[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ MDVSA-2012:081 ] firefox
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: [ MDVSA-2012:081 ] firefox
- From: security@xxxxxxxxxxxx
- Date: Thu, 24 May 2012 16:48:00 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2012:081
http://www.mandriva.com/security/
_______________________________________________________________________
Package : firefox
Date : May 24, 2012
Affected: Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
Security issues were identified and fixed in mozilla firefox:
Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption
under certain circumstances, and we presume that with enough effort
at least some of these could be exploited to run arbitrary code
(CVE-2012-0468, CVE-2012-0467).
Using the Address Sanitizer tool, security researcher Aki Helin from
OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect
hashtable instead of being unlinked before being destroyed. When
it is destroyed, this causes a use-after-free, which is potentially
exploitable (CVE-2012-0469).
Using the Address Sanitizer tool, security researcher Atte Kettunen
from OUSPG found a heap corruption in gfxImageSurface which allows for
invalid frees and possible remote code execution. This happens due
to float error, resulting from graphics values being passed through
different number systems (CVE-2012-0470).
Anne van Kesteren of Opera Software found a multi-octet encoding
issue where certain octets will destroy the following octets in the
processing of some multibyte character sets. This can leave users
vulnerable to cross-site scripting (XSS) attacks on maliciously
crafted web pages (CVE-2012-0471).
Security research firm iDefense reported that researcher wushi of
team509 discovered a memory corruption on Windows Vista and Windows
7 systems with hardware acceleration disabled or using incompatible
video drivers. This is created by using cairo-dwrite to attempt to
render fonts on an unsupported code path. This corruption causes a
potentially exploitable crash on affected systems (CVE-2012-0472).
Mozilla community member Matias Juntunen discovered an error in
WebGLBuffer where FindMaxElementInSubArray receives wrong template
arguments from FindMaxUshortElement. This bug causes maximum index
to be computed incorrectly within WebGL.drawElements, allowing the
reading of illegal video memory (CVE-2012-0473).
Security researchers Jordi Chancel and Eddy Bordi reported that they
could short-circuit page loads to show the address of a different
site than what is loaded in the window in the addressbar. Security
researcher Chris McGowen independently reported the same flaw, and
further demonstrated that this could lead to loading scripts from
the attacker's site, leaving users vulnerable to cross-site scripting
(XSS) attacks (CVE-2012-0474).
Security researcher Masato Kinugawa found that during the decoding
of ISO-2022-KR and ISO-2022-CN character sets, characters near 1024
bytes are treated incorrectly, either doubling or deleting bytes. On
certain pages it might be possible for an attacker to pad the output of
the page such that these errors fall in the right place to affect the
structure of the page, allowing for cross-site script (XSS) injection
(CVE-2012-0477).
Mozilla community member Ms2ger found an image rendering issue
with WebGL when texImage2D uses use JSVAL_TO_OBJECT on arbitrary
objects. This can lead to a crash on a maliciously crafted web
page. While there is no evidence that this is directly exploitable,
there is a possibility of remote code execution (CVE-2012-0478).
Mateusz Jurczyk of the Google Security Team discovered an off-by-one
error in the OpenType Sanitizer using the Address Sanitizer tool. This
can lead to an out-of-bounds read and execution of an uninitialized
function pointer during parsing and possible remote code execution
(CVE-2011-3062).
Security researcher Jeroen van der Gun reported that if RSS or Atom
XML invalid content is loaded over HTTPS, the addressbar updates
to display the new location of the loaded resource, including SSL
indicators, while the main window still displays the previously loaded
content. This allows for phishing attacks where a malicious page can
spoof the identify of another seemingly secure site (CVE-2012-0479).
Additionally the OpenJDK java plugin (icedtea-web) has been upgraded
to the 1.1.5 version which has better support for firefox 10.x+.
