lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1UrtRo-0004TI-K6@titan.mandriva.com>
Date: Wed, 26 Jun 2013 19:24:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2013:179 ] firefox

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2013:179
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : firefox
 Date    : June 26, 2013
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple security issues was identified and fixed in mozilla firefox:
 
 Mozilla developers identified and fixed several memory safety
 bugs in the browser engine used in Firefox and other Mozilla-based
 products. Some of these bugs showed evidence of memory corruption under
 certain circumstances, and we presume that with enough effort at least
 some of these could be exploited to run arbitrary code (CVE-2013-1682).
 
 Security researcher Abhishek Arya (Inferno) of the Google Chrome
 Security Team used the Address Sanitizer tool to discover a series of
 use-after-free problems rated critical as security issues in shipped
 software. Some of these issues are potentially exploitable, allowing
 for remote code execution. We would also like to thank Abhishek for
 reporting additional use-after-free and buffer overflow flaws in
 code introduced during Firefox development. These were fixed before
 general release (CVE-2013-1684, CVE-2013-1685, CVE-2013-1686).
 
 Security researcher Mariusz Mlynski reported that it is possible to
 compile a user-defined function in the XBL scope of a specific element
 and then trigger an event within this scope to run code. In some
 circumstances, when this code is run, it can access content protected
 by System Only Wrappers (SOW) and chrome-privileged pages. This
 could potentially lead to arbitrary code execution. Additionally,
 Chrome Object Wrappers (COW) can be bypassed by web content to access
 privileged methods, leading to a cross-site scripting (XSS) attack
 from privileged pages (CVE-2013-1687).
 
 Security researcher Nils reported that specially crafted web content
 using the onreadystatechange event and reloading of pages could
 sometimes cause a crash when unmapped memory is executed. This crash
 is potentially exploitable (CVE-2013-1690).
 
 Security researcher Johnathan Kuskos reported that Firefox is sending
 data in the body of XMLHttpRequest (XHR) HEAD requests, which goes
 agains the XHR specification. This can potentially be used for
 Cross-Site Request Forgery (CSRF) attacks against sites which do not
 distinguish between HEAD and POST requests (CVE-2013-1692).
 
 Security researcher Paul Stone of Context Information Security
 discovered that timing differences in the processing of SVG format
 images with filters could allow for pixel values to be read. This
