-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2013:002 http://www.mandriva.com/security/ _______________________________________________________________________ Package : firefox Date : January 9, 2013 Affected: Enterprise Server 5.0 _______________________________________________________________________ Problem Description: Multiple security issue were identified and fixed in mozilla firefox: Google reported to Mozilla that TURKTRUST, a certificate authority in Mozillas root program, had mis-issued two intermediate certificates to customers. The issue was not specific to Firefox but there was evidence that one of the certificates was used for man-in-the-middle (MITM) traffic management of domain names that the customer did not legitimately own or control. This issue was resolved by revoking the trust for these specific mis-issued certificates (CVE-2013-0743). Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free within the ListenerManager when garbage collection is forced after data in listener objects have been allocated in some circumstances. This results in a use-after-free which can lead to arbitrary code execution (CVE-2013-0754). Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free in XMLSerializer by the exposing of serializeToStream to web content. This can lead to arbitrary code execution when exploited (CVE-2013-0753). Security researcher Mariusz Mlynski reported that it is possible to open a chrome privileged web page through plugin objects through interaction with SVG elements. This could allow for arbitrary code execution (CVE-2013-0758). Security researcher pa_kt reported a flaw via TippingPoint's Zero Day Initiative that an integer overflow is possible when calculating the length for a Javascript string concatenation, which is then used for memory allocation. This results in a buffer overflow, leading to a potentially exploitable memory corruption (CVE-2013-0750). Mozilla security researcher Jesse Ruderman discovered that using the toString function of XBL objects can lead to inappropriate information leakage by revealing the address space layout instead of just the ID of the object. This layout information could potentially be used to bypass ASLR and other security protections (CVE-2013-0748). Mozilla developer Boris Zbarsky reported reported a problem where jsval-returning quickstubs fail to wrap their return values, causing a compartment mismatch. This mismatch can cause garbage collection to occur incorrectly and lead to a potentially exploitable crash (CVE-2013-0746). Using the Address Sanitizer tool, security researcher Atte Kettunen from OUSPG discovered that the combination of large numbers of columns and column groups in a table could cause the array containing the columns during rendering to overwrite itself. This can lead to a user-after-free causing a potentially exploitable crash (CVE-2013-0744). Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a series critically rated of use-after-free, out of bounds read, and buffer overflow issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting three additional user-after-free and out of bounds read flaws introduced during Firefox development that were fixed before general release (CVE-2013-0762, CVE-2013-0766, CVE-2013-0767). Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code (CVE-2013-0769). Security researcher Masato Kinugawa found a flaw in which the displayed URL values within the addressbar can be spoofed by a page during loading. This allows for phishing attacks where a malicious page can spoof the identify of another site (CVE-2013-0759). The mozilla firefox packages has been upgraded to the latest version which is unaffected by these security flaws. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769 http://www.mozilla.org/security/announce/2013/mfsa2013-20.html http://www.mozilla.org/security/announce/2013/mfsa2013-17.html http://www.mozilla.org/security/announce/2013/mfsa2013-16.html http://www.mozilla.org/security/announce/2013/mfsa2013-15.html http://www.mozilla.org/security/announce/2013/mfsa2013-12.html http://www.mozilla.org/security/announce/2013/mfsa2013-11.html http://www.mozilla.org/security/announce/2013/mfsa2013-09.html http://www.mozilla.org/security/announce/2013/mfsa2013-05.html http://www.mozilla.org/security/announce/2013/mfsa2013-04.html http://www.mozilla.org/security/announce/2013/mfsa2013-02.html http://www.mozilla.org/security/announce/2013/mfsa2013-01.html _______________________________________________________________________ Updated Packages: Mandriva Enterprise Server 5: 6a90d41da959a6610024ff4edb00c7e0 mes5/i586/firefox-10.0.12-0.1mdvmes5.2.i586.rpm 938f2b80ff7ec162e91c7842d2e8d0fd mes5/i586/firefox-af-10.0.12-0.1mdvmes5.2.i586.rpm fc82e7256b8e4f2fcb6a0a89dd445d65 mes5/i586/firefox-ar-10.0.12-0.1mdvmes5.2.i586.rpm 09787dab37be7d8119342e10c54e770c mes5/i586/firefox-be-10.0.12-0.1mdvmes5.2.i586.rpm 3ece6288096f143a6849b1b1fd7d6b0e mes5/i586/firefox-bg-10.0.12-0.1mdvmes5.2.i586.rpm 8a3232659cce143dacf62362f0a41f26 mes5/i586/firefox-bn-10.0.12-0.1mdvmes5.2.i586.rpm 9feae96468c2eb22aa29ab382c110628 