-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2012:173 http://www.mandriva.com/security/ _______________________________________________________________________ Package : firefox Date : November 21, 2012 Affected: Enterprise Server 5.0 _______________________________________________________________________ Problem Description: Multiple security issue were identified and fixed in mozilla firefox: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code (CVE-2012-5842). Security researcher Atte Kettunen from OUSPG used the Address Sanitizer tool to discover a buffer overflow while rendering GIF format images. This issue is potentially exploitable and could lead to arbitrary code execution (CVE-2012-4202). Mozilla security researcher moz_bug_r_a4 reported that if code executed by the evalInSandbox function sets location.href, it can get the wrong subject principal for the URL check, ignoring the sandbox's Javascript context and gaining the context of evalInSandbox object. This can lead to malicious web content being able to perform a cross-site scripting (XSS) attack or stealing a copy of a local file if the user has installed an add-on vulnerable to this attack (CVE-2012-4201). Mozilla developer Bobby Holley reported that security wrappers filter at the time of property access, but once a function is returned, the caller can use this function without further security checks. This affects cross-origin wrappers, allowing for write actions on objects when only read actions should be properly allowed. This can lead to cross-site scripting (XSS) attacks (CVE-2012-5841). Security researcher Masato Kinugawa found when HZ-GB-2312 charset encoding is used for text, the ~ character will destroy another character near the chunk delimiter. This can lead to a cross-site scripting (XSS) attack in pages encoded in HZ-GB-2312 (CVE-2012-4207). Security researcher Mariusz Mlynski reported that the location property can be accessed by binary plugins through top.location with a frame whose name attribute's value is set to top. This can allow for possible cross-site scripting (XSS) attacks through plugins (CVE-2012-4209). Security researcher Mariusz Mlynski reported that when a maliciously crafted stylesheet is inspected in the Style Inspector, HTML and CSS can run in a chrome privileged context without being properly sanitized first. This can lead to arbitrary code execution (CVE-2012-4210). Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a series critically rated of use-after-free and buffer overflow issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting five additional use-after-free, out of bounds read, and buffer overflow flaws introduced during Firefox development that were fixed before general release (CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-5829, CVE-2012-5839, CVE-2012-5840). Security researcher miaubiz used the Address Sanitizer tool to discover a series critically rated of use-after-free, buffer overflow, and memory corruption issues in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank miaubiz for reporting two additional use-after-free and memory corruption issues introduced during Firefox development that were fixed before general release (CVE-2012-5833, CVE-2012-5835). The mozilla firefox packages has been upgraded to the latest version which is unaffected by these security flaws. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5842 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4202 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4201 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5841 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4207 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4210 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4215 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4216 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5839 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5840 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5833 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5835 http://www.mozilla.org/security/announce/2012/mfsa2012-91.html http://www.mozilla.org/security/announce/2012/mfsa2012-92.html http://www.mozilla.org/security/announce/2012/mfsa2012-93.html http://www.mozilla.org/security/announce/2012/mfsa2012-100.html http://www.mozilla.org/security/announce/2012/mfsa2012-101.html http://www.mozilla.org/security/announce/2012/mfsa2012-103.html http://www.mozilla.org/security/announce/2012/mfsa2012-104.html http://www.mozilla.org/security/announce/2012/mfsa2012-105.html http://www.mozilla.org/security/announce/2012/mfsa2012-106.html _______________________________________________________________________ Updated Packages: Mandriva Enterprise Server 5: e9842af5d1972b33427d773538b477bd mes5/i586/firefox-10.0.11-0.1mdvmes5.2.i586.rpm 163eab10eb89eba84345f7719fb5cca5 mes5/i586/firefox-af-10.0.11-0.1mdvmes5.2.i586.rpm 46429a088f56053fccf230989369feb2 mes5/i586/firefox-ar-10.0.11-0.1mdvmes5.2.i586.rpm 8ccf96f0f8bd1ea81adbb7908a670366 mes5/i586/firefox-be-10.0.11-0.1mdvmes5.2.i586.rpm 652fb2ae54242619b6ec6594f308e56f mes5/i586/firefox-bg-10.0.11-0.1mdvmes5.2.i586.rpm 0f800592b46279760e1aeb2477951ac5 mes5/i586/firefox-bn-10.0.11-0.1mdvmes5.2.i586.rpm 490258ce0fd3dd5937eaa4656cc1a727 mes5/i586/firefox-ca-10.0.11-0.1mdvmes5.2.i586.rpm 9527b93a47d19351f57967e6ff6a3d2b mes5/i586/firefox-cs-10.0.11-0.1mdvmes5.2.i586.rpm fa5748b333ba5ad274e548575c0710f8 mes5/i586/firefox-cy-10.0.11-0.1mdvmes5.2.i586.rpm 1c9b42d62d7d08e0f063320784da0bb8 mes5/i586/firefox-da-10.0.11-0.1mdvmes5.2.i586.rpm 2878d093ecc38d290c73b36d06c9bf33 mes5/i586/firefox-de-10.0.11-0.1mdvmes5.2.i586.rpm c593030390554ec815db08982ff32076 mes5/i586/firefox-devel-10.0.11-0.1mdvmes5.2.i586.rpm 36fb652f80aafcebf73d53463475e4a5 mes5/i586/firefox-el-10.0.11-0.1mdvmes5.2.i586.rpm 7db2817696ac1690ac51d728198cb24b mes5/i586/firefox-en_GB-10.0.11-0.1mdvmes5.2.i586.rpm ece684552902f550c9fa51f5a910f8a6 mes5/i586/firefox-eo-10.0.11-0.1mdvmes5.2.i586.rpm 282028b84cf674b4850cb5f1fdc60e44 mes5/i586/firefox-es_AR-10.0.11-0.1mdvmes5.2.i586.rpm 7680011bcc883a8546f75a814d2a4e2c mes5/i586/firefox-es_ES-10.0.11-0.1mdvmes5.2.i586.rpm 9aa4dcfaf5925cecb26982e84b338bd4 mes5/i586/firefox-et-10.0.11-0.1mdvmes5.2.i586.rpm be1a9954f58cc28d8ff6bd6fb2b296e2 mes5/i586/firefox-eu-10.0.11-0.1mdvmes5.2.i586.rpm fcbc8b81397a489d66bf036b97b4bdf6 mes5/i586/firefox-fi-10.0.11-0.1mdvmes5.2.i586.rpm 002a23128dd5e016f02f6567c603cbee mes5/i586/firefox-fr-10.0.11-0.1mdvmes5.2.i586.rpm 7f1f8caedaaf223deab0d03256e5432b mes5/i586/firefox-fy-10.0.11-0.1mdvmes5.2.i586.rpm 8f234e234ccc075007075cb527e22106 mes5/i586/firefox-ga_IE-10.0.11-0.1mdvmes5.2.i586.rpm 2696270066a9675a657ea6be714d834a mes5/i586/firefox-gl-10.0.11-0.1mdvmes5.2.i586.rpm b15fec4dc2025f53f72af993f8b4855a mes5/i586/firefox-gu_IN-10.0.11-0.1mdvmes5.2.i586.rpm 313442bdae8fc0336d712151a96330d2 mes5/i586/firefox-he-10.0.11-0.1mdvmes5.2.i586.rpm 4ff935f762e203d75005e8f76a751f3f mes5/i586/firefox-hi-10.0.11-0.1mdvmes5.2.i586.rpm daf18d84aed2d39003e0ea92ab0eb0da mes5/i586/firefox-hu-10.0.11-0.1mdvmes5.2.i586.rpm 88aa60a721f9a5fd22397ba7933ecc91 mes5/i586/firefox-id-10.0.11-0.1mdvmes5.2.i586.rpm f4bd7a9e5b8f71ac2f01f23c4526611c mes5/i586/firefox-is-10.0.11-0.1mdvmes5.2.i586.rpm 37d1a140ba92868e3ebd7e50ce2da2d1 mes5/i586/firefox-it-10.0.11-0.1mdvmes5.2.i586.rpm e9d90ff9194288bf439b87aa115bba8b mes5/i586/firefox-ja-10.0.11-0.1mdvmes5.2.i586.rpm a01b8659f977530113804d593095d092 mes5/i586/firefox-ka-10.0.11-0.1mdvmes5.2.i586.rpm a54732c58110e7ae7f874e115e765da2 mes5/i586/firefox-kn-10.0.11-0.1mdvmes5.2.i586.rpm 30889e994ceb978f146244127d75da17 mes5/i586/firefox-ko-10.0.11-0.1mdvmes5.2.i586.rpm 73c2fe4c1898d07b5dd48c978bdaf545 mes5/i586/firefox-ku-10.0.11-0.1mdvmes5.2.i586.rpm cf36f4042e1b6888dd6fd73b66fab3ab mes5/i586/firefox-lt-10.0.11-0.1mdvmes5.2.i586.rpm 91e068ed1427a4d2d4ac0b0edd28936a mes5/i586/firefox-lv-10.0.11-0.1mdvmes5.2.i586.rpm de4b50dbba24c6885dc72888450b998d mes5/i586/firefox-mk-10.0.11-0.1mdvmes5.2.i586.rpm 3ea389dc2a2b24404e5b3fe077f22292 mes5/i586/firefox-mr-10.0.11-0.1mdvmes5.2.i586.rpm 04a21affcb0541945940cdbc8684b4a5 mes5/i586/firefox-nb_NO-10.0.11-0.1mdvmes5.2.i586.rpm 9549ac3b17ad4b571aed3fa98f5f34b5 mes5/i586/firefox-nl-10.0.11-0.1mdvmes5.2.i586.rpm 653b41e5c85018f72246c577c3a32f4c mes5/i586/firefox-nn_NO-10.0.11-0.1mdvmes5.2.i586.rpm 6d868c97a035db27c414ddd2e20d9219 mes5/i586/firefox-oc-10.0.11-0.1mdvmes5.2.i586.rpm 9c6681e6a1d3f77817d93828c2b743c5 mes5/i586/firefox-pa_IN-10.0.11-0.1mdvmes5.2.i586.rpm 6605963e3432866efaed0415532a38b2 mes5/i586/firefox-pl-10.0.11-0.1mdvmes5.2.i586.rpm f96cc74adce5113de35a28babfdf825d mes5/i586/firefox-pt_BR-10.0.11-0.1mdvmes5.2.i586.rpm 1966b294982ef3b07c5949c28d3fc740 mes5/i586/firefox-pt_PT-10.0.11-0.1mdvmes5.2.i586.rpm bec89eb25ac41c40c09f3917219cd492 mes5/i586/firefox-ro-10.0.11-0.1mdvmes5.2.i586.rpm 8607de3efde5670cb1faa45a72f20886 mes5/i586/firefox-ru-10.0.11-0.1mdvmes5.2.i586.rpm 5f46f9f8ef534fe11a1a486631b5a407 mes5/i586/firefox-si-10.0.11-0.1mdvmes5.2.i586.rpm 36bc6263d7b2c4ab457774e354862a8d mes5/i586/firefox-sk-10.0.11-0.1mdvmes5.2.i586.rpm 6769986ced1d6fdba31b41892e064fc7 mes5/i586/firefox-sl-10.0.11-0.1mdvmes5.2.i586.rpm c1f61f81e15e917d6946215fbedd22cc mes5/i586/firefox-sq-10.0.11-0.1mdvmes5.2.i586.rpm 4bb8e5c8b36543f3f69869abce3ce983 mes5/i586/firefox-sr-10.0.11-0.1mdvmes5.2.i586.rpm c0a3aa2b596e74fa2ade9effb2c48cce mes5/i586/firefox-sv_SE-10.0.11-0.1mdvmes5.2.i586.rpm 0a68847d00b59631f1d86ec589ed24ab mes5/i586/firefox-te-10.0.11-0.1mdvmes5.2.i586.rpm 30f305a4520e7b5526d6aade0f5e40db mes5/i586/firefox-th-10.0.11-0.1mdvmes5.2.i586.rpm ada8842b6b1e961312cc33b591a0cdb7 mes5/i586/firefox-tr-10.0.11-0.1mdvmes5.2.i586.rpm 495f57a1a4faabfdb90c5da67890c355 mes5/i586/firefox-uk-10.0.11-0.1mdvmes5.2.i586.rpm da77cd4dee0be620e76f52ead5503da7 mes5/i586/firefox-zh_CN-10.0.11-0.1mdvmes5.2.i586.rpm 48f7d94ec079fa16a2681462a2d997e2 mes5/i586/firefox-zh_TW-10.0.11-0.1mdvmes5.2.i586.rpm 169b0dfa952e396d507e9d662c3a7021 mes5/i586/icedtea-web-1.1.7-0.2mdvmes5.2.i586.rpm d7935eaccc6ff933a3d8a9149ff17067 mes5/i586/icedtea-web-javadoc-1.1.7-0.2mdvmes5.2.i586.rpm 90fe000f9959b0521dbee7ad40ff2a8d mes5/i586/libxulrunner10.0.11-10.0.11-0.1mdvmes5.2.i586.rpm 3465752b1899be1ee177115803c574e8 mes5/i586/libxulrunner-devel-10.0.11-0.1mdvmes5.2.i586.rpm 494b362eff9fdbe3986a9ad465d9c3ab mes5/i586/xulrunner-10.0.11-0.1mdvmes5.2.i586.rpm e8d5e9b0828fb9c1d7c2831b52c3086b mes5/SRPMS/firefox-10.0.11-0.1mdvmes5.2.src.rpm bb92a60f0d65d3d852674ff65c510ef4 mes5/SRPMS/firefox-l10n-10.0.11-0.1mdvmes5.2.src.rpm 0471f9637cb24d69bb60c23afd5e473a mes5/SRPMS/icedtea-web-1.1.7-0.2mdvmes5.2.src.rpm dfa0ed329fddbf510189ff2ecdb7d13d mes5/SRPMS/xulrunner-10.0.11-0.1mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: 25f7d8dc5f209cfca805a885ccb5c266 mes5/x86_64/firefox-10.0.11-0.1mdvmes5.2.x86_64.rpm d6cc72a01e69cccc9d85adfd27a037ca mes5/x86_64/firefox-af-10.0.11-0.1mdvmes5.2.x86_64.rpm a41261f54d3a36ab25efe1148912f29c mes5/x86_64/firefox-ar-10.0.11-0.1mdvmes5.2.x86_64.rpm 8d8288da71d81235f16195918c96c845 mes5/x86_64/firefox-be-10.0.11-0.1mdvmes5.2.x86_64.rpm d6bff011d8ed553401ee265d7ddf130c mes5/x86_64/firefox-bg-10.0.11-0.1mdvmes5.2.x86_64.rpm 8ee8db17f9e26ba5a0a9aab38c0abec1 mes5/x86_64/firefox-bn-10.0.11-0.1mdvmes5.2.x86_64.rpm 5505a2b7c2bc411af92debba8bbc689c mes5/x86_64/firefox-ca-10.0.11-0.1mdvmes5.2.x86_64.rpm ef1606cbf6a34714dab3cab1e3e76f09 mes5/x86_64/firefox-cs-10.0.11-0.1mdvmes5.2.x86_64.rpm 6dbe23edf77f7f18707c4b47a877a3bc mes5/x86_64/firefox-cy-10.0.11-0.1mdvmes5.2.x86_64.rpm ed13622976007da6905d0a8076d85373 mes5/x86_64/firefox-da-10.0.11-0.1mdvmes5.2.x86_64.rpm e48c2ce245169659bfe7ae87135cb564 mes5/x86_64/firefox-de-10.0.11-0.1mdvmes5.2.x86_64.rpm c051cf4453b9c60e2d42059fc7b62c8e mes5/x86_64/firefox-devel-10.0.11-0.1mdvmes5.2.x86_64.rpm be18025d4b22393b3c4a0e4b0d449001 mes5/x86_64/firefox-el-10.0.11-0.1mdvmes5.2.x86_64.rpm d0c986d05719297fbda1725fe46d2ff4 mes5/x86_64/firefox-en_GB-10.0.11-0.1mdvmes5.2.x86_64.rpm 8f9cf9cfa80f11b4fedcce927d4e9132 mes5/x86_64/firefox-eo-10.0.11-0.1mdvmes5.2.x86_64.rpm 10c83bebe803d30d0fd9007dcc0bc040 mes5/x86_64/firefox-es_AR-10.0.11-0.1mdvmes5.2.x86_64.rpm 1725fe72cc619879f11cfa438d078cd1 mes5/x86_64/firefox-es_ES-10.0.11-0.1mdvmes5.2.x86_64.rpm 15cb5f958fddb42e067437554ca4b569 mes5/x86_64/firefox-et-10.0.11-0.1mdvmes5.2.x86_64.rpm b7ff59dfc798fe35060b5d4b694f521d mes5/x86_64/firefox-eu-10.0.11-0.1mdvmes5.2.x86_64.rpm adaae9a9a6a31c2eb81afc0a1bd4e09c mes5/x86_64/firefox-fi-10.0.11-0.1mdvmes5.2.x86_64.rpm 3a54af40ea336a85f979093e6d86e6c3 mes5/x86_64/firefox-fr-10.0.11-0.1mdvmes5.2.x86_64.rpm 7882218524fddd310daebc6a6dbbe81c mes5/x86_64/firefox-fy-10.0.11-0.1mdvmes5.2.x86_64.rpm 9f812e9f32b8175bb89bc6b066768cc0 mes5/x86_64/firefox-ga_IE-10.0.11-0.1mdvmes5.2.x86_64.rpm 6d0d5190e6a41676f45c002cf9732b2a mes5/x86_64/firefox-gl-10.0.11-0.1mdvmes5.2.x86_64.rpm eb21fb9dc026788ef0041b7de58ea807 mes5/x86_64/firefox-gu_IN-10.0.11-0.1mdvmes5.2.x86_64.rpm 7a46994d5e7a672b818c760be080cfb7 mes5/x86_64/firefox-he-10.0.11-0.1mdvmes5.2.x86_64.rpm f975046c9b260886d8ff883d6056df38 mes5/x86_64/firefox-hi-10.0.11-0.1mdvmes5.2.x86_64.rpm ffa9e224fba80139474747710dae8df1 mes5/x86_64/firefox-hu-10.0.11-0.1mdvmes5.2.x86_64.rpm 5f9b4f68427a29dbcf17d74598bb5ba9 mes5/x86_64/firefox-id-10.0.11-0.1mdvmes5.2.x86_64.rpm b7819799ae6387738bd76595816bb7a6 mes5/x86_64/firefox-is-10.0.11-0.1mdvmes5.2.x86_64.rpm 74ce6921aa16f447ff9bcaecc71f8a8c mes5/x86_64/firefox-it-10.0.11-0.1mdvmes5.2.x86_64.rpm 685ad427399543790181151d344d314f mes5/x86_64/firefox-ja-10.0.11-0.1mdvmes5.2.x86_64.rpm f9506b51d63ba1670d3648fe7fc6554f mes5/x86_64/firefox-ka-10.0.11-0.1mdvmes5.2.x86_64.rpm 61c95d0e7c361fbd51e76f598212dcc7 mes5/x86_64/firefox-kn-10.0.11-0.1mdvmes5.2.x86_64.rpm d46d2bc26f31d97f84aadc1f69d0c009 mes5/x86_64/firefox-ko-10.0.11-0.1mdvmes5.2.x86_64.rpm 78b4acd9c536260fbd2dfe1cd2684919 mes5/x86_64/firefox-ku-10.0.11-0.1mdvmes5.2.x86_64.rpm ca758c32bd27ab105dbd10212a0aeee8 mes5/x86_64/firefox-lt-10.0.11-0.1mdvmes5.2.x86_64.rpm 09b869575dfd6d52e8c0660d5d7d0c13 mes5/x86_64/firefox-lv-10.0.11-0.1mdvmes5.2.x86_64.rpm c68e83331551d55fe01b6604550155ca mes5/x86_64/firefox-mk-10.0.11-0.1mdvmes5.2.x86_64.rpm 8a0a526ea86475bd2c81a0b9be3084de mes5/x86_64/firefox-mr-10.0.11-0.1mdvmes5.2.x86_64.rpm 639e2020be5fe63a11797c2fe6123cfc mes5/x86_64/firefox-nb_NO-10.0.11-0.1mdvmes5.2.x86_64.rpm bae6113d22f9a058aabc1fe4dc839239 mes5/x86_64/firefox-nl-10.0.11-0.1mdvmes5.2.x86_64.rpm cb79a085de2066fb31c703545d003623 mes5/x86_64/firefox-nn_NO-10.0.11-0.1mdvmes5.2.x86_64.rpm 8b090b8bd95759a65e6b1253b5a8a9e0 mes5/x86_64/firefox-oc-10.0.11-0.1mdvmes5.2.x86_64.rpm 8688497f976dbae89bdf13c6e0025122 mes5/x86_64/firefox-pa_IN-10.0.11-0.1mdvmes5.2.x86_64.rpm d6bc2ad6e2d8c8a1d4e8166fae3b4f3e mes5/x86_64/firefox-pl-10.0.11-0.1mdvmes5.2.x86_64.rpm cfabec8c640752e190e33cda7b950514 mes5/x86_64/firefox-pt_BR-10.0.11-0.1mdvmes5.2.x86_64.rpm 727779dabfcb605120ac6df385d2e553 mes5/x86_64/firefox-pt_PT-10.0.11-0.1mdvmes5.2.x86_64.rpm 8901179a53c6b9a36f6f87ac1c26247d mes5/x86_64/firefox-ro-10.0.11-0.1mdvmes5.2.x86_64.rpm 2f7eba0ddf91d9e315ab3854987cd6d6 mes5/x86_64/firefox-ru-10.0.11-0.1mdvmes5.2.x86_64.rpm 85f088af209ce0b461700b3d2e447b77 mes5/x86_64/firefox-si-10.0.11-0.1mdvmes5.2.x86_64.rpm c17761b2e6426d865fb30b0282eac8a0 mes5/x86_64/firefox-sk-10.0.11-0.1mdvmes5.2.x86_64.rpm 5316648945067571df061c8aa597fc7a mes5/x86_64/firefox-sl-10.0.11-0.1mdvmes5.2.x86_64.rpm d30b355a2bf98380f761ca20fa14021d mes5/x86_64/firefox-sq-10.0.11-0.1mdvmes5.2.x86_64.rpm d4d65b5395db7fa14d9d70b1780a1b1a mes5/x86_64/firefox-sr-10.0.11-0.1mdvmes5.2.x86_64.rpm 18376a4318ebae6f6da710dbdf27290e mes5/x86_64/firefox-sv_SE-10.0.11-0.1mdvmes5.2.x86_64.rpm d61890d3fae4364689c17b644779e3ff mes5/x86_64/firefox-te-10.0.11-0.1mdvmes5.2.x86_64.rpm 7a0689047b6293a3851286d8a521f7bf mes5/x86_64/firefox-th-10.0.11-0.1mdvmes5.2.x86_64.rpm 009afe21569c4cac2f51fa4bd9d4ab7e mes5/x86_64/firefox-tr-10.0.11-0.1mdvmes5.2.x86_64.rpm c4e97ff92a298095a0c43b9be420eeb5 mes5/x86_64/firefox-uk-10.0.11-0.1mdvmes5.2.x86_64.rpm 54129a5b0551cd831339bdc546cf6f4a mes5/x86_64/firefox-zh_CN-10.0.11-0.1mdvmes5.2.x86_64.rpm 34bc742e5c1bbf982a655f312180105c mes5/x86_64/firefox-zh_TW-10.0.11-0.1mdvmes5.2.x86_64.rpm 26c6b60b968a8b0b623bb2b88d79a64d mes5/x86_64/icedtea-web-1.1.7-0.2mdvmes5.2.x86_64.rpm 9e328c598f924dd5ecd49a4da49e2135 mes5/x86_64/icedtea-web-javadoc-1.1.7-0.2mdvmes5.2.x86_64.rpm 96bb3f61996cb9a3e0ba3f31a31c5093 mes5/x86_64/lib64xulrunner10.0.11-10.0.11-0.1mdvmes5.2.x86_64.rpm 780234e698d9e1bf6b5e746ebc6d73df mes5/x86_64/lib64xulrunner-devel-10.0.11-0.1mdvmes5.2.x86_64.rpm 12e2f8c7f6af1534a510bbe77f2e1e0e mes5/x86_64/xulrunner-10.0.11-0.1mdvmes5.2.x86_64.rpm e8d5e9b0828fb9c1d7c2831b52c3086b mes5/SRPMS/firefox-10.0.11-0.1mdvmes5.2.src.rpm bb92a60f0d65d3d852674ff65c510ef4 mes5/SRPMS/firefox-l10n-10.0.11-0.1mdvmes5.2.src.rpm 0471f9637cb24d69bb60c23afd5e473a mes5/SRPMS/icedtea-web-1.1.7-0.2mdvmes5.2.src.rpm dfa0ed329fddbf510189ff2ecdb7d13d mes5/SRPMS/xulrunner-10.0.11-0.1mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFQrNEImqjQ0CJFipgRAuslAJ9L7fqz1QX1XXEoHTe7IoQsqkJqHQCgmAhc 2q/3SEMSgO2gcJzg9OYMTf0= =5LvU -----END PGP SIGNATURE-----