[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1T6ftN-0000GW-4O@titan.mandriva.com>
Date: Wed, 29 Aug 2012 12:53:01 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2012:145 ] firefox
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2012:145
http://www.mandriva.com/security/
_______________________________________________________________________
Package : firefox
Date : August 29, 2012
Affected: 2011.
_______________________________________________________________________
Problem Description:
Security issues were identified and fixed in mozilla firefox:
Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code (CVE-2012-1971).
Security researcher Abhishek Arya (Inferno) of Google Chrome Security
Team discovered a series of use-after-free issues using the Address
Sanitizer tool. Many of these issues are potentially exploitable,
allowing for remote code execution (CVE-2012-1972, CVE-2012-1973,
CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956,
CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,
CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964).
Security researcher Mariusz Mlynski reported that it is possible to
shadow the location object using Object.defineProperty. This could
be used to confuse the current location to plugins, allowing for
possible cross-site scripting (XSS) attacks (CVE-2012-1956).
Security researcher Mariusz Mlynski reported that when a page opens a
new tab, a subsequent window can then be opened that can be navigated
to about:newtab, a chrome privileged page. Once about:newtab is loaded,
the special context can potentially be used to escalate privilege,
allowing for arbitrary code execution on the local system in a
maliciously crafted attack (CVE-2012-3965).
Security researcher Frederic Hoguin reported two related issues with
the decoding of bitmap (.BMP) format images embedded in icon (.ICO)
format files. When processing a negative height header value for
the bitmap image, a memory corruption can be induced, allowing an
attacker to write random memory and cause a crash. This crash may be
potentially exploitable (CVE-2012-3966).
Security researcher miaubiz used the Address Sanitizer tool to
discover two WebGL issues. The first issue is a use-after-free when
WebGL shaders are called after being destroyed. The second issue
exposes a problem with Mesa drivers on Linux, leading to a potentially
exploitable crash (CVE-2012-3968, CVE-2012-3967).
Security researcher Arthur Gerkis used the Address Sanitizer
tool to find two issues involving Scalable Vector Graphics (SVG)
files. The first issue is a buffer overflow in Gecko's SVG filter
code when the sum of two values is too large to be stored as a
signed 32-bit integer, causing the function to write past the end
of an array. The second issue is a use-after-free when an element
with a requiredFeatures attribute is moved between documents. In that
situation, the internal representation of the requiredFeatures value
could be freed prematurely. Both issues are potentially exploitable
(CVE-2012-3969, CVE-2012-3970).
Using the Address Sanitizer tool, Mozilla security researcher Christoph
Diehl discovered two memory corruption issues involving the Graphite
2 library used in Mozilla products. Both of these issues can cause
a potentially exploitable crash. These problems were fixed in the
Graphite 2 library, which has been updated for Mozilla products
(CVE-2012-3971).
Security research Nicolas Gregoire used the Address Sanitizer tool to
discover an out-of-bounds read in the format-number feature of XSLT,
which can cause inaccurate formatting of numbers and information
leakage. This is not directly exploitable (CVE-2012-3972).
Mozilla security researcher Mark Goodwin discovered an issue with the
Firefox developer tools' debugger. If remote debugging is disabled,
but the experimental HTTPMonitor extension has been installed and
enabled, a remote user can connect to and use the remote debugging
service through the port used by HTTPMonitor. A remote-enabled flag
has been added to resolve this problem and close the port unless
debugging is explicitly enabled (CVE-2012-3973).
Security researcher Masato Kinugawa reported that if a crafted
executable is placed in the root partition on a Windows file system,
the Firefox and Thunderbird installer will launch this program after
a standard installation instead of Firefox or Thunderbird, running
this program with the user's privileges (CVE-2012-3974).
Security researcher vsemozhetbyt reported that when the DOMParser is
used to parse text/html data in a Firefox extension, linked resources
within this HTML data will be loaded. If the data being parsed in
the extension is untrusted, it could lead to information leakage and
can potentially be combined with other attacks to become exploitable
(CVE-2012-3975).
Security researcher Mark Poticha reported an issue where incorrect SSL
certificate information can be displayed on the addressbar, showing
the SSL data for a previous site while another has been loaded. This
is caused by two onLocationChange events being fired out of the
expected order, leading to the displayed certificate data to not be
updated. This can be used for phishing attacks by allowing the user
to input form or other data on a newer, attacking, site while the
credentials of an older site appear on the addressbar (CVE-2012-3976).
