exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2012-173

Mandriva Linux Security Advisory 2012-173
Posted Nov 21, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-173 - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Security researcher Atte Kettunen from OUSPG used the Address Sanitizer tool to discover a buffer overflow while rendering GIF format images. This issue is potentially exploitable and could lead to arbitrary code execution. Various other issues were also addressed.

tags | advisory, overflow, arbitrary, code execution
systems | linux, mandriva
advisories | CVE-2012-5842, CVE-2012-4202, CVE-2012-4201, CVE-2012-5841, CVE-2012-4207, CVE-2012-4209, CVE-2012-4210, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-5829, CVE-2012-5839, CVE-2012-5840, CVE-2012-5833, CVE-2012-5835
SHA-256 | 820a649b00028100a5269c4edfcc2cd80daf8b25e032c81ad040ddb62e795ce0

Mandriva Linux Security Advisory 2012-173

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:173
http://www.mandriva.com/security/
_______________________________________________________________________

Package : firefox
Date : November 21, 2012
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple security issue were identified and fixed in mozilla firefox:

Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code (CVE-2012-5842).

Security researcher Atte Kettunen from OUSPG used the Address
Sanitizer tool to discover a buffer overflow while rendering GIF
format images. This issue is potentially exploitable and could lead
to arbitrary code execution (CVE-2012-4202).

Mozilla security researcher moz_bug_r_a4 reported that if code executed
by the evalInSandbox function sets location.href, it can get the wrong
subject principal for the URL check, ignoring the sandbox's Javascript
context and gaining the context of evalInSandbox object. This can
lead to malicious web content being able to perform a cross-site
scripting (XSS) attack or stealing a copy of a local file if the user
has installed an add-on vulnerable to this attack (CVE-2012-4201).

Mozilla developer Bobby Holley reported that security wrappers filter
at the time of property access, but once a function is returned, the
caller can use this function without further security checks. This
affects cross-origin wrappers, allowing for write actions on objects
when only read actions should be properly allowed. This can lead to
cross-site scripting (XSS) attacks (CVE-2012-5841).

Security researcher Masato Kinugawa found when HZ-GB-2312 charset
encoding is used for text, the ~ character will destroy another
character near the chunk delimiter. This can lead to a cross-site
scripting (XSS) attack in pages encoded in HZ-GB-2312 (CVE-2012-4207).

Security researcher Mariusz Mlynski reported that the location property
can be accessed by binary plugins through top.location with a frame
whose name attribute's value is set to top. This can allow for possible
cross-site scripting (XSS) attacks through plugins (CVE-2012-4209).

Security researcher Mariusz Mlynski reported that when a maliciously
crafted stylesheet is inspected in the Style Inspector, HTML and CSS
can run in a chrome privileged context without being properly sanitized
first. This can lead to arbitrary code execution (CVE-2012-4210).

Security researcher Abhishek Arya (Inferno) of the Google Chrome
Security Team discovered a series critically rated of use-after-free
and buffer overflow issues using the Address Sanitizer tool in
shipped software. These issues are potentially exploitable, allowing
for remote code execution. We would also like to thank Abhishek for
reporting five additional use-after-free, out of bounds read, and
buffer overflow flaws introduced during Firefox development that
were fixed before general release (CVE-2012-4214, CVE-2012-4215,
CVE-2012-4216, CVE-2012-5829, CVE-2012-5839, CVE-2012-5840).

Security researcher miaubiz used the Address Sanitizer tool to
discover a series critically rated of use-after-free, buffer overflow,
and memory corruption issues in shipped software. These issues are
potentially exploitable, allowing for remote code execution. We would
also like to thank miaubiz for reporting two additional use-after-free
and memory corruption issues introduced during Firefox development
that were fixed before general release (CVE-2012-5833, CVE-2012-5835).

