0.40:2.5.1-2ubuntu1.40:2.7.1-1ubuntu0.20:0.7.5-5ubuntu27.160:0.8.8-1ubuntu6.50:0.8.3-1ubuntu19.10:5.2.4-2ubuntu5.170:5.3.2-1ubuntu4.90:5.2.10.dfsg.1-2ubuntu6.100:5.3.3-1ubuntu9.50:5.1.2-1ubuntu3.240:2.6.35-903.220:3.1.2-1ubuntu7.30:3.1.3-2ubuntu3.20:3.1.3-2ubuntu6.20:5.10.1-8ubuntu2.10:5.10.1-12ubuntu2.10:5.8.8-12ubuntu0.50:5.8.7-10ubuntu1.30:0.2.25.3-00:0.2.22.3-00:2.6.35-30.560:2.6.32-417.340:4:4.5.1-0ubuntu2.20:4:4.4.5-0ubuntu1.10:4:4.3.2-0ubuntu4.50:2.4.4-1ubuntu2.10:2.4.2-2ubuntu0.20:0.4.1ubuntu4.1-00:0.4.1ubuntu7.1-00:4:4.4.5-0ubuntu1.10:4:4.5.1-0ubuntu8.10:4:4.3.2-0ubuntu7.30:2.32.0-0ubuntu1.20:2.28.2-0ubuntu2.10:2.22.2-0ubuntu1.10:1:2.9.14-2ubuntu1.10.10.10:1:2.9.14-2ubuntu1.10.04.10:1:2.9.9-1ubuntu1.10:1.6.0-2ubuntu3.10:1.6.0-3ubuntu2.10:3.1.2-1ubuntu7.20:3.0.6.dfsg-1ubuntu9.20:3.0.3-6ubuntu7.20:3.1.3-2ubuntu6.10:3.1.3-2ubuntu3.10:4:4.6.2-0ubuntu5.20:4.5.3really4.5.2-0ubuntu1.10:4:4.7.0-0ubuntu4.30:4.3.4-0ubuntu3.20:6.0.24-2ubuntu1.70:6.0.20-2ubuntu2.40:6.0.28-2ubuntu1.20:0.7.0-1ubuntu13.30:0.7.5-5ubuntu27.90:0.8.3-1ubuntu14.10:2.30.5-0ubuntu4.10:2.28.1-0ubuntu2.30:2.30.2.is.2.30.0-0ubuntu5.10:2.0.4-0ubuntu4.10:2.2.2-3ubuntu6.10:2.2.0-1ubuntu2.10:2.3.0~pre2-4ubuntu2.20:2.0.6-1ubuntu1.20:1.6.12dfsg-1ubuntu1.30:1.6.6dfsg-2ubuntu1.30:2.6.7-1ubuntu1.20:2.4.5-1ubuntu2.30:2.6.10-1ubuntu3.20:2.6.8-2ubuntu1.20:1.6.5dfsg-1ubuntu1.20:1.6.12dfsg-1ubuntu1.20:1.4.6dfsg1-2ubuntu1.30:1.3.1-3ubuntu1.40:1.6.6dfsg-2ubuntu1.20:2.06ubuntu0.1-00:2.08ubuntu0.1-00:0.6.7-00:0.96-2ubuntu0.10:0.94-1ubuntu1.10:0.96-2ubuntu1.10:2.31.92-0ubuntu1.10:2.30.2-0ubuntu0.20:2.34.0-0ubuntu1.10:3.9.4-2ubuntu0.40:3.9.2-2ubuntu0.70:1:0.8.7-1ubuntu0.20:1:0.8.8.1-1ubuntu1.20:1:0.8.8.1-2ubuntu0.20:2.6.35-1028.490:2.6.32-30.590:2.6.35-28.490:1:1.0+OOo3.2.0-7ubuntu4.20:1:1.0.1+OOo3.2.0-7ubuntu4.20:1:0.7.6+OOo3.2.1-7ubuntu1.10:1:1.1.0+OOo3.2.0-7ubuntu4.20:1:1.0.14.0+OOo3.1.1-5ubuntu1.30:1:1.0.15.0+OOo3.2.0-7ubuntu4.20:1:0.7.6+OOo3.1.1-5ubuntu1.30:1:1.0.2+OOo3.2.1-7ubuntu1.10:1:1.0+OOo3.1.1-5ubuntu1.30:1:1.0.20.0+OOo3.2.1-7ubuntu1.10:1:1.2.0+OOo3.2.0-7ubuntu4.20:1:1.0.17.0+OOo3.2.1-7ubuntu1.10:1:1.0.1+OOo3.2.1-7ubuntu1.10:1:1.0+OOo2.4.1-1ubuntu2.50:1:1.1.0+OOo3.2