|
|
Subscribe / Log in / New account

Security

HTTPS Everywhere brings HTTPS almost everywhere

June 30, 2010

This article was contributed by Nathan Willis

Widespread end-to-end encryption for online communication often seems like a pipe dream: few email users bother with PGP, still fewer VoIP users ever use SRTP or ZRTP. But the one area where the general public has caught on to the need for secure transport channels is in web traffic, thanks to electronic commerce. The Electronic Frontier Foundation (EFF) recently released a Firefox extension called HTTPS Everywhere that leverages the widespread availability of HTTPS connections among popular Internet services. HTTPS Everywhere automatically rewrites URLs for a variety of providers, from software-as-a-service offerings to news outlets. The add-on is not configured to rewrite every URL by default, but it is a plug-and-play security enhancement.

In the initial HTTPS Everywhere announcement on June 17, Peter Eckersly said that the inspiration for the project was Google's launch of an HTTPS-encrypted search service in May. He later told ZDNet that the initial goal of the add-on was to create a tool to encrypt all Google searches (the Google HTTPS service initially worked only through the www.google.com domain and not the localized, international Google sites), but was quickly extended to other sites once the team — which also includes volunteers from the Tor (aka The Onion Router) project — found how simple it was.

HTTPS Everywhere is built on top of code that originated in the NoScript project, modified both to be easier to use and with additional functionality. Thus far, the extension is only available on the EFF's project page, not through the official Mozilla Add-ons site. The latest release is 0.1.2, though unfortunately no Firefox version-compatibility information is provided.

[preferences]

When installed, the extension provides a very simple preferences interface: a single pop-up window with checkboxes for each supported site or service. The result is instantaneous rewriting of URL requests to keep traffic on TLS or SSL encrypted HTTPS connections — including the initial request and subsequent internal links. The effect of checking or unchecking a site is instantaneous as of the next URL request; however it should be noted that previously-rewritten URLs already in the location bar or history are not "reverted" merely by changing the extension's preferences.

What it does

HTTPS Everywhere works by rewriting URLs based on matching requests against a series of regular-expression-based rules. Each rule is specific to a service, so that users can deactivate particular rules if they prove problematic. That is a valid concern, as some sites provide HTTPS connections, but do not offer the same services as they do over HTTP. Google Search, for example, supports web, video, news, books, blog, microblog, and forum content over HTTPS, but not image or shopping content. Many users have reported that using Facebook's HTTPS service disables the built-in chat client.

The current list of supported sites includes Google's search and services (such as Gmail and Google Voice) as separately-selectable options, as well as Facebook, Identi.ca, Twitter, the DuckDuckGo, Scroogle, and Ixquick search engines, Wikipedia, the New York Times, the Washington Post, the EFF, Mozilla, and Tor sites, San Francisco hacker space Noisebridge, and the Gentoo project's Bugzilla. Users can write their own URL matching and rewriting rules by following a tutorial at the HTTPS Everywhere site. Authors are encouraged to send in their creations to the project for possible inclusion in subsequent releases.

Rule sets use a simple XML format; each ruleset element can contain one or more rule elements with a "from" and "to" pattern to map the rewriting required. The patterns use JavaScript regular expressions, which is part of why HTTPS Everywhere can provide more redirects than NoScript's simple HTTP-to-HTTPS replacement.

An example from the site is Wikipedia, which runs an HTTPS server at secure.wikimedia.org, but not at the language-specific host names, such as sm.wikipedia.org or uk.wikipedia.org. HTTPS Everywhere's ruleset rewrites http://en.wikipedia.org/wiki/Example to https://secure.wikimedia.org/wikipedia/en/wiki/Example. HTTPS Everywhere also supports exclusion rules to work around HTTP-only subdomains in an otherwise HTTPS-supported domain, and it can gracefully downgrade to HTTP for sites that automatically redirect HTTPS requests to HTTP, without getting trapped in a loop .

Eckersly said that he hopes NoScript will be able to incorporate some of HTTPS Everywhere's enhancements back into its own extension, but for the foreseeable future intends to keep offering HTTPS Everywhere as its own, easy-to-use alternative.

What it doesn't

HTTPS Everywhere simply rewrites the outgoing URL requested by the browser, so it is only of use with sites already running an HTTPS server. Tor, in contrast, provides an encrypted first-step channel into the anonymous Tor network for every site visited, though the last step link from Tor to HTTP-only web sites is, of course, not encrypted.

EFF points out that users using HTTPS Everywhere may still see the broken-lock icon in Firefox for some sites, because many services use HTTP servers for some of their own page content (such as images) and to include insecure third-party content.

It is also important to note that while HTTPS encrypts the connection to the server and the resource path portion of the requested URL, the server name portion of the request is still visible (not only through setting up the connection, of course, but also potentially via DNS lookup). In addition, although HTTPS Everywhere can encrypt cookie requests over HTTPS, it does not provide the stronger cookie-management policies of NoScript. Thus, while eavesdroppers and credential thieves will be set back by HTTPS Everywhere, it does not encompass every security and privacy feature.

Finally, the genuinely paranoid no doubt know that encryption does not mean anonymity. Your IP address is visible in every request, and user tracking can be performed in many esoteric ways without peeking at the contents of the sites you read. The latter danger is ingeniously displayed by EFF's own Panopticlick, which gathers potentially trackable information from request headers, browser plugins, fonts, and other system information.

Security everywhere

The HTTPS Everywhere page discusses several similar secure-browsing alternatives, in addition to the aforementioned NoScript and Tor. Sid Stamm's Force-TLS is a Firefox extension that implements Strict Transport Security (STS) — although STS itself does not encrypt the initial request, it only tells the user agent to use HTTPS for subsequent requests, making it marginally less secure. Stanford's ForceHTTPS also includes a custom database of URL rewriting schemes, but was only released as a prototype in 2008, supporting Gmail and a handful of banking web sites.

The Chrome extension KB SSL Enforcer receives a little heat on the HTTPS Everywhere site, because it loads both HTTP and HTTPS requests for each page, thus potentially exposing the HTTP page to eavesdroppers. According to the developer, this is due to limitations in Chrome's APIs. Eckersley said that HTTPS Everywhere uses multiple Firefox APIs, including nsIObserver, nsIContentPolicy, and nsITraceableChannel, to try to capture every request path — even favicons and requests initiated by other add-ons — but still welcomes further networking testing by users.

The project reports that it has received dozens of user-contributed rulesets, including many for high-traffic sites, but that merging them all into a new default rule set for the next release will take some time. A 0.2.x "development" branch XPI installer was uploaded to the site on June 29th, which incorporates some of these additions.

Privacy and security online is a non-stop arms race between exploit-crafters and those making tools to thwart them. In that context, HTTPS Everywhere is not a perfect solution, but for many people it is an excellent, easy-to-use way to secure a large chunk of their daily web traffic.

Comments (21 posted)

Brief items

Quotes of the week

That's right: your blender is under attack! Most mixers are self-contained and not hackable, but Siciliano says many home automation systems tap into appliances such as blenders and coffee machines. These home networks are then open to attack in surprising ways: A hacker might turn on the blender from outside your home to distract you as he sneaks in a back window, he warns.
-- Fox News hypes "hacker" threats (by way of Bruce Schneier)

To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the real-time geographic location of your Apple computer or device. This location data is collected anonymously in a form that does not personally identify you and is used by Apple and our partners and licensees to provide and improve location-based products and services.
-- dark reading looks at a revision to Apple's privacy policy that its users cannot opt out of

Comments (7 posted)

Researcher 'Fingerprints' The Bad Guys Behind The Malware (dark reading)

Dark reading looks at a presentation at the upcoming Black Hat conference about research on "fingerprinting" malware authors. Greg Hoglund, founder and CEO of HBGary, also plans to release a free fingerprinting tool at the conference. "A single clue alone might not mean much until you start combining multiple clues together, he says. His fingerprinting tool will help incident responders do exactly that: 'The fingerprint tool will tell them interesting clues as to the artifacts left behind in the [malware] development environment -- what version compiler was used, the original project name even if they changed the name of the file, which is common,' he says. 'A lot of attackers rename their attack to something that sounds innocuous, but sometimes you can extract the original project name, and find a path on the hard drive and libraries. When you combine all of this together, it creates a fingerprint [of the attacker].'"

Comments (none posted)

New vulnerabilities

kvirc: multiple vulnerabilities

Package(s):kvirc CVE #(s):CVE-2010-2451 CVE-2010-2452
Created:June 28, 2010 Updated:August 13, 2010
Description: From the Debian advisory:

Two security issues have been discovered in the DCC protocol support code of kvirc, a KDE-based next generation IRC client, which allow the overwriting of local files through directory traversal and the execution of arbitrary code through a format string attack.

Alerts:
Gentoo 201402-20 kvirc 2014-02-21
Pardus 2010-115 kvirc 2010-08-12
SUSE SUSE-SR:2010:014 OpenOffice_org, apache2-slms, aria2, bogofilter, cifs-mount/samba, clamav, exim, ghostscript-devel, gnutls, krb5, kvirc, lftp, libpython2_6-1_0, libtiff, libvorbis, lxsession, mono-addon-bytefx-data-mysql/bytefx-data-mysql, moodle, openldap2, opera, otrs, popt, postgresql, python-mako, squidGuard, vte, w3m, xmlrpc-c, XFree86/xorg-x11, yast2-webclient 2010-08-02
Debian DSA-2065-1 kvirc 2010-06-27
openSUSE openSUSE-SU-2010:0354-1 KVIrc 2010-07-05

Comments (none posted)

lftp: mysterious vulnerability

Package(s):lftp CVE #(s):CVE-2010-2251
Created:June 30, 2010 Updated:October 27, 2010
Description: The lftp file transfer program has been updated due to a "multiple HTTP client download filename vulnerability."
Alerts:
Gentoo 201412-08 insight, perl-tk, sourcenav, tk, partimage, bitdefender-console, mlmmj, acl, xinit, gzip, ncompress, liblzw, splashutils, m4, kdm, gtk+, kget, dvipng, beanstalkd, pmount, pam_krb5, gv, lftp, uzbl, slim, iputils, dvbstreamer 2014-12-11
rPath rPSA-2010-0073-1 lftp 2010-10-27
Ubuntu USN-984-1 lftp 2010-09-07
Debian DSA-2085-1 lftp 2010-08-03
CentOS CESA-2010:0585 lftp 2010-08-03
Red Hat RHSA-2010:0585-01 lftp 2010-08-02
SUSE SUSE-SR:2010:014 OpenOffice_org, apache2-slms, aria2, bogofilter, cifs-mount/samba, clamav, exim, ghostscript-devel, gnutls, krb5, kvirc, lftp, libpython2_6-1_0, libtiff, libvorbis, lxsession, mono-addon-bytefx-data-mysql/bytefx-data-mysql, moodle, openldap2, opera, otrs, popt, postgresql, python-mako, squidGuard, vte, w3m, xmlrpc-c, XFree86/xorg-x11, yast2-webclient 2010-08-02
Fedora FEDORA-2010-9819 lftp 2010-06-14
Mandriva MDVSA-2010:128 lftp 2010-07-06

Comments (4 posted)

libpng: buffer overflow and memory leak

Package(s):libpng CVE #(s):CVE-2010-1205 CVE-2010-2249
Created:June 30, 2010 Updated:January 19, 2011
Description: The libpng library suffers from a buffer overflow and a memory leak exploitable via a malicious image file.
Alerts:
Gentoo 201412-08 insight, perl-tk, sourcenav, tk, partimage, bitdefender-console, mlmmj, acl, xinit, gzip, ncompress, liblzw, splashutils, m4, kdm, gtk+, kget, dvipng, beanstalkd, pmount, pam_krb5, gv, lftp, uzbl, slim, iputils, dvbstreamer 2014-12-11
Gentoo 201412-11 emul-linux-x86-baselibs 2014-12-11
openSUSE openSUSE-SU-2014:1100-1 Firefox 2014-09-09
Gentoo 201301-01 firefox 2013-01-07
Oracle ELSA-2012-0317 libpng 2012-02-21
MeeGo MeeGo-SA-10:21 libpng 2010-09-03
SUSE SUSE-SR:2010:017 java-1_4_2-ibm, sudo, libpng, php5, tgt, iscsitarget, aria2, pcsc-lite, tomcat5, tomcat6, lvm2, libvirt, rpm, libtiff, dovecot12 2010-09-21
openSUSE openSUSE-SU-2010:0594-1 libpng 2010-09-09
openSUSE openSUSE-SU-2010:0430-4 MozillaThunderbird 2010-08-23
CentOS CESA-2010:0546 seamonkey 2010-08-16
CentOS CESA-2010:0534 libpng 2010-08-16
SUSE SUSE-SA:2010:032 MozillaFirefox,MozillaThunderbird,seamonkey 2010-07-30
openSUSE openSUSE-SU-2010:0430-3 MozillaFirefox 2010-07-29
Debian DSA-2075-1 xulrunner 2010-07-27
openSUSE openSUSE-SU-2010:0430-2 MozillaThunderbird 2010-07-27
Fedora FEDORA-2010-10776 mingw32-libpng 2010-07-06
Fedora FEDORA-2010-10793 mingw32-libpng 2010-07-06
Ubuntu USN-958-1 thunderbird 2010-07-26
openSUSE openSUSE-SU-2010:0430-1 seamonkey 2010-07-26
Ubuntu USN-930-5 ant, apturl, epiphany-browser, gluezilla, gnome-python-extras, liferea, mozvoikko, openjdk-6, packagekit, ubufox, webfav, yelp 2010-07-23
Ubuntu USN-930-4 firefox-3.0, firefox-3.5, xulrunner-1.9.2 2010-07-23
Ubuntu USN-957-1 firefox, firefox-3.0, xulrunner-1.9.2 2010-07-23
Fedora FEDORA-2010-11361 sunbird 2010-07-23
Fedora FEDORA-2010-11379 sunbird 2010-07-23
Fedora FEDORA-2010-11361 thunderbird 2010-07-23
Fedora FEDORA-2010-11379 thunderbird 2010-07-23
Fedora FEDORA-2010-11375 galeon 2010-07-23
Fedora FEDORA-2010-11345 galeon 2010-07-23
Fedora FEDORA-2010-11375 perl-Gtk2-MozEmbed 2010-07-23
Fedora FEDORA-2010-11345 perl-Gtk2-MozEmbed 2010-07-23
Fedora FEDORA-2010-11375 gnome-python2-extras 2010-07-23
Fedora FEDORA-2010-11345 gnome-python2-extras 2010-07-23
Fedora FEDORA-2010-11375 gnome-web-photo 2010-07-23
Fedora FEDORA-2010-11345 gnome-web-photo 2010-07-23
Fedora FEDORA-2010-11375 mozvoikko 2010-07-23
Fedora FEDORA-2010-11345 mozvoikko 2010-07-23
Fedora FEDORA-2010-11375 xulrunner 2010-07-23
Fedora FEDORA-2010-11345 xulrunner 2010-07-23
Fedora FEDORA-2010-11363 seamonkey 2010-07-23
Fedora FEDORA-2010-11327 seamonkey 2010-07-23
Gentoo 201010-01 libpng 2010-10-05
Fedora FEDORA-2010-11375 firefox 2010-07-23
Fedora FEDORA-2010-11345 firefox 2010-07-23
CentOS CESA-2010:0545 thunderbird 2010-07-22
CentOS CESA-2010:0534 libpng 2010-07-21
Fedora FEDORA-2010-10833 libpng10 2010-07-06
Fedora FEDORA-2010-10823 libpng10 2010-07-06
CentOS CESA-2010:0534 libpng 2010-07-14
Red Hat RHSA-2010:0534-01 libpng 2010-07-14
Red Hat RHSA-2010:0547-01 firefox 2010-07-20
Debian DSA-2072-1 libpng 2010-07-19
Fedora FEDORA-2010-10592 libpng 2010-06-30
CentOS CESA-2010:0534 libpng 2010-07-21
Red Hat RHSA-2010:0546-01 seamonkey 2010-07-20
Red Hat RHSA-2010:0545-01 thunderbird 2010-07-20
Mandriva MDVSA-2010:133 libpng 2010-07-15
Fedora FEDORA-2010-10557 libpng 2010-06-30
Slackware SSA:2010-180-01 libpng 2010-06-30
CentOS CESA-2010:0547 firefox 2010-07-22
Ubuntu USN-960-1 libpng 2010-07-08
Pardus 2010-96 libpng 2010-07-08

Comments (none posted)

mozilla: multiple vulnerabilities

Package(s):mozilla CVE #(s):CVE-2010-1201 CVE-2010-0183 CVE-2008-5913
Created:June 24, 2010 Updated:January 21, 2011
Description:

From CVE-2010-1201: Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.10, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

From the Red Hat Bugzilla entry for CVE-2010-0183: Security researcher wushi of team509 reported that the frame construction process for certain types of menus could result in a menu containing a pointer to a previously freed menu item. During the cycle collection process this freed item could be accessed, resulting in the execution of a section of code potentially controlled by an attacker.

From the Red Hat Bugzilla entry for CVE-2008-5913: An unspecified function in the JavaScript implementation in Mozilla Firefox creates and exposes a "temporary footprint" when there is a current login to a web site, which makes it easier for remote attackers to trick a user into acting upon a spoofed pop-up message, aka an "in-session phishing attack."

Alerts:
openSUSE openSUSE-SU-2014:1100-1 Firefox 2014-09-09
Gentoo 201301-01 firefox 2013-01-07
MeeGo MeeGo-SA-10:39 firefox 2010-10-09
MeeGo MeeGo-SA-10:12 Firefox 2010-08-03
CentOS CESA-2010:0500 firefox 2010-08-06
Ubuntu USN-930-5 ant, apturl, epiphany-browser, gluezilla, gnome-python-extras, liferea, mozvoikko, openjdk-6, packagekit, ubufox, webfav, yelp 2010-07-23
Ubuntu USN-930-4 firefox-3.0, firefox-3.5, xulrunner-1.9.2 2010-07-23
Fedora FEDORA-2010-11361 sunbird 2010-07-23
Fedora FEDORA-2010-11361 thunderbird 2010-07-23
Mandriva MDVSA-2010:125 firefox 2010-06-24
Fedora FEDORA-2010-10361 xulrunner 2010-06-24
Fedora FEDORA-2010-10344 xulrunner 2010-06-24
Fedora FEDORA-2010-10361 firefox 2010-06-24
Fedora FEDORA-2010-10344 firefox 2010-06-24
Fedora FEDORA-2010-10363 seamonkey 2010-06-24
Fedora FEDORA-2010-10329 seamonkey 2010-06-24
SUSE SUSE-SA:2010:030 MozillaFirefox,mozilla-xulrunner191 2010-07-09
openSUSE openSUSE-SU-2010:0358-2 MozillaFirefox 2010-06-22
openSUSE openSUSE-SU-2010:0358-1 MozillaThunderbird 2010-07-07
Pardus 2010-89 thunderbird 2010-06-30
Ubuntu USN-930-2 apturl, epiphany-browser, gecko-sharp, gnome-python-extras, liferea, rhythmbox, totem, ubufox, yelp 2010-06-29
Ubuntu USN-930-1 firefox, firefox-3.0, xulrunner-1.9.2 2010-06-29
Fedora FEDORA-2010-10361 gnome-python2-extras 2010-06-24
Fedora FEDORA-2010-10344 gnome-python2-extras 2010-06-24
Fedora FEDORA-2010-10361 mozvoikko 2010-06-24
Fedora FEDORA-2010-10344 mozvoikko 2010-06-24
Fedora FEDORA-2010-10361 perl-Gtk2-MozEmbed 2010-06-24
Fedora FEDORA-2010-10344 perl-Gtk2-MozEmbed 2010-06-24
Ubuntu USN-943-1 thunderbird 2010-07-06
Debian DSA-2064-1 xulrunner 2010-06-27
Fedora FEDORA-2010-10361 gnome-web-photo 2010-06-24
Ubuntu USN-930-3 firefox 2010-06-30
CentOS CESA-2010:0501 firefox 2010-06-24
Fedora FEDORA-2010-10361 galeon 2010-06-24
Fedora FEDORA-2010-10344 galeon 2010-06-24
Fedora FEDORA-2010-10344 gnome-web-photo 2010-06-24

Comments (none posted)

perl-libwww: unexpected download filename

Package(s):perl-libwww CVE #(s):CVE-2010-2253
Created:June 24, 2010 Updated:November 3, 2010
Description:

From the oCERT advisory:

Unsafe behaviours have been found in lftp and lwp-download handling the Content-Disposition header in conjunction with the 'suggested filename' functionality. Additionally, unsafe behaviours have been found in wget and lwp-download in the case of HTTP 3xx redirections during file downloading. The two applications automatically use the URL's filename portion specified in the Location header. Implicitly trusting the suggested filenames results in a saved file that differs from the expected one according to the URL specified by the user. This can be used by an attacker-controlled server to silently write hidden and/or initialization files under the user's current directory (e.g. .login, .bashrc).

Alerts:
Gentoo 201402-04 libwww-perl 2014-02-04
Fedora FEDORA-2010-15532 perl-libwww-perl 2010-09-30
Fedora FEDORA-2010-15405 perl-libwww-perl 2010-09-28
Mandriva MDVSA-2010:167 perl-libwww-perl 2010-08-31
Ubuntu USN-981-1 libwww-perl 2010-08-31
Pardus 2010-85 perl-libwww 2010-06-24

Comments (none posted)

python-paste: cross-site scripting/arbitrary javascript execution

Package(s):python-paste CVE #(s):
Created:June 28, 2010 Updated:June 30, 2010
Description: From the Fedora advisory:

The only real change is to paste.httpexceptions, which was using insecure quoting of some parameters and allowed an XSS hole, most specifically with its 404 messages. The most notably WSGI application using this is paste.urlparse.StaticURLParser and PkgResourcesParser. By directing someone to an appropriately formed URL an attacker can execute arbitrary Javascript on the victim's client. paste.urlmap.URLMap is also affected, but only if you have no application attached to /. Other applications using paste.httpexceptions may be effected (especially HTTPNotFound). WebOb/webob.exc.HTTPNotFound is not affected.

Alerts:
Fedora FEDORA-2010-10383 python-paste 2010-06-25
Fedora FEDORA-2010-10414 python-paste 2010-06-25
Fedora FEDORA-2010-10400 python-paste 2010-06-25

Comments (none posted)

ruby WEBrick: cross-site scripting

Package(s):ruby CVE #(s):CVE-2010-0541
Created:June 30, 2010 Updated:August 15, 2011
Description: The ruby WEBrick web server suffers from a cross-site scripting vulnerability exploitable via error pages.
Alerts:
Ubuntu USN-1377-1 ruby1.8 2012-02-27
CentOS CESA-2011:0908 ruby 2011-08-14
CentOS CESA-2011:0909 ruby 2011-06-30
Scientific Linux SL-ruby-20110628 ruby 2011-06-28
Scientific Linux SL-ruby-20110628 ruby 2011-06-28
Red Hat RHSA-2011:0909-01 ruby 2011-06-28
Red Hat RHSA-2011:0908-01 ruby 2011-06-28
openSUSE openSUSE-SU-2011:0561-1 ruby 2011-05-31
Mandriva MDVSA-2011:098 ruby 2011-05-23
Mandriva MDVSA-2011:097 ruby 2011-05-23
MeeGo MeeGo-SA-10:19 ruby 2010-08-03
Fedora FEDORA-2010-13341 ruby 2010-08-23
Fedora FEDORA-2010-13387 ruby 2010-08-23
Pardus 2010-90 ruby 2010-06-30

Comments (none posted)

wireshark: multiple vulnerabilities

Package(s):wireshark CVE #(s):CVE-2010-2283 CVE-2010-2284 CVE-2010-2285 CVE-2010-2286 CVE-2010-2287
Created:June 30, 2010 Updated:June 15, 2011
Description: Wireshark has new set of dissector vulnerabilities with "unknown impact and remote attack vectors."
Alerts:
Gentoo 201110-02 wireshark 2011-10-09
Fedora FEDORA-2011-7858 wireshark 2011-06-03
SUSE SUSE-SR:2011:007 NetworkManager, OpenOffice_org, apache2-slms, dbus-1-glib, dhcp/dhcpcd/dhcp6, freetype2, kbd, krb5, libcgroup, libmodplug, libvirt, mailman, moonlight-plugin, nbd, openldap2, pure-ftpd, python-feedparser, rsyslog, telepathy-gabble, wireshark 2011-04-19
Fedora FEDORA-2011-2620 wireshark 2011-03-04
openSUSE openSUSE-SU-2011:0010-2 wireshark 2011-01-12
SUSE SUSE-SR:2011:001 finch/pidgin, libmoon-devel/moonlight-plugin, libsmi, openssl, perl-CGI-Simple, supportutils, wireshark 2011-01-11
SUSE SUSE-SR:2011:002 ed, evince, hplip, libopensc2/opensc, libsmi, libwebkit, perl, python, sssd, sudo, wireshark 2011-01-25
openSUSE openSUSE-SU-2011:0010-1 wireshark 2011-01-04
Fedora FEDORA-2010-13427 wireshark 2010-08-24
Fedora FEDORA-2010-13416 wireshark 2010-08-24
CentOS CESA-2010:0625 wireshark 2010-08-27
CentOS CESA-2010:0625 wireshark 2010-08-23
Pardus 2010-113 wireshark 2010-08-12
Red Hat RHSA-2010:0625-01 wireshark 2010-08-11
Mandriva MDVSA-2010:144 wireshark 2010-08-04
Debian DSA-2066-1 wireshark 2010-07-01
Pardus 2010-93 wireshark 2010-06-30

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2010, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds