[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1TMIya-0005Uv-Tr@titan.mandriva.com>
Date: Thu, 11 Oct 2012 15:39:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2012:163 ] firefox
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2012:163
http://www.mandriva.com/security/
_______________________________________________________________________
Package : firefox
Date : October 11, 2012
Affected: Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
Security issues were identified and fixed in mozilla firefox:
Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code (CVE-2012-3982).
Mozilla developer Johnny Stenback discovered that several methods
of a feature used for testing (DOMWindowUtils) are not protected by
existing security checks, allowing these methods to be called through
script by web pages. This was addressed by adding the existing security
checks to these methods (CVE-2012-3986).
Security researcher Soroush Dalili reported that a combination of
invoking full screen mode and navigating backwards in history could,
in some circumstances, cause a hang or crash due to a timing dependent
use-after-free pointer reference. This crash may be potentially
exploitable (CVE-2012-3988).
Mozilla community member Alice White reported that when the GetProperty
function is invoked through JSAPI, security checking can be bypassed
when getting cross-origin properties. This potentially allowed for
arbitrary code execution (CVE-2012-3991).
Security researcher Mariusz Mlynski reported that the location property
can be accessed by binary plugins through top.location and top can be
shadowed by Object.defineProperty as well. This can allow for possible
cross-site scripting (XSS) attacks through plugins (CVE-2012-3994).
Security researcher Mariusz Mlynski reported that when InstallTrigger
fails, it throws an error wrapped in a Chrome Object Wrapper (COW)
that fails to specify exposed properties. These can then be added
to the resulting object by an attacker, allowing access to chrome
privileged functions through script.
While investigating this issue, Mozilla security researcher
moz_bug_r_a4 found that COW did not disallow accessing of properties
from a standard prototype in some situations, even when the original
issue had been fixed (CVE-2012-3993, CVE-2012-4184).
Security researcher Mariusz Mlynski reported an issue with spoofing of
the location property. In this issue, writes to location.hash can be
used in concert with scripted history navigation to cause a specific
website to be loaded into the history object. The baseURI can then
be changed to this stored site, allowing an attacker to inject a
script or intercept posted data posted to a location specified with
a relative path (CVE-2012-3992).
Security researcher Abhishek Arya (Inferno) of the Google Chrome
Security Team discovered a series of use-after-free, buffer overflow,
and out of bounds read issues using the Address Sanitizer tool in
shipped software. These issues are potentially exploitable, allowing
for remote code execution. We would also like to thank Abhishek
for reporting two additional use-after-free flaws introduced
during Firefox 16 development and fixed before general release
(CVE-2012-3995, CVE-2012-4179, CVE-2012-4180, CVE-2012-4181,
CVE-2012-4182, CVE-2012-4183).
Security researcher Atte Kettunen from OUSPG reported several heap
memory corruption issues found using the Address Sanitizer tool. These
issues are potentially exploitable, allowing for remote code execution
(CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188).
Security researcher miaubiz used the Address Sanitizer tool to discover
a use-after-free in the IME State Manager code. This could lead to
a potentially exploitable crash (CVE-2012-3990).
The mozilla firefox packages has been upgraded to the latest version
which is unaffected by these security flaws.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990
http://www.mozilla.org/security/announce/2012/mfsa2012-74.html
http://www.mozilla.org/security/announce/2012/mfsa2012-77.html
http://www.mozilla.org/security/announce/2012/mfsa2012-79.html
http://www.mozilla.org/security/announce/2012/mfsa2012-81.html
http://www.mozilla.org/security/announce/2012/mfsa2012-82.html
http://www.mozilla.org/security/announce/2012/mfsa2012-83.html
http://www.mozilla.org/security/announce/2012/mfsa2012-84.html
http://www.mozilla.org/security/announce/2012/mfsa2012-85.html
http://www.mozilla.org/security/announce/2012/mfsa2012-86.html
http://www.mozilla.org/security/announce/2012/mfsa2012-87.html
_______________________________________________________________________
Updated Packages:
Mandriva Enterprise Server 5:
18b4958fa1973f702cbed84b9f20159c mes5/i586/firefox-10.0.8-0.1mdvmes5.2.i586.rpm
2647f6b7ad8f48070a427583916ad32a mes5/i586/firefox-af-10.0.8-0.1mdvmes5.2.i586.rpm
f4b347adeb27ed23b86d5db6a206a3af mes5/i586/firefox-ar-10.0.8-0.1mdvmes5.2.i586.rpm
586df4b276be9436d53ef9fbd5fa5ed5 mes5/i586/firefox-be-10.0.8-0.1mdvmes5.2.i586.rpm
626cbcf39f47055c0699ec84788818e3 mes5/i586/firefox-bg-10.0.8-0.1mdvmes5.2.i586.rpm
0daca37b722b654b84d991d607edd450 mes5/i586/firefox-bn-10.0.8-0.1mdvmes5.2.i586.rpm
dc8815fb6be57e3dcc1d4b9882835d9b mes5/i586/firefox-ca-10.0.8-0.1mdvmes5.2.i586.rpm
f1aed3384b2496bf7db1dc1ed93dbf39 mes5/i586/firefox-cs-10.0.8-0.1mdvmes5.2.i586.rpm
424f954bd6cf5201bc18a8c14d891964 mes5/i586/firefox-cy-10.0.8-0.1mdvmes5.2.i586.rpm
e404fd8b2e77ddfc3e0cec73ce66558b mes5/i586/firefox-da-10.0.8-0.1mdvmes5.2.i586.rpm
d6df89a166f04e7f0d8d5092caeb416e mes5/i586/firefox-de-10.0.8-0.1mdvmes5.2.i586.rpm
564cc55029db0f3abd6477b784d545be mes5/i586/firefox-devel-10.0.8-0.1mdvmes5.2.i586.rpm
93ab5d7347369e61ccacfe39430127d9 mes5/i586/firefox-el-10.0.8-0.1mdvmes5.2.i586.rpm
26045064a52588b84caeea6630b40ea6 mes5/i586/firefox-en_GB-10.0.8-0.1mdvmes5.2.i586.rpm
911d31127d57ed6fc43e1c997d4e012f mes5/i586/firefox-eo-10.0.8-0.1mdvmes5.2.i586.rpm
247336e3fa7a13b944d7b97dc00ec234 mes5/i586/firefox-es_AR-10.0.8-0.1mdvmes5.2.i586.rpm
df718458acb2846aa3e4c2db500d61b5 mes5/i586/firefox-es_ES-10.0.8-0.1mdvmes5.2.i586.rpm
fb300c3216dfbc1de89374965cfc32a6 mes5/i586/firefox-et-10.0.8-0.1mdvmes5.2.i586.rpm
51f9c5d47f6f88b4ebf1abf565de599b mes5/i586/firefox-eu-10.0.8-0.1mdvmes5.2.i586.rpm
16b2ade910ccc3a0d5b7fff3c714b9e0 mes5/i586/firefox-fi-10.0.8-0.1mdvmes5.2.i586.rpm
53ccc7e83d96fd9c93de5c3c604f6bb0 mes5/i586/firefox-fr-10.0.8-0.1mdvmes5.2.i586.rpm
f5a90820225a51076c77ee3b42696e47 mes5/i586/firefox-fy-10.0.8-0.1mdvmes5.2.i586.rpm
bef5299da948e97be351deafe721370e mes5/i586/firefox-ga_IE-10.0.8-0.1mdvmes5.2.i586.rpm
5438439ac7afa1a625700d6eff790acb mes5/i586/firefox-gl-10.0.8-0.1mdvmes5.2.i586.rpm
7a75e4a2f2d496a435f3d264cf3302ab mes5/i586/firefox-gu_IN-10.0.8-0.1mdvmes5.2.i586.rpm
c54843a324535ae7de0af6b5432448a0 mes5/i586/firefox-he-10.0.8-0.1mdvmes5.2.i586.rpm
22dad8f088aa2790db88c7cdcd6c17e3 mes5/i586/firefox-hi-10.0.8-0.1mdvmes5.2.i586.rpm
71b0341b69f1ba7b062df4b8831b07cf mes5/i586/firefox-hu-10.0.8-0.1mdvmes5.2.i586.rpm
54a578b6c9bdffac785c42e2fcbe0752 mes5/i586/firefox-id-10.0.8-0.1mdvmes5.2.i586.rpm
c7bac88f81d74a3e6bb84d6e53530114 mes5/i586/firefox-is-10.0.8-0.1mdvmes5.2.i586.rpm
6b0a05fe207de1cb70ede2bdc08a4fe6 mes5/i586/firefox-it-10.0.8-0.1mdvmes5.2.i586.rpm
2a5f7c384e6e8b604960e371ecc0994d mes5/i586/firefox-ja-10.0.8-0.1mdvmes5.2.i586.rpm
c1a4d25f413532867f88ce512d8518cf mes5/i586/firefox-ka-10.0.8-0.1mdvmes5.2.i586.rpm
92cb841c8a4ff36d466486529e52e9b0 mes5/i586/firefox-kn-10.0.8-0.1mdvmes5.2.i586.rpm
7e7e48d65c67e701fe7e9520cef5b879 mes5/i586/firefox-ko-10.0.8-0.1mdvmes5.2.i586.rpm
00e266a86115a996be3729110f2c55fb mes5/i586/firefox-ku-10.0.8-0.1mdvmes5.2.i586.rpm
8204ae0e260820b38ab41512040e74e9 mes5/i586/firefox-lt-10.0.8-0.1mdvmes5.2.i586.rpm
277e5bcebb58210f58eca0260c9f0d7d mes5/i586/firefox-lv-10.0.8-0.1mdvmes5.2.i586.rpm
e8875c4546bbc9ea23412bfb6d0d6d05 mes5/i586/firefox-mk-10.0.8-0.1mdvmes5.2.i586.rpm
b4dc97b4578e0f5867d5e1d631a6935f mes5/i586/firefox-mr-10.0.8-0.1mdvmes5.2.i586.rpm
a908016d1d790cc3730de8dd43d752df mes5/i586/firefox-nb_NO-10.0.8-0.1mdvmes5.2.i586.rpm
3db355e81b5d5a08cf40fec9516095dc mes5/i586/firefox-nl-10.0.8-0.1mdvmes5.2.i586.rpm
f4b80bc1df63cc65600374da4d725b97 mes5/i586/firefox-nn_NO-10.0.8-0.1mdvmes5.2.i586.rpm
73a717cb9578ddf6da09419dcfd9b93e mes5/i586/firefox-oc-10.0.8-0.1mdvmes5.2.i586.rpm
570422becfa4a851c6e95040f2a5779b mes5/i586/firefox-pa_IN-10.0.8-0.1mdvmes5.2.i586.rpm
f8c0bdc02309778de67ca878d60a557d mes5/i586/firefox-pl-10.0.8-0.1mdvmes5.2.i586.rpm
077f52791e93c41ba5db8353dd37dfe6 mes5/i586/firefox-pt_BR-10.0.8-0.1mdvmes5.2.i586.rpm
e68c00ba970f2a3eb07eae58a90d1513 mes5/i586/firefox-pt_PT-10.0.8-0.1mdvmes5.2.i586.rpm
3b72179b06cb64f42658dee91eaf8340 mes5/i586/firefox-ro-10.0.8-0.1mdvmes5.2.i586.rpm
c9aa2ea8cc85c88f7e5e56e249c7e7a6 mes5/i586/firefox-ru-10.0.8-0.1mdvmes5.2.i586.rpm
fab410d8b6655dcdfe01deab8b67a64f mes5/i586/firefox-si-10.0.8-0.1mdvmes5.2.i586.rpm
eb46c19ebc307ccce7e91e4d2f3c133b mes5/i586/firefox-sk-10.0.8-0.1mdvmes5.2.i586.rpm
18001364ee5341328bb68a49cce08b95 mes5/i586/firefox-sl-10.0.8-0.1mdvmes5.2.i586.rpm
ff85462fd1eb970303b0eeeaf063157f mes5/i586/firefox-sq-10.0.8-0.1mdvmes5.2.i586.rpm
c3b247291050d5ca28693e42a95a467e mes5/i586/firefox-sr-10.0.8-0.1mdvmes5.2.i586.rpm
2df9b8518aa5189d18bc67f781e2583b mes5/i586/firefox-sv_SE-10.0.8-0.1mdvmes5.2.i586.rpm
84774cda3b0c0f6c9f761c4e7798c980 mes5/i586/firefox-te-10.0.8-0.1mdvmes5.2.i586.rpm
523a30b0824d0fa8549c28099a398aa9 mes5/i586/firefox-th-10.0.8-0.1mdvmes5.2.i586.rpm
85cf36694236dc9812c642e6835968de mes5/i586/firefox-tr-10.0.8-0.1mdvmes5.2.i586.rpm
57b2c12673884904e041d881d7013f82 mes5/i586/firefox-uk-10.0.8-0.1mdvmes5.2.i586.rpm
4723206853faa1d6eee539649665d213 mes5/i586/firefox-zh_CN-10.0.8-0.1mdvmes5.2.i586.rpm
bcdc27fcc1ebdfa52c6ff340b35198b8 mes5/i586/firefox-zh_TW-10.0.8-0.1mdvmes5.2.i586.rpm
a90b6acf7e9ae7cb41cd9f0e8f65a35f mes5/i586/libxulrunner10.0.8-10.0.8-0.1mdvmes5.2.i586.rpm
cf53e5f6eb711b41791ca45834d8409f mes5/i586/libxulrunner-devel-10.0.8-0.1mdvmes5.2.i586.rpm
b8ffef485233d97bdb77f18f022aa9e8 mes5/i586/xulrunner-10.0.8-0.1mdvmes5.2.i586.rpm
6b5849f56718fddb19c22391919c6caf mes5/SRPMS/firefox-10.0.8-0.1mdvmes5.2.src.rpm
5f9f856717ec26737700be8ac851b2aa mes5/SRPMS/firefox-l10n-10.0.8-0.1mdvmes5.2.src.rpm
849d8b54de62cd1716ceeef8c36ee0e7 mes5/SRPMS/xulrunner-10.0.8-0.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
0883a9f9de1db56f55296d7b8905c3d9 mes5/x86_64/firefox-10.0.8-0.1mdvmes5.2.x86_64.rpm
728177ae72a24b5631edae618bf1f29d mes5/x86_64/firefox-af-10.0.8-0.1mdvmes5.2.x86_64.rpm
80d65f878a19d6af07ea2090c78fb609 mes5/x86_64/firefox-ar-10.0.8-0.1mdvmes5.2.x86_64.rpm
8f55497903c4db05888415acc1aba830 mes5/x86_64/firefox-be-10.0.8-0.1mdvmes5.2.x86_64.rpm
3eece7dc190cfbf26514b7216afa81b8 mes5/x86_64/firefox-bg-10.0.8-0.1mdvmes5.2.x86_64.rpm
c3d70e1661ea6532013d94b7a8ae5b33 mes5/x86_64/firefox-bn-10.0.8-0.1mdvmes5.2.x86_64.rpm
de69ce78464063544a83d21bd58ad349 mes5/x86_64/firefox-ca-10.0.8-0.1mdvmes5.2.x86_64.rpm
6980ac75c0e8a332401cbe65053c4bb3 mes5/x86_64/firefox-cs-10.0.8-0.1mdvmes5.2.x86_64.rpm
0904a7326bb39230f441bbed04bb04a0 mes5/x86_64/firefox-cy-10.0.8-0.1mdvmes5.2.x86_64.rpm
e6443a05c458defa2dd5615a7efe58c3 mes5/x86_64/firefox-da-10.0.8-0.1mdvmes5.2.x86_64.rpm
aa6c761b14752eb1e77199cd6e4f4db7 mes5/x86_64/firefox-de-10.0.8-0.1mdvmes5.2.x86_64.rpm
a86aa716be097d55f0b377729d03e2d1 mes5/x86_64/firefox-devel-10.0.8-0.1mdvmes5.2.x86_64.rpm
