what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2013-179

Mandriva Linux Security Advisory 2013-179
Posted Jun 26, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-179 - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Security researcher Abhishek Arya of the Google Chrome Security Team used the Address Sanitizer tool to discover a series of use-after-free problems rated critical as security issues in shipped software. Some of these issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting additional use-after-free and buffer overflow flaws in code introduced during Firefox development. These were fixed before general release. Various other security issues were also addressed. The mozilla firefox packages have been upgraded to the latest ESR version which is unaffected by these security flaws.

tags | advisory, remote, overflow, arbitrary, code execution
systems | linux, mandriva
advisories | CVE-2013-1682, CVE-2013-1684, CVE-2013-1685, CVE-2013-1686, CVE-2013-1687, CVE-2013-1690, CVE-2013-1692, CVE-2013-1693, CVE-2013-1694, CVE-2013-1697
SHA-256 | b0b72cafbc2361750e49e061e443bf4c31ccb39cd9f5d1f6c678247054a8cf27

Mandriva Linux Security Advisory 2013-179

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:179
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : firefox
Date : June 26, 2013
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple security issues was identified and fixed in mozilla firefox:

Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code (CVE-2013-1682).

Security researcher Abhishek Arya (Inferno) of the Google Chrome
Security Team used the Address Sanitizer tool to discover a series of
use-after-free problems rated critical as security issues in shipped
software. Some of these issues are potentially exploitable, allowing
for remote code execution. We would also like to thank Abhishek for
reporting additional use-after-free and buffer overflow flaws in
code introduced during Firefox development. These were fixed before
general release (CVE-2013-1684, CVE-2013-1685, CVE-2013-1686).

Security researcher Mariusz Mlynski reported that it is possible to
compile a user-defined function in the XBL scope of a specific element
and then trigger an event within this scope to run code. In some
circumstances, when this code is run, it can access content protected
by System Only Wrappers (SOW) and chrome-privileged pages. This
could potentially lead to arbitrary code execution. Additionally,
Chrome Object Wrappers (COW) can be bypassed by web content to access
privileged methods, leading to a cross-site scripting (XSS) attack
from privileged pages (CVE-2013-1687).

Security researcher Nils reported that specially crafted web content
using the onreadystatechange event and reloading of pages could
sometimes cause a crash when unmapped memory is executed. This crash
is potentially exploitable (CVE-2013-1690).

Security researcher Johnathan Kuskos reported that Firefox is sending
data in the body of XMLHttpRequest (XHR) HEAD requests, which goes
agains the XHR specification. This can potentially be used for
Cross-Site Request Forgery (CSRF) attacks against sites which do not
distinguish between HEAD and POST requests (CVE-2013-1692).

Security researcher Paul Stone of Context Information Security
discovered that timing differences in the processing of SVG format
images with filters could allow for pixel values to be read. This
could potentially allow for text values to be read across domains,
leading to information disclosure (CVE-2013-1693).

Mozilla developer Boris Zbarsky found that when PreserveWrapper was
used in cases where a wrapper is not set, the preserved-wrapper flag
on the wrapper cache is cleared. This could potentially lead to an
exploitable crash (CVE-2013-1694).

Mozilla security researcher moz_bug_r_a4 reported that XrayWrappers
can be bypassed to call content-defined toString and valueOf methods
through DefaultValue. This can lead to unexpected behavior when
privileged code acts on the incorrect values (CVE-2013-1697).