mes5/i586/firefox-ca-10.0.12-0.1mdvmes5.2.i586.rpm 630d5eab5dae17ab83d304da7743a2f8 mes5/i586/firefox-cs-10.0.12-0.1mdvmes5.2.i586.rpm c98adc9e537516663b0aaa65e7943393 mes5/i586/firefox-cy-10.0.12-0.1mdvmes5.2.i586.rpm b2ea10ba6d761a4907396630489d38ff mes5/i586/firefox-da-10.0.12-0.1mdvmes5.2.i586.rpm b2d71a3c37804060ba559f42580629e5 mes5/i586/firefox-de-10.0.12-0.1mdvmes5.2.i586.rpm 3d1fcb82cd8b0003a5fdca21a4fa35e8 mes5/i586/firefox-devel-10.0.12-0.1mdvmes5.2.i586.rpm dc0f4ebc0cd6cf8bcc147c2e141f8e4b mes5/i586/firefox-el-10.0.12-0.1mdvmes5.2.i586.rpm 02eb125c0027eb02cd228abca5a5ae90 mes5/i586/firefox-en_GB-10.0.12-0.1mdvmes5.2.i586.rpm 38d34ccae33ea9329c3bf08d0eb49bf0 mes5/i586/firefox-eo-10.0.12-0.1mdvmes5.2.i586.rpm ce1b02d401cea11eaa0e3985db9118fc mes5/i586/firefox-es_AR-10.0.12-0.1mdvmes5.2.i586.rpm be67f0b04803d142c94e03123c8dc035 mes5/i586/firefox-es_ES-10.0.12-0.1mdvmes5.2.i586.rpm d68633951b46759e49bb104ab7306006 mes5/i586/firefox-et-10.0.12-0.1mdvmes5.2.i586.rpm 93fcff1e6fe6fcdd639799f367e4eceb mes5/i586/firefox-eu-10.0.12-0.1mdvmes5.2.i586.rpm 92edf937b64fcc545af68f48de84f2ca mes5/i586/firefox-fi-10.0.12-0.1mdvmes5.2.i586.rpm f3ae76b728936e2962bbf90aaa1d1810 mes5/i586/firefox-fr-10.0.12-0.1mdvmes5.2.i586.rpm 9992758506f970829796c9691740f236 mes5/i586/firefox-fy-10.0.12-0.1mdvmes5.2.i586.rpm 26f2678ee6e21bd7928bc3ae85654fb3 mes5/i586/firefox-ga_IE-10.0.12-0.1mdvmes5.2.i586.rpm d67703274e9d9d25426c10337da56cbd mes5/i586/firefox-gl-10.0.12-0.1mdvmes5.2.i586.rpm af6c4fa86abd84930adc97e87fc901c6 mes5/i586/firefox-gu_IN-10.0.12-0.1mdvmes5.2.i586.rpm 9775a563ee7ef785fe7a0a80272bd1d4 mes5/i586/firefox-he-10.0.12-0.1mdvmes5.2.i586.rpm 14e7d4c2a4e83fbe2878ec14f78ffe83 mes5/i586/firefox-hi-10.0.12-0.1mdvmes5.2.i586.rpm 02a3061d522afa5d694b379347ef87ef mes5/i586/firefox-hu-10.0.12-0.1mdvmes5.2.i586.rpm 03bd7939a6257654c658977e55b6cb69 mes5/i586/firefox-id-10.0.12-0.1mdvmes5.2.i586.rpm 7faec047d662ae55661d75bb6abecd2c mes5/i586/firefox-is-10.0.12-0.1mdvmes5.2.i586.rpm 8728abb00f2924a7776d2fa3bd068dfb mes5/i586/firefox-it-10.0.12-0.1mdvmes5.2.i586.rpm cdcab0ee96a71f00a576182ed3b8fa08 mes5/i586/firefox-ja-10.0.12-0.1mdvmes5.2.i586.rpm 9400eca7d1557cf2f724367bb1ef206d mes5/i586/firefox-ka-10.0.12-0.1mdvmes5.2.i586.rpm c1ddccc95fa8c23bb63478a637ef1b7b mes5/i586/firefox-kn-10.0.12-0.1mdvmes5.2.i586.rpm 7e9f68326f6cf99093144e74f57c85a5 mes5/i586/firefox-ko-10.0.12-0.1mdvmes5.2.i586.rpm cc6858bc89c9ba562b3cfe5dd54d0b15 mes5/i586/firefox-ku-10.0.12-0.1mdvmes5.2.i586.rpm aca89e6575c44a2d4510cf150558955b mes5/i586/firefox-lt-10.0.12-0.1mdvmes5.2.i586.rpm 