lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1TMIya-0005Uv-Tr@titan.mandriva.com>
Date: Thu, 11 Oct 2012 15:39:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2012:163 ] firefox

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:163
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : firefox
 Date    : October 11, 2012
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Security issues were identified and fixed in mozilla firefox:
 
 Mozilla developers identified and fixed several memory safety
 bugs in the browser engine used in Firefox and other Mozilla-based
 products. Some of these bugs showed evidence of memory corruption under
 certain circumstances, and we presume that with enough effort at least
 some of these could be exploited to run arbitrary code (CVE-2012-3982).
 
 Mozilla developer Johnny Stenback discovered that several methods
 of a feature used for testing (DOMWindowUtils) are not protected by
 existing security checks, allowing these methods to be called through
 script by web pages. This was addressed by adding the existing security
 checks to these methods (CVE-2012-3986).
 
 Security researcher Soroush Dalili reported that a combination of
 invoking full screen mode and navigating backwards in history could,
 in some circumstances, cause a hang or crash due to a timing dependent
 use-after-free pointer reference. This crash may be potentially
 exploitable (CVE-2012-3988).
 
 Mozilla community member Alice White reported that when the GetProperty
 function is invoked through JSAPI, security checking can be bypassed
 when getting cross-origin properties. This potentially allowed for
 arbitrary code execution (CVE-2012-3991).
 
 Security researcher Mariusz Mlynski reported that the location property
 can be accessed by binary plugins through top.location and top can be
 shadowed by Object.defineProperty as well. This can allow for possible
 cross-site scripting (XSS) attacks through plugins (CVE-2012-3994).
 
 Security researcher Mariusz Mlynski reported that when InstallTrigger
 fails, it throws an error wrapped in a Chrome Object Wrapper (COW)
 that fails to specify exposed properties. These can then be added
 to the resulting object by an attacker, allowing access to chrome
 privileged functions through script.
 
 While investigating this issue, Mozilla security researcher
 moz_bug_r_a4 found that COW did not disallow accessing of properties
 from a standard prototype in some situations, even when the original
 issue had been fixed (CVE-2012-3993, CVE-2012-4184).
 
 Security researcher Mariusz Mlynski reported an issue with spoofing of
 the location property. In this issue, writes to location.hash can be
 used in concert with scripted history navigation to cause a specific
 website to be loaded into the history object. The baseURI can then
 be changed to this stored site, allowing an attacker to inject a
 script or intercept posted data posted to a location specified with
 a relative path (CVE-2012-3992).
 
 Security researcher Abhishek Arya (Inferno) of the Google Chrome
 Security Team discovered a series of use-after-free, buffer overflow,
 and out of bounds read issues using the Address Sanitizer tool in
 shipped software. These issues are potentially exploitable, allowing
 for remote code execution. We would also like to thank Abhishek
 for reporting two additional use-after-free flaws introduced
 during Firefox 16 development and fixed before general release
 (CVE-2012-3995, CVE-2012-4179, CVE-2012-4180, CVE-2012-4181,
 CVE-2012-4182, CVE-2012-4183).
 
 Security researcher Atte Kettunen from OUSPG reported several heap
 memory corruption issues found using the Address Sanitizer tool. These
 issues are potentially exploitable, allowing for remote code execution
 (CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188).
 
 Security researcher miaubiz used the Address Sanitizer tool to discover
 a use-after-free in the IME State Manager code. This could lead to
 a potentially exploitable crash (CVE-2012-3990).
 