 could potentially allow for text values to be read across domains,
 leading to information disclosure (CVE-2013-1693).
 
 Mozilla developer Boris Zbarsky found that when PreserveWrapper was
 used in cases where a wrapper is not set, the preserved-wrapper flag
 on the wrapper cache is cleared. This could potentially lead to an
 exploitable crash (CVE-2013-1694).
 
 Mozilla security researcher moz_bug_r_a4 reported that XrayWrappers
 can be bypassed to call content-defined toString and valueOf methods
 through DefaultValue. This can lead to unexpected behavior when
 privileged code acts on the incorrect values (CVE-2013-1697).
 
 The mozilla firefox packages has been upgraded to the latest ESR
 version (17.0.7) which is unaffected by these security flaws.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1694
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697
 http://www.mozilla.org/security/announce/2013/mfsa2013-49.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-50.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-51.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-53.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-54.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-55.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-56.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-59.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 f377616fa413576835d3fae079ff0aa5  mes5/i586/firefox-17.0.7-0.1mdvmes5.2.i586.rpm
 652c24c5d6ff9df65178aafb7ff02e5d  mes5/i586/firefox-af-17.0.7-0.1mdvmes5.2.i586.rpm
 dc87c28521fb845389a035914a22775f  mes5/i586/firefox-ar-17.0.7-0.1mdvmes5.2.i586.rpm
 5c6d60f7c807485993d79601185ec3d9  mes5/i586/firefox-be-17.0.7-0.1mdvmes5.2.i586.rpm
 e08a34f585b46a8cd36449eb973a71c9  mes5/i586/firefox-bg-17.0.7-0.1mdvmes5.2.i586.rpm
 7779b1c57fc052aaedaccff6f20c22e5  mes5/i586/firefox-bn-17.0.7-0.1mdvmes5.2.i586.rpm
 69e6dc99e24bf7436baf708a4e8a6ae6  mes5/i586/firefox-ca-17.0.7-0.1mdvmes5.2.i586.rpm
 ac86ab446a7061a931f888bba532b190  mes5/i586/firefox-cs-17.0.7-0.1mdvmes5.2.i586.rpm
 ebcd8fb3057ed6a2915ae7a5790dfce7  mes5/i586/firefox-cy-17.0.7-0.1mdvmes5.2.i586.rpm
 2dc9dd199b1f2ef058c1a50e398ce3ef  mes5/i586/firefox-da-17.0.7-0.1mdvmes5.2.i586.rpm
 5e56eeba90541a9c8bcf7611df18ac94  mes5/i586/firefox-de-17.0.7-0.1mdvmes5.2.i586.rpm
 897574b2a895a91e4c360c7c88056fd4  mes5/i586/firefox-devel-17.0.7-0.1mdvmes5.2.i586.rpm
 4dabf70ab2035fe7d0198df52c3cc812  mes5/i586/firefox-el-17.0.7-0.1mdvmes5.2.i586.rpm
 669db7774e4cb6cbff3e7e34ae53532d  mes5/i586/firefox-en_GB-17.0.7-0.1mdvmes5.2.i586.rpm
 ec659527cd1ea949fade65d7a58ad256  mes5/i586/firefox-eo-17.0.7-0.1mdvmes5.2.i586.rpm
 d6df88bf6ca41c4f6e6f55bc899aaca5  mes5/i586/firefox-es_AR-17.0.7-0.1mdvmes5.2.i586.rpm
 0493c53d720297be0d57a317f03298cf  mes5/i586/firefox-es_ES-17.0.7-0.1mdvmes5.2.i586.rpm
 5c939e80e938a18862bb4facd7a0aead  mes5/i586/firefox-et-17.0.7-0.1mdvmes5.2.i586.rpm
 57f0e260c7086ac3ee60ed382b8f503d  mes5/i586/firefox-eu-17.0.7-0.1mdvmes5.2.i586.rpm
 511f45291c1cc86c61613839e5e7b24b  mes5/i586/firefox-fi-17.0.7-0.1mdvmes5.2.i586.rpm
 21eb713475a749bf49af8defdd67f867  mes5/i586/firefox-fr-17.0.7-0.1mdvmes5.2.i586.rpm
 162b648b9926726c9e8858fadd451723  mes5/i586/firefox-fy-17.0.7-0.1mdvmes5.2.i586.rpm
 5bcaae0b627e50bfd50d184e74f0ec30  mes5/i586/firefox-ga_IE-17.0.7-0.1mdvmes5.2.i586.rpm
 e630a7ed8039f30ca93cb46ecee60b09  mes5/i586/firefox-gl-17.0.7-0.1mdvmes5.2.i586.rpm
 c38375fe601fe760d9052f8e3fc477e8  mes5/i586/firefox-gu_IN-17.0.7-0.1mdvmes5.2.i586.rpm
 d783f4b739f33917c7656058ee1fbd91  mes5/i586/firefox-he-17.0.7-0.1mdvmes5.2.i586.rpm
 b4a8e32a432c12cdc911d3e6353e9ab8  mes5/i586/firefox-hi-17.0.7-0.1mdvmes5.2.i586.rpm
 a2ce628d94042616aaa74ef97a21a832  mes5/i586/firefox-hu-17.0.7-0.1mdvmes5.2.i586.rpm
 1ea3b93d68d74d8a9e8ecccd00a19db9  mes5/i586/firefox-id-17.0.7-0.1mdvmes5.2.i586.rpm
 853d8ea7ae11737a33f6cd3772ca7ba2  mes5/i586/firefox-is-17.0.7-0.1mdvmes5.2.i586.rpm
 775512b65dc65d7a6d4538d5012f65f1  mes5/i586/firefox-it-17.0.7-0.1mdvmes5.2.i586.rpm
 e27ff622960fefcb7aadf13c2da980af  mes5/i586/firefox-ja-17.0.7-0.1mdvmes5.2.i586.rpm
 d19357df6145fcc76b6b7b3c0d1ccda7  mes5/i586/firefox-kn-17.0.7-0.1mdvmes5.2.i586.rpm
 4fbd717d0c0dc77ce8578776cbbce0d0  mes5/i586/firefox-ko-17.0.7-0.1mdvmes5.2.i586.rpm
 cde6f4dfedad1d04122119d94fa61e6e  mes5/i586/firefox-ku-17.0.7-0.1mdvmes5.2.i586.rpm
 5894a845d55b922d0235cadbf43b109b  mes5/i586/firefox-lt-17.0.7-0.1mdvmes5.2.i586.rpm
 acc18a793daeb9bb670fe56ed65c05d1  mes5/i586/firefox-lv-17.0.7-0.1mdvmes5.2.i586.rpm
 5c1b603de35a6f459056ed10aaa6d382  mes5/i586/firefox-mk-17.0.7-0.1mdvmes5.2.i586.rpm
 b2ecb355588e5667affed1677dc763f9  mes5/i586/firefox-mr-17.0.7-0.1mdvmes5.2.i586.rpm
 41777306a7a3e270742ff065159c25b9  mes5/i586/firefox-nb_NO-17.0.7-0.1mdvmes5.2.i586.rpm
 f2f0189d3fd0c29fb956cbee8a7638dd  mes5/i586/firefox-nl-17.0.7-0.1mdvmes5.2.i586.rpm
 f87d249ee3c475cc7efeb582feec36e4  mes5/i586/firefox-nn_NO-17.0.7-0.1mdvmes5.2.i586.rpm
 f62472494f30e196c863e863b90241f3  mes5/i586/firefox-pa_IN-17.0.7-0.1mdvmes5.2.i586.rpm
 db2540e8c16eac89d52d449746b3a2af  mes5/i586/firefox-pl-17.0.7-0.1mdvmes5.2.i586.rpm
 84a9190b0304044bd4d2be92559b7c22  mes5/i586/firefox-pt_BR-17.0.7-0.1mdvmes5.2.i586.rpm
 41453e62d9c5ece38ab4bf058a867e9c  mes5/i586/firefox-pt_PT-17.0.7-0.1mdvmes5.2.i586.rpm
 36ac899dde4d279be5b0f98e5436cd07  mes5/i586/firefox-ro-17.0.7-0.1mdvmes5.2.i586.rpm
 51ca08ee97df0a4da5c584e6780d563c  mes5/i586/firefox-ru-17.0.7-0.1mdvmes5.2.i586.rpm
 07badcbaebc3f35337efde74d666e899  mes5/i586/firefox-si-17.0.7-0.1mdvmes5.2.i586.rpm
 5a73fcd6a6ca0e9fb1ae2a00df7898a3  mes5/i586/firefox-sk-17.0.7-0.1mdvmes5.2.i586.rpm
 23a0e198d005396c4fdb09e5e385fe01  mes5/i586/firefox-sl-17.0.7-0.1mdvmes5.2.i586.rpm
 4a55165e6af6e0129c98278206ea0277  mes5/i586/firefox-sq-17.0.7-0.1mdvmes5.2.i586.rpm
 723fb7776584aeec50b0c72a692359e1  mes5/i586/firefox-sr-17.0.7-0.1mdvmes5.2.i586.rpm
 43228ac54eef2b13c272421d85ba1f69  mes5/i586/firefox-sv_SE-17.0.7-0.1mdvmes5.2.i586.rpm
 79cb410c9de864e3437bedaafdf5ca25  mes5/i586/firefox-te-17.0.7-0.1mdvmes5.2.i586.rpm
 e4748ffe632bf0b1b37619a17948e595  mes5/i586/firefox-th-17.0.7-0.1mdvmes5.2.i586.rpm
 706bef53fed0a669bf16e1390f03dc77  mes5/i586/firefox-tr-17.0.7-0.1mdvmes5.2.i586.rpm
 bb8173f2daa9fb6a75a51b218d165c99  mes5/i586/firefox-uk-17.0.7-0.1mdvmes5.2.i586.rpm
 dec6bef8b017e38f9327980549a7742b  mes5/i586/firefox-zh_CN-17.0.7-0.1mdvmes5.2.i586.rpm
 e0ac89138fffb33e9c19f7c7202a5cc6  mes5/i586/firefox-zh_TW-17.0.7-0.1mdvmes5.2.i586.rpm
 5573bdc4a6f50d52ca821063a25994f4  mes5/i586/icedtea-web-1.3.2-0.3mdvmes5.2.i586.rpm
 5dc7d93d1e83a2b88cf725c50a5aeabf  mes5/i586/icedtea-web-javadoc-1.3.2-0.3mdvmes5.2.i586.rpm
 843b58cf236df5892cdd05c999b3e62b  mes5/i586/libxulrunner17.0.7-17.0.7-0.1mdvmes5.2.i586.rpm
 d22da67bc7a0e20c998c813f36a5a199  mes5/i586/libxulrunner-devel-17.0.7-0.1mdvmes5.2.i586.rpm
 d9168d1aee7cab500de0c5df41ad5240  mes5/i586/xulrunner-17.0.7-0.1mdvmes5.2.i586.rpm 
 ac0e411d475da155175442d1f34842cd  mes5/SRPMS/firefox-17.0.7-0.1mdvmes5.2.src.rpm
 45c0184ab0eeca01f633245f79a03041  mes5/SRPMS/firefox-l10n-17.0.7-0.1mdvmes5.2.src.rpm
 b05d6f1b4e84baad4de04d45c5dae02d  mes5/SRPMS/icedtea-web-1.3.2-0.3mdvmes5.2.src.rpm
 95d1abffc5ac94ae5777dfca705ec041  mes5/SRPMS/xulrunner-17.0.7-0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 f3ea43bfbd720573adec0affcc0cd536  mes5/x86_64/firefox-17.0.7-0.1mdvmes5.2.x86_64.rpm
 330b94917b3f0e3f2de878a0f09caaab  mes5/x86_64/firefox-af-17.0.7-0.1mdvmes5.2.x86_64.rpm
 77f418c131fe60b219e2df46faa3aa00  mes5/x86_64/firefox-ar-17.0.7-0.1mdvmes5.2.x86_64.rpm
 4a8e395e5473a2bddeadd5f1ee740ad1  mes5/x86_64/firefox-be-17.0.7-0.1mdvmes5.2.x86_64.rpm
 f342f9dd8f30e70bf8b2b338933cd0e5  mes5/x86_64/firefox-bg-17.0.7-0.1mdvmes5.2.x86_64.rpm
 8046323f8a7300461207ca61692517c2  mes5/x86_64/firefox-bn-17.0.7-0.1mdvmes5.2.x86_64.rpm
 2848426fb12a2e05cd9b605ea264669f  mes5/x86_64/firefox-ca-17.0.7-0.1mdvmes5.2.x86_64.rpm
 b1c04fc023f4732adae875cb5b3786da  mes5/x86_64/firefox-cs-17.0.7-0.1mdvmes5.2.x86_64.rpm
 4fa2451cd34a338b558feb4ee5b38845  mes5/x86_64/firefox-cy-17.0.7-0.1mdvmes5.2.x86_64.rpm
 912fb729496dcbea1d30beefdc4775e8  mes5/x86_64/firefox-da-17.0.7-0.1mdvmes5.2.x86_64.rpm
 1a3626352e622cf2c66c984085b12057  mes5/x86_64/firefox-de-17.0.7-0.1mdvmes5.2.x86_64.rpm
 125c9f024699ca8bcb71decfb66ea5b6  mes5/x86_64/firefox-devel-17.0.7-0.1mdvmes5.2.x86_64.rpm
 f43e4e24e8057321b09cfc3ef5298321  mes5/x86_64/firefox-el-17.0.7-0.1mdvmes5.2.x86_64.rpm
 7d95b00f58af69faf7a06581bd0e2569  mes5/x86_64/firefox-en_GB-17.0.7-0.1mdvmes5.2.x86_64.rpm
 3b5903be89e8ff4293c38a0896a7f44d  mes5/x86_64/firefox-eo-17.0.7-0.1mdvmes5.2.x86_64.rpm
 09fdadd751d266623bcf56624d03a60f  mes5/x86_64/firefox-es_AR-17.0.7-0.1mdvmes5.2.x86_64.rpm
 d0b730a135d64c72e5e88df1ddaebae9  mes5/x86_64/firefox-es_ES-17.0.7-0.1mdvmes5.2.x86_64.rpm
 97ccb2076f0121381a45f5ec0896c30d  mes5/x86_64/firefox-et-17.0.7-0.1mdvmes5.2.x86_64.rpm
 9ba658b2db765c3ae681ca203e165d68  mes5/x86_64/firefox-eu-17.0.7-0.1mdvmes5.2.x86_64.rpm
 1d8d2ef3f08565a8ee3a0bc99f6407be  mes5/x86_64/firefox-fi-17.0.7-0.1mdvmes5.2.x86_64.rpm
 05119cc9c7ebb644a7adde2fd73ce36b  mes5/x86_64/firefox-fr-17.0.7-0.1mdvmes5.2.x86_64.rpm
 ae713037d5874fd714ca44b2cd1496ae  mes5/x86_64/firefox-fy-17.0.7-0.1mdvmes5.2.x86_64.rpm
 fdf8b50da106b9d1024c7f39fe94fc27  mes5/x86_64/firefox-ga_IE-17.0.7-0.1mdvmes5.2.x86_64.rpm
 2b34533eb481df6292cadaa207360d50  mes5/x86_64/firefox-gl-17.0.7-0.1mdvmes5.2.x86_64.rpm
 071da99fae036b68760814d06ce2dbda  mes5/x86_64/firefox-gu_IN-17.0.7-0.1mdvmes5.2.x86_64.rpm
 eb7979d7dff6d4c089676fed54276ed5  mes5/x86_64/firefox-he-17.0.7-0.1mdvmes5.2.x86_64.rpm
 441926f1d5e3a485873070a3ba86ec3e  mes5/x86_64/firefox-hi-17.0.7-0.1mdvmes5.2.x86_64.rpm
 fb9a4604927cc690ea14642b1dcca1b8  mes5/x86_64/firefox-hu-17.0.7-0.1mdvmes5.2.x86_64.rpm
 c25566dd3cafab514b4699943b258921  mes5/x86_64/firefox-id-17.0.7-0.1mdvmes5.2.x86_64.rpm
 e0dee96af89dc9083ddc1dadb2b0f6b0  mes5/x86_64/firefox-is-17.0.7-0.1mdvmes5.2.x86_64.rpm
 10bdf0c991e6dd6f8c48db1eaf3d7f64  mes5/x86_64/firefox-it-17.0.7-0.1mdvmes5.2.x86_64.rpm
 a9e9eb4406c2ef27fa0b5be69418e29e  mes5/x86_64/firefox-ja-17.0.7-0.1mdvmes5.2.x86_64.rpm
 734a81663cc9c3cbfc3e6ed3d3fe050e  mes5/x86_64/firefox-kn-17.0.7-0.1mdvmes5.2.x86_64.rpm
 1b2cddac22bb6462a89ea412ccec5a4a  mes5/x86_64/firefox-ko-17.0.7-0.1mdvmes5.2.x86_64.rpm
 0eec7f9b43528fba48603c6270798b76  mes5/x86_64/firefox-ku-17.0.7-0.1mdvmes5.2.x86_64.rpm
 72085a9fc9432f52f8a74f362531adfa  mes5/x86_64/firefox-lt-17.0.7-0.1mdvmes5.2.x86_64.rpm
 fb549798d2e86a5a606f8a5752bc40ad  mes5/x86_64/firefox-lv-17.0.7-0.1mdvmes5.2.x86_64.rpm
 8d2c2adc1dd54e9f7af93ad9e4a51f4b  mes5/x86_64/firefox-mk-17.0.7-0.1mdvmes5.2.x86_64.rpm
 7f7f937a0e8f123597f0f5795ae219a8  mes5/x86_64/firefox-mr-17.0.7-0.1mdvmes5.2.x86_64.rpm
 289ae036328cd607997a06b1a13615e4  mes5/x86_64/firefox-nb_NO-17.0.7-0.1mdvmes5.2.x86_64.rpm
 02e21dd5652910673177a2d7f7677599  mes5/x86_64/firefox-nl-17.0.7-0.1mdvmes5.2.x86_64.rpm
 c11653343da9ec5003b3b5b608143777  mes5/x86_64/firefox-nn_NO-17.0.7-0.1mdvmes5.2.x86_64.rpm
 25a4ffd2f8eb6656557fcd69c9cb256e  mes5/x86_64/firefox-pa_IN-17.0.7-0.1mdvmes5.2.x86_64.rpm
 6b94eb35e28c0d9ad4865c692a7997b8  mes5/x86_64/firefox-pl-17.0.7-0.1mdvmes5.2.x86_64.rpm
 698390e28b22e07893c11ed6834a93df  mes5/x86_64/firefox-pt_BR-17.0.7-0.1mdvmes5.2.x86_64.rpm
 1ef22277239594c7bfd4bb5d18595901  mes5/x86_64/firefox-pt_PT-17.0.7-0.1mdvmes5.2.x86_64.rpm
 eeef7530918dd3747dcecb5c025e6582  mes5/x86_64/firefox-ro-17.0.7-0.1mdvmes5.2.x86_64.rpm
 37ef6dfd7bf021de3bee528aa90444d3  mes5/x86_64/firefox-ru-17.0.7-0.1mdvmes5.2.x86_64.rpm
 e04cae5fbb6171b44669cc860066f50c  mes5/x86_64/firefox-si-17.0.7-0.1mdvmes5.2.x86_64.rpm
 e3900cc084080e6b695be2fcfd78b5ee  mes5/x86_64/firefox-sk-17.0.7-0.1mdvmes5.2.x86_64.rpm
 de40837370db5f31df2c8639ba40f6e8  mes5/x86_64/firefox-sl-17.0.7-0.1mdvmes5.2.x86_64.rpm
 43d05b37458065a02744156d5c776afa  mes5/x86_64/firefox-sq-17.0.7-0.1mdvmes5.2.x86_64.rpm
 fc0a9ade1e3ad21a77435c61d3e39e4b  mes5/x86_64/firefox-sr-17.0.7-0.1mdvmes5.2.x86_64.rpm
 e94670d815f013909f490d2f3460443b  mes5/x86_64/firefox-sv_SE-17.0.7-0.1mdvmes5.2.x86_64.rpm
 bb6f4a2892d9ce2d194659d7b8387c10  mes5/x86_64/firefox-te-17.0.7-0.1mdvmes5.2.x86_64.rpm
 973c2c229f935824009fc0fa7c1bbaf8  mes5/x86_64/firefox-th-17.0.7-0.1mdvmes5.2.x86_64.rpm
 8c3cba0880f345f5b97d5c3405a7cd44  mes5/x86_64/firefox-tr-17.0.7-0.1mdvmes5.2.x86_64.rpm
 9f47ee088ce3e3188173ff2feba8b457  mes5/x86_64/firefox-uk-17.0.7-0.1mdvmes5.2.x86_64.rpm
 1750daf14a9a2c4820fb1f452ba8506d  mes5/x86_64/firefox-zh_CN-17.0.7-0.1mdvmes5.2.x86_64.rpm
 0b3cc99143d2153ed6af2dbba40aa604  mes5/x86_64/firefox-zh_TW-17.0.7-0.1mdvmes5.2.x86_64.rpm
 280ec00914f7359c9564f16aa8aa0fa1  mes5/x86_64/icedtea-web-1.3.2-0.3mdvmes5.2.x86_64.rpm
 b91d94caea294ccc0ee27ea3cf52bac2  mes5/x86_64/icedtea-web-javadoc-1.3.2-0.3mdvmes5.2.x86_64.rpm
 e7ff4dbbb87caf099a3f14e6711a943e  mes5/x86_64/lib64xulrunner17.0.7-17.0.7-0.1mdvmes5.2.x86_64.rpm
 cf3704486448f7e60c73884c5e9b27f0  mes5/x86_64/lib64xulrunner-devel-17.0.7-0.1mdvmes5.2.x86_64.rpm
 e01a9c88577edce905c578b7734c8457  mes5/x86_64/xulrunner-17.0.7-0.1mdvmes5.2.x86_64.rpm 
 ac0e411d475da155175442d1f34842cd  mes5/SRPMS/firefox-17.0.7-0.1mdvmes5.2.src.rpm
 45c0184ab0eeca01f633245f79a03041  mes5/SRPMS/firefox-l10n-17.0.7-0.1mdvmes5.2.src.rpm
 b05d6f1b4e84baad4de04d45c5dae02d  mes5/SRPMS/icedtea-web-1.3.2-0.3mdvmes5.2.src.rpm
 95d1abffc5ac94ae5777dfca705ec041  mes5/SRPMS/xulrunner-17.0.7-0.1mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRyvf4mqjQ0CJFipgRAhncAJ4t57nfc1kBzlr51Y2L7MOvNXP2mgCfSFbI
ohEMVvKKXEcVLt4x2S3uA2I=
=mmvT
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