exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2013-210

Mandriva Linux Security Advisory 2013-210
Posted Aug 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-210 - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Mozilla security researcher moz_bug_r_a4 reported that through an interaction of frames and browser history it was possible to make the browser believe attacker-supplied content came from the location of a previous page in browser history. This allows for cross-site scripting attacks by loading scripts from a misrepresented malicious site through relative locations and the potential access of stored credentials of a spoofed site. Mozilla security researcher moz_bug_r_a4 reported a mechanism to execute arbitrary code or a cross-site scripting attack when Certificate Request Message Format request is generated in certain circumstances. Security researcher Cody Crews reported that some Javascript components will perform checks against the wrong uniform resource identifier before performing security sensitive actions. This will return an incorrect location for the originator of the call. This could be used to bypass same-origin policy, allowing for cross-site scripting or the installation of malicious add-ons from third-party pages. Mozilla community member Federico Lanusse reported a mechanism where a web worker can violate same-origin policy and bypass cross-origin checks through XMLHttpRequest. This could allow for cross-site scripting attacks by web workers. Security researcher Georgi Guninski reported an issue with Java applets where in some circumstances the applet could access files on the local system when loaded using the a file:/// URI and violate file origin policy due to interaction with the codebase parameter. This affects applets running on the local file system. Mozilla developer John Schoenick later discovered that fixes for this issue were inadequate and allowed the invocation of Java applets to bypass security checks in additional circumstances. This could lead to untrusted Java applets having read-only access on the local files system if used in conjunction with a method to download a file to a known or guessable path. The mozilla firefox packages has been upgraded to the latest ESR version which is unaffected by these security flaws.

tags | advisory, web, arbitrary, local, spoof, javascript, xss
systems | linux, mandriva
advisories | CVE-2013-1701, CVE-2013-1709, CVE-2013-1710, CVE-2013-1713, CVE-2013-1714, CVE-2013-1717
SHA-256 | 06e1eccc8317c48199bbdf0816b441552d6c5a399b5a21ddd3ebe80a6bcf1ac9

Mandriva Linux Security Advisory 2013-210

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:210
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : firefox
Date : August 7, 2013
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple security issues was identified and fixed in mozilla firefox:

Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code (CVE-2013-1701).

Mozilla security researcher moz_bug_r_a4 reported that through an
interaction of frames and browser history it was possible to make
the browser believe attacker-supplied content came from the location
of a previous page in browser history. This allows for cross-site
scripting (XSS) attacks by loading scripts from a misrepresented
malicious site through relative locations and the potential access
of stored credentials of a spoofed site (CVE-2013-1709).

Mozilla security researcher moz_bug_r_a4 reported a mechanism to
execute arbitrary code or a cross-site scripting (XSS) attack when
Certificate Request Message Format (CRMF) request is generated in
certain circumstances (CVE-2013-1710).

Security researcher Cody Crews reported that some Javascript components
will perform checks against the wrong uniform resource identifier
(URI) before performing security sensitive actions. This will return
an incorrect location for the originator of the call. This could be
used to bypass same-origin policy, allowing for cross-site scripting
(XSS) or the installation of malicious add-ons from third-party pages
(CVE-2013-1713).

Mozilla community member Federico Lanusse reported a mechanism where
a web worker can violate same-origin policy and bypass cross-origin
checks through XMLHttpRequest. This could allow for cross-site
scripting (XSS) attacks by web workers (CVE-2013-1714).

Security researcher Georgi Guninski reported an issue with Java
applets where in some circumstances the applet could access files on
the local system when loaded using the a file:/// URI and violate file
origin policy due to interaction with the codebase parameter. This
affects applets running on the local file system. Mozilla developer
John Schoenick later discovered that fixes for this issue were
inadequate and allowed the invocation of Java applets to bypass
security checks in additional circumstances. This could lead to
untrusted Java applets having read-only access on the local files
system if used in conjunction with a method to download a file to a
known or guessable path (CVE-2013-1717).

The mozilla firefox packages has been upgraded to the latest ESR
version (17.0.8) which is unaffected by these security flaws.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
http://www.mozilla.org/security/announce/2013/mfsa2013-63.html
http://www.mozilla.org/security/announce/2013/mfsa2013-68.html
http://www.mozilla.org/security/announce/2013/mfsa2013-69.html
http://www.mozilla.org/security/announce/2013/mfsa2013-72.html
http://www.mozilla.org/security/announce/2013/mfsa2013-73.html
http://www.mozilla.org/security/announce/2013/mfsa2013-75.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
46ceb0ccb376702e10d5686b24955fab mes5/i586/firefox-17.0.8-0.1mdvmes5.2.i586.rpm
3f3645b0900378ef1bce58fca5ae129c mes5/i586/firefox-af-17.0.8-0.1mdvmes5.2.i586.rpm
5a5d166e6d90d0f777e41c0e45b9ce4e mes5/i586/firefox-ar-17.0.8-0.1mdvmes5.2.i586.rpm
0f90909e08052d28fe6b26ca7c913f4e mes5/i586/firefox-be-17.0.8-0.1mdvmes5.2.i586.rpm
aa3976b6a51f00949c3b589abf87f0f2 mes5/i586/firefox-bg-17.0.8-0.1mdvmes5.2.i586.rpm
f58486e6bc5071825bd6e8e6ce2145bf mes5/i586/firefox-bn-17.0.8-0.1mdvmes5.2.i586.rpm
82b455ccd6a14d15a2fc9c4bcd6e977d mes5/i586/firefox-ca-17.0.8-0.1mdvmes5.2.i586.rpm
19f86d829880f9b2af4c400222c1e533 mes5/i586/firefox-cs-17.0.8-0.1mdvmes5.2.i586.rpm
d8b0b922b813a7eecd9175b191e55426 mes5/i586/firefox-cy-17.0.8-0.1mdvmes5.2.i586.rpm
f83f4472c502a72abf51dfb0c1e20a2c mes5/i586/firefox-da-17.0.8-0.1mdvmes5.2.i586.rpm
5a177c95f748b2d1b78d27fd0d880da3 mes5/i586/firefox-de-17.0.8-0.1mdvmes5.2.i586.rpm
60328b5b3b31d84b682ef09d950b7020 mes5/i586/firefox-devel-17.0.8-0.1mdvmes5.2.i586.rpm
6e9dd5e25356825db93e0525ce54d197 mes5/i586/firefox-el-17.0.8-0.1mdvmes5.2.i586.rpm
40bf03b77f52d77e23665a5dd30a5feb mes5/i586/firefox-en_GB-17.0.8-0.1mdvmes5.2.i586.rpm
9738522181041bbda3d5b86a581b776b mes5/i586/firefox-eo-17.0.8-0.1mdvmes5.2.i586.rpm
a0a8820e298ac23d9ef0d700f06dda22 mes5/i586/firefox-es_AR-17.0.8-0.1mdvmes5.2.i586.rpm
9478ec5aae3c9e3a01c0e61fb049a759 mes5/i586/firefox-es_ES-17.0.8-0.1mdvmes5.2.i586.rpm
48e951f581905518428a3390ab671778 mes5/i586/firefox-et-17.0.8-0.1mdvmes5.2.i586.rpm
eb155424ba0fbe90fe2d509701840309 mes5/i586/firefox-eu-17.0.8-0.1mdvmes5.2.i586.rpm
18e069c61f00efb879acbd6e30991d7f mes5/i586/firefox-fi-17.0.8-0.1mdvmes5.2.i586.rpm
a91e599b05eedd536e218e425027593f mes5/i586/firefox-fr-17.0.8-0.1mdvmes5.2.i586.rpm
5e4629a4234ba4c57e878630e7433163 mes5/i586/firefox-fy-17.0.8-0.1mdvmes5.2.i586.rpm
6f29aa4827273079410a8a5d336f6f23 mes5/i586/firefox-ga_IE-17.0.8-0.1mdvmes5.2.i586.rpm
