[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] [ MDVSA-2012:145 ] firefox
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] [ MDVSA-2012:145 ] firefox
- From: security@xxxxxxxxxxxx
- Date: Wed, 29 Aug 2012 12:53:01 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2012:145
http://www.mandriva.com/security/
_______________________________________________________________________
Package : firefox
Date : August 29, 2012
Affected: 2011.
_______________________________________________________________________
Problem Description:
Security issues were identified and fixed in mozilla firefox:
Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code (CVE-2012-1971).
Security researcher Abhishek Arya (Inferno) of Google Chrome Security
Team discovered a series of use-after-free issues using the Address
Sanitizer tool. Many of these issues are potentially exploitable,
allowing for remote code execution (CVE-2012-1972, CVE-2012-1973,
CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956,
CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,
CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964).
Security researcher Mariusz Mlynski reported that it is possible to
shadow the location object using Object.defineProperty. This could
be used to confuse the current location to plugins, allowing for
possible cross-site scripting (XSS) attacks (CVE-2012-1956).
Security researcher Mariusz Mlynski reported that when a page opens a
new tab, a subsequent window can then be opened that can be navigated
to about:newtab, a chrome privileged page. Once about:newtab is loaded,
the special context can potentially be used to escalate privilege,
allowing for arbitrary code execution on the local system in a
maliciously crafted attack (CVE-2012-3965).
Security researcher Frederic Hoguin reported two related issues with
the decoding of bitmap (.BMP) format images embedded in icon (.ICO)
format files. When processing a negative height header value for
the bitmap image, a memory corruption can be induced, allowing an
attacker to write random memory and cause a crash. This crash may be
potentially exploitable (CVE-2012-3966).
Security researcher miaubiz used the Address Sanitizer tool to
discover two WebGL issues. The first issue is a use-after-free when
WebGL shaders are called after being destroyed. The second issue
exposes a problem with Mesa drivers on Linux, leading to a potentially
exploitable crash (CVE-2012-3968, CVE-2012-3967).
Security researcher Arthur Gerkis used the Address Sanitizer
tool to find two issues involving Scalable Vector Graphics (SVG)
files. The first issue is a buffer overflow in Gecko's SVG filter
code when the sum of two values is too large to be stored as a
signed 32-bit integer, causing the function to write past the end
of an array. The second issue is a use-after-free when an element
with a requiredFeatures attribute is moved between documents. In that
situation, the internal representation of the requiredFeatures value
could be freed prematurely. Both issues are potentially exploitable
(CVE-2012-3969, CVE-2012-3970).
Using the Address Sanitizer tool, Mozilla security researcher Christoph
Diehl discovered two memory corruption issues involving the Graphite
2 library used in Mozilla products. Both of these issues can cause
a potentially exploitable crash. These problems were fixed in the
Graphite 2 library, which has been updated for Mozilla products
(CVE-2012-3971).
Security research Nicolas Gregoire used the Address Sanitizer tool to
discover an out-of-bounds read in the format-number feature of XSLT,
which can cause inaccurate formatting of numbers and information
leakage. This is not directly exploitable (CVE-2012-3972).
Mozilla security researcher Mark Goodwin discovered an issue with the
Firefox developer tools' debugger. If remote debugging is disabled,
but the experimental HTTPMonitor extension has been installed and
enabled, a remote user can connect to and use the remote debugging
service through the port used by HTTPMonitor. A remote-enabled flag
has been added to resolve this problem and close the port unless
debugging is explicitly enabled (CVE-2012-3973).
Security researcher Masato Kinugawa reported that if a crafted
executable is placed in the root partition on a Windows file system,
the Firefox and Thunderbird installer will launch this program after
a standard installation instead of Firefox or Thunderbird, running
this program with the user's privileges (CVE-2012-3974).
Security researcher vsemozhetbyt reported that when the DOMParser is
used to parse text/html data in a Firefox extension, linked resources
within this HTML data will be loaded. If the data being parsed in
the extension is untrusted, it could lead to information leakage and
can potentially be combined with other attacks to become exploitable
(CVE-2012-3975).
Security researcher Mark Poticha reported an issue where incorrect SSL
certificate information can be displayed on the addressbar, showing
the SSL data for a previous site while another has been loaded. This
is caused by two onLocationChange events being fired out of the
expected order, leading to the displayed certificate data to not be
updated. This can be used for phishing attacks by allowing the user
to input form or other data on a newer, attacking, site while the
credentials of an older site appear on the addressbar (CVE-2012-3976).
Mozilla security researcher moz_bug_r_a4 reported that certain
security checks in the location object can be bypassed if chrome code
is called content in a specific manner. This allowed for the loading
of restricted content. This can be combined with other issues to
become potentially exploitable (CVE-2012-3978).
Security researcher Colby Russell discovered that eval in the web
console can execute injected code with chrome privileges, leading to
the running of malicious code in a privileged context. This allows
for arbitrary code execution through a malicious web page if the web
console is invoked by the user (CVE-2012-3980).
The mozilla firefox packages has been upgraded to the latest versions
which is unaffected by these security flaws.
Additionally the sqlite3 packages has been upgraded to the 3.7.13
version as firefox 15.0 requires the 3.7.12.1+ version.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1956
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1971
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3965
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3971
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3973
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3974
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980
http://www.mozilla.org/security/announce/2012/mfsa2012-57.html
http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
http://www.mozilla.org/security/announce/2012/mfsa2012-59.html
http://www.mozilla.org/security/announce/2012/mfsa2012-60.html
http://www.mozilla.org/security/announce/2012/mfsa2012-61.html
http://www.mozilla.org/security/announce/2012/mfsa2012-62.html
http://www.mozilla.org/security/announce/2012/mfsa2012-63.html
http://www.mozilla.org/security/announce/2012/mfsa2012-64.html
http://www.mozilla.org/security/announce/2012/mfsa2012-65.html
http://www.mozilla.org/security/announce/2012/mfsa2012-66.html
http://www.mozilla.org/security/announce/2012/mfsa2012-67.html
http://www.mozilla.org/security/announce/2012/mfsa2012-68.html
http://www.mozilla.org/security/announce/2012/mfsa2012-69.html
http://www.mozilla.org/security/announce/2012/mfsa2012-70.html
http://www.mozilla.org/security/announce/2012/mfsa2012-72.html
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2011:
1f222b3e99fe8ac26b53c9cfcacfae67 2011/i586/firefox-15.0-0.1-mdv2011.0.i586.rpm
830afbabc32e3e7f2e2e35792e189ee9
2011/i586/firefox-af-15.0-0.1-mdv2011.0.noarch.rpm
21c1c8a7d371f6b5c82d3575fa18b7cc
2011/i586/firefox-ar-15.0-0.1-mdv2011.0.noarch.rpm
4f9d82121d5f4b061219bac93fb9d695
2011/i586/firefox-ast-15.0-0.1-mdv2011.0.noarch.rpm
73482d144b27c260c1ee3497683a1e8e
2011/i586/firefox-be-15.0-0.1-mdv2011.0.noarch.rpm
ae92eabc7ea75a2e4b793b3204dda1ab
2011/i586/firefox-bg-15.0-0.1-mdv2011.0.noarch.rpm
4b533c2dcfaf12a30c42c96cdda56ad2
2011/i586/firefox-bn_BD-15.0-0.1-mdv2011.0.noarch.rpm
c6f7c2cb3c4a2574c2e1f3597cb81885
2011/i586/firefox-bn_IN-15.0-0.1-mdv2011.0.noarch.rpm
22f2bdf23712a350fa75fae37a5cfad6
2011/i586/firefox-br-15.0-0.1-mdv2011.0.noarch.rpm
4778689a922ae7937a8a2b1472f24b48
2011/i586/firefox-bs-15.0-0.1-mdv2011.0.noarch.rpm
3f2c33f4fa565425c2c1a119081793f6
2011/i586/firefox-ca-15.0-0.1-mdv2011.0.noarch.rpm
ebde187076855de220ebddf95ce90bfb
2011/i586/firefox-cs-15.0-0.1-mdv2011.0.noarch.rpm
ae6933efc19d257517a2c7577052b2b2
2011/i586/firefox-cy-15.0-0.1-mdv2011.0.noarch.rpm
84a6b6ab34f5fd1270fbef5fd129c2d9
2011/i586/firefox-da-15.0-0.1-mdv2011.0.noarch.rpm
2632f7ef74eea38e36017dfa46763bc6
2011/i586/firefox-de-15.0-0.1-mdv2011.0.noarch.rpm
439d6472581e13385eb3e131f91ca08f
2011/i586/firefox-devel-15.0-0.1-mdv2011.0.i586.rpm
59ff02012cd9ec45da32bdbad4be4457
2011/i586/firefox-el-15.0-0.1-mdv2011.0.noarch.rpm
49b5b60cbfde698001c677f4a8dd08a5
2011/i586/firefox-en_GB-15.0-0.1-mdv2011.0.noarch.rpm
3c26aa80a987fa35af688f443b40cce8
2011/i586/firefox-en_ZA-15.0-0.1-mdv2011.0.noarch.rpm
b00a4254dd2c1a587757c33663432c69
2011/i586/firefox-eo-15.0-0.1-mdv2011.0.noarch.rpm
6c371889cc0decb90d20c348f1807ff7
2011/i586/firefox-es_AR-15.0-0.1-mdv2011.0.noarch.rpm
f6884b390f3729b5ef8f64ac2aed1c1c
2011/i586/firefox-es_CL-15.0-0.1-mdv2011.0.noarch.rpm
3ecb605e1778ad035a077bca4bfea23e
2011/i586/firefox-es_ES-15.0-0.1-mdv2011.0.noarch.rpm
bd1ac623a9102bf438aea4832897ee15
2011/i586/firefox-es_MX-15.0-0.1-mdv2011.0.noarch.rpm
166bf576807f4e7f1f63379cfa8727f1
2011/i586/firefox-et-15.0-0.1-mdv2011.0.noarch.rpm
a0086739ae734b1766585d4f34ea13b0
2011/i586/firefox-eu-15.0-0.1-mdv2011.0.noarch.rpm
c0ec3a965a4a0bf0a3d3d7439cdb87b7
2011/i586/firefox-fa-15.0-0.1-mdv2011.0.noarch.rpm
41320e3a963433760753ca738eeb86b4
2011/i586/firefox-fi-15.0-0.1-mdv2011.0.noarch.rpm
cebb929a6db589bfc7a0aad0b04004b3
2011/i586/firefox-fr-15.0-0.1-mdv2011.0.noarch.rpm
cd536f9f8727b2dd7701a7908c16cdfb
2011/i586/firefox-fy-15.0-0.1-mdv2011.0.noarch.rpm
93595c9fe1cb709a7c21c02300ac12a9
2011/i586/firefox-ga_IE-15.0-0.1-mdv2011.0.noarch.rpm
279b9c1ce32cf4ca4c700b47493c9761
2011/i586/firefox-gd-15.0-0.1-mdv2011.0.noarch.rpm
f7c574740a7f858c1357f0c4a26149f8
2011/i586/firefox-gl-15.0-0.1-mdv2011.0.noarch.rpm
857773582b15d0088871a19d119bd7a6
2011/i586/firefox-gu_IN-15.0-0.1-mdv2011.0.noarch.rpm
326c53491f6c670e97e3dc9970e89fd2
2011/i586/firefox-he-15.0-0.1-mdv2011.0.noarch.rpm
bad57690513be43f7a45312afe48d9c9
2011/i586/firefox-hi-15.0-0.1-mdv2011.0.noarch.rpm
729ed2290db6881e017b31a836e3c5a4
2011/i586/firefox-hr-15.0-0.1-mdv2011.0.noarch.rpm
8460829d9985d2a74936b877f179dec9
2011/i586/firefox-hu-15.0-0.1-mdv2011.0.noarch.rpm
548a264d2855b25f2e154aaf240399c8
2011/i586/firefox-hy-15.0-0.1-mdv2011.0.noarch.rpm
d4a0edef33cc08ef953b0afe0a42ca22
2011/i586/firefox-id-15.0-0.1-mdv2011.0.noarch.rpm
77df09e404f6f52340722e132578fb71
2011/i586/firefox-is-15.0-0.1-mdv2011.0.noarch.rpm
22c6063a51892e704853e3734152689c
2011/i586/firefox-it-15.0-0.1-mdv2011.0.noarch.rpm
2f385e87134374123a088185e1193667
2011/i586/firefox-ja-15.0-0.1-mdv2011.0.noarch.rpm
588a71cd10e951c5be3015dfe6775e2d
2011/i586/firefox-kk-15.0-0.1-mdv2011.0.noarch.rpm
7ba2d41b41b8836adde138249d2cd587
2011/i586/firefox-kn-15.0-0.1-mdv2011.0.noarch.rpm
b4079f7b0ef8f3be0e37c5aa96d2221a
2011/i586/firefox-ko-15.0-0.1-mdv2011.0.noarch.rpm
40b5c012763298a1fe3274ab969567a6
2011/i586/firefox-ku-15.0-0.1-mdv2011.0.noarch.rpm
216e18c06df896f2b2649ba9b016923b
2011/i586/firefox-lg-15.0-0.1-mdv2011.0.noarch.rpm
a86d4439195ff4939d04ab1998d0b7aa
2011/i586/firefox-lt-15.0-0.1-mdv2011.0.noarch.rpm
293c14003c06d904f5605ab1ab30eec9
2011/i586/firefox-lv-15.0-0.1-mdv2011.0.noarch.rpm
d26c88fdba82c231e368aeab323ec42a
2011/i586/firefox-mai-15.0-0.1-mdv2011.0.noarch.rpm
dfea7441a35aa20971e792995d8c63b6
2011/i586/firefox-mk-15.0-0.1-mdv2011.0.noarch.rpm
890c2606438b8603d7c2b74effc7a140
2011/i586/firefox-ml-15.0-0.1-mdv2011.0.noarch.rpm
bd7202ff08d5448909760da6ba00193e
2011/i586/firefox-mr-15.0-0.1-mdv2011.0.noarch.rpm
d5ae7737ee1e19eddf5b907b71d7ab71
2011/i586/firefox-nb_NO-15.0-0.1-mdv2011.0.noarch.rpm
f6d86c02d2da83feb6c167e49c5ec947
2011/i586/firefox-nl-15.0-0.1-mdv2011.0.noarch.rpm
266b961ec2cb241a20c70d394ad9510b
2011/i586/firefox-nn_NO-15.0-0.1-mdv2011.0.noarch.rpm
805d010bb07b456436b6d7ac7104ccd0
2011/i586/firefox-nso-15.0-0.1-mdv2011.0.noarch.rpm
fe819dce2711402c23d3dd6f4794b256
2011/i586/firefox-or-15.0-0.1-mdv2011.0.noarch.rpm
fca8922205971ddccb34082f997ed5e2
2011/i586/firefox-pa_IN-15.0-0.1-mdv2011.0.noarch.rpm
9d7910fb52d5054e5dead2b014417c8b
2011/i586/firefox-pl-15.0-0.1-mdv2011.0.noarch.rpm
54de08f75456428d52733fdda3e50b12
2011/i586/firefox-pt_BR-15.0-0.1-mdv2011.0.noarch.rpm
53e675e93a9937c31d923ab885901c70
2011/i586/firefox-pt_PT-15.0-0.1-mdv2011.0.noarch.rpm
166a43501f37c621f734107972deaa2c
2011/i586/firefox-ro-15.0-0.1-mdv2011.0.noarch.rpm
610313275eb89ba60144f822ce0fa237
2011/i586/firefox-ru-15.0-0.1-mdv2011.0.noarch.rpm
56bc307c2d0876c75ef0797f0424eacb
2011/i586/firefox-si-15.0-0.1-mdv2011.0.noarch.rpm
ca3865058f178e183c94519903e1fb61
2011/i586/firefox-sk-15.0-0.1-mdv2011.0.noarch.rpm
07720c299be46beedc88c26b9cf89a97
2011/i586/firefox-sl-15.0-0.1-mdv2011.0.noarch.rpm
b1bf922f975338182bbb26797579428a
2011/i586/firefox-sq-15.0-0.1-mdv2011.0.noarch.rpm
4b6478221fed473055b404500abf2baf
2011/i586/firefox-sr-15.0-0.1-mdv2011.0.noarch.rpm
6194dee67cfa5612aa7abbad659b7315
2011/i586/firefox-sv_SE-15.0-0.1-mdv2011.0.noarch.rpm
a0eb93a6dfd7c28e8627c6dfa04284f4
2011/i586/firefox-ta-15.0-0.1-mdv2011.0.noarch.rpm
b89778aafce014d88f6b934ffa21bdd7
2011/i586/firefox-ta_LK-15.0-0.1-mdv2011.0.noarch.rpm
c9159cce5035229c80b11c50e7ab0005
2011/i586/firefox-te-15.0-0.1-mdv2011.0.noarch.rpm
cc439a3f7b4dab59f6e0d577f3163194
2011/i586/firefox-th-15.0-0.1-mdv2011.0.noarch.rpm
696504ef908118a49d32189c36f9eb5d
2011/i586/firefox-tr-15.0-0.1-mdv2011.0.noarch.rpm
1fddb827215cdf82f8f1314e3a547edf
2011/i586/firefox-uk-15.0-0.1-mdv2011.0.noarch.rpm
f418db6ba119ed0de0214480943863dd
2011/i586/firefox-vi-15.0-0.1-mdv2011.0.noarch.rpm
2964ec621ab70e39f7635df40e5c484a
2011/i586/firefox-zh_CN-15.0-0.1-mdv2011.0.noarch.rpm
cff8302e2a9614c44f1608ac46a421cc
2011/i586/firefox-zh_TW-15.0-0.1-mdv2011.0.noarch.rpm
f5a5a2200c29653256e5d382f3766194
2011/i586/firefox-zu-15.0-0.1-mdv2011.0.noarch.rpm
2274b16d1b6b60602ca54dc5eb5f68c8
2011/i586/icedtea-web-1.1.6-0.2-mdv2011.0.i586.rpm
dddc30660fb233fb5c97c04f02ed64da
2011/i586/icedtea-web-javadoc-1.1.6-0.2-mdv2011.0.noarch.rpm
550c5722b549c364ee147044d3590d62
2011/i586/libsqlite3_0-3.7.13-0.1-mdv2011.0.i586.rpm
0483c7892ec4be5fbf5fb7162f664271
2011/i586/libsqlite3-devel-3.7.13-0.1-mdv2011.0.i586.rpm
357c444fc07b299e6e96e23ecabf2375
2011/i586/libsqlite3-static-devel-3.7.13-0.1-mdv2011.0.i586.rpm
6592326e150eab214bd23ec0e6ef484a
2011/i586/libxulrunner15.0-15.0-0.1-mdv2011.0.i586.rpm
1b3355cd27981baeeea6d595687ecc74
2011/i586/libxulrunner-devel-15.0-0.1-mdv2011.0.i586.rpm
9908d94443b85447e26eaa358ff442cd
2011/i586/sqlite3-tools-3.7.13-0.1-mdv2011.0.i586.rpm
c5498a5ef9939d6b58fe744f9d5578e9
2011/i586/xulrunner-15.0-0.1-mdv2011.0.i586.rpm
5f4955227553eb24c3886bf6a3716b55 2011/SRPMS/firefox-15.0-0.1.src.rpm
5cf3b047ef06dc671d3dade85543338e 2011/SRPMS/firefox-l10n-15.0-0.1.src.rpm
7846e5d4c210787f9ed3f34a485c5531 2011/SRPMS/icedtea-web-1.1.6-0.2.src.rpm
7cdb6e62c1f9d07f4490471d0a66b490 2011/SRPMS/sqlite3-3.7.13-0.1.src.rpm
c36ea604ee25a8962918bb95f42884b4 2011/SRPMS/xulrunner-15.0-0.1.src.rpm
Mandriva Linux 2011/X86_64:
0e12e9d44ff9a8123fc7493dcb7077f8
2011/x86_64/firefox-15.0-0.1-mdv2011.0.x86_64.rpm
1a181da8dae38cfd5591db4694ed8fbc
2011/x86_64/firefox-af-15.0-0.1-mdv2011.0.noarch.rpm
55360547f9f98f3ced919ba6c50e579a
2011/x86_64/firefox-ar-15.0-0.1-mdv2011.0.noarch.rpm
5e0e1961a7b1f2eb344fd1f34afa0b66
2011/x86_64/firefox-ast-15.0-0.1-mdv2011.0.noarch.rpm
800c8a3ae03d6504dd83da97f58589de
2011/x86_64/firefox-be-15.0-0.1-mdv2011.0.noarch.rpm
7aa80805fc41aa719927ba9630ea548f
2011/x86_64/firefox-bg-15.0-0.1-mdv2011.0.noarch.rpm
bb751193947481a0d92066fd2bafefae
2011/x86_64/firefox-bn_BD-15.0-0.1-mdv2011.0.noarch.rpm
fc2863e629aa015dfe3ac3f0ebaf631e
2011/x86_64/firefox-bn_IN-15.0-0.1-mdv2011.0.noarch.rpm
aa7ba1bc7c14e5aa0cd0e0d9d4ff520f
2011/x86_64/firefox-br-15.0-0.1-mdv2011.0.noarch.rpm
49c06957e034fa5d5c183b2c4da1aa35
2011/x86_64/firefox-bs-15.0-0.1-mdv2011.0.noarch.rpm
8932ea8e47e5822db4efb414617f1aca
2011/x86_64/firefox-ca-15.0-0.1-mdv2011.0.noarch.rpm
12cc2f67e45e9c936b0df757929c30c1
2011/x86_64/firefox-cs-15.0-0.1-mdv2011.0.noarch.rpm
8c35b25848d1fc92e6ab20db07e07702
2011/x86_64/firefox-cy-15.0-0.1-mdv2011.0.noarch.rpm
78ca9cf1e222208de2aa05891999b978
2011/x86_64/firefox-da-15.0-0.1-mdv2011.0.noarch.rpm
8dff4be2f33606862b004e4033598a65
2011/x86_64/firefox-de-15.0-0.1-mdv2011.0.noarch.rpm
6e3f21c934da448622f78c98d14e51be
2011/x86_64/firefox-devel-15.0-0.1-mdv2011.0.x86_64.rpm
b91951fb96c66144c5b660b06385653a
2011/x86_64/firefox-el-15.0-0.1-mdv2011.0.noarch.rpm
932dad756f240fbf225dceeef30fca76
2011/x86_64/firefox-en_GB-15.0-0.1-mdv2011.0.noarch.rpm
6973da6f9fafd57c219cf44701ee3c2f
2011/x86_64/firefox-en_ZA-15.0-0.1-mdv2011.0.noarch.rpm
53b8f28aabfef241ba1b29345eb6b8f6
2011/x86_64/firefox-eo-15.0-0.1-mdv2011.0.noarch.rpm
433bde29ecc2dd65ee80a344482a6e21
2011/x86_64/firefox-es_AR-15.0-0.1-mdv2011.0.noarch.rpm
d3e1dea3f71c9e01164d7c44d729e6ab
2011/x86_64/firefox-es_CL-15.0-0.1-mdv2011.0.noarch.rpm
108b9ee83ce20174919f1f2b9989d539
2011/x86_64/firefox-es_ES-15.0-0.1-mdv2011.0.noarch.rpm
a09908b98b81d5141eaccb573f282780
2011/x86_64/firefox-es_MX-15.0-0.1-mdv2011.0.noarch.rpm
bca684c84cf0c67ab987611758132207
2011/x86_64/firefox-et-15.0-0.1-mdv2011.0.noarch.rpm
ee18e1f0855974fcd631dab8a7fdff3c
2011/x86_64/firefox-eu-15.0-0.1-mdv2011.0.noarch.rpm
727f24a1fa0d01c000050ba668710c71
2011/x86_64/firefox-fa-15.0-0.1-mdv2011.0.noarch.rpm
c14f3f7d08e1af11a21bb78cebb9e0a4
2011/x86_64/firefox-fi-15.0-0.1-mdv2011.0.noarch.rpm
c9bf3a1d7db2d326f44f4afbfb56f80f
2011/x86_64/firefox-fr-15.0-0.1-mdv2011.0.noarch.rpm
3c742d582d03dbb67a23c3b2b6a7c628
2011/x86_64/firefox-fy-15.0-0.1-mdv2011.0.noarch.rpm
83294ffb20ac9204b360afd35c4f926e
2011/x86_64/firefox-ga_IE-15.0-0.1-mdv2011.0.noarch.rpm
55fc357d551a3cf96533a0e8513b3191
2011/x86_64/firefox-gd-15.0-0.1-mdv2011.0.noarch.rpm
82f35973cab220ee73e699f078041e8d
2011/x86_64/firefox-gl-15.0-0.1-mdv2011.0.noarch.rpm
c74bd9183a85b1f70f93ae7857dbf4f1
2011/x86_64/firefox-gu_IN-15.0-0.1-mdv2011.0.noarch.rpm
76ed674fcc83ce4f9ffcb2426c68edd2
2011/x86_64/firefox-he-15.0-0.1-mdv2011.0.noarch.rpm
787844a81abc2381fc6d507c4635e617
2011/x86_64/firefox-hi-15.0-0.1-mdv2011.0.noarch.rpm
e624dd22d0d4393004b426565ce5ed2e
2011/x86_64/firefox-hr-15.0-0.1-mdv2011.0.noarch.rpm
9b96cda724241294456d1a7034f39ccb
2011/x86_64/firefox-hu-15.0-0.1-mdv2011.0.noarch.rpm
477907a657672818409beae06be8aff5
2011/x86_64/firefox-hy-15.0-0.1-mdv2011.0.noarch.rpm
c00476196d5fb8bbc9be437fc59971b8
2011/x86_64/firefox-id-15.0-0.1-mdv2011.0.noarch.rpm
6b074fa2d96d8f81af2f0823cbf9672c
2011/x86_64/firefox-is-15.0-0.1-mdv2011.0.noarch.rpm
2ce12cb5145efc398bbc0484a4b50838
2011/x86_64/firefox-it-15.0-0.1-mdv2011.0.noarch.rpm
f32e3bc9386dec60704de908e83dcbba
2011/x86_64/firefox-ja-15.0-0.1-mdv2011.0.noarch.rpm
71fbffb05956075768546aeb2fd84939
2011/x86_64/firefox-kk-15.0-0.1-mdv2011.0.noarch.rpm
d9cebef0570d2d09c0ba617c2cdf8525
2011/x86_64/firefox-kn-15.0-0.1-mdv2011.0.noarch.rpm
51584b7f863a78c0dea9dd6b7b3bd7c2
2011/x86_64/firefox-ko-15.0-0.1-mdv2011.0.noarch.rpm
f455e7aa94b96a12751359fa109c5d00
2011/x86_64/firefox-ku-15.0-0.1-mdv2011.0.noarch.rpm
436e157f25b477cf0adaddac02d8268a
2011/x86_64/firefox-lg-15.0-0.1-mdv2011.0.noarch.rpm
098d1b1c8d93eafafc857aa69d2745ea
2011/x86_64/firefox-lt-15.0-0.1-mdv2011.0.noarch.rpm
645a634ef43975f67039828dbbab56cf
2011/x86_64/firefox-lv-15.0-0.1-mdv2011.0.noarch.rpm
dc80bf890f4fe7db4e9d0bfc2266ad15
2011/x86_64/firefox-mai-15.0-0.1-mdv2011.0.noarch.rpm
10e45ce2b835a6a81b481653dab78880
2011/x86_64/firefox-mk-15.0-0.1-mdv2011.0.noarch.rpm
10c055dd5d49c5562e2c590661309518
2011/x86_64/firefox-ml-15.0-0.1-mdv2011.0.noarch.rpm
525dd0b30d68e43dd8e56b6b25a7b149
2011/x86_64/firefox-mr-15.0-0.1-mdv2011.0.noarch.rpm
c2c68003b652349c48b812d381c00248
2011/x86_64/firefox-nb_NO-15.0-0.1-mdv2011.0.noarch.rpm
3a1651ec18d3aef0da7234cc01d3de67
2011/x86_64/firefox-nl-15.0-0.1-mdv2011.0.noarch.rpm
d7f8797d04abcd86471bad8f05c541f0
2011/x86_64/firefox-nn_NO-15.0-0.1-mdv2011.0.noarch.rpm
f7bc6278e0a54b3cdbe855764f4457eb
2011/x86_64/firefox-nso-15.0-0.1-mdv2011.0.noarch.rpm
1ae275c8c3bdf83d7cde2be3feb3d1de
2011/x86_64/firefox-or-15.0-0.1-mdv2011.0.noarch.rpm
66b6127a9a0c658608668514c5c78884
2011/x86_64/firefox-pa_IN-15.0-0.1-mdv2011.0.noarch.rpm
2d486eabca55712bc8cc3a3252c7adcc
2011/x86_64/firefox-pl-15.0-0.1-mdv2011.0.noarch.rpm
fca74bdac00db9fae52fdac14e1c5b48
2011/x86_64/firefox-pt_BR-15.0-0.1-mdv2011.0.noarch.rpm
0c332cea72e001c903d5d82c9627efd5
2011/x86_64/firefox-pt_PT-15.0-0.1-mdv2011.0.noarch.rpm
3162e3ec2676a92f926cd31af88aa53e
2011/x86_64/firefox-ro-15.0-0.1-mdv2011.0.noarch.rpm
4cd1d49b0eaec676aa64e50f5796bbcc
2011/x86_64/firefox-ru-15.0-0.1-mdv2011.0.noarch.rpm
a5d6939ae79a981f2ccab6bc83cbd326
2011/x86_64/firefox-si-15.0-0.1-mdv2011.0.noarch.rpm
3385479540d49e9f47bb7b6da3af61d5
2011/x86_64/firefox-sk-15.0-0.1-mdv2011.0.noarch.rpm
24a3140b69a25734b5877422eead8fd7
2011/x86_64/firefox-sl-15.0-0.1-mdv2011.0.noarch.rpm
63a3c429e6c935ea1c67a1a2928b99e5
2011/x86_64/firefox-sq-15.0-0.1-mdv2011.0.noarch.rpm
41c9c59322de076f495352b6d05efdb5
2011/x86_64/firefox-sr-15.0-0.1-mdv2011.0.noarch.rpm
a23a5d5a39a1677b9f06db9b8e16478b
2011/x86_64/firefox-sv_SE-15.0-0.1-mdv2011.0.noarch.rpm
926fb2b0302ced70674ed8b3518558ee
2011/x86_64/firefox-ta-15.0-0.1-mdv2011.0.noarch.rpm
f7472be3b81befdcc3653cb9e71b46cf
2011/x86_64/firefox-ta_LK-15.0-0.1-mdv2011.0.noarch.rpm
4e88af6834cc8f590f260e13ca2f39bb
2011/x86_64/firefox-te-15.0-0.1-mdv2011.0.noarch.rpm
dac0f7e88abd24bee5a5c7695de442ed
2011/x86_64/firefox-th-15.0-0.1-mdv2011.0.noarch.rpm
0c3c48ce57c8f54e95a162a2a5f32f49
2011/x86_64/firefox-tr-15.0-0.1-mdv2011.0.noarch.rpm
86ab0a7d77f74a1822355574580efc38
2011/x86_64/firefox-uk-15.0-0.1-mdv2011.0.noarch.rpm
65188e896935cb4cabc3207b8da029cb
2011/x86_64/firefox-vi-15.0-0.1-mdv2011.0.noarch.rpm
f183fa37318efda5d033ecbf8e69aafc
2011/x86_64/firefox-zh_CN-15.0-0.1-mdv2011.0.noarch.rpm
1085b1aaf753421006716514b2dd4d51
2011/x86_64/firefox-zh_TW-15.0-0.1-mdv2011.0.noarch.rpm
61e9a3a0eb460cd4f4fdd4bae6d77502
2011/x86_64/firefox-zu-15.0-0.1-mdv2011.0.noarch.rpm
e21e61bc2a9a00d61632b671ec1a7c56
2011/x86_64/icedtea-web-1.1.6-0.2-mdv2011.0.x86_64.rpm
d25f4584600c089a687f7dee70e5cbd2
2011/x86_64/icedtea-web-javadoc-1.1.6-0.2-mdv2011.0.noarch.rpm
264d06ed466aa86874fb72bcb58b606b
2011/x86_64/lib64sqlite3_0-3.7.13-0.1-mdv2011.0.x86_64.rpm
0183919f566dd640cb4f050f568b3112
2011/x86_64/lib64sqlite3-devel-3.7.13-0.1-mdv2011.0.x86_64.rpm
f1368b8324e0031c8505a3e8f944eba0
2011/x86_64/lib64sqlite3-static-devel-3.7.13-0.1-mdv2011.0.x86_64.rpm
27154cd06e180c264d478037c5b189d5
2011/x86_64/lib64xulrunner15.0-15.0-0.1-mdv2011.0.x86_64.rpm
37023d7d5b9e3c135cdc21ce7e68a73c
2011/x86_64/lib64xulrunner-devel-15.0-0.1-mdv2011.0.x86_64.rpm
de18d6a57d7c417717f86a983d0faa5b
2011/x86_64/sqlite3-tools-3.7.13-0.1-mdv2011.0.x86_64.rpm
f4b5a15a168d314f542bab81ca67d339
2011/x86_64/xulrunner-15.0-0.1-mdv2011.0.x86_64.rpm
5f4955227553eb24c3886bf6a3716b55 2011/SRPMS/firefox-15.0-0.1.src.rpm
5cf3b047ef06dc671d3dade85543338e 2011/SRPMS/firefox-l10n-15.0-0.1.src.rpm
7846e5d4c210787f9ed3f34a485c5531 2011/SRPMS/icedtea-web-1.1.6-0.2.src.rpm
7cdb6e62c1f9d07f4490471d0a66b490 2011/SRPMS/sqlite3-3.7.13-0.1.src.rpm
c36ea604ee25a8962918bb95f42884b4 2011/SRPMS/xulrunner-15.0-0.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFQPcjxmqjQ0CJFipgRAvlQAJ9gra/7dalMiK9AOe28Plp6F44XOwCg4du7
rSG0ikRTba4V5jIqU8CTLtM=
=qscF
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/