exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2013-002

Mandriva Linux Security Advisory 2013-002
Posted Jan 10, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-002 - Google reported to Mozilla that TURKTRUST, a certificate authority in Mozillas root program, had mis-issued two intermediate certificates to customers. The issue was not specific to Firefox but there was evidence that one of the certificates was used for man-in-the-middle traffic management of domain names that the customer did not legitimately own or control. Various other issues were also addressed.

tags | advisory, root
systems | linux, mandriva
advisories | CVE-2013-0743, CVE-2013-0754, CVE-2013-0753, CVE-2013-0758, CVE-2013-0750, CVE-2013-0748, CVE-2013-0746, CVE-2013-0744, CVE-2013-0759, CVE-2013-0762, CVE-2013-0766, CVE-2013-0767, CVE-2013-0769
SHA-256 | 9ee750b2b8c7902fd7785c0edbfdc5773ae0ab089e0b3acc4daccaf1b8b4b1c4

Mandriva Linux Security Advisory 2013-002

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:002
http://www.mandriva.com/security/
_______________________________________________________________________

Package : firefox
Date : January 9, 2013
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple security issue were identified and fixed in mozilla firefox:

Google reported to Mozilla that TURKTRUST, a certificate authority in
Mozillas root program, had mis-issued two intermediate certificates
to customers. The issue was not specific to Firefox but there was
evidence that one of the certificates was used for man-in-the-middle
(MITM) traffic management of domain names that the customer did not
legitimately own or control. This issue was resolved by revoking the
trust for these specific mis-issued certificates (CVE-2013-0743).

Security researcher regenrecht reported, via TippingPoint's Zero Day
Initiative, a use-after-free within the ListenerManager when garbage
collection is forced after data in listener objects have been allocated
in some circumstances. This results in a use-after-free which can
lead to arbitrary code execution (CVE-2013-0754).

Security researcher regenrecht reported, via TippingPoint's Zero
Day Initiative, a use-after-free in XMLSerializer by the exposing
of serializeToStream to web content. This can lead to arbitrary code
execution when exploited (CVE-2013-0753).

Security researcher Mariusz Mlynski reported that it is possible
to open a chrome privileged web page through plugin objects through
interaction with SVG elements. This could allow for arbitrary code
execution (CVE-2013-0758).

Security researcher pa_kt reported a flaw via TippingPoint's Zero Day
Initiative that an integer overflow is possible when calculating the
length for a Javascript string concatenation, which is then used for
memory allocation. This results in a buffer overflow, leading to a
potentially exploitable memory corruption (CVE-2013-0750).

Mozilla security researcher Jesse Ruderman discovered that using the
toString function of XBL objects can lead to inappropriate information
leakage by revealing the address space layout instead of just the ID
of the object. This layout information could potentially be used to
bypass ASLR and other security protections (CVE-2013-0748).

Mozilla developer Boris Zbarsky reported reported a problem where
jsval-returning quickstubs fail to wrap their return values, causing
a compartment mismatch. This mismatch can cause garbage collection
to occur incorrectly and lead to a potentially exploitable crash
(CVE-2013-0746).

Using the Address Sanitizer tool, security researcher Atte Kettunen
from OUSPG discovered that the combination of large numbers
of columns and column groups in a table could cause the array
containing the columns during rendering to overwrite itself. This
can lead to a user-after-free causing a potentially exploitable crash
(CVE-2013-0744).

Security researcher Abhishek Arya (Inferno) of the Google Chrome
Security Team discovered a series critically rated of use-after-free,
out of bounds read, and buffer overflow issues using the Address
Sanitizer tool in shipped software. These issues are potentially
exploitable, allowing for remote code execution. We would also like
to thank Abhishek for reporting three additional user-after-free and
out of bounds read flaws introduced during Firefox development that
were fixed before general release (CVE-2013-0762, CVE-2013-0766,
CVE-2013-0767).

Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code (CVE-2013-0769).

Security researcher Masato Kinugawa found a flaw in which the
displayed URL values within the addressbar can be spoofed by a page
during loading. This allows for phishing attacks where a malicious
page can spoof the identify of another site (CVE-2013-0759).

The mozilla firefox packages has been upgraded to the latest version
which is unaffected by these security flaws.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769
http://www.mozilla.org/security/announce/2013/mfsa2013-20.html
http://www.mozilla.org/security/announce/2013/mfsa2013-17.html
http://www.mozilla.org/security/announce/2013/mfsa2013-16.html
http://www.mozilla.org/security/announce/2013/mfsa2013-15.html
http://www.mozilla.org/security/announce/2013/mfsa2013-12.html
http://www.mozilla.org/security/announce/2013/mfsa2013-11.html
http://www.mozilla.org/security/announce/2013/mfsa2013-09.html
http://www.mozilla.org/security/announce/2013/mfsa2013-05.html
http://www.mozilla.org/security/announce/2013/mfsa2013-04.html
http://www.mozilla.org/security/announce/2013/mfsa2013-02.html
http://www.mozilla.org/security/announce/2013/mfsa2013-01.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
6a90d41da959a6610024ff4edb00c7e0 mes5/i586/firefox-10.0.12-0.1mdvmes5.2.i586.rpm
938f2b80ff7ec162e91c7842d2e8d0fd mes5/i586/firefox-af-10.0.12-0.1mdvmes5.2.i586.rpm
fc82e7256b8e4f2fcb6a0a89dd445d65 mes5/i586/firefox-ar-10.0.12-0.1mdvmes5.2.i586.rpm
09787dab37be7d8119342e10c54e770c mes5/i586/firefox-be-10.0.12-0.1mdvmes5.2.i586.rpm
3ece6288096f143a6849b1b1fd7d6b0e mes5/i586/firefox-bg-10.0.12-0.1mdvmes5.2.i586.rpm
8a3232659cce143dacf62362f0a41f26 mes5/i586/firefox-bn-10.0.12-0.1mdvmes5.2.i586.rpm
9feae96468c2eb22aa29ab382c110628 mes5/i586/firefox-ca-10.0.12-0.1mdvmes5.2.i586.rpm
630d5eab5dae17ab83d304da7743a2f8 mes5/i586/firefox-cs-10.0.12-0.1mdvmes5.2.i586.rpm
c98adc9e537516663b0aaa65e7943393 mes5/i586/firefox-cy-10.0.12-0.1mdvmes5.2.i586.rpm
b2ea10ba6d761a4907396630489d38ff mes5/i586/firefox-da-10.0.12-0.1mdvmes5.2.i586.rpm
b2d71a3c37804060ba559f42580629e5 mes5/i586/firefox-de-10.0.12-0.1mdvmes5.2.i586.rpm
3d1fcb82cd8b0003a5fdca21a4fa35e8 mes5/i586/firefox-devel-10.0.12-0.1mdvmes5.2.i586.rpm
dc0f4ebc0cd6cf8bcc147c2e141f8e4b mes5/i586/firefox-el-10.0.12-0.1mdvmes5.2.i586.rpm
02eb125c0027eb02cd228abca5a5ae90 mes5/i586/firefox-en_GB-10.0.12-0.1mdvmes5.2.i586.rpm
38d34ccae33ea9329c3bf08d0eb49bf0 mes5/i586/firefox-eo-10.0.12-0.1mdvmes5.2.i586.rpm
ce1b02d401cea11eaa0e3985db9118fc mes5/i586/firefox-es_AR-10.0.12-0.1mdvmes5.2.i586.rpm
be67f0b04803d142c94e03123c8dc035 mes5/i586/firefox-es_ES-10.0.12-0.1mdvmes5.2.i586.rpm
d68633951b46759e49bb104ab7306006 mes5/i586/firefox-et-10.0.12-0.1mdvmes5.2.i586.rpm
93fcff1e6fe6fcdd639799f367e4eceb mes5/i586/firefox-eu-10.0.12-0.1mdvmes5.2.i586.rpm
92edf937b64fcc545af68f48de84f2ca mes5/i586/firefox-fi-10.0.12-0.1mdvmes5.2.i586.rpm
f3ae76b728936e2962bbf90aaa1d1810 mes5/i586/firefox-fr-10.0.12-0.1mdvmes5.2.i586.rpm
9992758506f970829796c9691740f236 mes5/i586/firefox-fy-10.0.12-0.1mdvmes5.2.i586.rpm
26f2678ee6e21bd7928bc3ae85654fb3 mes5/i586/firefox-ga_IE-10.0.12-0.1mdvmes5.2.i586.rpm
d67703274e9d9d25426c10337da56cbd mes5/i586/firefox-gl-10.0.12-0.1mdvmes5.2.i586.rpm
af6c4fa86abd84930adc97e87fc901c6 mes5/i586/firefox-gu_IN-10.0.12-0.1mdvmes5.2.i586.rpm
9775a563ee7ef785fe7a0a80272bd1d4 mes5/i586/firefox-he-10.0.12-0.1mdvmes5.2.i586.rpm
14e7d4c2a4e83fbe2878ec14f78ffe83 mes5/i586/firefox-hi-10.0.12-0.1mdvmes5.2.i586.rpm
02a3061d522afa5d694b379347ef87ef mes5/i586/firefox-hu-10.0.12-0.1mdvmes5.2.i586.rpm
03bd7939a6257654c658977e55b6cb69 mes5/i586/firefox-id-10.0.12-0.1mdvmes5.2.i586.rpm
7faec047d662ae55661d75bb6abecd2c mes5/i586/firefox-is-10.0.12-0.1mdvmes5.2.i586.rpm
8728abb00f2924a7776d2fa3bd068dfb mes5/i586/firefox-it-10.0.12-0.1mdvmes5.2.i586.rpm
cdcab0ee96a71f00a576182ed3b8fa08 mes5/i586/firefox-ja-10.0.12-0.1mdvmes5.2.i586.rpm
9400eca7d1557cf2f724367bb1ef206d mes5/i586/firefox-ka-10.0.12-0.1mdvmes5.2.i586.rpm
c1ddccc95fa8c23bb63478a637ef1b7b mes5/i586/firefox-kn-10.0.12-0.1mdvmes5.2.i586.rpm
7e9f68326f6cf99093144e74f57c85a5 mes5/i586/firefox-ko-10.0.12-0.1mdvmes5.2.i586.rpm
cc6858bc89c9ba562b3cfe5dd54d0b15 mes5/i586/firefox-ku-10.0.12-0.1mdvmes5.2.i586.rpm
aca89e6575c44a2d4510cf150558955b mes5/i586/firefox-lt-10.0.12-0.1mdvmes5.2.i586.rpm
933ca52186e944ff75959c00a3237c6c mes5/i586/firefox-lv-10.0.12-0.1mdvmes5.2.i586.rpm
4de4dfe7c535841f8289ad815792eefb mes5/i586/firefox-mk-10.0.12-0.1mdvmes5.2.i586.rpm
340f9e5666980ab34f56b508f1869be0 mes5/i586/firefox-mr-10.0.12-0.1mdvmes5.2.i586.rpm
674a45c6e740e99fce3bcb0421bf692d mes5/i586/firefox-nb_NO-10.0.12-0.1mdvmes5.2.i586.rpm
4bae8177b0e2d09b4808de91a5cbb480 mes5/i586/firefox-nl-10.0.12-0.1mdvmes5.2.i586.rpm
9502588f48efc18251bb0a2c4da7c67f mes5/i586/firefox-nn_NO-10.0.12-0.1mdvmes5.2.i586.rpm
28d01c92b5bfada1257488ca5cb81090 mes5/i586/firefox-oc-10.0.12-0.1mdvmes5.2.i586.rpm
45e0e75bf13e31abe5191678e6cb29fb mes5/i586/firefox-pa_IN-10.0.12-0.1mdvmes5.2.i586.rpm
03e82c9b1d26728c64a15eff2b9fe8a4 mes5/i586/firefox-pl-10.0.12-0.1mdvmes5.2.i586.rpm
a078db90fa6ccb9b5e8eab7aed6fc383 mes5/i586/firefox-pt_BR-10.0.12-0.1mdvmes5.2.i586.rpm
ff6817be10d5d025368fafab359cb9bc mes5/i586/firefox-pt_PT-10.0.12-0.1mdvmes5.2.i586.rpm
e83044cedd0ab955bd490a75e0262fdf mes5/i586/firefox-ro-10.0.12-0.1mdvmes5.2.i586.rpm
f3829090c91f64cf42b6704eaa1556cc mes5/i586/firefox-ru-10.0.12-0.1mdvmes5.2.i586.rpm
e67d78b38b09764cc3db7a2fb7aa0ccb mes5/i586/firefox-si-10.0.12-0.1mdvmes5.2.i586.rpm
b60a1a00c4c6e1ffd59bdcd30135a9e5 mes5/i586/firefox-sk-10.0.12-0.1mdvmes5.2.i586.rpm
6e86141416b66260ad50b69eba3ca831 mes5/i586/firefox-sl-10.0.12-0.1mdvmes5.2.i586.rpm
cc32659b3b38d1889f4c20df6b5861cc mes5/i586/firefox-sq-10.0.12-0.1mdvmes5.2.i586.rpm
e068225cac9ac0afb6e4a8a6d6efb0cc mes5/i586/firefox-sr-10.0.12-0.1mdvmes5.2.i586.rpm
5b82daf461e65242138e10488a1dbf3c mes5/i586/firefox-sv_SE-10.0.12-0.1mdvmes5.2.i586.rpm
797b4f3353d792d8e218a1288440da29 mes5/i586/firefox-te-10.0.12-0.1mdvmes5.2.i586.rpm
39691dbd8084474882eaaa23bed11075 mes5/i586/firefox-th-10.0.12-0.1mdvmes5.2.i586.rpm
1fa94929f117a926bdfaae3a4d8b6f7d mes5/i586/firefox-tr-10.0.12-0.1mdvmes5.2.i586.rpm
a15d57069fd1b8a9c342df41b458282b mes5/i586/firefox-uk-10.0.12-0.1mdvmes5.2.i586.rpm
796978e53b900ba33952ea604622c590 mes5/i586/firefox-zh_CN-10.0.12-0.1mdvmes5.2.i586.rpm
9d6256d9b1f5991d1852fc1096491202 mes5/i586/firefox-zh_TW-10.0.12-0.1mdvmes5.2.i586.rpm
d30907827f13429b2e554ea4e6856240 mes5/i586/libnss3-3.14.1-0.1mdvmes5.2.i586.rpm
4e25b43c99caa549211c45e8ef0b1ac2 mes5/i586/libnss-devel-3.14.1-0.1mdvmes5.2.i586.rpm
a28d9a2e4848a75edff6cc6fda90ee98 mes5/i586/libnss-static-devel-3.14.1-0.1mdvmes5.2.i586.rpm
64f15e1555ebd2c5511ea4d0f988c777 mes5/i586/libxulrunner10.0.12-10.0.12-0.1mdvmes5.2.i586.rpm
c02744f54afb7aa102b4ffaaf30560f2 mes5/i586/libxulrunner-devel-10.0.12-0.1mdvmes5.2.i586.rpm
1f63bfcd2cc7b87bc1b36143940ca1f0 mes5/i586/nss-3.14.1-0.1mdvmes5.2.i586.rpm
6fc25499ab31eab00dc329dd0795f98f mes5/i586/rootcerts-20121229.00-1mdvmes5.2.i586.rpm
d5b3814fca55f73fa5a432cde1a87286 mes5/i586/rootcerts-java-20121229.00-1mdvmes5.2.i586.rpm
addec10a773ab4aa83d9998d528d2c0c mes5/i586/xulrunner-10.0.12-0.1mdvmes5.2.i586.rpm
e8e89ae09156de53165df7e1be0be753 mes5/SRPMS/firefox-10.0.12-0.1mdvmes5.2.src.rpm
ae626ca038b1b222c80b8df684604519 mes5/SRPMS/firefox-l10n-10.0.12-0.1mdvmes5.2.src.rpm
8bb7847fd80ec7c831f442ec6153600f mes5/SRPMS/nss-3.14.1-0.1mdvmes5.2.src.rpm
677882e23b0d751aab5992de12ee58c8 mes5/SRPMS/rootcerts-20121229.00-1mdvmes5.2.src.rpm
8fafd87dca1aa4d1ea665292e00f7d98 mes5/SRPMS/xulrunner-10.0.12-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
ec73b765cf90091a3904b108f5ca91a8 mes5/x86_64/firefox-10.0.12-0.1mdvmes5.2.x86_64.rpm
9f0b7687a33ebe50fcbdbaec5a578a4a mes5/x86_64/firefox-af-10.0.12-0.1mdvmes5.2.x86_64.rpm
4769684681901d7d0f3da67b0079c499 mes5/x86_64/firefox-ar-10.0.12-0.1mdvmes5.2.x86_64.rpm
ca810320d78c8edc590ea1a3755dadaa mes5/x86_64/firefox-be-10.0.12-0.1mdvmes5.2.x86_64.rpm
513a67ee607b439e6cdbb7e206ba57f1 mes5/x86_64/firefox-bg-10.0.12-0.1mdvmes5.2.x86_64.rpm
e171340bea0e000fcdb83c77f11c57f6 mes5/x86_64/firefox-bn-10.0.12-0.1mdvmes5.2.x86_64.rpm
4ede105e999009cf2762efa458313f2a mes5/x86_64/firefox-ca-10.0.12-0.1mdvmes5.2.x86_64.rpm
48ba34b0537c0efc4799325134689140 mes5/x86_64/firefox-cs-10.0.12-0.1mdvmes5.2.x86_64.rpm
6e2c6107c7539cbb77f3fe4266812388 mes5/x86_64/firefox-cy-10.0.12-0.1mdvmes5.2.x86_64.rpm
6633981954d7fdb722b574edc32de1c3 mes5/x86_64/firefox-da-10.0.12-0.1mdvmes5.2.x86_64.rpm
b891c31801e0cb20a3e0be6e49929f43 mes5/x86_64/firefox-de-10.0.12-0.1mdvmes5.2.x86_64.rpm
e4118fd3aa498494a1000d3b14941428 mes5/x86_64/firefox-devel-10.0.12-0.1mdvmes5.2.x86_64.rpm
4c34458067745fbc9d98385159cabb4e mes5/x86_64/firefox-el-10.0.12-0.1mdvmes5.2.x86_64.rpm
9f9bd2dbb1d2d965959af26ca752e0b4 mes5/x86_64/firefox-en_GB-10.0.12-0.1mdvmes5.2.x86_64.rpm
36ca1fd771d1c0765102f61400acb9c3 mes5/x86_64/firefox-eo-10.0.12-0.1mdvmes5.2.x86_64.rpm
469e680897bdff78d748acb94f2a75b0 mes5/x86_64/firefox-es_AR-10.0.12-0.1mdvmes5.2.x86_64.rpm
54094cfb1efbcff7a48c68086f2f1848 mes5/x86_64/firefox-es_ES-10.0.12-0.1mdvmes5.2.x86_64.rpm
1896c23b5b472707ed8d9cf419ef639a mes5/x86_64/firefox-et-10.0.12-0.1mdvmes5.2.x86_64.rpm
a0203f65040faab8abc43079f9352dd4 mes5/x86_64/firefox-eu-10.0.12-0.1mdvmes5.2.x86_64.rpm
020cddeb794a57fdd69d619add6d7195 mes5/x86_64/firefox-fi-10.0.12-0.1mdvmes5.2.x86_64.rpm
c9b9c9c4ebdff7e75812d832c00117ba mes5/x86_64/firefox-fr-10.0.12-0.1mdvmes5.2.x86_64.rpm
1696482cd4c038df4f09b0db2feff3a2 mes5/x86_64/firefox-fy-10.0.12-0.1mdvmes5.2.x86_64.rpm
c4a94dd5adc727a32d475c9e4841cc3b mes5/x86_64/firefox-ga_IE-10.0.12-0.1mdvmes5.2.x86_64.rpm
e7ac24f6b43839b1195b9a4021c60400 mes5/x86_64/firefox-gl-10.0.12-0.1mdvmes5.2.x86_64.rpm
03714c3d430ce0588df44335809b1497 mes5/x86_64/firefox-gu_IN-10.0.12-0.1mdvmes5.2.x86_64.rpm
0aab4f6aed0e40ae4d9bc792baf46f77 mes5/x86_64/firefox-he-10.0.12-0.1mdvmes5.2.x86_64.rpm
1a3bbd79e3ed3ad58c2c05de1bdfb345 mes5/x86_64/firefox-hi-10.0.12-0.1mdvmes5.2.x86_64.rpm
4bd0dd2359a4956c9a10d812f4558a2d mes5/x86_64/firefox-hu-10.0.12-0.1mdvmes5.2.x86_64.rpm
1c200ee911d9bcb57667bc171e5e34bd mes5/x86_64/firefox-id-10.0.12-0.1mdvmes5.2.x86_64.rpm
d1a20db5877533297aa37cfa61a643ad mes5/x86_64/firefox-is-10.0.12-0.1mdvmes5.2.x86_64.rpm
fa88e6be3877b527ca57f3c70f5f0b48 mes5/x86_64/firefox-it-10.0.12-0.1mdvmes5.2.x86_64.rpm
252a3ae2c4b3583d1e9466052eec0430 mes5/x86_64/firefox-ja-10.0.12-0.1mdvmes5.2.x86_64.rpm
524c2d72c0e62fddfc5bc66c257ea20b mes5/x86_64/firefox-ka-10.0.12-0.1mdvmes5.2.x86_64.rpm
1935cab2d2a52159f031982e2ce823de mes5/x86_64/firefox-kn-10.0.12-0.1mdvmes5.2.x86_64.rpm
ec2434a00ac1d07070a35b992f162f67 mes5/x86_64/firefox-ko-10.0.12-0.1mdvmes5.2.x86_64.rpm
7709a131d2652966fc83dd9008fd2a1d mes5/x86_64/firefox-ku-10.0.12-0.1mdvmes5.2.x86_64.rpm
cbdb15c811f783d9f948ac82c343d473 mes5/x86_64/firefox-lt-10.0.12-0.1mdvmes5.2.x86_64.rpm
2f85d25b00245770e27b897da34efc09 mes5/x86_64/firefox-lv-10.0.12-0.1mdvmes5.2.x86_64.rpm
279cd222db83b5404bd4a65745e5bedc mes5/x86_64/firefox-mk-10.0.12-0.1mdvmes5.2.x86_64.rpm
8692038a08c4e80257c3449a47ef3d10 mes5/x86_64/firefox-mr-10.0.12-0.1mdvmes5.2.x86_64.rpm
5b55c11f1c5e3e88054dae45cf5f02f1 mes5/x86_64/firefox-nb_NO-10.0.12-0.1mdvmes5.2.x86_64.rpm
fe93c427b7555bb02c30114305251890 mes5/x86_64/firefox-nl-10.0.12-0.1mdvmes5.2.x86_64.rpm
be2487874444cf17f0ed99096cbe1fc6 mes5/x86_64/firefox-nn_NO-10.0.12-0.1mdvmes5.2.x86_64.rpm
48ea3a91e056d7d6dcb33f14c1117655 mes5/x86_64/firefox-oc-10.0.12-0.1mdvmes5.2.x86_64.rpm
1a11efbd275ebcd3d758bfbba02a0992 mes5/x86_64/firefox-pa_IN-10.0.12-0.1mdvmes5.2.x86_64.rpm
98aa0847b946f7342b31e4fd8e6b5535 mes5/x86_64/firefox-pl-10.0.12-0.1mdvmes5.2.x86_64.rpm
3df14cce3a10e9e4bff3aa7a41d76125 mes5/x86_64/firefox-pt_BR-10.0.12-0.1mdvmes5.2.x86_64.rpm
f18fe2bd2c293ee9b3ba123e67866ec7 mes5/x86_64/firefox-pt_PT-10.0.12-0.1mdvmes5.2.x86_64.rpm
61070062992c0b712c58c92271907243 mes5/x86_64/firefox-ro-10.0.12-0.1mdvmes5.2.x86_64.rpm
ed4a8fc4378462e55606478e1d92ef5a mes5/x86_64/firefox-ru-10.0.12-0.1mdvmes5.2.x86_64.rpm
00d839e039bb614ba50cabb88103755d mes5/x86_64/firefox-si-10.0.12-0.1mdvmes5.2.x86_64.rpm
93d25e236dbea61bf7593d0463dd8643 mes5/x86_64/firefox-sk-10.0.12-0.1mdvmes5.2.x86_64.rpm
17eb20f40351fd5e0e5a9077eafd716c mes5/x86_64/firefox-sl-10.0.12-0.1mdvmes5.2.x86_64.rpm
4bda3c464b1b1e628b5650a302b39524 mes5/x86_64/firefox-sq-10.0.12-0.1mdvmes5.2.x86_64.rpm
ccd95f763630b8484b5fd117eeddc197 mes5/x86_64/firefox-sr-10.0.12-0.1mdvmes5.2.x86_64.rpm
2ea10348ff1177ddf59d62153e1ddc71 mes5/x86_64/firefox-sv_SE-10.0.12-0.1mdvmes5.2.x86_64.rpm
df4ab9036f0bff7d9a7ce0c50748db3e mes5/x86_64/firefox-te-10.0.12-0.1mdvmes5.2.x86_64.rpm
b8ff0defe1b3b30ab0033471d5be7855 mes5/x86_64/firefox-th-10.0.12-0.1mdvmes5.2.x86_64.rpm
9cbbe714668283a7fd7a0bbb27568df9 mes5/x86_64/firefox-tr-10.0.12-0.1mdvmes5.2.x86_64.rpm
54ce6885a983b683cc8aedb1af764ae1 mes5/x86_64/firefox-uk-10.0.12-0.1mdvmes5.2.x86_64.rpm
ab2921983540572d129979470a9a7c7c mes5/x86_64/firefox-zh_CN-10.0.12-0.1mdvmes5.2.x86_64.rpm
f57ea6e4ab935376f5ae7ae6836ec029 mes5/x86_64/firefox-zh_TW-10.0.12-0.1mdvmes5.2.x86_64.rpm
999fc06a1f990adf5ea007f9dbc0487c mes5/x86_64/lib64nss3-3.14.1-0.1mdvmes5.2.x86_64.rpm
b34a6f2b1dc929f1d172fe4583edf21d mes5/x86_64/lib64nss-devel-3.14.1-0.1mdvmes5.2.x86_64.rpm
b8d0b295fba8cc9ce19cdef9597de9e7 mes5/x86_64/lib64nss-static-devel-3.14.1-0.1mdvmes5.2.x86_64.rpm
002686d95013a49ad1a6b28945213a9d mes5/x86_64/lib64xulrunner10.0.12-10.0.12-0.1mdvmes5.2.x86_64.rpm
46c09addafd24a61662ad49ac52df5f7 mes5/x86_64/lib64xulrunner-devel-10.0.12-0.1mdvmes5.2.x86_64.rpm
c1c86f04afc39d1ac6c2705b9d6a4d42 mes5/x86_64/nss-3.14.1-0.1mdvmes5.2.x86_64.rpm
95bffee2ac111d0ec9effa96f7841ecc mes5/x86_64/rootcerts-20121229.00-1mdvmes5.2.x86_64.rpm
54c2119efa4bc067f6ea786139ef6aac mes5/x86_64/rootcerts-java-20121229.00-1mdvmes5.2.x86_64.rpm
c0b8c0b055c3279b1aca88c549a613e8 mes5/x86_64/xulrunner-10.0.12-0.1mdvmes5.2.x86_64.rpm
e8e89ae09156de53165df7e1be0be753 mes5/SRPMS/firefox-10.0.12-0.1mdvmes5.2.src.rpm
ae626ca038b1b222c80b8df684604519 mes5/SRPMS/firefox-l10n-10.0.12-0.1mdvmes5.2.src.rpm
8bb7847fd80ec7c831f442ec6153600f mes5/SRPMS/nss-3.14.1-0.1mdvmes5.2.src.rpm
677882e23b0d751aab5992de12ee58c8 mes5/SRPMS/rootcerts-20121229.00-1mdvmes5.2.src.rpm
8fafd87dca1aa4d1ea665292e00f7d98 mes5/SRPMS/xulrunner-10.0.12-0.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQ7XsJmqjQ0CJFipgRAlIiAJ0aJSsM/+wyE3VStjRsWTn/gnC0SwCg0t94
d0D4tqI+UfwJ8Pa8VJHqEr4=
=fZ5j
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close