f6a635a52ad10a14b1d7394214de1bd4 mes5/i586/firefox-gl-17.0.8-0.1mdvmes5.2.i586.rpm
ad9174fe19b8b88b95e3edc586556279 mes5/i586/firefox-gu_IN-17.0.8-0.1mdvmes5.2.i586.rpm
fa937d44c65457b266b1b3b20ed94fd9 mes5/i586/firefox-he-17.0.8-0.1mdvmes5.2.i586.rpm
98afd632f866ab44f7b6a8c4a1dface6 mes5/i586/firefox-hi-17.0.8-0.1mdvmes5.2.i586.rpm
d29f473f43f545ba250d1e30c3aff422 mes5/i586/firefox-hu-17.0.8-0.1mdvmes5.2.i586.rpm
aeb691e8bf7a155e77478ef701f5eca4 mes5/i586/firefox-id-17.0.8-0.1mdvmes5.2.i586.rpm
49e656b2c28c6cbc6283e1963aa04bd2 mes5/i586/firefox-is-17.0.8-0.1mdvmes5.2.i586.rpm
fbeb18150371a00d7b437cbd820684d9 mes5/i586/firefox-it-17.0.8-0.1mdvmes5.2.i586.rpm
6c293bd648fc4c77146a5987c74b6360 mes5/i586/firefox-ja-17.0.8-0.1mdvmes5.2.i586.rpm
0885b93d243c56617f0df7240d2b032b mes5/i586/firefox-kn-17.0.8-0.1mdvmes5.2.i586.rpm
282f096d7178eada2411cce985a1f949 mes5/i586/firefox-ko-17.0.8-0.1mdvmes5.2.i586.rpm
1ecb7dfe2b6ca182354e0a1ea7253c7b mes5/i586/firefox-ku-17.0.8-0.1mdvmes5.2.i586.rpm
d4932367a0682b1f4e1890a4efc4db42 mes5/i586/firefox-lt-17.0.8-0.1mdvmes5.2.i586.rpm
8deecc7e00adab0dade5fe13be83ed41 mes5/i586/firefox-lv-17.0.8-0.1mdvmes5.2.i586.rpm
ddfd0944a6558969976ebd4f0ed44dbe mes5/i586/firefox-mk-17.0.8-0.1mdvmes5.2.i586.rpm
e6c0c835757bb0116358d0cfb8c7f207 mes5/i586/firefox-mr-17.0.8-0.1mdvmes5.2.i586.rpm
ae80058c833daab0dd66a88b0c0c6772 mes5/i586/firefox-nb_NO-17.0.8-0.1mdvmes5.2.i586.rpm
7e67615f956d1231a9e3d855d97a7350 mes5/i586/firefox-nl-17.0.8-0.1mdvmes5.2.i586.rpm
3fc4e0152ef76028480d8a38b2803aa6 mes5/i586/firefox-nn_NO-17.0.8-0.1mdvmes5.2.i586.rpm
fda353abf933749d3cfcc65fefbd2c93 mes5/i586/firefox-pa_IN-17.0.8-0.1mdvmes5.2.i586.rpm
bd8d28dff5a1a197a1aeb1a63da5ff99 mes5/i586/firefox-pl-17.0.8-0.1mdvmes5.2.i586.rpm
630c04f3fe1805dd15d42f990b1baa9f mes5/i586/firefox-pt_BR-17.0.8-0.1mdvmes5.2.i586.rpm
12dde35e40f50011fe6913f4e6289709 mes5/i586/firefox-pt_PT-17.0.8-0.1mdvmes5.2.i586.rpm
3b7ff6045de616a02d5491dfddf46811 mes5/i586/firefox-ro-17.0.8-0.1mdvmes5.2.i586.rpm
8cac861af4699f3e84fcdb6a55f73cdf mes5/i586/firefox-ru-17.0.8-0.1mdvmes5.2.i586.rpm
15ee32ab933aefafc375d83ca5c80868 mes5/i586/firefox-si-17.0.8-0.1mdvmes5.2.i586.rpm
cf054789ff2af1c04c83f78f80fe448c mes5/i586/firefox-sk-17.0.8-0.1mdvmes5.2.i586.rpm
02db99f511f89494db884a83d4da0e3c mes5/i586/firefox-sl-17.0.8-0.1mdvmes5.2.i586.rpm
ab9c773e53c88267bead88f6a8b09d3d mes5/i586/firefox-sq-17.0.8-0.1mdvmes5.2.i586.rpm
9b2eca96b09d2ca5d5dcc3be924215a5 mes5/i586/firefox-sr-17.0.8-0.1mdvmes5.2.i586.rpm
64d658edad80b75ef19b41487e26197f mes5/i586/firefox-sv_SE-17.0.8-0.1mdvmes5.2.i586.rpm
50db35dba6a5ad95244a282a655b9d61 mes5/i586/firefox-te-17.0.8-0.1mdvmes5.2.i586.rpm
b269a0b9e6184350b5ccd46b0eee9c27 mes5/i586/firefox-th-17.0.8-0.1mdvmes5.2.i586.rpm
3889432dba7a5c37ab5f6c7e72c6f4f4 mes5/i586/firefox-tr-17.0.8-0.1mdvmes5.2.i586.rpm
e2ef6b0f7be606343ef01ad6b7c09736 mes5/i586/firefox-uk-17.0.8-0.1mdvmes5.2.i586.rpm
9aee26d2ac4281ca226d1d2dfaecf52d mes5/i586/firefox-zh_CN-17.0.8-0.1mdvmes5.2.i586.rpm
a2fa41686d1ec0837ce4f6cefb1ec231 mes5/i586/firefox-zh_TW-17.0.8-0.1mdvmes5.2.i586.rpm
d70c0cc11ad779dd76bbb4b7e8f0f54b mes5/i586/icedtea-web-1.3.2-0.5mdvmes5.2.i586.rpm
3f34548d4e2b976fa821cdc0559bba71 mes5/i586/icedtea-web-javadoc-1.3.2-0.5mdvmes5.2.i586.rpm
65aa803483406e40a2ceca8cc2fa261f mes5/i586/libxulrunner17.0.8-17.0.8-0.1mdvmes5.2.i586.rpm
5d7e096c076db7f08c75fbd5d62bcfc2 mes5/i586/libxulrunner-devel-17.0.8-0.1mdvmes5.2.i586.rpm
f317f7d6ba597d1f9e0423122c8a11d7 mes5/i586/xulrunner-17.0.8-0.1mdvmes5.2.i586.rpm
ac336f1660a418cb3fa3fc8beefa865a mes5/SRPMS/firefox-17.0.8-0.1mdvmes5.2.src.rpm
cb7511bd6d9a03e5b2bc03ae425057b4 mes5/SRPMS/firefox-l10n-17.0.8-0.1mdvmes5.2.src.rpm
c9900b5160e7e8645ee4d99b5ef81653 mes5/SRPMS/icedtea-web-1.3.2-0.5mdvmes5.2.src.rpm
3b846b9552f004a0457ebe48be534454 mes5/SRPMS/xulrunner-17.0.8-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
3c282d990d4797772430bb4fb793c03c mes5/x86_64/firefox-17.0.8-0.1mdvmes5.2.x86_64.rpm
6841c3959a94d35f23b167ca3a51a85d mes5/x86_64/firefox-af-17.0.8-0.1mdvmes5.2.x86_64.rpm
6ad21340be8698517b6a1255fb20448b mes5/x86_64/firefox-ar-17.0.8-0.1mdvmes5.2.x86_64.rpm
933862c71d11fff95b830a902e55944b mes5/x86_64/firefox-be-17.0.8-0.1mdvmes5.2.x86_64.rpm
524f4ed0c29cf59554cd27fbfc048e09 mes5/x86_64/firefox-bg-17.0.8-0.1mdvmes5.2.x86_64.rpm
036d06479ebcc06245af9dd0984489b2 mes5/x86_64/firefox-bn-17.0.8-0.1mdvmes5.2.x86_64.rpm
f94584a4f8cc2b996ddf7adfcddf6749 mes5/x86_64/firefox-ca-17.0.8-0.1mdvmes5.2.x86_64.rpm
70100a489d0c9ce3c44c5be718064841 mes5/x86_64/firefox-cs-17.0.8-0.1mdvmes5.2.x86_64.rpm
d730f29f3a4ebc3de3d1e320ec966521 mes5/x86_64/firefox-cy-17.0.8-0.1mdvmes5.2.x86_64.rpm
352a5e86f732735279b61280d75accc3 mes5/x86_64/firefox-da-17.0.8-0.1mdvmes5.2.x86_64.rpm
2a99c26d811e94eddd9c92a41b8b5bd7 mes5/x86_64/firefox-de-17.0.8-0.1mdvmes5.2.x86_64.rpm
c485e43155aed87eb4679abf2ffdfaf5 mes5/x86_64/firefox-devel-17.0.8-0.1mdvmes5.2.x86_64.rpm
06549ef54b60a559e651194cab4e2698 mes5/x86_64/firefox-el-17.0.8-0.1mdvmes5.2.x86_64.rpm
1f52da8cfd0a316af8ba7dd17b694ead mes5/x86_64/firefox-en_GB-17.0.8-0.1mdvmes5.2.x86_64.rpm
62e859acdd77350e3c8fff7fb81e1fd7 mes5/x86_64/firefox-eo-17.0.8-0.1mdvmes5.2.x86_64.rpm
456876d71f021d7dfe1322b099ae94d2 mes5/x86_64/firefox-es_AR-17.0.8-0.1mdvmes5.2.x86_64.rpm
b84c4d07e9aa357cc813c395c5007765 mes5/x86_64/firefox-es_ES-17.0.8-0.1mdvmes5.2.x86_64.rpm
e8e20b71067e98ac0db173f15626ed24 mes5/x86_64/firefox-et-17.0.8-0.1mdvmes5.2.x86_64.rpm
4105bbcf29be9fd325cd26264c01db0d mes5/x86_64/firefox-eu-17.0.8-0.1mdvmes5.2.x86_64.rpm
5072b25a0900eb932fe849beda57fe4b mes5/x86_64/firefox-fi-17.0.8-0.1mdvmes5.2.x86_64.rpm
ad6c27f009e70080cef781b744b9def6 mes5/x86_64/firefox-fr-17.0.8-0.1mdvmes5.2.x86_64.rpm
458f0742c2a2d6580adc29f1165a3aed mes5/x86_64/firefox-fy-17.0.8-0.1mdvmes5.2.x86_64.rpm
e8d800ea8bac16ef7d257c7fd6cbf758 mes5/x86_64/firefox-ga_IE-17.0.8-0.1mdvmes5.2.x86_64.rpm
309a945b1984de02fa4aa156f0797b2a mes5/x86_64/firefox-gl-17.0.8-0.1mdvmes5.2.x86_64.rpm
efeef1826fbf0ac7daa87a87598a1422 mes5/x86_64/firefox-gu_IN-17.0.8-0.1mdvmes5.2.x86_64.rpm
e3438d925572d522e176e04fae2911f4 mes5/x86_64/firefox-he-17.0.8-0.1mdvmes5.2.x86_64.rpm
ad1065337cee861ddbbf3dcda601fc25 mes5/x86_64/firefox-hi-17.0.8-0.1mdvmes5.2.x86_64.rpm
1da1118034eb7a77ab074553a6c9b5f3 mes5/x86_64/firefox-hu-17.0.8-0.1mdvmes5.2.x86_64.rpm
556b84ebea466aa4c46e35cfea109251 mes5/x86_64/firefox-id-17.0.8-0.1mdvmes5.2.x86_64.rpm
37da9a24981b106646d6a89d3cfc77a9 mes5/x86_64/firefox-is-17.0.8-0.1mdvmes5.2.x86_64.rpm
5ec8441dd76ac066632cf0185e78ce4b mes5/x86_64/firefox-it-17.0.8-0.1mdvmes5.2.x86_64.rpm
1634719dee779fb55e1650741b31da70 mes5/x86_64/firefox-ja-17.0.8-0.1mdvmes5.2.x86_64.rpm
c70a47036902aadea43cecd37a2ba674 mes5/x86_64/firefox-kn-17.0.8-0.1mdvmes5.2.x86_64.rpm
16fbf9e84443621b1b7935a628926ff3 mes5/x86_64/firefox-ko-17.0.8-0.1mdvmes5.2.x86_64.rpm
1b4b195275950e66a3c54e113cbf2fa1 mes5/x86_64/firefox-ku-17.0.8-0.1mdvmes5.2.x86_64.rpm
8b565fe1ae1b0170729861bdc88f4832 mes5/x86_64/firefox-lt-17.0.8-0.1mdvmes5.2.x86_64.rpm
aaad8b8cf076c13fe4954adc274003b0 mes5/x86_64/firefox-lv-17.0.8-0.1mdvmes5.2.x86_64.rpm
43ab4edc7c5147bd5219ec1f5a4010e3 mes5/x86_64/firefox-mk-17.0.8-0.1mdvmes5.2.x86_64.rpm
df924a8daa179b022c54e558e5058f91 mes5/x86_64/firefox-mr-17.0.8-0.1mdvmes5.2.x86_64.rpm
cc2454e25f2f8519ae592e55bd36848b mes5/x86_64/firefox-nb_NO-17.0.8-0.1mdvmes5.2.x86_64.rpm
3000817c16581f1e80086207a1a2e8ed mes5/x86_64/firefox-nl-17.0.8-0.1mdvmes5.2.x86_64.rpm
5b0ebf075cc15d3f9bc71b36ce5e6464 mes5/x86_64/firefox-nn_NO-17.0.8-0.1mdvmes5.2.x86_64.rpm