Mozilla security researcher moz_bug_r_a4 reported that certain
security checks in the location object can be bypassed if chrome code
is called content in a specific manner. This allowed for the loading
of restricted content. This can be combined with other issues to
become potentially exploitable (CVE-2012-3978).
Security researcher Colby Russell discovered that eval in the web
console can execute injected code with chrome privileges, leading to
the running of malicious code in a privileged context. This allows
for arbitrary code execution through a malicious web page if the web
console is invoked by the user (CVE-2012-3980).
The mozilla firefox packages has been upgraded to the latest versions
which is unaffected by these security flaws.
Additionally the sqlite3 packages has been upgraded to the 3.7.13
version as firefox 15.0 requires the 3.7.12.1+ version.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1956
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1971
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3965
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3971
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3973
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3974
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980
http://www.mozilla.org/security/announce/2012/mfsa2012-57.html
http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
http://www.mozilla.org/security/announce/2012/mfsa2012-59.html
http://www.mozilla.org/security/announce/2012/mfsa2012-60.html
http://www.mozilla.org/security/announce/2012/mfsa2012-61.html
http://www.mozilla.org/security/announce/2012/mfsa2012-62.html
http://www.mozilla.org/security/announce/2012/mfsa2012-63.html
http://www.mozilla.org/security/announce/2012/mfsa2012-64.html
http://www.mozilla.org/security/announce/2012/mfsa2012-65.html
http://www.mozilla.org/security/announce/2012/mfsa2012-66.html
http://www.mozilla.org/security/announce/2012/mfsa2012-67.html
http://www.mozilla.org/security/announce/2012/mfsa2012-68.html
http://www.mozilla.org/security/announce/2012/mfsa2012-69.html
http://www.mozilla.org/security/announce/2012/mfsa2012-70.html
http://www.mozilla.org/security/announce/2012/mfsa2012-72.html
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2011:
1f222b3e99fe8ac26b53c9cfcacfae67 2011/i586/firefox-15.0-0.1-mdv2011.0.i586.rpm
830afbabc32e3e7f2e2e35792e189ee9 2011/i586/firefox-af-15.0-0.1-mdv2011.0.noarch.rpm
21c1c8a7d371f6b5c82d3575fa18b7cc 2011/i586/firefox-ar-15.0-0.1-mdv2011.0.noarch.rpm
4f9d82121d5f4b061219bac93fb9d695 2011/i586/firefox-ast-15.0-0.1-mdv2011.0.noarch.rpm
73482d144b27c260c1ee3497683a1e8e 2011/i586/firefox-be-15.0-0.1-mdv2011.0.noarch.rpm
ae92eabc7ea75a2e4b793b3204dda1ab 2011/i586/firefox-bg-15.0-0.1-mdv2011.0.noarch.rpm
4b533c2dcfaf12a30c42c96cdda56ad2 2011/i586/firefox-bn_BD-15.0-0.1-mdv2011.0.noarch.rpm
c6f7c2cb3c4a2574c2e1f3597cb81885 2011/i586/firefox-bn_IN-15.0-0.1-mdv2011.0.noarch.rpm
22f2bdf23712a350fa75fae37a5cfad6 2011/i586/firefox-br-15.0-0.1-mdv2011.0.noarch.rpm
4778689a922ae7937a8a2b1472f24b48 2011/i586/firefox-bs-15.0-0.1-mdv2011.0.noarch.rpm
3f2c33f4fa565425c2c1a119081793f6 2011/i586/firefox-ca-15.0-0.1-mdv2011.0.noarch.rpm
ebde187076855de220ebddf95ce90bfb 2011/i586/firefox-cs-15.0-0.1-mdv2011.0.noarch.rpm
ae6933efc19d257517a2c7577052b2b2 2011/i586/firefox-cy-15.0-0.1-mdv2011.0.noarch.rpm
84a6b6ab34f5fd1270fbef5fd129c2d9 2011/i586/firefox-da-15.0-0.1-mdv2011.0.noarch.rpm
2632f7ef74eea38e36017dfa46763bc6 2011/i586/firefox-de-15.0-0.1-mdv2011.0.noarch.rpm
439d6472581e13385eb3e131f91ca08f 2011/i586/firefox-devel-15.0-0.1-mdv2011.0.i586.rpm
59ff02012cd9ec45da32bdbad4be4457 2011/i586/firefox-el-15.0-0.1-mdv2011.0.noarch.rpm
49b5b60cbfde698001c677f4a8dd08a5 2011/i586/firefox-en_GB-15.0-0.1-mdv2011.0.noarch.rpm
3c26aa80a987fa35af688f443b40cce8 2011/i586/firefox-en_ZA-15.0-0.1-mdv2011.0.noarch.rpm
b00a4254dd2c1a587757c33663432c69 2011/i586/firefox-eo-15.0-0.1-mdv2011.0.noarch.rpm
6c371889cc0decb90d20c348f1807ff7 2011/i586/firefox-es_AR-15.0-0.1-mdv2011.0.noarch.rpm
f6884b390f3729b5ef8f64ac2aed1c1c 2011/i586/firefox-es_CL-15.0-0.1-mdv2011.0.noarch.rpm
3ecb605e1778ad035a077bca4bfea23e 2011/i586/firefox-es_ES-15.0-0.1-mdv2011.0.noarch.rpm
bd1ac623a9102bf438aea4832897ee15 2011/i586/firefox-es_MX-15.0-0.1-mdv2011.0.noarch.rpm
166bf576807f4e7f1f63379cfa8727f1 2011/i586/firefox-et-15.0-0.1-mdv2011.0.noarch.rpm
a0086739ae734b1766585d4f34ea13b0 2011/i586/firefox-eu-15.0-0.1-mdv2011.0.noarch.rpm
c0ec3a965a4a0bf0a3d3d7439cdb87b7 2011/i586/firefox-fa-15.0-0.1-mdv2011.0.noarch.rpm
41320e3a963433760753ca738eeb86b4 2011/i586/firefox-fi-15.0-0.1-mdv2011.0.noarch.rpm
cebb929a6db589bfc7a0aad0b04004b3 2011/i586/firefox-fr-15.0-0.1-mdv2011.0.noarch.rpm
cd536f9f8727b2dd7701a7908c16cdfb 2011/i586/firefox-fy-15.0-0.1-mdv2011.0.noarch.rpm
93595c9fe1cb709a7c21c02300ac12a9 2011/i586/firefox-ga_IE-15.0-0.1-mdv2011.0.noarch.rpm
279b9c1ce32cf4ca4c700b47493c9761 2011/i586/firefox-gd-15.0-0.1-mdv2011.0.noarch.rpm
f7c574740a7f858c1357f0c4a26149f8 2011/i586/firefox-gl-15.0-0.1-mdv2011.0.noarch.rpm
857773582b15d0088871a19d119bd7a6 2011/i586/firefox-gu_IN-15.0-0.1-mdv2011.0.noarch.rpm
326c53491f6c670e97e3dc9970e89fd2 2011/i586/firefox-he-15.0-0.1-mdv2011.0.noarch.rpm
bad57690513be43f7a45312afe48d9c9 2011/i586/firefox-hi-15.0-0.1-mdv2011.0.noarch.rpm
729ed2290db6881e017b31a836e3c5a4 2011/i586/firefox-hr-15.0-0.1-mdv2011.0.noarch.rpm
8460829d9985d2a74936b877f179dec9 2011/i586/firefox-hu-15.0-0.1-mdv2011.0.noarch.rpm
548a264d2855b25f2e154aaf240399c8 2011/i586/firefox-hy-15.0-0.1-mdv2011.0.noarch.rpm
d4a0edef33cc08ef953b0afe0a42ca22 2011/i586/firefox-id-15.0-0.1-mdv2011.0.noarch.rpm
77df09e404f6f52340722e132578fb71 2011/i586/firefox-is-15.0-0.1-mdv2011.0.noarch.rpm
22c6063a51892e704853e3734152689c 2011/i586/firefox-it-15.0-0.1-mdv2011.0.noarch.rpm
2f385e87134374123a088185e1193667 2011/i586/firefox-ja-15.0-0.1-mdv2011.0.noarch.rpm
588a71cd10e951c5be3015dfe6775e2d 2011/i586/firefox-kk-15.0-0.1-mdv2011.0.noarch.rpm
7ba2d41b41b8836adde138249d2cd587 2011/i586/firefox-kn-15.0-0.1-mdv2011.0.noarch.rpm
b4079f7b0ef8f3be0e37c5aa96d2221a 2011/i586/firefox-ko-15.0-0.1-mdv2011.0.noarch.rpm
40b5c012763298a1fe3274ab969567a6 2011/i586/firefox-ku-15.0-0.1-mdv2011.0.noarch.rpm
216e18c06df896f2b2649ba9b016923b 2011/i586/firefox-lg-15.0-0.1-mdv2011.0.noarch.rpm
a86d4439195ff4939d04ab1998d0b7aa 2011/i586/firefox-lt-15.0-0.1-mdv2011.0.noarch.rpm
293c14003c06d904f5605ab1ab30eec9 2011/i586/firefox-lv-15.0-0.1-mdv2011.0.noarch.rpm
d26c88fdba82c231e368aeab323ec42a 2011/i586/firefox-mai-15.0-0.1-mdv2011.0.noarch.rpm
dfea7441a35aa20971e792995d8c63b6 2011/i586/firefox-mk-15.0-0.1-mdv2011.0.noarch.rpm
890c2606438b8603d7c2b74effc7a140 2011/i586/firefox-ml-15.0-0.1-mdv2011.0.noarch.rpm
bd7202ff08d5448909760da6ba00193e 2011/i586/firefox-mr-15.0-0.1-mdv2011.0.noarch.rpm
d5ae7737ee1e19eddf5b907b71d7ab71 2011/i586/firefox-nb_NO-15.0-0.1-mdv2011.0.noarch.rpm
f6d86c02d2da83feb6c167e49c5ec947 2011/i586/firefox-nl-15.0-0.1-mdv2011.0.noarch.rpm
266b961ec2cb241a20c70d394ad9510b 2011/i586/firefox-nn_NO-15.0-0.1-mdv2011.0.noarch.rpm
805d010bb07b456436b6d7ac7104ccd0 2011/i586/firefox-nso-15.0-0.1-mdv2011.0.noarch.rpm
fe819dce2711402c23d3dd6f4794b256 2011/i586/firefox-or-15.0-0.1-mdv2011.0.noarch.rpm
fca8922205971ddccb34082f997ed5e2 2011/i586/firefox-pa_IN-15.0-0.1-mdv2011.0.noarch.rpm
9d7910fb52d5054e5dead2b014417c8b 2011/i586/firefox-pl-15.0-0.1-mdv2011.0.noarch.rpm
54de08f75456428d52733fdda3e50b12 2011/i586/firefox-pt_BR-15.0-0.1-mdv2011.0.noarch.rpm
53e675e93a9937c31d923ab885901c70 2011/i586/firefox-pt_PT-15.0-0.1-mdv2011.0.noarch.rpm
166a43501f37c621f734107972deaa2c 2011/i586/firefox-ro-15.0-0.1-mdv2011.0.noarch.rpm
610313275eb89ba60144f822ce0fa237 2011/i586/firefox-ru-15.0-0.1-mdv2011.0.noarch.rpm
56bc307c2d0876c75ef0797f0424eacb 2011/i586/firefox-si-15.0-0.1-mdv2011.0.noarch.rpm
ca3865058f178e183c94519903e1fb61 2011/i586/firefox-sk-15.0-0.1-mdv2011.0.noarch.rpm
07720c299be46beedc88c26b9cf89a97 2011/i586/firefox-sl-15.0-0.1-mdv2011.0.noarch.rpm
b1bf922f975338182bbb26797579428a 2011/i586/firefox-sq-15.0-0.1-mdv2011.0.noarch.rpm
4b6478221fed473055b404500abf2baf 2011/i586/firefox-sr-15.0-0.1-mdv2011.0.noarch.rpm
6194dee67cfa5612aa7abbad659b7315 2011/i586/firefox-sv_SE-15.0-0.1-mdv2011.0.noarch.rpm
a0eb93a6dfd7c28e8627c6dfa04284f4 2011/i586/firefox-ta-15.0-0.1-mdv2011.0.noarch.rpm
b89778aafce014d88f6b934ffa21bdd7 2011/i586/firefox-ta_LK-15.0-0.1-mdv2011.0.noarch.rpm
c9159cce5035229c80b11c50e7ab0005 2011/i586/firefox-te-15.0-0.1-mdv2011.0.noarch.rpm
cc439a3f7b4dab59f6e0d577f3163194 2011/i586/firefox-th-15.0-0.1-mdv2011.0.noarch.rpm
696504ef908118a49d32189c36f9eb5d 2011/i586/firefox-tr-15.0-0.1-mdv2011.0.noarch.rpm
1fddb827215cdf82f8f1314e3a547edf 2011/i586/firefox-uk-15.0-0.1-mdv2011.0.noarch.rpm
f418db6ba119ed0de0214480943863dd 2011/i586/firefox-vi-15.0-0.1-mdv2011.0.noarch.rpm
2964ec621ab70e39f7635df40e5c484a 2011/i586/firefox-zh_CN-15.0-0.1-mdv2011.0.noarch.rpm
cff8302e2a9614c44f1608ac46a421cc 2011/i586/firefox-zh_TW-15.0-0.1-mdv2011.0.noarch.rpm
f5a5a2200c29653256e5d382f3766194 2011/i586/firefox-zu-15.0-0.1-mdv2011.0.noarch.rpm
2274b16d1b6b60602ca54dc5eb5f68c8 2011/i586/icedtea-web-1.1.6-0.2-mdv2011.0.i586.rpm
dddc30660fb233fb5c97c04f02ed64da 2011/i586/icedtea-web-javadoc-1.1.6-0.2-mdv2011.0.noarch.rpm
550c5722b549c364ee147044d3590d62 2011/i586/libsqlite3_0-3.7.13-0.1-mdv2011.0.i586.rpm
0483c7892ec4be5fbf5fb7162f664271 2011/i586/libsqlite3-devel-3.7.13-0.1-mdv2011.0.i586.rpm
357c444fc07b299e6e96e23ecabf2375 2011/i586/libsqlite3-static-devel-3.7.13-0.1-mdv2011.0.i586.rpm
6592326e150eab214bd23ec0e6ef484a 2011/i586/libxulrunner15.0-15.0-0.1-mdv2011.0.i586.rpm
1b3355cd27981baeeea6d595687ecc74 2011/i586/libxulrunner-devel-15.0-0.1-mdv2011.0.i586.rpm
9908d94443b85447e26eaa358ff442cd 2011/i586/sqlite3-tools-3.7.13-0.1-mdv2011.0.i586.rpm
c5498a5ef9939d6b58fe744f9d5578e9 2011/i586/xulrunner-15.0-0.1-mdv2011.0.i586.rpm
5f4955227553eb24c3886bf6a3716b55 2011/SRPMS/firefox-15.0-0.1.src.rpm
5cf3b047ef06dc671d3dade85543338e 2011/SRPMS/firefox-l10n-15.0-0.1.src.rpm
7846e5d4c210787f9ed3f34a485c5531 2011/SRPMS/icedtea-web-1.1.6-0.2.src.rpm
7cdb6e62c1f9d07f4490471d0a66b490 2011/SRPMS/sqlite3-3.7.13-0.1.src.rpm
c36ea604ee25a8962918bb95f42884b4 2011/SRPMS/xulrunner-15.0-0.1.src.rpm
Mandriva Linux 2011/X86_64:
0e12e9d44ff9a8123fc7493dcb7077f8 2011/x86_64/firefox-15.0-0.1-mdv2011.0.x86_64.rpm
1a181da8dae38cfd5591db4694ed8fbc 2011/x86_64/firefox-af-15.0-0.1-mdv2011.0.noarch.rpm
55360547f9f98f3ced919ba6c50e579a 2011/x86_64/firefox-ar-15.0-0.1-mdv2011.0.noarch.rpm
5e0e1961a7b1f2eb344fd1f34afa0b66 2011/x86_64/firefox-ast-15.0-0.1-mdv2011.0.noarch.rpm
800c8a3ae03d6504dd83da97f58589de 2011/x86_64/firefox-be-15.0-0.1-mdv2011.0.noarch.rpm
7aa80805fc41aa719927ba9630ea548f 2011/x86_64/firefox-bg-15.0-0.1-mdv2011.0.noarch.rpm
bb751193947481a0d92066fd2bafefae 2011/x86_64/firefox-bn_BD-15.0-0.1-mdv2011.0.noarch.rpm
fc2863e629aa015dfe3ac3f0ebaf631e 2011/x86_64/firefox-bn_IN-15.0-0.1-mdv2011.0.noarch.rpm
aa7ba1bc7c14e5aa0cd0e0d9d4ff520f 2011/x86_64/firefox-br-15.0-0.1-mdv2011.0.noarch.rpm
49c06957e034fa5d5c183b2c4da1aa35 2011/x86_64/firefox-bs-15.0-0.1-mdv2011.0.noarch.rpm
8932ea8e47e5822db4efb414617f1aca 2011/x86_64/firefox-ca-15.0-0.1-mdv2011.0.noarch.rpm
12cc2f67e45e9c936b0df757929c30c1 2011/x86_64/firefox-cs-15.0-0.1-mdv2011.0.noarch.rpm
8c35b25848d1fc92e6ab20db07e07702 2011/x86_64/firefox-cy-15.0-0.1-mdv2011.0.noarch.rpm
78ca9cf1e222208de2aa05891999b978 2011/x86_64/firefox-da-15.0-0.1-mdv2011.0.noarch.rpm
8dff4be2f33606862b004e4033598a65 2011/x86_64/firefox-de-15.0-0.1-mdv2011.0.noarch.rpm
6e3f21c934da448622f78c98d14e51be 2011/x86_64/firefox-devel-15.0-0.1-mdv2011.0.x86_64.rpm
b91951fb96c66144c5b660b06385653a 2011/x86_64/firefox-el-15.0-0.1-mdv2011.0.noarch.rpm
932dad756f240fbf225dceeef30fca76 2011/x86_64/firefox-en_GB-15.0-0.1-mdv2011.0.noarch.rpm
6973da6f9fafd57c219cf44701ee3c2f 2011/x86_64/firefox-en_ZA-15.0-0.1-mdv2011.0.noarch.rpm
53b8f28aabfef241ba1b29345eb6b8f6 2011/x86_64/firefox-eo-15.0-0.1-mdv2011.0.noarch.rpm
433bde29ecc2dd65ee80a344482a6e21 2011/x86_64/firefox-es_AR-15.0-0.1-mdv2011.0.noarch.rpm
d3e1dea3f71c9e01164d7c44d729e6ab 2011/x86_64/firefox-es_CL-15.0-0.1-mdv2011.0.noarch.rpm
108b9ee83ce20174919f1f2b9989d539 2011/x86_64/firefox-es_ES-15.0-0.1-mdv2011.0.noarch.rpm
a09908b98b81d5141eaccb573f282780 2011/x86_64/firefox-es_MX-15.0-0.1-mdv2011.0.noarch.rpm
bca684c84cf0c67ab987611758132207 2011/x86_64/firefox-et-15.0-0.1-mdv2011.0.noarch.rpm
ee18e1f0855974fcd631dab8a7fdff3c 2011/x86_64/firefox-eu-15.0-0.1-mdv2011.0.noarch.rpm
727f24a1fa0d01c000050ba668710c71 2011/x86_64/firefox-fa-15.0-0.1-mdv2011.0.noarch.rpm
c14f3f7d08e1af11a21bb78cebb9e0a4 2011/x86_64/firefox-fi-15.0-0.1-mdv2011.0.noarch.rpm
c9bf3a1d7db2d326f44f4afbfb56f80f 2011/x86_64/firefox-fr-15.0-0.1-mdv2011.0.noarch.rpm
3c742d582d03dbb67a23c3b2b6a7c628 2011/x86_64/firefox-fy-15.0-0.1-mdv2011.0.noarch.rpm
83294ffb20ac9204b360afd35c4f926e 2011/x86_64/firefox-ga_IE-15.0-0.1-mdv2011.0.noarch.rpm
55fc357d551a3cf96533a0e8513b3191 2011/x86_64/firefox-gd-15.0-0.1-mdv2011.0.noarch.rpm
82f35973cab220ee73e699f078041e8d 2011/x86_64/firefox-gl-15.0-0.1-mdv2011.0.noarch.rpm
c74bd9183a85b1f70f93ae7857dbf4f1 2011/x86_64/firefox-gu_IN-15.0-0.1-mdv2011.0.noarch.rpm
76ed674fcc83ce4f9ffcb2426c68edd2 2011/x86_64/firefox-he-15.0-0.1-mdv2011.0.noarch.rpm
787844a81abc2381fc6d507c4635e617 2011/x86_64/firefox-hi-15.0-0.1-mdv2011.0.noarch.rpm
e624dd22d0d4393004b426565ce5ed2e 2011/x86_64/firefox-hr-15.0-0.1-mdv2011.0.noarch.rpm
9b96cda724241294456d1a7034f39ccb 2011/x86_64/firefox-hu-15.0-0.1-mdv2011.0.noarch.rpm
477907a657672818409beae06be8aff5 2011/x86_64/firefox-hy-15.0-0.1-mdv2011.0.noarch.rpm
c00476196d5fb8bbc9be437fc59971b8 2011/x86_64/firefox-id-15.0-0.1-mdv2011.0.noarch.rpm
6b074fa2d96d8f81af2f0823cbf9672c 2011/x86_64/firefox-is-15.0-0.1-mdv2011.0.noarch.rpm
2ce12cb5145efc398bbc0484a4b50838 2011/x86_64/firefox-it-15.0-0.1-mdv2011.0.noarch.rpm
f32e3bc9386dec60704de908e83dcbba 2011/x86_64/firefox-ja-15.0-0.1-mdv2011.0.noarch.rpm
71fbffb05956075768546aeb2fd84939 2011/x86_64/firefox-kk-15.0-0.1-mdv2011.0.noarch.rpm
d9cebef0570d2d09c0ba617c2cdf8525 2011/x86_64/firefox-kn-15.0-0.1-mdv2011.0.noarch.rpm
51584b7f863a78c0dea9dd6b7b3bd7c2 2011/x86_64/firefox-ko-15.0-0.1-mdv2011.0.noarch.rpm
f455e7aa94b96a12751359fa109c5d00 2011/x86_64/firefox-ku-15.0-0.1-mdv2011.0.noarch.rpm
436e157f25b477cf0adaddac02d8268a 2011/x86_64/firefox-lg-15.0-0.1-mdv2011.0.noarch.rpm
098d1b1c8d93eafafc857aa69d2745ea 2011/x86_64/firefox-lt-15.0-0.1-mdv2011.0.noarch.rpm
645a634ef43975f67039828dbbab56cf 2011/x86_64/firefox-lv-15.0-0.1-mdv2011.0.noarch.rpm
dc80bf890f4fe7db4e9d0bfc2266ad15 2011/x86_64/firefox-mai-15.0-0.1-mdv2011.0.noarch.rpm
10e45ce2b835a6a81b481653dab78880 2011/x86_64/firefox-mk-15.0-0.1-mdv2011.0.noarch.rpm
10c055dd5d49c5562e2c590661309518 2011/x86_64/firefox-ml-15.0-0.1-mdv2011.0.noarch.rpm
525dd0b30d68e43dd8e56b6b25a7b149 2011/x86_64/firefox-mr-15.0-0.1-mdv2011.0.noarch.rpm
c2c68003b652349c48b812d381c00248 2011/x86_64/firefox-nb_NO-15.0-0.1-mdv2011.0.noarch.rpm
3a1651ec18d3aef0da7234cc01d3de67 2011/x86_64/firefox-nl-15.0-0.1-mdv2011.0.noarch.rpm
d7f8797d04abcd86471bad8f05c541f0 2011/x86_64/firefox-nn_NO-15.0-0.1-mdv2011.0.noarch.rpm
f7bc6278e0a54b3cdbe855764f4457eb 2011/x86_64/firefox-nso-15.0-0.1-mdv2011.0.noarch.rpm
1ae275c8c3bdf83d7cde2be3feb3d1de 2011/x86_64/firefox-or-15.0-0.1-mdv2011.0.noarch.rpm
66b6127a9a0c658608668514c5c78884 2011/x86_64/firefox-pa_IN-15.0-0.1-mdv2011.0.noarch.rpm
2d486eabca55712bc8cc3a3252c7adcc 2011/x86_64/firefox-pl-15.0-0.1-mdv2011.0.noarch.rpm
fca74bdac00db9fae52fdac14e1c5b48 2011/x86_64/firefox-pt_BR-15.0-0.1-mdv2011.0.noarch.rpm
0c332cea72e001c903d5d82c9627efd5 2011/x86_64/firefox-pt_PT-15.0-0.1-mdv2011.0.noarch.rpm
3162e3ec2676a92f926cd31af88aa53e 2011/x86_64/firefox-ro-15.0-0.1-mdv2011.0.noarch.rpm
4cd1d49b0eaec676aa64e50f5796bbcc 2011/x86_64/firefox-ru-15.0-0.1-mdv2011.0.noarch.rpm
a5d6939ae79a981f2ccab6bc83cbd326 2011/x86_64/firefox-si-15.0-0.1-mdv2011.0.noarch.rpm
3385479540d49e9f47bb7b6da3af61d5 2011/x86_64/firefox-sk-15.0-0.1-mdv2011.0.noarch.rpm
24a3140b69a25734b5877422eead8fd7 2011/x86_64/firefox-sl-15.0-0.1-mdv2011.0.noarch.rpm
63a3c429e6c935ea1c67a1a2928b99e5 2011/x86_64/firefox-sq-15.0-0.1-mdv2011.0.noarch.rpm
41c9c59322de076f495352b6d05efdb5 2011/x86_64/firefox-sr-15.0-0.1-mdv2011.0.noarch.rpm
a23a5d5a39a1677b9f06db9b8e16478b 2011/x86_64/firefox-sv_SE-15.0-0.1-mdv2011.0.noarch.rpm
926fb2b0302ced70674ed8b3518558ee 2011/x86_64/firefox-ta-15.0-0.1-mdv2011.0.noarch.rpm
f7472be3b81befdcc3653cb9e71b46cf 2011/x86_64/firefox-ta_LK-15.0-0.1-mdv2011.0.noarch.rpm
4e88af6834cc8f590f260e13ca2f39bb 2011/x86_64/firefox-te-15.0-0.1-mdv2011.0.noarch.rpm
dac0f7e88abd24bee5a5c7695de442ed 2011/x86_64/firefox-th-15.0-0.1-mdv2011.0.noarch.rpm
0c3c48ce57c8f54e95a162a2a5f32f49 2011/x86_64/firefox-tr-15.0-0.1-mdv2011.0.noarch.rpm
86ab0a7d77f74a1822355574580efc38 2011/x86_64/firefox-uk-15.0-0.1-mdv2011.0.noarch.rpm
65188e896935cb4cabc3207b8da029cb 2011/x86_64/firefox-vi-15.0-0.1-mdv2011.0.noarch.rpm
f183fa37318efda5d033ecbf8e69aafc 2011/x86_64/firefox-zh_CN-15.0-0.1-mdv2011.0.noarch.rpm
1085b1aaf753421006716514b2dd4d51 2011/x86_64/firefox-zh_TW-15.0-0.1-mdv2011.0.noarch.rpm
61e9a3a0eb460cd4f4fdd4bae6d77502 2011/x86_64/firefox-zu-15.0-0.1-mdv2011.0.noarch.rpm
e21e61bc2a9a00d61632b671ec1a7c56 2011/x86_64/icedtea-web-1.1.6-0.2-mdv2011.0.x86_64.rpm
d25f4584600c089a687f7dee70e5cbd2 2011/x86_64/icedtea-web-javadoc-1.1.6-0.2-mdv2011.0.noarch.rpm
264d06ed466aa86874fb72bcb58b606b 2011/x86_64/lib64sqlite3_0-3.7.13-0.1-mdv2011.0.x86_64.rpm
0183919f566dd640cb4f050f568b3112 2011/x86_64/lib64sqlite3-devel-3.7.13-0.1-mdv2011.0.x86_64.rpm
f1368b8324e0031c8505a3e8f944eba0 2011/x86_64/lib64sqlite3-static-devel-3.7.13-0.1-mdv2011.0.x86_64.rpm
27154cd06e180c264d478037c5b189d5 2011/x86_64/lib64xulrunner15.0-15.0-0.1-mdv2011.0.x86_64.rpm
37023d7d5b9e3c135cdc21ce7e68a73c 2011/x86_64/lib64xulrunner-devel-15.0-0.1-mdv2011.0.x86_64.rpm
de18d6a57d7c417717f86a983d0faa5b 2011/x86_64/sqlite3-tools-3.7.13-0.1-mdv2011.0.x86_64.rpm
f4b5a15a168d314f542bab81ca67d339 2011/x86_64/xulrunner-15.0-0.1-mdv2011.0.x86_64.rpm
5f4955227553eb24c3886bf6a3716b55 2011/SRPMS/firefox-15.0-0.1.src.rpm
5cf3b047ef06dc671d3dade85543338e 2011/SRPMS/firefox-l10n-15.0-0.1.src.rpm
7846e5d4c210787f9ed3f34a485c5531 2011/SRPMS/icedtea-web-1.1.6-0.2.src.rpm
7cdb6e62c1f9d07f4490471d0a66b490 2011/SRPMS/sqlite3-3.7.13-0.1.src.rpm
c36ea604ee25a8962918bb95f42884b4 2011/SRPMS/xulrunner-15.0-0.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFQPcjxmqjQ0CJFipgRAvlQAJ9gra/7dalMiK9AOe28Plp6F44XOwCg4du7
rSG0ikRTba4V5jIqU8CTLtM=
=qscF
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists