lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1DWjPS-0002zi-8a@mercury.mandriva.com>
Date: Fri, 13 May 2005 17:17:34 -0600
From: Mandriva Security Team <security@...driva.com>
To: bugtraq@...urityfocus.com
Subject: MDKSA-2005:088 - Updated mozilla packages fix multiple vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                Mandriva Linux Security Update Advisory
 _______________________________________________________________________

 Package name:           mozilla
 Advisory ID:            MDKSA-2005:088
 Date:                   May 13th, 2005

 Affected versions:	 10.1, 10.2, Corporate 3.0
 ______________________________________________________________________

 Problem Description:

 A number of security vulnerabilities were fixed in the Mozilla Firefox
 1.0.4 and Mozilla Suite 1.7.8 releases.  Patches have been backported
 where appropriate; Corporate 3.0 is receiving the new Mozilla Suite
 1.7.8 release.
 
 The following issues have been fixed in both Mozilla Firefox and
 Mozilla Suite:
 
 - A flaw in the Javascript regular expression handling could lead to
   a disclosure of browser memory, potentially exposing private data from
   web pages viewed, passwords, or similar data sent to other web pages.
   It could also crash the browser itself (CAN-2005-0989, MFSA 2005-33)
 
 - With manual Plugin install, it was possible for the Plugin to execute
   javascript code with the installing user's privileges (CAN-2005-0752 and
   MFSA 2005-34)
 
 - The popup for showing blocked javascript used the wrong privilege
   context which could be sued for privilege escalation (CAN-2005-1153 and
   MFSA 2005-35)
 
 - Cross-site scripting through global scope pollution could lead an
   attacker to being able to run code in foreign websites context, leading
   to the potential sniffing of information or performing actions in that
   context (CAN-2005-1154 and MFSA 2005-36)
 
 - Code execution through javascript via favicons ("firelinking") could
   be used for privilege escalation (CAN-2005-1155 and MFSA 2005-37)
 
 - Search plugin cross-site scripting ("firesearching") (CAN-2005-1156,
   CAN-2005-1157, and MFSA 2005-38)
 
 - Arbitrary code execution via the Firefox sidebar panel II
   (CAN-2005-1158 and MFSA 2005-39)
 
 - Missing Install object instance checks (CAN-2005-1159 and
   MFSA 2005-40)
 
 - Privilege escalation via DOM property overrides (CAN-2005-1160 and
   MFSA 2005-41)
 
 - Code execution via javacript: IconURL (MFSA 2005-42)
 
 - Security check bypass by wrapping a javascript: URL in the view-source:
   pseudo protocol (MFSA 2005-43)
 
 - Privilege escalation via non-DOM property overrides (MFSA 2005-44)
 
 In addition to the vulnerabilities previously noted, the following
 issues have been fixed in the Mozilla Suite 1.7.2 packages:
 
 - Bypass restriction on opening privileged XUL (CAN-2005-0401 and
   MSF 2005-32)
 
 - Arbitrary code execution via a GIF processing error when parsing
   obsolete Netscape extension 2 leading to an exploitable heap overrun
   (CAN-2005-0401 and MFSA 2005-32)
 
 - International Domain Name support could allow for characters that
   look similar to other english letters to be used in constructing
   nearly perfect phishing sites (MFSA 2005-29)
 
 - Predictable plugin temporary directory name (MFSA 2005-28)
 
 - Plugins can be used to load privileged content into a frame
   (CAN-2005-0527 and MFSA 2005-27)
 
 - Cross-site scripting attack via dropping javascript: links on
   a tab (MFSA 2005-26)
 
 - Image dragging-and-drop from a web page to the desktop preserve their
   original name and extension; if this were an executable extension then
   the file would be executed rather than opened in a media application
   (MFSA 2005-25)
 
 - HTTP authentication prompt tab spoofing (MFSA 2005-24)
 
 - Download dialog source can be disguised by using a host name long
   enough that most significant parts are truncated, allowing a malicious
   site to spoof the origin of the file (MFSA 2005-23)
 
 - Download dialog spoofing via supplied Content-Disposition header
   could allow for a file to look like a safe file (ie. a JPEG image) and
   when downloaded saved with an executable extension (MFSA 2005-22)
 
 - XSLT can include stylesheets from arbitrary hosts (MFSA 2005-20)
 
