CINXE.COM
maemo.org - Reporting security issues: Reporting security issues in Maemo
<?xml version="1.0"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <title>maemo.org - Reporting security issues: Reporting security issues in Maemo</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8" /> <link rel="stylesheet" href="http://static.maemo.org:81/style_maemo2009/css/reset.css" type="text/css" media="screen" charset="utf-8" /> <link rel="stylesheet" href="http://static.maemo.org:81/style_maemo2009/css/master.css" type="text/css" media="screen" charset="utf-8" /> <!--[if lte IE 6]> <link rel="stylesheet" href="http://static.maemo.org:81/style_maemo2009/css/ie.css" type="text/css" media="screen"> <![endif]--> <!--[if gte IE 7]> <link rel="stylesheet" href="http://static.maemo.org:81/style_maemo2009/css/ie7.css" type="text/css" media="screen"> <![endif]--> <link rel="shortcut icon" href="http://static.maemo.org:81/style_maemo2009/favicon.ico" /> <link rel="stylesheet" type="text/css" href="http://static.maemo.org:81/style_maemo2009/css/print.css" media="print" /> <link rel="shortcut icon" href="http://static.maemo.org:81/style_maemo2009/maemo_favicon.ico" type="image/vnd.microsoft.icon" /> <link rel="icon" href="http://static.maemo.org:81/style_maemo2009/maemo_favicon.ico" type="image/vnd.microsoft.icon" /> <script src="http://www.google.com/jsapi" type="text/javascript"></script> <script type="text/javascript"> google.load('search', '1'); function searchComplete() { if ( jQuery('#content #main').length > 0 && ! jQuery('#content #main #cse').length) { jQuery('#content #main').empty(); jQuery('#cse').appendTo('#content #main'); } else { jQuery('#cse').siblings().empty(); } } google.setOnLoadCallback(function(){ var cseId = '012414234624903107508:2laarii9gbw'; var mSearch = new google.search.SearchControl(); jQuery('#content').append('<div id="cse"></div>'); mSearch.setResultSetSize(google.search.Search.FILTERED_CSE_RESULTSET); var options = new google.search.SearcherOptions(); options.setRoot(document.getElementById("cse")); options.setExpandMode(google.search.SearchControl.EXPAND_MODE_OPEN); var full = new google.search.WebSearch(); full.setSiteRestriction(cseId); mSearch.addSearcher(full, options); var options = new google.search.DrawOptions(); options.setDrawMode(GSearchControl.DRAW_MODE_LINEAR); mSearch.draw('cse-search-form', options); mSearch.setSearchCompleteCallback(this, searchComplete); mSearch.setNoResultsString('Unfortunately there are no results.'); jQuery("td.gsc-input input").DefaultValue("Search "); }, true); </script> <link rel="stylesheet" href="/midcom-static/style_maemo2009/css/google_search.css" type="text/css" /> <script type="text/javascript" src="http://static.maemo.org:81/jQuery/jquery-1.4.2.min.js"></script> <script type="text/javascript"> var MIDCOM_STATIC_URL = 'http://static.maemo.org:81'; var MIDCOM_PAGE_PREFIX = 'http://maemo.org/'; </script> <link rel="openid2.provider" href="http://maemo.org/openid/" /> <link rel="stylesheet" type="text/css" media="screen" href="http://static.maemo.org:81/midcom.services.uimessages/simple.css" /> <link rel="bookmark" href="http://maemo.org/midcom-permalink-7dfc60ec4ebe11de991f210b9118be71be71" /> <link rel="alternate" type="text/html" title="In English" hreflang="en" href="https://newstyle.maemo.org/midcom-permalink-7dfc60ec4ebe11de991f210b9118be71be71" /> <meta name="generator" content="Midgard/8.09.9.99 MidCOM/8.09.9 PHP/5.3.10-1ubuntu3.26" /> <meta name="lastupdated" content="2010-10-25 09:41:59Z" /> <meta name="DC.date" content="2009-06-01" /> <script type="text/javascript" src="http://static.maemo.org:81/style_maemo2009/js/jquery.mousewheel.js"></script> <script type="text/javascript" src="http://static.maemo.org:81/style_maemo2009/js/jScrollPane.js"></script> <script type="text/javascript"> jQuery(document).ready(function() { jQuery('#rss-panel').jScrollPane({scrollbarWidth:15, scrollbarMargin:10, dragMinHeight:50, dragMaxHeight:50}); }); </script> <script type="text/javascript" src="http://static.maemo.org:81/style_maemo2009/js/images.js"></script> <script type="text/javascript"> jQuery(window).load(function() { jQuery.images.init('div.hentry,div.entry-content', 