a27e12f4e792d7d012d9fcac8ede3022 mes5/x86_64/firefox-pa_IN-17.0.8-0.1mdvmes5.2.x86_64.rpm
b59481f4ebaa9fe76b26cbea48c215db mes5/x86_64/firefox-pl-17.0.8-0.1mdvmes5.2.x86_64.rpm
8995496f79258f57efe752c35239cd57 mes5/x86_64/firefox-pt_BR-17.0.8-0.1mdvmes5.2.x86_64.rpm
f87cfca2d11141f31f7a2466ea9f89bd mes5/x86_64/firefox-pt_PT-17.0.8-0.1mdvmes5.2.x86_64.rpm
fff51e6c626e6c6d52f91ae33ed94b59 mes5/x86_64/firefox-ro-17.0.8-0.1mdvmes5.2.x86_64.rpm
c64d9b2213dcde2ea68fe75f4a5bd896 mes5/x86_64/firefox-ru-17.0.8-0.1mdvmes5.2.x86_64.rpm
a399bd1ac52b5167476911ce22d170ae mes5/x86_64/firefox-si-17.0.8-0.1mdvmes5.2.x86_64.rpm
4d379af7fc7d88b1df779b67dbab47d7 mes5/x86_64/firefox-sk-17.0.8-0.1mdvmes5.2.x86_64.rpm
b93f91926aaae7f0482eda738d41d04b mes5/x86_64/firefox-sl-17.0.8-0.1mdvmes5.2.x86_64.rpm
ff4013348fd0beb5216cdfee1a83e3d4 mes5/x86_64/firefox-sq-17.0.8-0.1mdvmes5.2.x86_64.rpm
813f4f5feecfdfb015e4dff57623c2d3 mes5/x86_64/firefox-sr-17.0.8-0.1mdvmes5.2.x86_64.rpm
0cc8a49521e436f52702ebb57d823119 mes5/x86_64/firefox-sv_SE-17.0.8-0.1mdvmes5.2.x86_64.rpm
96be899ded22b2190b20bc4d161aa7ce mes5/x86_64/firefox-te-17.0.8-0.1mdvmes5.2.x86_64.rpm
b75ab0a93f44caf16b93420f17a0e274 mes5/x86_64/firefox-th-17.0.8-0.1mdvmes5.2.x86_64.rpm
46c4608d5a8f06f26921dd78ad21aa95 mes5/x86_64/firefox-tr-17.0.8-0.1mdvmes5.2.x86_64.rpm
34eb8baa4b2e0afad5fc119c471d3871 mes5/x86_64/firefox-uk-17.0.8-0.1mdvmes5.2.x86_64.rpm
7ec1dd3dcbc11f4042624b7bce2f4949 mes5/x86_64/firefox-zh_CN-17.0.8-0.1mdvmes5.2.x86_64.rpm
60ed547048188ab2555048404f9ae3d2 mes5/x86_64/firefox-zh_TW-17.0.8-0.1mdvmes5.2.x86_64.rpm
c3128ca4367a451718855b0201a41ac0 mes5/x86_64/icedtea-web-1.3.2-0.5mdvmes5.2.x86_64.rpm
ce75a8caff3ceddae75de4e5bc63f921 mes5/x86_64/icedtea-web-javadoc-1.3.2-0.5mdvmes5.2.x86_64.rpm
0b88fc9dfe0d63d29bb87d0632e6be45 mes5/x86_64/lib64xulrunner17.0.8-17.0.8-0.1mdvmes5.2.x86_64.rpm
85b119a2e3f620da569d63f21d53a24d mes5/x86_64/lib64xulrunner-devel-17.0.8-0.1mdvmes5.2.x86_64.rpm
f20e48985dfac071a5c2e507c87cc108 mes5/x86_64/xulrunner-17.0.8-0.1mdvmes5.2.x86_64.rpm
ac336f1660a418cb3fa3fc8beefa865a mes5/SRPMS/firefox-17.0.8-0.1mdvmes5.2.src.rpm
cb7511bd6d9a03e5b2bc03ae425057b4 mes5/SRPMS/firefox-l10n-17.0.8-0.1mdvmes5.2.src.rpm
c9900b5160e7e8645ee4d99b5ef81653 mes5/SRPMS/icedtea-web-1.3.2-0.5mdvmes5.2.src.rpm
3b846b9552f004a0457ebe48be534454 mes5/SRPMS/xulrunner-17.0.8-0.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFSAfcvmqjQ0CJFipgRAjIqAKDDZO1O3gjjozREssZpRAeAA4X0KQCfcp31
WNVhqT9jKyqCV2sIk9F1FJ0=
=Tm6H
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close