 - Memory handling flaw in Mozilla string classes that could overwrite
   memory at a fixed location if reallocation fails during string growth
   (MFSA 2005-18)
 
 - Install source spoofing with user:pass@...t (MFSA 2005-17)
 
 - Spoofing download and security dialogs with overlapping windows
   (MFSA 2005-16)
 
 - It is possible for a UTF8 string with invalid sequences to trigger a
   heap overflow of converted Unicode data (MFSA 2005-15)
 
 - SSL "secure site" indicator spoofing (MFSA 2005-14)
 
 - Mozilla mail clients responded to cookie requests accompanying
   content loaded over HTTP, ignoring the setting of the preference
   "network.cookie.disableCookieForMailNews" which could be used to
   track people (MFSA 2005-11)
 
 - Browser responds to proxy authentication requests from non-proxy
   servers (SSL/HTTPS) (MFSA 2005-09)
 
 - Snythetic middle-click event can steal clipboard contents
   (MFSA 2005-08)
 
 - In windows with multiple tabs, malicious content in a background tab
   can attempt to steal information intended for the topmost tab by
   popping up a prompt dialog that appears to come from the trusted site,
   or by silently redirecting input focus to a background tab hoping to
   catch the user inputting something sensitive (MFSA 2005-05)
 
 - Secure site lock can be spoofed with "view-source:" (MFSA 2005-04)
 
 - An insecure page triggering a load of a binary file from a secure
   server will cause the SSL lock icon to appear; the certificate
   information is that of the binary file's host and the location bar URL
   shows the original insecure page (MFSA 2005-03)
 
 - Temporary files are saved with world-readable permissions
   (MFSA 2005-02)
 
 - A vulnerability in the NNTP handling code could cause a heap overflow
   and execute arbitrary code on the client machine (isec-0020)
 
 - A number of other minor bugs were fixed as well.
 
 Mandriva recommends all users to upgrade to these packages immediately.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0401
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0527
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0752
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0989
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1153
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1154
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1155
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1156
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1157
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1158
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1159
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1160
  http://www.mozilla.org/security/announce/mfsa2005-02.html
  http://www.mozilla.org/security/announce/mfsa2005-03.html
  http://www.mozilla.org/security/announce/mfsa2005-04.html
  http://www.mozilla.org/security/announce/mfsa2005-05.html
  http://www.mozilla.org/security/announce/mfsa2005-08.html
  http://www.mozilla.org/security/announce/mfsa2005-09.html
  http://www.mozilla.org/security/announce/mfsa2005-11.html
  http://www.mozilla.org/security/announce/mfsa2005-14.html
  http://www.mozilla.org/security/announce/mfsa2005-15.html
  http://www.mozilla.org/security/announce/mfsa2005-16.html
  http://www.mozilla.org/security/announce/mfsa2005-17.html
  http://www.mozilla.org/security/announce/mfsa2005-18.html
  http://www.mozilla.org/security/announce/mfsa2005-20.html
  http://www.mozilla.org/security/announce/mfsa2005-22.html
  http://www.mozilla.org/security/announce/mfsa2005-23.html
  http://www.mozilla.org/security/announce/mfsa2005-24.html
  http://www.mozilla.org/security/announce/mfsa2005-25.html
  http://www.mozilla.org/security/announce/mfsa2005-26.html
  http://www.mozilla.org/security/announce/mfsa2005-27.html
  http://www.mozilla.org/security/announce/mfsa2005-28.html
  http://www.mozilla.org/security/announce/mfsa2005-29.html
  http://www.mozilla.org/security/announce/mfsa2005-30.html
  http://www.mozilla.org/security/announce/mfsa2005-32.html
  http://www.mozilla.org/security/announce/mfsa2005-33.html
  http://www.mozilla.org/security/announce/mfsa2005-34.html
  http://www.mozilla.org/security/announce/mfsa2005-35.html
  http://www.mozilla.org/security/announce/mfsa2005-36.html
  http://www.mozilla.org/security/announce/mfsa2005-37.html
  http://www.mozilla.org/security/announce/mfsa2005-38.html
  http://www.mozilla.org/security/announce/mfsa2005-39.html
  http://www.mozilla.org/security/announce/mfsa2005-40.html
  http://www.mozilla.org/security/announce/mfsa2005-41.html
  http://www.mozilla.org/security/announce/mfsa2005-42.html
  http://isec.pl/vulnerabilities/isec-0020-mozilla.txt
  https://bugzilla.mozilla.org/show_bug.cgi?id=290777
  https://bugzilla.mozilla.org/show_bug.cgi?id=290476
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.1:
 b3c4d6b408121c1696e860eaf139ac17  10.1/RPMS/epiphany-1.2.8-4.2.101mdk.i586.rpm
 87449a5b8d95ec5038842d794e6ae7a4  10.1/RPMS/epiphany-devel-1.2.8-4.2.101mdk.i586.rpm
 cc55f2b32db3a925a31d0e8f7bae475a  10.1/RPMS/galeon-1.3.17-3.2.101mdk.i586.rpm
 9f15765b7ed59d295864c47672768f85  10.1/RPMS/libnspr4-1.7.2-12.2.101mdk.i586.rpm
 c24d1485007b9d05b4ee1936e6157dcc  10.1/RPMS/libnspr4-devel-1.7.2-12.2.101mdk.i586.rpm
 e936fa7fc9e9956bb25b5a096f049d8a  10.1/RPMS/libnss3-1.7.2-12.2.101mdk.i586.rpm
 357f36e151a0ae8d3c090573874d5ce5  10.1/RPMS/libnss3-devel-1.7.2-12.2.101mdk.i586.rpm
 d0830c67ddcdf8b37a53cd39e497cd88  10.1/RPMS/mozilla-1.7.2-12.2.101mdk.i586.rpm
 61b60f30c676d451709f4afcbdb8ab70  10.1/RPMS/mozilla-devel-1.7.2-12.2.101mdk.i586.rpm
 97914412759faccc7d2cbaea2a66aabc  10.1/RPMS/mozilla-dom-inspector-1.7.2-12.2.101mdk.i586.rpm
 0d919875e79250522fb0067b832eb299  10.1/RPMS/mozilla-enigmail-1.7.2-12.2.101mdk.i586.rpm
 ff42754f66787c540b3ad17a7b06e399  10.1/RPMS/mozilla-enigmime-1.7.2-12.2.101mdk.i586.rpm
 56ec1c9a61ce42af78ded3f255bfe837  10.1/RPMS/mozilla-irc-1.7.2-12.2.101mdk.i586.rpm
 e14ba88b79f6525030f948103ae0a716  10.1/RPMS/mozilla-js-debugger-1.7.2-12.2.101mdk.i586.rpm
 922e6a2c2aebb4ca7673b081c0027a6f  10.1/RPMS/mozilla-mail-1.7.2-12.2.101mdk.i586.rpm
 dc3783bc550ad9a5190c44598281d604  10.1/RPMS/mozilla-spellchecker-1.7.2-12.2.101mdk.i586.rpm
 fb95936e6542a9b742c2b655916d7ded  10.1/SRPMS/epiphany-1.2.8-4.2.101mdk.src.rpm
 e88e547cbd1a17ba6c1beba66d9d73b1  10.1/SRPMS/galeon-1.3.17-3.2.101mdk.src.rpm
 8f37c650c202e94a416272d4ea8c4500  10.1/SRPMS/mozilla-1.7.2-12.2.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 f23f3e2ea31308ddbfc0c7c81beb3cb6  x86_64/10.1/RPMS/epiphany-1.2.8-4.2.101mdk.x86_64.rpm
 c65413cb7cbdcb568e1dc9af59f6778c  x86_64/10.1/RPMS/epiphany-devel-1.2.8-4.2.101mdk.x86_64.rpm
 22da554c0181d9d26376b07fac329749  x86_64/10.1/RPMS/galeon-1.3.17-3.2.101mdk.x86_64.rpm
 31b4e24da450171995e45a80bd5c7def  x86_64/10.1/RPMS/lib64nspr4-1.7.2-12.2.101mdk.x86_64.rpm
 c54cd3b1d5367dc118e9bd7703ceea4b  x86_64/10.1/RPMS/lib64nspr4-devel-1.7.2-12.2.101mdk.x86_64.rpm
 05d58ffce6c8d7e98b9e2a987ba96a69  x86_64/10.1/RPMS/lib64nss3-1.7.2-12.2.101mdk.x86_64.rpm
 8fa07eca2df677de6847640db775e486  x86_64/10.1/RPMS/lib64nss3-devel-1.7.2-12.2.101mdk.x86_64.rpm
 9f15765b7ed59d295864c47672768f85  x86_64/10.1/RPMS/libnspr4-1.7.2-12.2.101mdk.i586.rpm
 e936fa7fc9e9956bb25b5a096f049d8a  x86_64/10.1/RPMS/libnss3-1.7.2-12.2.101mdk.i586.rpm
 f505404f493d4de6dc48c8ae40598a7c  x86_64/10.1/RPMS/mozilla-1.7.2-12.2.101mdk.x86_64.rpm
 3380d33ab5f3118987fe1b38cb3685d2  x86_64/10.1/RPMS/mozilla-devel-1.7.2-12.2.101mdk.x86_64.rpm
 281f743c9af8d4082c9154fda36e79e6  x86_64/10.1/RPMS/mozilla-dom-inspector-1.7.2-12.2.101mdk.x86_64.rpm
 e1828b71e9f57a730d1966277b6384ad  x86_64/10.1/RPMS/mozilla-enigmail-1.7.2-12.2.101mdk.x86_64.rpm
 3b95ba000a3f2d8a029d57784a3b9b1a  x86_64/10.1/RPMS/mozilla-enigmime-1.7.2-12.2.101mdk.x86_64.rpm
 195989fdbedecaff963783515fb2b1fb  x86_64/10.1/RPMS/mozilla-irc-1.7.2-12.2.101mdk.x86_64.rpm
 184ed89834f4c90b7b9239a783a1875a  x86_64/10.1/RPMS/mozilla-js-debugger-1.7.2-12.2.101mdk.x86_64.rpm
 6b21577a9de375cff96fc39611a618a9  x86_64/10.1/RPMS/mozilla-mail-1.7.2-12.2.101mdk.x86_64.rpm
 500945687fac07ae26ca67e1708e173d  x86_64/10.1/RPMS/mozilla-spellchecker-1.7.2-12.2.101mdk.x86_64.rpm
 fb95936e6542a9b742c2b655916d7ded  x86_64/10.1/SRPMS/epiphany-1.2.8-4.2.101mdk.src.rpm
 e88e547cbd1a17ba6c1beba66d9d73b1  x86_64/10.1/SRPMS/galeon-1.3.17-3.2.101mdk.src.rpm
 8f37c650c202e94a416272d4ea8c4500  x86_64/10.1/SRPMS/mozilla-1.7.2-12.2.101mdk.src.rpm

 Mandrakelinux 10.2:
 432ceddcdecf8ffa3c922831c3842fa1  10.2/RPMS/epiphany-1.4.8-8.3.102mdk.i586.rpm
 d017bf41fd7f2247791aaf36653041b1  10.2/RPMS/epiphany-devel-1.4.8-8.3.102mdk.i586.rpm
 13dbb2eafd03a4479c305467bd9c8941  10.2/RPMS/galeon-1.3.19-7.3.102mdk.i586.rpm
 f4df4d9ef1cc5f52c0ed1af892f57403  10.2/RPMS/libnspr4-1.0.2-5.2.102mdk.i586.rpm
 865b005e614b20ea1ea703e3a0ad171e  10.2/RPMS/libnspr4-devel-1.0.2-5.2.102mdk.i586.rpm
 f16bb3d949137bdb2c37c619aa65364e  10.2/RPMS/libnss3-1.0.2-5.2.102mdk.i586.rpm
 2421b7b9075d329d4515ed333a93e010  10.2/RPMS/libnss3-devel-1.0.2-5.2.102mdk.i586.rpm
 962080f2d13b102ae8edd6824e1db801  10.2/RPMS/mozilla-firefox-1.0.2-5.2.102mdk.i586.rpm
 57201fcc5a8081ff6e4fb410f07e63a3  10.2/RPMS/mozilla-firefox-devel-1.0.2-5.2.102mdk.i586.rpm
 b4f782a0bef113deb2c40b85385c0f50  10.2/SRPMS/epiphany-1.4.8-8.3.102mdk.src.rpm
 d2ee6b21b9a65a9df4ba083f27d1edc7  10.2/SRPMS/galeon-1.3.19-7.3.102mdk.src.rpm
 bc1d09a4cb7db4bff20921cf41051d73  10.2/SRPMS/mozilla-firefox-1.0.2-5.2.102mdk.src.rpm

 Mandrakelinux 10.2/X86_64:
 134ffca6c7d0eb957ed151db9c11dcc0  x86_64/10.2/RPMS/epiphany-1.4.8-8.3.102mdk.x86_64.rpm
 b4eab24b0ff48136a78ff6de39939a72  x86_64/10.2/RPMS/epiphany-devel-1.4.8-8.3.102mdk.x86_64.rpm
 c7a47651dc7e2431447afc9caea80c4e  x86_64/10.2/RPMS/galeon-1.3.19-7.3.102mdk.x86_64.rpm
 8ec41e6a6fcef03b83d434b2346c6abb  x86_64/10.2/RPMS/lib64nspr4-1.0.2-5.2.102mdk.x86_64.rpm
 e69c94325ea27c3af5d6ace6fe08cbe5  x86_64/10.2/RPMS/lib64nspr4-devel-1.0.2-5.2.102mdk.x86_64.rpm
 c4083d449bf913db24752bc20f86722f  x86_64/10.2/RPMS/lib64nss3-1.0.2-5.2.102mdk.x86_64.rpm
 86a2350545675c82e0a9fcda33c81555  x86_64/10.2/RPMS/lib64nss3-devel-1.0.2-5.2.102mdk.x86_64.rpm
 7dda2b19a93617019607e6272f2f497a  x86_64/10.2/RPMS/mozilla-firefox-1.0.2-5.2.102mdk.x86_64.rpm
 5154a795097d31eef36eb3af8d4a3f76  x86_64/10.2/RPMS/mozilla-firefox-devel-1.0.2-5.2.102mdk.x86_64.rpm
 b4f782a0bef113deb2c40b85385c0f50  x86_64/10.2/SRPMS/epiphany-1.4.8-8.3.102mdk.src.rpm
 d2ee6b21b9a65a9df4ba083f27d1edc7  x86_64/10.2/SRPMS/galeon-1.3.19-7.3.102mdk.src.rpm
 bc1d09a4cb7db4bff20921cf41051d73  x86_64/10.2/SRPMS/mozilla-firefox-1.0.2-5.2.102mdk.src.rpm

 Corporate 3.0:
 1b575054db479133d9074b353b24643a  corporate/3.0/RPMS/epiphany-1.0.7-10.1.C30mdk.i586.rpm
 2cf77439d1f8a871fb603a48a6b4a46b  corporate/3.0/RPMS/epiphany-devel-1.0.7-10.1.C30mdk.i586.rpm
 ad5e8fece246ff38151a9b49b6245166  corporate/3.0/RPMS/galeon-1.3.14a-1.2.C30mdk.i586.rpm
 f87c5da027c71d69c6fcc3c08d5073b4  corporate/3.0/RPMS/libnspr4-1.7.8-0.1.C30mdk.i586.rpm
 d27d9566db5916e3ab848a0b879905eb  corporate/3.0/RPMS/libnspr4-devel-1.7.8-0.1.C30mdk.i586.rpm
 0b9adda77f7337b37f7808dbd0e46737  corporate/3.0/RPMS/libnss3-1.7.8-0.1.C30mdk.i586.rpm
 cad18be2610337b8638db17820f5c8d6  corporate/3.0/RPMS/libnss3-devel-1.7.8-0.1.C30mdk.i586.rpm
 ea250bafe6c91ca5e80b2cd2ca105120  corporate/3.0/RPMS/mozilla-1.7.8-0.1.C30mdk.i586.rpm
 777b677b8644026dce3bf9e22c83f128  corporate/3.0/RPMS/mozilla-devel-1.7.8-0.1.C30mdk.i586.rpm
 09082a6e9fde40997f398be72438877b  corporate/3.0/RPMS/mozilla-dom-inspector-1.7.8-0.1.C30mdk.i586.rpm
 e0091e3010b0496332b555ff6d3952cb  corporate/3.0/RPMS/mozilla-enigmail-1.7.8-0.1.C30mdk.i586.rpm
 1025304f46ab0d4675dcd236f4dd6051  corporate/3.0/RPMS/mozilla-enigmime-1.7.8-0.1.C30mdk.i586.rpm
 30891bd053be585092792760f26c5c69  corporate/3.0/RPMS/mozilla-irc-1.7.8-0.1.C30mdk.i586.rpm
 888c32669a338dcd9d04440d0e4abf42  corporate/3.0/RPMS/mozilla-js-debugger-1.7.8-0.1.C30mdk.i586.rpm
 087d646f0fc295c5d9e51df89f43404b  corporate/3.0/RPMS/mozilla-mail-1.7.8-0.1.C30mdk.i586.rpm
 95242ad52530b37d32b40ef895dd74c7  corporate/3.0/RPMS/mozilla-spellchecker-1.7.8-0.1.C30mdk.i586.rpm
 9d48c6c622604df5f24aa471f0a22f7c  corporate/3.0/SRPMS/epiphany-1.0.7-10.1.C30mdk.src.rpm
 cc8843abc24e7c2b20bf0bf3184c3112  corporate/3.0/SRPMS/galeon-1.3.14a-1.2.C30mdk.src.rpm
 924e55c6cee5fbf0c562ecc3c1e8c107  corporate/3.0/SRPMS/mozilla-1.7.8-0.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 ce73e19116ba0793b7842963523cd489  x86_64/corporate/3.0/RPMS/epiphany-1.0.7-10.1.C30mdk.x86_64.rpm
 c44577a59ecf06ebf4a9ebbd79d2fcbe  x86_64/corporate/3.0/RPMS/epiphany-devel-1.0.7-10.1.C30mdk.x86_64.rpm
 cf4bb334da0701792f029a1746243e22  x86_64/corporate/3.0/RPMS/galeon-1.3.14a-1.2.C30mdk.x86_64.rpm
 ce5e5e13f66981c4975cc488ae5752da  x86_64/corporate/3.0/RPMS/lib64nspr4-1.7.8-0.1.C30mdk.x86_64.rpm
 1bc038d4998885beff0b8bf23c62e5ff  x86_64/corporate/3.0/RPMS/lib64nspr4-devel-1.7.8-0.1.C30mdk.x86_64.rpm
 b02330a44d80d09b31df00792940b4bd  x86_64/corporate/3.0/RPMS/lib64nss3-1.7.8-0.1.C30mdk.x86_64.rpm
 a6b06da0efcd2e86977380756178cae8  x86_64/corporate/3.0/RPMS/lib64nss3-devel-1.7.8-0.1.C30mdk.x86_64.rpm
 28c8e8e3f8fa45d594af24699c6f1d37  x86_64/corporate/3.0/RPMS/mozilla-1.7.8-0.1.C30mdk.x86_64.rpm
 69734b67f3d3c90202dc2e0f4acf7a6c  x86_64/corporate/3.0/RPMS/mozilla-devel-1.7.8-0.1.C30mdk.x86_64.rpm
 58f8dadb1efdb5dee27cc0a2664ef49d  x86_64/corporate/3.0/RPMS/mozilla-dom-inspector-1.7.8-0.1.C30mdk.x86_64.rpm
 16a7c35758f2c550b8352fe2258bc077  x86_64/corporate/3.0/RPMS/mozilla-enigmail-1.7.8-0.1.C30mdk.x86_64.rpm
 8682f2a853e5193ae520199da228a3dd  x86_64/corporate/3.0/RPMS/mozilla-enigmime-1.7.8-0.1.C30mdk.x86_64.rpm
 de14f90fab98cf65d53cee8bc87fe3f8  x86_64/corporate/3.0/RPMS/mozilla-irc-1.7.8-0.1.C30mdk.x86_64.rpm
 239763cdf73516e99ed5f61e1723aa54  x86_64/corporate/3.0/RPMS/mozilla-js-debugger-1.7.8-0.1.C30mdk.x86_64.rpm
 d760c35115b0b9d08dc30fcc169491be  x86_64/corporate/3.0/RPMS/mozilla-mail-1.7.8-0.1.C30mdk.x86_64.rpm
 c19346dbec82bda1d36bd4b57cd1cbaf  x86_64/corporate/3.0/RPMS/mozilla-spellchecker-1.7.8-0.1.C30mdk.x86_64.rpm
 9d48c6c622604df5f24aa471f0a22f7c  x86_64/corporate/3.0/SRPMS/epiphany-1.0.7-10.1.C30mdk.src.rpm
 cc8843abc24e7c2b20bf0bf3184c3112  x86_64/corporate/3.0/SRPMS/galeon-1.3.14a-1.2.C30mdk.src.rpm
 924e55c6cee5fbf0c562ecc3c1e8c107  x86_64/corporate/3.0/SRPMS/mozilla-1.7.8-0.1.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFChTWOmqjQ0CJFipgRAnO0AKCbHgTbgEpSE9xh1u181O9u9r1dkgCfWKNi
Dc2t0GS/xZEBPTj0nvIBYMU=
=xmC0
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