The mozilla firefox packages has been upgraded to the latest version
which is unaffected by these security flaws.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4202
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4201
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5841
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4207
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4209
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4210
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4215
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4216
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5839
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5833
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5835
http://www.mozilla.org/security/announce/2012/mfsa2012-91.html
http://www.mozilla.org/security/announce/2012/mfsa2012-92.html
http://www.mozilla.org/security/announce/2012/mfsa2012-93.html
http://www.mozilla.org/security/announce/2012/mfsa2012-100.html
http://www.mozilla.org/security/announce/2012/mfsa2012-101.html
http://www.mozilla.org/security/announce/2012/mfsa2012-103.html
http://www.mozilla.org/security/announce/2012/mfsa2012-104.html
http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
http://www.mozilla.org/security/announce/2012/mfsa2012-106.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
e9842af5d1972b33427d773538b477bd mes5/i586/firefox-10.0.11-0.1mdvmes5.2.i586.rpm
163eab10eb89eba84345f7719fb5cca5 mes5/i586/firefox-af-10.0.11-0.1mdvmes5.2.i586.rpm
46429a088f56053fccf230989369feb2 mes5/i586/firefox-ar-10.0.11-0.1mdvmes5.2.i586.rpm
8ccf96f0f8bd1ea81adbb7908a670366 mes5/i586/firefox-be-10.0.11-0.1mdvmes5.2.i586.rpm
652fb2ae54242619b6ec6594f308e56f mes5/i586/firefox-bg-10.0.11-0.1mdvmes5.2.i586.rpm
0f800592b46279760e1aeb2477951ac5 mes5/i586/firefox-bn-10.0.11-0.1mdvmes5.2.i586.rpm
490258ce0fd3dd5937eaa4656cc1a727 mes5/i586/firefox-ca-10.0.11-0.1mdvmes5.2.i586.rpm
9527b93a47d19351f57967e6ff6a3d2b mes5/i586/firefox-cs-10.0.11-0.1mdvmes5.2.i586.rpm
fa5748b333ba5ad274e548575c0710f8 mes5/i586/firefox-cy-10.0.11-0.1mdvmes5.2.i586.rpm
1c9b42d62d7d08e0f063320784da0bb8 mes5/i586/firefox-da-10.0.11-0.1mdvmes5.2.i586.rpm
2878d093ecc38d290c73b36d06c9bf33 mes5/i586/firefox-de-10.0.11-0.1mdvmes5.2.i586.rpm
c593030390554ec815db08982ff32076 mes5/i586/firefox-devel-10.0.11-0.1mdvmes5.2.i586.rpm
36fb652f80aafcebf73d53463475e4a5 mes5/i586/firefox-el-10.0.11-0.1mdvmes5.2.i586.rpm
7db2817696ac1690ac51d728198cb24b mes5/i586/firefox-en_GB-10.0.11-0.1mdvmes5.2.i586.rpm
ece684552902f550c9fa51f5a910f8a6 mes5/i586/firefox-eo-10.0.11-0.1mdvmes5.2.i586.rpm
282028b84cf674b4850cb5f1fdc60e44 mes5/i586/firefox-es_AR-10.0.11-0.1mdvmes5.2.i586.rpm
7680011bcc883a8546f75a814d2a4e2c mes5/i586/firefox-es_ES-10.0.11-0.1mdvmes5.2.i586.rpm
9aa4dcfaf5925cecb26982e84b338bd4 mes5/i586/firefox-et-10.0.11-0.1mdvmes5.2.i586.rpm
be1a9954f58cc28d8ff6bd6fb2b296e2 mes5/i586/firefox-eu-10.0.11-0.1mdvmes5.2.i586.rpm
fcbc8b81397a489d66bf036b97b4bdf6 mes5/i586/firefox-fi-10.0.11-0.1mdvmes5.2.i586.rpm
002a23128dd5e016f02f6567c603cbee mes5/i586/firefox-fr-10.0.11-0.1mdvmes5.2.i586.rpm
7f1f8caedaaf223deab0d03256e5432b mes5/i586/firefox-fy-10.0.11-0.1mdvmes5.2.i586.rpm
8f234e234ccc075007075cb527e22106 mes5/i586/firefox-ga_IE-10.0.11-0.1mdvmes5.2.i586.rpm
2696270066a9675a657ea6be714d834a mes5/i586/firefox-gl-10.0.11-0.1mdvmes5.2.i586.rpm
b15fec4dc2025f53f72af993f8b4855a mes5/i586/firefox-gu_IN-10.0.11-0.1mdvmes5.2.i586.rpm
313442bdae8fc0336d712151a96330d2 mes5/i586/firefox-he-10.0.11-0.1mdvmes5.2.i586.rpm
4ff935f762e203d75005e8f76a751f3f mes5/i586/firefox-hi-10.0.11-0.1mdvmes5.2.i586.rpm
daf18d84aed2d39003e0ea92ab0eb0da mes5/i586/firefox-hu-10.0.11-0.1mdvmes5.2.i586.rpm
88aa60a721f9a5fd22397ba7933ecc91 mes5/i586/firefox-id-10.0.11-0.1mdvmes5.2.i586.rpm
f4bd7a9e5b8f71ac2f01f23c4526611c mes5/i586/firefox-is-10.0.11-0.1mdvmes5.2.i586.rpm
37d1a140ba92868e3ebd7e50ce2da2d1 mes5/i586/firefox-it-10.0.11-0.1mdvmes5.2.i586.rpm
e9d90ff9194288bf439b87aa115bba8b mes5/i586/firefox-ja-10.0.11-0.1mdvmes5.2.i586.rpm
a01b8659f977530113804d593095d092 mes5/i586/firefox-ka-10.0.11-0.1mdvmes5.2.i586.rpm
a54732c58110e7ae7f874e115e765da2 mes5/i586/firefox-kn-10.0.11-0.1mdvmes5.2.i586.rpm
30889e994ceb978f146244127d75da17 mes5/i586/firefox-ko-10.0.11-0.1mdvmes5.2.i586.rpm
73c2fe4c1898d07b5dd48c978bdaf545 mes5/i586/firefox-ku-10.0.11-0.1mdvmes5.2.i586.rpm
cf36f4042e1b6888dd6fd73b66fab3ab mes5/i586/firefox-lt-10.0.11-0.1mdvmes5.2.i586.rpm
91e068ed1427a4d2d4ac0b0edd28936a mes5/i586/firefox-lv-10.0.11-0.1mdvmes5.2.i586.rpm
de4b50dbba24c6885dc72888450b998d mes5/i586/firefox-mk-10.0.11-0.1mdvmes5.2.i586.rpm