 The mozilla firefox packages has been upgraded to the latest version
 which is unaffected by these security flaws.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990
 http://www.mozilla.org/security/announce/2012/mfsa2012-74.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-77.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-79.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-81.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-82.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-83.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-84.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-85.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-86.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-87.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 18b4958fa1973f702cbed84b9f20159c  mes5/i586/firefox-10.0.8-0.1mdvmes5.2.i586.rpm
 2647f6b7ad8f48070a427583916ad32a  mes5/i586/firefox-af-10.0.8-0.1mdvmes5.2.i586.rpm
 f4b347adeb27ed23b86d5db6a206a3af  mes5/i586/firefox-ar-10.0.8-0.1mdvmes5.2.i586.rpm
 586df4b276be9436d53ef9fbd5fa5ed5  mes5/i586/firefox-be-10.0.8-0.1mdvmes5.2.i586.rpm
 626cbcf39f47055c0699ec84788818e3  mes5/i586/firefox-bg-10.0.8-0.1mdvmes5.2.i586.rpm
 0daca37b722b654b84d991d607edd450  mes5/i586/firefox-bn-10.0.8-0.1mdvmes5.2.i586.rpm
 dc8815fb6be57e3dcc1d4b9882835d9b  mes5/i586/firefox-ca-10.0.8-0.1mdvmes5.2.i586.rpm
 f1aed3384b2496bf7db1dc1ed93dbf39  mes5/i586/firefox-cs-10.0.8-0.1mdvmes5.2.i586.rpm
 424f954bd6cf5201bc18a8c14d891964  mes5/i586/firefox-cy-10.0.8-0.1mdvmes5.2.i586.rpm
 e404fd8b2e77ddfc3e0cec73ce66558b  mes5/i586/firefox-da-10.0.8-0.1mdvmes5.2.i586.rpm
 d6df89a166f04e7f0d8d5092caeb416e  mes5/i586/firefox-de-10.0.8-0.1mdvmes5.2.i586.rpm
 564cc55029db0f3abd6477b784d545be  mes5/i586/firefox-devel-10.0.8-0.1mdvmes5.2.i586.rpm
 93ab5d7347369e61ccacfe39430127d9  mes5/i586/firefox-el-10.0.8-0.1mdvmes5.2.i586.rpm
 26045064a52588b84caeea6630b40ea6  mes5/i586/firefox-en_GB-10.0.8-0.1mdvmes5.2.i586.rpm
 911d31127d57ed6fc43e1c997d4e012f  mes5/i586/firefox-eo-10.0.8-0.1mdvmes5.2.i586.rpm
 247336e3fa7a13b944d7b97dc00ec234  mes5/i586/firefox-es_AR-10.0.8-0.1mdvmes5.2.i586.rpm
 df718458acb2846aa3e4c2db500d61b5  mes5/i586/firefox-es_ES-10.0.8-0.1mdvmes5.2.i586.rpm
 fb300c3216dfbc1de89374965cfc32a6  mes5/i586/firefox-et-10.0.8-0.1mdvmes5.2.i586.rpm
 51f9c5d47f6f88b4ebf1abf565de599b  mes5/i586/firefox-eu-10.0.8-0.1mdvmes5.2.i586.rpm
 16b2ade910ccc3a0d5b7fff3c714b9e0  mes5/i586/firefox-fi-10.0.8-0.1mdvmes5.2.i586.rpm
 53ccc7e83d96fd9c93de5c3c604f6bb0  mes5/i586/firefox-fr-10.0.8-0.1mdvmes5.2.i586.rpm
