Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Mozilla Firefox
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Mozilla Firefox
ID: MDVSA-2013:002
Distribution: Mandriva
Plattformen: Mandriva Enterprise Server 5.0
Datum: Mi, 9. Januar 2013, 18:31
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769
http://www.mozilla.org/security/announce/2013/mfsa2013-01.html
http://www.mozilla.org/security/announce/2013/mfsa2013-02.html
http://www.mozilla.org/security/announce/2013/mfsa2013-04.html
http://www.mozilla.org/security/announce/2013/mfsa2013-05.html
http://www.mozilla.org/security/announce/2013/mfsa2013-09.html
http://www.mozilla.org/security/announce/2013/mfsa2013-11.html
http://www.mozilla.org/security/announce/2013/mfsa2013-12.html
http://www.mozilla.org/security/announce/2013/mfsa2013-15.html
http://www.mozilla.org/security/announce/2013/mfsa2013-16.html
http://www.mozilla.org/security/announce/2013/mfsa2013-17.html
http://www.mozilla.org/security/announce/2013/mfsa2013-20.html
Applikationen: Mozilla Firefox

Originalnachricht

This is a multi-part message in MIME format...

------------=_1357752069-3376-80

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:002
http://www.mandriva.com/security/
_______________________________________________________________________

Package : firefox
Date : January 9, 2013
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple security issue were identified and fixed in mozilla firefox:

Google reported to Mozilla that TURKTRUST, a certificate authority in
Mozillas root program, had mis-issued two intermediate certificates
to customers. The issue was not specific to Firefox but there was
evidence that one of the certificates was used for man-in-the-middle
(MITM) traffic management of domain names that the customer did not
legitimately own or control. This issue was resolved by revoking the
trust for these specific mis-issued certificates (CVE-2013-0743).

Security researcher regenrecht reported, via TippingPoint's Zero Day
Initiative, a use-after-free within the ListenerManager when garbage
collection is forced after data in listener objects have been allocated
in some circumstances. This results in a use-after-free which can
lead to arbitrary code execution (CVE-2013-0754).

Security researcher regenrecht reported, via TippingPoint's Zero
Day Initiative, a use-after-free in XMLSerializer by the exposing
of serializeToStream to web content. This can lead to arbitrary code
execution when exploited (CVE-2013-0753).

Security researcher Mariusz Mlynski reported that it is possible
to open a chrome privileged web page through plugin objects through
interaction with SVG elements. This could allow for arbitrary code
execution (CVE-2013-0758).

Security researcher pa_kt reported a flaw via TippingPoint's Zero Day
Initiative that an integer overflow is possible when calculating the
length for a Javascript string concatenation, which is then used for
memory allocation. This results in a buffer overflow, leading to a
potentially exploitable memory corruption (CVE-2013-0750).

Mozilla security researcher Jesse Ruderman discovered that using the
toString function of XBL objects can lead to inappropriate information
leakage by revealing the address space layout instead of just the ID
of the object. This layout information could potentially be used to
bypass ASLR and other security protections (CVE-2013-0748).

Mozilla developer Boris Zbarsky reported reported a problem where
jsval-returning quickstubs fail to wrap their return values, causing
a compartment mismatch. This mismatch can cause garbage collection
to occur incorrectly and lead to a potentially exploitable crash
(CVE-2013-0746).

Using the Address Sanitizer tool, security researcher Atte Kettunen
from OUSPG discovered that the combination of large numbers
of columns and column groups in a table could cause the array
containing the columns during rendering to overwrite itself. This
can lead to a user-after-free causing a potentially exploitable crash
(CVE-2013-0744).

Security researcher Abhishek Arya (Inferno) of the Google Chrome
Security Team discovered a series critically rated of use-after-free,
out of bounds read, and buffer overflow issues using the Address
Sanitizer tool in shipped software. These issues are potentially
exploitable, allowing for remote code execution. We would also like
to thank Abhishek for reporting three additional user-after-free and
out of bounds read flaws introduced during Firefox development that
were fixed before general release (CVE-2013-0762, CVE-2013-0766,
CVE-2013-0767).

Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code (CVE-2013-0769).

