Vulnerability Name:
CVE-2009-0165 (CCN-50377)
Assigned:
2009-04-16
Published:
2009-04-16
Updated:
2019-03-06
Summary:
Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to "g*allocn."
CVSS v3 Severity:
5.3 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Low
Availibility (A):
None
CVSS v2 Severity:
10.0 High
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
)
7.4 High
(Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
4.3 Medium
(CCN CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
)
3.2 Low
(CCN Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
Vulnerability Type:
CWE-189
Vulnerability Consequences:
Other
References:
Source: CCN
Type: Gentoo Bugzilla Bug 263028
< app-text/poppler-0.10.5-r1 JBIG2 Multiple vulnerabilities (CVE-2009-{0146,0147,0165,0166,0195,0799,0800,1179,1180,1181,1182,1183,1187,1188})
Source: CONFIRM
Type: Patch
http://bugs.gentoo.org/show_bug.cgi?id=263028
Source: MITRE
Type: CNA
CVE-2009-0165
Source: APPLE
Type: UNKNOWN
APPLE-SA-2009-06-17-1
Source: APPLE
Type: UNKNOWN
APPLE-SA-2009-05-12
Source: SUSE
Type: UNKNOWN
SUSE-SA:2009:024
Source: SUSE
Type: UNKNOWN
SUSE-SR:2009:010
Source: SUSE
Type: UNKNOWN
SUSE-SR:2009:012
Source: SECUNIA
Type: UNKNOWN
34852
Source: SECUNIA
Type: UNKNOWN
34959
Source: SECUNIA
Type: UNKNOWN
34991
Source: SECUNIA
Type: UNKNOWN
35037
Source: SECUNIA
Type: UNKNOWN
35065
Source: CCN
Type: SA35074
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities
Source: SECUNIA
Type: UNKNOWN
35074
Source: SECUNIA
Type: UNKNOWN
35685
Source: SLACKWARE
Type: UNKNOWN
SSA:2009-129-01
Source: CCN
Type: Apple Web site
About the security content of Security Update 2009-002 / Mac OS X v10.5.7
Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT3549
Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT3639
Source: DEBIAN
Type: UNKNOWN
DSA-1790
Source: DEBIAN
Type: UNKNOWN
DSA-1793
Source: DEBIAN
Type: DSA-1790
xpdf -- multiple vulnerabilities
Source: DEBIAN
Type: DSA-1793
kdegraphics -- multiple vulnerabilities
Source: CCN
Type: Xpdf Web page
Xpdf
Source: MANDRIVA
Type: UNKNOWN
MDVSA-2009:101
Source: CCN
Type: OSVDB ID: 54497
Xpdf on Apple Mac OS X JBIG2 Decoder Unspecified Overflow
Source: BID
Type: UNKNOWN
34568
Source: CCN
Type: BID-34568
Xpdf JBIG2 Processing Multiple Security Vulnerabilities
Source: CERT
Type: US Government Resource
TA09-133A
Source: VUPEN
Type: UNKNOWN
ADV-2009-1297
Source: VUPEN
Type: UNKNOWN
ADV-2009-1621
Source: XF
Type: UNKNOWN
multiple-jbig2-unspecified(50377)
Source: XF
Type: UNKNOWN
multiple-jbig2-unspecified(50377)
Source: SUSE
Type: SUSE-SA:2009:024
cups security problems
Source: SUSE
Type: SUSE-SR:2009:010
SUSE Security Summary Report
Source: SUSE
Type: SUSE-SR:2009:012
SUSE Security Summary Report
Vulnerable Configuration:
Configuration 1
:
cpe:/a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
(Version <= 3.02)
AND
cpe:/a:poppler:poppler:*:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.5:a:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:1.00:a:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:0.93:b:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
OR
cpe:/a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
OR
cpe:/a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
AND
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
OR
cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
OR
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
OR
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
OR
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
OR
cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
OR
cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
OR
cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
OR
cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
OR
cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
OR
cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*
OR
cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
OR
cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:*
OR
cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
OR
cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
OR
cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
OR
cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:org.opensuse.security:def:20090165
V
CVE-2009-0165
2022-05-20
oval:org.opensuse.security:def:32207
P
Security update for util-linux (Moderate)
2021-10-19
oval:org.opensuse.security:def:29435
P
Security update for MozillaFirefox (Important)
2021-10-15
oval:org.opensuse.security:def:32073
P
Security update for sudo (Important)
2021-04-20
oval:org.opensuse.security:def:29399
P
Security update for MozillaFirefox (Important)
2021-01-29
oval:org.opensuse.security:def:31988
P
Security update for java-1_7_1-ibm (Important)
2020-12-01
oval:org.opensuse.security:def:32705
P
libarchive2 on GA media (Moderate)
2020-12-01
oval:org.opensuse.security:def:28408
P
Security update for subversion (Important)
2020-12-01
oval:org.opensuse.security:def:27977
P
Security update for LibVNCServer (Critical)
2020-12-01
oval:org.opensuse.security:def:32766
P
pcsc-ccid on GA media (Moderate)
2020-12-01
oval:org.opensuse.security:def:28613
P
Security update for xorg-x11-server
2020-12-01
oval:org.opensuse.security:def:32300
P
Security update for python (Moderate)
2020-12-01
oval:org.opensuse.security:def:27989
P
Security update for MozillaFirefox, MozillaFirefox-branding-SLED, firefox-gcc5, mozilla-nss (Important)
2020-12-01
oval:org.opensuse.security:def:33448
P
Security update for glib2
2020-12-01
oval:org.opensuse.security:def:28701
P
Security update for gnutls (Moderate)
2020-12-01
oval:org.opensuse.security:def:32444
P
Security update for xen (Important)
2020-12-01
oval:org.opensuse.security:def:28183
P
Security update for various KMPs (Moderate)
2020-12-01
oval:org.opensuse.security:def:31987
P
Security update for java-1_7_1-ibm (Important)
2020-12-01
oval:org.opensuse.security:def:28761
P
Security update for libqt4
2020-12-01
oval:org.opensuse.security:def:32656
P
enscript on GA media (Moderate)
2020-12-01
oval:org.opensuse.security:def:28324
P
Security update for perl (Moderate)
2020-12-01
oval:org.opensuse.security:def:31999
P
Security update for xorg-x11-server (Important)
2020-12-01
oval:org.opensuse.security:def:32744
P
logwatch on GA media (Moderate)
2020-12-01
oval:org.opensuse.security:def:28560
P
Security update for hplip
2020-12-01
oval:org.opensuse.security:def:27978
P
Security update for MozillaFirefox (Critical)
2020-12-01
oval:org.opensuse.security:def:32810
P
xorg-x11-libs-32bit on GA media (Moderate)
2020-12-01
oval:org.opensuse.security:def:28662
P
Security update for finch
2020-12-01
oval:org.opensuse.security:def:32357
P
Security update for squid3 (Important)
2020-12-01
oval:org.opensuse.security:def:28053
P
Security update for cvs (Moderate)
2020-12-01
oval:org.opensuse.security:def:33487
P
Security update for libpoppler4
2020-12-01
oval:org.opensuse.security:def:28717
P
Security update for kdebase4-workspace
2020-12-01
oval:org.opensuse.security:def:32600
P
quagga on GA media (Moderate)
2020-12-01
oval:org.opensuse.security:def:28267
P
Security update for mercurial (Moderate)
2020-12-01
oval:org.mitre.oval:def:13235
P
DSA-1793-1 kdegraphics -- multiple
2015-02-23
oval:org.mitre.oval:def:7864
P
DSA-1793 kdegraphics -- multiple vulnerabilities
2015-02-23
oval:org.mitre.oval:def:13355
P
USN-973-1 -- koffice vulnerabilities
2014-06-30
oval:org.mitre.oval:def:7718
P
DSA-1790 xpdf -- multiple vulnerabilities
2014-06-23
oval:org.mitre.oval:def:13119
P
DSA-1790-1 xpdf -- multiple
2014-06-23
oval:org.debian:def:1793
V
multiple vulnerabilities
2009-05-06
oval:org.debian:def:1790
V
multiple vulnerabilities
2009-05-05
oval:com.ubuntu.cosmic:def:200901650000000
V
CVE-2009-0165 on Ubuntu 18.10 (cosmic) - low.
2009-04-23
oval:com.ubuntu.artful:def:20090165000
V
CVE-2009-0165 on Ubuntu 17.10 (artful) - low.
2009-04-23
oval:com.ubuntu.trusty:def:20090165000
V
CVE-2009-0165 on Ubuntu 14.04 LTS (trusty) - low.
2009-04-23
oval:com.ubuntu.bionic:def:200901650000000
V
CVE-2009-0165 on Ubuntu 18.04 LTS (bionic) - low.
2009-04-23
oval:com.ubuntu.bionic:def:20090165000
V
CVE-2009-0165 on Ubuntu 18.04 LTS (bionic) - low.
2009-04-23
oval:com.ubuntu.xenial:def:20090165000
V
CVE-2009-0165 on Ubuntu 16.04 LTS (xenial) - low.
2009-04-23
oval:com.ubuntu.xenial:def:200901650000000
V
CVE-2009-0165 on Ubuntu 16.04 LTS (xenial) - low.
2009-04-23
oval:com.ubuntu.cosmic:def:20090165000
V
CVE-2009-0165 on Ubuntu 18.10 (cosmic) - low.
2009-04-23
oval:com.ubuntu.disco:def:200901650000000
V
CVE-2009-0165 on Ubuntu 19.04 (disco) - low.
2009-04-23
oval:com.ubuntu.precise:def:20090165000
V
CVE-2009-0165 on Ubuntu 12.04 LTS (precise) - low.
2009-04-23
BACK
foolabs
xpdf 0.5a
foolabs
xpdf 0.7a
foolabs
xpdf 0.91a
foolabs
xpdf 0.91b
foolabs
xpdf 0.91c
foolabs
xpdf 0.92a
foolabs
xpdf 0.92b
foolabs
xpdf 0.92c
foolabs
xpdf 0.92d
foolabs
xpdf 0.92e
foolabs
xpdf 0.93a
foolabs
xpdf 0.93b
foolabs
xpdf 0.93c
foolabs
xpdf 1.00a
foolabs
xpdf 3.0.1
glyphandcog
xpdfreader 0.2
glyphandcog
xpdfreader 0.3
glyphandcog
xpdfreader 0.4
glyphandcog
xpdfreader 0.5
glyphandcog
xpdfreader 0.6
glyphandcog
xpdfreader 0.7
glyphandcog
xpdfreader 0.80
glyphandcog
xpdfreader 0.90
glyphandcog
xpdfreader 0.91
glyphandcog
xpdfreader 0.92
glyphandcog
xpdfreader 0.93
glyphandcog
xpdfreader 1.00
glyphandcog
xpdfreader 1.01
glyphandcog
xpdfreader 2.00
glyphandcog
xpdfreader 2.01
glyphandcog
xpdfreader 2.02
glyphandcog
xpdfreader 2.03
glyphandcog
xpdfreader 3.00
glyphandcog
xpdfreader 3.01
glyphandcog
xpdfreader *
poppler
poppler *
foolabs
xpdf 3.01
apple
mac os x 10.5
foolabs
xpdf 3.02
apple
mac os x server 10.5
apple
mac os x 10.4.11
apple
mac os x 10.5.1
apple
mac os x server 10.4.11
apple
mac os x server 10.5.1
apple
mac os x 10.5.2
apple
mac os x server 10.5.2
apple
mac os x server 10.5.3
apple
mac os x 10.5.3
apple
mac os x 10.5.4
apple
mac os x server 10.5.4
apple
mac os x 10.5.5
apple
mac os x server 10.5.5
apple
mac os x 10.5.6
apple
mac os x server 10.5.6
foolabs
xpdf 0.90
foolabs
xpdf 0.80
foolabs
xpdf 0.7a
foolabs
xpdf 0.4
foolabs
xpdf 0.3
foolabs
xpdf 0.2
foolabs
xpdf 0.7
foolabs
xpdf 0.6
foolabs
xpdf 0.5a
foolabs
xpdf 0.5 a
foolabs
xpdf 0.91a
foolabs
xpdf 0.92
foolabs
xpdf 0.91
foolabs
xpdf 0.91c
foolabs
xpdf 0.91b
foolabs
xpdf 0.92c
foolabs
xpdf 0.92d
foolabs
xpdf 0.92a
foolabs
xpdf 0.92b
foolabs
xpdf 0.92e
foolabs
xpdf 1.00 a
foolabs
xpdf 1.01
foolabs
xpdf 0.93c
foolabs
xpdf 1.00a
foolabs
xpdf 2.02
foolabs
xpdf 2.00
foolabs
xpdf 2.01
foolabs
xpdf 0.93a
foolabs
xpdf 0.93b
foolabs
xpdf 0.93 b
foolabs
xpdf 2.03
foolabs
xpdf 3.0.1
foolabs
xpdf 3.00
mandrakesoft
mandrake linux corporate server 3.0
novell
linux desktop 9
mandrakesoft
mandrake linux corporate server 4.0
mandrakesoft
mandrake linux corporate server 4.0
mandrakesoft
mandrake linux corporate server 3.0
mandrakesoft
mandrake linux 2008.0
debian
debian linux 4.0
mandrakesoft
mandrake linux 2008.0
mandrakesoft
mandrake linux 2008.1 x86_64
novell
open enterprise server *
novell
opensuse 10.3
mandrakesoft
mandrake linux 2008.1
novell
opensuse 11.0
novell
suse linux enterprise server 10 sp2
mandriva
linux 2009.0
mandriva
linux 2009.0 -
debian
debian linux 5.0
mandriva
enterprise server 5
mandriva
enterprise server 5