933ca52186e944ff75959c00a3237c6c mes5/i586/firefox-lv-10.0.12-0.1mdvmes5.2.i586.rpm 4de4dfe7c535841f8289ad815792eefb mes5/i586/firefox-mk-10.0.12-0.1mdvmes5.2.i586.rpm 340f9e5666980ab34f56b508f1869be0 mes5/i586/firefox-mr-10.0.12-0.1mdvmes5.2.i586.rpm 674a45c6e740e99fce3bcb0421bf692d mes5/i586/firefox-nb_NO-10.0.12-0.1mdvmes5.2.i586.rpm 4bae8177b0e2d09b4808de91a5cbb480 mes5/i586/firefox-nl-10.0.12-0.1mdvmes5.2.i586.rpm 9502588f48efc18251bb0a2c4da7c67f mes5/i586/firefox-nn_NO-10.0.12-0.1mdvmes5.2.i586.rpm 28d01c92b5bfada1257488ca5cb81090 mes5/i586/firefox-oc-10.0.12-0.1mdvmes5.2.i586.rpm 45e0e75bf13e31abe5191678e6cb29fb mes5/i586/firefox-pa_IN-10.0.12-0.1mdvmes5.2.i586.rpm 03e82c9b1d26728c64a15eff2b9fe8a4 mes5/i586/firefox-pl-10.0.12-0.1mdvmes5.2.i586.rpm a078db90fa6ccb9b5e8eab7aed6fc383 mes5/i586/firefox-pt_BR-10.0.12-0.1mdvmes5.2.i586.rpm ff6817be10d5d025368fafab359cb9bc mes5/i586/firefox-pt_PT-10.0.12-0.1mdvmes5.2.i586.rpm e83044cedd0ab955bd490a75e0262fdf mes5/i586/firefox-ro-10.0.12-0.1mdvmes5.2.i586.rpm f3829090c91f64cf42b6704eaa1556cc mes5/i586/firefox-ru-10.0.12-0.1mdvmes5.2.i586.rpm e67d78b38b09764cc3db7a2fb7aa0ccb mes5/i586/firefox-si-10.0.12-0.1mdvmes5.2.i586.rpm b60a1a00c4c6e1ffd59bdcd30135a9e5 mes5/i586/firefox-sk-10.0.12-0.1mdvmes5.2.i586.rpm 6e86141416b66260ad50b69eba3ca831 mes5/i586/firefox-sl-10.0.12-0.1mdvmes5.2.i586.rpm cc32659b3b38d1889f4c20df6b5861cc mes5/i586/firefox-sq-10.0.12-0.1mdvmes5.2.i586.rpm e068225cac9ac0afb6e4a8a6d6efb0cc mes5/i586/firefox-sr-10.0.12-0.1mdvmes5.2.i586.rpm 5b82daf461e65242138e10488a1dbf3c mes5/i586/firefox-sv_SE-10.0.12-0.1mdvmes5.2.i586.rpm 797b4f3353d792d8e218a1288440da29 mes5/i586/firefox-te-10.0.12-0.1mdvmes5.2.i586.rpm 39691dbd8084474882eaaa23bed11075 mes5/i586/firefox-th-10.0.12-0.1mdvmes5.2.i586.rpm 1fa94929f117a926bdfaae3a4d8b6f7d mes5/i586/firefox-tr-10.0.12-0.1mdvmes5.2.i586.rpm a15d57069fd1b8a9c342df41b458282b mes5/i586/firefox-uk-10.0.12-0.1mdvmes5.2.i586.rpm 796978e53b900ba33952ea604622c590 mes5/i586/firefox-zh_CN-10.0.12-0.1mdvmes5.2.i586.rpm 9d6256d9b1f5991d1852fc1096491202 mes5/i586/firefox-zh_TW-10.0.12-0.1mdvmes5.2.i586.rpm d30907827f13429b2e554ea4e6856240 mes5/i586/libnss3-3.14.1-0.1mdvmes5.2.i586.rpm 4e25b43c99caa549211c45e8ef0b1ac2 mes5/i586/libnss-devel-3.14.1-0.1mdvmes5.2.i586.rpm a28d9a2e4848a75edff6cc6fda90ee98 mes5/i586/libnss-static-devel-3.14.1-0.1mdvmes5.2.i586.rpm 64f15e1555ebd2c5511ea4d0f988c777 mes5/i586/libxulrunner10.0.12-10.0.12-0.1mdvmes5.2.i586.rpm c02744f54afb7aa102b4ffaaf30560f2 mes5/i586/libxulrunner-devel-10.0.12-0.1mdvmes5.2.i586.rpm 1f63bfcd2cc7b87bc1b36143940ca1f0 mes5/i586/nss-3.14.1-0.1mdvmes5.2.i586.rpm 6fc25499ab31eab00dc329dd0795f98f mes5/i586/rootcerts-20121229.00-1mdvmes5.2.i586.rpm d5b3814fca55f73fa5a432cde1a87286 mes5/i586/rootcerts-java-20121229.00-1mdvmes5.2.i586.rpm addec10a773ab4aa83d9998d528d2c0c mes5/i586/xulrunner-10.0.12-0.1mdvmes5.2.i586.rpm e8e89ae09156de53165df7e1be0be753 mes5/SRPMS/firefox-10.0.12-0.1mdvmes5.2.src.rpm ae626ca038b1b222c80b8df684604519 mes5/SRPMS/firefox-l10n-10.0.12-0.1mdvmes5.2.src.rpm 8bb7847fd80ec7c831f442ec6153600f mes5/SRPMS/nss-3.14.1-0.1mdvmes5.2.src.rpm 677882e23b0d751aab5992de12ee58c8 mes5/SRPMS/rootcerts-20121229.00-1mdvmes5.2.src.rpm 8fafd87dca1aa4d1ea665292e00f7d98 mes5/SRPMS/xulrunner-10.0.12-0.1mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: ec73b765cf90091a3904b108f5ca91a8 mes5/x86_64/firefox-10.0.12-0.1mdvmes5.2.x86_64.rpm 9f0b7687a33ebe50fcbdbaec5a578a4a mes5/x86_64/firefox-af-10.0.12-0.1mdvmes5.2.x86_64.rpm 4769684681901d7d0f3da67b0079c499 mes5/x86_64/firefox-ar-10.0.12-0.1mdvmes5.2.x86_64.rpm ca810320d78c8edc590ea1a3755dadaa mes5/x86_64/firefox-be-10.0.12-0.1mdvmes5.2.x86_64.rpm 513a67ee607b439e6cdbb7e206ba57f1 mes5/x86_64/firefox-bg-10.0.12-0.1mdvmes5.2.x86_64.rpm e171340bea0e000fcdb83c77f11c57f6 mes5/x86_64/firefox-bn-10.0.12-0.1mdvmes5.2.x86_64.rpm 4ede105e999009cf2762efa458313f2a mes5/x86_64/firefox-ca-10.0.12-0.1mdvmes5.2.x86_64.rpm 48ba34b0537c0efc4799325134689140 mes5/x86_64/firefox-cs-10.0.12-0.1mdvmes5.2.x86_64.rpm 6e2c6107c7539cbb77f3fe4266812388 mes5/x86_64/firefox-cy-10.0.12-0.1mdvmes5.2.x86_64.rpm 6633981954d7fdb722b574edc32de1c3 mes5/x86_64/firefox-da-10.0.12-0.1mdvmes5.2.x86_64.rpm b891c31801e0cb20a3e0be6e49929f43 mes5/x86_64/firefox-de-10.0.12-0.1mdvmes5.2.x86_64.rpm e4118fd3aa498494a1000d3b14941428 mes5/x86_64/firefox-devel-10.0.12-0.1mdvmes5.2.x86_64.rpm 4c34458067745fbc9d98385159cabb4e mes5/x86_64/firefox-el-10.0.12-0.1mdvmes5.2.x86_64.rpm 9f9bd2dbb1d2d965959af26ca752e0b4 mes5/x86_64/firefox-en_GB-10.0.12-0.1mdvmes5.2.x86_64.rpm 36ca1fd771d1c0765102f61400acb9c3 mes5/x86_64/firefox-eo-10.0.12-0.1mdvmes5.2.x86_64.rpm 469e680897bdff78d748acb94f2a75b0 mes5/x86_64/firefox-es_AR-10.0.12-0.1mdvmes5.2.x86_64.rpm 54094cfb1efbcff7a48c68086f2f1848 mes5/x86_64/firefox-es_ES-10.0.12-0.1mdvmes5.2.x86_64.rpm 1896c23b5b472707ed8d9cf419ef639a mes5/x86_64/firefox-et-10.0.12-0.1mdvmes5.2.x86_64.rpm a0203f65040faab8abc43079f9352dd4 mes5/x86_64/firefox-eu-10.0.12-0.1mdvmes5.2.x86_64.rpm 020cddeb794a57fdd69d619add6d7195 mes5/x86_64/firefox-fi-10.0.12-0.1mdvmes5.2.x86_64.rpm c9b9c9c4ebdff7e75812d832c00117ba mes5/x86_64/firefox-fr-10.0.12-0.1mdvmes5.2.x86_64.rpm 1696482cd4c038df4f09b0db2feff3a2 mes5/x86_64/firefox-fy-10.0.12-0.1mdvmes5.2.x86_64.rpm c4a94dd5adc727a32d475c9e4841cc3b mes5/x86_64/firefox-ga_IE-10.0.12-0.1mdvmes5.2.x86_64.rpm e7ac24f6b43839b1195b9a4021c60400 mes5/x86_64/firefox-gl-10.0.12-0.1mdvmes5.2.x86_64.rpm 03714c3d430ce0588df44335809b1497 mes5/x86_64/firefox-gu_IN-10.0.12-0.1mdvmes5.2.x86_64.rpm 0aab4f6aed0e40ae4d9bc792baf46f77 mes5/x86_64/firefox-he-10.0.12-0.1mdvmes5.2.x86_64.rpm 1a3bbd79e3ed3ad58c2c05de1bdfb345 mes5/x86_64/firefox-hi-10.0.12-0.1mdvmes5.2.x86_64.rpm 4bd0dd2359a4956c9a10d812f4558a2d mes5/x86_64/firefox-hu-10.0.12-0.1mdvmes5.2.x86_64.rpm 1c200ee911d9bcb57667bc171e5e34bd mes5/x86_64/firefox-id-10.0.12-0.1mdvmes5.2.x86_64.rpm d1a20db5877533297aa37cfa61a643ad mes5/x86_64/firefox-is-10.0.12-0.1mdvmes5.2.x86_64.rpm fa88e6be3877b527ca57f3c70f5f0b48 mes5/x86_64/firefox-it-10.0.12-0.1mdvmes5.2.x86_64.rpm 252a3ae2c4b3583d1e9466052eec0430 mes5/x86_64/firefox-ja-10.0.12-0.1mdvmes5.2.x86_64.rpm 524c2d72c0e62fddfc5bc66c257ea20b mes5/x86_64/firefox-ka-10.0.12-0.1mdvmes5.2.x86_64.rpm 1935cab2d2a52159f031982e2ce823de mes5/x86_64/firefox-kn-10.0.12-0.1mdvmes5.2.x86_64.rpm ec2434a00ac1d07070a35b992f162f67 mes5/x86_64/firefox-ko-10.0.12-0.1mdvmes5.2.x86_64.rpm 7709a131d2652966fc83dd9008fd2a1d mes5/x86_64/firefox-ku-10.0.12-0.1mdvmes5.2.x86_64.rpm cbdb15c811f783d9f948ac82c343d473 mes5/x86_64/firefox-lt-10.0.12-0.1mdvmes5.2.x86_64.rpm 2f85d25b00245770e27b897da34efc09 mes5/x86_64/firefox-lv-10.0.12-0.1mdvmes5.2.x86_64.rpm 279cd222db83b5404bd4a65745e5bedc mes5/x86_64/firefox-mk-10.0.12-0.1mdvmes5.2.x86_64.rpm 8692038a08c4e80257c3449a47ef3d10 mes5/x86_64/firefox-mr-10.0.12-0.1mdvmes5.2.x86_64.rpm 5b55c11f1c5e3e88054dae45cf5f02f1 mes5/x86_64/firefox-nb_NO-10.0.12-0.1mdvmes5.2.x86_64.rpm fe93c427b7555bb02c30114305251890 mes5/x86_64/firefox-nl-10.0.12-0.1mdvmes5.2.x86_64.rpm be2487874444cf17f0ed99096cbe1fc6 mes5/x86_64/firefox-nn_NO-10.0.12-0.1mdvmes5.2.x86_64.rpm 48ea3a91e056d7d6dcb33f14c1117655 mes5/x86_64/firefox-oc-10.0.12-0.1mdvmes5.2.x86_64.rpm 1a11efbd275ebcd3d758bfbba02a0992 mes5/x86_64/firefox-pa_IN-10.0.12-0.1mdvmes5.2.x86_64.rpm 98aa0847b946f7342b31e4fd8e6b5535 mes5/x86_64/firefox-pl-10.0.12-0.1mdvmes5.2.x86_64.rpm 3df14cce3a10e9e4bff3aa7a41d76125 mes5/x86_64/firefox-pt_BR-10.0.12-0.1mdvmes5.2.x86_64.rpm f18fe2bd2c293ee9b3ba123e67866ec7 mes5/x86_64/firefox-pt_PT-10.0.12-0.1mdvmes5.2.x86_64.rpm 61070062992c0b712c58c92271907243 mes5/x86_64/firefox-ro-10.0.12-0.1mdvmes5.2.x86_64.rpm ed4a8fc4378462e55606478e1d92ef5a mes5/x86_64/firefox-ru-10.0.12-0.1mdvmes5.2.x86_64.rpm 00d839e039bb614ba50cabb88103755d mes5/x86_64/firefox-si-10.0.12-0.1mdvmes5.2.x86_64.rpm 93d25e236dbea61bf7593d0463dd8643 mes5/x86_64/firefox-sk-10.0.12-0.1mdvmes5.2.x86_64.rpm 17eb20f40351fd5e0e5a9077eafd716c mes5/x86_64/firefox-sl-10.0.12-0.1mdvmes5.2.x86_64.rpm 4bda3c464b1b1e628b5650a302b39524 mes5/x86_64/firefox-sq-10.0.12-0.1mdvmes5.2.x86_64.rpm ccd95f763630b8484b5fd117eeddc197 mes5/x86_64/firefox-sr-10.0.12-0.1mdvmes5.2.x86_64.rpm 2ea10348ff1177ddf59d62153e1ddc71 mes5/x86_64/firefox-sv_SE-10.0.12-0.1mdvmes5.2.x86_64.rpm df4ab9036f0bff7d9a7ce0c50748db3e mes5/x86_64/firefox-te-10.0.12-0.1mdvmes5.2.x86_64.rpm b8ff0defe1b3b30ab0033471d5be7855 mes5/x86_64/firefox-th-10.0.12-0.1mdvmes5.2.x86_64.rpm 9cbbe714668283a7fd7a0bbb27568df9 mes5/x86_64/firefox-tr-10.0.12-0.1mdvmes5.2.x86_64.rpm 54ce6885a983b683cc8aedb1af764ae1 mes5/x86_64/firefox-uk-10.0.12-0.1mdvmes5.2.x86_64.rpm ab2921983540572d129979470a9a7c7c mes5/x86_64/firefox-zh_CN-10.0.12-0.1mdvmes5.2.x86_64.rpm f57ea6e4ab935376f5ae7ae6836ec029 mes5/x86_64/firefox-zh_TW-10.0.12-0.1mdvmes5.2.x86_64.rpm 999fc06a1f990adf5ea007f9dbc0487c mes5/x86_64/lib64nss3-3.14.1-0.1mdvmes5.2.x86_64.rpm b34a6f2b1dc929f1d172fe4583edf21d mes5/x86_64/lib64nss-devel-3.14.1-0.1mdvmes5.2.x86_64.rpm b8d0b295fba8cc9ce19cdef9597de9e7 mes5/x86_64/lib64nss-static-devel-3.14.1-0.1mdvmes5.2.x86_64.rpm 002686d95013a49ad1a6b28945213a9d mes5/x86_64/lib64xulrunner10.0.12-10.0.12-0.1mdvmes5.2.x86_64.rpm 46c09addafd24a61662ad49ac52df5f7 mes5/x86_64/lib64xulrunner-devel-10.0.12-0.1mdvmes5.2.x86_64.rpm c1c86f04afc39d1ac6c2705b9d6a4d42 mes5/x86_64/nss-3.14.1-0.1mdvmes5.2.x86_64.rpm 95bffee2ac111d0ec9effa96f7841ecc mes5/x86_64/rootcerts-20121229.00-1mdvmes5.2.x86_64.rpm 54c2119efa4bc067f6ea786139ef6aac mes5/x86_64/rootcerts-java-20121229.00-1mdvmes5.2.x86_64.rpm c0b8c0b055c3279b1aca88c549a613e8 mes5/x86_64/xulrunner-10.0.12-0.1mdvmes5.2.x86_64.rpm e8e89ae09156de53165df7e1be0be753 mes5/SRPMS/firefox-10.0.12-0.1mdvmes5.2.src.rpm ae626ca038b1b222c80b8df684604519 mes5/SRPMS/firefox-l10n-10.0.12-0.1mdvmes5.2.src.rpm 8bb7847fd80ec7c831f442ec6153600f mes5/SRPMS/nss-3.14.1-0.1mdvmes5.2.src.rpm 677882e23b0d751aab5992de12ee58c8 mes5/SRPMS/rootcerts-20121229.00-1mdvmes5.2.src.rpm 8fafd87dca1aa4d1ea665292e00f7d98 mes5/SRPMS/xulrunner-10.0.12-0.1mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFQ7XsJmqjQ0CJFipgRAlIiAJ0aJSsM/+wyE3VStjRsWTn/gnC0SwCg0t94 d0D4tqI+UfwJ8Pa8VJHqEr4= =fZ5j -----END PGP SIGNATURE-----