what you don't know can hurt you

Mandriva Linux Security Advisory 2012-081

Mandriva Linux Security Advisory 2012-081
Posted May 24, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-081 - Security issues were identified and fixed in mozilla firefox. Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Using the Address Sanitizer tool, security researcher Aki Helin from OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect hashtable instead of being unlinked before being destroyed. Security research firm iDefense reported that researcher wushi of team509 discovered a memory corruption on Windows Vista and Windows 7 systems with hardware acceleration disabled or using incompatible video drivers. Various other issues have also been addressed.

tags | advisory
systems | linux, windows, mandriva, vista, 7
advisories | CVE-2012-0468, CVE-2012-0467, CVE-2012-0469, CVE-2012-0470, CVE-2012-0471, CVE-2012-0472, CVE-2012-0473, CVE-2012-0474, CVE-2012-0477, CVE-2012-0478, CVE-2011-3062, CVE-2012-0479
MD5 | 1b834a8034e8e9eb2a5c612ce032d3ce

Mandriva Linux Security Advisory 2012-081

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:081
http://www.mandriva.com/security/
_______________________________________________________________________

Package : firefox
Date : May 24, 2012
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Security issues were identified and fixed in mozilla firefox:

Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption
under certain circumstances, and we presume that with enough effort
at least some of these could be exploited to run arbitrary code
(CVE-2012-0468, CVE-2012-0467).

Using the Address Sanitizer tool, security researcher Aki Helin from
OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect
hashtable instead of being unlinked before being destroyed. When
it is destroyed, this causes a use-after-free, which is potentially
exploitable (CVE-2012-0469).

Using the Address Sanitizer tool, security researcher Atte Kettunen
from OUSPG found a heap corruption in gfxImageSurface which allows for
invalid frees and possible remote code execution. This happens due
to float error, resulting from graphics values being passed through
different number systems (CVE-2012-0470).

Anne van Kesteren of Opera Software found a multi-octet encoding
issue where certain octets will destroy the following octets in the
processing of some multibyte character sets. This can leave users
vulnerable to cross-site scripting (XSS) attacks on maliciously
crafted web pages (CVE-2012-0471).

Security research firm iDefense reported that researcher wushi of
team509 discovered a memory corruption on Windows Vista and Windows
7 systems with hardware acceleration disabled or using incompatible
video drivers. This is created by using cairo-dwrite to attempt to
render fonts on an unsupported code path. This corruption causes a
potentially exploitable crash on affected systems (CVE-2012-0472).

Mozilla community member Matias Juntunen discovered an error in
WebGLBuffer where FindMaxElementInSubArray receives wrong template
arguments from FindMaxUshortElement. This bug causes maximum index
to be computed incorrectly within WebGL.drawElements, allowing the
reading of illegal video memory (CVE-2012-0473).

Security researchers Jordi Chancel and Eddy Bordi reported that they
could short-circuit page loads to show the address of a different
site than what is loaded in the window in the addressbar. Security
researcher Chris McGowen independently reported the same flaw, and
further demonstrated that this could lead to loading scripts from
the attacker's site, leaving users vulnerable to cross-site scripting
(XSS) attacks (CVE-2012-0474).

Security researcher Masato Kinugawa found that during the decoding
of ISO-2022-KR and ISO-2022-CN character sets, characters near 1024
bytes are treated incorrectly, either doubling or deleting bytes. On
certain pages it might be possible for an attacker to pad the output of
the page such that these errors fall in the right place to affect the
structure of the page, allowing for cross-site script (XSS) injection
(CVE-2012-0477).

Mozilla community member Ms2ger found an image rendering issue
with WebGL when texImage2D uses use JSVAL_TO_OBJECT on arbitrary
objects. This can lead to a crash on a maliciously crafted web
page. While there is no evidence that this is directly exploitable,
there is a possibility of remote code execution (CVE-2012-0478).

Mateusz Jurczyk of the Google Security Team discovered an off-by-one
error in the OpenType Sanitizer using the Address Sanitizer tool. This
can lead to an out-of-bounds read and execution of an uninitialized
function pointer during parsing and possible remote code execution
(CVE-2011-3062).

Security researcher Jeroen van der Gun reported that if RSS or Atom
XML invalid content is loaded over HTTPS, the addressbar updates
to display the new location of the loaded resource, including SSL
indicators, while the main window still displays the previously loaded
content. This allows for phishing attacks where a malicious page can
spoof the identify of another seemingly secure site (CVE-2012-0479).

Additionally the OpenJDK java plugin (icedtea-web) has been upgraded
to the 1.1.5 version which has better support for firefox 10.x+.

The mozilla firefox packages has been upgraded to the latest version
(10.0.4) which is unaffected by these security flaws.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479
http://www.mozilla.org/security/announce/2012/mfsa2012-20.html
http://www.mozilla.org/security/announce/2012/mfsa2012-22.html
http://www.mozilla.org/security/announce/2012/mfsa2012-23.html
http://www.mozilla.org/security/announce/2012/mfsa2012-24.html
http://www.mozilla.org/security/announce/2012/mfsa2012-25.html
http://www.mozilla.org/security/announce/2012/mfsa2012-26.html
http://www.mozilla.org/security/announce/2012/mfsa2012-27.html
http://www.mozilla.org/security/announce/2012/mfsa2012-29.html
http://www.mozilla.org/security/announce/2012/mfsa2012-30.html
http://www.mozilla.org/security/announce/2012/mfsa2012-31.html
http://www.mozilla.org/security/announce/2012/mfsa2012-33.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
193b2b0679d513564e53284307f2102b mes5/i586/firefox-10.0.4-0.1mdvmes5.2.i586.rpm
6b2a368e5f7dd9d8b4c82d1a2cd14d57 mes5/i586/firefox-af-10.0.4-0.1mdvmes5.2.i586.rpm
fed44fb471b0c182dab2a9d83e1d5a8a mes5/i586/firefox-ar-10.0.4-0.1mdvmes5.2.i586.rpm
e934b53194435db948ddf167feeabff2 mes5/i586/firefox-be-10.0.4-0.1mdvmes5.2.i586.rpm
1029a3368c2e03c6e5fca29d919b95b1 mes5/i586/firefox-bg-10.0.4-0.1mdvmes5.2.i586.rpm
0acffa710c2ffd613248a5fea527a2c6 mes5/i586/firefox-bn-10.0.4-0.1mdvmes5.2.i586.rpm
fe36d262aa3837c06daf4c6d69b84108 mes5/i586/firefox-ca-10.0.4-0.1mdvmes5.2.i586.rpm
c6d115880df0d6c1587797c31fba8879 mes5/i586/firefox-cs-10.0.4-0.1mdvmes5.2.i586.rpm
9f581bb0b11552d002b3c399b7531968 mes5/i586/firefox-cy-10.0.4-0.1mdvmes5.2.i586.rpm
51ed7ecfcf67292847315994a746bbf3 mes5/i586/firefox-da-10.0.4-0.1mdvmes5.2.i586.rpm
94d85793d298a3eb8c75cebd898fbd6c mes5/i586/firefox-de-10.0.4-0.1mdvmes5.2.i586.rpm
3a880a7e39bac5a9b9fc160d51046b19 mes5/i586/firefox-devel-10.0.4-0.1mdvmes5.2.i586.rpm
1b604c75e4fd7e302ed2627a8147e7c1 mes5/i586/firefox-el-10.0.4-0.1mdvmes5.2.i586.rpm
efe949479fa2eaeb7a5be876caaa5049 mes5/i586/firefox-en_GB-10.0.4-0.1mdvmes5.2.i586.rpm
4c787581a75a5a8a5a14b4a3a20280f2 mes5/i586/firefox-eo-10.0.4-0.1mdvmes5.2.i586.rpm
646f56e3b288de9f1e39947f05969014 mes5/i586/firefox-es_AR-10.0.4-0.1mdvmes5.2.i586.rpm
3185f5ea5ba41dc9251617ff103841ab mes5/i586/firefox-es_ES-10.0.4-0.1mdvmes5.2.i586.rpm
241655d4834edc69928640717ecedd60 mes5/i586/firefox-et-10.0.4-0.1mdvmes5.2.i586.rpm
7c42f3b9eda430e9cc71bcec89a4a988 mes5/i586/firefox-eu-10.0.4-0.1mdvmes5.2.i586.rpm
808b3c7dcd7e3fdd638dcaf85ea92710 mes5/i586/firefox-fi-10.0.4-0.1mdvmes5.2.i586.rpm
4ca2cec95c0eb52b8cf0ddbc417d6fb7 mes5/i586/firefox-fr-10.0.4-0.1mdvmes5.2.i586.rpm
7e466b6cdee00044853b5d904de982b0 mes5/i586/firefox-fy-10.0.4-0.1mdvmes5.2.i586.rpm
2386807b47816840462a48f4307b73da mes5/i586/firefox-ga_IE-10.0.4-0.1mdvmes5.2.i586.rpm
39d9141bb98506677c406b350195571a mes5/i586/firefox-gl-10.0.4-0.1mdvmes5.2.i586.rpm
6d15fbe0824957df7248eb387c3703aa mes5/i586/firefox-gu_IN-10.0.4-0.1mdvmes5.2.i586.rpm
aae9db3b4a6b0fb4eb590454368aa7fc mes5/i586/firefox-he-10.0.4-0.1mdvmes5.2.i586.rpm
f196eab619bc51ef64f97bb620814253 mes5/i586/firefox-hi-10.0.4-0.1mdvmes5.2.i586.rpm
f069a4806971ea41b48d2af769d93132 mes5/i586/firefox-hu-10.0.4-0.1mdvmes5.2.i586.rpm
a3beac338a793a0a287fc1862462d068 mes5/i586/firefox-id-10.0.4-0.1mdvmes5.2.i586.rpm
6123e1459dc5b0bbe63b674d33995693 mes5/i586/firefox-is-10.0.4-0.1mdvmes5.2.i586.rpm
d73c85d5eefe09d6a3e91d0ccdb8d622 mes5/i586/firefox-it-10.0.4-0.1mdvmes5.2.i586.rpm
aaf9b48f8716e095ec7df1d19cad69c7 mes5/i586/firefox-ja-10.0.4-0.1mdvmes5.2.i586.rpm
cfa80f3ff847df2992fbb6405454e7ca mes5/i586/firefox-ka-10.0.4-0.1mdvmes5.2.i586.rpm
4fca93a01e923f4eb358aefc692cad67 mes5/i586/firefox-kn-10.0.4-0.1mdvmes5.2.i586.rpm
6ee5808baeff6813bd76e33e4f18d28e mes5/i586/firefox-ko-10.0.4-0.1mdvmes5.2.i586.rpm
0effcc290c9c326724ccfa28e7139ada mes5/i586/firefox-ku-10.0.4-0.1mdvmes5.2.i586.rpm
cc7675d4172f14c8940b49bbf61bb18e mes5/i586/firefox-lt-10.0.4-0.1mdvmes5.2.i586.rpm
a60078f103dfd3075d95097a31d62bd5 mes5/i586/firefox-lv-10.0.4-0.1mdvmes5.2.i586.rpm
2e2046d3e59ea8be6fa5eb4b45addb72 mes5/i586/firefox-mk-10.0.4-0.1mdvmes5.2.i586.rpm
f7ffed193940d943ae9631a6e8692eef mes5/i586/firefox-mr-10.0.4-0.1mdvmes5.2.i586.rpm
a9a6d3315312d9a6f4d5909e1b906b8f mes5/i586/firefox-nb_NO-10.0.4-0.1mdvmes5.2.i586.rpm
b632687cb2e381baba9c02421aadadfe mes5/i586/firefox-nl-10.0.4-0.1mdvmes5.2.i586.rpm
a9d63c103db37373a86e0e5648894987 mes5/i586/firefox-nn_NO-10.0.4-0.1mdvmes5.2.i586.rpm
84f88308a0db841160a2a0dd18aee4a1 mes5/i586/firefox-oc-10.0.4-0.1mdvmes5.2.i586.rpm
4dcc39e7525ccba672726c7f3cae8168 mes5/i586/firefox-pa_IN-10.0.4-0.1mdvmes5.2.i586.rpm
052c9e85efea6f6ed62ea53f5472e53b mes5/i586/firefox-pl-10.0.4-0.1mdvmes5.2.i586.rpm
77c518708e77a54817935af188e55477 mes5/i586/firefox-pt_BR-10.0.4-0.1mdvmes5.2.i586.rpm
99f055ac36c6d7fe56b9f3a6009d08da mes5/i586/firefox-pt_PT-10.0.4-0.1mdvmes5.2.i586.rpm
a442c67bf58bb90b96a54a234f24bd72 mes5/i586/firefox-ro-10.0.4-0.1mdvmes5.2.i586.rpm
164d1c5a9a15abf1063634159deba9f2 mes5/i586/firefox-ru-10.0.4-0.1mdvmes5.2.i586.rpm
32df9fd644919935a2bfbcc7421cd204 mes5/i586/firefox-si-10.0.4-0.1mdvmes5.2.i586.rpm
d80be6f7b223a2deaae25f6dec1b6370 mes5/i586/firefox-sk-10.0.4-0.1mdvmes5.2.i586.rpm
f4b629c6a8e892cb8571219f13879783 mes5/i586/firefox-sl-10.0.4-0.1mdvmes5.2.i586.rpm
cc1b2f9cf959bfbc96e5856d89b5adb8 mes5/i586/firefox-sq-10.0.4-0.1mdvmes5.2.i586.rpm
237d759dc2018d4b18e3d475709c8041 mes5/i586/firefox-sr-10.0.4-0.1mdvmes5.2.i586.rpm
7d79a7670c7833b7c2334f8ba55db0d4 mes5/i586/firefox-sv_SE-10.0.4-0.1mdvmes5.2.i586.rpm
d0ee70491cc8125fbbdf4256a635bd59 mes5/i586/firefox-te-10.0.4-0.1mdvmes5.2.i586.rpm
db978375a4a46f4d4d7c9e352a0a72cb mes5/i586/firefox-th-10.0.4-0.1mdvmes5.2.i586.rpm
d68633a0b80316f2893b15ad9c6b8fe7 mes5/i586/firefox-tr-10.0.4-0.1mdvmes5.2.i586.rpm
0a8b368dd05e641df6a2c78098a180e1 mes5/i586/firefox-uk-10.0.4-0.1mdvmes5.2.i586.rpm
66658c77030de0388b00260f8c344f47 mes5/i586/firefox-zh_CN-10.0.4-0.1mdvmes5.2.i586.rpm
c188b5e42b350bbd55493bdcde83860c mes5/i586/firefox-zh_TW-10.0.4-0.1mdvmes5.2.i586.rpm
30bfd413c74c33b9015d15cd3d9ada2b mes5/i586/icedtea-web-1.1.5-0.1mdvmes5.2.i586.rpm
70fca946067f3e89d68c32f5f6a9006a mes5/i586/icedtea-web-javadoc-1.1.5-0.1mdvmes5.2.i586.rpm
41534a23821ffaf40bee803faf0ec983 mes5/i586/libiw29-29-3.1mnb2.i586.rpm
19a2baf2b5445c8d4accbbbda1e4a6bd mes5/i586/libiw29-devel-29-3.1mnb2.i586.rpm
9cc77cc785d29e3e30bcf0c160c76799 mes5/i586/libvpx0-0.9.7-0.2mdvmes5.2.i586.rpm
a826b46bb2e25beed537a72ca05a9e20 mes5/i586/libvpx-devel-0.9.7-0.2mdvmes5.2.i586.rpm
c14d94ba2816633883c013303014a0b2 mes5/i586/libvpx-utils-0.9.7-0.2mdvmes5.2.i586.rpm
d579056b5b169241daf27841cc013790 mes5/i586/libxulrunner10.0.4-10.0.4-0.1mdvmes5.2.i586.rpm
adf745f8a727f3bcba53e596fd88950a mes5/i586/libxulrunner-devel-10.0.4-0.1mdvmes5.2.i586.rpm
9ea303afba3bb08905f6421b6493ecd4 mes5/i586/python-cython-0.15-0.1mdvmes5.2.i586.rpm
e56c57897156842a7ba4f90c472a47c9 mes5/i586/wireless-tools-29-3.1mnb2.i586.rpm
a0329158463abcbad918047c84186141 mes5/i586/xulrunner-10.0.4-0.1mdvmes5.2.i586.rpm
1e93694bd386fa384d62db462e0a4031 mes5/i586/yasm-1.1.0-0.1mdvmes5.2.i586.rpm
32ded032cb69d5c70178f9651d62e10b mes5/i586/yasm-devel-1.1.0-0.1mdvmes5.2.i586.rpm
feab3a138317b8df1d7a72eba74b2543 mes5/i586/yasm-python-1.1.0-0.1mdvmes5.2.i586.rpm
cab2fb3795af9ee2b730ab4609ff5d38 mes5/SRPMS/firefox-10.0.4-0.1mdvmes5.2.src.rpm
bd3fbc028e30d73714793c5fb08f8609 mes5/SRPMS/firefox-l10n-10.0.4-0.1mdvmes5.2.src.rpm
2522a91d944b8156c3ddb82fccc25539 mes5/SRPMS/icedtea-web-1.1.5-0.1mdvmes5.2.src.rpm
78481843cb9aa5279b0975d75242e809 mes5/SRPMS/libvpx-0.9.7-0.2mdvmes5.2.src.rpm
6d47b4c4cd98073ed9435bae941dd665 mes5/SRPMS/python-cython-0.15-0.1mdvmes5.2.src.rpm
34c2cc5a16145dfcc969c0224bffdae4 mes5/SRPMS/wireless-tools-29-3.1mnb2.src.rpm
e4f47ab68daf56f0a376ed5de58219cb mes5/SRPMS/xulrunner-10.0.4-0.1mdvmes5.2.src.rpm
38698452301ff1bd0eb5fb221a9d35d2 mes5/SRPMS/yasm-1.1.0-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
72143cae4c12bbf399202a03cfbc05cd mes5/x86_64/firefox-10.0.4-0.1mdvmes5.2.x86_64.rpm
d160a5a991f647a5bd6b4c0dd3562266 mes5/x86_64/firefox-af-10.0.4-0.1mdvmes5.2.x86_64.rpm
8753f1bbe4100b5f0314470a0cae3d8c mes5/x86_64/firefox-ar-10.0.4-0.1mdvmes5.2.x86_64.rpm
ff9d47d7ff3fd90958f9e951d0c76da9 mes5/x86_64/firefox-be-10.0.4-0.1mdvmes5.2.x86_64.rpm
35393856a12c8a6328726619eb303126 mes5/x86_64/firefox-bg-10.0.4-0.1mdvmes5.2.x86_64.rpm
4b6e778539052f275cb9b7bc09a6c4ae mes5/x86_64/firefox-bn-10.0.4-0.1mdvmes5.2.x86_64.rpm
0531167486bb429a92e35373d6b76fc2 mes5/x86_64/firefox-ca-10.0.4-0.1mdvmes5.2.x86_64.rpm
60d0cdcc11d04d0d6f26c2cd62f8a4d0 mes5/x86_64/firefox-cs-10.0.4-0.1mdvmes5.2.x86_64.rpm
63e3ae053f255455b50f1e6a1bfdd3c4 mes5/x86_64/firefox-cy-10.0.4-0.1mdvmes5.2.x86_64.rpm
b64491e5877443ca01497b98e39b68a7 mes5/x86_64/firefox-da-10.0.4-0.1mdvmes5.2.x86_64.rpm
5fd25b8b8147bc793951578d423f5595 mes5/x86_64/firefox-de-10.0.4-0.1mdvmes5.2.x86_64.rpm
69ec5adbb4ca050933956de9ff2f65fd mes5/x86_64/firefox-devel-10.0.4-0.1mdvmes5.2.x86_64.rpm
2c9dae2af88ffef107c7c7ad8c109e66 mes5/x86_64/firefox-el-10.0.4-0.1mdvmes5.2.x86_64.rpm
a11181e8b5534c94e5e895bd91697060 mes5/x86_64/firefox-en_GB-10.0.4-0.1mdvmes5.2.x86_64.rpm
2366be0bea1669c7556b3edb18a19cb6 mes5/x86_64/firefox-eo-10.0.4-0.1mdvmes5.2.x86_64.rpm
8d8816da7fe34870c0f1e1a2064b8560 mes5/x86_64/firefox-es_AR-10.0.4-0.1mdvmes5.2.x86_64.rpm
c53a83000c1f5e88e799b3a20176b1e6 mes5/x86_64/firefox-es_ES-10.0.4-0.1mdvmes5.2.x86_64.rpm
6d266df455ecc2a407ff1b3db3b62316 mes5/x86_64/firefox-et-10.0.4-0.1mdvmes5.2.x86_64.rpm
56e606eb0283317a74ac495bc93db377 mes5/x86_64/firefox-eu-10.0.4-0.1mdvmes5.2.x86_64.rpm
1ee31760392f7e567842fc60823af9d6 mes5/x86_64/firefox-fi-10.0.4-0.1mdvmes5.2.x86_64.rpm
a6bda9a063c0908786d37cf3ccc4ffee mes5/x86_64/firefox-fr-10.0.4-0.1mdvmes5.2.x86_64.rpm
0d6bc328dc776c74f3ee53fbc62deb33 mes5/x86_64/firefox-fy-10.0.4-0.1mdvmes5.2.x86_64.rpm
4413cdb1172541e31e149583c39869eb mes5/x86_64/firefox-ga_IE-10.0.4-0.1mdvmes5.2.x86_64.rpm
03ebe55c3e5de4687506a6fa978866cc mes5/x86_64/firefox-gl-10.0.4-0.1mdvmes5.2.x86_64.rpm
e00f877f64a468d3074b56535b5f272d mes5/x86_64/firefox-gu_IN-10.0.4-0.1mdvmes5.2.x86_64.rpm
02250f114481f7c38f127890fd74bf11 mes5/x86_64/firefox-he-10.0.4-0.1mdvmes5.2.x86_64.rpm
178981447a8dc0a19fded1c25a619ee7 mes5/x86_64/firefox-hi-10.0.4-0.1mdvmes5.2.x86_64.rpm
67f84f481561ca2a094f65fa5ecca25a mes5/x86_64/firefox-hu-10.0.4-0.1mdvmes5.2.x86_64.rpm
54e900d106c5623ca3b748cc60d64da5 mes5/x86_64/firefox-id-10.0.4-0.1mdvmes5.2.x86_64.rpm
36c928ff015d0070af08baebf209c151 mes5/x86_64/firefox-is-10.0.4-0.1mdvmes5.2.x86_64.rpm
cc1c1b9f15e22600b98ca8b4b456833a mes5/x86_64/firefox-it-10.0.4-0.1mdvmes5.2.x86_64.rpm
edb0b276a1d25031a96f9abf1ad9a511 mes5/x86_64/firefox-ja-10.0.4-0.1mdvmes5.2.x86_64.rpm
c011f295aec053f156ac3c3714aa0d5e mes5/x86_64/firefox-ka-10.0.4-0.1mdvmes5.2.x86_64.rpm
8312aea506245303dc54696e86681b8d mes5/x86_64/firefox-kn-10.0.4-0.1mdvmes5.2.x86_64.rpm
2a988ffefd6b988a812012030e0d4d10 mes5/x86_64/firefox-ko-10.0.4-0.1mdvmes5.2.x86_64.rpm
dc39ab0f62d0520cc84a94234235ca11 mes5/x86_64/firefox-ku-10.0.4-0.1mdvmes5.2.x86_64.rpm
30774bca94992d88644ddad3785fa1c7 mes5/x86_64/firefox-lt-10.0.4-0.1mdvmes5.2.x86_64.rpm
fc67b7a963fb8cb18cd892caef17df69 mes5/x86_64/firefox-lv-10.0.4-0.1mdvmes5.2.x86_64.rpm
4114f93c1a8951a445a047ce7b8b78c9 mes5/x86_64/firefox-mk-10.0.4-0.1mdvmes5.2.x86_64.rpm
93ad20b01148140463c2de67e52279a6 mes5/x86_64/firefox-mr-10.0.4-0.1mdvmes5.2.x86_64.rpm
2ae391524ed24ad727598f5e5d57d535 mes5/x86_64/firefox-nb_NO-10.0.4-0.1mdvmes5.2.x86_64.rpm
45ccf6143fce18549e19acd9af08b2ce mes5/x86_64/firefox-nl-10.0.4-0.1mdvmes5.2.x86_64.rpm
a983bde2fd2fccc985b9ec94304849eb mes5/x86_64/firefox-nn_NO-10.0.4-0.1mdvmes5.2.x86_64.rpm
6e4fc5cfa7087bdee36f4ad531a460d2 mes5/x86_64/firefox-oc-10.0.4-0.1mdvmes5.2.x86_64.rpm
610510a745dca777b915baa9f9fc1839 mes5/x86_64/firefox-pa_IN-10.0.4-0.1mdvmes5.2.x86_64.rpm
3d1cfd9dc0ea64666e5b74838fe8baae mes5/x86_64/firefox-pl-10.0.4-0.1mdvmes5.2.x86_64.rpm
9711952a5b20821b43214f50d4117bfd mes5/x86_64/firefox-pt_BR-10.0.4-0.1mdvmes5.2.x86_64.rpm
0081ebeac7e2b33f68e18656353c8ec5 mes5/x86_64/firefox-pt_PT-10.0.4-0.1mdvmes5.2.x86_64.rpm
76649e0ca0bc3e04ab05b207f76afef5 mes5/x86_64/firefox-ro-10.0.4-0.1mdvmes5.2.x86_64.rpm
88b591294728d5ccc16a95514f506a18 mes5/x86_64/firefox-ru-10.0.4-0.1mdvmes5.2.x86_64.rpm
f94710f67887628e5445635884d8177f mes5/x86_64/firefox-si-10.0.4-0.1mdvmes5.2.x86_64.rpm
cccca986e16c4606364c5632b5e155ad mes5/x86_64/firefox-sk-10.0.4-0.1mdvmes5.2.x86_64.rpm
af6d6a0875198e2c4644a58f35360b6a mes5/x86_64/firefox-sl-10.0.4-0.1mdvmes5.2.x86_64.rpm
2892de558bb26ddf6dd54ee41d4fab4a mes5/x86_64/firefox-sq-10.0.4-0.1mdvmes5.2.x86_64.rpm
f9964fd7159176c06bfaa738d9c40b22 mes5/x86_64/firefox-sr-10.0.4-0.1mdvmes5.2.x86_64.rpm
1c4866b21a43f4ff2431cc06792262e0 mes5/x86_64/firefox-sv_SE-10.0.4-0.1mdvmes5.2.x86_64.rpm
7f622fd303551c606e6fa7d50c854184 mes5/x86_64/firefox-te-10.0.4-0.1mdvmes5.2.x86_64.rpm
1eedad05b14fbabc3e7290e92d4a48eb mes5/x86_64/firefox-th-10.0.4-0.1mdvmes5.2.x86_64.rpm
d1149e50d5329f8cd40859b1f7677d64 mes5/x86_64/firefox-tr-10.0.4-0.1mdvmes5.2.x86_64.rpm
85c659d6d503f4a18d60b2f3a68203ed mes5/x86_64/firefox-uk-10.0.4-0.1mdvmes5.2.x86_64.rpm
3a5a6799cce49930f7263ffebfa89b60 mes5/x86_64/firefox-zh_CN-10.0.4-0.1mdvmes5.2.x86_64.rpm
3e000a956e364becab89006a451862c7 mes5/x86_64/firefox-zh_TW-10.0.4-0.1mdvmes5.2.x86_64.rpm
9574c63a42f95318a1d93f756612396e mes5/x86_64/icedtea-web-1.1.5-0.1mdvmes5.2.x86_64.rpm
aecf70a7766eaf61e4ed42d059144569 mes5/x86_64/icedtea-web-javadoc-1.1.5-0.1mdvmes5.2.x86_64.rpm
3ef5b5b1a5618061c3f3a52c2548a3ca mes5/x86_64/lib64iw29-29-3.1mnb2.x86_64.rpm
b1654a4badb379c481291e538c96f4b6 mes5/x86_64/lib64iw29-devel-29-3.1mnb2.x86_64.rpm
2743fbc604ba116cf998077158593393 mes5/x86_64/lib64vpx0-0.9.7-0.2mdvmes5.2.x86_64.rpm
5250078fd1ecbcde1a8ee22876d4ead2 mes5/x86_64/lib64vpx-devel-0.9.7-0.2mdvmes5.2.x86_64.rpm
806d4a550abfefc37b2b9c0dee9f5031 mes5/x86_64/lib64xulrunner10.0.4-10.0.4-0.1mdvmes5.2.x86_64.rpm
5a6fe261614c225ecc006d6660bcd4ad mes5/x86_64/lib64xulrunner-devel-10.0.4-0.1mdvmes5.2.x86_64.rpm
1d04326581fe942201dd7cb415e4188d mes5/x86_64/libvpx-utils-0.9.7-0.2mdvmes5.2.x86_64.rpm
123d68df17b3c0e3bc226cb989d82e07 mes5/x86_64/python-cython-0.15-0.1mdvmes5.2.x86_64.rpm
758a5f09cce66dabd0991668da246d34 mes5/x86_64/wireless-tools-29-3.1mnb2.x86_64.rpm
9a6854a6f373d31db322ebe645900c54 mes5/x86_64/xulrunner-10.0.4-0.1mdvmes5.2.x86_64.rpm
fa368599864fdbdb114a4b16eb1873e3 mes5/x86_64/yasm-1.1.0-0.1mdvmes5.2.x86_64.rpm
3c64b6f6f8477bba975279301717d662 mes5/x86_64/yasm-devel-1.1.0-0.1mdvmes5.2.x86_64.rpm
7e03d96c771110bc6e686a33bb93c14b mes5/x86_64/yasm-python-1.1.0-0.1mdvmes5.2.x86_64.rpm
cab2fb3795af9ee2b730ab4609ff5d38 mes5/SRPMS/firefox-10.0.4-0.1mdvmes5.2.src.rpm
bd3fbc028e30d73714793c5fb08f8609 mes5/SRPMS/firefox-l10n-10.0.4-0.1mdvmes5.2.src.rpm
2522a91d944b8156c3ddb82fccc25539 mes5/SRPMS/icedtea-web-1.1.5-0.1mdvmes5.2.src.rpm
78481843cb9aa5279b0975d75242e809 mes5/SRPMS/libvpx-0.9.7-0.2mdvmes5.2.src.rpm
6d47b4c4cd98073ed9435bae941dd665 mes5/SRPMS/python-cython-0.15-0.1mdvmes5.2.src.rpm
34c2cc5a16145dfcc969c0224bffdae4 mes5/SRPMS/wireless-tools-29-3.1mnb2.src.rpm
e4f47ab68daf56f0a376ed5de58219cb mes5/SRPMS/xulrunner-10.0.4-0.1mdvmes5.2.src.rpm
38698452301ff1bd0eb5fb221a9d35d2 mes5/SRPMS/yasm-1.1.0-0.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPvh54mqjQ0CJFipgRAh1pAKCIKPTFajKHsqpt7dKyLmwTGSeHNgCg6w+I
ljs6Z5jE2CsfxsacA9/iaQQ=
=S92/
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

March 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    19 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    0 Files
  • 7
    Mar 7th
    0 Files
  • 8
    Mar 8th
    0 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    0 Files
  • 14
    Mar 14th
    0 Files
  • 15
    Mar 15th
    0 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close