3ea389dc2a2b24404e5b3fe077f22292 mes5/i586/firefox-mr-10.0.11-0.1mdvmes5.2.i586.rpm
04a21affcb0541945940cdbc8684b4a5 mes5/i586/firefox-nb_NO-10.0.11-0.1mdvmes5.2.i586.rpm
9549ac3b17ad4b571aed3fa98f5f34b5 mes5/i586/firefox-nl-10.0.11-0.1mdvmes5.2.i586.rpm
653b41e5c85018f72246c577c3a32f4c mes5/i586/firefox-nn_NO-10.0.11-0.1mdvmes5.2.i586.rpm
6d868c97a035db27c414ddd2e20d9219 mes5/i586/firefox-oc-10.0.11-0.1mdvmes5.2.i586.rpm
9c6681e6a1d3f77817d93828c2b743c5 mes5/i586/firefox-pa_IN-10.0.11-0.1mdvmes5.2.i586.rpm
6605963e3432866efaed0415532a38b2 mes5/i586/firefox-pl-10.0.11-0.1mdvmes5.2.i586.rpm
f96cc74adce5113de35a28babfdf825d mes5/i586/firefox-pt_BR-10.0.11-0.1mdvmes5.2.i586.rpm
1966b294982ef3b07c5949c28d3fc740 mes5/i586/firefox-pt_PT-10.0.11-0.1mdvmes5.2.i586.rpm
bec89eb25ac41c40c09f3917219cd492 mes5/i586/firefox-ro-10.0.11-0.1mdvmes5.2.i586.rpm
8607de3efde5670cb1faa45a72f20886 mes5/i586/firefox-ru-10.0.11-0.1mdvmes5.2.i586.rpm
5f46f9f8ef534fe11a1a486631b5a407 mes5/i586/firefox-si-10.0.11-0.1mdvmes5.2.i586.rpm
36bc6263d7b2c4ab457774e354862a8d mes5/i586/firefox-sk-10.0.11-0.1mdvmes5.2.i586.rpm
6769986ced1d6fdba31b41892e064fc7 mes5/i586/firefox-sl-10.0.11-0.1mdvmes5.2.i586.rpm
c1f61f81e15e917d6946215fbedd22cc mes5/i586/firefox-sq-10.0.11-0.1mdvmes5.2.i586.rpm
4bb8e5c8b36543f3f69869abce3ce983 mes5/i586/firefox-sr-10.0.11-0.1mdvmes5.2.i586.rpm
c0a3aa2b596e74fa2ade9effb2c48cce mes5/i586/firefox-sv_SE-10.0.11-0.1mdvmes5.2.i586.rpm
0a68847d00b59631f1d86ec589ed24ab mes5/i586/firefox-te-10.0.11-0.1mdvmes5.2.i586.rpm
30f305a4520e7b5526d6aade0f5e40db mes5/i586/firefox-th-10.0.11-0.1mdvmes5.2.i586.rpm
ada8842b6b1e961312cc33b591a0cdb7 mes5/i586/firefox-tr-10.0.11-0.1mdvmes5.2.i586.rpm
495f57a1a4faabfdb90c5da67890c355 mes5/i586/firefox-uk-10.0.11-0.1mdvmes5.2.i586.rpm
da77cd4dee0be620e76f52ead5503da7 mes5/i586/firefox-zh_CN-10.0.11-0.1mdvmes5.2.i586.rpm
48f7d94ec079fa16a2681462a2d997e2 mes5/i586/firefox-zh_TW-10.0.11-0.1mdvmes5.2.i586.rpm
169b0dfa952e396d507e9d662c3a7021 mes5/i586/icedtea-web-1.1.7-0.2mdvmes5.2.i586.rpm
d7935eaccc6ff933a3d8a9149ff17067 mes5/i586/icedtea-web-javadoc-1.1.7-0.2mdvmes5.2.i586.rpm
90fe000f9959b0521dbee7ad40ff2a8d mes5/i586/libxulrunner10.0.11-10.0.11-0.1mdvmes5.2.i586.rpm
3465752b1899be1ee177115803c574e8 mes5/i586/libxulrunner-devel-10.0.11-0.1mdvmes5.2.i586.rpm
494b362eff9fdbe3986a9ad465d9c3ab mes5/i586/xulrunner-10.0.11-0.1mdvmes5.2.i586.rpm
e8d5e9b0828fb9c1d7c2831b52c3086b mes5/SRPMS/firefox-10.0.11-0.1mdvmes5.2.src.rpm
bb92a60f0d65d3d852674ff65c510ef4 mes5/SRPMS/firefox-l10n-10.0.11-0.1mdvmes5.2.src.rpm
0471f9637cb24d69bb60c23afd5e473a mes5/SRPMS/icedtea-web-1.1.7-0.2mdvmes5.2.src.rpm
dfa0ed329fddbf510189ff2ecdb7d13d mes5/SRPMS/xulrunner-10.0.11-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
25f7d8dc5f209cfca805a885ccb5c266 mes5/x86_64/firefox-10.0.11-0.1mdvmes5.2.x86_64.rpm
d6cc72a01e69cccc9d85adfd27a037ca mes5/x86_64/firefox-af-10.0.11-0.1mdvmes5.2.x86_64.rpm
a41261f54d3a36ab25efe1148912f29c mes5/x86_64/firefox-ar-10.0.11-0.1mdvmes5.2.x86_64.rpm
8d8288da71d81235f16195918c96c845 mes5/x86_64/firefox-be-10.0.11-0.1mdvmes5.2.x86_64.rpm
d6bff011d8ed553401ee265d7ddf130c mes5/x86_64/firefox-bg-10.0.11-0.1mdvmes5.2.x86_64.rpm
8ee8db17f9e26ba5a0a9aab38c0abec1 mes5/x86_64/firefox-bn-10.0.11-0.1mdvmes5.2.x86_64.rpm
5505a2b7c2bc411af92debba8bbc689c mes5/x86_64/firefox-ca-10.0.11-0.1mdvmes5.2.x86_64.rpm
ef1606cbf6a34714dab3cab1e3e76f09 mes5/x86_64/firefox-cs-10.0.11-0.1mdvmes5.2.x86_64.rpm
6dbe23edf77f7f18707c4b47a877a3bc mes5/x86_64/firefox-cy-10.0.11-0.1mdvmes5.2.x86_64.rpm
ed13622976007da6905d0a8076d85373 mes5/x86_64/firefox-da-10.0.11-0.1mdvmes5.2.x86_64.rpm
e48c2ce245169659bfe7ae87135cb564 mes5/x86_64/firefox-de-10.0.11-0.1mdvmes5.2.x86_64.rpm
c051cf4453b9c60e2d42059fc7b62c8e mes5/x86_64/firefox-devel-10.0.11-0.1mdvmes5.2.x86_64.rpm
be18025d4b22393b3c4a0e4b0d449001 mes5/x86_64/firefox-el-10.0.11-0.1mdvmes5.2.x86_64.rpm
d0c986d05719297fbda1725fe46d2ff4 mes5/x86_64/firefox-en_GB-10.0.11-0.1mdvmes5.2.x86_64.rpm
8f9cf9cfa80f11b4fedcce927d4e9132 mes5/x86_64/firefox-eo-10.0.11-0.1mdvmes5.2.x86_64.rpm
10c83bebe803d30d0fd9007dcc0bc040 mes5/x86_64/firefox-es_AR-10.0.11-0.1mdvmes5.2.x86_64.rpm
1725fe72cc619879f11cfa438d078cd1 mes5/x86_64/firefox-es_ES-10.0.11-0.1mdvmes5.2.x86_64.rpm
15cb5f958fddb42e067437554ca4b569 mes5/x86_64/firefox-et-10.0.11-0.1mdvmes5.2.x86_64.rpm
b7ff59dfc798fe35060b5d4b694f521d mes5/x86_64/firefox-eu-10.0.11-0.1mdvmes5.2.x86_64.rpm
adaae9a9a6a31c2eb81afc0a1bd4e09c mes5/x86_64/firefox-fi-10.0.11-0.1mdvmes5.2.x86_64.rpm
3a54af40ea336a85f979093e6d86e6c3 mes5/x86_64/firefox-fr-10.0.11-0.1mdvmes5.2.x86_64.rpm
7882218524fddd310daebc6a6dbbe81c mes5/x86_64/firefox-fy-10.0.11-0.1mdvmes5.2.x86_64.rpm
9f812e9f32b8175bb89bc6b066768cc0 mes5/x86_64/firefox-ga_IE-10.0.11-0.1mdvmes5.2.x86_64.rpm
6d0d5190e6a41676f45c002cf9732b2a mes5/x86_64/firefox-gl-10.0.11-0.1mdvmes5.2.x86_64.rpm
eb21fb9dc026788ef0041b7de58ea807 mes5/x86_64/firefox-gu_IN-10.0.11-0.1mdvmes5.2.x86_64.rpm
7a46994d5e7a672b818c760be080cfb7 mes5/x86_64/firefox-he-10.0.11-0.1mdvmes5.2.x86_64.rpm
f975046c9b260886d8ff883d6056df38 mes5/x86_64/firefox-hi-10.0.11-0.1mdvmes5.2.x86_64.rpm
ffa9e224fba80139474747710dae8df1 mes5/x86_64/firefox-hu-10.0.11-0.1mdvmes5.2.x86_64.rpm
5f9b4f68427a29dbcf17d74598bb5ba9 mes5/x86_64/firefox-id-10.0.11-0.1mdvmes5.2.x86_64.rpm
b7819799ae6387738bd76595816bb7a6 mes5/x86_64/firefox-is-10.0.11-0.1mdvmes5.2.x86_64.rpm
74ce6921aa16f447ff9bcaecc71f8a8c mes5/x86_64/firefox-it-10.0.11-0.1mdvmes5.2.x86_64.rpm
685ad427399543790181151d344d314f mes5/x86_64/firefox-ja-10.0.11-0.1mdvmes5.2.x86_64.rpm
f9506b51d63ba1670d3648fe7fc6554f mes5/x86_64/firefox-ka-10.0.11-0.1mdvmes5.2.x86_64.rpm
61c95d0e7c361fbd51e76f598212dcc7 mes5/x86_64/firefox-kn-10.0.11-0.1mdvmes5.2.x86_64.rpm
d46d2bc26f31d97f84aadc1f69d0c009 mes5/x86_64/firefox-ko-10.0.11-0.1mdvmes5.2.x86_64.rpm
78b4acd9c536260fbd2dfe1cd2684919 mes5/x86_64/firefox-ku-10.0.11-0.1mdvmes5.2.x86_64.rpm
ca758c32bd27ab105dbd10212a0aeee8 mes5/x86_64/firefox-lt-10.0.11-0.1mdvmes5.2.x86_64.rpm
09b869575dfd6d52e8c0660d5d7d0c13 mes5/x86_64/firefox-lv-10.0.11-0.1mdvmes5.2.x86_64.rpm
c68e83331551d55fe01b6604550155ca mes5/x86_64/firefox-mk-10.0.11-0.1mdvmes5.2.x86_64.rpm
8a0a526ea86475bd2c81a0b9be3084de mes5/x86_64/firefox-mr-10.0.11-0.1mdvmes5.2.x86_64.rpm
639e2020be5fe63a11797c2fe6123cfc mes5/x86_64/firefox-nb_NO-10.0.11-0.1mdvmes5.2.x86_64.rpm
bae6113d22f9a058aabc1fe4dc839239 mes5/x86_64/firefox-nl-10.0.11-0.1mdvmes5.2.x86_64.rpm
cb79a085de2066fb31c703545d003623 mes5/x86_64/firefox-nn_NO-10.0.11-0.1mdvmes5.2.x86_64.rpm
8b090b8bd95759a65e6b1253b5a8a9e0 mes5/x86_64/firefox-oc-10.0.11-0.1mdvmes5.2.x86_64.rpm
8688497f976dbae89bdf13c6e0025122 mes5/x86_64/firefox-pa_IN-10.0.11-0.1mdvmes5.2.x86_64.rpm
d6bc2ad6e2d8c8a1d4e8166fae3b4f3e mes5/x86_64/firefox-pl-10.0.11-0.1mdvmes5.2.x86_64.rpm
cfabec8c640752e190e33cda7b950514 mes5/x86_64/firefox-pt_BR-10.0.11-0.1mdvmes5.2.x86_64.rpm
727779dabfcb605120ac6df385d2e553 mes5/x86_64/firefox-pt_PT-10.0.11-0.1mdvmes5.2.x86_64.rpm
8901179a53c6b9a36f6f87ac1c26247d mes5/x86_64/firefox-ro-10.0.11-0.1mdvmes5.2.x86_64.rpm
2f7eba0ddf91d9e315ab3854987cd6d6 mes5/x86_64/firefox-ru-10.0.11-0.1mdvmes5.2.x86_64.rpm
85f088af209ce0b461700b3d2e447b77 mes5/x86_64/firefox-si-10.0.11-0.1mdvmes5.2.x86_64.rpm
c17761b2e6426d865fb30b0282eac8a0 mes5/x86_64/firefox-sk-10.0.11-0.1mdvmes5.2.x86_64.rpm
5316648945067571df061c8aa597fc7a mes5/x86_64/firefox-sl-10.0.11-0.1mdvmes5.2.x86_64.rpm
d30b355a2bf98380f761ca20fa14021d mes5/x86_64/firefox-sq-10.0.11-0.1mdvmes5.2.x86_64.rpm
d4d65b5395db7fa14d9d70b1780a1b1a mes5/x86_64/firefox-sr-10.0.11-0.1mdvmes5.2.x86_64.rpm
18376a4318ebae6f6da710dbdf27290e mes5/x86_64/firefox-sv_SE-10.0.11-0.1mdvmes5.2.x86_64.rpm
d61890d3fae4364689c17b644779e3ff mes5/x86_64/firefox-te-10.0.11-0.1mdvmes5.2.x86_64.rpm
7a0689047b6293a3851286d8a521f7bf mes5/x86_64/firefox-th-10.0.11-0.1mdvmes5.2.x86_64.rpm
009afe21569c4cac2f51fa4bd9d4ab7e mes5/x86_64/firefox-tr-10.0.11-0.1mdvmes5.2.x86_64.rpm
c4e97ff92a298095a0c43b9be420eeb5 mes5/x86_64/firefox-uk-10.0.11-0.1mdvmes5.2.x86_64.rpm
54129a5b0551cd831339bdc546cf6f4a mes5/x86_64/firefox-zh_CN-10.0.11-0.1mdvmes5.2.x86_64.rpm
34bc742e5c1bbf982a655f312180105c mes5/x86_64/firefox-zh_TW-10.0.11-0.1mdvmes5.2.x86_64.rpm
26c6b60b968a8b0b623bb2b88d79a64d mes5/x86_64/icedtea-web-1.1.7-0.2mdvmes5.2.x86_64.rpm
9e328c598f924dd5ecd49a4da49e2135 mes5/x86_64/icedtea-web-javadoc-1.1.7-0.2mdvmes5.2.x86_64.rpm
96bb3f61996cb9a3e0ba3f31a31c5093 mes5/x86_64/lib64xulrunner10.0.11-10.0.11-0.1mdvmes5.2.x86_64.rpm
780234e698d9e1bf6b5e746ebc6d73df mes5/x86_64/lib64xulrunner-devel-10.0.11-0.1mdvmes5.2.x86_64.rpm
12e2f8c7f6af1534a510bbe77f2e1e0e mes5/x86_64/xulrunner-10.0.11-0.1mdvmes5.2.x86_64.rpm
e8d5e9b0828fb9c1d7c2831b52c3086b mes5/SRPMS/firefox-10.0.11-0.1mdvmes5.2.src.rpm
bb92a60f0d65d3d852674ff65c510ef4 mes5/SRPMS/firefox-l10n-10.0.11-0.1mdvmes5.2.src.rpm
0471f9637cb24d69bb60c23afd5e473a mes5/SRPMS/icedtea-web-1.1.7-0.2mdvmes5.2.src.rpm
dfa0ed329fddbf510189ff2ecdb7d13d mes5/SRPMS/xulrunner-10.0.11-0.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQrNEImqjQ0CJFipgRAuslAJ9L7fqz1QX1XXEoHTe7IoQsqkJqHQCgmAhc
2q/3SEMSgO2gcJzg9OYMTf0=
=5LvU
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close