.1-7ubuntu1.10:1:0.7.6+OOo3.2.0-7ubuntu4.20:1:1.0.3.0+OOo3.1.1-5ubuntu1.30:1:1.1.0+OOo3.1.1-5ubuntu1.30:1:1.0.17.0+OOo3.1.1-5ubuntu1.30:1:1.0.4.0+OOo3.2.0-7ubuntu4.20:1:1.0.2+OOo2.4.1-1ubuntu2.50:1:1.5.1+OOo3.1.1-5ubuntu1.30:1:1.6.0+OOo3.2.0-7ubuntu4.20:1:1.0.6.0+OOo3.2.1-7ubuntu1.10:1:1.4+OOo2.4.1-1ubuntu2.50:1:1.6.1+OOo3.2.1-7ubuntu1.10:1:1.2.1+OOo3.2.1-7ubuntu1.10:1:3.1.1-5ubuntu1.30:1:1.0.18.0+OOo3.2.0-7ubuntu4.20:1:3.2.0-7ubuntu4.20:1:1.1+OOo3.2.0-7ubuntu4.20:1:3.2.1-7ubuntu1.10:1:1.1.1+OOo3.2.1-7ubuntu1.10:1:0.7.5+OOo2.4.1-1ubuntu2.50:1:2.4.1-1ubuntu2.50:4.69-2ubuntu0.30:4.60-3ubuntu3.30:4.72-1ubuntu1.10:4.69-11ubuntu4.20:4.71-3ubuntu1.10:1.1.20-1ubuntu3.50:1.2.16-2ubuntu4.30:1.4.6-1ubuntu6.10:1.4.0-0ubuntu1.30:1.1.1-4ubuntu2.30:0.99.7.1-5ubuntu6.40:1.1.1-2ubuntu5.30:1:2.1.13-4ubuntu0.20:1:2.1.12-2ubuntu0.20:2.1.5-9ubuntu4.40:1:2.1.13-1ubuntu0.20:1:2.1.9-9ubuntu1.40:2.4.9-0ubuntu0.8.04.50:2.4.18-0ubuntu1.20:2.4.21-0ubuntu5.40:2.4.23-0ubuntu3.50:3.6.14+build3+nobinonly-0ubuntu0.10.10.10:1.9.2.14+build3+nobinonly-0ubuntu0.10.10.10:3.6.14+build3+nobinonly-0ubuntu0.8.04.10:3.6.14+build3+nobinonly-0ubuntu0.10.04.10:1.9.2.14+build3+nobinonly-0ubuntu0.10.04.10:1.9.2.14+build3+nobinonly-0ubuntu0.8.04.10:1.9.2.14+build3+nobinonly-0ubuntu0.9.10.10:3.6.14+build3+nobinonly-0ubuntu0.9.10.10:8.1.23-0ubuntu0.6.06.10:8.4.7-0ubuntu0.9.100:8.4.7-0ubuntu0.10.040:8.4.7-0ubuntu0.10.100:8.3.14-0ubuntu8.040:1.7dfsg~beta3-1ubuntu0.90:1.8.1+dfsg-2ubuntu0.60:1.8.1+dfsg-5ubuntu0.40:1.6.dfsg.3~beta1-2ubuntu1.80:1.28.2-0ubuntu1.10:1.20.5-0ubuntu1.20:1.26.0-1ubuntu0.10:1.28.0-0ubuntu2.20:2.22.2-0ubuntu2.10:2.32.0-0ubuntu1.10:2.28.1-0ubuntu1.30:2.30.3-0ubuntu1.20:1.9.2.15+build1+nobinonly-0ubuntu0.10.10.10:3.6.15+build1+nobinonly-0ubuntu0.10.04.10:1.9.2.15+build1+nobinonly-0ubuntu0.9.10.10:1.9.2.15+build1+nobinonly-0ubuntu0.10.04.10:1.9.2.15+build1+nobinonly-0ubuntu0.8.04.10:3.6.15+build1+nobinonly-0ubuntu0.9.10.10:3.6.15+build1+nobinonly-0ubuntu0.10.10.10:3.6.15+build1+nobinonly-0ubuntu0.8.04.10:1.7.0-1ubuntu2.60:1.7.2p1-1ubuntu5.30:1.7.2p7-1ubuntu2.10:4:0.5.1-1ubuntu1.10:3:0.cvs20070307-5ubuntu7.60:4:0.5+svn20090706-2ubuntu2.30:4:0.6-2ubuntu6.10:1