The mozilla firefox packages has been upgraded to the latest version
(10.0.4) which is unaffected by these security flaws.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479
http://www.mozilla.org/security/announce/2012/mfsa2012-20.html
http://www.mozilla.org/security/announce/2012/mfsa2012-22.html
http://www.mozilla.org/security/announce/2012/mfsa2012-23.html
http://www.mozilla.org/security/announce/2012/mfsa2012-24.html
http://www.mozilla.org/security/announce/2012/mfsa2012-25.html
http://www.mozilla.org/security/announce/2012/mfsa2012-26.html
http://www.mozilla.org/security/announce/2012/mfsa2012-27.html
http://www.mozilla.org/security/announce/2012/mfsa2012-29.html
http://www.mozilla.org/security/announce/2012/mfsa2012-30.html
http://www.mozilla.org/security/announce/2012/mfsa2012-31.html
http://www.mozilla.org/security/announce/2012/mfsa2012-33.html
_______________________________________________________________________
Updated Packages:
Mandriva Enterprise Server 5:
193b2b0679d513564e53284307f2102b
mes5/i586/firefox-10.0.4-0.1mdvmes5.2.i586.rpm
6b2a368e5f7dd9d8b4c82d1a2cd14d57
mes5/i586/firefox-af-10.0.4-0.1mdvmes5.2.i586.rpm
fed44fb471b0c182dab2a9d83e1d5a8a
mes5/i586/firefox-ar-10.0.4-0.1mdvmes5.2.i586.rpm
e934b53194435db948ddf167feeabff2
mes5/i586/firefox-be-10.0.4-0.1mdvmes5.2.i586.rpm
1029a3368c2e03c6e5fca29d919b95b1
mes5/i586/firefox-bg-10.0.4-0.1mdvmes5.2.i586.rpm
0acffa710c2ffd613248a5fea527a2c6
mes5/i586/firefox-bn-10.0.4-0.1mdvmes5.2.i586.rpm
fe36d262aa3837c06daf4c6d69b84108
mes5/i586/firefox-ca-10.0.4-0.1mdvmes5.2.i586.rpm
c6d115880df0d6c1587797c31fba8879
mes5/i586/firefox-cs-10.0.4-0.1mdvmes5.2.i586.rpm
9f581bb0b11552d002b3c399b7531968
mes5/i586/firefox-cy-10.0.4-0.1mdvmes5.2.i586.rpm
51ed7ecfcf67292847315994a746bbf3
mes5/i586/firefox-da-10.0.4-0.1mdvmes5.2.i586.rpm
94d85793d298a3eb8c75cebd898fbd6c
mes5/i586/firefox-de-10.0.4-0.1mdvmes5.2.i586.rpm
3a880a7e39bac5a9b9fc160d51046b19
mes5/i586/firefox-devel-10.0.4-0.1mdvmes5.2.i586.rpm
1b604c75e4fd7e302ed2627a8147e7c1
mes5/i586/firefox-el-10.0.4-0.1mdvmes5.2.i586.rpm
efe949479fa2eaeb7a5be876caaa5049
mes5/i586/firefox-en_GB-10.0.4-0.1mdvmes5.2.i586.rpm
4c787581a75a5a8a5a14b4a3a20280f2
mes5/i586/firefox-eo-10.0.4-0.1mdvmes5.2.i586.rpm
646f56e3b288de9f1e39947f05969014
mes5/i586/firefox-es_AR-10.0.4-0.1mdvmes5.2.i586.rpm
3185f5ea5ba41dc9251617ff103841ab
mes5/i586/firefox-es_ES-10.0.4-0.1mdvmes5.2.i586.rpm
241655d4834edc69928640717ecedd60
mes5/i586/firefox-et-10.0.4-0.1mdvmes5.2.i586.rpm
7c42f3b9eda430e9cc71bcec89a4a988
mes5/i586/firefox-eu-10.0.4-0.1mdvmes5.2.i586.rpm
808b3c7dcd7e3fdd638dcaf85ea92710
mes5/i586/firefox-fi-10.0.4-0.1mdvmes5.2.i586.rpm
4ca2cec95c0eb52b8cf0ddbc417d6fb7
mes5/i586/firefox-fr-10.0.4-0.1mdvmes5.2.i586.rpm
7e466b6cdee00044853b5d904de982b0
mes5/i586/firefox-fy-10.0.4-0.1mdvmes5.2.i586.rpm
2386807b47816840462a48f4307b73da
mes5/i586/firefox-ga_IE-10.0.4-0.1mdvmes5.2.i586.rpm
39d9141bb98506677c406b350195571a
mes5/i586/firefox-gl-10.0.4-0.1mdvmes5.2.i586.rpm
6d15fbe0824957df7248eb387c3703aa
mes5/i586/firefox-gu_IN-10.0.4-0.1mdvmes5.2.i586.rpm
aae9db3b4a6b0fb4eb590454368aa7fc
mes5/i586/firefox-he-10.0.4-0.1mdvmes5.2.i586.rpm
f196eab619bc51ef64f97bb620814253
mes5/i586/firefox-hi-10.0.4-0.1mdvmes5.2.i586.rpm
f069a4806971ea41b48d2af769d93132
mes5/i586/firefox-hu-10.0.4-0.1mdvmes5.2.i586.rpm
a3beac338a793a0a287fc1862462d068
mes5/i586/firefox-id-10.0.4-0.1mdvmes5.2.i586.rpm
6123e1459dc5b0bbe63b674d33995693
mes5/i586/firefox-is-10.0.4-0.1mdvmes5.2.i586.rpm
d73c85d5eefe09d6a3e91d0ccdb8d622
mes5/i586/firefox-it-10.0.4-0.1mdvmes5.2.i586.rpm
aaf9b48f8716e095ec7df1d19cad69c7
mes5/i586/firefox-ja-10.0.4-0.1mdvmes5.2.i586.rpm
cfa80f3ff847df2992fbb6405454e7ca
mes5/i586/firefox-ka-10.0.4-0.1mdvmes5.2.i586.rpm
4fca93a01e923f4eb358aefc692cad67
mes5/i586/firefox-kn-10.0.4-0.1mdvmes5.2.i586.rpm
6ee5808baeff6813bd76e33e4f18d28e
mes5/i586/firefox-ko-10.0.4-0.1mdvmes5.2.i586.rpm
0effcc290c9c326724ccfa28e7139ada
mes5/i586/firefox-ku-10.0.4-0.1mdvmes5.2.i586.rpm
cc7675d4172f14c8940b49bbf61bb18e
mes5/i586/firefox-lt-10.0.4-0.1mdvmes5.2.i586.rpm
a60078f103dfd3075d95097a31d62bd5
mes5/i586/firefox-lv-10.0.4-0.1mdvmes5.2.i586.rpm
2e2046d3e59ea8be6fa5eb4b45addb72
mes5/i586/firefox-mk-10.0.4-0.1mdvmes5.2.i586.rpm
f7ffed193940d943ae9631a6e8692eef
mes5/i586/firefox-mr-10.0.4-0.1mdvmes5.2.i586.rpm
a9a6d3315312d9a6f4d5909e1b906b8f
mes5/i586/firefox-nb_NO-10.0.4-0.1mdvmes5.2.i586.rpm
b632687cb2e381baba9c02421aadadfe
mes5/i586/firefox-nl-10.0.4-0.1mdvmes5.2.i586.rpm
a9d63c103db37373a86e0e5648894987
mes5/i586/firefox-nn_NO-10.0.4-0.1mdvmes5.2.i586.rpm
84f88308a0db841160a2a0dd18aee4a1
mes5/i586/firefox-oc-10.0.4-0.1mdvmes5.2.i586.rpm
4dcc39e7525ccba672726c7f3cae8168
mes5/i586/firefox-pa_IN-10.0.4-0.1mdvmes5.2.i586.rpm
052c9e85efea6f6ed62ea53f5472e53b
mes5/i586/firefox-pl-10.0.4-0.1mdvmes5.2.i586.rpm
77c518708e77a54817935af188e55477
mes5/i586/firefox-pt_BR-10.0.4-0.1mdvmes5.2.i586.rpm
99f055ac36c6d7fe56b9f3a6009d08da
mes5/i586/firefox-pt_PT-10.0.4-0.1mdvmes5.2.i586.rpm
a442c67bf58bb90b96a54a234f24bd72
mes5/i586/firefox-ro-10.0.4-0.1mdvmes5.2.i586.rpm
164d1c5a9a15abf1063634159deba9f2
mes5/i586/firefox-ru-10.0.4-0.1mdvmes5.2.i586.rpm
32df9fd644919935a2bfbcc7421cd204
mes5/i586/firefox-si-10.0.4-0.1mdvmes5.2.i586.rpm
d80be6f7b223a2deaae25f6dec1b6370
mes5/i586/firefox-sk-10.0.4-0.1mdvmes5.2.i586.rpm
f4b629c6a8e892cb8571219f13879783
mes5/i586/firefox-sl-10.0.4-0.1mdvmes5.2.i586.rpm
cc1b2f9cf959bfbc96e5856d89b5adb8
mes5/i586/firefox-sq-10.0.4-0.1mdvmes5.2.i586.rpm
237d759dc2018d4b18e3d475709c8041
mes5/i586/firefox-sr-10.0.4-0.1mdvmes5.2.i586.rpm
7d79a7670c7833b7c2334f8ba55db0d4
mes5/i586/firefox-sv_SE-10.0.4-0.1mdvmes5.2.i586.rpm
d0ee70491cc8125fbbdf4256a635bd59
mes5/i586/firefox-te-10.0.4-0.1mdvmes5.2.i586.rpm
db978375a4a46f4d4d7c9e352a0a72cb
mes5/i586/firefox-th-10.0.4-0.1mdvmes5.2.i586.rpm
d68633a0b80316f2893b15ad9c6b8fe7
mes5/i586/firefox-tr-10.0.4-0.1mdvmes5.2.i586.rpm
0a8b368dd05e641df6a2c78098a180e1
mes5/i586/firefox-uk-10.0.4-0.1mdvmes5.2.i586.rpm
66658c77030de0388b00260f8c344f47
mes5/i586/firefox-zh_CN-10.0.4-0.1mdvmes5.2.i586.rpm
c188b5e42b350bbd55493bdcde83860c
mes5/i586/firefox-zh_TW-10.0.4-0.1mdvmes5.2.i586.rpm
30bfd413c74c33b9015d15cd3d9ada2b
mes5/i586/icedtea-web-1.1.5-0.1mdvmes5.2.i586.rpm
70fca946067f3e89d68c32f5f6a9006a
mes5/i586/icedtea-web-javadoc-1.1.5-0.1mdvmes5.2.i586.rpm
41534a23821ffaf40bee803faf0ec983 mes5/i586/libiw29-29-3.1mnb2.i586.rpm
19a2baf2b5445c8d4accbbbda1e4a6bd mes5/i586/libiw29-devel-29-3.1mnb2.i586.rpm
9cc77cc785d29e3e30bcf0c160c76799 mes5/i586/libvpx0-0.9.7-0.2mdvmes5.2.i586.rpm
a826b46bb2e25beed537a72ca05a9e20
mes5/i586/libvpx-devel-0.9.7-0.2mdvmes5.2.i586.rpm
c14d94ba2816633883c013303014a0b2
mes5/i586/libvpx-utils-0.9.7-0.2mdvmes5.2.i586.rpm
d579056b5b169241daf27841cc013790
mes5/i586/libxulrunner10.0.4-10.0.4-0.1mdvmes5.2.i586.rpm
adf745f8a727f3bcba53e596fd88950a
mes5/i586/libxulrunner-devel-10.0.4-0.1mdvmes5.2.i586.rpm
9ea303afba3bb08905f6421b6493ecd4
mes5/i586/python-cython-0.15-0.1mdvmes5.2.i586.rpm
e56c57897156842a7ba4f90c472a47c9 mes5/i586/wireless-tools-29-3.1mnb2.i586.rpm
a0329158463abcbad918047c84186141
mes5/i586/xulrunner-10.0.4-0.1mdvmes5.2.i586.rpm
1e93694bd386fa384d62db462e0a4031 mes5/i586/yasm-1.1.0-0.1mdvmes5.2.i586.rpm
32ded032cb69d5c70178f9651d62e10b
mes5/i586/yasm-devel-1.1.0-0.1mdvmes5.2.i586.rpm
feab3a138317b8df1d7a72eba74b2543
mes5/i586/yasm-python-1.1.0-0.1mdvmes5.2.i586.rpm
cab2fb3795af9ee2b730ab4609ff5d38
mes5/SRPMS/firefox-10.0.4-0.1mdvmes5.2.src.rpm
bd3fbc028e30d73714793c5fb08f8609
mes5/SRPMS/firefox-l10n-10.0.4-0.1mdvmes5.2.src.rpm
2522a91d944b8156c3ddb82fccc25539
mes5/SRPMS/icedtea-web-1.1.5-0.1mdvmes5.2.src.rpm
78481843cb9aa5279b0975d75242e809 mes5/SRPMS/libvpx-0.9.7-0.2mdvmes5.2.src.rpm
6d47b4c4cd98073ed9435bae941dd665
mes5/SRPMS/python-cython-0.15-0.1mdvmes5.2.src.rpm
34c2cc5a16145dfcc969c0224bffdae4 mes5/SRPMS/wireless-tools-29-3.1mnb2.src.rpm
e4f47ab68daf56f0a376ed5de58219cb
mes5/SRPMS/xulrunner-10.0.4-0.1mdvmes5.2.src.rpm
38698452301ff1bd0eb5fb221a9d35d2 mes5/SRPMS/yasm-1.1.0-0.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
72143cae4c12bbf399202a03cfbc05cd
mes5/x86_64/firefox-10.0.4-0.1mdvmes5.2.x86_64.rpm
d160a5a991f647a5bd6b4c0dd3562266
mes5/x86_64/firefox-af-10.0.4-0.1mdvmes5.2.x86_64.rpm
8753f1bbe4100b5f0314470a0cae3d8c
mes5/x86_64/firefox-ar-10.0.4-0.1mdvmes5.2.x86_64.rpm
ff9d47d7ff3fd90958f9e951d0c76da9
mes5/x86_64/firefox-be-10.0.4-0.1mdvmes5.2.x86_64.rpm
35393856a12c8a6328726619eb303126
mes5/x86_64/firefox-bg-10.0.4-0.1mdvmes5.2.x86_64.rpm
4b6e778539052f275cb9b7bc09a6c4ae
mes5/x86_64/firefox-bn-10.0.4-0.1mdvmes5.2.x86_64.rpm
0531167486bb429a92e35373d6b76fc2
mes5/x86_64/firefox-ca-10.0.4-0.1mdvmes5.2.x86_64.rpm
60d0cdcc11d04d0d6f26c2cd62f8a4d0
mes5/x86_64/firefox-cs-10.0.4-0.1mdvmes5.2.x86_64.rpm
63e3ae053f255455b50f1e6a1bfdd3c4
mes5/x86_64/firefox-cy-10.0.4-0.1mdvmes5.2.x86_64.rpm
b64491e5877443ca01497b98e39b68a7
mes5/x86_64/firefox-da-10.0.4-0.1mdvmes5.2.x86_64.rpm
5fd25b8b8147bc793951578d423f5595
mes5/x86_64/firefox-de-10.0.4-0.1mdvmes5.2.x86_64.rpm
69ec5adbb4ca050933956de9ff2f65fd
mes5/x86_64/firefox-devel-10.0.4-0.1mdvmes5.2.x86_64.rpm
2c9dae2af88ffef107c7c7ad8c109e66
mes5/x86_64/firefox-el-10.0.4-0.1mdvmes5.2.x86_64.rpm
a11181e8b5534c94e5e895bd91697060
mes5/x86_64/firefox-en_GB-10.0.4-0.1mdvmes5.2.x86_64.rpm
2366be0bea1669c7556b3edb18a19cb6
mes5/x86_64/firefox-eo-10.0.4-0.1mdvmes5.2.x86_64.rpm
8d8816da7fe34870c0f1e1a2064b8560
mes5/x86_64/firefox-es_AR-10.0.4-0.1mdvmes5.2.x86_64.rpm
c53a83000c1f5e88e799b3a20176b1e6
mes5/x86_64/firefox-es_ES-10.0.4-0.1mdvmes5.2.x86_64.rpm
6d266df455ecc2a407ff1b3db3b62316
mes5/x86_64/firefox-et-10.0.4-0.1mdvmes5.2.x86_64.rpm
56e606eb0283317a74ac495bc93db377
mes5/x86_64/firefox-eu-10.0.4-0.1mdvmes5.2.x86_64.rpm
1ee31760392f7e567842fc60823af9d6
mes5/x86_64/firefox-fi-10.0.4-0.1mdvmes5.2.x86_64.rpm
a6bda9a063c0908786d37cf3ccc4ffee
mes5/x86_64/firefox-fr-10.0.4-0.1mdvmes5.2.x86_64.rpm
0d6bc328dc776c74f3ee53fbc62deb33
mes5/x86_64/firefox-fy-10.0.4-0.1mdvmes5.2.x86_64.rpm
4413cdb1172541e31e149583c39869eb
mes5/x86_64/firefox-ga_IE-10.0.4-0.1mdvmes5.2.x86_64.rpm
03ebe55c3e5de4687506a6fa978866cc
mes5/x86_64/firefox-gl-10.0.4-0.1mdvmes5.2.x86_64.rpm
e00f877f64a468d3074b56535b5f272d
mes5/x86_64/firefox-gu_IN-10.0.4-0.1mdvmes5.2.x86_64.rpm
02250f114481f7c38f127890fd74bf11
mes5/x86_64/firefox-he-10.0.4-0.1mdvmes5.2.x86_64.rpm
178981447a8dc0a19fded1c25a619ee7
mes5/x86_64/firefox-hi-10.0.4-0.1mdvmes5.2.x86_64.rpm
67f84f481561ca2a094f65fa5ecca25a
mes5/x86_64/firefox-hu-10.0.4-0.1mdvmes5.2.x86_64.rpm
54e900d106c5623ca3b748cc60d64da5
mes5/x86_64/firefox-id-10.0.4-0.1mdvmes5.2.x86_64.rpm
36c928ff015d0070af08baebf209c151
mes5/x86_64/firefox-is-10.0.4-0.1mdvmes5.2.x86_64.rpm
cc1c1b9f15e22600b98ca8b4b456833a
mes5/x86_64/firefox-it-10.0.4-0.1mdvmes5.2.x86_64.rpm
edb0b276a1d25031a96f9abf1ad9a511
mes5/x86_64/firefox-ja-10.0.4-0.1mdvmes5.2.x86_64.rpm
c011f295aec053f156ac3c3714aa0d5e
mes5/x86_64/firefox-ka-10.0.4-0.1mdvmes5.2.x86_64.rpm
8312aea506245303dc54696e86681b8d
mes5/x86_64/firefox-kn-10.0.4-0.1mdvmes5.2.x86_64.rpm
2a988ffefd6b988a812012030e0d4d10
mes5/x86_64/firefox-ko-10.0.4-0.1mdvmes5.2.x86_64.rpm
dc39ab0f62d0520cc84a94234235ca11
mes5/x86_64/firefox-ku-10.0.4-0.1mdvmes5.2.x86_64.rpm
30774bca94992d88644ddad3785fa1c7
mes5/x86_64/firefox-lt-10.0.4-0.1mdvmes5.2.x86_64.rpm
fc67b7a963fb8cb18cd892caef17df69
mes5/x86_64/firefox-lv-10.0.4-0.1mdvmes5.2.x86_64.rpm
4114f93c1a8951a445a047ce7b8b78c9
mes5/x86_64/firefox-mk-10.0.4-0.1mdvmes5.2.x86_64.rpm
93ad20b01148140463c2de67e52279a6
mes5/x86_64/firefox-mr-10.0.4-0.1mdvmes5.2.x86_64.rpm
2ae391524ed24ad727598f5e5d57d535
mes5/x86_64/firefox-nb_NO-10.0.4-0.1mdvmes5.2.x86_64.rpm
45ccf6143fce18549e19acd9af08b2ce
mes5/x86_64/firefox-nl-10.0.4-0.1mdvmes5.2.x86_64.rpm
a983bde2fd2fccc985b9ec94304849eb
mes5/x86_64/firefox-nn_NO-10.0.4-0.1mdvmes5.2.x86_64.rpm
6e4fc5cfa7087bdee36f4ad531a460d2
mes5/x86_64/firefox-oc-10.0.4-0.1mdvmes5.2.x86_64.rpm
610510a745dca777b915baa9f9fc1839
mes5/x86_64/firefox-pa_IN-10.0.4-0.1mdvmes5.2.x86_64.rpm
3d1cfd9dc0ea64666e5b74838fe8baae
mes5/x86_64/firefox-pl-10.0.4-0.1mdvmes5.2.x86_64.rpm
9711952a5b20821b43214f50d4117bfd
mes5/x86_64/firefox-pt_BR-10.0.4-0.1mdvmes5.2.x86_64.rpm
0081ebeac7e2b33f68e18656353c8ec5
mes5/x86_64/firefox-pt_PT-10.0.4-0.1mdvmes5.2.x86_64.rpm
76649e0ca0bc3e04ab05b207f76afef5
mes5/x86_64/firefox-ro-10.0.4-0.1mdvmes5.2.x86_64.rpm
88b591294728d5ccc16a95514f506a18
mes5/x86_64/firefox-ru-10.0.4-0.1mdvmes5.2.x86_64.rpm
f94710f67887628e5445635884d8177f
mes5/x86_64/firefox-si-10.0.4-0.1mdvmes5.2.x86_64.rpm
cccca986e16c4606364c5632b5e155ad
mes5/x86_64/firefox-sk-10.0.4-0.1mdvmes5.2.x86_64.rpm
af6d6a0875198e2c4644a58f35360b6a
mes5/x86_64/firefox-sl-10.0.4-0.1mdvmes5.2.x86_64.rpm
2892de558bb26ddf6dd54ee41d4fab4a
mes5/x86_64/firefox-sq-10.0.4-0.1mdvmes5.2.x86_64.rpm
f9964fd7159176c06bfaa738d9c40b22
mes5/x86_64/firefox-sr-10.0.4-0.1mdvmes5.2.x86_64.rpm
1c4866b21a43f4ff2431cc06792262e0
mes5/x86_64/firefox-sv_SE-10.0.4-0.1mdvmes5.2.x86_64.rpm
7f622fd303551c606e6fa7d50c854184
mes5/x86_64/firefox-te-10.0.4-0.1mdvmes5.2.x86_64.rpm
1eedad05b14fbabc3e7290e92d4a48eb
mes5/x86_64/firefox-th-10.0.4-0.1mdvmes5.2.x86_64.rpm
d1149e50d5329f8cd40859b1f7677d64
mes5/x86_64/firefox-tr-10.0.4-0.1mdvmes5.2.x86_64.rpm
85c659d6d503f4a18d60b2f3a68203ed
mes5/x86_64/firefox-uk-10.0.4-0.1mdvmes5.2.x86_64.rpm
3a5a6799cce49930f7263ffebfa89b60
mes5/x86_64/firefox-zh_CN-10.0.4-0.1mdvmes5.2.x86_64.rpm
3e000a956e364becab89006a451862c7
mes5/x86_64/firefox-zh_TW-10.0.4-0.1mdvmes5.2.x86_64.rpm
9574c63a42f95318a1d93f756612396e
mes5/x86_64/icedtea-web-1.1.5-0.1mdvmes5.2.x86_64.rpm
aecf70a7766eaf61e4ed42d059144569
mes5/x86_64/icedtea-web-javadoc-1.1.5-0.1mdvmes5.2.x86_64.rpm
3ef5b5b1a5618061c3f3a52c2548a3ca mes5/x86_64/lib64iw29-29-3.1mnb2.x86_64.rpm
b1654a4badb379c481291e538c96f4b6
mes5/x86_64/lib64iw29-devel-29-3.1mnb2.x86_64.rpm
2743fbc604ba116cf998077158593393
mes5/x86_64/lib64vpx0-0.9.7-0.2mdvmes5.2.x86_64.rpm
5250078fd1ecbcde1a8ee22876d4ead2
mes5/x86_64/lib64vpx-devel-0.9.7-0.2mdvmes5.2.x86_64.rpm
806d4a550abfefc37b2b9c0dee9f5031
mes5/x86_64/lib64xulrunner10.0.4-10.0.4-0.1mdvmes5.2.x86_64.rpm
5a6fe261614c225ecc006d6660bcd4ad
mes5/x86_64/lib64xulrunner-devel-10.0.4-0.1mdvmes5.2.x86_64.rpm
1d04326581fe942201dd7cb415e4188d
mes5/x86_64/libvpx-utils-0.9.7-0.2mdvmes5.2.x86_64.rpm
123d68df17b3c0e3bc226cb989d82e07
mes5/x86_64/python-cython-0.15-0.1mdvmes5.2.x86_64.rpm
758a5f09cce66dabd0991668da246d34
mes5/x86_64/wireless-tools-29-3.1mnb2.x86_64.rpm
9a6854a6f373d31db322ebe645900c54
mes5/x86_64/xulrunner-10.0.4-0.1mdvmes5.2.x86_64.rpm
fa368599864fdbdb114a4b16eb1873e3
mes5/x86_64/yasm-1.1.0-0.1mdvmes5.2.x86_64.rpm
3c64b6f6f8477bba975279301717d662
mes5/x86_64/yasm-devel-1.1.0-0.1mdvmes5.2.x86_64.rpm
7e03d96c771110bc6e686a33bb93c14b
mes5/x86_64/yasm-python-1.1.0-0.1mdvmes5.2.x86_64.rpm
cab2fb3795af9ee2b730ab4609ff5d38
mes5/SRPMS/firefox-10.0.4-0.1mdvmes5.2.src.rpm
bd3fbc028e30d73714793c5fb08f8609
mes5/SRPMS/firefox-l10n-10.0.4-0.1mdvmes5.2.src.rpm
2522a91d944b8156c3ddb82fccc25539
mes5/SRPMS/icedtea-web-1.1.5-0.1mdvmes5.2.src.rpm
78481843cb9aa5279b0975d75242e809 mes5/SRPMS/libvpx-0.9.7-0.2mdvmes5.2.src.rpm
6d47b4c4cd98073ed9435bae941dd665
mes5/SRPMS/python-cython-0.15-0.1mdvmes5.2.src.rpm
34c2cc5a16145dfcc969c0224bffdae4 mes5/SRPMS/wireless-tools-29-3.1mnb2.src.rpm
e4f47ab68daf56f0a376ed5de58219cb
mes5/SRPMS/xulrunner-10.0.4-0.1mdvmes5.2.src.rpm
38698452301ff1bd0eb5fb221a9d35d2 mes5/SRPMS/yasm-1.1.0-0.1mdvmes5.2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFPvh54mqjQ0CJFipgRAh1pAKCIKPTFajKHsqpt7dKyLmwTGSeHNgCg6w+I
ljs6Z5jE2CsfxsacA9/iaQQ=
=S92/
-----END PGP SIGNATURE-----