 f5a90820225a51076c77ee3b42696e47  mes5/i586/firefox-fy-10.0.8-0.1mdvmes5.2.i586.rpm
 bef5299da948e97be351deafe721370e  mes5/i586/firefox-ga_IE-10.0.8-0.1mdvmes5.2.i586.rpm
 5438439ac7afa1a625700d6eff790acb  mes5/i586/firefox-gl-10.0.8-0.1mdvmes5.2.i586.rpm
 7a75e4a2f2d496a435f3d264cf3302ab  mes5/i586/firefox-gu_IN-10.0.8-0.1mdvmes5.2.i586.rpm
 c54843a324535ae7de0af6b5432448a0  mes5/i586/firefox-he-10.0.8-0.1mdvmes5.2.i586.rpm
 22dad8f088aa2790db88c7cdcd6c17e3  mes5/i586/firefox-hi-10.0.8-0.1mdvmes5.2.i586.rpm
 71b0341b69f1ba7b062df4b8831b07cf  mes5/i586/firefox-hu-10.0.8-0.1mdvmes5.2.i586.rpm
 54a578b6c9bdffac785c42e2fcbe0752  mes5/i586/firefox-id-10.0.8-0.1mdvmes5.2.i586.rpm
 c7bac88f81d74a3e6bb84d6e53530114  mes5/i586/firefox-is-10.0.8-0.1mdvmes5.2.i586.rpm
 6b0a05fe207de1cb70ede2bdc08a4fe6  mes5/i586/firefox-it-10.0.8-0.1mdvmes5.2.i586.rpm
 2a5f7c384e6e8b604960e371ecc0994d  mes5/i586/firefox-ja-10.0.8-0.1mdvmes5.2.i586.rpm
 c1a4d25f413532867f88ce512d8518cf  mes5/i586/firefox-ka-10.0.8-0.1mdvmes5.2.i586.rpm
 92cb841c8a4ff36d466486529e52e9b0  mes5/i586/firefox-kn-10.0.8-0.1mdvmes5.2.i586.rpm
 7e7e48d65c67e701fe7e9520cef5b879  mes5/i586/firefox-ko-10.0.8-0.1mdvmes5.2.i586.rpm
 00e266a86115a996be3729110f2c55fb  mes5/i586/firefox-ku-10.0.8-0.1mdvmes5.2.i586.rpm
 8204ae0e260820b38ab41512040e74e9  mes5/i586/firefox-lt-10.0.8-0.1mdvmes5.2.i586.rpm
 277e5bcebb58210f58eca0260c9f0d7d  mes5/i586/firefox-lv-10.0.8-0.1mdvmes5.2.i586.rpm
 e8875c4546bbc9ea23412bfb6d0d6d05  mes5/i586/firefox-mk-10.0.8-0.1mdvmes5.2.i586.rpm
 b4dc97b4578e0f5867d5e1d631a6935f  mes5/i586/firefox-mr-10.0.8-0.1mdvmes5.2.i586.rpm
 a908016d1d790cc3730de8dd43d752df  mes5/i586/firefox-nb_NO-10.0.8-0.1mdvmes5.2.i586.rpm
 3db355e81b5d5a08cf40fec9516095dc  mes5/i586/firefox-nl-10.0.8-0.1mdvmes5.2.i586.rpm
 f4b80bc1df63cc65600374da4d725b97  mes5/i586/firefox-nn_NO-10.0.8-0.1mdvmes5.2.i586.rpm
 73a717cb9578ddf6da09419dcfd9b93e  mes5/i586/firefox-oc-10.0.8-0.1mdvmes5.2.i586.rpm
 570422becfa4a851c6e95040f2a5779b  mes5/i586/firefox-pa_IN-10.0.8-0.1mdvmes5.2.i586.rpm
 f8c0bdc02309778de67ca878d60a557d  mes5/i586/firefox-pl-10.0.8-0.1mdvmes5.2.i586.rpm
 077f52791e93c41ba5db8353dd37dfe6  mes5/i586/firefox-pt_BR-10.0.8-0.1mdvmes5.2.i586.rpm
 e68c00ba970f2a3eb07eae58a90d1513  mes5/i586/firefox-pt_PT-10.0.8-0.1mdvmes5.2.i586.rpm
 3b72179b06cb64f42658dee91eaf8340  mes5/i586/firefox-ro-10.0.8-0.1mdvmes5.2.i586.rpm
 c9aa2ea8cc85c88f7e5e56e249c7e7a6  mes5/i586/firefox-ru-10.0.8-0.1mdvmes5.2.i586.rpm
 fab410d8b6655dcdfe01deab8b67a64f  mes5/i586/firefox-si-10.0.8-0.1mdvmes5.2.i586.rpm
 eb46c19ebc307ccce7e91e4d2f3c133b  mes5/i586/firefox-sk-10.0.8-0.1mdvmes5.2.i586.rpm
 18001364ee5341328bb68a49cce08b95  mes5/i586/firefox-sl-10.0.8-0.1mdvmes5.2.i586.rpm
 ff85462fd1eb970303b0eeeaf063157f  mes5/i586/firefox-sq-10.0.8-0.1mdvmes5.2.i586.rpm
 c3b247291050d5ca28693e42a95a467e  mes5/i586/firefox-sr-10.0.8-0.1mdvmes5.2.i586.rpm
 2df9b8518aa5189d18bc67f781e2583b  mes5/i586/firefox-sv_SE-10.0.8-0.1mdvmes5.2.i586.rpm
 84774cda3b0c0f6c9f761c4e7798c980  mes5/i586/firefox-te-10.0.8-0.1mdvmes5.2.i586.rpm
 523a30b0824d0fa8549c28099a398aa9  mes5/i586/firefox-th-10.0.8-0.1mdvmes5.2.i586.rpm
 85cf36694236dc9812c642e6835968de  mes5/i586/firefox-tr-10.0.8-0.1mdvmes5.2.i586.rpm
 57b2c12673884904e041d881d7013f82  mes5/i586/firefox-uk-10.0.8-0.1mdvmes5.2.i586.rpm
 4723206853faa1d6eee539649665d213  mes5/i586/firefox-zh_CN-10.0.8-0.1mdvmes5.2.i586.rpm
 bcdc27fcc1ebdfa52c6ff340b35198b8  mes5/i586/firefox-zh_TW-10.0.8-0.1mdvmes5.2.i586.rpm
 a90b6acf7e9ae7cb41cd9f0e8f65a35f  mes5/i586/libxulrunner10.0.8-10.0.8-0.1mdvmes5.2.i586.rpm
 cf53e5f6eb711b41791ca45834d8409f  mes5/i586/libxulrunner-devel-10.0.8-0.1mdvmes5.2.i586.rpm
 b8ffef485233d97bdb77f18f022aa9e8  mes5/i586/xulrunner-10.0.8-0.1mdvmes5.2.i586.rpm 
 6b5849f56718fddb19c22391919c6caf  mes5/SRPMS/firefox-10.0.8-0.1mdvmes5.2.src.rpm
 5f9f856717ec26737700be8ac851b2aa  mes5/SRPMS/firefox-l10n-10.0.8-0.1mdvmes5.2.src.rpm
 849d8b54de62cd1716ceeef8c36ee0e7  mes5/SRPMS/xulrunner-10.0.8-0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 0883a9f9de1db56f55296d7b8905c3d9  mes5/x86_64/firefox-10.0.8-0.1mdvmes5.2.x86_64.rpm
 728177ae72a24b5631edae618bf1f29d  mes5/x86_64/firefox-af-10.0.8-0.1mdvmes5.2.x86_64.rpm
 80d65f878a19d6af07ea2090c78fb609  mes5/x86_64/firefox-ar-10.0.8-0.1mdvmes5.2.x86_64.rpm
 8f55497903c4db05888415acc1aba830  mes5/x86_64/firefox-be-10.0.8-0.1mdvmes5.2.x86_64.rpm
 3eece7dc190cfbf26514b7216afa81b8  mes5/x86_64/firefox-bg-10.0.8-0.1mdvmes5.2.x86_64.rpm
 c3d70e1661ea6532013d94b7a8ae5b33  mes5/x86_64/firefox-bn-10.0.8-0.1mdvmes5.2.x86_64.rpm
 de69ce78464063544a83d21bd58ad349  mes5/x86_64/firefox-ca-10.0.8-0.1mdvmes5.2.x86_64.rpm
 6980ac75c0e8a332401cbe65053c4bb3  mes5/x86_64/firefox-cs-10.0.8-0.1mdvmes5.2.x86_64.rpm
 0904a7326bb39230f441bbed04bb04a0  mes5/x86_64/firefox-cy-10.0.8-0.1mdvmes5.2.x86_64.rpm
 e6443a05c458defa2dd5615a7efe58c3  mes5/x86_64/firefox-da-10.0.8-0.1mdvmes5.2.x86_64.rpm
 aa6c761b14752eb1e77199cd6e4f4db7  mes5/x86_64/firefox-de-10.0.8-0.1mdvmes5.2.x86_64.rpm
 a86aa716be097d55f0b377729d03e2d1  mes5/x86_64/firefox-devel-10.0.8-0.1mdvmes5.2.x86_64.rpm
 5b57f19ff04195a6ed7db74d4d4b0c97  mes5/x86_64/firefox-el-10.0.8-0.1mdvmes5.2.x86_64.rpm
 c52cbbbb3dce82117db33db89a25b7e3  mes5/x86_64/firefox-en_GB-10.0.8-0.1mdvmes5.2.x86_64.rpm
 fbfe8900e210c473f6f2a012ef939c96  mes5/x86_64/firefox-eo-10.0.8-0.1mdvmes5.2.x86_64.rpm
 561ae14e68dbaec1d0c156c8006fefec  mes5/x86_64/firefox-es_AR-10.0.8-0.1mdvmes5.2.x86_64.rpm
 cb295d044f7c33152fc6acf6dbef0f20  mes5/x86_64/firefox-es_ES-10.0.8-0.1mdvmes5.2.x86_64.rpm
 070c54ec44bdd92ce15e0dd4a8f8d632  mes5/x86_64/firefox-et-10.0.8-0.1mdvmes5.2.x86_64.rpm
 0bbeb506fa06563d4342b961a94e46dd  mes5/x86_64/firefox-eu-10.0.8-0.1mdvmes5.2.x86_64.rpm
 ba9089fae63396324c43e1e39735c01a  mes5/x86_64/firefox-fi-10.0.8-0.1mdvmes5.2.x86_64.rpm
 1460f5530b00b2885cccf72a823c5a46  mes5/x86_64/firefox-fr-10.0.8-0.1mdvmes5.2.x86_64.rpm
 ad94002972b598af90e58aba84f70855  mes5/x86_64/firefox-fy-10.0.8-0.1mdvmes5.2.x86_64.rpm
 cdbc3d8e32ec144db1812f5a2aeab5bb  mes5/x86_64/firefox-ga_IE-10.0.8-0.1mdvmes5.2.x86_64.rpm
 056b5b3b7a8cacc319041c0012e7ad4b  mes5/x86_64/firefox-gl-10.0.8-0.1mdvmes5.2.x86_64.rpm
 cf0d943ecfdcd674f92c1395a28a5cbe  mes5/x86_64/firefox-gu_IN-10.0.8-0.1mdvmes5.2.x86_64.rpm
 2ca267ddb695bef714352bb0e57feb27  mes5/x86_64/firefox-he-10.0.8-0.1mdvmes5.2.x86_64.rpm
 e016aa204927dfa1011ea450a5e4feaa  mes5/x86_64/firefox-hi-10.0.8-0.1mdvmes5.2.x86_64.rpm
 551681f2abc572eaa256f64237f7c677  mes5/x86_64/firefox-hu-10.0.8-0.1mdvmes5.2.x86_64.rpm
 245f7b0a90d9fe5dd9b0c706cda6eb2f  mes5/x86_64/firefox-id-10.0.8-0.1mdvmes5.2.x86_64.rpm
 77bf660ff93973d6090be707d4e09b28  mes5/x86_64/firefox-is-10.0.8-0.1mdvmes5.2.x86_64.rpm
 150bdd42557bcbdf7022d13976d38b35  mes5/x86_64/firefox-it-10.0.8-0.1mdvmes5.2.x86_64.rpm
 517e28cc738785c4402f4d0afe7203a9  mes5/x86_64/firefox-ja-10.0.8-0.1mdvmes5.2.x86_64.rpm
 6438f7ba42be63c5efc9d0e1e8bde089  mes5/x86_64/firefox-ka-10.0.8-0.1mdvmes5.2.x86_64.rpm
 795974bc965caaba283f8e78d3722f41  mes5/x86_64/firefox-kn-10.0.8-0.1mdvmes5.2.x86_64.rpm
 0b1186e2a195bcd9074031c4bbce79f4  mes5/x86_64/firefox-ko-10.0.8-0.1mdvmes5.2.x86_64.rpm
 fd371a84eddf0bd6a11b9229304967cd  mes5/x86_64/firefox-ku-10.0.8-0.1mdvmes5.2.x86_64.rpm
 4865d702388379da81085e5ba1f5fd5a  mes5/x86_64/firefox-lt-10.0.8-0.1mdvmes5.2.x86_64.rpm
 57f79f47919b7cae7180a43d809944f6  mes5/x86_64/firefox-lv-10.0.8-0.1mdvmes5.2.x86_64.rpm
 d4ce166e82f27b41846f2a3404bd407b  mes5/x86_64/firefox-mk-10.0.8-0.1mdvmes5.2.x86_64.rpm
 357082d898ae70e8d2abec9da7f6d3ec  mes5/x86_64/firefox-mr-10.0.8-0.1mdvmes5.2.x86_64.rpm
 0e61d6a2f26dd11fc3c531e044a21402  mes5/x86_64/firefox-nb_NO-10.0.8-0.1mdvmes5.2.x86_64.rpm
 5c39340673283f52a2c268207a221fa4  mes5/x86_64/firefox-nl-10.0.8-0.1mdvmes5.2.x86_64.rpm
 e8989e4b71f9e761db1a5eb2ab5ba772  mes5/x86_64/firefox-nn_NO-10.0.8-0.1mdvmes5.2.x86_64.rpm
 0cdf48db846c7744e37cedc1b562806d  mes5/x86_64/firefox-oc-10.0.8-0.1mdvmes5.2.x86_64.rpm
 96da7ef1509716a8ecd89398de5c7cc8  mes5/x86_64/firefox-pa_IN-10.0.8-0.1mdvmes5.2.x86_64.rpm
 ba8ee24d071fb52cea5c1b2a550aa70b  mes5/x86_64/firefox-pl-10.0.8-0.1mdvmes5.2.x86_64.rpm
 e692fc3231c443faf2e17f79333b735c  mes5/x86_64/firefox-pt_BR-10.0.8-0.1mdvmes5.2.x86_64.rpm
 afa8d2ee0e1af4f066a48fc39149110e  mes5/x86_64/firefox-pt_PT-10.0.8-0.1mdvmes5.2.x86_64.rpm
 f4ad6008159c2927efe3b19fd4512315  mes5/x86_64/firefox-ro-10.0.8-0.1mdvmes5.2.x86_64.rpm
 54d3c7b448c3c25ab861873d936987b7  mes5/x86_64/firefox-ru-10.0.8-0.1mdvmes5.2.x86_64.rpm
 c905a26289fb94cc2dafb606f57f890e  mes5/x86_64/firefox-si-10.0.8-0.1mdvmes5.2.x86_64.rpm
 32d9b6865b5b6d558ab97b36d8719d45  mes5/x86_64/firefox-sk-10.0.8-0.1mdvmes5.2.x86_64.rpm
 232ad0abe4270616befb65f0b2004482  mes5/x86_64/firefox-sl-10.0.8-0.1mdvmes5.2.x86_64.rpm
 8ea61f2759c003713f2b9e504260d981  mes5/x86_64/firefox-sq-10.0.8-0.1mdvmes5.2.x86_64.rpm
 8f4fdbd663bd27c4d5ab42411347a4a4  mes5/x86_64/firefox-sr-10.0.8-0.1mdvmes5.2.x86_64.rpm
 f83702a0a59009633d10251c19c3d926  mes5/x86_64/firefox-sv_SE-10.0.8-0.1mdvmes5.2.x86_64.rpm
 3805edda674577f2e609f889ec57068b  mes5/x86_64/firefox-te-10.0.8-0.1mdvmes5.2.x86_64.rpm
 981974d5861ece6999832b94026288b5  mes5/x86_64/firefox-th-10.0.8-0.1mdvmes5.2.x86_64.rpm
 799e5c4479f9e4078395f17255c9d395  mes5/x86_64/firefox-tr-10.0.8-0.1mdvmes5.2.x86_64.rpm
 4ddfcf42ff77710b44ad927c8e165a04  mes5/x86_64/firefox-uk-10.0.8-0.1mdvmes5.2.x86_64.rpm
 e9873026b2a5731c3f02e3bd6207cc61  mes5/x86_64/firefox-zh_CN-10.0.8-0.1mdvmes5.2.x86_64.rpm
 4e80e8eae6e165bd3b9de77f56355e18  mes5/x86_64/firefox-zh_TW-10.0.8-0.1mdvmes5.2.x86_64.rpm
 7399b9d40787e878941d927b2099cfd4  mes5/x86_64/lib64xulrunner10.0.8-10.0.8-0.1mdvmes5.2.x86_64.rpm
 350953ef50ace31a4bdf0aac88ef26f9  mes5/x86_64/lib64xulrunner-devel-10.0.8-0.1mdvmes5.2.x86_64.rpm
 3b728cc723a0d37366f7efb1055f68a1  mes5/x86_64/xulrunner-10.0.8-0.1mdvmes5.2.x86_64.rpm 
 6b5849f56718fddb19c22391919c6caf  mes5/SRPMS/firefox-10.0.8-0.1mdvmes5.2.src.rpm
 5f9f856717ec26737700be8ac851b2aa  mes5/SRPMS/firefox-l10n-10.0.8-0.1mdvmes5.2.src.rpm
 849d8b54de62cd1716ceeef8c36ee0e7  mes5/SRPMS/xulrunner-10.0.8-0.1mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQdp/zmqjQ0CJFipgRAoLvAJ418KmxlFghV0dHucmHAinnbYB7+wCg43rk
+dRrxPXJ7+lTD3pZcdL5gu0=
=dLD8
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