[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ MDVSA-2012:163 ] firefox



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:163
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : firefox
 Date    : October 11, 2012
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Security issues were identified and fixed in mozilla firefox:
 
 Mozilla developers identified and fixed several memory safety
 bugs in the browser engine used in Firefox and other Mozilla-based
 products. Some of these bugs showed evidence of memory corruption under
 certain circumstances, and we presume that with enough effort at least
 some of these could be exploited to run arbitrary code (CVE-2012-3982).
 
 Mozilla developer Johnny Stenback discovered that several methods
 of a feature used for testing (DOMWindowUtils) are not protected by
 existing security checks, allowing these methods to be called through
 script by web pages. This was addressed by adding the existing security
 checks to these methods (CVE-2012-3986).
 
 Security researcher Soroush Dalili reported that a combination of
 invoking full screen mode and navigating backwards in history could,
 in some circumstances, cause a hang or crash due to a timing dependent
 use-after-free pointer reference. This crash may be potentially
 exploitable (CVE-2012-3988).
 
 Mozilla community member Alice White reported that when the GetProperty
 function is invoked through JSAPI, security checking can be bypassed
 when getting cross-origin properties. This potentially allowed for
 arbitrary code execution (CVE-2012-3991).
 
 Security researcher Mariusz Mlynski reported that the location property
 can be accessed by binary plugins through top.location and top can be
 shadowed by Object.defineProperty as well. This can allow for possible
 cross-site scripting (XSS) attacks through plugins (CVE-2012-3994).
 
 Security researcher Mariusz Mlynski reported that when InstallTrigger
 fails, it throws an error wrapped in a Chrome Object Wrapper (COW)
 that fails to specify exposed properties. These can then be added
 to the resulting object by an attacker, allowing access to chrome
 privileged functions through script.
 
 While investigating this issue, Mozilla security researcher
 moz_bug_r_a4 found that COW did not disallow accessing of properties
 from a standard prototype in some situations, even when the original
 issue had been fixed (CVE-2012-3993, CVE-2012-4184).
 
 Security researcher Mariusz Mlynski reported an issue with spoofing of
 the location property. In this issue, writes to location.hash can be
 used in concert with scripted history navigation to cause a specific
 website to be loaded into the history object. The baseURI can then
 be changed to this stored site, allowing an attacker to inject a
 script or intercept posted data posted to a location specified with
 a relative path (CVE-2012-3992).
 
 Security researcher Abhishek Arya (Inferno) of the Google Chrome
 Security Team discovered a series of use-after-free, buffer overflow,
 and out of bounds read issues using the Address Sanitizer tool in
 shipped software. These issues are potentially exploitable, allowing
 for remote code execution. We would also like to thank Abhishek
 for reporting two additional use-after-free flaws introduced
 during Firefox 16 development and fixed before general release
 (CVE-2012-3995, CVE-2012-4179, CVE-2012-4180, CVE-2012-4181,
 CVE-2012-4182, CVE-2012-4183).
 
 Security researcher Atte Kettunen from OUSPG reported several heap
 memory corruption issues found using the Address Sanitizer tool. These
 issues are potentially exploitable, allowing for remote code execution
 (CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188).
 
 Security researcher miaubiz used the Address Sanitizer tool to discover
 a use-after-free in the IME State Manager code. This could lead to
 a potentially exploitable crash (CVE-2012-3990).
 
 The mozilla firefox packages has been upgraded to the latest version
 which is unaffected by these security flaws.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990
 http://www.mozilla.org/security/announce/2012/mfsa2012-74.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-77.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-79.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-81.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-82.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-83.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-84.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-85.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-86.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-87.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 18b4958fa1973f702cbed84b9f20159c  
mes5/i586/firefox-10.0.8-0.1mdvmes5.2.i586.rpm
 2647f6b7ad8f48070a427583916ad32a  
mes5/i586/firefox-af-10.0.8-0.1mdvmes5.2.i586.rpm
 f4b347adeb27ed23b86d5db6a206a3af  
mes5/i586/firefox-ar-10.0.8-0.1mdvmes5.2.i586.rpm
 586df4b276be9436d53ef9fbd5fa5ed5  
mes5/i586/firefox-be-10.0.8-0.1mdvmes5.2.i586.rpm
 626cbcf39f47055c0699ec84788818e3  
mes5/i586/firefox-bg-10.0.8-0.1mdvmes5.2.i586.rpm
 0daca37b722b654b84d991d607edd450  
mes5/i586/firefox-bn-10.0.8-0.1mdvmes5.2.i586.rpm
 dc8815fb6be57e3dcc1d4b9882835d9b  
mes5/i586/firefox-ca-10.0.8-0.1mdvmes5.2.i586.rpm
 f1aed3384b2496bf7db1dc1ed93dbf39  
mes5/i586/firefox-cs-10.0.8-0.1mdvmes5.2.i586.rpm
 424f954bd6cf5201bc18a8c14d891964  
mes5/i586/firefox-cy-10.0.8-0.1mdvmes5.2.i586.rpm
 e404fd8b2e77ddfc3e0cec73ce66558b  
mes5/i586/firefox-da-10.0.8-0.1mdvmes5.2.i586.rpm
 d6df89a166f04e7f0d8d5092caeb416e  
mes5/i586/firefox-de-10.0.8-0.1mdvmes5.2.i586.rpm
 564cc55029db0f3abd6477b784d545be  
mes5/i586/firefox-devel-10.0.8-0.1mdvmes5.2.i586.rpm
 93ab5d7347369e61ccacfe39430127d9  
mes5/i586/firefox-el-10.0.8-0.1mdvmes5.2.i586.rpm
 26045064a52588b84caeea6630b40ea6  
mes5/i586/firefox-en_GB-10.0.8-0.1mdvmes5.2.i586.rpm
 911d31127d57ed6fc43e1c997d4e012f  
mes5/i586/firefox-eo-10.0.8-0.1mdvmes5.2.i586.rpm
 247336e3fa7a13b944d7b97dc00ec234  
mes5/i586/firefox-es_AR-10.0.8-0.1mdvmes5.2.i586.rpm
 df718458acb2846aa3e4c2db500d61b5  
mes5/i586/firefox-es_ES-10.0.8-0.1mdvmes5.2.i586.rpm
 fb300c3216dfbc1de89374965cfc32a6  
mes5/i586/firefox-et-10.0.8-0.1mdvmes5.2.i586.rpm
 51f9c5d47f6f88b4ebf1abf565de599b  
mes5/i586/firefox-eu-10.0.8-0.1mdvmes5.2.i586.rpm
 16b2ade910ccc3a0d5b7fff3c714b9e0  
mes5/i586/firefox-fi-10.0.8-0.1mdvmes5.2.i586.rpm
 53ccc7e83d96fd9c93de5c3c604f6bb0  
mes5/i586/firefox-fr-10.0.8-0.1mdvmes5.2.i586.rpm