500); }); </script> <script type="text/javascript" src="http://static.maemo.org:81/style_maemo2009/js/jquery.form-defaults.js"></script> <script type="text/javascript"> jQuery(document).ready(function() { jQuery("#username").DefaultValue("Username"); jQuery("#password").DefaultValue("password"); jQuery("#query").DefaultValue("Search "); }); </script> <script type="text/javascript" src="http://static.maemo.org:81/jQuery/jquery.metadata.js"></script> <script type="text/javascript" src="http://static.maemo.org:81/net.nemein.favourites/net_nemein_favourites.js" ></script> <link rel="stylesheet" type="text/css" href="http://static.maemo.org:81/net.nemein.favourites/screen.css" media="screen" /> <script type="text/javascript"> jQuery(document).ready(function(){ jQuery('.net_nemein_favourites').net_nemein_favourites({force_ssl: true}); }); </script> <link rel="stylesheet" href="http://static.maemo.org:81/midcom.helper.datamanager2/legacy.css" type="text/css" media="screen" /> <script src="http://www.google.com/jsapi" type="text/javascript"></script> <script type="text/javascript"> google.load('search', '1'); function searchComplete() { if ( jQuery('#content #main').length > 0 && ! jQuery('#content #main #cse').length) { jQuery('#content #main').empty(); jQuery('#cse').appendTo('#content #main'); } else { jQuery('#cse').siblings().empty(); } } google.setOnLoadCallback(function(){ var cseId = '012414234624903107508:2laarii9gbw'; var mSearch = new google.search.SearchControl(); jQuery('#content').append('<div id="cse"></div>'); mSearch.setResultSetSize(google.search.Search.FILTERED_CSE_RESULTSET); var options = new google.search.SearcherOptions(); options.setRoot(document.getElementById("cse")); options.setExpandMode(google.search.SearchControl.EXPAND_MODE_OPEN); var full = new google.search.WebSearch(); full.setSiteRestriction(cseId); mSearch.addSearcher(full, options); var options = new google.search.DrawOptions(); options.setDrawMode(GSearchControl.DRAW_MODE_LINEAR); mSearch.draw('cse-search-form', options); mSearch.setSearchCompleteCallback(this, searchComplete); mSearch.setNoResultsString('Unfortunately there are no results.'); jQuery("td.gsc-input input").DefaultValue("Search "); }, true); </script> <link rel="stylesheet" href="/midcom-static/style_maemo2009/css/google_search.css" type="text/css" /> </head> <body class="default unapproved net_nehmer_static"> <div id="container"> <div id="header"> <div id="logo"> <a href="http://maemo.org/"><img src="http://static.maemo.org:81/style_maemo2009/img/maemo.jpg" title="maemo.org" alt="maemo.org" /></a> </div><!-- logo --> <div id="user-login"> <div id='midcom_login_form'> <form name="midcom_services_auth_frontend_form" method="post" id="midcom_services_auth_frontend_form" onsubmit="return pseudo_sso()" action="https://maemo.org/community/security/"> <input name="username" id="username" class="input" /> <input name="password" id="password" type="password" class="input" /> <div class="clear"></div> <input type="submit" name="midcom_services_auth_frontend_form_submit" id="midcom_services_auth_frontend_form_submit" value="Login" class="submit"/> </form> <!-- Pseudo-SSO, login to garage.maemo.org as well --> <script language="javascript"> var iframe_submitted = false; var password_store = ''; function pseudo_sso() { if (iframe_submitted) { /* alert('un: ' + document.loginform.form_loginname.value + ', pw: ' + document.loginform.form_pw.value); alert ('second submit, returning true'); */ return true; } username = document.midcom_services_auth_frontend_form.username.value; password = document.midcom_services_auth_frontend_form.password.value; password_store = password; try { iframe = frames['webloginiframe'].document; iframe.write('<form action="https://garage.maemo.org/account/login.php" method="post" name="loginform" id="loginform"> <input type="hidden" name="return_to" value="" /> <p> Login Name:<br /><input type="text" name="form_loginname" value="" /> </p> <p> Password:<br /><input type="password" name="form_pw" /> </p> <p> <input type="submit" name="login" id="loginbutton" value="Login with