The mozilla firefox packages has been upgraded to the latest ESR
version (17.0.7) which is unaffected by these security flaws.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1694
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697
http://www.mozilla.org/security/announce/2013/mfsa2013-49.html
http://www.mozilla.org/security/announce/2013/mfsa2013-50.html
http://www.mozilla.org/security/announce/2013/mfsa2013-51.html
http://www.mozilla.org/security/announce/2013/mfsa2013-53.html
http://www.mozilla.org/security/announce/2013/mfsa2013-54.html
http://www.mozilla.org/security/announce/2013/mfsa2013-55.html
http://www.mozilla.org/security/announce/2013/mfsa2013-56.html
http://www.mozilla.org/security/announce/2013/mfsa2013-59.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
f377616fa413576835d3fae079ff0aa5 mes5/i586/firefox-17.0.7-0.1mdvmes5.2.i586.rpm
652c24c5d6ff9df65178aafb7ff02e5d mes5/i586/firefox-af-17.0.7-0.1mdvmes5.2.i586.rpm
dc87c28521fb845389a035914a22775f mes5/i586/firefox-ar-17.0.7-0.1mdvmes5.2.i586.rpm
5c6d60f7c807485993d79601185ec3d9 mes5/i586/firefox-be-17.0.7-0.1mdvmes5.2.i586.rpm
e08a34f585b46a8cd36449eb973a71c9 mes5/i586/firefox-bg-17.0.7-0.1mdvmes5.2.i586.rpm
7779b1c57fc052aaedaccff6f20c22e5 mes5/i586/firefox-bn-17.0.7-0.1mdvmes5.2.i586.rpm
69e6dc99e24bf7436baf708a4e8a6ae6 mes5/i586/firefox-ca-17.0.7-0.1mdvmes5.2.i586.rpm
ac86ab446a7061a931f888bba532b190 mes5/i586/firefox-cs-17.0.7-0.1mdvmes5.2.i586.rpm
ebcd8fb3057ed6a2915ae7a5790dfce7 mes5/i586/firefox-cy-17.0.7-0.1mdvmes5.2.i586.rpm
2dc9dd199b1f2ef058c1a50e398ce3ef mes5/i586/firefox-da-17.0.7-0.1mdvmes5.2.i586.rpm
5e56eeba90541a9c8bcf7611df18ac94 mes5/i586/firefox-de-17.0.7-0.1mdvmes5.2.i586.rpm
897574b2a895a91e4c360c7c88056fd4 mes5/i586/firefox-devel-17.0.7-0.1mdvmes5.2.i586.rpm
4dabf70ab2035fe7d0198df52c3cc812 mes5/i586/firefox-el-17.0.7-0.1mdvmes5.2.i586.rpm
669db7774e4cb6cbff3e7e34ae53532d mes5/i586/firefox-en_GB-17.0.7-0.1mdvmes5.2.i586.rpm
ec659527cd1ea949fade65d7a58ad256 mes5/i586/firefox-eo-17.0.7-0.1mdvmes5.2.i586.rpm
d6df88bf6ca41c4f6e6f55bc899aaca5 mes5/i586/firefox-es_AR-17.0.7-0.1mdvmes5.2.i586.rpm
0493c53d720297be0d57a317f03298cf mes5/i586/firefox-es_ES-17.0.7-0.1mdvmes5.2.i586.rpm
5c939e80e938a18862bb4facd7a0aead mes5/i586/firefox-et-17.0.7-0.1mdvmes5.2.i586.rpm
57f0e260c7086ac3ee60ed382b8f503d mes5/i586/firefox-eu-17.0.7-0.1mdvmes5.2.i586.rpm
511f45291c1cc86c61613839e5e7b24b mes5/i586/firefox-fi-17.0.7-0.1mdvmes5.2.i586.rpm
21eb713475a749bf49af8defdd67f867 mes5/i586/firefox-fr-17.0.7-0.1mdvmes5.2.i586.rpm
