lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <E1T6ftN-0000Ga-Gj@titan.mandriva.com> Date: Wed, 29 Aug 2012 12:53:01 +0200 From: security@...driva.com To: full-disclosure@...ts.grok.org.uk Subject: [ MDVSA-2012:145 ] firefox -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2012:145 http://www.mandriva.com/security/ _______________________________________________________________________ Package : firefox Date : August 29, 2012 Affected: 2011. _______________________________________________________________________ Problem Description: Security issues were identified and fixed in mozilla firefox: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code (CVE-2012-1971). Security researcher Abhishek Arya (Inferno) of Google Chrome Security Team discovered a series of use-after-free issues using the Address Sanitizer tool. Many of these issues are potentially exploitable, allowing for remote code execution (CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964). Security researcher Mariusz Mlynski reported that it is possible to shadow the location object using Object.defineProperty. This could be used to confuse the current location to plugins, allowing for possible cross-site scripting (XSS) attacks (CVE-2012-1956). Security researcher Mariusz Mlynski reported that when a page opens a new tab, a subsequent window can then be opened that can be navigated to about:newtab, a chrome privileged page. Once about:newtab is loaded, the special context can potentially be used to escalate privilege, allowing for arbitrary code execution on the local system in a maliciously crafted attack (CVE-2012-3965). Security researcher Frederic Hoguin reported two related issues with the decoding of bitmap (.BMP) format images embedded in icon (.ICO) format files. When processing a negative height header value for the bitmap image, a memory corruption can be induced, allowing an attacker to write random memory and cause a crash. This crash may be potentially exploitable (CVE-2012-3966). Security researcher miaubiz used the Address Sanitizer tool to discover two WebGL issues. The first issue is a use-after-free when WebGL shaders are called after being destroyed. The second issue exposes a problem with Mesa drivers on Linux, leading to a potentially exploitable crash (CVE-2012-3968, CVE-2012-3967). Security researcher Arthur Gerkis used the Address Sanitizer tool to find two issues involving Scalable Vector Graphics (SVG) files. The first issue is a buffer overflow in Gecko's SVG filter code when the sum of two values is too large to be stored as a signed 32-bit integer, causing the function to write past the end of an array. The second issue is a use-after-free when an element with a requiredFeatures attribute is moved between documents. In that situation, the internal representation of the requiredFeatures value could be freed prematurely. Both issues are potentially exploitable (CVE-2012-3969, CVE-2012-3970). Using the Address Sanitizer tool, Mozilla security researcher Christoph Diehl discovered two memory corruption issues involving the Graphite 2 library used in Mozilla products. Both of these issues can cause a potentially exploitable crash. These problems were fixed in the Graphite 2 library, which has been updated for Mozilla products (CVE-2012-3971). Security research Nicolas Gregoire used the Address Sanitizer tool to discover an out-of-bounds read in the format-number feature of XSLT, which can cause inaccurate formatting of numbers and information leakage. This is not directly exploitable (CVE-2012-3972). Mozilla security researcher Mark Goodwin discovered an issue with the Firefox developer tools' debugger. If remote debugging is disabled, but the experimental HTTPMonitor extension has been installed and enabled, a remote user can connect to and use the remote debugging service through the port used by HTTPMonitor. A remote-enabled flag has been added to resolve this problem and close the port unless debugging is explicitly enabled (CVE-2012-3973). Security researcher Masato Kinugawa reported that if a crafted executable is placed in the root partition on a Windows file system, the Firefox and Thunderbird installer will launch this program after a standard installation instead of Firefox or Thunderbird, running this program with the user's privileges (CVE-2012-3974). Security researcher vsemozhetbyt reported that when the DOMParser is used to parse text/html data in a Firefox extension, linked resources within this HTML data will be loaded. If the data being parsed in the extension is untrusted, it could lead to information leakage and can potentially be combined with other attacks to become exploitable (CVE-2012-3975). Security researcher Mark Poticha reported an issue where incorrect SSL certificate information can be displayed on the addressbar, showing the SSL data for a previous site while another has been loaded. This is caused by two onLocationChange events being fired out of the expected order, leading to the displayed certificate data to not be updated. This can be used for phishing attacks by allowing the user to input form or other data on a newer, attacking, site while the credentials of an older site appear on the addressbar (CVE-2012-3976). Mozilla security researcher moz_bug_r_a4 reported that certain security checks in the location object can be bypassed if chrome code is called content in a specific manner. This allowed for the loading of restricted content. This can be combined with other issues to become potentially exploitable (CVE-2012-3978). Security researcher Colby Russell discovered that eval in the web console can execute injected code with chrome privileges, leading to the running of malicious code in a privileged context. This allows for arbitrary code execution through a malicious web page if the web console is invoked by the user (CVE-2012-3980). The mozilla firefox packages has been upgraded to the latest versions which is unaffected by these security flaws. Additionally the sqlite3 packages has been upgraded to the 3.7.13 version as firefox 15.0 requires the 3.7.12.1+ version. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1956 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1971 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3965 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3971 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3973 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3974 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3975 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980 http://www.mozilla.org/security/announce/2012/mfsa2012-57.html http://www.mozilla.org/security/announce/2012/mfsa2012-58.html http://www.mozilla.org/security/announce/2012/mfsa2012-59.html http://www.mozilla.org/security/announce/2012/mfsa2012-60.html http://www.mozilla.org/security/announce/2012/mfsa2012-61.html http://www.mozilla.org/security/announce/2012/mfsa2012-62.html http://www.mozilla.org/security/announce/2012/mfsa2012-63.html http://www.mozilla.org/security/announce/2012/mfsa2012-64.html http://www.mozilla.org/security/announce/2012/mfsa2012-65.html http://www.mozilla.org/security/announce/2012/mfsa2012-66.html http://www.mozilla.org/security/announce/2012/mfsa2012-67.html http://www.mozilla.org/security/announce/2012/mfsa2012-68.html http://www.mozilla.org/security/announce/2012/mfsa2012-69.html http://www.mozilla.org/security/announce/2012/mfsa2012-70.html http://www.mozilla.org/security/announce/2012/mfsa2012-72.html _______________________________________________________________________ Updated Packages: Mandriva Linux 2011: 1f222b3e99fe8ac26b53c9cfcacfae67 2011/i586/firefox-15.0-0.1-mdv2011.0.i586.rpm 830afbabc32e3e7f2e2e35792e189ee9 2011/i586/firefox-af-15.0-0.1-mdv2011.0.noarch.rpm 21c1c8a7d371f6b5c82d3575fa18b7cc 2011/i586/firefox-ar-15.0-0.1-mdv2011.0.noarch.rpm 4f9d82121d5f4b061219bac93fb9d695 2011/i586/firefox-ast-15.0-0.1-mdv2011.0.noarch.rpm 73482d144b27c260c1ee3497683a1e8e 2011/i586/firefox-be-15.0-0.1-mdv2011.0.noarch.rpm ae92eabc7ea75a2e4b793b3204dda1ab 2011/i586/firefox-bg-15.0-0.1-mdv2011.0.noarch.rpm 4b533c2dcfaf12a30c42c96cdda56ad2 2011/i586/firefox-bn_BD-15.0-0.1-mdv2011.0.noarch.rpm c6f7c2cb3c4a2574c2e1f3597cb81885 2011/i586/firefox-bn_IN-15.0-0.1-mdv2011.0.noarch.rpm 22f2bdf23712a350fa75fae37a5cfad6 2011/i586/firefox-br-15.0-0.1-mdv2011.0.noarch.rpm 4778689a922ae7937a8a2b1472f24b48 2011/i586/firefox-bs-15.0-0.1-mdv2011.0.noarch.rpm 3f2c33f4fa565425c2c1a119081793f6 2011/i586/firefox-ca-15.0-0.1-mdv2011.0.noarch.rpm ebde187076855de220ebddf95ce90bfb 2011/i586/firefox-cs-15.0-0.1-mdv2011.0.noarch.rpm ae6933efc19d257517a2c7577052b2b2 2011/i586/firefox-cy-15.0-0.1-mdv2011.0.noarch.rpm 84a6b6ab34f5fd1270fbef5fd129c2d9 2011/i586/firefox-da-15.0-0.1-mdv2011.0.noarch.rpm 2632f7ef74eea38e36017dfa46763bc6 2011/i586/firefox-de-15.0-0.1-mdv2011.0.noarch.rpm 439d6472581e13385eb3e131f91ca08f 2011/i586/firefox-devel-15.0-0.1-mdv2011.0.i586.rpm 59ff02012cd9ec45da32bdbad4be4457 