 f5a90820225a51076c77ee3b42696e47  
mes5/i586/firefox-fy-10.0.8-0.1mdvmes5.2.i586.rpm
 bef5299da948e97be351deafe721370e  
mes5/i586/firefox-ga_IE-10.0.8-0.1mdvmes5.2.i586.rpm
 5438439ac7afa1a625700d6eff790acb  
mes5/i586/firefox-gl-10.0.8-0.1mdvmes5.2.i586.rpm
 7a75e4a2f2d496a435f3d264cf3302ab  
mes5/i586/firefox-gu_IN-10.0.8-0.1mdvmes5.2.i586.rpm
 c54843a324535ae7de0af6b5432448a0  
mes5/i586/firefox-he-10.0.8-0.1mdvmes5.2.i586.rpm
 22dad8f088aa2790db88c7cdcd6c17e3  
mes5/i586/firefox-hi-10.0.8-0.1mdvmes5.2.i586.rpm
 71b0341b69f1ba7b062df4b8831b07cf  
mes5/i586/firefox-hu-10.0.8-0.1mdvmes5.2.i586.rpm
 54a578b6c9bdffac785c42e2fcbe0752  
mes5/i586/firefox-id-10.0.8-0.1mdvmes5.2.i586.rpm
 c7bac88f81d74a3e6bb84d6e53530114  
mes5/i586/firefox-is-10.0.8-0.1mdvmes5.2.i586.rpm
 6b0a05fe207de1cb70ede2bdc08a4fe6  
mes5/i586/firefox-it-10.0.8-0.1mdvmes5.2.i586.rpm
 2a5f7c384e6e8b604960e371ecc0994d  
mes5/i586/firefox-ja-10.0.8-0.1mdvmes5.2.i586.rpm
 c1a4d25f413532867f88ce512d8518cf  
mes5/i586/firefox-ka-10.0.8-0.1mdvmes5.2.i586.rpm
 92cb841c8a4ff36d466486529e52e9b0  
mes5/i586/firefox-kn-10.0.8-0.1mdvmes5.2.i586.rpm
 7e7e48d65c67e701fe7e9520cef5b879  
mes5/i586/firefox-ko-10.0.8-0.1mdvmes5.2.i586.rpm
 00e266a86115a996be3729110f2c55fb  
mes5/i586/firefox-ku-10.0.8-0.1mdvmes5.2.i586.rpm
 8204ae0e260820b38ab41512040e74e9  
mes5/i586/firefox-lt-10.0.8-0.1mdvmes5.2.i586.rpm
 277e5bcebb58210f58eca0260c9f0d7d  
mes5/i586/firefox-lv-10.0.8-0.1mdvmes5.2.i586.rpm
 e8875c4546bbc9ea23412bfb6d0d6d05  
mes5/i586/firefox-mk-10.0.8-0.1mdvmes5.2.i586.rpm
 b4dc97b4578e0f5867d5e1d631a6935f  
mes5/i586/firefox-mr-10.0.8-0.1mdvmes5.2.i586.rpm
 a908016d1d790cc3730de8dd43d752df  
mes5/i586/firefox-nb_NO-10.0.8-0.1mdvmes5.2.i586.rpm
 3db355e81b5d5a08cf40fec9516095dc  
mes5/i586/firefox-nl-10.0.8-0.1mdvmes5.2.i586.rpm
 f4b80bc1df63cc65600374da4d725b97  
mes5/i586/firefox-nn_NO-10.0.8-0.1mdvmes5.2.i586.rpm
 73a717cb9578ddf6da09419dcfd9b93e  
mes5/i586/firefox-oc-10.0.8-0.1mdvmes5.2.i586.rpm
 570422becfa4a851c6e95040f2a5779b  
mes5/i586/firefox-pa_IN-10.0.8-0.1mdvmes5.2.i586.rpm
 f8c0bdc02309778de67ca878d60a557d  
mes5/i586/firefox-pl-10.0.8-0.1mdvmes5.2.i586.rpm
 077f52791e93c41ba5db8353dd37dfe6  
mes5/i586/firefox-pt_BR-10.0.8-0.1mdvmes5.2.i586.rpm
 e68c00ba970f2a3eb07eae58a90d1513  
mes5/i586/firefox-pt_PT-10.0.8-0.1mdvmes5.2.i586.rpm
 3b72179b06cb64f42658dee91eaf8340  
mes5/i586/firefox-ro-10.0.8-0.1mdvmes5.2.i586.rpm
 c9aa2ea8cc85c88f7e5e56e249c7e7a6  
mes5/i586/firefox-ru-10.0.8-0.1mdvmes5.2.i586.rpm
 fab410d8b6655dcdfe01deab8b67a64f  
mes5/i586/firefox-si-10.0.8-0.1mdvmes5.2.i586.rpm
 eb46c19ebc307ccce7e91e4d2f3c133b  
mes5/i586/firefox-sk-10.0.8-0.1mdvmes5.2.i586.rpm
 18001364ee5341328bb68a49cce08b95  
mes5/i586/firefox-sl-10.0.8-0.1mdvmes5.2.i586.rpm
 ff85462fd1eb970303b0eeeaf063157f  
mes5/i586/firefox-sq-10.0.8-0.1mdvmes5.2.i586.rpm
 c3b247291050d5ca28693e42a95a467e  
mes5/i586/firefox-sr-10.0.8-0.1mdvmes5.2.i586.rpm
 2df9b8518aa5189d18bc67f781e2583b  
mes5/i586/firefox-sv_SE-10.0.8-0.1mdvmes5.2.i586.rpm
 84774cda3b0c0f6c9f761c4e7798c980  
mes5/i586/firefox-te-10.0.8-0.1mdvmes5.2.i586.rpm
 523a30b0824d0fa8549c28099a398aa9  
mes5/i586/firefox-th-10.0.8-0.1mdvmes5.2.i586.rpm
 85cf36694236dc9812c642e6835968de  
mes5/i586/firefox-tr-10.0.8-0.1mdvmes5.2.i586.rpm
 57b2c12673884904e041d881d7013f82  
mes5/i586/firefox-uk-10.0.8-0.1mdvmes5.2.i586.rpm
 4723206853faa1d6eee539649665d213  
mes5/i586/firefox-zh_CN-10.0.8-0.1mdvmes5.2.i586.rpm
 bcdc27fcc1ebdfa52c6ff340b35198b8  
mes5/i586/firefox-zh_TW-10.0.8-0.1mdvmes5.2.i586.rpm
 a90b6acf7e9ae7cb41cd9f0e8f65a35f  
mes5/i586/libxulrunner10.0.8-10.0.8-0.1mdvmes5.2.i586.rpm
 cf53e5f6eb711b41791ca45834d8409f  
mes5/i586/libxulrunner-devel-10.0.8-0.1mdvmes5.2.i586.rpm
 b8ffef485233d97bdb77f18f022aa9e8  
mes5/i586/xulrunner-10.0.8-0.1mdvmes5.2.i586.rpm 
 6b5849f56718fddb19c22391919c6caf  
mes5/SRPMS/firefox-10.0.8-0.1mdvmes5.2.src.rpm
 5f9f856717ec26737700be8ac851b2aa  
mes5/SRPMS/firefox-l10n-10.0.8-0.1mdvmes5.2.src.rpm
 849d8b54de62cd1716ceeef8c36ee0e7  
mes5/SRPMS/xulrunner-10.0.8-0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 0883a9f9de1db56f55296d7b8905c3d9  
mes5/x86_64/firefox-10.0.8-0.1mdvmes5.2.x86_64.rpm
 728177ae72a24b5631edae618bf1f29d  
mes5/x86_64/firefox-af-10.0.8-0.1mdvmes5.2.x86_64.rpm
 80d65f878a19d6af07ea2090c78fb609  
mes5/x86_64/firefox-ar-10.0.8-0.1mdvmes5.2.x86_64.rpm
 8f55497903c4db05888415acc1aba830  
mes5/x86_64/firefox-be-10.0.8-0.1mdvmes5.2.x86_64.rpm
 3eece7dc190cfbf26514b7216afa81b8  
mes5/x86_64/firefox-bg-10.0.8-0.1mdvmes5.2.x86_64.rpm
 c3d70e1661ea6532013d94b7a8ae5b33  
mes5/x86_64/firefox-bn-10.0.8-0.1mdvmes5.2.x86_64.rpm
 de69ce78464063544a83d21bd58ad349  
mes5/x86_64/firefox-ca-10.0.8-0.1mdvmes5.2.x86_64.rpm
 6980ac75c0e8a332401cbe65053c4bb3  
mes5/x86_64/firefox-cs-10.0.8-0.1mdvmes5.2.x86_64.rpm
 0904a7326bb39230f441bbed04bb04a0  
mes5/x86_64/firefox-cy-10.0.8-0.1mdvmes5.2.x86_64.rpm
 e6443a05c458defa2dd5615a7efe58c3  
mes5/x86_64/firefox-da-10.0.8-0.1mdvmes5.2.x86_64.rpm
 aa6c761b14752eb1e77199cd6e4f4db7  
mes5/x86_64/firefox-de-10.0.8-0.1mdvmes5.2.x86_64.rpm
 a86aa716be097d55f0b377729d03e2d1  
mes5/x86_64/firefox-devel-10.0.8-0.1mdvmes5.2.x86_64.rpm
 5b57f19ff04195a6ed7db74d4d4b0c97  
mes5/x86_64/firefox-el-10.0.8-0.1mdvmes5.2.x86_64.rpm
 c52cbbbb3dce82117db33db89a25b7e3  
mes5/x86_64/firefox-en_GB-10.0.8-0.1mdvmes5.2.x86_64.rpm
 fbfe8900e210c473f6f2a012ef939c96  
mes5/x86_64/firefox-eo-10.0.8-0.1mdvmes5.2.x86_64.rpm
 561ae14e68dbaec1d0c156c8006fefec  
mes5/x86_64/firefox-es_AR-10.0.8-0.1mdvmes5.2.x86_64.rpm
 cb295d044f7c33152fc6acf6dbef0f20  
mes5/x86_64/firefox-es_ES-10.0.8-0.1mdvmes5.2.x86_64.rpm
 070c54ec44bdd92ce15e0dd4a8f8d632  
mes5/x86_64/firefox-et-10.0.8-0.1mdvmes5.2.x86_64.rpm
 0bbeb506fa06563d4342b961a94e46dd  
mes5/x86_64/firefox-eu-10.0.8-0.1mdvmes5.2.x86_64.rpm
 ba9089fae63396324c43e1e39735c01a  
mes5/x86_64/firefox-fi-10.0.8-0.1mdvmes5.2.x86_64.rpm
 1460f5530b00b2885cccf72a823c5a46  
mes5/x86_64/firefox-fr-10.0.8-0.1mdvmes5.2.x86_64.rpm
 ad94002972b598af90e58aba84f70855  
mes5/x86_64/firefox-fy-10.0.8-0.1mdvmes5.2.x86_64.rpm
 cdbc3d8e32ec144db1812f5a2aeab5bb  
mes5/x86_64/firefox-ga_IE-10.0.8-0.1mdvmes5.2.x86_64.rpm
 056b5b3b7a8cacc319041c0012e7ad4b  
mes5/x86_64/firefox-gl-10.0.8-0.1mdvmes5.2.x86_64.rpm
 cf0d943ecfdcd674f92c1395a28a5cbe  
mes5/x86_64/firefox-gu_IN-10.0.8-0.1mdvmes5.2.x86_64.rpm
 2ca267ddb695bef714352bb0e57feb27  
mes5/x86_64/firefox-he-10.0.8-0.1mdvmes5.2.x86_64.rpm
 e016aa204927dfa1011ea450a5e4feaa  
mes5/x86_64/firefox-hi-10.0.8-0.1mdvmes5.2.x86_64.rpm
 551681f2abc572eaa256f64237f7c677  
mes5/x86_64/firefox-hu-10.0.8-0.1mdvmes5.2.x86_64.rpm
 245f7b0a90d9fe5dd9b0c706cda6eb2f  
mes5/x86_64/firefox-id-10.0.8-0.1mdvmes5.2.x86_64.rpm
 77bf660ff93973d6090be707d4e09b28  
mes5/x86_64/firefox-is-10.0.8-0.1mdvmes5.2.x86_64.rpm
 150bdd42557bcbdf7022d13976d38b35  
mes5/x86_64/firefox-it-10.0.8-0.1mdvmes5.2.x86_64.rpm
 517e28cc738785c4402f4d0afe7203a9  
mes5/x86_64/firefox-ja-10.0.8-0.1mdvmes5.2.x86_64.rpm
 6438f7ba42be63c5efc9d0e1e8bde089  
mes5/x86_64/firefox-ka-10.0.8-0.1mdvmes5.2.x86_64.rpm
 795974bc965caaba283f8e78d3722f41  
mes5/x86_64/firefox-kn-10.0.8-0.1mdvmes5.2.x86_64.rpm
 0b1186e2a195bcd9074031c4bbce79f4  
mes5/x86_64/firefox-ko-10.0.8-0.1mdvmes5.2.x86_64.rpm
 fd371a84eddf0bd6a11b9229304967cd  
mes5/x86_64/firefox-ku-10.0.8-0.1mdvmes5.2.x86_64.rpm
 4865d702388379da81085e5ba1f5fd5a  
mes5/x86_64/firefox-lt-10.0.8-0.1mdvmes5.2.x86_64.rpm
 57f79f47919b7cae7180a43d809944f6  
mes5/x86_64/firefox-lv-10.0.8-0.1mdvmes5.2.x86_64.rpm
 d4ce166e82f27b41846f2a3404bd407b  
mes5/x86_64/firefox-mk-10.0.8-0.1mdvmes5.2.x86_64.rpm
 357082d898ae70e8d2abec9da7f6d3ec  
mes5/x86_64/firefox-mr-10.0.8-0.1mdvmes5.2.x86_64.rpm
 0e61d6a2f26dd11fc3c531e044a21402  
mes5/x86_64/firefox-nb_NO-10.0.8-0.1mdvmes5.2.x86_64.rpm
 5c39340673283f52a2c268207a221fa4  
mes5/x86_64/firefox-nl-10.0.8-0.1mdvmes5.2.x86_64.rpm
 e8989e4b71f9e761db1a5eb2ab5ba772  
mes5/x86_64/firefox-nn_NO-10.0.8-0.1mdvmes5.2.x86_64.rpm
 0cdf48db846c7744e37cedc1b562806d  
mes5/x86_64/firefox-oc-10.0.8-0.1mdvmes5.2.x86_64.rpm
 96da7ef1509716a8ecd89398de5c7cc8  
mes5/x86_64/firefox-pa_IN-10.0.8-0.1mdvmes5.2.x86_64.rpm
 ba8ee24d071fb52cea5c1b2a550aa70b  
mes5/x86_64/firefox-pl-10.0.8-0.1mdvmes5.2.x86_64.rpm
 e692fc3231c443faf2e17f79333b735c  
mes5/x86_64/firefox-pt_BR-10.0.8-0.1mdvmes5.2.x86_64.rpm
 afa8d2ee0e1af4f066a48fc39149110e  
mes5/x86_64/firefox-pt_PT-10.0.8-0.1mdvmes5.2.x86_64.rpm
 f4ad6008159c2927efe3b19fd4512315  
mes5/x86_64/firefox-ro-10.0.8-0.1mdvmes5.2.x86_64.rpm
 54d3c7b448c3c25ab861873d936987b7  
mes5/x86_64/firefox-ru-10.0.8-0.1mdvmes5.2.x86_64.rpm
 c905a26289fb94cc2dafb606f57f890e  
mes5/x86_64/firefox-si-10.0.8-0.1mdvmes5.2.x86_64.rpm
 32d9b6865b5b6d558ab97b36d8719d45  
mes5/x86_64/firefox-sk-10.0.8-0.1mdvmes5.2.x86_64.rpm
 232ad0abe4270616befb65f0b2004482  
mes5/x86_64/firefox-sl-10.0.8-0.1mdvmes5.2.x86_64.rpm
 8ea61f2759c003713f2b9e504260d981  
mes5/x86_64/firefox-sq-10.0.8-0.1mdvmes5.2.x86_64.rpm
 8f4fdbd663bd27c4d5ab42411347a4a4  
mes5/x86_64/firefox-sr-10.0.8-0.1mdvmes5.2.x86_64.rpm
 f83702a0a59009633d10251c19c3d926  
mes5/x86_64/firefox-sv_SE-10.0.8-0.1mdvmes5.2.x86_64.rpm
 3805edda674577f2e609f889ec57068b  
mes5/x86_64/firefox-te-10.0.8-0.1mdvmes5.2.x86_64.rpm
 981974d5861ece6999832b94026288b5  
mes5/x86_64/firefox-th-10.0.8-0.1mdvmes5.2.x86_64.rpm
 799e5c4479f9e4078395f17255c9d395  
mes5/x86_64/firefox-tr-10.0.8-0.1mdvmes5.2.x86_64.rpm
 4ddfcf42ff77710b44ad927c8e165a04  
mes5/x86_64/firefox-uk-10.0.8-0.1mdvmes5.2.x86_64.rpm
 e9873026b2a5731c3f02e3bd6207cc61  
mes5/x86_64/firefox-zh_CN-10.0.8-0.1mdvmes5.2.x86_64.rpm
 4e80e8eae6e165bd3b9de77f56355e18  
mes5/x86_64/firefox-zh_TW-10.0.8-0.1mdvmes5.2.x86_64.rpm
 7399b9d40787e878941d927b2099cfd4  
mes5/x86_64/lib64xulrunner10.0.8-10.0.8-0.1mdvmes5.2.x86_64.rpm
 350953ef50ace31a4bdf0aac88ef26f9  
mes5/x86_64/lib64xulrunner-devel-10.0.8-0.1mdvmes5.2.x86_64.rpm
 3b728cc723a0d37366f7efb1055f68a1  
mes5/x86_64/xulrunner-10.0.8-0.1mdvmes5.2.x86_64.rpm 
 6b5849f56718fddb19c22391919c6caf  
mes5/SRPMS/firefox-10.0.8-0.1mdvmes5.2.src.rpm
 5f9f856717ec26737700be8ac851b2aa  
mes5/SRPMS/firefox-l10n-10.0.8-0.1mdvmes5.2.src.rpm
 849d8b54de62cd1716ceeef8c36ee0e7  
mes5/SRPMS/xulrunner-10.0.8-0.1mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQdp/zmqjQ0CJFipgRAoLvAJ418KmxlFghV0dHucmHAinnbYB7+wCg43rk
+dRrxPXJ7+lTD3pZcdL5gu0=
=dLD8
-----END PGP SIGNATURE-----