162b648b9926726c9e8858fadd451723 mes5/i586/firefox-fy-17.0.7-0.1mdvmes5.2.i586.rpm
5bcaae0b627e50bfd50d184e74f0ec30 mes5/i586/firefox-ga_IE-17.0.7-0.1mdvmes5.2.i586.rpm
e630a7ed8039f30ca93cb46ecee60b09 mes5/i586/firefox-gl-17.0.7-0.1mdvmes5.2.i586.rpm
c38375fe601fe760d9052f8e3fc477e8 mes5/i586/firefox-gu_IN-17.0.7-0.1mdvmes5.2.i586.rpm
d783f4b739f33917c7656058ee1fbd91 mes5/i586/firefox-he-17.0.7-0.1mdvmes5.2.i586.rpm
b4a8e32a432c12cdc911d3e6353e9ab8 mes5/i586/firefox-hi-17.0.7-0.1mdvmes5.2.i586.rpm
a2ce628d94042616aaa74ef97a21a832 mes5/i586/firefox-hu-17.0.7-0.1mdvmes5.2.i586.rpm
1ea3b93d68d74d8a9e8ecccd00a19db9 mes5/i586/firefox-id-17.0.7-0.1mdvmes5.2.i586.rpm
853d8ea7ae11737a33f6cd3772ca7ba2 mes5/i586/firefox-is-17.0.7-0.1mdvmes5.2.i586.rpm
775512b65dc65d7a6d4538d5012f65f1 mes5/i586/firefox-it-17.0.7-0.1mdvmes5.2.i586.rpm
e27ff622960fefcb7aadf13c2da980af mes5/i586/firefox-ja-17.0.7-0.1mdvmes5.2.i586.rpm
d19357df6145fcc76b6b7b3c0d1ccda7 mes5/i586/firefox-kn-17.0.7-0.1mdvmes5.2.i586.rpm
4fbd717d0c0dc77ce8578776cbbce0d0 mes5/i586/firefox-ko-17.0.7-0.1mdvmes5.2.i586.rpm
cde6f4dfedad1d04122119d94fa61e6e mes5/i586/firefox-ku-17.0.7-0.1mdvmes5.2.i586.rpm
5894a845d55b922d0235cadbf43b109b mes5/i586/firefox-lt-17.0.7-0.1mdvmes5.2.i586.rpm
acc18a793daeb9bb670fe56ed65c05d1 mes5/i586/firefox-lv-17.0.7-0.1mdvmes5.2.i586.rpm
5c1b603de35a6f459056ed10aaa6d382 mes5/i586/firefox-mk-17.0.7-0.1mdvmes5.2.i586.rpm
b2ecb355588e5667affed1677dc763f9 mes5/i586/firefox-mr-17.0.7-0.1mdvmes5.2.i586.rpm
41777306a7a3e270742ff065159c25b9 mes5/i586/firefox-nb_NO-17.0.7-0.1mdvmes5.2.i586.rpm
f2f0189d3fd0c29fb956cbee8a7638dd mes5/i586/firefox-nl-17.0.7-0.1mdvmes5.2.i586.rpm
f87d249ee3c475cc7efeb582feec36e4 mes5/i586/firefox-nn_NO-17.0.7-0.1mdvmes5.2.i586.rpm
f62472494f30e196c863e863b90241f3 mes5/i586/firefox-pa_IN-17.0.7-0.1mdvmes5.2.i586.rpm
db2540e8c16eac89d52d449746b3a2af mes5/i586/firefox-pl-17.0.7-0.1mdvmes5.2.i586.rpm
84a9190b0304044bd4d2be92559b7c22 mes5/i586/firefox-pt_BR-17.0.7-0.1mdvmes5.2.i586.rpm
41453e62d9c5ece38ab4bf058a867e9c mes5/i586/firefox-pt_PT-17.0.7-0.1mdvmes5.2.i586.rpm
36ac899dde4d279be5b0f98e5436cd07 mes5/i586/firefox-ro-17.0.7-0.1mdvmes5.2.i586.rpm
51ca08ee97df0a4da5c584e6780d563c mes5/i586/firefox-ru-17.0.7-0.1mdvmes5.2.i586.rpm
07badcbaebc3f35337efde74d666e899 mes5/i586/firefox-si-17.0.7-0.1mdvmes5.2.i586.rpm
5a73fcd6a6ca0e9fb1ae2a00df7898a3 mes5/i586/firefox-sk-17.0.7-0.1mdvmes5.2.i586.rpm
23a0e198d005396c4fdb09e5e385fe01 mes5/i586/firefox-sl-17.0.7-0.1mdvmes5.2.i586.rpm
4a55165e6af6e0129c98278206ea0277 mes5/i586/firefox-sq-17.0.7-0.1mdvmes5.2.i586.rpm
723fb7776584aeec50b0c72a692359e1 mes5/i586/firefox-sr-17.0.7-0.1mdvmes5.2.i586.rpm
43228ac54eef2b13c272421d85ba1f69 mes5/i586/firefox-sv_SE-17.0.7-0.1mdvmes5.2.i586.rpm
79cb410c9de864e3437bedaafdf5ca25 mes5/i586/firefox-te-17.0.7-0.1mdvmes5.2.i586.rpm
e4748ffe632bf0b1b37619a17948e595 mes5/i586/firefox-th-17.0.7-0.1mdvmes5.2.i586.rpm
706bef53fed0a669bf16e1390f03dc77 mes5/i586/firefox-tr-17.0.7-0.1mdvmes5.2.i586.rpm
bb8173f2daa9fb6a75a51b218d165c99 mes5/i586/firefox-uk-17.0.7-0.1mdvmes5.2.i586.rpm
dec6bef8b017e38f9327980549a7742b mes5/i586/firefox-zh_CN-17.0.7-0.1mdvmes5.2.i586.rpm
e0ac89138fffb33e9c19f7c7202a5cc6 mes5/i586/firefox-zh_TW-17.0.7-0.1mdvmes5.2.i586.rpm
5573bdc4a6f50d52ca821063a25994f4 mes5/i586/icedtea-web-1.3.2-0.3mdvmes5.2.i586.rpm
5dc7d93d1e83a2b88cf725c50a5aeabf mes5/i586/icedtea-web-javadoc-1.3.2-0.3mdvmes5.2.i586.rpm
843b58cf236df5892cdd05c999b3e62b mes5/i586/libxulrunner17.0.7-17.0.7-0.1mdvmes5.2.i586.rpm
d22da67bc7a0e20c998c813f36a5a199 mes5/i586/libxulrunner-devel-17.0.7-0.1mdvmes5.2.i586.rpm
d9168d1aee7cab500de0c5df41ad5240 mes5/i586/xulrunner-17.0.7-0.1mdvmes5.2.i586.rpm
ac0e411d475da155175442d1f34842cd mes5/SRPMS/firefox-17.0.7-0.1mdvmes5.2.src.rpm
45c0184ab0eeca01f633245f79a03041 mes5/SRPMS/firefox-l10n-17.0.7-0.1mdvmes5.2.src.rpm
b05d6f1b4e84baad4de04d45c5dae02d mes5/SRPMS/icedtea-web-1.3.2-0.3mdvmes5.2.src.rpm
95d1abffc5ac94ae5777dfca705ec041 mes5/SRPMS/xulrunner-17.0.7-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
f3ea43bfbd720573adec0affcc0cd536 mes5/x86_64/firefox-17.0.7-0.1mdvmes5.2.x86_64.rpm
330b94917b3f0e3f2de878a0f09caaab mes5/x86_64/firefox-af-17.0.7-0.1mdvmes5.2.x86_64.rpm
77f418c131fe60b219e2df46faa3aa00 mes5/x86_64/firefox-ar-17.0.7-0.1mdvmes5.2.x86_64.rpm
4a8e395e5473a2bddeadd5f1ee740ad1 mes5/x86_64/firefox-be-17.0.7-0.1mdvmes5.2.x86_64.rpm
f342f9dd8f30e70bf8b2b338933cd0e5 mes5/x86_64/firefox-bg-17.0.7-0.1mdvmes5.2.x86_64.rpm
8046323f8a7300461207ca61692517c2 mes5/x86_64/firefox-bn-17.0.7-0.1mdvmes5.2.x86_64.rpm
2848426fb12a2e05cd9b605ea264669f mes5/x86_64/firefox-ca-17.0.7-0.1mdvmes5.2.x86_64.rpm
b1c04fc023f4732adae875cb5b3786da mes5/x86_64/firefox-cs-17.0.7-0.1mdvmes5.2.x86_64.rpm
4fa2451cd34a338b558feb4ee5b38845 mes5/x86_64/firefox-cy-17.0.7-0.1mdvmes5.2.x86_64.rpm
912fb729496dcbea1d30beefdc4775e8 mes5/x86_64/firefox-da-17.0.7-0.1mdvmes5.2.x86_64.rpm
1a3626352e622cf2c66c984085b12057 mes5/x86_64/firefox-de-17.0.7-0.1mdvmes5.2.x86_64.rpm
125c9f024699ca8bcb71decfb66ea5b6 mes5/x86_64/firefox-devel-17.0.7-0.1mdvmes5.2.x86_64.rpm
f43e4e24e8057321b09cfc3ef5298321 mes5/x86_64/firefox-el-17.0.7-0.1mdvmes5.2.x86_64.rpm
7d95b00f58af69faf7a06581bd0e2569 mes5/x86_64/firefox-en_GB-17.0.7-0.1mdvmes5.2.x86_64.rpm
3b5903be89e8ff4293c38a0896a7f44d mes5/x86_64/firefox-eo-17.0.7-0.1mdvmes5.2.x86_64.rpm
09fdadd751d266623bcf56624d03a60f mes5/x86_64/firefox-es_AR-17.0.7-0.1mdvmes5.2.x86_64.rpm
d0b730a135d64c72e5e88df1ddaebae9 mes5/x86_64/firefox-es_ES-17.0.7-0.1mdvmes5.2.x86_64.rpm
97ccb2076f0121381a45f5ec0896c30d mes5/x86_64/firefox-et-17.0.7-0.1mdvmes5.2.x86_64.rpm
9ba658b2db765c3ae681ca203e165d68 mes5/x86_64/firefox-eu-17.0.7-0.1mdvmes5.2.x86_64.rpm
1d8d2ef3f08565a8ee3a0bc99f6407be mes5/x86_64/firefox-fi-17.0.7-0.1mdvmes5.2.x86_64.rpm
05119cc9c7ebb644a7adde2fd73ce36b mes5/x86_64/firefox-fr-17.0.7-0.1mdvmes5.2.x86_64.rpm
ae713037d5874fd714ca44b2cd1496ae mes5/x86_64/firefox-fy-17.0.7-0.1mdvmes5.2.x86_64.rpm
fdf8b50da106b9d1024c7f39fe94fc27 mes5/x86_64/firefox-ga_IE-17.0.7-0.1mdvmes5.2.x86_64.rpm
2b34533eb481df6292cadaa207360d50 mes5/x86_64/firefox-gl-17.0.7-0.1mdvmes5.2.x86_64.rpm
071da99fae036b68760814d06ce2dbda mes5/x86_64/firefox-gu_IN-17.0.7-0.1mdvmes5.2.x86_64.rpm
eb7979d7dff6d4c089676fed54276ed5 mes5/x86_64/firefox-he-17.0.7-0.1mdvmes5.2.x86_64.rpm
441926f1d5e3a485873070a3ba86ec3e mes5/x86_64/firefox-hi-17.0.7-0.1mdvmes5.2.x86_64.rpm
fb9a4604927cc690ea14642b1dcca1b8 mes5/x86_64/firefox-hu-17.0.7-0.1mdvmes5.2.x86_64.rpm
c25566dd3cafab514b4699943b258921 mes5/x86_64/firefox-id-17.0.7-0.1mdvmes5.2.x86_64.rpm
e0dee96af89dc9083ddc1dadb2b0f6b0 mes5/x86_64/firefox-is-17.0.7-0.1mdvmes5.2.x86_64.rpm
10bdf0c991e6dd6f8c48db1eaf3d7f64 mes5/x86_64/firefox-it-17.0.7-0.1mdvmes5.2.x86_64.rpm
a9e9eb4406c2ef27fa0b5be69418e29e mes5/x86_64/firefox-ja-17.0.7-0.1mdvmes5.2.x86_64.rpm
734a81663cc9c3cbfc3e6ed3d3fe050e mes5/x86_64/firefox-kn-17.0.7-0.1mdvmes5.2.x86_64.rpm
1b2cddac22bb6462a89ea412ccec5a4a mes5/x86_64/firefox-ko-17.0.7-0.1mdvmes5.2.x86_64.rpm
0eec7f9b43528fba48603c6270798b76 mes5/x86_64/firefox-ku-17.0.7-0.1mdvmes5.2.x86_64.rpm
72085a9fc9432f52f8a74f362531adfa mes5/x86_64/firefox-lt-17.0.7-0.1mdvmes5.2.x86_64.rpm
fb549798d2e86a5a606f8a5752bc40ad mes5/x86_64/firefox-lv-17.0.7-0.1mdvmes5.2.x86_64.rpm
8d2c2adc1dd54e9f7af93ad9e4a51f4b mes5/x86_64/firefox-mk-17.0.7-0.1mdvmes5.2.x86_64.rpm
7f7f937a0e8f123597f0f5795ae219a8 mes5/x86_64/firefox-mr-17.0.7-0.1mdvmes5.2.x86_64.rpm
289ae036328cd607997a06b1a13615e4 mes5/x86_64/firefox-nb_NO-17.0.7-0.1mdvmes5.2.x86_64.rpm
02e21dd5652910673177a2d7f7677599 mes5/x86_64/firefox-nl-17.0.7-0.1mdvmes5.2.x86_64.rpm
c11653343da9ec5003b3b5b608143777 mes5/x86_64/firefox-nn_NO-17.0.7-0.1mdvmes5.2.x86_64.rpm