2011/i586/firefox-el-15.0-0.1-mdv2011.0.noarch.rpm 49b5b60cbfde698001c677f4a8dd08a5 2011/i586/firefox-en_GB-15.0-0.1-mdv2011.0.noarch.rpm 3c26aa80a987fa35af688f443b40cce8 2011/i586/firefox-en_ZA-15.0-0.1-mdv2011.0.noarch.rpm b00a4254dd2c1a587757c33663432c69 2011/i586/firefox-eo-15.0-0.1-mdv2011.0.noarch.rpm 6c371889cc0decb90d20c348f1807ff7 2011/i586/firefox-es_AR-15.0-0.1-mdv2011.0.noarch.rpm f6884b390f3729b5ef8f64ac2aed1c1c 2011/i586/firefox-es_CL-15.0-0.1-mdv2011.0.noarch.rpm 3ecb605e1778ad035a077bca4bfea23e 2011/i586/firefox-es_ES-15.0-0.1-mdv2011.0.noarch.rpm bd1ac623a9102bf438aea4832897ee15 2011/i586/firefox-es_MX-15.0-0.1-mdv2011.0.noarch.rpm 166bf576807f4e7f1f63379cfa8727f1 2011/i586/firefox-et-15.0-0.1-mdv2011.0.noarch.rpm a0086739ae734b1766585d4f34ea13b0 2011/i586/firefox-eu-15.0-0.1-mdv2011.0.noarch.rpm c0ec3a965a4a0bf0a3d3d7439cdb87b7 2011/i586/firefox-fa-15.0-0.1-mdv2011.0.noarch.rpm 41320e3a963433760753ca738eeb86b4 2011/i586/firefox-fi-15.0-0.1-mdv2011.0.noarch.rpm cebb929a6db589bfc7a0aad0b04004b3 2011/i586/firefox-fr-15.0-0.1-mdv2011.0.noarch.rpm cd536f9f8727b2dd7701a7908c16cdfb 2011/i586/firefox-fy-15.0-0.1-mdv2011.0.noarch.rpm 93595c9fe1cb709a7c21c02300ac12a9 2011/i586/firefox-ga_IE-15.0-0.1-mdv2011.0.noarch.rpm 279b9c1ce32cf4ca4c700b47493c9761 2011/i586/firefox-gd-15.0-0.1-mdv2011.0.noarch.rpm f7c574740a7f858c1357f0c4a26149f8 2011/i586/firefox-gl-15.0-0.1-mdv2011.0.noarch.rpm 857773582b15d0088871a19d119bd7a6 2011/i586/firefox-gu_IN-15.0-0.1-mdv2011.0.noarch.rpm 326c53491f6c670e97e3dc9970e89fd2 2011/i586/firefox-he-15.0-0.1-mdv2011.0.noarch.rpm bad57690513be43f7a45312afe48d9c9 2011/i586/firefox-hi-15.0-0.1-mdv2011.0.noarch.rpm 729ed2290db6881e017b31a836e3c5a4 2011/i586/firefox-hr-15.0-0.1-mdv2011.0.noarch.rpm 8460829d9985d2a74936b877f179dec9 2011/i586/firefox-hu-15.0-0.1-mdv2011.0.noarch.rpm 548a264d2855b25f2e154aaf240399c8 2011/i586/firefox-hy-15.0-0.1-mdv2011.0.noarch.rpm d4a0edef33cc08ef953b0afe0a42ca22 2011/i586/firefox-id-15.0-0.1-mdv2011.0.noarch.rpm 77df09e404f6f52340722e132578fb71 2011/i586/firefox-is-15.0-0.1-mdv2011.0.noarch.rpm 22c6063a51892e704853e3734152689c 2011/i586/firefox-it-15.0-0.1-mdv2011.0.noarch.rpm 2f385e87134374123a088185e1193667 2011/i586/firefox-ja-15.0-0.1-mdv2011.0.noarch.rpm 588a71cd10e951c5be3015dfe6775e2d 2011/i586/firefox-kk-15.0-0.1-mdv2011.0.noarch.rpm 7ba2d41b41b8836adde138249d2cd587 2011/i586/firefox-kn-15.0-0.1-mdv2011.0.noarch.rpm b4079f7b0ef8f3be0e37c5aa96d2221a 2011/i586/firefox-ko-15.0-0.1-mdv2011.0.noarch.rpm 40b5c012763298a1fe3274ab969567a6 2011/i586/firefox-ku-15.0-0.1-mdv2011.0.noarch.rpm 216e18c06df896f2b2649ba9b016923b 2011/i586/firefox-lg-15.0-0.1-mdv2011.0.noarch.rpm a86d4439195ff4939d04ab1998d0b7aa 2011/i586/firefox-lt-15.0-0.1-mdv2011.0.noarch.rpm 293c14003c06d904f5605ab1ab30eec9 2011/i586/firefox-lv-15.0-0.1-mdv2011.0.noarch.rpm d26c88fdba82c231e368aeab323ec42a 2011/i586/firefox-mai-15.0-0.1-mdv2011.0.noarch.rpm dfea7441a35aa20971e792995d8c63b6 2011/i586/firefox-mk-15.0-0.1-mdv2011.0.noarch.rpm 890c2606438b8603d7c2b74effc7a140 2011/i586/firefox-ml-15.0-0.1-mdv2011.0.noarch.rpm bd7202ff08d5448909760da6ba00193e 2011/i586/firefox-mr-15.0-0.1-mdv2011.0.noarch.rpm d5ae7737ee1e19eddf5b907b71d7ab71 2011/i586/firefox-nb_NO-15.0-0.1-mdv2011.0.noarch.rpm f6d86c02d2da83feb6c167e49c5ec947 2011/i586/firefox-nl-15.0-0.1-mdv2011.0.noarch.rpm 266b961ec2cb241a20c70d394ad9510b 2011/i586/firefox-nn_NO-15.0-0.1-mdv2011.0.noarch.rpm 805d010bb07b456436b6d7ac7104ccd0 2011/i586/firefox-nso-15.0-0.1-mdv2011.0.noarch.rpm fe819dce2711402c23d3dd6f4794b256 2011/i586/firefox-or-15.0-0.1-mdv2011.0.noarch.rpm fca8922205971ddccb34082f997ed5e2 2011/i586/firefox-pa_IN-15.0-0.1-mdv2011.0.noarch.rpm 9d7910fb52d5054e5dead2b014417c8b 2011/i586/firefox-pl-15.0-0.1-mdv2011.0.noarch.rpm 54de08f75456428d52733fdda3e50b12 2011/i586/firefox-pt_BR-15.0-0.1-mdv2011.0.noarch.rpm 53e675e93a9937c31d923ab885901c70 2011/i586/firefox-pt_PT-15.0-0.1-mdv2011.0.noarch.rpm 166a43501f37c621f734107972deaa2c 2011/i586/firefox-ro-15.0-0.1-mdv2011.0.noarch.rpm 610313275eb89ba60144f822ce0fa237 2011/i586/firefox-ru-15.0-0.1-mdv2011.0.noarch.rpm 56bc307c2d0876c75ef0797f0424eacb 2011/i586/firefox-si-15.0-0.1-mdv2011.0.noarch.rpm ca3865058f178e183c94519903e1fb61 2011/i586/firefox-sk-15.0-0.1-mdv2011.0.noarch.rpm 07720c299be46beedc88c26b9cf89a97 2011/i586/firefox-sl-15.0-0.1-mdv2011.0.noarch.rpm b1bf922f975338182bbb26797579428a 2011/i586/firefox-sq-15.0-0.1-mdv2011.0.noarch.rpm 4b6478221fed473055b404500abf2baf 2011/i586/firefox-sr-15.0-0.1-mdv2011.0.noarch.rpm 6194dee67cfa5612aa7abbad659b7315 2011/i586/firefox-sv_SE-15.0-0.1-mdv2011.0.noarch.rpm a0eb93a6dfd7c28e8627c6dfa04284f4 2011/i586/firefox-ta-15.0-0.1-mdv2011.0.noarch.rpm b89778aafce014d88f6b934ffa21bdd7 2011/i586/firefox-ta_LK-15.0-0.1-mdv2011.0.noarch.rpm c9159cce5035229c80b11c50e7ab0005 2011/i586/firefox-te-15.0-0.1-mdv2011.0.noarch.rpm cc439a3f7b4dab59f6e0d577f3163194 2011/i586/firefox-th-15.0-0.1-mdv2011.0.noarch.rpm 696504ef908118a49d32189c36f9eb5d 2011/i586/firefox-tr-15.0-0.1-mdv2011.0.noarch.rpm 1fddb827215cdf82f8f1314e3a547edf 2011/i586/firefox-uk-15.0-0.1-mdv2011.0.noarch.rpm f418db6ba119ed0de0214480943863dd 2011/i586/firefox-vi-15.0-0.1-mdv2011.0.noarch.rpm 2964ec621ab70e39f7635df40e5c484a 2011/i586/firefox-zh_CN-15.0-0.1-mdv2011.0.noarch.rpm cff8302e2a9614c44f1608ac46a421cc 2011/i586/firefox-zh_TW-15.0-0.1-mdv2011.0.noarch.rpm f5a5a2200c29653256e5d382f3766194 2011/i586/firefox-zu-15.0-0.1-mdv2011.0.noarch.rpm 2274b16d1b6b60602ca54dc5eb5f68c8 2011/i586/icedtea-web-1.1.6-0.2-mdv2011.0.i586.rpm dddc30660fb233fb5c97c04f02ed64da 2011/i586/icedtea-web-javadoc-1.1.6-0.2-mdv2011.0.noarch.rpm 550c5722b549c364ee147044d3590d62 2011/i586/libsqlite3_0-3.7.13-0.1-mdv2011.0.i586.rpm 0483c7892ec4be5fbf5fb7162f664271 2011/i586/libsqlite3-devel-3.7.13-0.1-mdv2011.0.i586.rpm 357c444fc07b299e6e96e23ecabf2375 2011/i586/libsqlite3-static-devel-3.7.13-0.1-mdv2011.0.i586.rpm 6592326e150eab214bd23ec0e6ef484a 2011/i586/libxulrunner15.0-15.0-0.1-mdv2011.0.i586.rpm 1b3355cd27981baeeea6d595687ecc74 2011/i586/libxulrunner-devel-15.0-0.1-mdv2011.0.i586.rpm 9908d94443b85447e26eaa358ff442cd 2011/i586/sqlite3-tools-3.7.13-0.1-mdv2011.0.i586.rpm c5498a5ef9939d6b58fe744f9d5578e9 2011/i586/xulrunner-15.0-0.1-mdv2011.0.i586.rpm 5f4955227553eb24c3886bf6a3716b55 2011/SRPMS/firefox-15.0-0.1.src.rpm 5cf3b047ef06dc671d3dade85543338e 2011/SRPMS/firefox-l10n-15.0-0.1.src.rpm 7846e5d4c210787f9ed3f34a485c5531 2011/SRPMS/icedtea-web-1.1.6-0.2.src.rpm 7cdb6e62c1f9d07f4490471d0a66b490 2011/SRPMS/sqlite3-3.7.13-0.1.src.rpm c36ea604ee25a8962918bb95f42884b4 2011/SRPMS/xulrunner-15.0-0.1.src.rpm Mandriva Linux 2011/X86_64: 0e12e9d44ff9a8123fc7493dcb7077f8 2011/x86_64/firefox-15.0-0.1-mdv2011.0.x86_64.rpm 1a181da8dae38cfd5591db4694ed8fbc 2011/x86_64/firefox-af-15.0-0.1-mdv2011.0.noarch.rpm 55360547f9f98f3ced919ba6c50e579a 2011/x86_64/firefox-ar-15.0-0.1-mdv2011.0.noarch.rpm 5e0e1961a7b1f2eb344fd1f34afa0b66 2011/x86_64/firefox-ast-15.0-0.1-mdv2011.0.noarch.rpm 800c8a3ae03d6504dd83da97f58589de 2011/x86_64/firefox-be-15.0-0.1-mdv2011.0.noarch.rpm 7aa80805fc41aa719927ba9630ea548f 2011/x86_64/firefox-bg-15.0-0.1-mdv2011.0.noarch.rpm bb751193947481a0d92066fd2bafefae 2011/x86_64/firefox-bn_BD-15.0-0.1-mdv2011.0.noarch.rpm fc2863e629aa015dfe3ac3f0ebaf631e 2011/x86_64/firefox-bn_IN-15.0-0.1-mdv2011.0.noarch.rpm aa7ba1bc7c14e5aa0cd0e0d9d4ff520f 2011/x86_64/firefox-br-15.0-0.1-mdv2011.0.noarch.rpm 49c06957e034fa5d5c183b2c4da1aa35 2011/x86_64/firefox-bs-15.0-0.1-mdv2011.0.noarch.rpm 8932ea8e47e5822db4efb414617f1aca 2011/x86_64/firefox-ca-15.0-0.1-mdv2011.0.noarch.rpm 12cc2f67e45e9c936b0df757929c30c1 2011/x86_64/firefox-cs-15.0-0.1-mdv2011.0.noarch.rpm 8c35b25848d1fc92e6ab20db07e07702 2011/x86_64/firefox-cy-15.0-0.1-mdv2011.0.noarch.rpm 78ca9cf1e222208de2aa05891999b978 2011/x86_64/firefox-da-15.0-0.1-mdv2011.0.noarch.rpm 8dff4be2f33606862b004e4033598a65 2011/x86_64/firefox-de-15.0-0.1-mdv2011.0.noarch.rpm 6e3f21c934da448622f78c98d14e51be 2011/x86_64/firefox-devel-15.0-0.1-mdv2011.0.x86_64.rpm b91951fb96c66144c5b660b06385653a 2011/x86_64/firefox-el-15.0-0.1-mdv2011.0.noarch.rpm 932dad756f240fbf225dceeef30fca76 2011/x86_64/firefox-en_GB-15.0-0.1-mdv2011.0.noarch.rpm 6973da6f9fafd57c219cf44701ee3c2f 2011/x86_64/firefox-en_ZA-15.0-0.1-mdv2011.0.noarch.rpm 53b8f28aabfef241ba1b29345eb6b8f6 2011/x86_64/firefox-eo-15.0-0.1-mdv2011.0.noarch.rpm 433bde29ecc2dd65ee80a344482a6e21 2011/x86_64/firefox-es_AR-15.0-0.1-mdv2011.0.noarch.rpm d3e1dea3f71c9e01164d7c44d729e6ab 2011/x86_64/firefox-es_CL-15.0-0.1-mdv2011.0.noarch.rpm 108b9ee83ce20174919f1f2b9989d539 2011/x86_64/firefox-es_ES-15.0-0.1-mdv2011.0.noarch.rpm a09908b98b81d5141eaccb573f282780 2011/x86_64/firefox-es_MX-15.0-0.1-mdv2011.0.noarch.rpm bca684c84cf0c67ab987611758132207 2011/x86_64/firefox-et-15.0-0.1-mdv2011.0.noarch.rpm ee18e1f0855974fcd631dab8a7fdff3c 2011/x86_64/firefox-eu-15.0-0.1-mdv2011.0.noarch.rpm 727f24a1fa0d01c000050ba668710c71 2011/x86_64/firefox-fa-15.0-0.1-mdv2011.0.noarch.rpm c14f3f7d08e1af11a21bb78cebb9e0a4 2011/x86_64/firefox-fi-15.0-0.1-mdv2011.0.noarch.rpm c9bf3a1d7db2d326f44f4afbfb56f80f 2011/x86_64/firefox-fr-15.0-0.1-mdv2011.0.noarch.rpm 3c742d582d03dbb67a23c3b2b6a7c628 2011/x86_64/firefox-fy-15.0-0.1-mdv2011.0.noarch.rpm 83294ffb20ac9204b360afd35c4f926e 2011/x86_64/firefox-ga_IE-15.0-0.1-mdv2011.0.noarch.rpm 55fc357d551a3cf96533a0e8513b3191 2011/x86_64/firefox-gd-15.0-0.1-mdv2011.0.noarch.rpm 82f35973cab220ee73e699f078041e8d 2011/x86_64/firefox-gl-15.0-0.1-mdv2011.0.noarch.rpm c74bd9183a85b1f70f93ae7857dbf4f1 2011/x86_64/firefox-gu_IN-15.0-0.1-mdv2011.0.noarch.rpm 76ed674fcc83ce4f9ffcb2426c68edd2 2011/x86_64/firefox-he-15.0-0.1-mdv2011.0.noarch.rpm 787844a81abc2381fc6d507c4635e617 2011/x86_64/firefox-hi-15.0-0.1-mdv2011.0.noarch.rpm e624dd22d0d4393004b426565ce5ed2e 2011/x86_64/firefox-hr-15.0-0.1-mdv2011.0.noarch.rpm 9b96cda724241294456d1a7034f39ccb 2011/x86_64/firefox-hu-15.0-0.1-mdv2011.0.noarch.rpm 477907a657672818409beae06be8aff5 2011/x86_64/firefox-hy-15.0-0.1-mdv2011.0.noarch.rpm c00476196d5fb8bbc9be437fc59971b8 2011/x86_64/firefox-id-15.0-0.1-mdv2011.0.noarch.rpm 6b074fa2d96d8f81af2f0823cbf9672c 2011/x86_64/firefox-is-15.0-0.1-mdv2011.0.noarch.rpm 2ce12cb5145efc398bbc0484a4b50838 2011/x86_64/firefox-it-15.0-0.1-mdv2011.0.noarch.rpm f32e3bc9386dec60704de908e83dcbba 2011/x86_64/firefox-ja-15.0-0.1-mdv2011.0.noarch.rpm 71fbffb05956075768546aeb2fd84939 2011/x86_64/firefox-kk-15.0-0.1-mdv2011.0.noarch.rpm d9cebef0570d2d09c0ba617c2cdf8525 2011/x86_64/firefox-kn-15.0-0.1-mdv2011.0.noarch.rpm 51584b7f863a78c0dea9dd6b7b3bd7c2 2011/x86_64/firefox-ko-15.0-0.1-mdv2011.0.noarch.rpm f455e7aa94b96a12751359fa109c5d00 2011/x86_64/firefox-ku-15.0-0.1-mdv2011.0.noarch.rpm 436e157f25b477cf0adaddac02d8268a 2011/x86_64/firefox-lg-15.0-0.1-mdv2011.0.noarch.rpm 098d1b1c8d93eafafc857aa69d2745ea 2011/x86_64/firefox-lt-15.0-0.1-mdv2011.0.noarch.rpm 645a634ef43975f67039828dbbab56cf 2011/x86_64/firefox-lv-15.0-0.1-mdv2011.0.noarch.rpm dc80bf890f4fe7db4e9d0bfc2266ad15 2011/x86_64/firefox-mai-15.0-0.1-mdv2011.0.noarch.rpm 10e45ce2b835a6a81b481653dab78880 2011/x86_64/firefox-mk-15.0-0.1-mdv2011.0.noarch.rpm 10c055dd5d49c5562e2c590661309518 2011/x86_64/firefox-ml-15.0-0.1-mdv2011.0.noarch.rpm 525dd0b30d68e43dd8e56b6b25a7b149 2011/x86_64/firefox-mr-15.0-0.1-mdv2011.0.noarch.rpm c2c68003b652349c48b812d381c00248 2011/x86_64/firefox-nb_NO-15.0-0.1-mdv2011.0.noarch.rpm 3a1651ec18d3aef0da7234cc01d3de67 2011/x86_64/firefox-nl-15.0-0.1-mdv2011.0.noarch.rpm d7f8797d04abcd86471bad8f05c541f0 2011/x86_64/firefox-nn_NO-15.0-0.1-mdv2011.0.noarch.rpm f7bc6278e0a54b3cdbe855764f4457eb 2011/x86_64/firefox-nso-15.0-0.1-mdv2011.0.noarch.rpm 1ae275c8c3bdf83d7cde2be3feb3d1de 2011/x86_64/firefox-or-15.0-0.1-mdv2011.0.noarch.rpm 66b6127a9a0c658608668514c5c78884 2011/x86_64/firefox-pa_IN-15.0-0.1-mdv2011.0.noarch.rpm 2d486eabca55712bc8cc3a3252c7adcc 2011/x86_64/firefox-pl-15.0-0.1-mdv2011.0.noarch.rpm fca74bdac00db9fae52fdac14e1c5b48 2011/x86_64/firefox-pt_BR-15.0-0.1-mdv2011.0.noarch.rpm 0c332cea72e001c903d5d82c9627efd5 2011/x86_64/firefox-pt_PT-15.0-0.1-mdv2011.0.noarch.rpm 3162e3ec2676a92f926cd31af88aa53e 2011/x86_64/firefox-ro-15.0-0.1-mdv2011.0.noarch.rpm 4cd1d49b0eaec676aa64e50f5796bbcc 2011/x86_64/firefox-ru-15.0-0.1-mdv2011.0.noarch.rpm a5d6939ae79a981f2ccab6bc83cbd326 2011/x86_64/firefox-si-15.0-0.1-mdv2011.0.noarch.rpm 3385479540d49e9f47bb7b6da3af61d5 2011/x86_64/firefox-sk-15.0-0.1-mdv2011.0.noarch.rpm 24a3140b69a25734b5877422eead8fd7 2011/x86_64/firefox-sl-15.0-0.1-mdv2011.0.noarch.rpm 63a3c429e6c935ea1c67a1a2928b99e5 2011/x86_64/firefox-sq-15.0-0.1-mdv2011.0.noarch.rpm 41c9c59322de076f495352b6d05efdb5 2011/x86_64/firefox-sr-15.0-0.1-mdv2011.0.noarch.rpm a23a5d5a39a1677b9f06db9b8e16478b 2011/x86_64/firefox-sv_SE-15.0-0.1-mdv2011.0.noarch.rpm 926fb2b0302ced70674ed8b3518558ee 2011/x86_64/firefox-ta-15.0-0.1-mdv2011.0.noarch.rpm f7472be3b81befdcc3653cb9e71b46cf 2011/x86_64/firefox-ta_LK-15.0-0.1-mdv2011.0.noarch.rpm 4e88af6834cc8f590f260e13ca2f39bb 2011/x86_64/firefox-te-15.0-0.1-mdv2011.0.noarch.rpm dac0f7e88abd24bee5a5c7695de442ed 2011/x86_64/firefox-th-15.0-0.1-mdv2011.0.noarch.rpm 0c3c48ce57c8f54e95a162a2a5f32f49 2011/x86_64/firefox-tr-15.0-0.1-mdv2011.0.noarch.rpm 86ab0a7d77f74a1822355574580efc38 2011/x86_64/firefox-uk-15.0-0.1-mdv2011.0.noarch.rpm 65188e896935cb4cabc3207b8da029cb 2011/x86_64/firefox-vi-15.0-0.1-mdv2011.0.noarch.rpm f183fa37318efda5d033ecbf8e69aafc 2011/x86_64/firefox-zh_CN-15.0-0.1-mdv2011.0.noarch.rpm 1085b1aaf753421006716514b2dd4d51 2011/x86_64/firefox-zh_TW-15.0-0.1-mdv2011.0.noarch.rpm 61e9a3a0eb460cd4f4fdd4bae6d77502 2011/x86_64/firefox-zu-15.0-0.1-mdv2011.0.noarch.rpm e21e61bc2a9a00d61632b671ec1a7c56 2011/x86_64/icedtea-web-1.1.6-0.2-mdv2011.0.x86_64.rpm d25f4584600c089a687f7dee70e5cbd2 2011/x86_64/icedtea-web-javadoc-1.1.6-0.2-mdv2011.0.noarch.rpm 264d06ed466aa86874fb72bcb58b606b 2011/x86_64/lib64sqlite3_0-3.7.13-0.1-mdv2011.0.x86_64.rpm 0183919f566dd640cb4f050f568b3112 2011/x86_64/lib64sqlite3-devel-3.7.13-0.1-mdv2011.0.x86_64.rpm f1368b8324e0031c8505a3e8f944eba0 2011/x86_64/lib64sqlite3-static-devel-3.7.13-0.1-mdv2011.0.x86_64.rpm 27154cd06e180c264d478037c5b189d5 2011/x86_64/lib64xulrunner15.0-15.0-0.1-mdv2011.0.x86_64.rpm 37023d7d5b9e3c135cdc21ce7e68a73c 2011/x86_64/lib64xulrunner-devel-15.0-0.1-mdv2011.0.x86_64.rpm de18d6a57d7c417717f86a983d0faa5b 2011/x86_64/sqlite3-tools-3.7.13-0.1-mdv2011.0.x86_64.rpm f4b5a15a168d314f542bab81ca67d339 2011/x86_64/xulrunner-15.0-0.1-mdv2011.0.x86_64.rpm 5f4955227553eb24c3886bf6a3716b55 2011/SRPMS/firefox-15.0-0.1.src.rpm 5cf3b047ef06dc671d3dade85543338e 2011/SRPMS/firefox-l10n-15.0-0.1.src.rpm 7846e5d4c210787f9ed3f34a485c5531 2011/SRPMS/icedtea-web-1.1.6-0.2.src.rpm 7cdb6e62c1f9d07f4490471d0a66b490 2011/SRPMS/sqlite3-3.7.13-0.1.src.rpm c36ea604ee25a8962918bb95f42884b4 2011/SRPMS/xulrunner-15.0-0.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFQPcjxmqjQ0CJFipgRAvlQAJ9gra/7dalMiK9AOe28Plp6F44XOwCg4du7 rSG0ikRTba4V5jIqU8CTLtM= =qscF -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists