Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Mozilla Firefox
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Mozilla Firefox
ID: MDVSA-2013:210
Distribution: Mandriva
Plattformen: Mandriva Enterprise Server 5.0
Datum: Mi, 7. August 2013, 16:33
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
http://www.mozilla.org/security/announce/2013/mfsa2013-63.html
http://www.mozilla.org/security/announce/2013/mfsa2013-68.html
http://www.mozilla.org/security/announce/2013/mfsa2013-69.html
http://www.mozilla.org/security/announce/2013/mfsa2013-72.html
http://www.mozilla.org/security/announce/2013/mfsa2013-73.html
http://www.mozilla.org/security/announce/2013/mfsa2013-75.html
Applikationen: Mozilla Firefox

Originalnachricht

This is a multi-part message in MIME format...

------------=_1375871969-3002-19

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:210
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : firefox
Date : August 7, 2013
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple security issues was identified and fixed in mozilla firefox:

Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code (CVE-2013-1701).

Mozilla security researcher moz_bug_r_a4 reported that through an
interaction of frames and browser history it was possible to make
the browser believe attacker-supplied content came from the location
of a previous page in browser history. This allows for cross-site
scripting (XSS) attacks by loading scripts from a misrepresented
malicious site through relative locations and the potential access
of stored credentials of a spoofed site (CVE-2013-1709).

Mozilla security researcher moz_bug_r_a4 reported a mechanism to
execute arbitrary code or a cross-site scripting (XSS) attack when
Certificate Request Message Format (CRMF) request is generated in
certain circumstances (CVE-2013-1710).

Security researcher Cody Crews reported that some Javascript components
will perform checks against the wrong uniform resource identifier
(URI) before performing security sensitive actions. This will return
an incorrect location for the originator of the call. This could be
used to bypass same-origin policy, allowing for cross-site scripting
(XSS) or the installation of malicious add-ons from third-party pages
(CVE-2013-1713).

Mozilla community member Federico Lanusse reported a mechanism where
a web worker can violate same-origin policy and bypass cross-origin
checks through XMLHttpRequest. This could allow for cross-site
scripting (XSS) attacks by web workers (CVE-2013-1714).

Security researcher Georgi Guninski reported an issue with Java
applets where in some circumstances the applet could access files on
the local system when loaded using the a file:/// URI and violate file
origin policy due to interaction with the codebase parameter. This
affects applets running on the local file system. Mozilla developer
John Schoenick later discovered that fixes for this issue were
inadequate and allowed the invocation of Java applets to bypass
security checks in additional circumstances. This could lead to
untrusted Java applets having read-only access on the local files
system if used in conjunction with a method to download a file to a
known or guessable path (CVE-2013-1717).

The mozilla firefox packages has been upgraded to the latest ESR
version (17.0.8) which is unaffected by these security flaws.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
http://www.mozilla.org/security/announce/2013/mfsa2013-63.html
http://www.mozilla.org/security/announce/2013/mfsa2013-68.html
http://www.mozilla.org/security/announce/2013/mfsa2013-69.html
http://www.mozilla.org/security/announce/2013/mfsa2013-72.html
http://www.mozilla.org/security/announce/2013/mfsa2013-73.html
http://www.mozilla.org/security/announce/2013/mfsa2013-75.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
46ceb0ccb376702e10d5686b24955fab
mes5/i586/firefox-17.0.8-0.1mdvmes5.2.i586.rpm
3f3645b0900378ef1bce58fca5ae129c
mes5/i586/firefox-af-17.0.8-0.1mdvmes5.2.i586.rpm
5a5d166e6d90d0f777e41c0e45b9ce4e
mes5/i586/firefox-ar-17.0.8-0.1mdvmes5.2.i586.rpm
0f90909e08052d28fe6b26ca7c913f4e
mes5/i586/firefox-be-17.0.8-0.1mdvmes5.2.i586.rpm
aa3976b6a51f00949c3b589abf87f0f2
mes5/i586/firefox-bg-17.0.8-0.1mdvmes5.2.i586.rpm
f58486e6bc5071825bd6e8e6ce2145bf
mes5/i586/firefox-bn-17.0.8-0.1mdvmes5.2.i586.rpm
82b455ccd6a14d15a2fc9c4bcd6e977d
mes5/i586/firefox-ca-17.0.8-0.1mdvmes5.2.i586.rpm
19f86d829880f9b2af4c400222c1e533
mes5/i586/firefox-cs-17.0.8-0.1mdvmes5.2.i586.rpm
d8b0b922b813a7eecd9175b191e55426
mes5/i586/firefox-cy-17.0.8-0.1mdvmes5.2.i586.rpm
f83f4472c502a72abf51dfb0c1e20a2c
mes5/i586/firefox-da-17.0.8-0.1mdvmes5.2.i586.rpm
5a177c95f748b2d1b78d27fd0d880da3
mes5/i586/firefox-de-17.0.8-0.1mdvmes5.2.i586.rpm
60328b5b3b31d84b682ef09d950b7020
mes5/i586/firefox-devel-17.0.8-0.1mdvmes5.2.i586.rpm
6e9dd5e25356825db93e0525ce54d197
mes5/i586/firefox-el-17.0.8-0.1mdvmes5.2.i586.rpm
40bf03b77f52d77e23665a5dd30a5feb
mes5/i586/firefox-en_GB-17.0.8-0.1mdvmes5.2.i586.rpm
9738522181041bbda3d5b86a581b776b
mes5/i586/firefox-eo-17.0.8-0.1mdvmes5.2.i586.rpm
a0a8820e298ac23d9ef0d700f06dda22
mes5/i586/firefox-es_AR-17.0.8-0.1mdvmes5.2.i586.rpm
9478ec5aae3c9e3a01c0e61fb049a759
mes5/i586/firefox-es_ES-17.0.8-0.1mdvmes5.2.i586.rpm
48e951f581905518428a3390ab671778
mes5/i586/firefox-et-17.0.8-0.1mdvmes5.2.i586.rpm
eb155424ba0fbe90fe2d509701840309
mes5/i586/firefox-eu-17.0.8-0.1mdvmes5.2.i586.rpm
18e069c61f00efb879acbd6e30991d7f
mes5/i586/firefox-fi-17.0.8-0.1mdvmes5.2.i586.rpm
a91e599b05eedd536e218e425027593f
mes5/i586/firefox-fr-17.0.8-0.1mdvmes5.2.i586.rpm
5e4629a4234ba4c57e878630e7433163
mes5/i586/firefox-fy-17.0.8-0.1mdvmes5.2.i586.rpm
6f29aa4827273079410a8a5d336f6f23
mes5/i586/firefox-ga_IE-17.0.8-0.1mdvmes5.2.i586.rpm
f6a635a52ad10a14b1d7394214de1bd4
mes5/i586/firefox-gl-17.0.8-0.1mdvmes5.2.i586.rpm
ad9174fe19b8b88b95e3edc586556279
mes5/i586/firefox-gu_IN-17.0.8-0.1mdvmes5.2.i586.rpm
fa937d44c65457b266b1b3b20ed94fd9
mes5/i586/firefox-he-17.0.8-0.1mdvmes5.2.i586.rpm
98afd632f866ab44f7b6a8c4a1dface6
mes5/i586/firefox-hi-17.0.8-0.1mdvmes5.2.i586.rpm
d29f473f43f545ba250d1e30c3aff422
mes5/i586/firefox-hu-17.0.8-0.1mdvmes5.2.i586.rpm
aeb691e8bf7a155e77478ef701f5eca4
mes5/i586/firefox-id-17.0.8-0.1mdvmes5.2.i586.rpm
49e656b2c28c6cbc6283e1963aa04bd2
mes5/i586/firefox-is-17.0.8-0.1mdvmes5.2.i586.rpm
fbeb18150371a00d7b437cbd820684d9
mes5/i586/firefox-it-17.0.8-0.1mdvmes5.2.i586.rpm
6c293bd648fc4c77146a5987c74b6360
mes5/i586/firefox-ja-17.0.8-0.1mdvmes5.2.i586.rpm
0885b93d243c56617f0df7240d2b032b
mes5/i586/firefox-kn-17.0.8-0.1mdvmes5.2.i586.rpm
282f096d7178eada2411cce985a1f949
mes5/i586/firefox-ko-17.0.8-0.1mdvmes5.2.i586.rpm
1ecb7dfe2b6ca182354e0a1ea7253c7b
mes5/i586/firefox-ku-17.0.8-0.1mdvmes5.2.i586.rpm
d4932367a0682b1f4e1890a4efc4db42
mes5/i586/firefox-lt-17.0.8-0.1mdvmes5.2.i586.rpm
8deecc7e00adab0dade5fe13be83ed41
mes5/i586/firefox-lv-17.0.8-0.1mdvmes5.2.i586.rpm
ddfd0944a6558969976ebd4f0ed44dbe
mes5/i586/firefox-mk-17.0.8-0.1mdvmes5.2.i586.rpm
e6c0c835757bb0116358d0cfb8c7f207
mes5/i586/firefox-mr-17.0.8-0.1mdvmes5.2.i586.rpm
ae80058c833daab0dd66a88b0c0c6772
mes5/i586/firefox-nb_NO-17.0.8-0.1mdvmes5.2.i586.rpm
7e67615f956d1231a9e3d855d97a7350
mes5/i586/firefox-nl-17.0.8-0.1mdvmes5.2.i586.rpm
3fc4e0152ef76028480d8a38b2803aa6
mes5/i586/firefox-nn_NO-17.0.8-0.1mdvmes5.2.i586.rpm
fda353abf933749d3cfcc65fefbd2c93
mes5/i586/firefox-pa_IN-17.0.8-0.1mdvmes5.2.i586.rpm
bd8d28dff5a1a197a1aeb1a63da5ff99
mes5/i586/firefox-pl-17.0.8-0.1mdvmes5.2.i586.rpm
630c04f3fe1805dd15d42f990b1baa9f
mes5/i586/firefox-pt_BR-17.0.8-0.1mdvmes5.2.i586.rpm
12dde35e40f50011fe6913f4e6289709
mes5/i586/firefox-pt_PT-17.0.8-0.1mdvmes5.2.i586.rpm
3b7ff6045de616a02d5491dfddf46811
mes5/i586/firefox-ro-17.0.8-0.1mdvmes5.2.i586.rpm
8cac861af4699f3e84fcdb6a55f73cdf
mes5/i586/firefox-ru-17.0.8-0.1mdvmes5.2.i586.rpm
15ee32ab933aefafc375d83ca5c80868
mes5/i586/firefox-si-17.0.8-0.1mdvmes5.2.i586.rpm
cf054789ff2af1c04c83f78f80fe448c
mes5/i586/firefox-sk-17.0.8-0.1mdvmes5.2.i586.rpm
02db99f511f89494db884a83d4da0e3c
mes5/i586/firefox-sl-17.0.8-0.1mdvmes5.2.i586.rpm
ab9c773e53c88267bead88f6a8b09d3d
mes5/i586/firefox-sq-17.0.8-0.1mdvmes5.2.i586.rpm
9b2eca96b09d2ca5d5dcc3be924215a5
mes5/i586/firefox-sr-17.0.8-0.1mdvmes5.2.i586.rpm
64d658edad80b75ef19b41487e26197f
mes5/i586/firefox-sv_SE-17.0.8-0.1mdvmes5.2.i586.rpm
50db35dba6a5ad95244a282a655b9d61
mes5/i586/firefox-te-17.0.8-0.1mdvmes5.2.i586.rpm
b269a0b9e6184350b5ccd46b0eee9c27
mes5/i586/firefox-th-17.0.8-0.1mdvmes5.2.i586.rpm
3889432dba7a5c37ab5f6c7e72c6f4f4
mes5/i586/firefox-tr-17.0.8-0.1mdvmes5.2.i586.rpm
e2ef6b0f7be606343ef01ad6b7c09736
mes5/i586/firefox-uk-17.0.8-0.1mdvmes5.2.i586.rpm
9aee26d2ac4281ca226d1d2dfaecf52d
mes5/i586/firefox-zh_CN-17.0.8-0.1mdvmes5.2.i586.rpm
a2fa41686d1ec0837ce4f6cefb1ec231
mes5/i586/firefox-zh_TW-17.0.8-0.1mdvmes5.2.i586.rpm
d70c0cc11ad779dd76bbb4b7e8f0f54b
mes5/i586/icedtea-web-1.3.2-0.5mdvmes5.2.i586.rpm
3f34548d4e2b976fa821cdc0559bba71
mes5/i586/icedtea-web-javadoc-1.3.2-0.5mdvmes5.2.i586.rpm
65aa803483406e40a2ceca8cc2fa261f
mes5/i586/libxulrunner17.0.8-17.0.8-0.1mdvmes5.2.i586.rpm
5d7e096c076db7f08c75fbd5d62bcfc2
mes5/i586/libxulrunner-devel-17.0.8-0.1mdvmes5.2.i586.rpm
f317f7d6ba597d1f9e0423122c8a11d7
mes5/i586/xulrunner-17.0.8-0.1mdvmes5.2.i586.rpm
ac336f1660a418cb3fa3fc8beefa865a
mes5/SRPMS/firefox-17.0.8-0.1mdvmes5.2.src.rpm
cb7511bd6d9a03e5b2bc03ae425057b4
mes5/SRPMS/firefox-l10n-17.0.8-0.1mdvmes5.2.src.rpm
c9900b5160e7e8645ee4d99b5ef81653
mes5/SRPMS/icedtea-web-1.3.2-0.5mdvmes5.2.src.rpm
3b846b9552f004a0457ebe48be534454
mes5/SRPMS/xulrunner-17.0.8-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
3c282d990d4797772430bb4fb793c03c
mes5/x86_64/firefox-17.0.8-0.1mdvmes5.2.x86_64.rpm
6841c3959a94d35f23b167ca3a51a85d
mes5/x86_64/firefox-af-17.0.8-0.1mdvmes5.2.x86_64.rpm
6ad21340be8698517b6a1255fb20448b
mes5/x86_64/firefox-ar-17.0.8-0.1mdvmes5.2.x86_64.rpm
933862c71d11fff95b830a902e55944b
mes5/x86_64/firefox-be-17.0.8-0.1mdvmes5.2.x86_64.rpm
524f4ed0c29cf59554cd27fbfc048e09
mes5/x86_64/firefox-bg-17.0.8-0.1mdvmes5.2.x86_64.rpm
036d06479ebcc06245af9dd0984489b2
mes5/x86_64/firefox-bn-17.0.8-0.1mdvmes5.2.x86_64.rpm
f94584a4f8cc2b996ddf7adfcddf6749
mes5/x86_64/firefox-ca-17.0.8-0.1mdvmes5.2.x86_64.rpm
70100a489d0c9ce3c44c5be718064841
mes5/x86_64/firefox-cs-17.0.8-0.1mdvmes5.2.x86_64.rpm
d730f29f3a4ebc3de3d1e320ec966521
mes5/x86_64/firefox-cy-17.0.8-0.1mdvmes5.2.x86_64.rpm
352a5e86f732735279b61280d75accc3
mes5/x86_64/firefox-da-17.0.8-0.1mdvmes5.2.x86_64.rpm
2a99c26d811e94eddd9c92a41b8b5bd7
mes5/x86_64/firefox-de-17.0.8-0.1mdvmes5.2.x86_64.rpm
c485e43155aed87eb4679abf2ffdfaf5
mes5/x86_64/firefox-devel-17.0.8-0.1mdvmes5.2.x86_64.rpm
06549ef54b60a559e651194cab4e2698
mes5/x86_64/firefox-el-17.0.8-0.1mdvmes5.2.x86_64.rpm
1f52da8cfd0a316af8ba7dd17b694ead
mes5/x86_64/firefox-en_GB-17.0.8-0.1mdvmes5.2.x86_64.rpm
62e859acdd77350e3c8fff7fb81e1fd7
mes5/x86_64/firefox-eo-17.0.8-0.1mdvmes5.2.x86_64.rpm
456876d71f021d7dfe1322b099ae94d2
mes5/x86_64/firefox-es_AR-17.0.8-0.1mdvmes5.2.x86_64.rpm
b84c4d07e9aa357cc813c395c5007765
mes5/x86_64/firefox-es_ES-17.0.8-0.1mdvmes5.2.x86_64.rpm
e8e20b71067e98ac0db173f15626ed24
mes5/x86_64/firefox-et-17.0.8-0.1mdvmes5.2.x86_64.rpm
4105bbcf29be9fd325cd26264c01db0d
mes5/x86_64/firefox-eu-17.0.8-0.1mdvmes5.2.x86_64.rpm
5072b25a0900eb932fe849beda57fe4b
mes5/x86_64/firefox-fi-17.0.8-0.1mdvmes5.2.x86_64.rpm
ad6c27f009e70080cef781b744b9def6
mes5/x86_64/firefox-fr-17.0.8-0.1mdvmes5.2.x86_64.rpm
458f0742c2a2d6580adc29f1165a3aed
mes5/x86_64/firefox-fy-17.0.8-0.1mdvmes5.2.x86_64.rpm
e8d800ea8bac16ef7d257c7fd6cbf758
mes5/x86_64/firefox-ga_IE-17.0.8-0.1mdvmes5.2.x86_64.rpm
309a945b1984de02fa4aa156f0797b2a
mes5/x86_64/firefox-gl-17.0.8-0.1mdvmes5.2.x86_64.rpm
efeef1826fbf0ac7daa87a87598a1422
mes5/x86_64/firefox-gu_IN-17.0.8-0.1mdvmes5.2.x86_64.rpm
e3438d925572d522e176e04fae2911f4
mes5/x86_64/firefox-he-17.0.8-0.1mdvmes5.2.x86_64.rpm
ad1065337cee861ddbbf3dcda601fc25
mes5/x86_64/firefox-hi-17.0.8-0.1mdvmes5.2.x86_64.rpm
1da1118034eb7a77ab074553a6c9b5f3
mes5/x86_64/firefox-hu-17.0.8-0.1mdvmes5.2.x86_64.rpm
556b84ebea466aa4c46e35cfea109251
mes5/x86_64/firefox-id-17.0.8-0.1mdvmes5.2.x86_64.rpm
37da9a24981b106646d6a89d3cfc77a9
mes5/x86_64/firefox-is-17.0.8-0.1mdvmes5.2.x86_64.rpm
5ec8441dd76ac066632cf0185e78ce4b
mes5/x86_64/firefox-it-17.0.8-0.1mdvmes5.2.x86_64.rpm
1634719dee779fb55e1650741b31da70
mes5/x86_64/firefox-ja-17.0.8-0.1mdvmes5.2.x86_64.rpm
c70a47036902aadea43cecd37a2ba674
mes5/x86_64/firefox-kn-17.0.8-0.1mdvmes5.2.x86_64.rpm
16fbf9e84443621b1b7935a628926ff3
mes5/x86_64/firefox-ko-17.0.8-0.1mdvmes5.2.x86_64.rpm
1b4b195275950e66a3c54e113cbf2fa1
mes5/x86_64/firefox-ku-17.0.8-0.1mdvmes5.2.x86_64.rpm
8b565fe1ae1b0170729861bdc88f4832
mes5/x86_64/firefox-lt-17.0.8-0.1mdvmes5.2.x86_64.rpm
aaad8b8cf076c13fe4954adc274003b0
mes5/x86_64/firefox-lv-17.0.8-0.1mdvmes5.2.x86_64.rpm
43ab4edc7c5147bd5219ec1f5a4010e3
mes5/x86_64/firefox-mk-17.0.8-0.1mdvmes5.2.x86_64.rpm
df924a8daa179b022c54e558e5058f91
mes5/x86_64/firefox-mr-17.0.8-0.1mdvmes5.2.x86_64.rpm
cc2454e25f2f8519ae592e55bd36848b
mes5/x86_64/firefox-nb_NO-17.0.8-0.1mdvmes5.2.x86_64.rpm
3000817c16581f1e80086207a1a2e8ed
mes5/x86_64/firefox-nl-17.0.8-0.1mdvmes5.2.x86_64.rpm
5b0ebf075cc15d3f9bc71b36ce5e6464
mes5/x86_64/firefox-nn_NO-17.0.8-0.1mdvmes5.2.x86_64.rpm
a27e12f4e792d7d012d9fcac8ede3022
mes5/x86_64/firefox-pa_IN-17.0.8-0.1mdvmes5.2.x86_64.rpm
b59481f4ebaa9fe76b26cbea48c215db
mes5/x86_64/firefox-pl-17.0.8-0.1mdvmes5.2.x86_64.rpm
8995496f79258f57efe752c35239cd57
mes5/x86_64/firefox-pt_BR-17.0.8-0.1mdvmes5.2.x86_64.rpm
f87cfca2d11141f31f7a2466ea9f89bd
mes5/x86_64/firefox-pt_PT-17.0.8-0.1mdvmes5.2.x86_64.rpm
fff51e6c626e6c6d52f91ae33ed94b59
mes5/x86_64/firefox-ro-17.0.8-0.1mdvmes5.2.x86_64.rpm
c64d9b2213dcde2ea68fe75f4a5bd896
mes5/x86_64/firefox-ru-17.0.8-0.1mdvmes5.2.x86_64.rpm
a399bd1ac52b5167476911ce22d170ae
mes5/x86_64/firefox-si-17.0.8-0.1mdvmes5.2.x86_64.rpm
4d379af7fc7d88b1df779b67dbab47d7
mes5/x86_64/firefox-sk-17.0.8-0.1mdvmes5.2.x86_64.rpm
b93f91926aaae7f0482eda738d41d04b
mes5/x86_64/firefox-sl-17.0.8-0.1mdvmes5.2.x86_64.rpm
ff4013348fd0beb5216cdfee1a83e3d4
mes5/x86_64/firefox-sq-17.0.8-0.1mdvmes5.2.x86_64.rpm
813f4f5feecfdfb015e4dff57623c2d3
mes5/x86_64/firefox-sr-17.0.8-0.1mdvmes5.2.x86_64.rpm
0cc8a49521e436f52702ebb57d823119
mes5/x86_64/firefox-sv_SE-17.0.8-0.1mdvmes5.2.x86_64.rpm
96be899ded22b2190b20bc4d161aa7ce
mes5/x86_64/firefox-te-17.0.8-0.1mdvmes5.2.x86_64.rpm
b75ab0a93f44caf16b93420f17a0e274
mes5/x86_64/firefox-th-17.0.8-0.1mdvmes5.2.x86_64.rpm
46c4608d5a8f06f26921dd78ad21aa95
mes5/x86_64/firefox-tr-17.0.8-0.1mdvmes5.2.x86_64.rpm
34eb8baa4b2e0afad5fc119c471d3871
mes5/x86_64/firefox-uk-17.0.8-0.1mdvmes5.2.x86_64.rpm
7ec1dd3dcbc11f4042624b7bce2f4949
mes5/x86_64/firefox-zh_CN-17.0.8-0.1mdvmes5.2.x86_64.rpm
60ed547048188ab2555048404f9ae3d2
mes5/x86_64/firefox-zh_TW-17.0.8-0.1mdvmes5.2.x86_64.rpm
c3128ca4367a451718855b0201a41ac0
mes5/x86_64/icedtea-web-1.3.2-0.5mdvmes5.2.x86_64.rpm
ce75a8caff3ceddae75de4e5bc63f921
mes5/x86_64/icedtea-web-javadoc-1.3.2-0.5mdvmes5.2.x86_64.rpm
0b88fc9dfe0d63d29bb87d0632e6be45
mes5/x86_64/lib64xulrunner17.0.8-17.0.8-0.1mdvmes5.2.x86_64.rpm
85b119a2e3f620da569d63f21d53a24d
mes5/x86_64/lib64xulrunner-devel-17.0.8-0.1mdvmes5.2.x86_64.rpm
f20e48985dfac071a5c2e507c87cc108
mes5/x86_64/xulrunner-17.0.8-0.1mdvmes5.2.x86_64.rpm
ac336f1660a418cb3fa3fc8beefa865a
mes5/SRPMS/firefox-17.0.8-0.1mdvmes5.2.src.rpm
cb7511bd6d9a03e5b2bc03ae425057b4
mes5/SRPMS/firefox-l10n-17.0.8-0.1mdvmes5.2.src.rpm
c9900b5160e7e8645ee4d99b5ef81653
mes5/SRPMS/icedtea-web-1.3.2-0.5mdvmes5.2.src.rpm
3b846b9552f004a0457ebe48be534454
mes5/SRPMS/xulrunner-17.0.8-0.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFSAfcvmqjQ0CJFipgRAjIqAKDDZO1O3gjjozREssZpRAeAA4X0KQCfcp31
WNVhqT9jKyqCV2sIk9F1FJ0=
=Tm6H
-----END PGP SIGNATURE-----


------------=_1375871969-3002-19
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1375871969-3002-19--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung