exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2012-146

Mandriva Linux Security Advisory 2012-146
Posted Aug 29, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-146 - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Security researcher Abhishek Arya of Google Chrome Security Team discovered a series of use-after-free issues using the Address Sanitizer tool. Many of these issues are potentially exploitable, allowing for remote code execution. Various other issues have also been addressed.

tags | advisory, remote, arbitrary, code execution
systems | linux, mandriva
advisories | CVE-2012-1971, CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964, CVE-2012-3966, CVE-2012-3967, CVE-2012-3968, CVE-2012-3969, CVE-2012-3970, CVE-2012-3972, CVE-2012-3974, CVE-2012-3976, CVE-2012-3978, CVE-2012-3980
SHA-256 | d9b0e412f5ed192520dfac9c307c9df27ba2b4bccfafea9d868885005ffef2eb

Mandriva Linux Security Advisory 2012-146

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:146
http://www.mandriva.com/security/
_______________________________________________________________________

Package : firefox
Date : August 29, 2012
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Security issues were identified and fixed in mozilla firefox:

Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code (CVE-2012-1971).

Security researcher Abhishek Arya (Inferno) of Google Chrome Security
Team discovered a series of use-after-free issues using the Address
Sanitizer tool. Many of these issues are potentially exploitable,
allowing for remote code execution (CVE-2012-1972, CVE-2012-1973,
CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956,
CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,
CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964).

Security researcher Frederic Hoguin reported two related issues with
the decoding of bitmap (.BMP) format images embedded in icon (.ICO)
format files. When processing a negative height header value for
the bitmap image, a memory corruption can be induced, allowing an
attacker to write random memory and cause a crash. This crash may be
potentially exploitable (CVE-2012-3966).

Security researcher miaubiz used the Address Sanitizer tool to
discover two WebGL issues. The first issue is a use-after-free when
WebGL shaders are called after being destroyed. The second issue
exposes a problem with Mesa drivers on Linux, leading to a potentially
exploitable crash (CVE-2012-3968, CVE-2012-3967).

Security researcher Arthur Gerkis used the Address Sanitizer
tool to find two issues involving Scalable Vector Graphics (SVG)
files. The first issue is a buffer overflow in Gecko's SVG filter
code when the sum of two values is too large to be stored as a
signed 32-bit integer, causing the function to write past the end
of an array. The second issue is a use-after-free when an element
with a requiredFeatures attribute is moved between documents. In that
situation, the internal representation of the requiredFeatures value
could be freed prematurely. Both issues are potentially exploitable
(CVE-2012-3969, CVE-2012-3970).

Security research Nicolas Gregoire used the Address Sanitizer tool to
discover an out-of-bounds read in the format-number feature of XSLT,
which can cause inaccurate formatting of numbers and information
leakage. This is not directly exploitable (CVE-2012-3972).

Security researcher Masato Kinugawa reported that if a crafted
executable is placed in the root partition on a Windows file system,
the Firefox and Thunderbird installer will launch this program after
a standard installation instead of Firefox or Thunderbird, running
this program with the user's privileges (CVE-2012-3974).

Security researcher Mark Poticha reported an issue where incorrect SSL
certificate information can be displayed on the addressbar, showing
the SSL data for a previous site while another has been loaded. This
is caused by two onLocationChange events being fired out of the
expected order, leading to the displayed certificate data to not be
updated. This can be used for phishing attacks by allowing the user
to input form or other data on a newer, attacking, site while the
credentials of an older site appear on the addressbar (CVE-2012-3976).

Mozilla security researcher moz_bug_r_a4 reported that certain
security checks in the location object can be bypassed if chrome code
is called content in a specific manner. This allowed for the loading
of restricted content. This can be combined with other issues to
become potentially exploitable (CVE-2012-3978).

Security researcher Colby Russell discovered that eval in the web
console can execute injected code with chrome privileges, leading to
the running of malicious code in a privileged context. This allows
for arbitrary code execution through a malicious web page if the web
console is invoked by the user (CVE-2012-3980).

The mozilla firefox packages has been upgraded to the latest version
which is unaffected by these security flaws.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1971
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3974
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980
http://www.mozilla.org/security/announce/2012/mfsa2012-57.html
http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
http://www.mozilla.org/security/announce/2012/mfsa2012-61.html
http://www.mozilla.org/security/announce/2012/mfsa2012-62.html
http://www.mozilla.org/security/announce/2012/mfsa2012-63.html
http://www.mozilla.org/security/announce/2012/mfsa2012-65.html
http://www.mozilla.org/security/announce/2012/mfsa2012-67.html
http://www.mozilla.org/security/announce/2012/mfsa2012-69.html
http://www.mozilla.org/security/announce/2012/mfsa2012-70.html
http://www.mozilla.org/security/announce/2012/mfsa2012-72.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
fcbec55ba52e0b11c5947003e7066ecc mes5/i586/firefox-10.0.7-0.1mdvmes5.2.i586.rpm
69e781b76cf89b2b0dc1f6c5a2587f69 mes5/i586/firefox-af-10.0.7-0.1mdvmes5.2.i586.rpm
5e1143f4a36b0f0fa9f9fa5dbe69bf74 mes5/i586/firefox-ar-10.0.7-0.1mdvmes5.2.i586.rpm
a5b6d0986d5d50643c0f63652d0cf6da mes5/i586/firefox-be-10.0.7-0.1mdvmes5.2.i586.rpm
de46085aed77ece7bcf3410fed855218 mes5/i586/firefox-bg-10.0.7-0.1mdvmes5.2.i586.rpm
033d26d8b7ffa30990566775f71ed014 mes5/i586/firefox-bn-10.0.7-0.1mdvmes5.2.i586.rpm
bd9c33de8f6e9739e3e532322ea907cc mes5/i586/firefox-ca-10.0.7-0.1mdvmes5.2.i586.rpm
278b9725691d87285327b25cf9df4f19 mes5/i586/firefox-cs-10.0.7-0.1mdvmes5.2.i586.rpm
e07e6b77227b3e5a6c8e693f7897a7c6 mes5/i586/firefox-cy-10.0.7-0.1mdvmes5.2.i586.rpm
1be7b0df137ae53163c53639db38b249 mes5/i586/firefox-da-10.0.7-0.1mdvmes5.2.i586.rpm
a473ba890d3e693ceff6d7b28b8db459 mes5/i586/firefox-de-10.0.7-0.1mdvmes5.2.i586.rpm
e706eb394a3b93c92d2f5cb41eb2d482 mes5/i586/firefox-devel-10.0.7-0.1mdvmes5.2.i586.rpm
35fefe64f1847a234f14d6454c36dfdd mes5/i586/firefox-el-10.0.7-0.1mdvmes5.2.i586.rpm
f67d327d07f01b5dc35b0788b6029e4f mes5/i586/firefox-en_GB-10.0.7-0.1mdvmes5.2.i586.rpm
efb2a36d66d0943cfc5a0f50c44cafbe mes5/i586/firefox-eo-10.0.7-0.1mdvmes5.2.i586.rpm
a515630d9e9f75a4e07324c49fe0f39f mes5/i586/firefox-es_AR-10.0.7-0.1mdvmes5.2.i586.rpm
e7289d7d4f715b602f9b5b219722fde5 mes5/i586/firefox-es_ES-10.0.7-0.1mdvmes5.2.i586.rpm
356623e92b60dd0ec8e5aa21d023f476 mes5/i586/firefox-et-10.0.7-0.1mdvmes5.2.i586.rpm
db379659607cb563f461a82ba2151414 mes5/i586/firefox-eu-10.0.7-0.1mdvmes5.2.i586.rpm
dc76516e74caa6c8059c9bc451d4d3d0 mes5/i586/firefox-fi-10.0.7-0.1mdvmes5.2.i586.rpm
feed65342fc82b9b892d9bc87eba193e mes5/i586/firefox-fr-10.0.7-0.1mdvmes5.2.i586.rpm
22473ff07a3f3b4a6651154805517e27 mes5/i586/firefox-fy-10.0.7-0.1mdvmes5.2.i586.rpm
f0fa6e4a6db83bfc5d99264b26d055a5 mes5/i586/firefox-ga_IE-10.0.7-0.1mdvmes5.2.i586.rpm
f2b2be55e8970a0df807229a60590e16 mes5/i586/firefox-gl-10.0.7-0.1mdvmes5.2.i586.rpm
b73947e4b1c2de2b0905a400e357c1a8 mes5/i586/firefox-gu_IN-10.0.7-0.1mdvmes5.2.i586.rpm
49e816a9a06268a94f2c20d278640f6a mes5/i586/firefox-he-10.0.7-0.1mdvmes5.2.i586.rpm
44f7ccad39468747fb00256a0c76b27a mes5/i586/firefox-hi-10.0.7-0.1mdvmes5.2.i586.rpm
91a0c7ec4815510fd2ce94ac3fd3b4d8 mes5/i586/firefox-hu-10.0.7-0.1mdvmes5.2.i586.rpm
a94730bb2ee63bdaf10105dfb074262f mes5/i586/firefox-id-10.0.7-0.1mdvmes5.2.i586.rpm
86e5c5103acdd6b4135552c9f58f3bfe mes5/i586/firefox-is-10.0.7-0.1mdvmes5.2.i586.rpm
d2aeb48e643846c8ac6a6b7a5b2fcd85 mes5/i586/firefox-it-10.0.7-0.1mdvmes5.2.i586.rpm
e0f37fed0e57efd1f71fab446a0075d2 mes5/i586/firefox-ja-10.0.7-0.1mdvmes5.2.i586.rpm
a4238b4bb39b9b4060ba243710fcc79c mes5/i586/firefox-ka-10.0.7-0.1mdvmes5.2.i586.rpm
4f001ec7bff801cfe4886e5ca87e1200 mes5/i586/firefox-kn-10.0.7-0.1mdvmes5.2.i586.rpm
8feef3bbe7606e591c2dd82943cf637e mes5/i586/firefox-ko-10.0.7-0.1mdvmes5.2.i586.rpm
b6e7a09db5fbaef9c73c844b6eaf1139 mes5/i586/firefox-ku-10.0.7-0.1mdvmes5.2.i586.rpm
5ef011c320877fec059ed69b10cfa49a mes5/i586/firefox-lt-10.0.7-0.1mdvmes5.2.i586.rpm
ee494281fb58ae03e384bdd2f71f5484 mes5/i586/firefox-lv-10.0.7-0.1mdvmes5.2.i586.rpm
79edd7d81be4e7493bab7a224b85fd60 mes5/i586/firefox-mk-10.0.7-0.1mdvmes5.2.i586.rpm
eafbb3d587a6054f412326dd06d95605 mes5/i586/firefox-mr-10.0.7-0.1mdvmes5.2.i586.rpm
bf2db73e5309abcd5f915d214c2769ce mes5/i586/firefox-nb_NO-10.0.7-0.1mdvmes5.2.i586.rpm
8903f2a4955552c9982370efb87b955e mes5/i586/firefox-nl-10.0.7-0.1mdvmes5.2.i586.rpm
37fedb60e08f22a7fc989036090ea09b mes5/i586/firefox-nn_NO-10.0.7-0.1mdvmes5.2.i586.rpm
335925f314b59f1a861db9b75c6eacf7 mes5/i586/firefox-oc-10.0.7-0.1mdvmes5.2.i586.rpm
67a746d463f233312883998a3c40af7e mes5/i586/firefox-pa_IN-10.0.7-0.1mdvmes5.2.i586.rpm
b6337c34a276004a804084d766419103 mes5/i586/firefox-pl-10.0.7-0.1mdvmes5.2.i586.rpm
f534017d734dd62f0f76175bddee1960 mes5/i586/firefox-pt_BR-10.0.7-0.1mdvmes5.2.i586.rpm
323a67ee2fce99cf4bed625759259c69 mes5/i586/firefox-pt_PT-10.0.7-0.1mdvmes5.2.i586.rpm
0af98ffa7b4b244198dfebfe34214b98 mes5/i586/firefox-ro-10.0.7-0.1mdvmes5.2.i586.rpm
b453d83222d1c55228decb8b6d386236 mes5/i586/firefox-ru-10.0.7-0.1mdvmes5.2.i586.rpm
fa8961b65b7ede9a5ac1a7493c109342 mes5/i586/firefox-si-10.0.7-0.1mdvmes5.2.i586.rpm
a04986d5fc842e471cd9706ace414cd9 mes5/i586/firefox-sk-10.0.7-0.1mdvmes5.2.i586.rpm
ba9ed46aad81f3c759583de439b4e957 mes5/i586/firefox-sl-10.0.7-0.1mdvmes5.2.i586.rpm
c8ff2dfa554ba675d5d73d39dc454f90 mes5/i586/firefox-sq-10.0.7-0.1mdvmes5.2.i586.rpm
30e4e7f0e21fedc3a3f90089c5971637 mes5/i586/firefox-sr-10.0.7-0.1mdvmes5.2.i586.rpm
22061d7dacccba1bc17c5ceccf75f79e mes5/i586/firefox-sv_SE-10.0.7-0.1mdvmes5.2.i586.rpm
f055e92f37b6bd62e14ad5d6b9d318c3 mes5/i586/firefox-te-10.0.7-0.1mdvmes5.2.i586.rpm
6c757b14598b6d694962095b8599cb64 mes5/i586/firefox-th-10.0.7-0.1mdvmes5.2.i586.rpm
e8037822bc768d574a06d1882d617bea mes5/i586/firefox-tr-10.0.7-0.1mdvmes5.2.i586.rpm
3cbd2655202e74c55eeedba1e80ad48b mes5/i586/firefox-uk-10.0.7-0.1mdvmes5.2.i586.rpm
aeaceee83de43535fb4d1e74ea66312d mes5/i586/firefox-zh_CN-10.0.7-0.1mdvmes5.2.i586.rpm
a2ad10b6c7937024d3ec105fb8e623e7 mes5/i586/firefox-zh_TW-10.0.7-0.1mdvmes5.2.i586.rpm
4ae9534d1028f935cca162d4865269b5 mes5/i586/icedtea-web-1.1.6-0.2mdvmes5.2.i586.rpm
4f889d64c942ca2acadc52255e9338e8 mes5/i586/icedtea-web-javadoc-1.1.6-0.2mdvmes5.2.i586.rpm
8aeb8b16115649e33b7c4fb29c07852d mes5/i586/libxulrunner10.0.7-10.0.7-0.1mdvmes5.2.i586.rpm
2702ec86b13931d056e9221b09813b10 mes5/i586/libxulrunner-devel-10.0.7-0.1mdvmes5.2.i586.rpm
775d71f59824b05203b85d5a48eb0d8c mes5/i586/xulrunner-10.0.7-0.1mdvmes5.2.i586.rpm
8b6ad945fd5bc40c57a54bce818654f3 mes5/SRPMS/firefox-10.0.7-0.1mdvmes5.2.src.rpm
1ab20cf712f7345436d46731207eb21b mes5/SRPMS/firefox-l10n-10.0.7-0.1mdvmes5.2.src.rpm
c7584ce8930548c9ccbb10cff962893e mes5/SRPMS/icedtea-web-1.1.6-0.2mdvmes5.2.src.rpm
0f22e9452893ca7990e5a2947196d308 mes5/SRPMS/xulrunner-10.0.7-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
1db11a3e3ac125f7ec9221c47a8eac04 mes5/x86_64/firefox-10.0.7-0.1mdvmes5.2.x86_64.rpm
b4ecb7f804b068f0a8def9f159c0b6d8 mes5/x86_64/firefox-af-10.0.7-0.1mdvmes5.2.x86_64.rpm
ca34b4f257e28020f5a2dfce1e411c94 mes5/x86_64/firefox-ar-10.0.7-0.1mdvmes5.2.x86_64.rpm
086f7e4ca20c45e016ebfb5a9938e48d mes5/x86_64/firefox-be-10.0.7-0.1mdvmes5.2.x86_64.rpm
cec1a690f6c37f7509b8728c8467dfda mes5/x86_64/firefox-bg-10.0.7-0.1mdvmes5.2.x86_64.rpm
558ebb730fe275fa3657c9fd3d4e8778 mes5/x86_64/firefox-bn-10.0.7-0.1mdvmes5.2.x86_64.rpm
ac9745e603d678877fdecf75609d83b9 mes5/x86_64/firefox-ca-10.0.7-0.1mdvmes5.2.x86_64.rpm
d200271764cfc86833ab7b1246cbcbf3 mes5/x86_64/firefox-cs-10.0.7-0.1mdvmes5.2.x86_64.rpm
f5c75c5923d7787eee634f5f1cb7dcdc mes5/x86_64/firefox-cy-10.0.7-0.1mdvmes5.2.x86_64.rpm
c68c9c15dbf5145b74991ac2b03be7e8 mes5/x86_64/firefox-da-10.0.7-0.1mdvmes5.2.x86_64.rpm
a344f6833ca0be9769e8dba8f7097845 mes5/x86_64/firefox-de-10.0.7-0.1mdvmes5.2.x86_64.rpm
f20e3d27aa35e2ba3e1bf785d5bc20dc mes5/x86_64/firefox-devel-10.0.7-0.1mdvmes5.2.x86_64.rpm
2ace8fac90df64b9930f7e3095588ce6 mes5/x86_64/firefox-el-10.0.7-0.1mdvmes5.2.x86_64.rpm
76a950078304f62b3f00b52ac66ba47b mes5/x86_64/firefox-en_GB-10.0.7-0.1mdvmes5.2.x86_64.rpm
d83301827d81e09407779411777219ca mes5/x86_64/firefox-eo-10.0.7-0.1mdvmes5.2.x86_64.rpm
821745b1cdf10f439feda4438191483f mes5/x86_64/firefox-es_AR-10.0.7-0.1mdvmes5.2.x86_64.rpm
d1969451b54e985da3af0efb9f6fa68e mes5/x86_64/firefox-es_ES-10.0.7-0.1mdvmes5.2.x86_64.rpm
cf2a47231da1c9a7e3866a888f820c7f mes5/x86_64/firefox-et-10.0.7-0.1mdvmes5.2.x86_64.rpm
1feda9d4a5ada97bb48fbf3b1ab4670e mes5/x86_64/firefox-eu-10.0.7-0.1mdvmes5.2.x86_64.rpm
391e978061d9ec83a924513dc264115d mes5/x86_64/firefox-fi-10.0.7-0.1mdvmes5.2.x86_64.rpm
a0b4a471830ed3125965edd0e69535eb mes5/x86_64/firefox-fr-10.0.7-0.1mdvmes5.2.x86_64.rpm
edd0c6ea652e265f2beaa7699614290e mes5/x86_64/firefox-fy-10.0.7-0.1mdvmes5.2.x86_64.rpm
4280eea7d44a9c5d69da159735624791 mes5/x86_64/firefox-ga_IE-10.0.7-0.1mdvmes5.2.x86_64.rpm
d02eeddf04af89b14bc9c7e35b2adebc mes5/x86_64/firefox-gl-10.0.7-0.1mdvmes5.2.x86_64.rpm
48a835d6b2dd0e27a5a03060bd62e319 mes5/x86_64/firefox-gu_IN-10.0.7-0.1mdvmes5.2.x86_64.rpm
5ea3a3b83745915550418c2fbfe376d9 mes5/x86_64/firefox-he-10.0.7-0.1mdvmes5.2.x86_64.rpm
3c5441222490068d3b2397c1e91f3a0a mes5/x86_64/firefox-hi-10.0.7-0.1mdvmes5.2.x86_64.rpm
e6b8c86fb3a66ae810ab2420b2bfd94c mes5/x86_64/firefox-hu-10.0.7-0.1mdvmes5.2.x86_64.rpm
a278ad98d9a9e7cb14636240432f04f4 mes5/x86_64/firefox-id-10.0.7-0.1mdvmes5.2.x86_64.rpm
57a4cdf10099e4540ee6b9487d35625f mes5/x86_64/firefox-is-10.0.7-0.1mdvmes5.2.x86_64.rpm
4a2d70e9f87bbc8a71c994eb4aa028a2 mes5/x86_64/firefox-it-10.0.7-0.1mdvmes5.2.x86_64.rpm
294aeb71e002b3fa1f2104e616acf017 mes5/x86_64/firefox-ja-10.0.7-0.1mdvmes5.2.x86_64.rpm
9c8a326e939128894a9ef17ffb24914e mes5/x86_64/firefox-ka-10.0.7-0.1mdvmes5.2.x86_64.rpm
b7743c262b27b927cc3e7bdd3252826e mes5/x86_64/firefox-kn-10.0.7-0.1mdvmes5.2.x86_64.rpm
15c7ed4a69f3d0f64e19585d287c35c2 mes5/x86_64/firefox-ko-10.0.7-0.1mdvmes5.2.x86_64.rpm
c8248281dcb7f48b4bffbae4064c5538 mes5/x86_64/firefox-ku-10.0.7-0.1mdvmes5.2.x86_64.rpm
dcbb3ab3cef14c812456298bd0cbf8ec mes5/x86_64/firefox-lt-10.0.7-0.1mdvmes5.2.x86_64.rpm
1b3cc568441fed8727d7fb2bc9d8e4d0 mes5/x86_64/firefox-lv-10.0.7-0.1mdvmes5.2.x86_64.rpm
fb61b984b2a0887c3f4515c62fc6fbaa mes5/x86_64/firefox-mk-10.0.7-0.1mdvmes5.2.x86_64.rpm
2e3fa27765d3ddc7cd6b627f082f7ef4 mes5/x86_64/firefox-mr-10.0.7-0.1mdvmes5.2.x86_64.rpm
dc44a85a1e0053a3c43bf935c454ccce mes5/x86_64/firefox-nb_NO-10.0.7-0.1mdvmes5.2.x86_64.rpm
285bba7945465696325bb90cdbb8ba61 mes5/x86_64/firefox-nl-10.0.7-0.1mdvmes5.2.x86_64.rpm
5e9bfbf8863d8950eca2f5da36f9d64e mes5/x86_64/firefox-nn_NO-10.0.7-0.1mdvmes5.2.x86_64.rpm
2d791ff5959f201dbe87c0b9f4e169e2 mes5/x86_64/firefox-oc-10.0.7-0.1mdvmes5.2.x86_64.rpm
c0441ff82b0e7a180ca8b2aef1582f5d mes5/x86_64/firefox-pa_IN-10.0.7-0.1mdvmes5.2.x86_64.rpm
f00dd512f2d3ebfb7a0dc1b8ae370bb9 mes5/x86_64/firefox-pl-10.0.7-0.1mdvmes5.2.x86_64.rpm
406ff5f761f72e02686fd17cda5e3631 mes5/x86_64/firefox-pt_BR-10.0.7-0.1mdvmes5.2.x86_64.rpm
2a303fabb8e65cfdeed1a8e0bf3b0c1a mes5/x86_64/firefox-pt_PT-10.0.7-0.1mdvmes5.2.x86_64.rpm
f2ca00d91890435844016f9326632df8 mes5/x86_64/firefox-ro-10.0.7-0.1mdvmes5.2.x86_64.rpm
a912734fdfecd3a8f16ee86ab0b36b26 mes5/x86_64/firefox-ru-10.0.7-0.1mdvmes5.2.x86_64.rpm
7ed6bc27f528e3d5b7cdb70e0c702f5f mes5/x86_64/firefox-si-10.0.7-0.1mdvmes5.2.x86_64.rpm
cb42f6b4a41e33551586649b4be9c4b1 mes5/x86_64/firefox-sk-10.0.7-0.1mdvmes5.2.x86_64.rpm
603dab1ad3b242d71fb9a5c85a7cac0d mes5/x86_64/firefox-sl-10.0.7-0.1mdvmes5.2.x86_64.rpm
47a35ac761cbdb9d580904a6d543eb38 mes5/x86_64/firefox-sq-10.0.7-0.1mdvmes5.2.x86_64.rpm
7a52ffaf01a4fdb52031d3d3f23511cf mes5/x86_64/firefox-sr-10.0.7-0.1mdvmes5.2.x86_64.rpm
8378248455687366ebbd770aec46946f mes5/x86_64/firefox-sv_SE-10.0.7-0.1mdvmes5.2.x86_64.rpm
16761ec116a4d45836d3985dfff28bfc mes5/x86_64/firefox-te-10.0.7-0.1mdvmes5.2.x86_64.rpm
128ee75f12bcfdafc7dc6b2e9dfd91a0 mes5/x86_64/firefox-th-10.0.7-0.1mdvmes5.2.x86_64.rpm
4a687c9ce1a6003ff87f9f49b4757d64 mes5/x86_64/firefox-tr-10.0.7-0.1mdvmes5.2.x86_64.rpm
a1f0983099bade0f341084a6366e8867 mes5/x86_64/firefox-uk-10.0.7-0.1mdvmes5.2.x86_64.rpm
e5061439a7a8332aea6e20595b349f43 mes5/x86_64/firefox-zh_CN-10.0.7-0.1mdvmes5.2.x86_64.rpm
998e45c4a5bb3fc2e4b58216d6b2ad7e mes5/x86_64/firefox-zh_TW-10.0.7-0.1mdvmes5.2.x86_64.rpm
213aebc998ef70cd83d026018e4978d1 mes5/x86_64/icedtea-web-1.1.6-0.2mdvmes5.2.x86_64.rpm
41e1974a399250c0d1ebe6fc56a2b962 mes5/x86_64/icedtea-web-javadoc-1.1.6-0.2mdvmes5.2.x86_64.rpm
c376e9649d45036bcd9bb5f6897450ef mes5/x86_64/lib64xulrunner10.0.7-10.0.7-0.1mdvmes5.2.x86_64.rpm
ea4bfd9b54f44ecd69ed3173c56330be mes5/x86_64/lib64xulrunner-devel-10.0.7-0.1mdvmes5.2.x86_64.rpm
aac422eca0b954a452b9c3cfa6c9268d mes5/x86_64/xulrunner-10.0.7-0.1mdvmes5.2.x86_64.rpm
8b6ad945fd5bc40c57a54bce818654f3 mes5/SRPMS/firefox-10.0.7-0.1mdvmes5.2.src.rpm
1ab20cf712f7345436d46731207eb21b mes5/SRPMS/firefox-l10n-10.0.7-0.1mdvmes5.2.src.rpm
c7584ce8930548c9ccbb10cff962893e mes5/SRPMS/icedtea-web-1.1.6-0.2mdvmes5.2.src.rpm
0f22e9452893ca7990e5a2947196d308 mes5/SRPMS/xulrunner-10.0.7-0.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQPdrJmqjQ0CJFipgRAiqbAKCfwUxpe50rZn0/LzkL9jHGJyfxwACfUbMl
tImPHeex3t8I1P/c7QXF5Y4=
=eOt9
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close