.1.1-1ubuntu1.20:1.1.1-2ubuntu1.30:1.2.3-1ubuntu0.2.10.10.20:0.9.8o-1ubuntu4.40:0.9.8k-7ubuntu8.60:3.1.11+build2+nobinonly-0ubuntu0.11.04.10:3.1.11+build2+nobinonly-0ubuntu0.10.04.10:3.1.11+build2+nobinonly-0ubuntu0.10.10.10:5.0.51a-3ubuntu5.80:5.1.37-1ubuntu5.50:5.0.22-0ubuntu6.06.150:5.1.41-3ubuntu12.70:5.1.49-1ubuntu8.10:2.6.35-1024.420:2.6.32-311.230:2.6.31-307.230:2.6.32-27.490:2.6.31-22.700:2.6.35-24.420:1:1.0.4-1ubuntu4.10:1:1.0.13-0ubuntu2.10:5.2.10.dfsg.1-2ubuntu6.70:5.1.2-1ubuntu3.210:5.3.2-1ubuntu4.70:5.3.3-1ubuntu9.30:5.2.4-2ubuntu5.140:7.4+2ubuntu3.1-00:7.5+2ubuntu1.1-00:7.5+1ubuntu2.1-00:7.3+2ubuntu0.1-00:2.7.6.dfsg-1ubuntu1.20:2.6.31.dfsg-2ubuntu1.60:2.7.7.dfsg-4ubuntu0.20:2.7.8.dfsg-2ubuntu0.10:1:1.2.12-1ubuntu8.10:1:1.2.9-1ubuntu6.30:1.18.dfsg-1ubuntu2.10.10.10:1.18.dfsg-1ubuntu2.10.04.10:1.16-7ubuntu1.30:1.18.dfsg-1ubuntu1.10:3.7.8-6ubuntu3.10:3.7.8-6ubuntu1.10:3.7.1-3ubuntu0.8.04.10:3.7.8-4ubuntu2.20:1.9.2.12+build1+nobinonly-0ubuntu0.8.04.10:1.9.2.12+build1+nobinonly-0ubuntu0.10.04.10:1.9.2.12+build1+nobinonly-0ubuntu0.9.10.10:1.9.2.12+build1+nobinonly-0ubuntu0.10.10.10:1.9.1.15+build1+nobinonly-0ubuntu0.9.10.10:3.1.5+build1+nobinonly-0ubuntu0.10.10.10:3.0.9+build1+nobinonly-0ubuntu0.10.04.10:4.72-1ubuntu1.30:4.71-3ubuntu1.30:6.0.24-2ubuntu1.60:6.0.28-2ubuntu1.10:6.0.20-2ubuntu2.30:2.10.1-0ubuntu180:2.7-10ubuntu70:2.12.1-0ubuntu80:2.9-4ubuntu6.30:2.11.1-0ubuntu7.50:84+dfsg-0ubuntu16+0.11.0+0ubuntu6.40:0.11.0-0ubuntu6.40:0.12.5+noroms-0ubuntu7.20:0.12.3+noroms-0ubuntu9.40:84+dfsg-0ubuntu16+0.12.3+noroms+0ubuntu9.40:84+dfsg-0ubuntu16+0.12.5+noroms+0ubuntu7.20:2.13.1-5ubuntu3.10:2.17.2-0ubuntu1.10.10.10:2.17.2-0ubuntu1.10.04.10:2.16-1ubuntu5.10:1.15.8.4ubuntu3.1-00:1.15.4ubuntu2.3-00:1.15.5.6ubuntu4.5-00:3.2.3-1ubuntu1.20:3.2.0-4ubuntu2.20:3.2.1-2ubuntu1.20:1.8.1+dfsg-2ubuntu0.30:1.8.1+dfsg-5ubuntu0.10:3.9.4-2ubuntu0.20:3.8.2-13ubuntu0.50:3.7.4-1ubuntu3.100:3.9.2-2ubuntu0.50:3.8.2-7ubuntu3.80:0.9.8o-1ubuntu4.30:0.9.8g-16ubuntu3.50:0.9.8g-4ubuntu3.130:0.9.8k-7ubuntu8.50:0.9.8a-7ubuntu0.140:0.6.4-1ubuntu3.50:0.12.0-0ubuntu2.30:0.5.1-0ubuntu7.80:0.10.5-1ubuntu2.60:0.12.4-0ubuntu5.10:0.14.3-0ubuntu1.10:3.0.28a-1ubuntu4.140:2:3.4.7~dfsg-1ubuntu3.40:3.0.22-1ubuntu3.140:2:3.4.0-3ubuntu5.80:2:3.5.4~dfsg-1ubuntu8.30:2.6.32-216.330:2.6.32-416.330:2.8.4-1ubuntu1.30:2.7.4-1.1ubuntu4.50:2.8.1-1.1ubuntu3.10:2.7.2-1ubuntu2.30:0.8.7-1ubuntu1.10:0.8.12-0ubuntu1.10:0.10.0-1ubuntu0.10:3.1.7+build3+nobinonly-0ubuntu0.10.10.10:3.1.7+build3+nobinonly-0ubuntu0.10.04.10:3.1.2ubuntu0.10.04.1-00:3.1.8+build3+nobinonly-0ubuntu0.10.04.10:3.1.8+build3+nobinonly-0ubuntu0.10.10.10:2.6.32-310.210:2.6.15-55.900:2.6.31-22.690:2.6.31-307.220:2.6.32-26.480:2.6.35-1023.410:2.6.35-23.410:2.6.24-28.810:6b20-1.9.4-0ubuntu1~9.10.10:6b20-1.9.4-0ubuntu10:6b18-1.8.4-0ubuntu1~10.04.10:6b20-1.9.4-0ubuntu1~10.04.10:6b18-1.8.4-0ubuntu1~9.10.10:6b18-1.8.7-0ubuntu2.10:1.2.5-0ubuntu0.10.04.10:1.2.5-0ubuntu0.10.10.10:1.2.5-0ubuntu0.9.10.10:1.9.2.11+build3+nobinonly-0ubuntu0.9.10.10:1.9.1.14+build4+nobinonly-0ubuntu0.9.10.10:1.9.2.11+build3+nobinonly-0ubuntu0.10.10.10:1.9.2.11+build3+nobinonly-0ubuntu0.10.04.10:1.9.2.11+build3+nobinonly-0ubuntu0.8.04.10:3.6.11+build3+nobinonly-0ubuntu0.9.10.10:1.9.2.11+build3+nobinonly-0ubuntu0.9.04.10:3.6.11+build3+nobinonly-0ubuntu0.10.04.10:3.6.11+build3+nobinonly-0ubuntu0.9.04.10:3.6.11+build3+nobinonly-0ubuntu0.10.10.10:3.6.11+build3+nobinonly-0ubuntu0.8.04.10:7:6.5.1.0-1.1ubuntu3.10:7:6.6.2.6-1ubuntu1.10:7:6.5.7.8-1ubuntu1.10:7:6.3.7.9.dfsg1-2ubuntu1.20:3.0.28a-1ubuntu4.150:2:3.5.4~dfsg-1ubuntu8.50:2:3.4.7~dfsg-1ubuntu3.70:2:3.5.8~dfsg-1ubuntu2.30:0.9.8o-1ubuntu4.20:0.9.8g-16ubuntu3.40:0.9.8k-7ubuntu8.40:0.9.8g-4ubuntu3.120:6b18-1.8.5-0ubuntu10:6b20-1.9.5-0ubuntu1~10.04.10:6b18-1.8.5-0ubuntu1~10.04.10:6b20-1.9.5-0ubuntu1~9.10.10:6b18-1.8.5-0ubuntu1~9.10.10:6b20-1.9.5-0ubuntu10:2.6.35-1022.350:2.6.32-309.180:2.6.32-25.450:2.6.35-22.350:2.6.31-307.210:2.6.24-28.800:2.6.15-55.890:2.6.31-22.670:2.6.28-19.660:6b18-1.8.2-4ubuntu20:6b18-1.8.2-4ubuntu1~9.10.10:6b20-1.9.1-1ubuntu30:6b18-1.8.2-4ubuntu1~8.04.10:3.8.2-7ubuntu3.70:3.9.4-2ubuntu0.10:3.9.2-2ubuntu0.40:3.7.4-1ubuntu3.90:3.8.2-13ubuntu0.40:4.8.6-0ubuntu0.9.10.10:4.8.6-0ubuntu0.10.04.20:4.8.6-0ubuntu0.8.04.10:4.8.6-0ubuntu0.9.04.10:3.12.8-0ubuntu0.10.04.10:3.12.8-0ubuntu0.10.10.10:3.12.8-0ubuntu0.9.10.10:3.12.8-0ubuntu0.9.04.10:3.12.8-0ubuntu0.8.04.10:2.2.10-1ubuntu0.30:2.5.1-2ubuntu1.30:2.7.1-1ubuntu0.10:2.7.0-1ubuntu0.10:2.6.5-3ubuntu0.10:1.2.3-1ubuntu0.10:0.31+bzr506-0ubuntu6.10:2.5.1-0ubuntu0.10.04.20:2.5.1-0ubuntu0.10.10.30:2.3.1+1403-0ubuntu27.40:2.7.7.dfsg-4ubuntu0.10:2.7.5.dfsg-1ubuntu1.20:2.6.24.dfsg-1ubuntu1.60:2.7.6.dfsg-1ubuntu1.10:2.6.31.dfsg-2ubuntu1.50:2.11.1-0ubuntu7.70:2.10.1-0ubuntu190:2.12.1-0ubuntu10.10:2.7-10ubuntu80:6b20-1.9.7-0ubuntu1~9.10.10:6b20-1.9.7-0ubuntu1~10.04.10:6b20-1.9.7-0ubuntu10:2.6.35-30.540:2.8.2-0ubuntu8.20:2.8.2+2.8.2-0ubuntu8.20:3.9.8-1ubuntu2.10:3.10.6-1ubuntu10.20:3.10.2-2ubuntu2.20:2.0+bzr1241-0ubuntu4.10:3.6.12+build1+nobinonly-0ubuntu0.9.10.10:3.6.12+build1+nobinonly-0ubuntu0.8.04.10:3.6.12+build1+nobinonly-0ubuntu0.10.10.10:3.6.12+build1+nobinonly-0ubuntu0.10.04.10:0.6.25-1ubuntu5.30:0.6.25-1ubuntu6.20:0.6.27-2ubuntu3.10:0.6.22-2ubuntu4.30:1:9.7.1.dfsg.P2-2ubuntu0.211.040:7.21.0-1ubuntu1.10:7.18.0-1ubuntu2.30:7.21.3-1ubuntu1.20:7.19.7-1ubuntu1.10:0.99.13-1ubuntu0.20:0.99.15-1ubuntu0.20:0.99.17-1ubuntu0.10:0.99.2-1ubuntu3.80:0.99.9-2ubuntu1.50:1:4.1.4.2-1ubuntu2.20:1:4.1.4.2-1ubuntu3.20:1:4.1.4.1-1ubuntu2.20:2.2.16-1ubuntu3.10:2.2.14-5ubuntu8.40:2.2.8-1ubuntu0.190:2.0.55-4ubuntu2.120:2.2.12-1ubuntu2.40:1:9.7.1.dfsg.P2-20:1:9.4.2.dfsg.P2-2ubuntu0.60:1:9.3.2-20:1:9.6.1.dfsg.P1-30:1:9.7.0.dfsg.P1-10:1:9.7.0.dfsg.P1-1ubuntu0.20:1:9.4.2.dfsg.P2-2ubuntu0.70:1:9.7.1.dfsg.P2-2ubuntu0.30:0.6.8ubuntu29.2-00:0.6.10ubuntu3.1-00:0.9.5-2~build0.10.10.10:6b20-1.9.2-0ubuntu20:1.1.1-2ubuntu1.20:1.2.3-1ubuntu0.2.10.10.10:1.1.1-1ubuntu1.10:2.3.9-5ubuntu0.40:2.3.5-1ubuntu4.8.04.60:2.3.11-1ubuntu2.40:2.1.10-1ubuntu2.100:2.4.2-2ubuntu0.10:1.4.4-6ubuntu2.30:2.7.4-1.1ubuntu4.40:2.7.2-1ubuntu2.20:2.8.1-1.1ubuntu2.20:2.8.4-1ubuntu1.10:1.9.2.13+build3+nobinonly-0ubuntu0.8.04.10:1.9.2.13+build3+nobinonly-0ubuntu0.10.04.10:1.9.2.13+build3+nobinonly-0ubuntu0.9.10.10:3.6.13+build3+nobinonly-0ubuntu0.10.04.10:1.9.1.16+build2+nobinonly-0ubuntu0.9.10.10:1.9.2.13+build3+nobinonly-0ubuntu0.10.10.10:3.6.13+build3+nobinonly-0ubuntu0.9.10.10:3.6.13+build3+nobinonly-0ubuntu0.10.10.10:3.6.13+build3+nobinonly-0ubuntu0.8.04.10:1.2.11-1ubuntu0.20:1.4.2-3ubuntu1.10:1.3.8-1ubuntu0.30:2.0.55-4ubuntu2.130:3.0.10+build1+nobinonly-0ubuntu0.10.04.10:2.0.0.24+build1+nobinonly-0ubuntu0.8.04.20:3.1.6+build1+nobinonly-0ubuntu0.10.10.10:2.0.0.24+build1+nobinonly-0ubuntu0.9.10.30:1.4.3-5ubuntu0.120:1.6.dfsg.3~beta1-2ubuntu1.60:1.8.1+dfsg-2ubuntu0.40:1.7dfsg~beta3-1ubuntu0.70:1.8.1+dfsg-5ubuntu0.20:1.5.3-1ubuntu4.20:1.5.3-1ubuntu1.20:1.5.5-3ubuntu2.10:1.7dfsg~beta3-1ubuntu0.130:1.8.1+dfsg-2ubuntu0.90:1.8.1+dfsg-5ubuntu0.70:1.2.12+dfsg-3ubuntu0.30:1.3.9+dfsg-3ubuntu0.10.10.10:1.3.9+dfsg-1ubuntu1.10:1.3.9+dfsg-3ubuntu0.10.04.10:1.3.7-1ubuntu3.120:1.4.4-6ubuntu2.20:1.4.3-1ubuntu1.30:1.2.2-0ubuntu0.6.06.200:1.4.1-5ubuntu2.70:5.1.2-1ubuntu3.200:5.2.10.dfsg.1-2ubuntu6.60:5.3.2-1ubuntu4.60:5.3.3-1ubuntu9.20:5.2.4-2ubuntu5.130:1:2.4.1-1ubuntu2.100:1:2.7.3-1ubuntu3.10:1:2.6.6-1ubuntu4.10:1:2.6.2-1ubuntu7.30:8.4.5-0ubuntu10.100:0.96.5+dfsg-1ubuntu1.10.10.20:0.96.5+dfsg-1ubuntu1.10.04.20:0.95.3+dfsg-1ubuntu0.09.10.40:2.6.35-1027.480:2.6.35-27.480:1.1.1-4ubuntu20:6.7.dfsg-1ubuntu0.20:6.9~dfsg-1ubuntu3.10.04.10:6.5-1ubuntu1.40:6.9~dfsg-1ubuntu3.9.10.10:6.9.5~dfsg-3ubuntu0.19.040:0.9.8o-1ubuntu4.10:0.9.8g-16ubuntu3.30:0.9.8g-15ubuntu3.60:0.9.8a-7ubuntu0.130:0.9.8g-4ubuntu3.110:0.9.8k-7ubuntu8.30:3.12.9+ckbi-1.82-0ubuntu0.8.04.10:3.12.9+ckbi-1.82-0ubuntu0.10.04.10:3.12.9+ckbi-1.82-0ubuntu0.10.10.10:3.12.9+ckbi-1.82-0ubuntu0.9.10.10:3.8.2-7ubuntu3.90:3.9.2-2ubuntu0.60:3.8.2-13ubuntu0.60:3.9.4-2ubuntu0.30:3.7.4-1ubuntu3.110:1.8.1+dfsg-2ubuntu0.80:1.7dfsg~beta3-1ubuntu0.120:1.8.1+dfsg-5ubuntu0.66.060:1.4.6dfsg1-2ubuntu1.20:1.6.6dfsg-2ubuntu1.10:1.6.12dfsg-1ubuntu1.10:1.3.1-3ubuntu1.30:1.6.5dfsg-1ubuntu1.10:7.3.6.cvs20090906-1ubuntu1.10:7.3.6-1ubuntu1.10:7.3.6.cvs20090906-1ubuntu3.10:7.3.6.cvs20090906-1ubuntu2.10:0.9.2-1ubuntu0.10:2.6.32-312.240:2.6.35-1025.440:2.6.32-28.550:2.6.35-25.440:1.2.16-2ubuntu4.10:1.1.20-1ubuntu3.40:1.4.0-0ubuntu1.10:1.2.16-0ubuntu9.10:0.96.3+dfsg-2ubuntu1.0.10.04.20:0.96.3+dfsg-2ubuntu1.28.0410.1010.049.100:6b20-1.9.2-0ubuntu1~10.04.10:6b18-1.8.3-0ubuntu1~8.04.20:6b18-1.8.3-0ubuntu1~9.10.10:6b20-1.9.2-0ubuntu1lpiasparcppcarmeli686x86-64