25a4ffd2f8eb6656557fcd69c9cb256e mes5/x86_64/firefox-pa_IN-17.0.7-0.1mdvmes5.2.x86_64.rpm
6b94eb35e28c0d9ad4865c692a7997b8 mes5/x86_64/firefox-pl-17.0.7-0.1mdvmes5.2.x86_64.rpm
698390e28b22e07893c11ed6834a93df mes5/x86_64/firefox-pt_BR-17.0.7-0.1mdvmes5.2.x86_64.rpm
1ef22277239594c7bfd4bb5d18595901 mes5/x86_64/firefox-pt_PT-17.0.7-0.1mdvmes5.2.x86_64.rpm
eeef7530918dd3747dcecb5c025e6582 mes5/x86_64/firefox-ro-17.0.7-0.1mdvmes5.2.x86_64.rpm
37ef6dfd7bf021de3bee528aa90444d3 mes5/x86_64/firefox-ru-17.0.7-0.1mdvmes5.2.x86_64.rpm
e04cae5fbb6171b44669cc860066f50c mes5/x86_64/firefox-si-17.0.7-0.1mdvmes5.2.x86_64.rpm
e3900cc084080e6b695be2fcfd78b5ee mes5/x86_64/firefox-sk-17.0.7-0.1mdvmes5.2.x86_64.rpm
de40837370db5f31df2c8639ba40f6e8 mes5/x86_64/firefox-sl-17.0.7-0.1mdvmes5.2.x86_64.rpm
43d05b37458065a02744156d5c776afa mes5/x86_64/firefox-sq-17.0.7-0.1mdvmes5.2.x86_64.rpm
fc0a9ade1e3ad21a77435c61d3e39e4b mes5/x86_64/firefox-sr-17.0.7-0.1mdvmes5.2.x86_64.rpm
e94670d815f013909f490d2f3460443b mes5/x86_64/firefox-sv_SE-17.0.7-0.1mdvmes5.2.x86_64.rpm
bb6f4a2892d9ce2d194659d7b8387c10 mes5/x86_64/firefox-te-17.0.7-0.1mdvmes5.2.x86_64.rpm
973c2c229f935824009fc0fa7c1bbaf8 mes5/x86_64/firefox-th-17.0.7-0.1mdvmes5.2.x86_64.rpm
8c3cba0880f345f5b97d5c3405a7cd44 mes5/x86_64/firefox-tr-17.0.7-0.1mdvmes5.2.x86_64.rpm
9f47ee088ce3e3188173ff2feba8b457 mes5/x86_64/firefox-uk-17.0.7-0.1mdvmes5.2.x86_64.rpm
1750daf14a9a2c4820fb1f452ba8506d mes5/x86_64/firefox-zh_CN-17.0.7-0.1mdvmes5.2.x86_64.rpm
0b3cc99143d2153ed6af2dbba40aa604 mes5/x86_64/firefox-zh_TW-17.0.7-0.1mdvmes5.2.x86_64.rpm
280ec00914f7359c9564f16aa8aa0fa1 mes5/x86_64/icedtea-web-1.3.2-0.3mdvmes5.2.x86_64.rpm
b91d94caea294ccc0ee27ea3cf52bac2 mes5/x86_64/icedtea-web-javadoc-1.3.2-0.3mdvmes5.2.x86_64.rpm
e7ff4dbbb87caf099a3f14e6711a943e mes5/x86_64/lib64xulrunner17.0.7-17.0.7-0.1mdvmes5.2.x86_64.rpm
cf3704486448f7e60c73884c5e9b27f0 mes5/x86_64/lib64xulrunner-devel-17.0.7-0.1mdvmes5.2.x86_64.rpm
e01a9c88577edce905c578b7734c8457 mes5/x86_64/xulrunner-17.0.7-0.1mdvmes5.2.x86_64.rpm
ac0e411d475da155175442d1f34842cd mes5/SRPMS/firefox-17.0.7-0.1mdvmes5.2.src.rpm
45c0184ab0eeca01f633245f79a03041 mes5/SRPMS/firefox-l10n-17.0.7-0.1mdvmes5.2.src.rpm
b05d6f1b4e84baad4de04d45c5dae02d mes5/SRPMS/icedtea-web-1.3.2-0.3mdvmes5.2.src.rpm
95d1abffc5ac94ae5777dfca705ec041 mes5/SRPMS/xulrunner-17.0.7-0.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRyvf4mqjQ0CJFipgRAhncAJ4t57nfc1kBzlr51Y2L7MOvNXP2mgCfSFbI
ohEMVvKKXEcVLt4x2S3uA2I=
=mmvT
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close