5b57f19ff04195a6ed7db74d4d4b0c97 mes5/x86_64/firefox-el-10.0.8-0.1mdvmes5.2.x86_64.rpm
c52cbbbb3dce82117db33db89a25b7e3 mes5/x86_64/firefox-en_GB-10.0.8-0.1mdvmes5.2.x86_64.rpm
fbfe8900e210c473f6f2a012ef939c96 mes5/x86_64/firefox-eo-10.0.8-0.1mdvmes5.2.x86_64.rpm
561ae14e68dbaec1d0c156c8006fefec mes5/x86_64/firefox-es_AR-10.0.8-0.1mdvmes5.2.x86_64.rpm
cb295d044f7c33152fc6acf6dbef0f20 mes5/x86_64/firefox-es_ES-10.0.8-0.1mdvmes5.2.x86_64.rpm
070c54ec44bdd92ce15e0dd4a8f8d632 mes5/x86_64/firefox-et-10.0.8-0.1mdvmes5.2.x86_64.rpm
0bbeb506fa06563d4342b961a94e46dd mes5/x86_64/firefox-eu-10.0.8-0.1mdvmes5.2.x86_64.rpm
ba9089fae63396324c43e1e39735c01a mes5/x86_64/firefox-fi-10.0.8-0.1mdvmes5.2.x86_64.rpm
1460f5530b00b2885cccf72a823c5a46 mes5/x86_64/firefox-fr-10.0.8-0.1mdvmes5.2.x86_64.rpm
ad94002972b598af90e58aba84f70855 mes5/x86_64/firefox-fy-10.0.8-0.1mdvmes5.2.x86_64.rpm
cdbc3d8e32ec144db1812f5a2aeab5bb mes5/x86_64/firefox-ga_IE-10.0.8-0.1mdvmes5.2.x86_64.rpm
056b5b3b7a8cacc319041c0012e7ad4b mes5/x86_64/firefox-gl-10.0.8-0.1mdvmes5.2.x86_64.rpm
cf0d943ecfdcd674f92c1395a28a5cbe mes5/x86_64/firefox-gu_IN-10.0.8-0.1mdvmes5.2.x86_64.rpm
2ca267ddb695bef714352bb0e57feb27 mes5/x86_64/firefox-he-10.0.8-0.1mdvmes5.2.x86_64.rpm
e016aa204927dfa1011ea450a5e4feaa mes5/x86_64/firefox-hi-10.0.8-0.1mdvmes5.2.x86_64.rpm
551681f2abc572eaa256f64237f7c677 mes5/x86_64/firefox-hu-10.0.8-0.1mdvmes5.2.x86_64.rpm
245f7b0a90d9fe5dd9b0c706cda6eb2f mes5/x86_64/firefox-id-10.0.8-0.1mdvmes5.2.x86_64.rpm
77bf660ff93973d6090be707d4e09b28 mes5/x86_64/firefox-is-10.0.8-0.1mdvmes5.2.x86_64.rpm
150bdd42557bcbdf7022d13976d38b35 mes5/x86_64/firefox-it-10.0.8-0.1mdvmes5.2.x86_64.rpm
517e28cc738785c4402f4d0afe7203a9 mes5/x86_64/firefox-ja-10.0.8-0.1mdvmes5.2.x86_64.rpm
6438f7ba42be63c5efc9d0e1e8bde089 mes5/x86_64/firefox-ka-10.0.8-0.1mdvmes5.2.x86_64.rpm
795974bc965caaba283f8e78d3722f41 mes5/x86_64/firefox-kn-10.0.8-0.1mdvmes5.2.x86_64.rpm
0b1186e2a195bcd9074031c4bbce79f4 mes5/x86_64/firefox-ko-10.0.8-0.1mdvmes5.2.x86_64.rpm
fd371a84eddf0bd6a11b9229304967cd mes5/x86_64/firefox-ku-10.0.8-0.1mdvmes5.2.x86_64.rpm
4865d702388379da81085e5ba1f5fd5a mes5/x86_64/firefox-lt-10.0.8-0.1mdvmes5.2.x86_64.rpm
57f79f47919b7cae7180a43d809944f6 mes5/x86_64/firefox-lv-10.0.8-0.1mdvmes5.2.x86_64.rpm
d4ce166e82f27b41846f2a3404bd407b mes5/x86_64/firefox-mk-10.0.8-0.1mdvmes5.2.x86_64.rpm
357082d898ae70e8d2abec9da7f6d3ec mes5/x86_64/firefox-mr-10.0.8-0.1mdvmes5.2.x86_64.rpm
0e61d6a2f26dd11fc3c531e044a21402 mes5/x86_64/firefox-nb_NO-10.0.8-0.1mdvmes5.2.x86_64.rpm
5c39340673283f52a2c268207a221fa4 mes5/x86_64/firefox-nl-10.0.8-0.1mdvmes5.2.x86_64.rpm
e8989e4b71f9e761db1a5eb2ab5ba772 mes5/x86_64/firefox-nn_NO-10.0.8-0.1mdvmes5.2.x86_64.rpm
0cdf48db846c7744e37cedc1b562806d mes5/x86_64/firefox-oc-10.0.8-0.1mdvmes5.2.x86_64.rpm
96da7ef1509716a8ecd89398de5c7cc8 mes5/x86_64/firefox-pa_IN-10.0.8-0.1mdvmes5.2.x86_64.rpm
ba8ee24d071fb52cea5c1b2a550aa70b mes5/x86_64/firefox-pl-10.0.8-0.1mdvmes5.2.x86_64.rpm
e692fc3231c443faf2e17f79333b735c mes5/x86_64/firefox-pt_BR-10.0.8-0.1mdvmes5.2.x86_64.rpm
afa8d2ee0e1af4f066a48fc39149110e mes5/x86_64/firefox-pt_PT-10.0.8-0.1mdvmes5.2.x86_64.rpm
f4ad6008159c2927efe3b19fd4512315 mes5/x86_64/firefox-ro-10.0.8-0.1mdvmes5.2.x86_64.rpm
54d3c7b448c3c25ab861873d936987b7 mes5/x86_64/firefox-ru-10.0.8-0.1mdvmes5.2.x86_64.rpm
c905a26289fb94cc2dafb606f57f890e mes5/x86_64/firefox-si-10.0.8-0.1mdvmes5.2.x86_64.rpm
32d9b6865b5b6d558ab97b36d8719d45 mes5/x86_64/firefox-sk-10.0.8-0.1mdvmes5.2.x86_64.rpm
232ad0abe4270616befb65f0b2004482 mes5/x86_64/firefox-sl-10.0.8-0.1mdvmes5.2.x86_64.rpm
8ea61f2759c003713f2b9e504260d981 mes5/x86_64/firefox-sq-10.0.8-0.1mdvmes5.2.x86_64.rpm
8f4fdbd663bd27c4d5ab42411347a4a4 mes5/x86_64/firefox-sr-10.0.8-0.1mdvmes5.2.x86_64.rpm
f83702a0a59009633d10251c19c3d926 mes5/x86_64/firefox-sv_SE-10.0.8-0.1mdvmes5.2.x86_64.rpm
3805edda674577f2e609f889ec57068b mes5/x86_64/firefox-te-10.0.8-0.1mdvmes5.2.x86_64.rpm
981974d5861ece6999832b94026288b5 mes5/x86_64/firefox-th-10.0.8-0.1mdvmes5.2.x86_64.rpm
799e5c4479f9e4078395f17255c9d395 mes5/x86_64/firefox-tr-10.0.8-0.1mdvmes5.2.x86_64.rpm
4ddfcf42ff77710b44ad927c8e165a04 mes5/x86_64/firefox-uk-10.0.8-0.1mdvmes5.2.x86_64.rpm
e9873026b2a5731c3f02e3bd6207cc61 mes5/x86_64/firefox-zh_CN-10.0.8-0.1mdvmes5.2.x86_64.rpm
4e80e8eae6e165bd3b9de77f56355e18 mes5/x86_64/firefox-zh_TW-10.0.8-0.1mdvmes5.2.x86_64.rpm
7399b9d40787e878941d927b2099cfd4 mes5/x86_64/lib64xulrunner10.0.8-10.0.8-0.1mdvmes5.2.x86_64.rpm
350953ef50ace31a4bdf0aac88ef26f9 mes5/x86_64/lib64xulrunner-devel-10.0.8-0.1mdvmes5.2.x86_64.rpm
3b728cc723a0d37366f7efb1055f68a1 mes5/x86_64/xulrunner-10.0.8-0.1mdvmes5.2.x86_64.rpm
6b5849f56718fddb19c22391919c6caf mes5/SRPMS/firefox-10.0.8-0.1mdvmes5.2.src.rpm
5f9f856717ec26737700be8ac851b2aa mes5/SRPMS/firefox-l10n-10.0.8-0.1mdvmes5.2.src.rpm
849d8b54de62cd1716ceeef8c36ee0e7 mes5/SRPMS/xulrunner-10.0.8-0.1mdvmes5.2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFQdp/zmqjQ0CJFipgRAoLvAJ418KmxlFghV0dHucmHAinnbYB7+wCg43rk
+dRrxPXJ7+lTD3pZcdL5gu0=
=dLD8
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists