ID OPENVAS:136141256231066264 Type openvas Reporter Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com Modified 2018-04-06T00:00:00
Description
The remote host is missing an update to qt
announced via advisory FEDORA-2009-11488.
# OpenVAS Vulnerability Test
# $Id: fcore_2009_11488.nasl 9350 2018-04-06 07:03:33Z cfischer $
# Description: Auto-generated from advisory FEDORA-2009-11488 (qt)
#
# Authors:
# Thomas Reinke <reinke@securityspace.com>
#
# Copyright:
# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# or at your option, GNU General Public License version 3,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
include("revisions-lib.inc");
tag_insight = "Update Information:
A security flaw was found in the WebKit's Cross-Origin Resource Sharing (CORS)
implementation. Multiple security flaws (integer underflow, invalid pointer
dereference, buffer underflow and a denial of service) were found in the way
WebKit's FTP parser used to process remote FTP directory listings.
ChangeLog:
* Thu Nov 12 2009 Jaroslav Reznik - 4.5.3-9
- CVE-2009-3384 - WebKit, ftp listing handling (#525788)
- CVE-2009-2816 - WebKit, MITM Cross-Origin Resource Sharing (#525789)
* Sun Nov 8 2009 Rex Dieter - 4.5.3-8
- -x11: Requires: %{name}-sqlite(ppc-32)";
tag_solution = "Apply the appropriate updates.
This update can be installed with the yum update program. Use
su -c 'yum update qt' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.
https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11488";
tag_summary = "The remote host is missing an update to qt
announced via advisory FEDORA-2009-11488.";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.66264");
script_version("$Revision: 9350 $");
script_tag(name:"last_modification", value:"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $");
script_tag(name:"creation_date", value:"2009-11-17 21:42:12 +0100 (Tue, 17 Nov 2009)");
script_cve_id("CVE-2009-3384", "CVE-2009-2816", "CVE-2009-2700", "CVE-2009-1725");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_name("Fedora Core 10 FEDORA-2009-11488 (qt)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms");
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name : "URL" , value : "https://bugzilla.redhat.com/show_bug.cgi?id=525788");
script_xref(name : "URL" , value : "https://bugzilla.redhat.com/show_bug.cgi?id=525789");
exit(0);
}
#
# The script code starts here
#
include("pkg-lib-rpm.inc");
res = "";
report = "";
if ((res = isrpmvuln(pkg:"qt", rpm:"qt~4.5.3~9.fc10", rls:"FC10")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"qt-demos", rpm:"qt-demos~4.5.3~9.fc10", rls:"FC10")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"qt-devel", rpm:"qt-devel~4.5.3~9.fc10", rls:"FC10")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"qt-examples", rpm:"qt-examples~4.5.3~9.fc10", rls:"FC10")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"qt-mysql", rpm:"qt-mysql~4.5.3~9.fc10", rls:"FC10")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"qt-odbc", rpm:"qt-odbc~4.5.3~9.fc10", rls:"FC10")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"qt-postgresql", rpm:"qt-postgresql~4.5.3~9.fc10", rls:"FC10")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"qt-sqlite", rpm:"qt-sqlite~4.5.3~9.fc10", rls:"FC10")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"qt-x11", rpm:"qt-x11~4.5.3~9.fc10", rls:"FC10")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"qt-debuginfo", rpm:"qt-debuginfo~4.5.3~9.fc10", rls:"FC10")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"qt-doc", rpm:"qt-doc~4.5.3~9.fc10", rls:"FC10")) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
{"pluginID": "136141256231066264", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_11488.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-11488 (qt)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nA security flaw was found in the WebKit's Cross-Origin Resource Sharing (CORS)\nimplementation. Multiple security flaws (integer underflow, invalid pointer\ndereference, buffer underflow and a denial of service) were found in the way\nWebKit's FTP parser used to process remote FTP directory listings.\nChangeLog:\n\n* Thu Nov 12 2009 Jaroslav Reznik - 4.5.3-9\n- CVE-2009-3384 - WebKit, ftp listing handling (#525788)\n- CVE-2009-2816 - WebKit, MITM Cross-Origin Resource Sharing (#525789)\n* Sun Nov 8 2009 Rex Dieter - 4.5.3-8\n- -x11: Requires: %{name}-sqlite(ppc-32)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update qt' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11488\";\ntag_summary = \"The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-11488.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.66264\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-17 21:42:12 +0100 (Tue, 17 Nov 2009)\");\n script_cve_id(\"CVE-2009-3384\", \"CVE-2009-2816\", \"CVE-2009-2700\", \"CVE-2009-1725\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 10 FEDORA-2009-11488 (qt)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=525788\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=525789\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-demos\", rpm:\"qt-demos~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-examples\", rpm:\"qt-examples~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-mysql\", rpm:\"qt-mysql~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-odbc\", rpm:\"qt-odbc~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-postgresql\", rpm:\"qt-postgresql~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-sqlite\", rpm:\"qt-sqlite~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-x11\", rpm:\"qt-x11~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-debuginfo\", rpm:\"qt-debuginfo~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-doc\", rpm:\"qt-doc~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "history": [], "description": "The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-11488.", "reporter": "Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231066264", "type": "openvas", "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cvelist", "hash": "337ebeec1d941a533613cc83e703d348"}, {"key": "cvss", "hash": "2076413bdcb42307d016f5286cbae795"}, {"key": "description", "hash": "3c96039411b00f23cb2dba7e321ea932"}, {"key": "href", "hash": "e133c52d6bb6525687d2837b29296276"}, {"key": "modified", "hash": "4fb7fd6149697e74d091717ea3f1ca84"}, {"key": "naslFamily", "hash": "be931514784f88df80712740ad2723e7"}, {"key": "pluginID", "hash": "86ccb985d14984ef717b8bd22510143f"}, {"key": "published", "hash": "6f550d4bd132793c5b6126057c909b68"}, {"key": "references", "hash": "1ca86dad101629595378ba31a054380e"}, {"key": "reporter", "hash": "b778055b37159119ce97e96620d4ff56"}, {"key": "sourceData", "hash": "2f6f27f73b4a811e601ebc00a86d7d81"}, {"key": "title", "hash": "d02a6598999563e59546d5347b933fec"}, {"key": "type", "hash": "47c1f692ea47a21f716dad07043ade01"}], "viewCount": 2, "references": ["https://bugzilla.redhat.com/show_bug.cgi?id=525789", "https://bugzilla.redhat.com/show_bug.cgi?id=525788"], "lastseen": "2018-04-06T11:39:15", "published": "2009-11-17T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "cvelist": ["CVE-2009-1725", "CVE-2009-2700", "CVE-2009-2816", "CVE-2009-3384"], "id": "OPENVAS:136141256231066264", "hash": "da482a41165860f5c57491e98aa2d5f19329562b0c1c46a8483721483aa68849", "modified": "2018-04-06T00:00:00", "title": "Fedora Core 10 FEDORA-2009-11488 (qt)", "edition": 1, "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "bulletinFamily": "scanner", "enchantments": {"score": {"value": 7.7, "vector": "NONE", "modified": "2018-04-06T11:39:15"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-3384", "CVE-2009-2816", "CVE-2009-1725", "CVE-2009-2700"]}, {"type": "openvas", "idList": ["OPENVAS:136141256231066267", "OPENVAS:66264", "OPENVAS:66267", "OPENVAS:66263", "OPENVAS:136141256231066263", "OPENVAS:64811", "OPENVAS:136141256231064811", "OPENVAS:136141256231064812", "OPENVAS:64812", "OPENVAS:900889"]}, {"type": "nessus", "idList": ["FEDORA_2009-11488.NASL", "FEDORA_2009-11487.NASL", "FEDORA_2009-11491.NASL", "SAFARI_4_0_4.NASL", "FEDORA_2009-9232.NASL", "MANDRIVA_MDVSA-2009-225.NASL", "SUSE_11_LIBQT4-091106.NASL", "SUSE_11_1_LIBQT4-091106.NASL", "UBUNTU_USN-829-1.NASL", "SUSE_DBUS-1-QT-6645.NASL"]}, {"type": "seebug", "idList": ["SSV:12637", "SSV:12644", "SSV:12627"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:10216", "SECURITYVULNS:DOC:22430"]}, {"type": "ubuntu", "idList": ["USN-829-1", "USN-857-1", "USN-836-1"]}, {"type": "threatpost", "idList": ["THREATPOST:213B2F3A19EB934CE4579B8DDEAC6AB4", "THREATPOST:87A00B01F9F51647FA037F1CED7DA5EF"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1988-1:79FED"]}, {"type": "redhat", "idList": ["RHSA-2009:1531"]}, {"type": "centos", "idList": ["CESA-2009:1531"]}, {"type": "oraclelinux", "idList": ["ELSA-2009-1531", "ELSA-2009-1530"]}], "modified": "2018-04-06T11:39:15"}, "vulnersScore": 7.7}}
{"cve": [{"lastseen": "2019-05-29T18:10:00", "bulletinFamily": "NVD", "description": "Multiple unspecified vulnerabilities in WebKit in Apple Safari before 4.0.4 on Windows allow remote FTP servers to execute arbitrary code, cause a denial of service (application crash), or obtain sensitive information via a crafted directory listing in a reply.", "modified": "2017-09-19T01:29:00", "id": "CVE-2009-3384", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3384", "published": "2009-11-13T15:30:00", "title": "CVE-2009-3384", "type": "cve", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:09:59", "bulletinFamily": "NVD", "description": "The implementation of Cross-Origin Resource Sharing (CORS) in WebKit, as used in Apple Safari before 4.0.4 and Google Chrome before 3.0.195.33, includes certain custom HTTP headers in the OPTIONS request during cross-origin operations with preflight, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web page.", "modified": "2017-09-19T01:29:00", "id": "CVE-2009-2816", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2816", "published": "2009-11-13T15:30:00", "title": "CVE-2009-2816", "type": "cve", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:09:59", "bulletinFamily": "NVD", "description": "src/network/ssl/qsslcertificate.cpp in Nokia Trolltech Qt 4.x does not properly handle a '\\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "modified": "2013-02-07T05:00:00", "id": "CVE-2009-2700", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2700", "published": "2009-09-02T17:30:00", "title": "CVE-2009-2700", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:09:58", "bulletinFamily": "NVD", "description": "WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms; KHTML in kdelibs in KDE; QtWebKit (aka Qt toolkit); and possibly other products do not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.", "modified": "2017-09-29T01:34:00", "id": "CVE-2009-1725", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1725", "published": "2009-07-09T17:30:00", "title": "CVE-2009-1725", "type": "cve", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2018-04-06T11:40:24", "bulletinFamily": "scanner", "description": "The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-11491.", "modified": "2018-04-06T00:00:00", "published": "2009-11-17T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231066267", "id": "OPENVAS:136141256231066267", "type": "openvas", "title": "Fedora Core 11 FEDORA-2009-11491 (qt)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_11491.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-11491 (qt)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nA security flaw was found in the WebKit's Cross-Origin Resource Sharing (CORS)\nimplementation. Multiple security flaws (integer underflow, invalid pointer\ndereference, buffer underflow and a denial of service) were found in the way\nWebKit's FTP parser used to process remote FTP directory listings.\nChangeLog:\n\n* Thu Nov 12 2009 Jaroslav Reznik - 4.5.3-9\n- CVE-2009-3384 - WebKit, ftp listing handling (#525788)\n- CVE-2009-2816 - WebKit, MITM Cross-Origin Resource Sharing (#525789)\n* Sun Nov 8 2009 Rex Dieter - 4.5.3-8\n- -x11: Requires: %{name}-sqlite(ppc-32)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update qt' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11491\";\ntag_summary = \"The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-11491.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.66267\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-17 21:42:12 +0100 (Tue, 17 Nov 2009)\");\n script_cve_id(\"CVE-2009-3384\", \"CVE-2009-2816\", \"CVE-2009-2700\", \"CVE-2009-1725\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 11 FEDORA-2009-11491 (qt)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=525788\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=525789\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-demos\", rpm:\"qt-demos~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-examples\", rpm:\"qt-examples~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-mysql\", rpm:\"qt-mysql~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-odbc\", rpm:\"qt-odbc~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-postgresql\", rpm:\"qt-postgresql~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-sqlite\", rpm:\"qt-sqlite~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-x11\", rpm:\"qt-x11~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-debuginfo\", rpm:\"qt-debuginfo~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-doc\", rpm:\"qt-doc~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:44", "bulletinFamily": "scanner", "description": "The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-11488.", "modified": "2017-07-10T00:00:00", "published": "2009-11-17T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=66264", "id": "OPENVAS:66264", "title": "Fedora Core 10 FEDORA-2009-11488 (qt)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_11488.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-11488 (qt)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nA security flaw was found in the WebKit's Cross-Origin Resource Sharing (CORS)\nimplementation. Multiple security flaws (integer underflow, invalid pointer\ndereference, buffer underflow and a denial of service) were found in the way\nWebKit's FTP parser used to process remote FTP directory listings.\nChangeLog:\n\n* Thu Nov 12 2009 Jaroslav Reznik - 4.5.3-9\n- CVE-2009-3384 - WebKit, ftp listing handling (#525788)\n- CVE-2009-2816 - WebKit, MITM Cross-Origin Resource Sharing (#525789)\n* Sun Nov 8 2009 Rex Dieter - 4.5.3-8\n- -x11: Requires: %{name}-sqlite(ppc-32)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update qt' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11488\";\ntag_summary = \"The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-11488.\";\n\n\n\nif(description)\n{\n script_id(66264);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-17 21:42:12 +0100 (Tue, 17 Nov 2009)\");\n script_cve_id(\"CVE-2009-3384\", \"CVE-2009-2816\", \"CVE-2009-2700\", \"CVE-2009-1725\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 10 FEDORA-2009-11488 (qt)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=525788\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=525789\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-demos\", rpm:\"qt-demos~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-examples\", rpm:\"qt-examples~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-mysql\", rpm:\"qt-mysql~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-odbc\", rpm:\"qt-odbc~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-postgresql\", rpm:\"qt-postgresql~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-sqlite\", rpm:\"qt-sqlite~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-x11\", rpm:\"qt-x11~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-debuginfo\", rpm:\"qt-debuginfo~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-doc\", rpm:\"qt-doc~4.5.3~9.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:57:08", "bulletinFamily": "scanner", "description": "The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-11491.", "modified": "2017-07-10T00:00:00", "published": "2009-11-17T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=66267", "id": "OPENVAS:66267", "title": "Fedora Core 11 FEDORA-2009-11491 (qt)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_11491.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-11491 (qt)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nA security flaw was found in the WebKit's Cross-Origin Resource Sharing (CORS)\nimplementation. Multiple security flaws (integer underflow, invalid pointer\ndereference, buffer underflow and a denial of service) were found in the way\nWebKit's FTP parser used to process remote FTP directory listings.\nChangeLog:\n\n* Thu Nov 12 2009 Jaroslav Reznik - 4.5.3-9\n- CVE-2009-3384 - WebKit, ftp listing handling (#525788)\n- CVE-2009-2816 - WebKit, MITM Cross-Origin Resource Sharing (#525789)\n* Sun Nov 8 2009 Rex Dieter - 4.5.3-8\n- -x11: Requires: %{name}-sqlite(ppc-32)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update qt' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11491\";\ntag_summary = \"The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-11491.\";\n\n\n\nif(description)\n{\n script_id(66267);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-17 21:42:12 +0100 (Tue, 17 Nov 2009)\");\n script_cve_id(\"CVE-2009-3384\", \"CVE-2009-2816\", \"CVE-2009-2700\", \"CVE-2009-1725\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 11 FEDORA-2009-11491 (qt)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=525788\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=525789\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-demos\", rpm:\"qt-demos~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-examples\", rpm:\"qt-examples~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-mysql\", rpm:\"qt-mysql~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-odbc\", rpm:\"qt-odbc~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-postgresql\", rpm:\"qt-postgresql~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-sqlite\", rpm:\"qt-sqlite~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-x11\", rpm:\"qt-x11~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-debuginfo\", rpm:\"qt-debuginfo~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-doc\", rpm:\"qt-doc~4.5.3~9.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:49", "bulletinFamily": "scanner", "description": "The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-11487.", "modified": "2018-04-06T00:00:00", "published": "2009-11-17T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231066263", "id": "OPENVAS:136141256231066263", "title": "Fedora Core 12 FEDORA-2009-11487 (qt)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_11487.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-11487 (qt)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nA security flaw was found in the WebKit's Cross-Origin Resource Sharing (CORS)\nimplementation. Multiple security flaws (integer underflow, invalid pointer\ndereference, buffer underflow and a denial of service) were found in the way\nWebKit's FTP parser used to process remote FTP directory listings.\n\nChangeLog:\n\n* Thu Nov 12 2009 Jaroslav Reznik - 4.5.3-9\n- CVE-2009-3384 - WebKit, ftp listing handling (#525788)\n- CVE-2009-2816 - WebKit, MITM Cross-Origin Resource Sharing (#525789)\n* Sun Nov 8 2009 Rex Dieter - 4.5.3-8\n- -x11: Requires: %{name}-sqlite(ppc-32)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update qt' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11487\";\ntag_summary = \"The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-11487.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.66263\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-17 21:42:12 +0100 (Tue, 17 Nov 2009)\");\n script_cve_id(\"CVE-2009-3384\", \"CVE-2009-2816\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 12 FEDORA-2009-11487 (qt)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=525788\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=525789\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-demos\", rpm:\"qt-demos~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-examples\", rpm:\"qt-examples~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-mysql\", rpm:\"qt-mysql~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-odbc\", rpm:\"qt-odbc~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-postgresql\", rpm:\"qt-postgresql~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-sqlite\", rpm:\"qt-sqlite~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-x11\", rpm:\"qt-x11~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-debuginfo\", rpm:\"qt-debuginfo~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-doc\", rpm:\"qt-doc~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:36", "bulletinFamily": "scanner", "description": "The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-11487.", "modified": "2017-07-10T00:00:00", "published": "2009-11-17T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=66263", "id": "OPENVAS:66263", "title": "Fedora Core 12 FEDORA-2009-11487 (qt)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_11487.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-11487 (qt)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nA security flaw was found in the WebKit's Cross-Origin Resource Sharing (CORS)\nimplementation. Multiple security flaws (integer underflow, invalid pointer\ndereference, buffer underflow and a denial of service) were found in the way\nWebKit's FTP parser used to process remote FTP directory listings.\n\nChangeLog:\n\n* Thu Nov 12 2009 Jaroslav Reznik - 4.5.3-9\n- CVE-2009-3384 - WebKit, ftp listing handling (#525788)\n- CVE-2009-2816 - WebKit, MITM Cross-Origin Resource Sharing (#525789)\n* Sun Nov 8 2009 Rex Dieter - 4.5.3-8\n- -x11: Requires: %{name}-sqlite(ppc-32)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update qt' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11487\";\ntag_summary = \"The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-11487.\";\n\n\n\nif(description)\n{\n script_id(66263);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-17 21:42:12 +0100 (Tue, 17 Nov 2009)\");\n script_cve_id(\"CVE-2009-3384\", \"CVE-2009-2816\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 12 FEDORA-2009-11487 (qt)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=525788\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=525789\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-demos\", rpm:\"qt-demos~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-examples\", rpm:\"qt-examples~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-mysql\", rpm:\"qt-mysql~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-odbc\", rpm:\"qt-odbc~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-postgresql\", rpm:\"qt-postgresql~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-sqlite\", rpm:\"qt-sqlite~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-x11\", rpm:\"qt-x11~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-debuginfo\", rpm:\"qt-debuginfo~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-doc\", rpm:\"qt-doc~4.5.3~9.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:57:04", "bulletinFamily": "scanner", "description": "The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-9231.", "modified": "2017-07-10T00:00:00", "published": "2009-09-09T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=64811", "id": "OPENVAS:64811", "title": "Fedora Core 11 FEDORA-2009-9231 (qt)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_9231.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-9231 (qt)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nsecurity fix for CVE-2009-2700\n\nChangeLog:\n\n* Mon Aug 31 2009 Than Ngo - 4.5.2-3\n- fix for CVE-2009-2700\n* Tue Aug 18 2009 Than Ngo - 4.5.2-2\n- security fix for CVE-2009-1725\n* Tue Aug 18 2009 Rex Dieter 4.5.2-1.2\n- kde-qt: 287-qmenu-respect-minwidth\n- kde-qt: 0288-more-x-keycodes (#475247)\n* Wed Aug 5 2009 Rex Dieter 4.5.2-1.1\n- use linker scripts for _debug targets (#510246)\n- apply upstream patch to fix issue in Copy and paste\n- optimize (icon-mostly) scriptlets\n- -x11: Requires(post,postun): /sbin/ldconfig\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update qt' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9231\";\ntag_summary = \"The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-9231.\";\n\n\n\nif(description)\n{\n script_id(64811);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-09 02:15:49 +0200 (Wed, 09 Sep 2009)\");\n script_cve_id(\"CVE-2009-2700\", \"CVE-2009-1725\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 11 FEDORA-2009-9231 (qt)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=520435\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-demos\", rpm:\"qt-demos~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-examples\", rpm:\"qt-examples~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-mysql\", rpm:\"qt-mysql~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-odbc\", rpm:\"qt-odbc~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-postgresql\", rpm:\"qt-postgresql~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-x11\", rpm:\"qt-x11~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-debuginfo\", rpm:\"qt-debuginfo~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-doc\", rpm:\"qt-doc~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:40:11", "bulletinFamily": "scanner", "description": "The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-9231.", "modified": "2018-04-06T00:00:00", "published": "2009-09-09T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064811", "id": "OPENVAS:136141256231064811", "type": "openvas", "title": "Fedora Core 11 FEDORA-2009-9231 (qt)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_9231.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-9231 (qt)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nsecurity fix for CVE-2009-2700\n\nChangeLog:\n\n* Mon Aug 31 2009 Than Ngo - 4.5.2-3\n- fix for CVE-2009-2700\n* Tue Aug 18 2009 Than Ngo - 4.5.2-2\n- security fix for CVE-2009-1725\n* Tue Aug 18 2009 Rex Dieter 4.5.2-1.2\n- kde-qt: 287-qmenu-respect-minwidth\n- kde-qt: 0288-more-x-keycodes (#475247)\n* Wed Aug 5 2009 Rex Dieter 4.5.2-1.1\n- use linker scripts for _debug targets (#510246)\n- apply upstream patch to fix issue in Copy and paste\n- optimize (icon-mostly) scriptlets\n- -x11: Requires(post,postun): /sbin/ldconfig\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update qt' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9231\";\ntag_summary = \"The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-9231.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64811\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-09 02:15:49 +0200 (Wed, 09 Sep 2009)\");\n script_cve_id(\"CVE-2009-2700\", \"CVE-2009-1725\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 11 FEDORA-2009-9231 (qt)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=520435\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-demos\", rpm:\"qt-demos~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-examples\", rpm:\"qt-examples~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-mysql\", rpm:\"qt-mysql~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-odbc\", rpm:\"qt-odbc~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-postgresql\", rpm:\"qt-postgresql~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-x11\", rpm:\"qt-x11~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-debuginfo\", rpm:\"qt-debuginfo~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-doc\", rpm:\"qt-doc~4.5.2~3.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:29", "bulletinFamily": "scanner", "description": "The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-9232.", "modified": "2017-07-10T00:00:00", "published": "2009-09-09T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=64812", "id": "OPENVAS:64812", "title": "Fedora Core 10 FEDORA-2009-9232 (qt)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_9232.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-9232 (qt)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nsecurity fix for CVE-2009-2700\n\nChangeLog:\n\n* Mon Aug 31 2009 Than Ngo - 4.5.2-3\n- fix for CVE-2009-2700\n* Tue Aug 18 2009 Than Ngo - 4.5.2-2\n- security fix for CVE-2009-1725\n* Tue Aug 18 2009 Rex Dieter 4.5.2-1.2\n- kde-qt: 287-qmenu-respect-minwidth\n- kde-qt: 0288-more-x-keycodes (#475247)\n* Wed Aug 5 2009 Rex Dieter 4.5.2-1.1\n- use linker scripts for _debug targets (#510246)\n- apply upstream patch to fix issue in Copy and paste\n- optimize (icon-mostly) scriptlets\n- -x11: Requires(post,postun): /sbin/ldconfig\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update qt' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9232\";\ntag_summary = \"The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-9232.\";\n\n\n\nif(description)\n{\n script_id(64812);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-09 02:15:49 +0200 (Wed, 09 Sep 2009)\");\n script_cve_id(\"CVE-2009-2700\", \"CVE-2009-1725\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 10 FEDORA-2009-9232 (qt)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=520435\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-demos\", rpm:\"qt-demos~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-examples\", rpm:\"qt-examples~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-mysql\", rpm:\"qt-mysql~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-odbc\", rpm:\"qt-odbc~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-postgresql\", rpm:\"qt-postgresql~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-x11\", rpm:\"qt-x11~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-debuginfo\", rpm:\"qt-debuginfo~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-doc\", rpm:\"qt-doc~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:29", "bulletinFamily": "scanner", "description": "The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-9232.", "modified": "2018-04-06T00:00:00", "published": "2009-09-09T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064812", "id": "OPENVAS:136141256231064812", "title": "Fedora Core 10 FEDORA-2009-9232 (qt)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_9232.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-9232 (qt)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nsecurity fix for CVE-2009-2700\n\nChangeLog:\n\n* Mon Aug 31 2009 Than Ngo - 4.5.2-3\n- fix for CVE-2009-2700\n* Tue Aug 18 2009 Than Ngo - 4.5.2-2\n- security fix for CVE-2009-1725\n* Tue Aug 18 2009 Rex Dieter 4.5.2-1.2\n- kde-qt: 287-qmenu-respect-minwidth\n- kde-qt: 0288-more-x-keycodes (#475247)\n* Wed Aug 5 2009 Rex Dieter 4.5.2-1.1\n- use linker scripts for _debug targets (#510246)\n- apply upstream patch to fix issue in Copy and paste\n- optimize (icon-mostly) scriptlets\n- -x11: Requires(post,postun): /sbin/ldconfig\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update qt' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9232\";\ntag_summary = \"The remote host is missing an update to qt\nannounced via advisory FEDORA-2009-9232.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64812\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-09 02:15:49 +0200 (Wed, 09 Sep 2009)\");\n script_cve_id(\"CVE-2009-2700\", \"CVE-2009-1725\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 10 FEDORA-2009-9232 (qt)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=520435\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-demos\", rpm:\"qt-demos~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-examples\", rpm:\"qt-examples~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-mysql\", rpm:\"qt-mysql~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-odbc\", rpm:\"qt-odbc~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-postgresql\", rpm:\"qt-postgresql~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-x11\", rpm:\"qt-x11~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-debuginfo\", rpm:\"qt-debuginfo~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qt-doc\", rpm:\"qt-doc~4.5.2~3.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:40:18", "bulletinFamily": "scanner", "description": "This host has Apple Safari installed and is prone to multiple\n vulnerabilities.", "modified": "2019-04-29T00:00:00", "published": "2009-11-17T00:00:00", "id": "OPENVAS:1361412562310900889", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900889", "title": "Apple Safari Multiple Vulnerabilities - Nov09", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Apple Safari Multiple Vulnerabilities - Nov09\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.900889\");\n script_version(\"2019-04-29T15:08:03+0000\");\n script_tag(name:\"last_modification\", value:\"2019-04-29 15:08:03 +0000 (Mon, 29 Apr 2019)\");\n script_tag(name:\"creation_date\", value:\"2009-11-17 15:16:05 +0100 (Tue, 17 Nov 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-2816\", \"CVE-2009-2842\", \"CVE-2009-3384\");\n script_bugtraq_id(36997, 36994, 36995);\n script_name(\"Apple Safari Multiple Vulnerabilities - Nov09\");\n\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"General\");\n script_dependencies(\"secpod_apple_safari_detect_win_900003.nasl\");\n script_mandatory_keys(\"AppleSafari/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to bypass certain security\n restrictions, disclose sensitive information, or compromise a user's system.\");\n script_tag(name:\"affected\", value:\"Apple Safari version prior to 4.0.4\");\n script_tag(name:\"insight\", value:\"- An error exists in WebKit when sending 'preflight' requests originating\n from a page in a different origin. This can be exploited to facilitate\n cross-site request forgery attacks by injecting custom HTTP headers.\n\n - An error exists when handling an 'Open Image in New Tab', 'Open Image in'\n 'New Window', or 'Open Link in New Tab' shortcut menu action performed on\n a link to a local file. This can be exploited to load a local HTML file\n and disclose sensitive information by tricking a user into performing the\n affected actions within a specially crafted webpage.\n\n - Multiple errors in WebKit when handling FTP directory listings can be\n exploited to disclose sensitive information.\");\n script_tag(name:\"solution\", value:\"Upgrade to Safari version 4.0.4 or latest version.\");\n script_tag(name:\"summary\", value:\"This host has Apple Safari installed and is prone to multiple\n vulnerabilities.\");\n script_xref(name:\"URL\", value:\"http://support.apple.com/kb/HT3949\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/37346\");\n script_xref(name:\"URL\", value:\"http://lists.apple.com/archives/security-announce/2009/Nov/msg00001.html\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\n\nsafariVer = get_kb_item(\"AppleSafari/Version\");\nif(!safariVer)\n exit(0);\n\nif(version_is_less(version:safariVer, test_version:\"5.31.21.11\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2019-11-01T02:26:40", "bulletinFamily": "scanner", "description": "A security flaw was found in the WebKit", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2009-11487.NASL", "href": "https://www.tenable.com/plugins/nessus/42803", "published": "2009-11-16T00:00:00", "title": "Fedora 12 : qt-4.5.3-9.fc12 (2009-11487)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-11487.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(42803);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/08/02 13:32:29\");\n\n script_cve_id(\"CVE-2009-2816\", \"CVE-2009-3384\");\n script_bugtraq_id(36997);\n script_xref(name:\"FEDORA\", value:\"2009-11487\");\n\n script_name(english:\"Fedora 12 : qt-4.5.3-9.fc12 (2009-11487)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A security flaw was found in the WebKit's Cross-Origin Resource\nSharing (CORS) implementation. Multiple security flaws (integer\nunderflow, invalid pointer dereference, buffer underflow and a denial\nof service) were found in the way WebKit's FTP parser used to process\nremote FTP directory listings.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=525788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=525789\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-November/031041.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ff6cdfb8\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected qt package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(352);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:12\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^12([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 12.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC12\", reference:\"qt-4.5.3-9.fc12\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:26:40", "bulletinFamily": "scanner", "description": "A security flaw was found in the WebKit", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2009-11491.NASL", "href": "https://www.tenable.com/plugins/nessus/42807", "published": "2009-11-16T00:00:00", "title": "Fedora 11 : qt-4.5.3-9.fc11 (2009-11491)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-11491.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(42807);\n script_version(\"1.13\");\n script_cvs_date(\"Date: 2019/08/02 13:32:29\");\n\n script_cve_id(\"CVE-2009-2816\", \"CVE-2009-3384\");\n script_xref(name:\"FEDORA\", value:\"2009-11491\");\n\n script_name(english:\"Fedora 11 : qt-4.5.3-9.fc11 (2009-11491)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A security flaw was found in the WebKit's Cross-Origin Resource\nSharing (CORS) implementation. Multiple security flaws (integer\nunderflow, invalid pointer dereference, buffer underflow and a denial\nof service) were found in the way WebKit's FTP parser used to process\nremote FTP directory listings.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=525788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=525789\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-November/031045.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?37487fe9\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected qt package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(352);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^11([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 11.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC11\", reference:\"qt-4.5.3-9.fc11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:26:40", "bulletinFamily": "scanner", "description": "A security flaw was found in the WebKit", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2009-11488.NASL", "href": "https://www.tenable.com/plugins/nessus/42804", "published": "2009-11-16T00:00:00", "title": "Fedora 10 : qt-4.5.3-9.fc10 (2009-11488)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-11488.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(42804);\n script_version(\"1.13\");\n script_cvs_date(\"Date: 2019/08/02 13:32:29\");\n\n script_cve_id(\"CVE-2009-2816\", \"CVE-2009-3384\");\n script_xref(name:\"FEDORA\", value:\"2009-11488\");\n\n script_name(english:\"Fedora 10 : qt-4.5.3-9.fc10 (2009-11488)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A security flaw was found in the WebKit's Cross-Origin Resource\nSharing (CORS) implementation. Multiple security flaws (integer\nunderflow, invalid pointer dereference, buffer underflow and a denial\nof service) were found in the way WebKit's FTP parser used to process\nremote FTP directory listings.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=525788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=525789\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-November/031042.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?347200e0\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected qt package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(352);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^10([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 10.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC10\", reference:\"qt-4.5.3-9.fc10\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:29:32", "bulletinFamily": "scanner", "description": "The version of Safari installed on the remote Windows host is earlier\nthan 4.0.4. Such versions are potentially affected by several \nissues :\n\n - An integer overflow in the handling of images with an\n embedded color profile could lead to a crash or \n arbitrary code execution. (CVE-2009-2804)\n\n - Multiple use-after-free issues exist in libxml2, the\n most serious of which could lead to a program crash.\n (CVE-2009-2414, CVE-2009-2416)\n\n - An issue in the handling of navigations initiated via \n the ", "modified": "2019-11-02T00:00:00", "id": "SAFARI_4_0_4.NASL", "href": "https://www.tenable.com/plugins/nessus/42478", "published": "2009-11-12T00:00:00", "title": "Safari < 4.0.4 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\n\nif (description)\n{\n script_id(42478);\n script_version(\"1.16\");\n\n script_cve_id(\n \"CVE-2009-2804\",\n \"CVE-2009-2414\",\n \"CVE-2009-2416\",\n \"CVE-2009-2816\",\n \"CVE-2009-2842\",\n \"CVE-2009-3384\"\n );\n script_bugtraq_id(36357, 36994, 36995, 36997);\n\n script_name(english:\"Safari < 4.0.4 Multiple Vulnerabilities\");\n script_summary(english:\"Checks Safari's version number\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote host contains a web browser that is affected by several\nvulnerabilities.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The version of Safari installed on the remote Windows host is earlier\nthan 4.0.4. Such versions are potentially affected by several \nissues :\n\n - An integer overflow in the handling of images with an\n embedded color profile could lead to a crash or \n arbitrary code execution. (CVE-2009-2804)\n\n - Multiple use-after-free issues exist in libxml2, the\n most serious of which could lead to a program crash.\n (CVE-2009-2414, CVE-2009-2416)\n\n - An issue in the handling of navigations initiated via \n the 'Open Image in New Tab', 'Open Image in New Window'\n or 'Open Link in New Tab' shortcut menu options could\n be exploited to load a local HTML file, leading to\n disclosure of sensitive information. (CVE-2009-2842)\n\n - An issue involving WebKit's inclusion of custom HTTP\n headers specified by a requesting page in preflight\n requests in support of Cross-Origin Resource Sharing\n can facilitate cross-site request forgery attacks. \n (CVE-2009-2816)\n\n - Multiple issues in WebKit's handling of FTP directory \n listings may lead to information disclosure, unexpected\n application termination, or execution of arbitrary \n code. (CVE-2009-3384)\"\n );\n script_set_attribute(\n attribute:\"see_also\", \n value:\"http://support.apple.com/kb/HT3949\"\n );\n script_set_attribute(\n attribute:\"see_also\", \n value:\"http://lists.apple.com/archives/security-announce/2009/Nov/msg00001.html\"\n );\n script_set_attribute(\n attribute:\"see_also\", \n value:\"http://www.securityfocus.com/advisories/18277\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Upgrade to Safari 4.0.4 or later.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119, 189, 352, 399);\n script_set_attribute(\n attribute:\"vuln_publication_date\", \n value:\"2009/11/11\"\n );\n script_set_attribute(\n attribute:\"patch_publication_date\", \n value:\"2009/11/11\"\n );\n script_set_attribute(\n attribute:\"plugin_publication_date\", \n value:\"2009/11/12\"\n );\n script_cvs_date(\"Date: 2018/07/27 18:38:15\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:safari\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"safari_installed.nasl\");\n script_require_keys(\"SMB/Safari/FileVersion\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\n\n\npath = get_kb_item(\"SMB/Safari/Path\");\nversion = get_kb_item(\"SMB/Safari/FileVersion\");\nif (isnull(version)) exit(0);\n\nver = split(version, sep:'.', keep:FALSE);\nfor (i=0; i<max_index(ver); i++)\n ver[i] = int(ver[i]);\n\nif (\n ver[0] < 5 ||\n (\n ver[0] == 5 &&\n (\n ver[1] < 31 ||\n (\n ver[1] == 31 && \n (\n ver[2] < 21 ||\n (ver[2] == 21 && ver[3] < 10)\n )\n )\n )\n )\n)\n{\n if (report_verbosity > 0)\n {\n if (isnull(path)) path = \"n/a\";\n\n prod_version = get_kb_item(\"SMB/Safari/ProductVersion\");\n if (!isnull(prod_version)) version = prod_version;\n\n report = string(\n \"\\n\",\n \"Nessus collected the following information about the current install\\n\",\n \"of Safari on the remote host :\\n\",\n \"\\n\",\n \" Version : \", version, \"\\n\",\n \" Path : \", path, \"\\n\"\n );\n security_hole(port:get_kb_item(\"SMB/transport\"), extra:report);\n }\n else security_hole(get_kb_item(\"SMB/transport\"));\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:26:44", "bulletinFamily": "scanner", "description": "security fix for CVE-2009-2700\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2009-9232.NASL", "href": "https://www.tenable.com/plugins/nessus/40856", "published": "2009-09-03T00:00:00", "title": "Fedora 10 : qt-4.5.2-3.fc10 (2009-9232)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-9232.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(40856);\n script_version (\"1.13\");\n script_cvs_date(\"Date: 2019/08/02 13:32:30\");\n\n script_cve_id(\"CVE-2009-2700\");\n script_xref(name:\"FEDORA\", value:\"2009-9232\");\n\n script_name(english:\"Fedora 10 : qt-4.5.2-3.fc10 (2009-9232)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"security fix for CVE-2009-2700\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=520435\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-September/028709.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1ff86ca9\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected qt package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/09/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^10([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 10.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC10\", reference:\"qt-4.5.2-3.fc10\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-11-03T12:18:03", "bulletinFamily": "scanner", "description": "This update fixes the handling of the subjectAltName field in SSL\ncertificates. (CVE-2009-2700)", "modified": "2019-11-02T00:00:00", "id": "SUSE_11_LIBQT4-091106.NASL", "href": "https://www.tenable.com/plugins/nessus/42793", "published": "2009-11-13T00:00:00", "title": "SuSE 11 Security Update : libqt4 (SAT Patch Number 1522)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(42793);\n script_version(\"1.12\");\n script_cvs_date(\"Date: 2019/10/25 13:36:35\");\n\n script_cve_id(\"CVE-2009-2700\");\n\n script_name(english:\"SuSE 11 Security Update : libqt4 (SAT Patch Number 1522)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes the handling of the subjectAltName field in SSL\ncertificates. (CVE-2009-2700)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=534081\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-2700.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 1522.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libqt4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libqt4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libqt4-qt3support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libqt4-qt3support-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libqt4-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libqt4-sql-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libqt4-sql-sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libqt4-sql-sqlite-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libqt4-x11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libqt4-x11-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (pl) audit(AUDIT_OS_NOT, \"SuSE 11.0\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"libqt4-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"libqt4-qt3support-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"libqt4-sql-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"libqt4-sql-sqlite-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"libqt4-x11-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-32bit-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-qt3support-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-qt3support-32bit-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-sql-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-sql-32bit-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-sql-sqlite-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-sql-sqlite-32bit-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-x11-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-x11-32bit-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"libqt4-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"libqt4-qt3support-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"libqt4-sql-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"libqt4-sql-sqlite-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"libqt4-x11-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"libqt4-32bit-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"libqt4-qt3support-32bit-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"libqt4-sql-32bit-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"libqt4-x11-32bit-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-32bit-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-qt3support-32bit-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-sql-32bit-4.4.3-12.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"libqt4-x11-32bit-4.4.3-12.11.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-11-03T12:17:29", "bulletinFamily": "scanner", "description": "This update fixes the handling of the subjectAltName field in SSL\ncertificates. (CVE-2009-2700)", "modified": "2019-11-02T00:00:00", "id": "SUSE_11_1_LIBQT4-091106.NASL", "href": "https://www.tenable.com/plugins/nessus/42792", "published": "2009-11-13T00:00:00", "title": "openSUSE Security Update : libqt4 (libqt4-1521)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update libqt4-1521.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(42792);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/10/25 13:36:35\");\n\n script_cve_id(\"CVE-2009-2700\");\n\n script_name(english:\"openSUSE Security Update : libqt4 (libqt4-1521)\");\n script_summary(english:\"Check for the libqt4-1521 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes the handling of the subjectAltName field in SSL\ncertificates. (CVE-2009-2700)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=534081\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libqt4 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-qt3support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-qt3support-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-sql-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-sql-sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-x11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-x11-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libqt4-4.4.3-4.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libqt4-devel-4.4.3-4.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libqt4-qt3support-4.4.3-4.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libqt4-sql-4.4.3-4.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libqt4-sql-sqlite-4.4.3-4.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libqt4-x11-4.4.3-4.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"libqt4-32bit-4.4.3-4.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"libqt4-qt3support-32bit-4.4.3-4.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"libqt4-sql-32bit-4.4.3-4.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"libqt4-x11-32bit-4.4.3-4.10.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libqt4\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-11-03T12:29:50", "bulletinFamily": "scanner", "description": "This update fixes the handling of the subjectAltName field in SSL\ncertificates. (CVE-2009-2700)", "modified": "2019-11-02T00:00:00", "id": "SUSE_DBUS-1-QT-6644.NASL", "href": "https://www.tenable.com/plugins/nessus/42794", "published": "2009-11-13T00:00:00", "title": "SuSE 10 Security Update : Qt3 (ZYPP Patch Number 6644)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(42794);\n script_version (\"1.12\");\n script_cvs_date(\"Date: 2019/10/25 13:36:36\");\n\n script_cve_id(\"CVE-2009-2700\");\n\n script_name(english:\"SuSE 10 Security Update : Qt3 (ZYPP Patch Number 6644)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes the handling of the subjectAltName field in SSL\ncertificates. (CVE-2009-2700)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-2700.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 6644.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"dbus-1-qt-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"qt-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"qt-qt3support-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"qt-sql-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"qt-x11-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"dbus-1-qt-32bit-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"qt-32bit-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"qt-qt3support-32bit-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"qt-sql-32bit-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"qt-x11-32bit-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"dbus-1-qt-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"qt-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"qt-qt3support-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"qt-sql-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"qt-x11-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"dbus-1-qt-32bit-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"qt-32bit-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"qt-qt3support-32bit-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"qt-sql-32bit-4.3.4-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"qt-x11-32bit-4.3.4-0.7.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-11-03T12:17:23", "bulletinFamily": "scanner", "description": "This update fixes the handling of the subjectAltName field in SSL\ncertificates. (CVE-2009-2700)", "modified": "2019-11-02T00:00:00", "id": "SUSE_11_0_LIBQT4-091106.NASL", "href": "https://www.tenable.com/plugins/nessus/42791", "published": "2009-11-13T00:00:00", "title": "openSUSE Security Update : libqt4 (libqt4-1521)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update libqt4-1521.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(42791);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/10/25 13:36:34\");\n\n script_cve_id(\"CVE-2009-2700\");\n\n script_name(english:\"openSUSE Security Update : libqt4 (libqt4-1521)\");\n script_summary(english:\"Check for the libqt4-1521 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes the handling of the subjectAltName field in SSL\ncertificates. (CVE-2009-2700)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=534081\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libqt4 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-qt3support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-qt3support-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-sql-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-sql-sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-x11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt4-x11-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libqt4-4.4.0-12.8\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libqt4-devel-4.4.0-12.8\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libqt4-qt3support-4.4.0-12.8\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libqt4-sql-4.4.0-12.8\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libqt4-sql-sqlite-4.4.0-12.8\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libqt4-x11-4.4.0-12.8\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"libqt4-32bit-4.4.0-12.8\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"libqt4-qt3support-32bit-4.4.0-12.8\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"libqt4-sql-32bit-4.4.0-12.8\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"libqt4-x11-32bit-4.4.0-12.8\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libqt4\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-11-01T02:26:44", "bulletinFamily": "scanner", "description": "security fix for CVE-2009-2700\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2009-9231.NASL", "href": "https://www.tenable.com/plugins/nessus/40855", "published": "2009-09-03T00:00:00", "title": "Fedora 11 : qt-4.5.2-3.fc11 (2009-9231)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-9231.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(40855);\n script_version (\"1.13\");\n script_cvs_date(\"Date: 2019/08/02 13:32:30\");\n\n script_cve_id(\"CVE-2009-2700\");\n script_xref(name:\"FEDORA\", value:\"2009-9231\");\n\n script_name(english:\"Fedora 11 : qt-4.5.2-3.fc11 (2009-9231)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"security fix for CVE-2009-2700\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=520435\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-September/028708.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?12e83811\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected qt package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/09/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^11([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 11.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC11\", reference:\"qt-4.5.2-3.fc11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "seebug": [{"lastseen": "2017-11-19T18:29:56", "bulletinFamily": "exploit", "description": "Bugraq ID: 36995\r\nCVE ID\uff1aCVE-2009-3384\r\n\r\nWebKit\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684web\u6d4f\u89c8\u5668\u5f15\u64ce\u3002\r\nWebKit\u5904\u7406FTP\u76ee\u5f55\u5217\u8868\u5b58\u5728\u591a\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\uff0c\u4fe1\u606f\u6cc4\u6f0f\u6216\u4efb\u610f\u4ee3\u7801\u6267\u884c\u653b\u51fb\u3002\r\n\u8bbf\u95ee\u6076\u610f\u7279\u6b8a\u6784\u5efa\u7684FTP\u670d\u52a1\u5668\u53ef\u89e6\u53d1\u6b64\u6f0f\u6d1e\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\n\nWebKit Open Source Project WebKit r38566\r\nWebKit Open Source Project WebKit \r\nApple Safari 4.0.3 for Windows\r\nApple Safari 4.0.2 for Windows\r\nApple Safari 3.2.3 for Windows\r\nApple Safari 3.2.2 for Windows\r\nApple Safari 3.1.2 for Windows\r\nApple Safari 3.1.1 for Windows\r\nApple Safari 3.0.4 Beta for Windows\r\nApple Safari 3.0.3 \r\nApple Safari 3.0.2 Beta for Windows\r\nApple Safari 3.0.1 Beta for Windows\r\nApple Safari 4 for Windows\r\nApple Safari 3.1 for Windows\r\nApple Safari 3 Beta for Windows\n\u5382\u5546\u89e3\u51b3\u65b9\u6848\r\n\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0bApple\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u89e3\u51b3\u65b9\u6848\uff1a\r\nApple Safari 4.0.3 for Windows\r\nApple APPLE-SA-2009-11-11-1 SafariQuickTimeSetup.exe\r\nSafari+QuickTime for Windows 7, Vista or XP\r\nhttp://www.apple.com/safari/download/\r\nApple APPLE-SA-2009-11-11-1 SafariSetup.exe\r\nSafari for Windows 7, Vista or XP\r\nhttp://www.apple.com/safari/download/", "modified": "2009-11-16T00:00:00", "published": "2009-11-16T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-12637", "id": "SSV:12637", "type": "seebug", "title": "WebKit\u591a\u4e2a\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\uff0c\u62d2\u7edd\u670d\u52a1\u548c\u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e", "sourceData": "", "sourceHref": "", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T18:30:06", "bulletinFamily": "exploit", "description": "Bugraq ID: 36997\r\nCVE ID\uff1aCVE-2009-2816\r\n\r\nWebKit\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684web\u6d4f\u89c8\u5668\u5f15\u64ce\u3002\r\nWebKit\u5b58\u5728\u540c\u6e90\u7b56\u7565\u7ed5\u8fc7\u95ee\u9898\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u8bbf\u95ee\u5176\u4ed6\u57df\u4e2d\u7684\u8d44\u6e90\u3002\r\nWebKit\u7684\u8de8\u6e90\u8d44\u6e90\u5171\u4eab\u5b9e\u73b0\u5b58\u5728\u5b89\u5168\u95ee\u9898\uff0c\u5728\u5141\u8bb8\u67d0\u6e90\u7684\u9875\u9762\u8bbf\u95ee\u5176\u4ed6\u6e90\u4e2d\u7684\u8d44\u6e90\u524d\uff0cWebKit\u4f1a\u53d1\u9001preflight\u8bf7\u6c42\u7ed9\u540e\u8005\u7684\u670d\u52a1\u5668\u4ee5\u8bbf\u95ee\u8d44\u6e90\u3002\u5728preflight\u8bf7\u6c42\u4e2dWebKit\u5305\u542b\u7531\u8bf7\u6c42\u9875\u9762\u6307\u5b9a\u7684\u5b9a\u5236HTTP\u5934\u5b57\u6bb5\uff0c\u8fd9\u53ef\u5bfc\u81f4\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u653b\u51fb\u3002\n\nWebKit Open Source Project WebKit 0\r\nApple Safari For Windows 3.2.1 \r\nApple Safari 4.0.3 for Windows\r\nApple Safari 4.0.3 \r\nApple Safari 4.0.2 for Windows\r\nApple Safari 4.0.2 \r\nApple Safari 4.0.1 \r\nApple Safari 3.2.3 for Windows\r\nApple Safari 3.2.3 \r\nApple Safari 3.2.2 for Windows\r\nApple Safari 3.1.2 for Windows\r\nApple Safari 3.1.2 \r\nApple Safari 3.1.1 for Windows\r\nApple Safari 3.1.1 \r\nApple Safari 3.0.4 Beta for Windows\r\nApple Safari 3.0.3 \r\nApple Safari 3.0.3 \r\nApple Safari 3.0.2 Beta for Windows\r\nApple Safari 3.0.2 Beta\r\nApple Safari 3.0.1 Beta for Windows\r\nApple Safari 3.0.1 Beta\r\nApple Safari 4 for Windows\r\nApple Safari 4 Beta\r\nApple Safari 4 Beta\r\nApple Safari 4\r\nApple Safari 3.2\r\nApple Safari 3.1 for Windows\r\nApple Safari 3.1\r\nApple Safari 3 Beta for Windows\r\nApple Safari 3 Beta\n\u5382\u5546\u89e3\u51b3\u65b9\u6848\r\n\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0bApple\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u89e3\u51b3\u65b9\u6848\uff1a\r\nApple Safari 4.0.3 for Windows\r\nApple APPLE-SA-2009-11-11-1 SafariQuickTimeSetup.exe\r\nSafari+QuickTime for Windows 7, Vista or XP\r\nhttp://www.apple.com/safari/download/\r\nApple APPLE-SA-2009-11-11-1 SafariSetup.exe\r\nSafari for Windows 7, Vista or XP\r\nhttp://www.apple.com/safari/download/\r\nApple Safari 4.0.3 \r\nApple Safari4.0.4Leopard.dmg\r\nSafari for Mac OS X v10.5.7\r\nhttp://www.apple.com/safari/download/\r\nApple Safari4.0.4SnowLeopard.dmg\r\nSafari for Mac OS X v10.6.1 and v10.6.2\r\nhttp://www.apple.com/safari/download/\r\nApple Safari4.0.4Tiger.dmg\r\nSafari for Mac OS X v10.4.11\r\nhttp://www.apple.com/safari/download/", "modified": "2009-11-16T00:00:00", "published": "2009-11-16T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-12644", "id": "SSV:12644", "type": "seebug", "title": "WebKit Preflight\u8bf7\u6c42\u540c\u6e90\u7b56\u7565\u7ed5\u8fc7\u6f0f\u6d1e", "sourceData": "", "sourceHref": "", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-11-19T18:30:15", "bulletinFamily": "exploit", "description": "BUGTRAQ ID: 36357,36010,36994,36995,36997,36996\r\nCVE ID: CVE-2009-2804,CVE-2009-2414,CVE-2009-2416,CVE-2009-2842,CVE-2009-2816,CVE-2009-3384,CVE-2009-2841\r\n\r\nSafari\u662f\u82f9\u679c\u5bb6\u65cf\u673a\u5668\u64cd\u4f5c\u7cfb\u7edf\u4e2d\u9ed8\u8ba4\u6346\u7ed1\u7684WEB\u6d4f\u89c8\u5668\u3002\r\n\r\n\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528Safari\u6d4f\u89c8\u5668\u4e2d\u7684\u591a\u4e2a\u9519\u8bef\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3001\u8bfb\u53d6\u654f\u611f\u4fe1\u606f\u6216\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\r\n\r\nCVE-2009-2804\r\n\r\n\u5904\u7406\u5305\u542b\u6709\u5d4c\u5165\u5f0f\u989c\u8272\u914d\u7f6e\u6587\u4ef6\u7684\u56fe\u5f62\u65f6\u5b58\u5728\u53ef\u5bfc\u81f4\u5806\u6ea2\u51fa\u7684\u6574\u6570\u6ea2\u51fa\uff0c\u7528\u6237\u53d7\u9a97\u6253\u5f00\u6076\u610f\u56fe\u5f62\u5c31\u53ef\u80fd\u5bfc\u81f4\u6d4f\u89c8\u5668\u5d29\u6e83\u6216\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\r\n\r\nCVE-2009-2414\uff0cCVE-2009-2416\r\n\r\nlibxml2\u5e93\u4e2d\u7684\u591a\u4e2a\u91ca\u653e\u540e\u4f7f\u7528\u6f0f\u6d1e\u53ef\u80fd\u5bfc\u81f4\u6d4f\u89c8\u5668\u610f\u5916\u7ec8\u6b62\u3002\r\n\r\nCVE-2009-2842\r\n\r\nSafari\u5904\u7406\u901a\u8fc7\u201c\u5728\u65b0\u6807\u7b7e\u9875\u4e2d\u6253\u5f00\u56fe\u5f62\u201d\u3001\u201c\u5728\u65b0\u7a97\u53e3\u4e2d\u6253\u5f00\u56fe\u5f62\u201d\u6216\u201c\u5728\u65b0\u6807\u7b7e\u9875\u4e2d\u6253\u5f00\u94fe\u63a5\u201d\u5feb\u6377\u83dc\u5355\u9009\u9879\u6240\u521d\u59cb\u5316\u7684\u5bfc\u822a\u65f6\u5b58\u5728\u6f0f\u6d1e\uff0c\u5bf9\u6076\u610f\u7f51\u7ad9\u4f7f\u7528\u8fd9\u4e9b\u9009\u9879\u53ef\u80fd\u52a0\u8f7d\u672c\u5730HTM\u6587\u4ef6\uff0c\u5bfc\u81f4\u6cc4\u6f0f\u654f\u611f\u4fe1\u606f\u3002\r\n\r\nCVE-2009-2816\r\n\r\nWebKit\u5b9e\u73b0\u8de8\u6e90\u8d44\u6e90\u5171\u4eab\u7684\u65b9\u5f0f\u5b58\u5728\u6f0f\u6d1e\u3002\u5728\u5141\u8bb8\u4e00\u4e2a\u6e90\u7684\u9875\u9762\u8bbf\u95ee\u53e6\u4e00\u4e2a\u6e90\u4e2d\u8d44\u6e90\u4e4b\u524d\uff0cWebKit\u5411\u540e\u8005\u670d\u52a1\u5668\u53d1\u9001\u4e86preflight\u8bf7\u6c42\u3002\u7531\u4e8eWebKit\u5305\u542b\u6709preflight\u6240\u8bf7\u6c42\u9875\u9762\u6307\u5b9a\u7684\u81ea\u5b9a\u4e49HTTP\u5934\uff0c\u8fd9\u6709\u5229\u4e8e\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u653b\u51fb\u3002\r\n\r\nCVE-2009-3384\r\n\r\nWebKit\u5904\u7406FTP\u5217\u51fa\u76ee\u5f55\u65b9\u5f0f\u5b58\u5728\u591a\u4e2a\u6f0f\u6d1e\uff0c\u8bbf\u95ee\u6076\u610f\u7684FTP\u670d\u52a1\u5668\u53ef\u80fd\u5bfc\u81f4\u4fe1\u606f\u6cc4\u9732\u3001\u6d4f\u89c8\u5668\u610f\u5916\u7ec8\u6b62\u6216\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\r\n\r\nCVE-2009-2841\r\n\r\nWebKit\u9047\u5230\u6307\u5411\u5916\u90e8\u8d44\u6e90\u7684HTML 5\u5a92\u4f53\u5143\u7d20\u65f6\u6ca1\u6709\u53d1\u5e03\u8d44\u6e90\u52a0\u8f7d\u56de\u8c03\u6765\u5224\u65ad\u662f\u5426\u5e94\u52a0\u88c5\u8d44\u6e90\uff0c\u8fd9\u53ef\u80fd\u5bfc\u81f4\u5bf9\u8fdc\u7a0b\u670d\u52a1\u5668\u7684\u975e\u9884\u671f\u8bf7\u6c42\u3002\u4f8b\u5982\uff0cHTML\u683c\u5f0f\u90ae\u4ef6\u7684\u53d1\u4ef6\u4eba\u53ef\u4ee5\u5224\u65ad\u6d88\u606f\u662f\u5426\u5df2\u8bfb\u3002\n\nApple Safari 4.x\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nApple\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\nhttp://www.apple.com/safari/download/", "modified": "2009-11-13T00:00:00", "published": "2009-11-13T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-12627", "id": "SSV:12627", "type": "seebug", "title": "Safari 4.0.4\u7248\u672c\u4fee\u590d\u591a\u4e2a\u5b89\u5168\u6f0f\u6d1e", "sourceData": "", "sourceHref": "", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:34", "bulletinFamily": "software", "description": "certificate spoofing with \0 symbol in domain name.", "modified": "2009-09-09T00:00:00", "published": "2009-09-09T00:00:00", "id": "SECURITYVULNS:VULN:10216", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:10216", "title": "Nokia Trolltech Qt4 SSL certificate spoofing", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:31", "bulletinFamily": "software", "description": "\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2009:225\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n\r\n Package : qt4\r\n Date : September 8, 2009\r\n Affected: 2009.0, 2009.1, Enterprise Server 5.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n A vulnerability has been found and corrected in qt4:\r\n \r\n src/network/ssl/qsslcertificate.cpp in Nokia Trolltech Qt 4.x\r\n does not properly handle a '\0' character in a domain name in the\r\n Subject Alternative Name field of an X.509 certificate, which allows\r\n man-in-the-middle attackers to spoof arbitrary SSL servers via a\r\n crafted certificate issued by a legitimate Certification Authority,\r\n a related issue to CVE-2009-2408 (CVE-2009-2700).\r\n \r\n This update provides a solution to this vulnerability.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2700\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Linux 2009.0:\r\n 8f0b2b07978ce4e9eb86291935b2259c 2009.0/i586/libqassistant4-4.5.2-1.6mdv2009.0.i586.rpm\r\n e2403dcda9f123b545188aef00cb2114 2009.0/i586/libqt3support4-4.5.2-1.6mdv2009.0.i586.rpm\r\n 51288fb907cc947b3cadd9ab2e33b75b 2009.0/i586/libqt4-devel-4.5.2-1.6mdv2009.0.i586.rpm\r\n 302a8f93453e5d53d7c8a2df82029ffc 2009.0/i586/libqtclucene4-4.5.2-1.6mdv2009.0.i586.rpm\r\n 616c5e49341e9a09d0e8ebe84e02e1cc 2009.0/i586/libqtcore4-4.5.2-1.6mdv2009.0.i586.rpm\r\n 3c83783b3bce0ef1d4272fea4b2b8b63 2009.0/i586/libqtdbus4-4.5.2-1.6mdv2009.0.i586.rpm\r\n 0a5e1e53937d3e283d7a3d4227850e35 2009.0/i586/libqtdesigner4-4.5.2-1.6mdv2009.0.i586.rpm\r\n 33ce1ee1c1cde616895ecef850720000 2009.0/i586/libqtgui4-4.5.2-1.6mdv2009.0.i586.rpm\r\n 94e8c96fbc41bb125a1e3104f552f267 2009.0/i586/libqthelp4-4.5.2-1.6mdv2009.0.i586.rpm\r\n 1370e9cbbdffd1763ac8740fb31505bd 2009.0/i586/libqtnetwork4-4.5.2-1.6mdv2009.0.i586.rpm\r\n 1699327bbe2cf4bef5c9dedb155c3c36 2009.0/i586/libqtopengl4-4.5.2-1.6mdv2009.0.i586.rpm\r\n ca924316c1e18ad29bdf37f392883f1c 2009.0/i586/libqtscript4-4.5.2-1.6mdv2009.0.i586.rpm\r\n 8fd952c8be0760d7918e6e5693ba32a7 2009.0/i586/libqtscripttools4-4.5.2-1.6mdv2009.0.i586.rpm\r\n afc2b34155609ac2f390446f7f5bc45b 2009.0/i586/libqtsql4-4.5.2-1.6mdv2009.0.i586.rpm\r\n 345e293c4771e249679801aa750397ca 2009.0/i586/libqtsvg4-4.5.2-1.6mdv2009.0.i586.rpm\r\n b0e143930f2da815b3fcae1c73a1a70c 2009.0/i586/libqttest4-4.5.2-1.6mdv2009.0.i586.rpm\r\n 2c7474fd309e67fe682e44576b527e0c 2009.0/i586/libqtwebkit4-4.5.2-1.6mdv2009.0.i586.rpm\r\n b19c8107575a0818ecbe19dae9028ef0 2009.0/i586/libqtxml4-4.5.2-1.6mdv2009.0.i586.rpm\r\n 1540b82f62f29d8e9f46df23e5b7f786 2009.0/i586/libqtxmlpatterns4-4.5.2-1.6mdv2009.0.i586.rpm\r\n a243614d06b6aa0aec46b6263bdde420 2009.0/i586/qt4-accessibility-plugin-4.5.2-1.6mdv2009.0.i586.rpm\r\n 11c894ba3a91e7c2e1ebc0c194c9aaae 2009.0/i586/qt4-assistant-4.5.2-1.6mdv2009.0.i586.rpm\r\n 40a9530b2ed55545036ee30ce5109069 2009.0/i586/qt4-common-4.5.2-1.6mdv2009.0.i586.rpm\r\n 28fd5f52ebd0f1b47975aaabc6a69ea1 2009.0/i586/qt4-database-plugin-mysql-4.5.2-1.6mdv2009.0.i586.rpm\r\n 6e315a67b9e061027b7ec252cfb2085b 2009.0/i586/qt4-database-plugin-odbc-4.5.2-1.6mdv2009.0.i586.rpm\r\n 80e679cde6b34b8ba063cf0d36b198eb 2009.0/i586/qt4-database-plugin-pgsql-4.5.2-1.6mdv2009.0.i586.rpm\r\n b613b53004865d81b54f7c11a403a529 2009.0/i586/qt4-database-plugin-sqlite-4.5.2-1.6mdv2009.0.i586.rpm\r\n f97d447b97bfd68d59d0eb28064f7213 2009.0/i586/qt4-database-plugin-tds-4.5.2-1.6mdv2009.0.i586.rpm\r\n c9c9e0a3230ba751c7eebeacc44d906d 2009.0/i586/qt4-designer-4.5.2-1.6mdv2009.0.i586.rpm\r\n cf2435679fa0066b6ae95a4dad6c0fda 2009.0/i586/qt4-doc-4.5.2-1.6mdv2009.0.i586.rpm\r\n 933137e640637b6fa7ea5b5a6257a9ca 2009.0/i586/qt4-examples-4.5.2-1.6mdv2009.0.i586.rpm\r\n 6e080be6a767a58323c845521d8eef9a 2009.0/i586/qt4-graphicssystems-plugin-4.5.2-1.6mdv2009.0.i586.rpm\r\n 70f84dbe081843b0fa9c4b07b517b7a8 2009.0/i586/qt4-linguist-4.5.2-1.6mdv2009.0.i586.rpm\r\n 8082bc18d3183654f64c0bba0933de93 2009.0/i586/qt4-qdoc3-4.5.2-1.6mdv2009.0.i586.rpm\r\n b77fb9a4915ee16eb07a2c7a82069a7a 2009.0/i586/qt4-qtconfig-4.5.2-1.6mdv2009.0.i586.rpm\r\n b2b4fb545fcaf96de26ea8618f507eb9 2009.0/i586/qt4-qtdbus-4.5.2-1.6mdv2009.0.i586.rpm\r\n ca7d917f2442e9ff1665b224e834d9e2 2009.0/i586/qt4-qvfb-4.5.2-1.6mdv2009.0.i586.rpm\r\n 840c3cd230194546f0277fb0314fe31b 2009.0/i586/qt4-xmlpatterns-4.5.2-1.6mdv2009.0.i586.rpm \r\n e7d70d53a8a870ba2b938c754dc58379 2009.0/SRPMS/qt4-4.5.2-1.6mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.0/X86_64:\r\n f9ceffb25a3dd3e2fff7520eb024b413 2009.0/x86_64/lib64qassistant4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n ff62476ae9bc5124c3b77ccd6b8e4dfb 2009.0/x86_64/lib64qt3support4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n e05a185eae6d1155404ebdca47228298 2009.0/x86_64/lib64qt4-devel-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 34f026834954176924b8ceaa07402d94 2009.0/x86_64/lib64qtclucene4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 3417707e32fd86d56e3eddb11cc8adfc 2009.0/x86_64/lib64qtcore4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n f73849389ac56f6aeba0a99b51f78bd1 2009.0/x86_64/lib64qtdbus4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n a98754a5f9162f3dbf6ae02b3a4fc326 2009.0/x86_64/lib64qtdesigner4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 49833997afdfb052f8bb433f7414b759 2009.0/x86_64/lib64qtgui4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 474c0f0f7f1482fb97224426a83cbca0 2009.0/x86_64/lib64qthelp4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n a88ccb8f38dc94d9285f7c1ba1f59abb 2009.0/x86_64/lib64qtnetwork4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n d5c2fd9e3505e1176ad330fcc7b69c7a 2009.0/x86_64/lib64qtopengl4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 0de7a8ace4b49919ac0ccc8c5e8d332f 2009.0/x86_64/lib64qtscript4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 7ce2aba490bd9f7520fbdb25dbe5b2ca 2009.0/x86_64/lib64qtscripttools4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 4334eb5e253f3fdd5e1dd9d993711078 2009.0/x86_64/lib64qtsql4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 94684fb18dd38cf1d3f2a0c3d2350b4a 2009.0/x86_64/lib64qtsvg4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 49c34a46d085d4eab5915cfb01c0b0c6 2009.0/x86_64/lib64qttest4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n e3a49c9ac1c0fb5be354d40b151cef8f 2009.0/x86_64/lib64qtwebkit4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 9edb5e5d6bfbe11f4da5267426555982 2009.0/x86_64/lib64qtxml4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 788f9e76148b2d8b6aab85c180c9ef2a 2009.0/x86_64/lib64qtxmlpatterns4-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 69b48fbeee815b383073f03363e34a0a \r\n2009.0/x86_64/qt4-accessibility-plugin-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 32142e9e15fc02141839f6e145285543 2009.0/x86_64/qt4-assistant-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 150e2512211462927f33247184f11e7e 2009.0/x86_64/qt4-common-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n e5a17b66d70cc77dcbe8364da87269b9 \r\n2009.0/x86_64/qt4-database-plugin-mysql-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 7cc2aa658afa85304b3a4c4312e20ad6 \r\n2009.0/x86_64/qt4-database-plugin-odbc-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n ce73ffa95481ae312e4274d1976e2e7e \r\n2009.0/x86_64/qt4-database-plugin-pgsql-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n d1321f0a1c177b84d06e158eac15a435 \r\n2009.0/x86_64/qt4-database-plugin-sqlite-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n b49fc0f5a0da1c9b539bba4d2df07005 \r\n2009.0/x86_64/qt4-database-plugin-tds-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 1c16661643343b9b3b2ddd3e44b4b707 2009.0/x86_64/qt4-designer-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 373a3af8447e53de328fd5cc5876988d 2009.0/x86_64/qt4-doc-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 59cb1a04ecfbdd1aeff294d9663ba900 2009.0/x86_64/qt4-examples-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 9f8cc6a94247dfc0abf80bb10307c3e8 \r\n2009.0/x86_64/qt4-graphicssystems-plugin-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n cb45f4b26814ea8b3ab6181a50c72f22 2009.0/x86_64/qt4-linguist-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n e13be65ed2912ebb064c86d9aa55c4f0 2009.0/x86_64/qt4-qdoc3-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 6833ef669f7448ee47e4f399ed5e8c0b 2009.0/x86_64/qt4-qtconfig-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 71029609bd89ac503875cfb7c70ffb45 2009.0/x86_64/qt4-qtdbus-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n 84701ed7926e276a4f960432e3b376c6 2009.0/x86_64/qt4-qvfb-4.5.2-1.6mdv2009.0.x86_64.rpm\r\n d8188e6b55ee4477558bcf37aa348b22 2009.0/x86_64/qt4-xmlpatterns-4.5.2-1.6mdv2009.0.x86_64.rpm \r\n e7d70d53a8a870ba2b938c754dc58379 2009.0/SRPMS/qt4-4.5.2-1.6mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.1:\r\n 2e2ab90686768ad3332604dfee629e93 2009.1/i586/libqassistant4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 8535d83b511c66a59c9152995afacbf4 2009.1/i586/libqt3support4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 61dd3bcdef9e0250d5a8a3e8a75a7b1b 2009.1/i586/libqt4-devel-4.5.2-1.4mdv2009.1.i586.rpm\r\n 297c603db7184971d533c3edc0e4314c 2009.1/i586/libqtclucene4-4.5.2-1.4mdv2009.1.i586.rpm\r\n f7043105bc3bf97166a9e5898f41cee0 2009.1/i586/libqtcore4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 1ecae69d52815b033c973a8f55fff26f 2009.1/i586/libqtdbus4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 14bd0c6ebdc10c9208968246d3ddc8e1 2009.1/i586/libqtdesigner4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 0366ccc7475139e96622ebc20e09a645 2009.1/i586/libqtgui4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 31a16c4dae404ef7e06fde024e96b2e6 2009.1/i586/libqthelp4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 5ada32f6e70d288fe179b1ab42d4a398 2009.1/i586/libqtnetwork4-4.5.2-1.4mdv2009.1.i586.rpm\r\n b04f16a4b050d460413cbd76d98eed48 2009.1/i586/libqtopengl4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 7baa68c4abc646c76a2d3ae5bca141b4 2009.1/i586/libqtscript4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 7985c1a4a878a723ad2ebfb6241f60b2 2009.1/i586/libqtscripttools4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 58eeda1ce05925c0b3cab904db3f25a7 2009.1/i586/libqtsql4-4.5.2-1.4mdv2009.1.i586.rpm\r\n d99e31623b92731a5cb8523c6294b26f 2009.1/i586/libqtsvg4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 8530af45ed10f1f3ab0c0134d6162089 2009.1/i586/libqttest4-4.5.2-1.4mdv2009.1.i586.rpm\r\n bc7276c87cc3e820092220a165fd712c 2009.1/i586/libqtwebkit4-4.5.2-1.4mdv2009.1.i586.rpm\r\n d8d1672097abf788e33839b052502db7 2009.1/i586/libqtxml4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 60f2b738a748c9a6940d170fe3d55fbd 2009.1/i586/libqtxmlpatterns4-4.5.2-1.4mdv2009.1.i586.rpm\r\n 707148f3de734413d332f15834befab1 2009.1/i586/qt4-accessibility-plugin-4.5.2-1.4mdv2009.1.i586.rpm\r\n 1030cc7be0bd49c2fdbc4f504a4cfc34 2009.1/i586/qt4-assistant-4.5.2-1.4mdv2009.1.i586.rpm\r\n ba55040d9da2653c2cd874cc310deacd 2009.1/i586/qt4-common-4.5.2-1.4mdv2009.1.i586.rpm\r\n 1c16bc98468323b4325b5c2a7246b5fa 2009.1/i586/qt4-database-plugin-mysql-4.5.2-1.4mdv2009.1.i586.rpm\r\n 4893d62ce7c8fab073986df4044a9104 2009.1/i586/qt4-database-plugin-odbc-4.5.2-1.4mdv2009.1.i586.rpm\r\n c5fdd4a8a13263f207e093578ed7b04f 2009.1/i586/qt4-database-plugin-pgsql-4.5.2-1.4mdv2009.1.i586.rpm\r\n 259be796e5410d370c4de6eaa5fbd8f2 2009.1/i586/qt4-database-plugin-sqlite-4.5.2-1.4mdv2009.1.i586.rpm\r\n 36572044c13cc085969d7613c476984d 2009.1/i586/qt4-database-plugin-tds-4.5.2-1.4mdv2009.1.i586.rpm\r\n b3efeae677ee698460c262eeb89155e1 2009.1/i586/qt4-designer-4.5.2-1.4mdv2009.1.i586.rpm\r\n f6abc26faf180e0f01471183e9eb1360 2009.1/i586/qt4-doc-4.5.2-1.4mdv2009.1.i586.rpm\r\n 85d63d0a1d807733cec89b44b8726b6c 2009.1/i586/qt4-examples-4.5.2-1.4mdv2009.1.i586.rpm\r\n d861c9c37090a5dc54a8b9f47bcd85e9 2009.1/i586/qt4-graphicssystems-plugin-4.5.2-1.4mdv2009.1.i586.rpm\r\n fa8be490f70fbdbcabcaa5dcd8fbe8e6 2009.1/i586/qt4-linguist-4.5.2-1.4mdv2009.1.i586.rpm\r\n 611e52f298cbd663d4817471d5ec6649 2009.1/i586/qt4-qdoc3-4.5.2-1.4mdv2009.1.i586.rpm\r\n 376e4a78a53a6d19aec23cc6fe4d02e6 2009.1/i586/qt4-qtconfig-4.5.2-1.4mdv2009.1.i586.rpm\r\n f544cfb1ae089a636d326c1a16d49a8b 2009.1/i586/qt4-qtdbus-4.5.2-1.4mdv2009.1.i586.rpm\r\n 4d5426eea7ff3b5d9d482e8e0564e259 2009.1/i586/qt4-qvfb-4.5.2-1.4mdv2009.1.i586.rpm\r\n b36c895e5b1a142c80ba069deca27326 2009.1/i586/qt4-xmlpatterns-4.5.2-1.4mdv2009.1.i586.rpm \r\n ba2b427b637644c9e2ae052e440db3ca 2009.1/SRPMS/qt4-4.5.2-1.4mdv2009.1.src.rpm\r\n\r\n Mandriva Linux 2009.1/X86_64:\r\n 309cb9e93730dac6e68c2aceedca6228 2009.1/x86_64/lib64qassistant4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 50251a9f53d698bd4ec409482fceece6 2009.1/x86_64/lib64qt3support4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n c75df0fbfc405667184efe4914d6700e 2009.1/x86_64/lib64qt4-devel-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n d4747541bf506775a4b3dad05752ed89 2009.1/x86_64/lib64qtclucene4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 0fbf6ba9b02e6f0443b3f339d7cf88be 2009.1/x86_64/lib64qtcore4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 2702f5810e04d265fc32f34acf9f7a2b 2009.1/x86_64/lib64qtdbus4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 5b28ffd5773a937eef1475f8a7830dc6 2009.1/x86_64/lib64qtdesigner4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 05fc9bdb0a43260b0abc2cd11fd110ef 2009.1/x86_64/lib64qtgui4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 37416362357074d38f7f65e185cc1f2c 2009.1/x86_64/lib64qthelp4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 141d620b08d76178b97e6b23d817da89 2009.1/x86_64/lib64qtnetwork4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 5f1cbb6f37664d6796bd481bdbb68c6c 2009.1/x86_64/lib64qtopengl4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 0a253e802e32372098197cf61a73c47f 2009.1/x86_64/lib64qtscript4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n e771cdd2158872e3fc67f614ca761df5 2009.1/x86_64/lib64qtscripttools4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 71cf257490930dbab7e318dd4895ba65 2009.1/x86_64/lib64qtsql4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n f9f399a96211e86abc99b60a34646c27 2009.1/x86_64/lib64qtsvg4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n cbf1ad93a0ba4b08d19a4c5387247c6c 2009.1/x86_64/lib64qttest4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 496e439949045d6406ad6ed112dc9ad9 2009.1/x86_64/lib64qtwebkit4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 25ef7ae8fc7bcb0875046347abddaf2e 2009.1/x86_64/lib64qtxml4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n a2d002a440b4bd33cc05592ea3a48d4c 2009.1/x86_64/lib64qtxmlpatterns4-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 0611975777f48a60525af58fc87572cd \r\n2009.1/x86_64/qt4-accessibility-plugin-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 0ef334dda35fa8a9382e25889496bf04 2009.1/x86_64/qt4-assistant-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 79d0a99a5a61c63fc41bf08654bb0e41 2009.1/x86_64/qt4-common-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n ea0f80e65d83db575f4e326bd5701c77 \r\n2009.1/x86_64/qt4-database-plugin-mysql-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 6d248fade8ffedfd4d445baae775c942 \r\n2009.1/x86_64/qt4-database-plugin-odbc-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n d166e598090bb0c51bb784f2c36c37d3 \r\n2009.1/x86_64/qt4-database-plugin-pgsql-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 2fb0b42d4db487a853a387a0436250b1 \r\n2009.1/x86_64/qt4-database-plugin-sqlite-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n a2b30140d156c30a2b51859dfdcb6058 \r\n2009.1/x86_64/qt4-database-plugin-tds-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 123582d5b2797db92c92de4b3035b2a3 2009.1/x86_64/qt4-designer-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n a6acdd2d2cf72450cbfafbdcce8de14b 2009.1/x86_64/qt4-doc-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n f91e7ac39ff8ceac3e388e8c0e0092bb 2009.1/x86_64/qt4-examples-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 47cb7db983032b0b1bc99b9076b1e2a6 \r\n2009.1/x86_64/qt4-graphicssystems-plugin-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n e4a95559aff6f3040e9cf70a21571c0c 2009.1/x86_64/qt4-linguist-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 31769c7e3a9114ad2baa0ec2ecc51ec7 2009.1/x86_64/qt4-qdoc3-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 803a5567c991b9b4d1d393faa99ce4f9 2009.1/x86_64/qt4-qtconfig-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n e0932731675cade4d8af28f73076cb66 2009.1/x86_64/qt4-qtdbus-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 80a1e75207a94459f7a5d170e039040f 2009.1/x86_64/qt4-qvfb-4.5.2-1.4mdv2009.1.x86_64.rpm\r\n 74353dc01bda76eac82e627d3bd4394f 2009.1/x86_64/qt4-xmlpatterns-4.5.2-1.4mdv2009.1.x86_64.rpm \r\n ba2b427b637644c9e2ae052e440db3ca 2009.1/SRPMS/qt4-4.5.2-1.4mdv2009.1.src.rpm\r\n\r\n Mandriva Enterprise Server 5:\r\n 6dab5b4352861791d2e9c66844e8f7cc mes5/i586/libqassistant4-4.4.3-1.1mdvmes5.i586.rpm\r\n 5b5f04166167f6b65bb09f1cdc4ff418 mes5/i586/libqt3support4-4.4.3-1.1mdvmes5.i586.rpm\r\n f8d7a36ceff46f2379a9405e174e7ef2 mes5/i586/libqt4-devel-4.4.3-1.1mdvmes5.i586.rpm\r\n 3e1cda13224d2eb90358948d6bfe0ca7 mes5/i586/libqtclucene4-4.4.3-1.1mdvmes5.i586.rpm\r\n 381b32c3d329709faeab69af54685426 mes5/i586/libqtcore4-4.4.3-1.1mdvmes5.i586.rpm\r\n 2068b07d29956817643d3a56dc22e8f6 mes5/i586/libqtdbus4-4.4.3-1.1mdvmes5.i586.rpm\r\n 143f967ce65bb0c2a93366c0aa7f72a6 mes5/i586/libqtdesigner4-4.4.3-1.1mdvmes5.i586.rpm\r\n d14b1405301030a42d13f177edb44d3f mes5/i586/libqtgui4-4.4.3-1.1mdvmes5.i586.rpm\r\n dadc72b3fcd68c0e9551ae08f8531533 mes5/i586/libqthelp4-4.4.3-1.1mdvmes5.i586.rpm\r\n a73d8530564ca8b1d44dbb1db5f65692 mes5/i586/libqtnetwork4-4.4.3-1.1mdvmes5.i586.rpm\r\n 08e560d95d4593ce0666a46557abb83a mes5/i586/libqtopengl4-4.4.3-1.1mdvmes5.i586.rpm\r\n e96273da78f150bef55286cb645c14f4 mes5/i586/libqtscript4-4.4.3-1.1mdvmes5.i586.rpm\r\n d01ed62e2ecd569ff8f063111d364422 mes5/i586/libqtsql4-4.4.3-1.1mdvmes5.i586.rpm\r\n 32933d8323bef2ed63a0893fc834c300 mes5/i586/libqtsvg4-4.4.3-1.1mdvmes5.i586.rpm\r\n 8a403e86299f148f522028898ecb8748 mes5/i586/libqttest4-4.4.3-1.1mdvmes5.i586.rpm\r\n 28121e2bb1edfd668af72eda7d6a7c0e mes5/i586/libqtwebkit4-4.4.3-1.1mdvmes5.i586.rpm\r\n 3564638af5cb81c575aa4cbf33385169 mes5/i586/libqtxml4-4.4.3-1.1mdvmes5.i586.rpm\r\n a1ac714f01d23f77e6806ef455162714 mes5/i586/libqtxmlpatterns4-4.4.3-1.1mdvmes5.i586.rpm\r\n 414ac53798e391740795c46bb8eb02b7 mes5/i586/qt4-accessibility-plugin-lib-4.4.3-1.1mdvmes5.i586.rpm\r\n f3fb1ba455217b4964b0a34c24a0da6b mes5/i586/qt4-assistant-4.4.3-1.1mdvmes5.i586.rpm\r\n 05227c7aa487f260eb4af4a72bf322b3 mes5/i586/qt4-common-4.4.3-1.1mdvmes5.i586.rpm\r\n 93a8c12b8c890dd6ac1e7acd1f125bac mes5/i586/qt4-database-plugin-mysql-lib-4.4.3-1.1mdvmes5.i586.rpm\r\n fbd40034720f238214813e582aa837d9 mes5/i586/qt4-database-plugin-odbc-lib-4.4.3-1.1mdvmes5.i586.rpm\r\n b5d563d9008dd85cc73b0c27ddc6fd9e mes5/i586/qt4-database-plugin-pgsql-lib-4.4.3-1.1mdvmes5.i586.rpm\r\n bf7d17080c5e228a39792bb0913a9253 mes5/i586/qt4-database-plugin-sqlite-lib-4.4.3-1.1mdvmes5.i586.rpm\r\n fdf84439ea6570d5730f5ebc8957b8d4 mes5/i586/qt4-designer-4.4.3-1.1mdvmes5.i586.rpm\r\n 0f758d6b30b5d83951193628ab870214 mes5/i586/qt4-doc-4.4.3-1.1mdvmes5.i586.rpm\r\n 0a0e034feb424384c692221d64472d90 mes5/i586/qt4-examples-4.4.3-1.1mdvmes5.i586.rpm\r\n 1ede5a58758447c3ac4debbf7c63b796 mes5/i586/qt4-linguist-4.4.3-1.1mdvmes5.i586.rpm\r\n a2cd930d1c7a3d63dd917ecabfeacbb7 mes5/i586/qt4-qtconfig-4.4.3-1.1mdvmes5.i586.rpm\r\n 486dfd1d8fcb5cf8cf4494528944305d mes5/i586/qt4-qtdbus-4.4.3-1.1mdvmes5.i586.rpm\r\n 70303d543e001142fb16d8f8c247cc85 mes5/i586/qt4-qvfb-4.4.3-1.1mdvmes5.i586.rpm\r\n a03bb20031295de711faf022052dc363 mes5/i586/qt4-xmlpatterns-4.4.3-1.1mdvmes5.i586.rpm \r\n 8e6542cfb9f71065cf2135143286905e mes5/SRPMS/qt4-4.4.3-1.1mdvmes5.src.rpm\r\n\r\n Mandriva Enterprise Server 5/X86_64:\r\n 51d1fb7d404b412c232463454f8fbbf9 mes5/x86_64/lib64qassistant4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 8d37e2870bd68f953f1a5ee0a69afaa1 mes5/x86_64/lib64qt3support4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 453f839e0367104c1ffed17533072488 mes5/x86_64/lib64qt4-devel-4.4.3-1.1mdvmes5.x86_64.rpm\r\n cc348afa0bd63d4d2f2d6ec9e59f2aca mes5/x86_64/lib64qtclucene4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n a84b47e7dc3f9f67c8f6ad43176c2370 mes5/x86_64/lib64qtcore4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n aead498329b43cfc1210f2a1ea608375 mes5/x86_64/lib64qtdbus4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n ee717732bda774e10cd3ca21f7936dea mes5/x86_64/lib64qtdesigner4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n f199108dcce669cb74a850b577e55a67 mes5/x86_64/lib64qtgui4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 100aa8902b8d88499772512d412d4a28 mes5/x86_64/lib64qthelp4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 719a91aa60cb7ad92c7ba21b1971e5c0 mes5/x86_64/lib64qtnetwork4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n b7a62f4e3e06381343d364dde342fa7a mes5/x86_64/lib64qtopengl4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n fd598160347f59354e4f915be6a8d442 mes5/x86_64/lib64qtscript4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 13cc8a9ae362634aaf1b6a965c892e70 mes5/x86_64/lib64qtsql4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n a9e1a49d36f0bdef47e30f37705c60d3 mes5/x86_64/lib64qtsvg4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 2aedb02ce51f8795ee4066c3794ee983 mes5/x86_64/lib64qttest4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 3b681e6c1aa6356f35dee66cddfe0bf9 mes5/x86_64/lib64qtwebkit4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 0b1606c177d245352b46185dab735887 mes5/x86_64/lib64qtxml4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 7ef7becb19b5944f89ef67a3bfca94e4 mes5/x86_64/lib64qtxmlpatterns4-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 598723e3efa4851df97a671734899719 \r\nmes5/x86_64/qt4-accessibility-plugin-lib64-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 9bbfb3a3635228c1b2d033e3738efe60 mes5/x86_64/qt4-assistant-4.4.3-1.1mdvmes5.x86_64.rpm\r\n c8c4acf66f09afa84bc65c61582f0c8a mes5/x86_64/qt4-common-4.4.3-1.1mdvmes5.x86_64.rpm\r\n b9853a79c82f3acbf5d272d2a03f196e \r\nmes5/x86_64/qt4-database-plugin-mysql-lib64-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 49819189b126bee1b7ccd847ec51a583 \r\nmes5/x86_64/qt4-database-plugin-odbc-lib64-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 8203263572ccc75822aa505b80fdeba0 \r\nmes5/x86_64/qt4-database-plugin-pgsql-lib64-4.4.3-1.1mdvmes5.x86_64.rpm\r\n cf200cfa8ec444191cdd004781da7d84 \r\nmes5/x86_64/qt4-database-plugin-sqlite-lib64-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 383e8baae8301b06ef2539bf02741969 mes5/x86_64/qt4-designer-4.4.3-1.1mdvmes5.x86_64.rpm\r\n f10a7aec7d82ac20e89439350a6cdb77 mes5/x86_64/qt4-doc-4.4.3-1.1mdvmes5.x86_64.rpm\r\n c28a00e567bbf9cafdec4913c359ab23 mes5/x86_64/qt4-examples-4.4.3-1.1mdvmes5.x86_64.rpm\r\n acfe2e3ebc80d1c1bc1065ff166d4f7d mes5/x86_64/qt4-linguist-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 02c4bcc9514b8c77cc0357b62c5eabf1 mes5/x86_64/qt4-qtconfig-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 567322d54d96cef40ca8ae487180b194 mes5/x86_64/qt4-qtdbus-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 476f0e47ead448f0c1fa9622f830ede9 mes5/x86_64/qt4-qvfb-4.4.3-1.1mdvmes5.x86_64.rpm\r\n 2d38f1e4dd2d4e008a44dc138edd1c60 mes5/x86_64/qt4-xmlpatterns-4.4.3-1.1mdvmes5.x86_64.rpm \r\n 8e6542cfb9f71065cf2135143286905e mes5/SRPMS/qt4-4.4.3-1.1mdvmes5.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFKplfBmqjQ0CJFipgRAtjyAJ46d0Cyi2XB9gCpUtAQUabOyVjTAgCffuGq\r\nBCaSemxCUSF0hiNsvtBeFw0=\r\n=bKvo\r\n-----END PGP SIGNATURE-----", "modified": "2009-09-09T00:00:00", "published": "2009-09-09T00:00:00", "id": "SECURITYVULNS:DOC:22430", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:22430", "title": "[ MDVSA-2009:225 ] qt4", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "ubuntu": [{"lastseen": "2019-05-29T17:21:09", "bulletinFamily": "unix", "description": "It was discovered that Qt did not properly handle certificates with NULL characters in the Subject Alternative Name field of X.509 certificates. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. (CVE-2009-2700)", "modified": "2009-09-10T00:00:00", "published": "2009-09-10T00:00:00", "id": "USN-829-1", "href": "https://usn.ubuntu.com/829-1/", "title": "Qt vulnerability", "type": "ubuntu", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T17:22:21", "bulletinFamily": "unix", "description": "It was discovered that WebKit did not properly handle certain SVGPathList data structures. If a user were tricked into viewing a malicious website, an attacker could exploit this to execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0945)\n\nSeveral flaws were discovered in the WebKit browser and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-1687, CVE-2009-1690, CVE-2009-1698, CVE-2009-1711, CVE-2009-1725)\n\nIt was discovered that WebKit did not prevent the loading of local Java applets. If a user were tricked into viewing a malicious website, an attacker could exploit this to execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-1712)", "modified": "2009-09-23T00:00:00", "published": "2009-09-23T00:00:00", "id": "USN-836-1", "href": "https://usn.ubuntu.com/836-1/", "title": "WebKit vulnerabilities", "type": "ubuntu", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T17:22:07", "bulletinFamily": "unix", "description": "It was discovered that QtWebKit did not properly handle certain SVGPathList data structures. If a user were tricked into viewing a malicious website, an attacker could exploit this to execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0945)\n\nSeveral flaws were discovered in the QtWebKit browser and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-1687, CVE-2009-1690, CVE-2009-1698, CVE-2009-1711, CVE-2009-1725)\n\nIt was discovered that QtWebKit did not properly handle certain XSL stylesheets. If a user were tricked into viewing a malicious website, an attacker could exploit this to read arbitrary local files, and possibly files from different security zones. (CVE-2009-1699, CVE-2009-1713)\n\nIt was discovered that QtWebKit did not prevent the loading of local Java applets. If a user were tricked into viewing a malicious website, an attacker could exploit this to execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-1712)", "modified": "2009-11-10T00:00:00", "published": "2009-11-10T00:00:00", "id": "USN-857-1", "href": "https://usn.ubuntu.com/857-1/", "title": "Qt vulnerabilities", "type": "ubuntu", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "threatpost": [{"lastseen": "2018-10-06T23:09:15", "bulletinFamily": "info", "description": "[](<https://threatpost.com/apple-patches-critical-safari-vulnerabilities-111109/>)Apple today shipped Safari 4.0.4 to fix a total of seven security flaws that expose Windows and Mac users to a wide range of malicious hacker attacks.\n\nThe high-priority update patches vulnerabilities that allow remote code execution (drive-by downloads) if a user simply surfs to a maliciously rigged Web site. Some of the issues affect Microsoft\u2019s new Windows 7 operating system. \nHere are the details from an Apple advisory:\n\n * **ColorSync** (CVE-2009-2804) \u2014 Available for Windows 7, Windows Vista and Windows XP \u2014 An integer overflow exists in the handling of images with an embedded color profile, which may lead to a heap buffer overflow. Opening a maliciously crafted image with an embedded color profile may lead to an unexpected application termination or arbitrary code execution. This vulnerability was internally discovered by Apple.\n * **libxml** CVE-2009-2414 and CVE-2009-2416 \u2014 Available for: Mac OS X Windows 7, Windows Vista and Windows XP \u2014 Multiple use-after-free issues exist in libxml2, the most serious of which may lead to an unexpected application termination. This update addresses the issues through improved memory handling. The issues have already been addressed in Mac OS X 10.6.2, and in Security Update 2009-006 for Mac OS X 10.5.8 systems.\n * **Safari **\u2014 CVE-2009-2842 \u2014 Available for: Mac OS X, Windows 7, Windows Vista and Windows XP \u2014 An issue exists in Safari\u2019s handling of navigations initiated via the \u201cOpen Image in New Tab\u201d, \u201cOpen Image in New Window\u201d, or \u201cOpen Link in New Tab\u201d shortcut menu options. Using these options within a maliciously crafted website could load a local HTML file, leading to the disclosure of sensitive information.\n * **WebKit **\u2014 CVE-2009-2816 \u2014 Available for Mac OS X, Windows 7, Windows Vista and Windows XP \u2014 An issue exists in WebKit\u2019s implementation of Cross-Origin Resource Sharing. Before allowing a page from one origin to access a resource in another origin, WebKit sends a preflight request to the latter server for access to the resource. WebKit includes custom HTTP headers specified by the requesting page in the preflight request. This can facilitate cross-site request forgery. Internally discovered by Apple.\n * **WebKit** \u2014 CVE-2009-3384 \u2014 Available for Windows 7, Windows Vista and Windows XP \u2014 Multiple vulnerabilities exist in WebKit\u2019s handling of FTP directory listings. Accessing a maliciously crafted FTP server may lead to information disclosure, unexpected application termination, or execution of arbitrary code. This update addresses the issues through improved parsing of FTP directory listings. These issues do not affect Safari on Mac OS X systems.\n * **WebKit** \u2014 CVE-2009-2841 \u2014 Available for Mac OS X (client and server) \u2014 When WebKit encounters an HTML 5 Media Element pointing to an external resource, it does not issue a resource load callback to determine if the resource should be loaded. This may result in undesired requests to remote servers. As an example, the sender of an HTML-formatted email message could use this to determine that the message was read. This issue is addressed by generating resource load callbacks when WebKit encounters an HTML 5 Media Element. This issue does not affect Safari on Windows systems.\n\nThe browser update is being pushed to Mac and Windows systems via Apple\u2019s software update utilities. Alternatively, Safari users can download the patches from [Apple\u2019s download site](<http://www.apple.com/safari/download/>).\n", "modified": "2018-08-15T14:12:22", "published": "2009-11-11T21:45:09", "id": "THREATPOST:213B2F3A19EB934CE4579B8DDEAC6AB4", "href": "https://threatpost.com/apple-patches-critical-safari-vulnerabilities-111109/73081/", "type": "threatpost", "title": "Apple Patches Critical Safari Vulnerabilities", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-10-06T23:08:39", "bulletinFamily": "info", "description": "[](<https://threatpost.com/apple-plugs-critical-iphone-security-holes-020210/>)Apple has shipped a patch to cover five documented vulnerabilities that expose iPhone and iPod Touch users to malicious hacker attacks. The most serious flaw could allow remote code execution if an iPhone/iPod Touch user opens audio and image files.\n\nHere\u2019s the skinny on the vulnerabilities being patched with this iPhone OS 3.1.3 and iPhone OS 3.1.3 for iPod Touch update:\n\n * **CoreAudio** (CVE-2010-0036) \u2014 A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously crafted mp4 audio file may lead to an unexpected application termination or arbitrary code execution. \n * **ImageIO** (CVE-2009-2285) \u2014 A buffer underflow exists in ImageIO\u2019s handling of TIFF images. Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution. \n * **Recovery Mode** (CVE-2010-0038) \u2014 A memory corruption issue exists in the handling of a certain USB control message. A person with physical access to the device could use this to bypass the passcode and access the user\u2019s data. \n * **WebKit **(CVE-2009-3384) \u2014 Multiple input validation issues exist in WebKit\u2019s handling of FTP directory listings. Accessing a maliciously crafted FTP server may lead to information disclosure, unexpected application termination, or execution of arbitrary code. \n * **WebKit** (CVE-2009-2841) \u2014 When WebKit encounters an HTML 5 Media Element pointing to an external resource, it does not issue a resource load callback to determine if the resource should be loaded. This may result in undesired requests to remote servers. As an example, the sender of an HTML-formatted email message could use this to determine that the message was read.\n\nThis iPhone/iPod Touch update is only available through iTunes and will not appear in the software update utility available in Mac and Windows systems.\n", "modified": "2018-08-15T13:34:01", "published": "2010-02-02T19:05:36", "id": "THREATPOST:87A00B01F9F51647FA037F1CED7DA5EF", "href": "https://threatpost.com/apple-plugs-critical-iphone-security-holes-020210/73474/", "type": "threatpost", "title": "Apple Plugs Critical iPhone Security Holes", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "debian": [{"lastseen": "2019-08-22T02:27:32", "bulletinFamily": "unix", "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1988-1 security@debian.org\nhttp://www.debian.org/security/ Giuseppe Iuculano\nFebruary 02, 2010 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackages : qt4-x11\nVulnerability : several vulnerabilities\nProblem type : local (remote)\nDebian-specific: no\nCVE Ids : CVE-2009-0945 CVE-2009-1687 CVE-2009-1690 CVE-2009-1698\n CVE-2009-1699 CVE-2009-1711 CVE-2009-1712 CVE-2009-1713\n CVE-2009-1725 CVE-2009-2700\nDebian Bugs : 532718 534946 538347 545793\n\n\nSeveral vulnerabilities have been discovered in qt4-x11, a cross-platform\nC++ application framework.\nThe Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2009-0945\n\nArray index error in the insertItemBefore method in WebKit, as used in qt4-x11,\nallows remote attackers to execute arbitrary code.\n\n\nCVE-2009-1687\n\nThe JavaScript garbage collector in WebKit, as used in qt4-x11 does not\nproperly handle allocation failures, which allows remote attackers to\nexecute arbitrary code or cause a denial of service (memory corruption\nand application crash) via a crafted HTML document that triggers write\naccess to an "offset of a NULL pointer.\n\n\nCVE-2009-1690\n\nUse-after-free vulnerability in WebKit, as used in qt4-x11, allows remote\nattackers to execute arbitrary code or cause a denial of service (memory\ncorruption and application crash) by setting an unspecified property of\nan HTML tag that causes child elements to be freed and later accessed\nwhen an HTML error occurs.\n\n\nCVE-2009-1698\n\nWebKit in qt4-x11 does not initialize a pointer during handling of a\nCascading Style Sheets (CSS) attr function call with a large numerical\nargument, which allows remote attackers to execute arbitrary code or\ncause a denial of service (memory corruption and application crash) via\na crafted HTML document.\n\n\nCVE-2009-1699\n\nThe XSL stylesheet implementation in WebKit, as used in qt4-x11 does\nnot properly handle XML external entities, which allows remote attackers to read\narbitrary files via a crafted DTD.\n\n\nCVE-2009-1711\n\nWebKit in qt4-x11 does not properly initialize memory for Attr DOM objects,\nwhich allows remote attackers to execute arbitrary code or cause a denial\nof service (application crash) via a crafted HTML document.\n\n\nCVE-2009-1712\n\nWebKit in qt4-x11 does not prevent remote loading of local Java applets,\nwhich allows remote attackers to execute arbitrary code, gain privileges, or\nobtain sensitive information via an APPLET or OBJECT element.\n\n\nCVE-2009-1713\n\nThe XSLT functionality in WebKit, as used in qt4-x11 does not properly\nimplement the document function, which allows remote attackers to read\narbitrary local files and files from different security zones.\n\n\nCVE-2009-1725\n\nWebKit in qt4-x11 does not properly handle numeric character references,\nwhich allows remote attackers to execute arbitrary code or cause a\ndenial of service (memory corruption and application crash) via a\ncrafted HTML document.\n\n\nCVE-2009-2700\n\nqt4-x11 does not properly handle a '\\0' character in a domain name in the\nSubject Alternative Name field of an X.509 certificate, which allows\nman-in-the-middle attackers to spoof arbitrary SSL servers via a crafted\ncertificate issued by a legitimate Certification Authority.\n\n\n\nThe oldstable distribution (etch) is not affected by these problems.\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 4.4.3-1+lenny1.\n\nFor the testing distribution (squeeze) and the unstable distribution\n(sid), these problems have been fixed in version 4.5.3-1.\n\n\nWe recommend that you upgrade your qt4-x11 packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-x11_4.4.3.orig.tar.gz\n Size/MD5 checksum: 112939803 376c003317c4417326ba2116370227d0\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-x11_4.4.3-1+lenny1.diff.gz\n Size/MD5 checksum: 113988 44e1d7b1418a2ea5811b2ba390c6e5e2\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-x11_4.4.3-1+lenny1.dsc\n Size/MD5 checksum: 2517 a643e142a0548df25f447e5147e36434\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-doc_4.4.3-1+lenny1_all.deb\n Size/MD5 checksum: 52927996 d4f9f1f38e28b02b57f77631c80936c5\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-doc-html_4.4.3-1+lenny1_all.deb\n Size/MD5 checksum: 26654448 7e65171932e77223aa5b1393daec55f5\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 30804 242795a7b4b6b75655d0c2a1900b4f96\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 256632 ea070e02a8243c8b73463820aa18c16c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 194438 7639b8b9266a76ffa2880e10b265bfd0\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 64780 2e260f7f62771c80884a2a35dcb9b449\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 1642920 05ec919d8ff16f4e5bc9a3e3b0ce6718\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 54143826 a8112a75ecbdf5bf5fba60c5ffcf6639\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 493846 ab8a83e873d4b4df0353b24abdfde772\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 90539672 57d2f91d1b32c724e8ac67fa185f08ce\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 4748512 dc56c050f7fd6162b5ea5b4a862e47ec\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 248966 0d4ee203a4eeead29a21142cf5f5f36a\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 2227462 3298ca0048afc6ba038e2173f76ad99b\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 45958 5c05bee20ac16e347b4df914df0ba573\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 3824480 fb0afb2adf09e056ac1b2a952f923f82\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 14064920 9b168b2fe8e39d65a5de4ec66d98dbb3\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 41942 02c839761d645d29e364fa9d585e0155\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 1510874 55bcc0f38bb98aded16cd3d058948f1a\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 1842134 cc1c00d45977cdafc257a38a19c9f3d6\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 148296 62a149e29e40961eb3ee9fa3f71e46cf\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 4747984 5940af0438fa7982819efc9361d4d218\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 10853838 1b534f13f38e5c4d6d3a6605e27ca5ef\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 986808 4008560ed1b894058f5f7f793224470f\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 194846 393eb42698732905ee322c2e88ea3cbf\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 149118 0d473109c91d1a3deb7af4bd6edd7975\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 74138 a395afc4c7c8ba3dad39322d08c9dfd2\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 30798 05efcfccb419463c2b61fb1f3ca29a95\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 506180 e6d0197c68897fe67a908077b2784533\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 2208902 3898119a8c37a4f40ec3e16269fbf32c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 50888 fef3650e86c4153c7247d2846d000431\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 428680 f37d8592f6211e98858663bc7da5aa11\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 62188 6c0c7762f36acdb31cd172cb8d16746f\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 41200 39bc11946cc3e99f9f54c2c0381e6dd4\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 144382 c12f803d4285afc61380fcdf04fcd4de\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_alpha.deb\n Size/MD5 checksum: 59926 eaa5395d210bfe708d015c176d207481\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 50214 3cbce693aef71ebfc94652571f581a16\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 61290 76c1ba9c1cc77a714e491ec648ac2d49\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 134690 bf94e92323e68a1b948b7983e8883154\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 458816 2625fac9bd465f2267bb7cf3ca9b12b4\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 1377026 0bc2e8c416723c12a1c2b5325f1d255d\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 87591154 684110dfa018fb12451fade881f2b258\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 70622 c3d8b1eae3557735e3d2cffa1c27a943\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 456012 31697e41896daf771dcdcb4c342b9c06\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 10553896 068c89d9d205cce3c972849793ddc8c6\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 42370 21d5c9fbb91e60d69bd9ce720da2e459\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 58260 0fd799b66c8bdbcaefa98b9924f888ec\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 30802 83b99b7cb51bd621183483db893bbeec\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 1537710 cc75e5bc1a0c87b20ed7100d4a293039\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 2079558 559afbeeec5a3d3bd9df5c2dbc6d0896\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 4274120 97907f0117b368f4b9f23e8599473261\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 30814 7e47a757325b8476e352b03a5c5aec78\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 185344 f9f81022af95cf86541b7a21ca68c220\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 62948 51bc553e17ca6d1f015faf7a70705e45\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 53394502 984acdfd4d9573bedbb1cb9fdea32099\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 3448144 7d523c3c7fcead5b0debdf212ab4b0d7\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 1625680 3bf0cbca2bbd44cb0c84ce0c84ef51cf\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 42656 0ae1f63bf9d2776f6e4048d790ff0fb6\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 237786 b0240806281af4bde43a18ca30beaf9c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 4306138 060500a3c0fd9443305bbc3833a2b2bc\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 186262 bf6a12b3e66e84a41c27cc64d8b9222b\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 828912 cb315956769fcb6630164a2cc0db2a9f\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 137534 f7afd2dc5df6ba81c2e8aacd05263288\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-ibase_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 72788 a96bc474a1dc453038d3e20b91e7da26\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 46088 4a2e8968fc286fa45456feb782501e49\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 2093718 97bc8a55dba288d7d8238b7c37242acc\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 411410 25d97c749070beb820016b63e3275ef0\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 13411206 ed59b0df741ce51e3fd53a20c0d2460f\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 132960 bfd90128e17d45d3d1a9e275cf9b8484\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_amd64.deb\n Size/MD5 checksum: 240992 baa32b82cf072af916cf54f348ac8b21\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 1490244 b7f5b5521e518f8195a93eaa64a47a6f\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 246778 c578bafdc84117e2e0489f345d63a328\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 4090556 c364c817a98b4b55de7db3124d201a3d\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 13976018 09b344b3f55cf804b29c7b902f358a66\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 30552 3d452b1bbe742911a2c49f0a0533c9f8\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 4302420 bbba102425af53a59e362e8f8ed8a176\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 1559374 b39af442b4a69b9e5ed26f3c949a8c45\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 2051900 8b58466730fdfc163674f8ce67465ac1\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 850514 7da47a92f793e4e87d5cf6ddac563a39\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 42030 ae1f63cdb4c19c090c6efe685bfae0d6\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 72300 1b5f88254367f44211bdfdf921c39305\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 182426 a39e968a814382611f19a5834655cdda\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 57682 874b69bbb0a4e184ccad60b18cf71e80\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 60030 8f8a1faf24aedb8c7db0d349ea894837\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 1291440 cce8b6f8f434f8bc1ccb32779cf74644\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 178792 e7b00a6eed81bd71d2f5277e2595bd4f\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 10208362 5bca5461f7ce8a51e55f130fd4c5d852\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 49814 8038cb08e95871bcdbc6eed747729874\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 30542 145c03d402a1d9cdeb105acc4dfd9add\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 129170 a5cc1ffd87f255b17187b9116a9a902f\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 417314 193284b6d133efd2ce923c4c3498b76e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 457766 b8337c15ad7022f03a339d76e288e510\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 51245582 f28d2c30200aa4c3dfa1c658aa8194c3\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 42882 2bb5d6c5158c98e0e753118653e100e6\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 405660 1cf50d4eadc18a9ec58a0b64a57e4bb3\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 89502610 17620beaf7eb7648a6e76bd3b6ef5b81\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 2052626 9d52d385b4dfe5b3e84e9f37f6a5262d\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 62778 96b4ad6c7002d4b5d6e0d29b8c3c48c4\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 139982 0e82833ffd6e4370103a67002551850e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 2935026 7a1986aa9702df21c770f4b66477e0eb\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 45656 b41efd29606c780b4fde733ca7fadd2b\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 133334 79223e7f554a07aec91ee2dd23683edf\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_armel.deb\n Size/MD5 checksum: 233960 e4fddb32150f6d343bfcc85e7b58215a\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 76570 d8ed6f1595b23cdff3874e2bc9bc16ab\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 502954 af0b3cc8554f302f8e0a8837b2793499\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 88102392 6910957cabd74c068fb43581a7654495\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 1047740 bce5cbb0da6e22a8e3fa9d82faf69a48\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 65002 d54455c037071dfa191e7fa774068345\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 164024 271f70ccadf4536f0168be44d2edb617\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 272194 5ceba67ab66f9c687ccd5aa6dd9a2a42\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 52802 ee752bab39d48e9ed3aa9ac22b459fdc\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 139864 4f5c9f13f9b53d7174ed75bafd186490\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 269716 8c763165b42e2e7fcc2163fd61229a96\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 43398 b7b64dfe8ceeb67d551faee74f8e8184\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 534088 2c2ab2681f9b1d71fa6cc7f16c4aab66\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 1733748 7c2e5e485e341b2440f08cd720d63ee5\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 10984260 b721e64df219e2afda07c0a9dae77bd3\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 48060 ed2b04165cfb65391efbc5a857ef925a\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 42290 27850d5246ca6fd752d8391adb686d48\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 5050272 9788f089c1d28f7b5daefc7948aa0d93\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 13472070 1ef74506e71dfe9d4f54eea5f17888cf\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 1634402 5314d4d81ac19f5645b1e1675ba6525e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 4753614 7c5f9e9415a58b065b593228bd8cac77\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 2311948 368daa9ae5595e3b01fc46c3d772d5e8\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 440934 dff816abb46a6fd0901aa7b46df70978\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 216320 06af895bbc34177ba07a54640fcd82f9\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 4111644 ba7285e1ab7763143616162c647f9c1c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 30560 7179e8bfc10ffba15f16fc489d6c8767\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 54867760 f3a6306eb7868e2051c9133ae13001a5\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 2482204 99df86846bac3b9ed311d208e3d60052\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 1674078 b3a41e98392119d6f18714f2cd30c620\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 30556 4deae2df41ac92447aab4a19f28f449c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 67256 918f264f290aa032321eb41ffe3fb470\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 61638 d43df02948f52ae0ade58491e4e01184\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 215604 1368fdf3f01f9c6c8fe1f9ebf692aa7f\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_hppa.deb\n Size/MD5 checksum: 150290 3e019e50412c7053e59210d23558ff3f\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 60056 17379341e284a38f644c3ef48f3d153f\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 4308318 f66dac39c8646b5d6f86d687d14876a5\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 86425734 45941d60457519d748df891ae9d6fb3b\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 49540 53ef1e6bd36093d87e3a9ae9e4f8f25b\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 1525530 086e6751de436355a09962c886622f5b\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 41558 610999d2f201d4aa2dbe2a8a7b89a297\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 30562 eb0de8312c4ae39517ce301513321433\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 134916 39a04c32712484b7afdeb8b18e9eaba9\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 1577902 c4e82a4d23e9d82fc3d03df912075dfd\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 132728 9f0b09e83111a6747b398ae769a58838\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 42696 c35fed94056e8b19ef711354aa2ec581\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 444694 f1a39c9137fb693c29296b8e253b13bc\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 780670 23067bad00a58f4072ca1af9a41af2ff\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 460070 a63dc401216e6c27d9047f1a755d2ca0\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 10386438 2591e51461f3b4a7247007cf45267135\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 3249592 ee8c1c0aa94c466ddeaafb4bd1f491db\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 61966 72d831daa19c34c59051845b4cd58a16\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 181350 9f48c0dbab6bb86cb5c59a9024493036\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 2083758 009fd94d4fac6f73eada4d20f91e88a2\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 1389528 c80b6c53b187a323ecdfd3f4cfd5b44d\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 53025666 29e651bcb5703a6bfe40a0800e36df1f\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 30570 1e680aaa186d52d2a2242dd19b76ffa6\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 185196 c8e779b2db03670eb05556887dfd0fc3\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-ibase_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 72576 15f2f845993e5fe2dfe38cf4202e0070\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 236816 c6dfeb8fd01d4405377e4ccdda4131cb\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 4282456 35848f6936fe030424f44e71992631e5\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 57054 ead8f282f8104e070642dcced8ec9bdb\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 135448 6c28e942bcdbeac060e8e8a0a84ddb90\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 45662 7902e7c821865035758a060acc06d1b8\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 13273488 dfd26b502ae2ec0b07ba5c8c3009f47b\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 403720 dfb3f85f19b28ae30d4fb8d7a70b3101\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 2103050 15bf7f0d013780dc6644c598cf9bfc2c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 70224 7292d01857e2e63c8d9c2a7559ce5e5c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_i386.deb\n Size/MD5 checksum: 240438 0677fbf3af429aed4042035cf5fe3174\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 1117582 626119564af23bf1502e7356f21b6915\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 44950 b77dd8bcdd872ce53477addc87e837fe\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 6027574 84ed0cba631580c23c512ef0528ce6a3\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 30550 67930c8d0685ce81832a8ce84c0f7a24\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 68624 068eb1b54b047f52435a2020e206ae5e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 53396760 3d187d9ea8c05ec521440f2b30091fa6\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 2575384 59b7a007a62ff3a30631333384f4ef15\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 487778 06aca6786068692ae811409418122138\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 295098 dbfaa938bdc60534692c34ffb94abe4c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 2668608 9e82b0b6dfcba94112666fe8ea9c8d9a\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 66094 4cfea5eee8f72a9ac230fa6a460a6d5f\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 41242 1777cf6df5b2dcfbba2d6408e64cc03d\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 54168 5ce5f187a81716b59d8f21bb5b574946\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 233336 53f4577c6bfc5ac24e83a9351f52cb57\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 302362 cc74da836c1676844082c818ed1186a6\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 172432 d240749108d8900be7a1845294bff484\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 89080984 bc9e19f29d3e5528bae6c65f32b716ed\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 579478 488c9c35a86921e6190c0e4955536b37\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 166064 d7731426876b36221566f86a0a0e2453\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 70086 16f96b3e2676c23e80c968753e82784a\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 11526082 37f059728643cfabb94d9733655bac61\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 146634 8327e828736c91db0177ba6ba042cabc\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 1806196 15600b5f7f3d78467e2781fe84910620\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 4894148 f2ace07dc909157d021948dac7fc3bf5\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 13971058 8a29679d1abf4a4e2df783cf1a861a1e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 250056 54ad40eb2b043e44bc0cf72cb82f99e6\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 83468 49e601ace7fc68fda06d2ea501eb79a5\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 49078 2e01f8e5b543ed924286fbb75fa2efd8\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 661268 6d6858547004e307d140d694f27431d4\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 30558 f2ce47b00bc67df9b185cc270a87e47c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 1873218 0e559bc2e24169cd62289412e0453f00\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 5244556 804c0718a2caacf6d26fffdbf006adae\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_ia64.deb\n Size/MD5 checksum: 2208414 069ed40aae3c456f06c81c06da3460e9\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 13731026 2cf7a5b1603540351b28ea37a98a681b\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 61884 19402e470dd403395446a6e5c55626b3\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 445328 4d20e4060988521dc63cbf37c30f100d\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 232750 0754ed2ce13641874a5fcc696cca9fd7\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 45358 dd4b5a28a81306956a47c03554cc8d59\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 2076344 cc317e6f6ef542e9ef43691e0cdfe625\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 238704 fab119df8f0826eb2c25a090f711b45e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 30564 2c816aed7bf0e28f6b425de26929e419\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 4384714 7900cddfa51331384db080a6040c7f74\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 130570 60d8c58cbbf93fbf0ce8a8df5aa1fee5\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 138014 9e039fbb1238db80bab9e04ecea71a80\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 41614 e05888e3d7f0138c24fb20a5a422b4ca\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 3291732 5a8544c976f02858283c26ba43bd109a\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 1353820 3cd3c7a8b0a56f081f3bca85a27a76ef\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 1997940 54b5e8e103e38cd53a13bfbd27559328\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 1548658 a8a9cc3cc9115c75a45bc0cd694134b8\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 193882 2bf228574df6a2835552b4815afc696a\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 186294 d88d65e6a85ce57bcf9e81fa4fd04b77\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 30556 05b460890a55a81ba0f192235a3c0192\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 4351110 afac1e4e3ac405e1bbe8283e37d20b45\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 49412 ca97fb0c6d14a2114885b2cb87786e15\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 41262 7f4bb9e46d585246ed69e7da595570bd\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 10432216 ef271383ff6f2600b966955f21d75dc1\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 1599606 3e088686e99b421f9f531ea7d5baa162\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 796818 a4a24e95261b29c8da07f3b5b61a14c2\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 57742 1350b3cc65918433cf9974be12129405\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 69750 dc570d8cf67f8ae2f44df459f89a7704\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 60274 eabf99068a0d0182eb1d95bc231d9c82\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 431144 e23f8d941bf2f10c1a9ea53f01b19261\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 55251700 eedba6f66975bbb0433c6e650d33071f\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 425568 c4936529fc1fcb1d135cfc01892ab40d\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 131324 0a867f9ea1ea1eb906d46f43c180fe05\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_mips.deb\n Size/MD5 checksum: 89596300 6d22a177a7c1ef7e457a75756990d604\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 229968 e7876664a0ea2577213f6dc854dc7beb\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 10376684 ee440eeb5d00ea1a8e1172d3b3d00aff\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 4347292 f4cd4c89a0f7537f8e26f6879a0f893e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 191406 9f015ddc9e3e9c718cb97ab11296c6e5\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 41540 7661ae54a10a2d2ca44875d123705870\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 30552 3d0751fdd9aed771e4912c211bea089e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 1958868 43fc237fccc7979cb4328769a9712b44\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 236330 f39a7a36d1d13e6cabc183b54bc8a541\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 135644 50bb1a918ca208dbb524211ca2f1fd72\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 4290348 10ad0e19a2388acc31a88f8ac25ad2e5\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 57452 e41274c827e5cf94498772b74579d58e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 30570 f48d279ccdd49c6e519da7df2f910b1e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 86262916 279b30139f7d4e7a24bc3fe3873d802e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 130074 20a9cb3f067bb663cf6b9e5500afc15d\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 3144304 18c39b4efe29da0f6698f7cc1662513c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 759628 8bd9c81c6160c6fa73955e6eb7589143\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 129280 0d196ba45f0f25957b28519063fec79a\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 59950 ce633cf5f8ca612bdea81d98eb984c39\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 69248 c26886682df753907b8c6e32167135e8\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 1585390 09d818aafb7331444c5f799390a5ab61\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 49176 34549e52d8e29ed02c7d469145c47391\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 1532608 37e6e25a50b4f9823a5455c51966c8e3\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 425456 5883cd14a56c3bc2903f72704231a0bf\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 439666 5fbc5af909dc395f49f720542f8735d1\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 13194092 ea7674bd0c4b797d0295b17dd1ed3e85\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 45182 8ffbc7bb8d565ddc3fe773a2c099a523\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 422618 b1edf41f7dc0214b2dac0c3395fac73c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 52871332 be96377a4b5ebdaddef10c5001895cbe\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 2048016 8569e3fdef2371d07a123344e7ef8abb\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 61554 bf0effb3185b92e7eb0de5729f1be76e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 41254 70f58c78b610e1937e52eb34e5809d2e\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 1327318 de6c4ecc2baf7e28b8705dca4f3606a7\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_mipsel.deb\n Size/MD5 checksum: 184066 ff313cbda6b9bcb6dd71dc7cca3c07ec\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 13997058 d47bbbd31efc9282a917cc48d921c1fb\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 140650 f0f469b814443d6113365d6ac8c01b4f\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 42212 81d51c4361750df38e6dd7bcb7f294e4\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 4435166 cd8b0b45170ea1ccb5af66a2a037f9ac\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 196810 77aa5a519b4bbc82fac8ea9d7086ede4\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 60652 8ce4b23af0fc90b90d9c4d53d1a50bda\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 30802 69317bc289e10bf016e6df959f364f63\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 2182738 31201b8165db906fb338c217aaf7b835\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 44858 e2f7113b7b7c00a86caf179c2a8042b2\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 90556268 8acc67fe335daaf799bece65ea6ef2e4\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 2149626 93b142c76b1c8e1fba0f2d5c5e1f52b0\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-ibase_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 75792 97ae586b12501133f0f3c2139fd55620\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 64864 33f39474f447957c77cb1eca2188fdff\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 251222 2b12af171e0b6bc3e01a2d169f8e9ded\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 4545642 fb808821c12d59490d232c1573ce9425\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 140016 deb24263775b117ef8367bc89d4d68be\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 3497416 0f97f950fb49a399532694aa6ab40b8c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 459192 5ee6a6fbfa1548358ca2ad801e033340\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 144158 80581254defdb7d7b7d3af7069ff14b2\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 72716 7912412d5e675fb673132200d9d9117d\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 480786 60e389b50aae477531b50dc2905f20b8\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 1594040 395947773b25b0692d566f9c6e47e0b4\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 48414 9056405b51e0f2cad816e071a36776f4\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 194714 caad1a28959aa7fea561dc06bef55346\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 55217666 f4f0f246c07a7ae1b44497fc00dbd8e3\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 244830 f074a00e007903e3771c66df7f3efcfa\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 30790 c1dec1bf28a20e1bd2a24833d2384bec\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 52576 c783203cfb164e0013fbfded1c1d0052\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 854404 560ba73fc55690189a271215f3ef2c2e\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 422532 b0ffc9c56df7f7f2445eee291c820749\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 11235082 9a80f5e8649a24c8c4da3b4f77f2d924\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 1597838 597ccee014ca55295e45cc97f98cf73c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 1455288 bfd8f94f8a4f65603cf0c3ad7762ab78\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_powerpc.deb\n Size/MD5 checksum: 65100 8d6ca22bb24e9304c2030e99ac38279a\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 852900 ab84bcde1321f0b33c04686edbdd7f1d\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 42392 47c06dcbbd608394b79a52ce13befe24\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 4336914 41015bf0edea53f8df86a3f0892b0516\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 186528 f627eabae0217449b946acbadd9d2885\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 245080 5d54afb9b1998f0cbe571c2d4bc63d98\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 4317764 3c3bf66ecd2a332dcee92f90ce8c7e76\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 55245590 565b4ec96fbf02ac81f9e08cf3af205a\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 63496 ac31ab8ec8679251afc06f54d49aa4ee\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 1548988 516a92fd4db89942aa6b8e6a21ce02d0\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 10492564 9fd10fe6fd84eb14d3b23832eab65124\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 192324 f7ab5380c677edcf15ebdd8e4f184a34\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 45234 66f5a114119c904ad46e6e848154ecd2\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 70528 708da134eee0742b14bdc76af09c1627\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 449388 ddfe9418c152ae4a55042d85d69c9c37\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 1417152 806724b858f8c693c582360f544ee5de\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 1475076 3d24017f5b062c615f490301ac27214a\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 14296138 9aeeb16c17f3034e55a0b7a82643417a\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 142528 d836b52cf73b72199562d684a8eeb2ed\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 30558 8277d0f9382a8f7a4867d6a87711ea87\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 414206 91ad7bda75d6664b197485977a8955f2\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 30546 632c492577c5af53fc01161de449dabb\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 2154792 5b8fe3e7e176155dc97e5ffcfe7426fd\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 91685948 b8b0e9db0180b1c47c16bdd5746598ef\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 62314 c47784c1587ea7e4425a33495c9de617\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 2095460 145b66848768e0f8330e2edbc88db858\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 138826 7a8a21a09786137a9c13ab56988488ce\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 42386 64c89d29b0f5d0d84536105c6beff329\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 59058 a6cecbd3d78430f46b0317e2c9e0ea45\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 129886 76b18008de98800aed1777ddaf1d0a86\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 246406 43de5e12b7dcd643850775095b120a1c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 49912 e42ce220d1adfac8630ee0eed70ce2b9\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 3378234 976ddc4073eb8acbbd4bdb2d2fb3cf83\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_s390.deb\n Size/MD5 checksum: 477090 d2fd78ee5b1d8b1b93830e5b9d10cea4\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 1612394 aeed09e1c797c6f3c78c2db6adddbd66\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 13513910 e11a313d02af5a5b79733f13ad5a9627\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 133442 e42268cd2ac22a6e0af50701d289d81b\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 138466 b789834cb08512d7f2cf779cf00e60e9\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 62244 8d8fc29313a6ecec4863bc1eaf20b0a7\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 86626712 cbe2e0a6baeba262cf0f6134aca47998\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 238238 3fdf41c36cce556577084517cfe63c6d\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 245044 919c3190e38c7ba7be27bdc24db75653\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-ibase_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 69856 a06755c7fc2a9974ab129bc02b2d7e5c\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 418010 5a8a929c3d633524085bac704917ab55\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 2098292 d926ce20c96607548bfbef73bba1ac8b\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 180832 32e134535beccec0979de7d105ff7490\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 54687724 1088d3a4524de00036f2c88559c7ec07\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 49476 aa94973518edb2faaad42c2205aa930c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 45524 0fb2f6c5e15d90e2aeaaf96289a6ba17\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 60184 9e22d62c7c2d77a7d75644680ab9811c\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 30810 45cf6b13c45cb2811780530b8a60f04a\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 1582588 ff25c993d3d60e229cef37321692a1fd\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 10547182 7243f1579c193aec7c3d472b65383861\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 1376686 edcdf57e4e38b4f3b2937de6b808a0f5\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 3692006 a01a7f3e016589c2eba628a72c554064\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 186504 b008a5e95976305e9412c286195501c1\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 69522 29dfe86fa6214e7dedd4caa3e89f6fec\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 451670 cdd73f76458886fd7fc787d4c7145622\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 4302930 65d8e1404fc0d9cfe0fb1f0e94be0900\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 4349116 3867bd57ca4431d98fe4a476c3580990\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 30802 9a791075b2a61d609b00964e08777ad4\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 457166 c2ffc3b9e5128626418b082aacff0dcf\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 2110668 e01397334eae0b1520ec76d179f4b10b\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 42510 e72b9f8cc81106c60ea68e600166b903\n http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 138498 c32afba000ebf7e606381e014ac6a424\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 42218 882c929eb6b8334340f3483c89e17eae\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 57508 590be78cb50ec0134ef9f1bfbc0e3595\n http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_sparc.deb\n Size/MD5 checksum: 1053648 28d8a618c3eaf32fb797fa56e00a8f81\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "modified": "2010-02-02T22:44:29", "published": "2010-02-02T22:44:29", "id": "DEBIAN:DSA-1988-1:79FED", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2010/msg00027.html", "title": "[SECURITY] [DSA-1988-1] New qt4-x11 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:35:49", "bulletinFamily": "unix", "description": "[1.0.9-50.0.1.el4_8]\n- Added mozilla-oracle-default-prefs.js and mozilla-oracle-default-bookmarks.html\n and removed corresponding RedHat ones\n[1.0.9-50.el4]\n- Added fixes from 1.9.0.15 ", "modified": "2009-10-28T00:00:00", "published": "2009-10-28T00:00:00", "id": "ELSA-2009-1531", "href": "http://linux.oracle.com/errata/ELSA-2009-1531.html", "title": "seamonkey security update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:41", "bulletinFamily": "unix", "description": "firefox:\n[3.0.15-3.0.1.el5_4]\n- Update firstrun and homepage URLs in specfile\n- Added patch oracle-firefox-branding.patch\n- Added firefox-oracle-default-prefs.js/firefox-oracle-default-bookmarks.html\n and removed the corresponding Red Hat ones\n[3.0.15-3]\n- Rebuild due to Mozilla's respin\n[3.0.15-2]\n- Rebuild due to xulrunner changes\n[3.0.15-1]\n- Update to 3.0.15\nnspr:\n[4.7.6-1]\n- update to 4.7.6\nxulrunner:\n[1.9.0.15-3.0.1.el5_4]\n- Added xulrunner-oracle-default-prefs.js and removed the corresponding\n RedHat one.\n[1.9.0.15-3]\n- Rebuild due to Mozilla's respin\n[1.9.0.15-2]\n- Added remedy patch\n[1.9.0.15-1]\n- Update to 1.9.0.15 ", "modified": "2009-10-28T00:00:00", "published": "2009-10-28T00:00:00", "id": "ELSA-2009-1530", "href": "http://linux.oracle.com/errata/ELSA-2009-1530.html", "title": "firefox security update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-12-11T13:32:24", "bulletinFamily": "unix", "description": "SeaMonkey is an open source Web browser, email and newsgroup client, IRC\nchat client, and HTML editor.\n\nA flaw was found in the way SeaMonkey creates temporary file names for\ndownloaded files. If a local attacker knows the name of a file SeaMonkey is\ngoing to download, they can replace the contents of that file with\narbitrary contents. (CVE-2009-3274)\n\nA heap-based buffer overflow flaw was found in the SeaMonkey string to\nfloating point conversion routines. A web page containing malicious\nJavaScript could crash SeaMonkey or, potentially, execute arbitrary code\nwith the privileges of the user running SeaMonkey. (CVE-2009-1563)\n\nA flaw was found in the way SeaMonkey handles text selection. A malicious\nwebsite may be able to read highlighted text in a different domain (e.g.\nanother website the user is viewing), bypassing the same-origin policy.\n(CVE-2009-3375)\n\nA flaw was found in the way SeaMonkey displays a right-to-left override\ncharacter when downloading a file. In these cases, the name displayed in\nthe title bar differs from the name displayed in the dialog body. An\nattacker could use this flaw to trick a user into downloading a file that\nhas a file name or extension that differs from what the user expected.\n(CVE-2009-3376)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nSeaMonkey. (CVE-2009-3380)\n\nAll SeaMonkey users should upgrade to these updated packages, which correct\nthese issues. After installing the update, SeaMonkey must be restarted for\nthe changes to take effect.", "modified": "2019-03-22T23:42:56", "published": "2009-10-27T04:00:00", "id": "RHSA-2009:1531", "href": "https://access.redhat.com/errata/RHSA-2009:1531", "type": "redhat", "title": "(RHSA-2009:1531) Critical: seamonkey security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2019-12-11T18:23:36", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2009:1531\n\n\nSeaMonkey is an open source Web browser, email and newsgroup client, IRC\nchat client, and HTML editor.\n\nA flaw was found in the way SeaMonkey creates temporary file names for\ndownloaded files. If a local attacker knows the name of a file SeaMonkey is\ngoing to download, they can replace the contents of that file with\narbitrary contents. (CVE-2009-3274)\n\nA heap-based buffer overflow flaw was found in the SeaMonkey string to\nfloating point conversion routines. A web page containing malicious\nJavaScript could crash SeaMonkey or, potentially, execute arbitrary code\nwith the privileges of the user running SeaMonkey. (CVE-2009-1563)\n\nA flaw was found in the way SeaMonkey handles text selection. A malicious\nwebsite may be able to read highlighted text in a different domain (e.g.\nanother website the user is viewing), bypassing the same-origin policy.\n(CVE-2009-3375)\n\nA flaw was found in the way SeaMonkey displays a right-to-left override\ncharacter when downloading a file. In these cases, the name displayed in\nthe title bar differs from the name displayed in the dialog body. An\nattacker could use this flaw to trick a user into downloading a file that\nhas a file name or extension that differs from what the user expected.\n(CVE-2009-3376)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nSeaMonkey. (CVE-2009-3380)\n\nAll SeaMonkey users should upgrade to these updated packages, which correct\nthese issues. After installing the update, SeaMonkey must be restarted for\nthe changes to take effect.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-October/016202.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-October/016203.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-October/016204.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-October/016205.html\n\n**Affected packages:**\nseamonkey\nseamonkey-chat\nseamonkey-devel\nseamonkey-dom-inspector\nseamonkey-js-debugger\nseamonkey-mail\nseamonkey-nspr\nseamonkey-nspr-devel\nseamonkey-nss\nseamonkey-nss-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2009-1531.html", "modified": "2009-10-28T14:22:24", "published": "2009-10-28T14:15:48", "href": "http://lists.centos.org/pipermail/centos-announce/2009-October/016202.html", "id": "CESA-2009:1531", "title": "seamonkey security update", "type": "centos", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-11T18:22:43", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2009:1530\n\n\nMozilla Firefox is an open source Web browser. XULRunner provides the XUL\nRuntime environment for Mozilla Firefox. nspr provides the Netscape\nPortable Runtime (NSPR).\n\nA flaw was found in the way Firefox handles form history. A malicious web\npage could steal saved form data by synthesizing input events, causing the\nbrowser to auto-fill form fields (which could then be read by an attacker).\n(CVE-2009-3370)\n\nA flaw was found in the way Firefox creates temporary file names for\ndownloaded files. If a local attacker knows the name of a file Firefox is\ngoing to download, they can replace the contents of that file with\narbitrary contents. (CVE-2009-3274)\n\nA flaw was found in the Firefox Proxy Auto-Configuration (PAC) file\nprocessor. If Firefox loads a malicious PAC file, it could crash Firefox\nor, potentially, execute arbitrary code with the privileges of the user\nrunning Firefox. (CVE-2009-3372)\n\nA heap-based buffer overflow flaw was found in the Firefox GIF image\nprocessor. A malicious GIF image could crash Firefox or, potentially,\nexecute arbitrary code with the privileges of the user running Firefox.\n(CVE-2009-3373)\n\nA heap-based buffer overflow flaw was found in the Firefox string to\nfloating point conversion routines. A web page containing malicious\nJavaScript could crash Firefox or, potentially, execute arbitrary code with\nthe privileges of the user running Firefox. (CVE-2009-1563)\n\nA flaw was found in the way Firefox handles text selection. A malicious\nwebsite may be able to read highlighted text in a different domain (e.g.\nanother website the user is viewing), bypassing the same-origin policy.\n(CVE-2009-3375)\n\nA flaw was found in the way Firefox displays a right-to-left override\ncharacter when downloading a file. In these cases, the name displayed in\nthe title bar differs from the name displayed in the dialog body. An\nattacker could use this flaw to trick a user into downloading a file that\nhas a file name or extension that differs from what the user expected.\n(CVE-2009-3376)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2009-3374, CVE-2009-3380, CVE-2009-3382)\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Firefox 3.0.15. You can find a link to the Mozilla\nadvisories in the References section of this errata.\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 3.0.15, which corrects these issues. After installing the\nupdate, Firefox must be restarted for the changes to take effect.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-October/016206.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-October/016207.html\n\n**Affected packages:**\nfirefox\nnspr\nnspr-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2009-1530.html", "modified": "2009-10-28T14:45:18", "published": "2009-10-28T14:44:04", "href": "http://lists.centos.org/pipermail/centos-announce/2009-October/016206.html", "id": "CESA-2009:1530", "title": "firefox, nspr security update", "type": "centos", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}