lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1TszJo-0007Q0-Fx@titan.mandriva.com>
Date: Wed, 09 Jan 2013 18:20:00 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2013:002 ] firefox

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2013:002
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : firefox
 Date    : January 9, 2013
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple security issue were identified and fixed in mozilla firefox:
 
 Google reported to Mozilla that TURKTRUST, a certificate authority in
 Mozillas root program, had mis-issued two intermediate certificates
 to customers. The issue was not specific to Firefox but there was
 evidence that one of the certificates was used for man-in-the-middle
 (MITM) traffic management of domain names that the customer did not
 legitimately own or control. This issue was resolved by revoking the
 trust for these specific mis-issued certificates (CVE-2013-0743).
 
 Security researcher regenrecht reported, via TippingPoint&#039;s Zero Day
 Initiative, a use-after-free within the ListenerManager when garbage
 collection is forced after data in listener objects have been allocated
 in some circumstances. This results in a use-after-free which can
 lead to arbitrary code execution (CVE-2013-0754).
 
 Security researcher regenrecht reported, via TippingPoint&#039;s Zero
 Day Initiative, a use-after-free in XMLSerializer by the exposing
 of serializeToStream to web content. This can lead to arbitrary code
 execution when exploited (CVE-2013-0753).
 
 Security researcher Mariusz Mlynski reported that it is possible
 to open a chrome privileged web page through plugin objects through
 interaction with SVG elements. This could allow for arbitrary code
 execution (CVE-2013-0758).
 
 Security researcher pa_kt reported a flaw via TippingPoint&#039;s Zero Day
 Initiative that an integer overflow is possible when calculating the
 length for a Javascript string concatenation, which is then used for
 memory allocation. This results in a buffer overflow, leading to a
 potentially exploitable memory corruption (CVE-2013-0750).
 
 Mozilla security researcher Jesse Ruderman discovered that using the
 toString function of XBL objects can lead to inappropriate information
 leakage by revealing the address space layout instead of just the ID
 of the object. This layout information could potentially be used to
 bypass ASLR and other security protections (CVE-2013-0748).
 
 Mozilla developer Boris Zbarsky reported reported a problem where
 jsval-returning quickstubs fail to wrap their return values, causing
 a compartment mismatch. This mismatch can cause garbage collection
 to occur incorrectly and lead to a potentially exploitable crash
 (CVE-2013-0746).
 
 Using the Address Sanitizer tool, security researcher Atte Kettunen
 from OUSPG discovered that the combination of large numbers
 of columns and column groups in a table could cause the array
 containing the columns during rendering to overwrite itself. This
 can lead to a user-after-free causing a potentially exploitable crash
 (CVE-2013-0744).
 
 Security researcher Abhishek Arya (Inferno) of the Google Chrome
 Security Team discovered a series critically rated of use-after-free,
 out of bounds read, and buffer overflow issues using the Address
 Sanitizer tool in shipped software. These issues are potentially
 exploitable, allowing for remote code execution. We would also like
 to thank Abhishek for reporting three additional user-after-free and
 out of bounds read flaws introduced during Firefox development that
 were fixed before general release (CVE-2013-0762, CVE-2013-0766,
 CVE-2013-0767).
 
 Mozilla developers identified and fixed several memory safety
 bugs in the browser engine used in Firefox and other Mozilla-based
 products. Some of these bugs showed evidence of memory corruption under
 certain circumstances, and we presume that with enough effort at least
 some of these could be exploited to run arbitrary code (CVE-2013-0769).
 
 Security researcher Masato Kinugawa found a flaw in which the
 displayed URL values within the addressbar can be spoofed by a page
 during loading. This allows for phishing attacks where a malicious
 page can spoof the identify of another site (CVE-2013-0759).
 
 The mozilla firefox packages has been upgraded to the latest version
 which is unaffected by these security flaws.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769
 http://www.mozilla.org/security/announce/2013/mfsa2013-20.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-17.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-16.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-15.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-12.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-11.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-09.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-05.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-04.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-02.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-01.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 6a90d41da959a6610024ff4edb00c7e0  mes5/i586/firefox-10.0.12-0.1mdvmes5.2.i586.rpm
 938f2b80ff7ec162e91c7842d2e8d0fd  mes5/i586/firefox-af-10.0.12-0.1mdvmes5.2.i586.rpm
 fc82e7256b8e4f2fcb6a0a89dd445d65  mes5/i586/firefox-ar-10.0.12-0.1mdvmes5.2.i586.rpm
 09787dab37be7d8119342e10c54e770c  mes5/i586/firefox-be-10.0.12-0.1mdvmes5.2.i586.rpm
 3ece6288096f143a6849b1b1fd7d6b0e  mes5/i586/firefox-bg-10.0.12-0.1mdvmes5.2.i586.rpm
 8a3232659cce143dacf62362f0a41f26  mes5/i586/firefox-bn-10.0.12-0.1mdvmes5.2.i586.rpm
 9feae96468c2eb22aa29ab382c110628  mes5/i586/firefox-ca-10.0.12-0.1mdvmes5.2.i586.rpm
 630d5eab5dae17ab83d304da7743a2f8  mes5/i586/firefox-cs-10.0.12-0.1mdvmes5.2.i586.rpm
 c98adc9e537516663b0aaa65e7943393  mes5/i586/firefox-cy-10.0.12-0.1mdvmes5.2.i586.rpm
 b2ea10ba6d761a4907396630489d38ff  mes5/i586/firefox-da-10.0.12-0.1mdvmes5.2.i586.rpm
 b2d71a3c37804060ba559f42580629e5  mes5/i586/firefox-de-10.0.12-0.1mdvmes5.2.i586.rpm
 3d1fcb82cd8b0003a5fdca21a4fa35e8  mes5/i586/firefox-devel-10.0.12-0.1mdvmes5.2.i586.rpm
 dc0f4ebc0cd6cf8bcc147c2e141f8e4b  mes5/i586/firefox-el-10.0.12-0.1mdvmes5.2.i586.rpm
 02eb125c0027eb02cd228abca5a5ae90  mes5/i586/firefox-en_GB-10.0.12-0.1mdvmes5.2.i586.rpm
 38d34ccae33ea9329c3bf08d0eb49bf0  mes5/i586/firefox-eo-10.0.12-0.1mdvmes5.2.i586.rpm
 ce1b02d401cea11eaa0e3985db9118fc  mes5/i586/firefox-es_AR-10.0.12-0.1mdvmes5.2.i586.rpm
 be67f0b04803d142c94e03123c8dc035  mes5/i586/firefox-es_ES-10.0.12-0.1mdvmes5.2.i586.rpm
 d68633951b46759e49bb104ab7306006  mes5/i586/firefox-et-10.0.12-0.1mdvmes5.2.i586.rpm
 93fcff1e6fe6fcdd639799f367e4eceb  mes5/i586/firefox-eu-10.0.12-0.1mdvmes5.2.i586.rpm
 92edf937b64fcc545af68f48de84f2ca  mes5/i586/firefox-fi-10.0.12-0.1mdvmes5.2.i586.rpm
 f3ae76b728936e2962bbf90aaa1d1810  mes5/i586/firefox-fr-10.0.12-0.1mdvmes5.2.i586.rpm
 9992758506f970829796c9691740f236  mes5/i586/firefox-fy-10.0.12-0.1mdvmes5.2.i586.rpm
 26f2678ee6e21bd7928bc3ae85654fb3  mes5/i586/firefox-ga_IE-10.0.12-0.1mdvmes5.2.i586.rpm
 d67703274e9d9d25426c10337da56cbd  mes5/i586/firefox-gl-10.0.12-0.1mdvmes5.2.i586.rpm
 af6c4fa86abd84930adc97e87fc901c6  mes5/i586/firefox-gu_IN-10.0.12-0.1mdvmes5.2.i586.rpm
 9775a563ee7ef785fe7a0a80272bd1d4  mes5/i586/firefox-he-10.0.12-0.1mdvmes5.2.i586.rpm
 14e7d4c2a4e83fbe2878ec14f78ffe83  mes5/i586/firefox-hi-10.0.12-0.1mdvmes5.2.i586.rpm
 02a3061d522afa5d694b379347ef87ef  mes5/i586/firefox-hu-10.0.12-0.1mdvmes5.2.i586.rpm
 03bd7939a6257654c658977e55b6cb69  mes5/i586/firefox-id-10.0.12-0.1mdvmes5.2.i586.rpm
 7faec047d662ae55661d75bb6abecd2c  mes5/i586/firefox-is-10.0.12-0.1mdvmes5.2.i586.rpm
 8728abb00f2924a7776d2fa3bd068dfb  mes5/i586/firefox-it-10.0.12-0.1mdvmes5.2.i586.rpm
 cdcab0ee96a71f00a576182ed3b8fa08  mes5/i586/firefox-ja-10.0.12-0.1mdvmes5.2.i586.rpm
 9400eca7d1557cf2f724367bb1ef206d  mes5/i586/firefox-ka-10.0.12-0.1mdvmes5.2.i586.rpm
 c1ddccc95fa8c23bb63478a637ef1b7b  mes5/i586/firefox-kn-10.0.12-0.1mdvmes5.2.i586.rpm
 7e9f68326f6cf99093144e74f57c85a5  mes5/i586/firefox-ko-10.0.12-0.1mdvmes5.2.i586.rpm
 cc6858bc89c9ba562b3cfe5dd54d0b15  mes5/i586/firefox-ku-10.0.12-0.1mdvmes5.2.i586.rpm
 aca89e6575c44a2d4510cf150558955b  mes5/i586/firefox-lt-10.0.12-0.1mdvmes5.2.i586.rpm
 933ca52186e944ff75959c00a3237c6c  mes5/i586/firefox-lv-10.0.12-0.1mdvmes5.2.i586.rpm
 4de4dfe7c535841f8289ad815792eefb  mes5/i586/firefox-mk-10.0.12-0.1mdvmes5.2.i586.rpm
 340f9e5666980ab34f56b508f1869be0  mes5/i586/firefox-mr-10.0.12-0.1mdvmes5.2.i586.rpm
 674a45c6e740e99fce3bcb0421bf692d  mes5/i586/firefox-nb_NO-10.0.12-0.1mdvmes5.2.i586.rpm
 4bae8177b0e2d09b4808de91a5cbb480  mes5/i586/firefox-nl-10.0.12-0.1mdvmes5.2.i586.rpm
 9502588f48efc18251bb0a2c4da7c67f  mes5/i586/firefox-nn_NO-10.0.12-0.1mdvmes5.2.i586.rpm
 28d01c92b5bfada1257488ca5cb81090  mes5/i586/firefox-oc-10.0.12-0.1mdvmes5.2.i586.rpm
 45e0e75bf13e31abe5191678e6cb29fb  mes5/i586/firefox-pa_IN-10.0.12-0.1mdvmes5.2.i586.rpm
 03e82c9b1d26728c64a15eff2b9fe8a4  mes5/i586/firefox-pl-10.0.12-0.1mdvmes5.2.i586.rpm
 a078db90fa6ccb9b5e8eab7aed6fc383  mes5/i586/firefox-pt_BR-10.0.12-0.1mdvmes5.2.i586.rpm
 ff6817be10d5d025368fafab359cb9bc  mes5/i586/firefox-pt_PT-10.0.12-0.1mdvmes5.2.i586.rpm
 e83044cedd0ab955bd490a75e0262fdf  mes5/i586/firefox-ro-10.0.12-0.1mdvmes5.2.i586.rpm
 f3829090c91f64cf42b6704eaa1556cc  mes5/i586/firefox-ru-10.0.12-0.1mdvmes5.2.i586.rpm
 e67d78b38b09764cc3db7a2fb7aa0ccb  mes5/i586/firefox-si-10.0.12-0.1mdvmes5.2.i586.rpm
 b60a1a00c4c6e1ffd59bdcd30135a9e5  mes5/i586/firefox-sk-10.0.12-0.1mdvmes5.2.i586.rpm
 6e86141416b66260ad50b69eba3ca831  mes5/i586/firefox-sl-10.0.12-0.1mdvmes5.2.i586.rpm
 cc32659b3b38d1889f4c20df6b5861cc  mes5/i586/firefox-sq-10.0.12-0.1mdvmes5.2.i586.rpm
 e068225cac9ac0afb6e4a8a6d6efb0cc  mes5/i586/firefox-sr-10.0.12-0.1mdvmes5.2.i586.rpm
 5b82daf461e65242138e10488a1dbf3c  mes5/i586/firefox-sv_SE-10.0.12-0.1mdvmes5.2.i586.rpm
 797b4f3353d792d8e218a1288440da29  mes5/i586/firefox-te-10.0.12-0.1mdvmes5.2.i586.rpm
 39691dbd8084474882eaaa23bed11075  mes5/i586/firefox-th-10.0.12-0.1mdvmes5.2.i586.rpm
 1fa94929f117a926bdfaae3a4d8b6f7d  mes5/i586/firefox-tr-10.0.12-0.1mdvmes5.2.i586.rpm
 a15d57069fd1b8a9c342df41b458282b  mes5/i586/firefox-uk-10.0.12-0.1mdvmes5.2.i586.rpm
 796978e53b900ba33952ea604622c590  mes5/i586/firefox-zh_CN-10.0.12-0.1mdvmes5.2.i586.rpm
 9d6256d9b1f5991d1852fc1096491202  mes5/i586/firefox-zh_TW-10.0.12-0.1mdvmes5.2.i586.rpm
 d30907827f13429b2e554ea4e6856240  mes5/i586/libnss3-3.14.1-0.1mdvmes5.2.i586.rpm
 4e25b43c99caa549211c45e8ef0b1ac2  mes5/i586/libnss-devel-3.14.1-0.1mdvmes5.2.i586.rpm
 a28d9a2e4848a75edff6cc6fda90ee98  mes5/i586/libnss-static-devel-3.14.1-0.1mdvmes5.2.i586.rpm
 64f15e1555ebd2c5511ea4d0f988c777  mes5/i586/libxulrunner10.0.12-10.0.12-0.1mdvmes5.2.i586.rpm
 c02744f54afb7aa102b4ffaaf30560f2  mes5/i586/libxulrunner-devel-10.0.12-0.1mdvmes5.2.i586.rpm
 1f63bfcd2cc7b87bc1b36143940ca1f0  mes5/i586/nss-3.14.1-0.1mdvmes5.2.i586.rpm
 6fc25499ab31eab00dc329dd0795f98f  mes5/i586/rootcerts-20121229.00-1mdvmes5.2.i586.rpm
 d5b3814fca55f73fa5a432cde1a87286  mes5/i586/rootcerts-java-20121229.00-1mdvmes5.2.i586.rpm
 addec10a773ab4aa83d9998d528d2c0c  mes5/i586/xulrunner-10.0.12-0.1mdvmes5.2.i586.rpm 
 e8e89ae09156de53165df7e1be0be753  mes5/SRPMS/firefox-10.0.12-0.1mdvmes5.2.src.rpm
 ae626ca038b1b222c80b8df684604519  mes5/SRPMS/firefox-l10n-10.0.12-0.1mdvmes5.2.src.rpm
 8bb7847fd80ec7c831f442ec6153600f  mes5/SRPMS/nss-3.14.1-0.1mdvmes5.2.src.rpm
 677882e23b0d751aab5992de12ee58c8  mes5/SRPMS/rootcerts-20121229.00-1mdvmes5.2.src.rpm
 8fafd87dca1aa4d1ea665292e00f7d98  mes5/SRPMS/xulrunner-10.0.12-0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 ec73b765cf90091a3904b108f5ca91a8  mes5/x86_64/firefox-10.0.12-0.1mdvmes5.2.x86_64.rpm
 9f0b7687a33ebe50fcbdbaec5a578a4a  mes5/x86_64/firefox-af-10.0.12-0.1mdvmes5.2.x86_64.rpm
 4769684681901d7d0f3da67b0079c499  mes5/x86_64/firefox-ar-10.0.12-0.1mdvmes5.2.x86_64.rpm
 ca810320d78c8edc590ea1a3755dadaa  mes5/x86_64/firefox-be-10.0.12-0.1mdvmes5.2.x86_64.rpm
 513a67ee607b439e6cdbb7e206ba57f1  mes5/x86_64/firefox-bg-10.0.12-0.1mdvmes5.2.x86_64.rpm
 e171340bea0e000fcdb83c77f11c57f6  mes5/x86_64/firefox-bn-10.0.12-0.1mdvmes5.2.x86_64.rpm
 4ede105e999009cf2762efa458313f2a  mes5/x86_64/firefox-ca-10.0.12-0.1mdvmes5.2.x86_64.rpm
 48ba34b0537c0efc4799325134689140  mes5/x86_64/firefox-cs-10.0.12-0.1mdvmes5.2.x86_64.rpm
 6e2c6107c7539cbb77f3fe4266812388  mes5/x86_64/firefox-cy-10.0.12-0.1mdvmes5.2.x86_64.rpm
 6633981954d7fdb722b574edc32de1c3  mes5/x86_64/firefox-da-10.0.12-0.1mdvmes5.2.x86_64.rpm
 b891c31801e0cb20a3e0be6e49929f43  mes5/x86_64/firefox-de-10.0.12-0.1mdvmes5.2.x86_64.rpm
 e4118fd3aa498494a1000d3b14941428  mes5/x86_64/firefox-devel-10.0.12-0.1mdvmes5.2.x86_64.rpm
 4c34458067745fbc9d98385159cabb4e  mes5/x86_64/firefox-el-10.0.12-0.1mdvmes5.2.x86_64.rpm
 9f9bd2dbb1d2d965959af26ca752e0b4  mes5/x86_64/firefox-en_GB-10.0.12-0.1mdvmes5.2.x86_64.rpm
 36ca1fd771d1c0765102f61400acb9c3  mes5/x86_64/firefox-eo-10.0.12-0.1mdvmes5.2.x86_64.rpm
 469e680897bdff78d748acb94f2a75b0  mes5/x86_64/firefox-es_AR-10.0.12-0.1mdvmes5.2.x86_64.rpm
 54094cfb1efbcff7a48c68086f2f1848  mes5/x86_64/firefox-es_ES-10.0.12-0.1mdvmes5.2.x86_64.rpm
 1896c23b5b472707ed8d9cf419ef639a  mes5/x86_64/firefox-et-10.0.12-0.1mdvmes5.2.x86_64.rpm
 a0203f65040faab8abc43079f9352dd4  mes5/x86_64/firefox-eu-10.0.12-0.1mdvmes5.2.x86_64.rpm
 020cddeb794a57fdd69d619add6d7195  mes5/x86_64/firefox-fi-10.0.12-0.1mdvmes5.2.x86_64.rpm
 c9b9c9c4ebdff7e75812d832c00117ba  mes5/x86_64/firefox-fr-10.0.12-0.1mdvmes5.2.x86_64.rpm
 1696482cd4c038df4f09b0db2feff3a2  mes5/x86_64/firefox-fy-10.0.12-0.1mdvmes5.2.x86_64.rpm
 c4a94dd5adc727a32d475c9e4841cc3b  mes5/x86_64/firefox-ga_IE-10.0.12-0.1mdvmes5.2.x86_64.rpm
 e7ac24f6b43839b1195b9a4021c60400  mes5/x86_64/firefox-gl-10.0.12-0.1mdvmes5.2.x86_64.rpm
 03714c3d430ce0588df44335809b1497  mes5/x86_64/firefox-gu_IN-10.0.12-0.1mdvmes5.2.x86_64.rpm
 0aab4f6aed0e40ae4d9bc792baf46f77  mes5/x86_64/firefox-he-10.0.12-0.1mdvmes5.2.x86_64.rpm
 1a3bbd79e3ed3ad58c2c05de1bdfb345  mes5/x86_64/firefox-hi-10.0.12-0.1mdvmes5.2.x86_64.rpm
 4bd0dd2359a4956c9a10d812f4558a2d  mes5/x86_64/firefox-hu-10.0.12-0.1mdvmes5.2.x86_64.rpm
 1c200ee911d9bcb57667bc171e5e34bd  mes5/x86_64/firefox-id-10.0.12-0.1mdvmes5.2.x86_64.rpm
 d1a20db5877533297aa37cfa61a643ad  mes5/x86_64/firefox-is-10.0.12-0.1mdvmes5.2.x86_64.rpm
 fa88e6be3877b527ca57f3c70f5f0b48  mes5/x86_64/firefox-it-10.0.12-0.1mdvmes5.2.x86_64.rpm
 252a3ae2c4b3583d1e9466052eec0430  mes5/x86_64/firefox-ja-10.0.12-0.1mdvmes5.2.x86_64.rpm
 524c2d72c0e62fddfc5bc66c257ea20b  mes5/x86_64/firefox-ka-10.0.12-0.1mdvmes5.2.x86_64.rpm
 1935cab2d2a52159f031982e2ce823de  mes5/x86_64/firefox-kn-10.0.12-0.1mdvmes5.2.x86_64.rpm
 ec2434a00ac1d07070a35b992f162f67  mes5/x86_64/firefox-ko-10.0.12-0.1mdvmes5.2.x86_64.rpm
 7709a131d2652966fc83dd9008fd2a1d  mes5/x86_64/firefox-ku-10.0.12-0.1mdvmes5.2.x86_64.rpm
 cbdb15c811f783d9f948ac82c343d473  mes5/x86_64/firefox-lt-10.0.12-0.1mdvmes5.2.x86_64.rpm
 2f85d25b00245770e27b897da34efc09  mes5/x86_64/firefox-lv-10.0.12-0.1mdvmes5.2.x86_64.rpm
 279cd222db83b5404bd4a65745e5bedc  mes5/x86_64/firefox-mk-10.0.12-0.1mdvmes5.2.x86_64.rpm
 8692038a08c4e80257c3449a47ef3d10  mes5/x86_64/firefox-mr-10.0.12-0.1mdvmes5.2.x86_64.rpm
 5b55c11f1c5e3e88054dae45cf5f02f1  mes5/x86_64/firefox-nb_NO-10.0.12-0.1mdvmes5.2.x86_64.rpm
 fe93c427b7555bb02c30114305251890  mes5/x86_64/firefox-nl-10.0.12-0.1mdvmes5.2.x86_64.rpm
 be2487874444cf17f0ed99096cbe1fc6  mes5/x86_64/firefox-nn_NO-10.0.12-0.1mdvmes5.2.x86_64.rpm
 48ea3a91e056d7d6dcb33f14c1117655  mes5/x86_64/firefox-oc-10.0.12-0.1mdvmes5.2.x86_64.rpm
 1a11efbd275ebcd3d758bfbba02a0992  mes5/x86_64/firefox-pa_IN-10.0.12-0.1mdvmes5.2.x86_64.rpm
 98aa0847b946f7342b31e4fd8e6b5535  mes5/x86_64/firefox-pl-10.0.12-0.1mdvmes5.2.x86_64.rpm
 3df14cce3a10e9e4bff3aa7a41d76125  mes5/x86_64/firefox-pt_BR-10.0.12-0.1mdvmes5.2.x86_64.rpm
 f18fe2bd2c293ee9b3ba123e67866ec7  mes5/x86_64/firefox-pt_PT-10.0.12-0.1mdvmes5.2.x86_64.rpm
 61070062992c0b712c58c92271907243  mes5/x86_64/firefox-ro-10.0.12-0.1mdvmes5.2.x86_64.rpm
 ed4a8fc4378462e55606478e1d92ef5a  mes5/x86_64/firefox-ru-10.0.12-0.1mdvmes5.2.x86_64.rpm
 00d839e039bb614ba50cabb88103755d  mes5/x86_64/firefox-si-10.0.12-0.1mdvmes5.2.x86_64.rpm
 93d25e236dbea61bf7593d0463dd8643  mes5/x86_64/firefox-sk-10.0.12-0.1mdvmes5.2.x86_64.rpm
 17eb20f40351fd5e0e5a9077eafd716c  mes5/x86_64/firefox-sl-10.0.12-0.1mdvmes5.2.x86_64.rpm
 4bda3c464b1b1e628b5650a302b39524  mes5/x86_64/firefox-sq-10.0.12-0.1mdvmes5.2.x86_64.rpm
 ccd95f763630b8484b5fd117eeddc197  mes5/x86_64/firefox-sr-10.0.12-0.1mdvmes5.2.x86_64.rpm
 2ea10348ff1177ddf59d62153e1ddc71  mes5/x86_64/firefox-sv_SE-10.0.12-0.1mdvmes5.2.x86_64.rpm
 df4ab9036f0bff7d9a7ce0c50748db3e  mes5/x86_64/firefox-te-10.0.12-0.1mdvmes5.2.x86_64.rpm
 b8ff0defe1b3b30ab0033471d5be7855  mes5/x86_64/firefox-th-10.0.12-0.1mdvmes5.2.x86_64.rpm
 9cbbe714668283a7fd7a0bbb27568df9  mes5/x86_64/firefox-tr-10.0.12-0.1mdvmes5.2.x86_64.rpm
 54ce6885a983b683cc8aedb1af764ae1  mes5/x86_64/firefox-uk-10.0.12-0.1mdvmes5.2.x86_64.rpm
 ab2921983540572d129979470a9a7c7c  mes5/x86_64/firefox-zh_CN-10.0.12-0.1mdvmes5.2.x86_64.rpm
 f57ea6e4ab935376f5ae7ae6836ec029  mes5/x86_64/firefox-zh_TW-10.0.12-0.1mdvmes5.2.x86_64.rpm
 999fc06a1f990adf5ea007f9dbc0487c  mes5/x86_64/lib64nss3-3.14.1-0.1mdvmes5.2.x86_64.rpm
 b34a6f2b1dc929f1d172fe4583edf21d  mes5/x86_64/lib64nss-devel-3.14.1-0.1mdvmes5.2.x86_64.rpm
 b8d0b295fba8cc9ce19cdef9597de9e7  mes5/x86_64/lib64nss-static-devel-3.14.1-0.1mdvmes5.2.x86_64.rpm
 002686d95013a49ad1a6b28945213a9d  mes5/x86_64/lib64xulrunner10.0.12-10.0.12-0.1mdvmes5.2.x86_64.rpm
 46c09addafd24a61662ad49ac52df5f7  mes5/x86_64/lib64xulrunner-devel-10.0.12-0.1mdvmes5.2.x86_64.rpm
 c1c86f04afc39d1ac6c2705b9d6a4d42  mes5/x86_64/nss-3.14.1-0.1mdvmes5.2.x86_64.rpm
 95bffee2ac111d0ec9effa96f7841ecc  mes5/x86_64/rootcerts-20121229.00-1mdvmes5.2.x86_64.rpm
 54c2119efa4bc067f6ea786139ef6aac  mes5/x86_64/rootcerts-java-20121229.00-1mdvmes5.2.x86_64.rpm
 c0b8c0b055c3279b1aca88c549a613e8  mes5/x86_64/xulrunner-10.0.12-0.1mdvmes5.2.x86_64.rpm 
 e8e89ae09156de53165df7e1be0be753  mes5/SRPMS/firefox-10.0.12-0.1mdvmes5.2.src.rpm
 ae626ca038b1b222c80b8df684604519  mes5/SRPMS/firefox-l10n-10.0.12-0.1mdvmes5.2.src.rpm
 8bb7847fd80ec7c831f442ec6153600f  mes5/SRPMS/nss-3.14.1-0.1mdvmes5.2.src.rpm
 677882e23b0d751aab5992de12ee58c8  mes5/SRPMS/rootcerts-20121229.00-1mdvmes5.2.src.rpm
 8fafd87dca1aa4d1ea665292e00f7d98  mes5/SRPMS/xulrunner-10.0.12-0.1mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQ7XsJmqjQ0CJFipgRAlIiAJ0aJSsM/+wyE3VStjRsWTn/gnC0SwCg0t94
d0D4tqI+UfwJ8Pa8VJHqEr4=
=fZ5j
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