SSL" /> </p> </form>'); iframe.loginform.form_loginname.value = username; iframe.loginform.form_pw.value = password; iframe.getElementById('loginbutton').click(); iframe_submitted = true; /* TODO: How to capture that the iframe has gotten response ? frames['webloginiframe'].addEventListener('load', resubmit(), false); */ } catch (e) { /* alert('Exception: ' + e); */ } finally { setTimeout('resubmit();', 2000); return false; } } function resubmit() { /* alert('resubmit called'); */ document.midcom_services_auth_frontend_form.password.value = password_store; document.midcom_services_auth_frontend_form.midcom_services_auth_frontend_form_submit.click(); } </script> <iframe name="webloginiframe" id="webloginiframe" style="height: 1px; width: 1px; border: none;"></iframe> <!-- /Pseudo-SSO, login to garage.maemo.org as well --> </div> </div><!-- user-login --> <div id="register"> <a href="https://garage.maemo.org/account/register.php" title="Register at Maemo Garage for a maemo.org account"><img src="http://static.maemo.org:81/style_maemo2009/img/register-button.gif" alt="Register" /> <h3>Register</h3></a> </div> </div> <div id="navigation"> <div id="navigation-left-wrapper"> <div id="navigation-right-wrapper"> <ul> <li><a href="http://maemo.org/downloads/">Downloads</a></li> <li class="selected"><a href="http://maemo.org/community/">Community</a></li> <li><a href="http://maemo.org/development/">Development</a></li> <li><a href="http://maemo.org/news/">News</a></li> <li><a style="background-image: none;" href="http://talk.maemo.org">TALK</a></li> </ul> <div id="search"> <div id="cse-search-form"></div> </div> </div> </div> </div><!-- /navigation --> <div id="breadcrumb"> <a href="http://maemo.org/">maemo.org</a> > <a href="http://maemo.org/community/">Community</a> > Reporting security issues</div> <div id="content"> <!-- content --> <div id="sidebar"> <div id="nav-sub"> <ul class="fi_protie_navigation node-182"> <li> <a href="http://maemo.org/community/bugs_and_features/">Bugs and features</a> </li> <li> <a href="http://maemo.org/community/application-catalog/">Application Catalog</a> </li> <li> <a href="http://maemo.org/community/maemo-users/">User forum</a> </li> <li> <a href="http://maemo.org/community/maemo-developers/">Developer forum</a> </li> <li> <a href="http://maemo.org/community/maemo-community/">maemo-community</a> </li> <li> <a href="http://maemo.org/community/presentations/">Presentations</a> </li> <li> <a href="http://maemo.org/community/community-projects/">Community Projects</a> </li> <li> <a href="http://maemo.org/community/council/">Community Council</a> </li> <li> <a href="http://maemo.org/community/board/">Board</a> </li> <li> <a href="http://maemo.org/community/brainstorm/">Brainstorm</a> </li> <li> <a href="http://maemo.org/community/contribute/">Contribute</a> </li> <li> <a href="http://maemo.org/community/irc/">IRC</a> </li> <li> <a href="http://maemo.org/community/mailing-lists/">Mailing Lists</a> </li> <li class="selected active"> <a href="http://maemo.org/community/security/">Reporting security issues</a> </li> </ul> </div> </div><!-- sidebar --> <div id="main"> <div id="main-wrapper"> <h1>Reporting security issues in Maemo</h1> <p>If you discover or become aware of a security issue in Maemo software (consisting of the Maemo platform software and the upstream projects whose software is used within the Maemo platform software), please report it by email to security@maemo.org.</p> <p>You may encrypt your message with GnuPG using key <a href="http://pgp.mit.edu:11371/pks/lookup?search=0x83AAAB3B&op=index" title="GnuPG key">0x83AAAB3B</a>. The report will be analysed and appropriate actions initiated.</p> <p>If you discover a security issue in an upstream project whose code is used in Maemo, or a 3rd party open source software running on the Maemo platform, as your first priority, report the problem to the upstream project or their security team and only after that send a copy to Maemo security as per above. If you do not know where to report the issue, we suggest you report it to the Open Source CERT at <a href="http://www.ocert.org/" target="_blank" title="This external link will open in a new window">http://www.ocert.org/</a> who can then help coordinating the issue. Please see below for helpful tips on what information would be useful. Any security-related bugs in Maemo bugzilla should be tagged with keyword "security".</p> <p>Please note that security@maemo.org only handles issues relating to the Maemo platform. This email address does not handle security issues related to web sites (including the maemo.org website - please report those to the maemo.org webmaster), 3rd party software running on the Maemo platform, or issues specific to Nokia products. In any security issues related to these, please contact the appropriate party.</p> <p>The following information would be helpful:</p> <ul><li>If the security issue has been publicised somewhere, a pointer to that (web address, CVE identifier, etc.)</li> <li>Information of the affected package (and version number)</li> <li>Configuration and environment where the issue was discovered (proof-of-concept code or a test case if available)</li> <li>If you will be able to provide more information and details that would be helpful in validating the issue, your contact information</li> </ul><h1>Security issues fixed in Maemo 5 PR1.3 (20.2010.36-2) release</h1> <p>This list contains information about security issues that have been fixed in the Maemo 5 PR1.3 (20.2010.36-2) release. This list only contains a list of CVE entries that have affected and have been fixed in this Maemo release.</p> <p><strong>CVE-2010-0205, CVE-2010-1205, CVE-2010-2249<br /></strong>libpng</p> <p><strong>CVE-2009-4880, CVE-2009-4881, CVE-2010-0830<br /></strong>glibc</p> <p><strong>CVE-2010-1297<br /></strong>Adobe Flash Player</p> <p><strong>CVE-2009-3555, CVE-2009-4355<br /></strong>OpenSSL</p> <p><strong>CVE-2009-3979, CVE-2009-3980, CVE-2009-3982, CVE-2009-3986, CVE-2009-3984, CVE-2009-3985, CVE-2010-0220<br /></strong>Web browser<strong></strong></p> <p><strong>CVE-2009-2416<br /></strong>libxml2</p> <p>For Nokia devices running Maemo 5, software with this fix is available as follows:<br />Reflash your device using Maemo 5 PR1.3 (20.2010.36-2) release or newer, or perform an upgrade to Maemo 5 PR1.3 (20.2010.36-2) release or newer using the package manager.</p> <h1>Security issues fixed in Maemo 5 PR1.2 (10.2010.19-1) release</h1> <p>This list contains information about security issues that have been fixed in the Maemo 5 PR1.2 (10.2010.19-1) release. This list only contains a list of CVE entries that have affected and have been fixed in this Maemo release.</p> <p><strong>CVE 2008-1693</strong><br />Issues with PDF embedded fonts in Poppler.<br /><strong><br />CVE-2009-2347</strong><br />Issues in inter-color spaces conversion tools in libtiff.<br /><br /><strong>CVE-2009-1563, CVE-2009-3069, CVE-2009-3071, CVE-2009-3073,<br />CVE-2009-3072, CVE-2009-3075, CVE-2009-3077, CVE-2009-3079,<br />CVE-2009-3370, CVE-2009-3371, CVE-2009-3373, CVE-2009-3374, <br />CVE-2009-3375, CVE-2009-3380, CVE-2009-3381, CVE-2009-3383,<br />CVE-2009-3979, CVE-2009-3980, CVE-2009-3982, CVE-2009-3984,<br />CVE-2009-3985, CVE-2009-3986, CVE-2010-0220</strong><br />Various issues potentially affecting the browser.</p> <p>For Nokia devices running Maemo 5, software with this fix is available as follows:<br />Reflash your device using Maemo 5 PR1.2 (10.2010.19-1) release or newer, or perform an upgrade to Maemo 5 PR1.2 (10.2010.19-1) release or newer using the package manager.</p> <h1>Security issues fixed in Maemo 5 PR1.1 (2.2009.51-1) release</h1> <p>This list contains information about security issues that have been fixed in the Maemo 5 PR1.1 (2.2009.51-1) release. This list only contains a list of CVE entries that have affected and been fixed in this Maemo release.</p> <p><strong>CVE-2009-2417</strong></p> <p>Curl did not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate.</p> <p>For Nokia devices running Maemo 5, software with this fix is available as follows:<br />Reflash your device using Maemo 5 PR1.1 (2.2009.51-1) release or newer, or perform an upgrade to Maemo 5 PR1.1 (2.2009.51-1) release or newer using the package manager.</p> <h1>Security issues fixed in OS2008 version 4.2008.43-7 release</h1> <p>This list contains information about security issues that have been fixed in the OS2008 5.2008.43-7 release. This list only contains a list of CVE entries that have affected and been fixed in this maemo release.</p> <p><strong>CVE-2008-1447</strong></p> <p>The DNS protocol, as implemented in dnsmasq used in maemo, is affected by CVE-2008-1447 which may allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers.</p> <p>For Nokia Internet Tablets, software with a fix for this issue is available as follows:<br /> Reflash your device with OS2008 version 5.2008.43-7 or newer.</p> <p><strong>CVE-2008-2327</strong></p> <p>LibTIFF 3.8.2 and earlier as used in maemo, is affected by CVE-2008-2327 that may allow context-dependent attackers to execute arbitrary code via a crafted TIFF file.</p> <p>For Nokia Internet Tablets, software with a fix for this issue is available as follows:<br /> Reflash your device with OS2008 version 5.2008.43-7 or newer.</p> <h1>Security issues fixed in OS2008 version 4.2008.36-5 release</h1> <p>This list contains information about security issues that have been fixed in the OS2008 version 4.2008.36-5 release. This list only contains a list of CVE entries that have affected and been fixed in this maemo release.</p> <p><strong>CVE-2008-1105</strong></p> <p>Heap-based buffer overflow in in Samba 3.0.0 through 3.0.29 may allow remote attackers to execute arbitrary code via a crafted SMB response.</p> <p>For Nokia Internet Tablets, software with a fix for this issue is available as follows:<br /> Reflash your device with OS2008 version 4.2008.36-5 or newer.</p> <p><strong>CVE-2008-1372</strong></p> <p>bzip2 before 1.0.5 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted file that triggers a buffer over-read.</p> <p>For Nokia Internet Tablets, software with a fix for this issue is available as follows:<br /> Reflash your device with OS2008 version 4.2008.36-5 or newer.</p> <h1>Security issues fixed in OS2008 Feature Upgrade (Diablo) release</h1> <p>This list contains information about security issues that have been fixed in the OS2008 Feature Upgrade (Diablo) release. This list only contains a list of CVE entries that have affected and been fixed in this maemo release.</p> <p><strong>CVE-2007-6284</strong></p> <p>The libxml2 library used in maemo before 2008-02-29 is affected by security issue CVE-2007-6284, which might allow context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.</p> <p>For Nokia Internet Tablets, software with a fix for this issue is available as follows:</p> <p>Reflash your device with a new OS 2008 Feature Upgrade software version, announced at <a href="http://maemo.org/news/announcements/view/os2008_feature_upgrade-reflash_your_tablet-for_the_last_time.html">http://maemo.org/news/announcements/view/os2008_feature_upgrade-reflash_your_tablet-for_the_last_time.html</a></p> <p><strong>CVE-2007-5501</strong></p> <p>The Linux kernel used in maemo before 2008-04-08 is affected by security issue CVE-2007-5501, which might allow remote attackers to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer dereference.</p> <p>For Nokia Internet Tablets, software with a fix for this issue is available as follows:</p> <p>Reflash your device with a new OS 2008 Feature Upgrade software version, announced at <a href="http://maemo.org/news/announcements/view/os2008_feature_upgrade-reflash_your_tablet-for_the_last_time.html">http://maemo.org/news/announcements/view/os2008_feature_upgrade-reflash_your_tablet-for_the_last_time.html</a></p> <p><strong>CVE-2007-5266</strong></p> <p>The libpng library used in maemo before 2007-11-23 is affected by security issue CVE-2007-5266, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG image.</p> <p>For Nokia Internet Tablets, software with a fix for this issue has been available already in the previous IT OS 2008 release (see the list of fixed security issues for CVE-2007-5268 and CVE-2007-5269). Reflash your device with a new OS 2008 Feature Upgrade software version, announced at <a href="http://maemo.org/news/announcements/view/os2008_feature_upgrade-reflash_your_tablet-for_the_last_time.html">http://maemo.org/news/announcements/view/os2008_feature_upgrade-reflash_your_tablet-for_the_last_time.html</a> , or the version specified for CVE-2007-5268 and CVE-2007-5269.</p> <p><strong>CVE-2007-2754 </strong></p> <p>The freetype library used in maemo before 2007-12-20 is affected by security issue CVE-2007-2754, which might allow remote attackers to execute arbitrary code via a crafted TTF image.</p> <p>For Nokia Internet Tablets, software with a fix for this issue is available as follows:</p> <p>Reflash your device with a new OS 2008 Feature Upgrade software version, announced at <a href="http://maemo.org/news/announcements/view/os2008_feature_upgrade-reflash_your_tablet-for_the_last_time.html">http://maemo.org/news/announcements/view/os2008_feature_upgrade-reflash_your_tablet-for_the_last_time.html</a></p> <h1>Security issues fixed in IT OS2008 Update releases</h1> <p>This list contains information about security issues that have been fixed in the IT OS2008 maemo release. This list only contains a list of CVE entries that have affected and been fixed in this maemo release.</p> <p><strong>CVE-2007-5268 and CVE-2007-5269</strong></p> <p>The libpng library used in maemo before 2007-11-23 is affected by security issues CVE-2007-5268 and CVE-2007-5269, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG image.</p> <p>For Nokia Internet Tablets, software with a fix for this issue is available as follows:</p> <p>Reflash your device with a new IT OS 2008 software version, announced at <a href="http://maemo.org/news/announcements/view/first_official_os2008_update.html">http://maemo.org/news/announcements/view/first_official_os2008_update.html</a> .</p> <p><strong>CVE-2007-5967</strong></p> <p>All versions of the Mozilla based browser MicroB for maemo released before 2007-12-11 are affected by a security issue CVE-2007-5967, which might allow web sites to install root certificates on devices without user approval.</p> <p>For Nokia Internet Tablets, software with a fix for this issue is available as follows:</p> <p>1) For devices with IT OS 2008:<br /> Create a backup (Settings – Backup/Restore – New Backup)<br /> Reflash your device with a new IT OS 2008 software version, announced at http://maemo.org/news/announcements/view/first_official_os2008_update.html.<br /> Restore the backup (Settings – Backup/Restore – Choose the desired backup from the list – Restore)</p> <p>Delete the files ~/.mozilla/microb/cert8.db and ~/.mozilla/microb/key3.db from your device.(open Utilities - X terminal and type rm ~/.mozilla/microb/cert8.db ~/.mozilla/microb/key3.db) Note that these files may also be included in an older backup, so delete either the older backups or the files from such older backups. Create a new backup.</p> <p>2) For devices running other IT OS versions where a beta release of the browser is installed:<br /> Update the browser using Application manager (Settings – Application Manager – Check for Updates – Refresh – Choose the update for the browser – Update).<br /> Delete the files ~/.mozilla/microb/cert8.db and ~/.mozilla/microb/key3.db from your device (install X terminal using Application manager, open it from Extras and type rm ~/.mozilla/microb/cert8.db ~/.mozilla/microb/key3.db)<br /> Note that these files may also be included in an older backup, so delete either the older backups or the files from such older backups.<br /> Create a new backup.</p> </div><!-- /main-wrapper --> </div><!-- /main --><!-- content end --> </div> <div id="footer"> <div id="footer-wrapper-left"> <div id="footer-wrapper-right"> <ul> <li class="first"><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/">All Content CC</a></li> <li><a href="/legal/">Legal</a></li> <li><a href="/legal/terms_of_use/">Terms of Use</a></li> <li><a href="/legal/privacy_policy/">Privacy Policy</a></li> <li class="powered">Powered by <a href="http://www.midgard-project.org/" rel="powered">Midgard CMS</a></li> <li class="powered">Hosting provided by <a href="http://www.iphh.net/">IPHH</a></li> <li class="powered">Backup provided by <a href="https://ipredator.se">IPredator</a></li> </ul> </div> </div> </div> </div><!-- container --> </body> </html>