-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2012:163 http://www.mandriva.com/security/ _______________________________________________________________________ Package : firefox Date : October 11, 2012 Affected: Enterprise Server 5.0 _______________________________________________________________________ Problem Description: Security issues were identified and fixed in mozilla firefox: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code (CVE-2012-3982). Mozilla developer Johnny Stenback discovered that several methods of a feature used for testing (DOMWindowUtils) are not protected by existing security checks, allowing these methods to be called through script by web pages. This was addressed by adding the existing security checks to these methods (CVE-2012-3986). Security researcher Soroush Dalili reported that a combination of invoking full screen mode and navigating backwards in history could, in some circumstances, cause a hang or crash due to a timing dependent use-after-free pointer reference. This crash may be potentially exploitable (CVE-2012-3988). Mozilla community member Alice White reported that when the GetProperty function is invoked through JSAPI, security checking can be bypassed when getting cross-origin properties. This potentially allowed for arbitrary code execution (CVE-2012-3991). Security researcher Mariusz Mlynski reported that the location property can be accessed by binary plugins through top.location and top can be shadowed by Object.defineProperty as well. This can allow for possible cross-site scripting (XSS) attacks through plugins (CVE-2012-3994). Security researcher Mariusz Mlynski reported that when InstallTrigger fails, it throws an error wrapped in a Chrome Object Wrapper (COW) that fails to specify exposed properties. These can then be added to the resulting object by an attacker, allowing access to chrome privileged functions through script. While investigating this issue, Mozilla security researcher moz_bug_r_a4 found that COW did not disallow accessing of properties from a standard prototype in some situations, even when the original issue had been fixed (CVE-2012-3993, CVE-2012-4184). Security researcher Mariusz Mlynski reported an issue with spoofing of the location property. In this issue, writes to location.hash can be used in concert with scripted history navigation to cause a specific website to be loaded into the history object. The baseURI can then be changed to this stored site, allowing an attacker to inject a script or intercept posted data posted to a location specified with a relative path (CVE-2012-3992). Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a series of use-after-free, buffer overflow, and out of bounds read issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting two additional use-after-free flaws introduced during Firefox 16 development and fixed before general release (CVE-2012-3995, CVE-2012-4179, CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183). Security researcher Atte Kettunen from OUSPG reported several heap memory corruption issues found using the Address Sanitizer tool. These issues are potentially exploitable, allowing for remote code execution (CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188). Security researcher miaubiz used the Address Sanitizer tool to discover a use-after-free in the IME State Manager code. This could lead to a potentially exploitable crash (CVE-2012-3990). The mozilla firefox packages has been upgraded to the latest version which is unaffected by these security flaws. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990 http://www.mozilla.org/security/announce/2012/mfsa2012-74.html http://www.mozilla.org/security/announce/2012/mfsa2012-77.html http://www.mozilla.org/security/announce/2012/mfsa2012-79.html http://www.mozilla.org/security/announce/2012/mfsa2012-81.html http://www.mozilla.org/security/announce/2012/mfsa2012-82.html http://www.mozilla.org/security/announce/2012/mfsa2012-83.html http://www.mozilla.org/security/announce/2012/mfsa2012-84.html http://www.mozilla.org/security/announce/2012/mfsa2012-85.html http://www.mozilla.org/security/announce/2012/mfsa2012-86.html http://www.mozilla.org/security/announce/2012/mfsa2012-87.html _______________________________________________________________________ Updated Packages: Mandriva Enterprise Server 5: 18b4958fa1973f702cbed84b9f20159c mes5/i586/firefox-10.0.8-0.1mdvmes5.2.i586.rpm 2647f6b7ad8f48070a427583916ad32a mes5/i586/firefox-af-10.0.8-0.1mdvmes5.2.i586.rpm f4b347adeb27ed23b86d5db6a206a3af mes5/i586/firefox-ar-10.0.8-0.1mdvmes5.2.i586.rpm 586df4b276be9436d53ef9fbd5fa5ed5 mes5/i586/firefox-be-10.0.8-0.1mdvmes5.2.i586.rpm 626cbcf39f47055c0699ec84788818e3 mes5/i586/firefox-bg-10.0.8-0.1mdvmes5.2.i586.rpm 0daca37b722b654b84d991d607edd450 mes5/i586/firefox-bn-10.0.8-0.1mdvmes5.2.i586.rpm dc8815fb6be57e3dcc1d4b9882835d9b mes5/i586/firefox-ca-10.0.8-0.1mdvmes5.2.i586.rpm f1aed3384b2496bf7db1dc1ed93dbf39 mes5/i586/firefox-cs-10.0.8-0.1mdvmes5.2.i586.rpm 424f954bd6cf5201bc18a8c14d891964 mes5/i586/firefox-cy-10.0.8-0.1mdvmes5.2.i586.rpm e404fd8b2e77ddfc3e0cec73ce66558b mes5/i586/firefox-da-10.0.8-0.1mdvmes5.2.i586.rpm d6df89a166f04e7f0d8d5092caeb416e mes5/i586/firefox-de-10.0.8-0.1mdvmes5.2.i586.rpm 564cc55029db0f3abd6477b784d545be mes5/i586/firefox-devel-10.0.8-0.1mdvmes5.2.i586.rpm 93ab5d7347369e61ccacfe39430127d9 mes5/i586/firefox-el-10.0.8-0.1mdvmes5.2.i586.rpm 26045064a52588b84caeea6630b40ea6 mes5/i586/firefox-en_GB-10.0.8-0.1mdvmes5.2.i586.rpm 911d31127d57ed6fc43e1c997d4e012f mes5/i586/firefox-eo-10.0.8-0.1mdvmes5.2.i586.rpm 247336e3fa7a13b944d7b97dc00ec234 mes5/i586/firefox-es_AR-10.0.8-0.1mdvmes5.2.i586.rpm df718458acb2846aa3e4c2db500d61b5 mes5/i586/firefox-es_ES-10.0.8-0.1mdvmes5.2.i586.rpm fb300c3216dfbc1de89374965cfc32a6 mes5/i586/firefox-et-10.0.8-0.1mdvmes5.2.i586.rpm 51f9c5d47f6f88b4ebf1abf565de599b mes5/i586/firefox-eu-10.0.8-0.1mdvmes5.2.i586.rpm 16b2ade910ccc3a0d5b7fff3c714b9e0 mes5/i586/firefox-fi-10.0.8-0.1mdvmes5.2.i586.rpm 53ccc7e83d96fd9c93de5c3c604f6bb0 mes5/i586/firefox-fr-10.0.8-0.1mdvmes5.2.i586.rpm f5a90820225a51076c77ee3b42696e47 mes5/i586/firefox-fy-10.0.8-0.1mdvmes5.2.i586.rpm bef5299da948e97be351deafe721370e mes5/i586/firefox-ga_IE-10.0.8-0.1mdvmes5.2.i586.rpm 5438439ac7afa1a625700d6eff790acb mes5/i586/firefox-gl-10.0.8-0.1mdvmes5.2.i586.rpm 7a75e4a2f2d496a435f3d264cf3302ab mes5/i586/firefox-gu_IN-10.0.8-0.1mdvmes5.2.i586.rpm c54843a324535ae7de0af6b5432448a0 mes5/i586/firefox-he-10.0.8-0.1mdvmes5.2.i586.rpm 22dad8f088aa2790db88c7cdcd6c17e3 mes5/i586/firefox-hi-10.0.8-0.1mdvmes5.2.i586.rpm 71b0341b69f1ba7b062df4b8831b07cf mes5/i586/firefox-hu-10.0.8-0.1mdvmes5.2.i586.rpm 54a578b6c9bdffac785c42e2fcbe0752 mes5/i586/firefox-id-10.0.8-0.1mdvmes5.2.i586.rpm c7bac88f81d74a3e6bb84d6e53530114 mes5/i586/firefox-is-10.0.8-0.1mdvmes5.2.i586.rpm 6b0a05fe207de1cb70ede2bdc08a4fe6 mes5/i586/firefox-it-10.0.8-0.1mdvmes5.2.i586.rpm 2a5f7c384e6e8b604960e371ecc0994d mes5/i586/firefox-ja-10.0.8-0.1mdvmes5.2.i586.rpm c1a4d25f413532867f88ce512d8518cf mes5/i586/firefox-ka-10.0.8-0.1mdvmes5.2.i586.rpm 92cb841c8a4ff36d466486529e52e9b0 mes5/i586/firefox-kn-10.0.8-0.1mdvmes5.2.i586.rpm 7e7e48d65c67e701fe7e9520cef5b879 mes5/i586/firefox-ko-10.0.8-0.1mdvmes5.2.i586.rpm 00e266a86115a996be3729110f2c55fb mes5/i586/firefox-ku-10.0.8-0.1mdvmes5.2.i586.rpm 8204ae0e260820b38ab41512040e74e9 mes5/i586/firefox-lt-10.0.8-0.1mdvmes5.2.i586.rpm 277e5bcebb58210f58eca0260c9f0d7d mes5/i586/firefox-lv-10.0.8-0.1mdvmes5.2.i586.rpm e8875c4546bbc9ea23412bfb6d0d6d05 mes5/i586/firefox-mk-10.0.8-0.1mdvmes5.2.i586.rpm b4dc97b4578e0f5867d5e1d631a6935f mes5/i586/firefox-mr-10.0.8-0.1mdvmes5.2.i586.rpm a908016d1d790cc3730de8dd43d752df mes5/i586/firefox-nb_NO-10.0.8-0.1mdvmes5.2.i586.rpm 3db355e81b5d5a08cf40fec9516095dc mes5/i586/firefox-nl-10.0.8-0.1mdvmes5.2.i586.rpm f4b80bc1df63cc65600374da4d725b97 mes5/i586/firefox-nn_NO-10.0.8-0.1mdvmes5.2.i586.rpm 73a717cb9578ddf6da09419dcfd9b93e mes5/i586/firefox-oc-10.0.8-0.1mdvmes5.2.i586.rpm 570422becfa4a851c6e95040f2a5779b mes5/i586/firefox-pa_IN-10.0.8-0.1mdvmes5.2.i586.rpm f8c0bdc02309778de67ca878d60a557d mes5/i586/firefox-pl-10.0.8-0.1mdvmes5.2.i586.rpm 077f52791e93c41ba5db8353dd37dfe6 mes5/i586/firefox-pt_BR-10.0.8-0.1mdvmes5.2.i586.rpm e68c00ba970f2a3eb07eae58a90d1513 mes5/i586/firefox-pt_PT-10.0.8-0.1mdvmes5.2.i586.rpm 3b72179b06cb64f42658dee91eaf8340 mes5/i586/firefox-ro-10.0.8-0.1mdvmes5.2.i586.rpm c9aa2ea8cc85c88f7e5e56e249c7e7a6 mes5/i586/firefox-ru-10.0.8-0.1mdvmes5.2.i586.rpm fab410d8b6655dcdfe01deab8b67a64f mes5/i586/firefox-si-10.0.8-0.1mdvmes5.2.i586.rpm eb46c19ebc307ccce7e91e4d2f3c133b mes5/i586/firefox-sk-10.0.8-0.1mdvmes5.2.i586.rpm 18001364ee5341328bb68a49cce08b95 mes5/i586/firefox-sl-10.0.8-0.1mdvmes5.2.i586.rpm ff85462fd1eb970303b0eeeaf063157f mes5/i586/firefox-sq-10.0.8-0.1mdvmes5.2.i586.rpm c3b247291050d5ca28693e42a95a467e mes5/i586/firefox-sr-10.0.8-0.1mdvmes5.2.i586.rpm 2df9b8518aa5189d18bc67f781e2583b mes5/i586/firefox-sv_SE-10.0.8-0.1mdvmes5.2.i586.rpm 84774cda3b0c0f6c9f761c4e7798c980 mes5/i586/firefox-te-10.0.8-0.1mdvmes5.2.i586.rpm 523a30b0824d0fa8549c28099a398aa9 mes5/i586/firefox-th-10.0.8-0.1mdvmes5.2.i586.rpm 85cf36694236dc9812c642e6835968de mes5/i586/firefox-tr-10.0.8-0.1mdvmes5.2.i586.rpm 57b2c12673884904e041d881d7013f82 mes5/i586/firefox-uk-10.0.8-0.1mdvmes5.2.i586.rpm 4723206853faa1d6eee539649665d213 mes5/i586/firefox-zh_CN-10.0.8-0.1mdvmes5.2.i586.rpm bcdc27fcc1ebdfa52c6ff340b35198b8 mes5/i586/firefox-zh_TW-10.0.8-0.1mdvmes5.2.i586.rpm a90b6acf7e9ae7cb41cd9f0e8f65a35f mes5/i586/libxulrunner10.0.8-10.0.8-0.1mdvmes5.2.i586.rpm cf53e5f6eb711b41791ca45834d8409f mes5/i586/libxulrunner-devel-10.0.8-0.1mdvmes5.2.i586.rpm b8ffef485233d97bdb77f18f022aa9e8 mes5/i586/xulrunner-10.0.8-0.1mdvmes5.2.i586.rpm 6b5849f56718fddb19c22391919c6caf mes5/SRPMS/firefox-10.0.8-0.1mdvmes5.2.src.rpm 5f9f856717ec26737700be8ac851b2aa mes5/SRPMS/firefox-l10n-10.0.8-0.1mdvmes5.2.src.rpm 849d8b54de62cd1716ceeef8c36ee0e7 mes5/SRPMS/xulrunner-10.0.8-0.1mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: 0883a9f9de1db56f55296d7b8905c3d9 mes5/x86_64/firefox-10.0.8-0.1mdvmes5.2.x86_64.rpm 728177ae72a24b5631edae618bf1f29d mes5/x86_64/firefox-af-10.0.8-0.1mdvmes5.2.x86_64.rpm 80d65f878a19d6af07ea2090c78fb609 mes5/x86_64/firefox-ar-10.0.8-0.1mdvmes5.2.x86_64.rpm 8f55497903c4db05888415acc1aba830 mes5/x86_64/firefox-be-10.0.8-0.1mdvmes5.2.x86_64.rpm 3eece7dc190cfbf26514b7216afa81b8 mes5/x86_64/firefox-bg-10.0.8-0.1mdvmes5.2.x86_64.rpm c3d70e1661ea6532013d94b7a8ae5b33 mes5/x86_64/firefox-bn-10.0.8-0.1mdvmes5.2.x86_64.rpm de69ce78464063544a83d21bd58ad349 mes5/x86_64/firefox-ca-10.0.8-0.1mdvmes5.2.x86_64.rpm 6980ac75c0e8a332401cbe65053c4bb3 mes5/x86_64/firefox-cs-10.0.8-0.1mdvmes5.2.x86_64.rpm 0904a7326bb39230f441bbed04bb04a0 mes5/x86_64/firefox-cy-10.0.8-0.1mdvmes5.2.x86_64.rpm e6443a05c458defa2dd5615a7efe58c3 mes5/x86_64/firefox-da-10.0.8-0.1mdvmes5.2.x86_64.rpm aa6c761b14752eb1e77199cd6e4f4db7 mes5/x86_64/firefox-de-10.0.8-0.1mdvmes5.2.x86_64.rpm a86aa716be097d55f0b377729d03e2d1 mes5/x86_64/firefox-devel-10.0.8-0.1mdvmes5.2.x86_64.rpm 5b57f19ff04195a6ed7db74d4d4b0c97 mes5/x86_64/firefox-el-10.0.8-0.1mdvmes5.2.x86_64.rpm c52cbbbb3dce82117db33db89a25b7e3 mes5/x86_64/firefox-en_GB-10.0.8-0.1mdvmes5.2.x86_64.rpm fbfe8900e210c473f6f2a012ef939c96 mes5/x86_64/firefox-eo-10.0.8-0.1mdvmes5.2.x86_64.rpm 561ae14e68dbaec1d0c156c8006fefec mes5/x86_64/firefox-es_AR-10.0.8-0.1mdvmes5.2.x86_64.rpm cb295d044f7c33152fc6acf6dbef0f20 mes5/x86_64/firefox-es_ES-10.0.8-0.1mdvmes5.2.x86_64.rpm 070c54ec44bdd92ce15e0dd4a8f8d632 mes5/x86_64/firefox-et-10.0.8-0.1mdvmes5.2.x86_64.rpm 0bbeb506fa06563d4342b961a94e46dd mes5/x86_64/firefox-eu-10.0.8-0.1mdvmes5.2.x86_64.rpm ba9089fae63396324c43e1e39735c01a mes5/x86_64/firefox-fi-10.0.8-0.1mdvmes5.2.x86_64.rpm 1460f5530b00b2885cccf72a823c5a46 mes5/x86_64/firefox-fr-10.0.8-0.1mdvmes5.2.x86_64.rpm ad94002972b598af90e58aba84f70855 mes5/x86_64/firefox-fy-10.0.8-0.1mdvmes5.2.x86_64.rpm cdbc3d8e32ec144db1812f5a2aeab5bb mes5/x86_64/firefox-ga_IE-10.0.8-0.1mdvmes5.2.x86_64.rpm 056b5b3b7a8cacc319041c0012e7ad4b mes5/x86_64/firefox-gl-10.0.8-0.1mdvmes5.2.x86_64.rpm cf0d943ecfdcd674f92c1395a28a5cbe mes5/x86_64/firefox-gu_IN-10.0.8-0.1mdvmes5.2.x86_64.rpm 2ca267ddb695bef714352bb0e57feb27 mes5/x86_64/firefox-he-10.0.8-0.1mdvmes5.2.x86_64.rpm e016aa204927dfa1011ea450a5e4feaa mes5/x86_64/firefox-hi-10.0.8-0.1mdvmes5.2.x86_64.rpm 551681f2abc572eaa256f64237f7c677 mes5/x86_64/firefox-hu-10.0.8-0.1mdvmes5.2.x86_64.rpm 245f7b0a90d9fe5dd9b0c706cda6eb2f mes5/x86_64/firefox-id-10.0.8-0.1mdvmes5.2.x86_64.rpm 77bf660ff93973d6090be707d4e09b28 mes5/x86_64/firefox-is-10.0.8-0.1mdvmes5.2.x86_64.rpm 150bdd42557bcbdf7022d13976d38b35 mes5/x86_64/firefox-it-10.0.8-0.1mdvmes5.2.x86_64.rpm 517e28cc738785c4402f4d0afe7203a9 mes5/x86_64/firefox-ja-10.0.8-0.1mdvmes5.2.x86_64.rpm 6438f7ba42be63c5efc9d0e1e8bde089 mes5/x86_64/firefox-ka-10.0.8-0.1mdvmes5.2.x86_64.rpm 795974bc965caaba283f8e78d3722f41 mes5/x86_64/firefox-kn-10.0.8-0.1mdvmes5.2.x86_64.rpm 0b1186e2a195bcd9074031c4bbce79f4 mes5/x86_64/firefox-ko-10.0.8-0.1mdvmes5.2.x86_64.rpm fd371a84eddf0bd6a11b9229304967cd mes5/x86_64/firefox-ku-10.0.8-0.1mdvmes5.2.x86_64.rpm 4865d702388379da81085e5ba1f5fd5a mes5/x86_64/firefox-lt-10.0.8-0.1mdvmes5.2.x86_64.rpm 57f79f47919b7cae7180a43d809944f6 mes5/x86_64/firefox-lv-10.0.8-0.1mdvmes5.2.x86_64.rpm d4ce166e82f27b41846f2a3404bd407b mes5/x86_64/firefox-mk-10.0.8-0.1mdvmes5.2.x86_64.rpm 357082d898ae70e8d2abec9da7f6d3ec mes5/x86_64/firefox-mr-10.0.8-0.1mdvmes5.2.x86_64.rpm 0e61d6a2f26dd11fc3c531e044a21402 mes5/x86_64/firefox-nb_NO-10.0.8-0.1mdvmes5.2.x86_64.rpm 5c39340673283f52a2c268207a221fa4 mes5/x86_64/firefox-nl-10.0.8-0.1mdvmes5.2.x86_64.rpm e8989e4b71f9e761db1a5eb2ab5ba772 mes5/x86_64/firefox-nn_NO-10.0.8-0.1mdvmes5.2.x86_64.rpm 0cdf48db846c7744e37cedc1b562806d mes5/x86_64/firefox-oc-10.0.8-0.1mdvmes5.2.x86_64.rpm 96da7ef1509716a8ecd89398de5c7cc8 mes5/x86_64/firefox-pa_IN-10.0.8-0.1mdvmes5.2.x86_64.rpm ba8ee24d071fb52cea5c1b2a550aa70b mes5/x86_64/firefox-pl-10.0.8-0.1mdvmes5.2.x86_64.rpm e692fc3231c443faf2e17f79333b735c mes5/x86_64/firefox-pt_BR-10.0.8-0.1mdvmes5.2.x86_64.rpm afa8d2ee0e1af4f066a48fc39149110e mes5/x86_64/firefox-pt_PT-10.0.8-0.1mdvmes5.2.x86_64.rpm f4ad6008159c2927efe3b19fd4512315 mes5/x86_64/firefox-ro-10.0.8-0.1mdvmes5.2.x86_64.rpm 54d3c7b448c3c25ab861873d936987b7 mes5/x86_64/firefox-ru-10.0.8-0.1mdvmes5.2.x86_64.rpm c905a26289fb94cc2dafb606f57f890e mes5/x86_64/firefox-si-10.0.8-0.1mdvmes5.2.x86_64.rpm 32d9b6865b5b6d558ab97b36d8719d45 mes5/x86_64/firefox-sk-10.0.8-0.1mdvmes5.2.x86_64.rpm 232ad0abe4270616befb65f0b2004482 mes5/x86_64/firefox-sl-10.0.8-0.1mdvmes5.2.x86_64.rpm 8ea61f2759c003713f2b9e504260d981 mes5/x86_64/firefox-sq-10.0.8-0.1mdvmes5.2.x86_64.rpm 8f4fdbd663bd27c4d5ab42411347a4a4 mes5/x86_64/firefox-sr-10.0.8-0.1mdvmes5.2.x86_64.rpm f83702a0a59009633d10251c19c3d926 mes5/x86_64/firefox-sv_SE-10.0.8-0.1mdvmes5.2.x86_64.rpm 3805edda674577f2e609f889ec57068b mes5/x86_64/firefox-te-10.0.8-0.1mdvmes5.2.x86_64.rpm 981974d5861ece6999832b94026288b5 mes5/x86_64/firefox-th-10.0.8-0.1mdvmes5.2.x86_64.rpm 799e5c4479f9e4078395f17255c9d395 mes5/x86_64/firefox-tr-10.0.8-0.1mdvmes5.2.x86_64.rpm 4ddfcf42ff77710b44ad927c8e165a04 mes5/x86_64/firefox-uk-10.0.8-0.1mdvmes5.2.x86_64.rpm e9873026b2a5731c3f02e3bd6207cc61 mes5/x86_64/firefox-zh_CN-10.0.8-0.1mdvmes5.2.x86_64.rpm 4e80e8eae6e165bd3b9de77f56355e18 mes5/x86_64/firefox-zh_TW-10.0.8-0.1mdvmes5.2.x86_64.rpm 7399b9d40787e878941d927b2099cfd4 mes5/x86_64/lib64xulrunner10.0.8-10.0.8-0.1mdvmes5.2.x86_64.rpm 350953ef50ace31a4bdf0aac88ef26f9 mes5/x86_64/lib64xulrunner-devel-10.0.8-0.1mdvmes5.2.x86_64.rpm 3b728cc723a0d37366f7efb1055f68a1 mes5/x86_64/xulrunner-10.0.8-0.1mdvmes5.2.x86_64.rpm 6b5849f56718fddb19c22391919c6caf mes5/SRPMS/firefox-10.0.8-0.1mdvmes5.2.src.rpm 5f9f856717ec26737700be8ac851b2aa mes5/SRPMS/firefox-l10n-10.0.8-0.1mdvmes5.2.src.rpm 849d8b54de62cd1716ceeef8c36ee0e7 mes5/SRPMS/xulrunner-10.0.8-0.1mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFQdp/zmqjQ0CJFipgRAoLvAJ418KmxlFghV0dHucmHAinnbYB7+wCg43rk +dRrxPXJ7+lTD3pZcdL5gu0= =dLD8 -----END PGP SIGNATURE-----