Security researcher Masato Kinugawa found a flaw in which the
displayed URL values within the addressbar can be spoofed by a page
during loading. This allows for phishing attacks where a malicious
page can spoof the identify of another site (CVE-2013-0759).

The mozilla firefox packages has been upgraded to the latest version
which is unaffected by these security flaws.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769
http://www.mozilla.org/security/announce/2013/mfsa2013-20.html
http://www.mozilla.org/security/announce/2013/mfsa2013-17.html
http://www.mozilla.org/security/announce/2013/mfsa2013-16.html
http://www.mozilla.org/security/announce/2013/mfsa2013-15.html
http://www.mozilla.org/security/announce/2013/mfsa2013-12.html
http://www.mozilla.org/security/announce/2013/mfsa2013-11.html
http://www.mozilla.org/security/announce/2013/mfsa2013-09.html
http://www.mozilla.org/security/announce/2013/mfsa2013-05.html
http://www.mozilla.org/security/announce/2013/mfsa2013-04.html
http://www.mozilla.org/security/announce/2013/mfsa2013-02.html
http://www.mozilla.org/security/announce/2013/mfsa2013-01.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
6a90d41da959a6610024ff4edb00c7e0
mes5/i586/firefox-10.0.12-0.1mdvmes5.2.i586.rpm
938f2b80ff7ec162e91c7842d2e8d0fd
mes5/i586/firefox-af-10.0.12-0.1mdvmes5.2.i586.rpm
fc82e7256b8e4f2fcb6a0a89dd445d65
mes5/i586/firefox-ar-10.0.12-0.1mdvmes5.2.i586.rpm
09787dab37be7d8119342e10c54e770c
mes5/i586/firefox-be-10.0.12-0.1mdvmes5.2.i586.rpm
3ece6288096f143a6849b1b1fd7d6b0e
mes5/i586/firefox-bg-10.0.12-0.1mdvmes5.2.i586.rpm
8a3232659cce143dacf62362f0a41f26
mes5/i586/firefox-bn-10.0.12-0.1mdvmes5.2.i586.rpm
9feae96468c2eb22aa29ab382c110628
mes5/i586/firefox-ca-10.0.12-0.1mdvmes5.2.i586.rpm
630d5eab5dae17ab83d304da7743a2f8
mes5/i586/firefox-cs-10.0.12-0.1mdvmes5.2.i586.rpm
c98adc9e537516663b0aaa65e7943393
mes5/i586/firefox-cy-10.0.12-0.1mdvmes5.2.i586.rpm
b2ea10ba6d761a4907396630489d38ff
mes5/i586/firefox-da-10.0.12-0.1mdvmes5.2.i586.rpm
b2d71a3c37804060ba559f42580629e5
mes5/i586/firefox-de-10.0.12-0.1mdvmes5.2.i586.rpm
3d1fcb82cd8b0003a5fdca21a4fa35e8
mes5/i586/firefox-devel-10.0.12-0.1mdvmes5.2.i586.rpm
dc0f4ebc0cd6cf8bcc147c2e141f8e4b
mes5/i586/firefox-el-10.0.12-0.1mdvmes5.2.i586.rpm
02eb125c0027eb02cd228abca5a5ae90
mes5/i586/firefox-en_GB-10.0.12-0.1mdvmes5.2.i586.rpm
38d34ccae33ea9329c3bf08d0eb49bf0
mes5/i586/firefox-eo-10.0.12-0.1mdvmes5.2.i586.rpm
ce1b02d401cea11eaa0e3985db9118fc
mes5/i586/firefox-es_AR-10.0.12-0.1mdvmes5.2.i586.rpm
be67f0b04803d142c94e03123c8dc035
mes5/i586/firefox-es_ES-10.0.12-0.1mdvmes5.2.i586.rpm
d68633951b46759e49bb104ab7306006
mes5/i586/firefox-et-10.0.12-0.1mdvmes5.2.i586.rpm
93fcff1e6fe6fcdd639799f367e4eceb
mes5/i586/firefox-eu-10.0.12-0.1mdvmes5.2.i586.rpm
92edf937b64fcc545af68f48de84f2ca
mes5/i586/firefox-fi-10.0.12-0.1mdvmes5.2.i586.rpm
f3ae76b728936e2962bbf90aaa1d1810
mes5/i586/firefox-fr-10.0.12-0.1mdvmes5.2.i586.rpm
9992758506f970829796c9691740f236
mes5/i586/firefox-fy-10.0.12-0.1mdvmes5.2.i586.rpm
26f2678ee6e21bd7928bc3ae85654fb3
mes5/i586/firefox-ga_IE-10.0.12-0.1mdvmes5.2.i586.rpm
d67703274e9d9d25426c10337da56cbd
mes5/i586/firefox-gl-10.0.12-0.1mdvmes5.2.i586.rpm
af6c4fa86abd84930adc97e87fc901c6
mes5/i586/firefox-gu_IN-10.0.12-0.1mdvmes5.2.i586.rpm
9775a563ee7ef785fe7a0a80272bd1d4
mes5/i586/firefox-he-10.0.12-0.1mdvmes5.2.i586.rpm
14e7d4c2a4e83fbe2878ec14f78ffe83
mes5/i586/firefox-hi-10.0.12-0.1mdvmes5.2.i586.rpm
02a3061d522afa5d694b379347ef87ef
mes5/i586/firefox-hu-10.0.12-0.1mdvmes5.2.i586.rpm
03bd7939a6257654c658977e55b6cb69
mes5/i586/firefox-id-10.0.12-0.1mdvmes5.2.i586.rpm
7faec047d662ae55661d75bb6abecd2c
mes5/i586/firefox-is-10.0.12-0.1mdvmes5.2.i586.rpm
8728abb00f2924a7776d2fa3bd068dfb
mes5/i586/firefox-it-10.0.12-0.1mdvmes5.2.i586.rpm
cdcab0ee96a71f00a576182ed3b8fa08
mes5/i586/firefox-ja-10.0.12-0.1mdvmes5.2.i586.rpm
9400eca7d1557cf2f724367bb1ef206d
mes5/i586/firefox-ka-10.0.12-0.1mdvmes5.2.i586.rpm
c1ddccc95fa8c23bb63478a637ef1b7b
mes5/i586/firefox-kn-10.0.12-0.1mdvmes5.2.i586.rpm
7e9f68326f6cf99093144e74f57c85a5
mes5/i586/firefox-ko-10.0.12-0.1mdvmes5.2.i586.rpm
cc6858bc89c9ba562b3cfe5dd54d0b15
mes5/i586/firefox-ku-10.0.12-0.1mdvmes5.2.i586.rpm
aca89e6575c44a2d4510cf150558955b
mes5/i586/firefox-lt-10.0.12-0.1mdvmes5.2.i586.rpm
933ca52186e944ff75959c00a3237c6c
mes5/i586/firefox-lv-10.0.12-0.1mdvmes5.2.i586.rpm
4de4dfe7c535841f8289ad815792eefb
mes5/i586/firefox-mk-10.0.12-0.1mdvmes5.2.i586.rpm
340f9e5666980ab34f56b508f1869be0
mes5/i586/firefox-mr-10.0.12-0.1mdvmes5.2.i586.rpm
674a45c6e740e99fce3bcb0421bf692d
mes5/i586/firefox-nb_NO-10.0.12-0.1mdvmes5.2.i586.rpm
4bae8177b0e2d09b4808de91a5cbb480
mes5/i586/firefox-nl-10.0.12-0.1mdvmes5.2.i586.rpm
9502588f48efc18251bb0a2c4da7c67f
mes5/i586/firefox-nn_NO-10.0.12-0.1mdvmes5.2.i586.rpm
28d01c92b5bfada1257488ca5cb81090
mes5/i586/firefox-oc-10.0.12-0.1mdvmes5.2.i586.rpm
45e0e75bf13e31abe5191678e6cb29fb
mes5/i586/firefox-pa_IN-10.0.12-0.1mdvmes5.2.i586.rpm
03e82c9b1d26728c64a15eff2b9fe8a4
mes5/i586/firefox-pl-10.0.12-0.1mdvmes5.2.i586.rpm
a078db90fa6ccb9b5e8eab7aed6fc383
mes5/i586/firefox-pt_BR-10.0.12-0.1mdvmes5.2.i586.rpm
ff6817be10d5d025368fafab359cb9bc
mes5/i586/firefox-pt_PT-10.0.12-0.1mdvmes5.2.i586.rpm
e83044cedd0ab955bd490a75e0262fdf
mes5/i586/firefox-ro-10.0.12-0.1mdvmes5.2.i586.rpm
f3829090c91f64cf42b6704eaa1556cc
mes5/i586/firefox-ru-10.0.12-0.1mdvmes5.2.i586.rpm
e67d78b38b09764cc3db7a2fb7aa0ccb
mes5/i586/firefox-si-10.0.12-0.1mdvmes5.2.i586.rpm
b60a1a00c4c6e1ffd59bdcd30135a9e5
mes5/i586/firefox-sk-10.0.12-0.1mdvmes5.2.i586.rpm
6e86141416b66260ad50b69eba3ca831
mes5/i586/firefox-sl-10.0.12-0.1mdvmes5.2.i586.rpm
cc32659b3b38d1889f4c20df6b5861cc
mes5/i586/firefox-sq-10.0.12-0.1mdvmes5.2.i586.rpm
e068225cac9ac0afb6e4a8a6d6efb0cc
mes5/i586/firefox-sr-10.0.12-0.1mdvmes5.2.i586.rpm
5b82daf461e65242138e10488a1dbf3c
mes5/i586/firefox-sv_SE-10.0.12-0.1mdvmes5.2.i586.rpm
797b4f3353d792d8e218a1288440da29
mes5/i586/firefox-te-10.0.12-0.1mdvmes5.2.i586.rpm
39691dbd8084474882eaaa23bed11075
mes5/i586/firefox-th-10.0.12-0.1mdvmes5.2.i586.rpm
1fa94929f117a926bdfaae3a4d8b6f7d
mes5/i586/firefox-tr-10.0.12-0.1mdvmes5.2.i586.rpm
a15d57069fd1b8a9c342df41b458282b
mes5/i586/firefox-uk-10.0.12-0.1mdvmes5.2.i586.rpm
796978e53b900ba33952ea604622c590
mes5/i586/firefox-zh_CN-10.0.12-0.1mdvmes5.2.i586.rpm
9d6256d9b1f5991d1852fc1096491202
mes5/i586/firefox-zh_TW-10.0.12-0.1mdvmes5.2.i586.rpm
d30907827f13429b2e554ea4e6856240
mes5/i586/libnss3-3.14.1-0.1mdvmes5.2.i586.rpm
4e25b43c99caa549211c45e8ef0b1ac2
mes5/i586/libnss-devel-3.14.1-0.1mdvmes5.2.i586.rpm
a28d9a2e4848a75edff6cc6fda90ee98
mes5/i586/libnss-static-devel-3.14.1-0.1mdvmes5.2.i586.rpm
64f15e1555ebd2c5511ea4d0f988c777
mes5/i586/libxulrunner10.0.12-10.0.12-0.1mdvmes5.2.i586.rpm
c02744f54afb7aa102b4ffaaf30560f2
mes5/i586/libxulrunner-devel-10.0.12-0.1mdvmes5.2.i586.rpm
1f63bfcd2cc7b87bc1b36143940ca1f0 mes5/i586/nss-3.14.1-0.1mdvmes5.2.i586.rpm
6fc25499ab31eab00dc329dd0795f98f
mes5/i586/rootcerts-20121229.00-1mdvmes5.2.i586.rpm
d5b3814fca55f73fa5a432cde1a87286
mes5/i586/rootcerts-java-20121229.00-1mdvmes5.2.i586.rpm
addec10a773ab4aa83d9998d528d2c0c
mes5/i586/xulrunner-10.0.12-0.1mdvmes5.2.i586.rpm
e8e89ae09156de53165df7e1be0be753
mes5/SRPMS/firefox-10.0.12-0.1mdvmes5.2.src.rpm
ae626ca038b1b222c80b8df684604519
mes5/SRPMS/firefox-l10n-10.0.12-0.1mdvmes5.2.src.rpm
8bb7847fd80ec7c831f442ec6153600f mes5/SRPMS/nss-3.14.1-0.1mdvmes5.2.src.rpm
677882e23b0d751aab5992de12ee58c8
mes5/SRPMS/rootcerts-20121229.00-1mdvmes5.2.src.rpm
8fafd87dca1aa4d1ea665292e00f7d98
mes5/SRPMS/xulrunner-10.0.12-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
ec73b765cf90091a3904b108f5ca91a8
mes5/x86_64/firefox-10.0.12-0.1mdvmes5.2.x86_64.rpm
9f0b7687a33ebe50fcbdbaec5a578a4a
mes5/x86_64/firefox-af-10.0.12-0.1mdvmes5.2.x86_64.rpm
4769684681901d7d0f3da67b0079c499
mes5/x86_64/firefox-ar-10.0.12-0.1mdvmes5.2.x86_64.rpm
ca810320d78c8edc590ea1a3755dadaa
mes5/x86_64/firefox-be-10.0.12-0.1mdvmes5.2.x86_64.rpm
513a67ee607b439e6cdbb7e206ba57f1
mes5/x86_64/firefox-bg-10.0.12-0.1mdvmes5.2.x86_64.rpm
e171340bea0e000fcdb83c77f11c57f6
mes5/x86_64/firefox-bn-10.0.12-0.1mdvmes5.2.x86_64.rpm
4ede105e999009cf2762efa458313f2a
mes5/x86_64/firefox-ca-10.0.12-0.1mdvmes5.2.x86_64.rpm
48ba34b0537c0efc4799325134689140
mes5/x86_64/firefox-cs-10.0.12-0.1mdvmes5.2.x86_64.rpm
6e2c6107c7539cbb77f3fe4266812388
mes5/x86_64/firefox-cy-10.0.12-0.1mdvmes5.2.x86_64.rpm
6633981954d7fdb722b574edc32de1c3
mes5/x86_64/firefox-da-10.0.12-0.1mdvmes5.2.x86_64.rpm
b891c31801e0cb20a3e0be6e49929f43
mes5/x86_64/firefox-de-10.0.12-0.1mdvmes5.2.x86_64.rpm
e4118fd3aa498494a1000d3b14941428
mes5/x86_64/firefox-devel-10.0.12-0.1mdvmes5.2.x86_64.rpm
4c34458067745fbc9d98385159cabb4e
mes5/x86_64/firefox-el-10.0.12-0.1mdvmes5.2.x86_64.rpm
9f9bd2dbb1d2d965959af26ca752e0b4
mes5/x86_64/firefox-en_GB-10.0.12-0.1mdvmes5.2.x86_64.rpm
36ca1fd771d1c0765102f61400acb9c3
mes5/x86_64/firefox-eo-10.0.12-0.1mdvmes5.2.x86_64.rpm
469e680897bdff78d748acb94f2a75b0
mes5/x86_64/firefox-es_AR-10.0.12-0.1mdvmes5.2.x86_64.rpm
54094cfb1efbcff7a48c68086f2f1848
mes5/x86_64/firefox-es_ES-10.0.12-0.1mdvmes5.2.x86_64.rpm
1896c23b5b472707ed8d9cf419ef639a
mes5/x86_64/firefox-et-10.0.12-0.1mdvmes5.2.x86_64.rpm
a0203f65040faab8abc43079f9352dd4
mes5/x86_64/firefox-eu-10.0.12-0.1mdvmes5.2.x86_64.rpm
020cddeb794a57fdd69d619add6d7195
mes5/x86_64/firefox-fi-10.0.12-0.1mdvmes5.2.x86_64.rpm
c9b9c9c4ebdff7e75812d832c00117ba
mes5/x86_64/firefox-fr-10.0.12-0.1mdvmes5.2.x86_64.rpm
1696482cd4c038df4f09b0db2feff3a2
mes5/x86_64/firefox-fy-10.0.12-0.1mdvmes5.2.x86_64.rpm
c4a94dd5adc727a32d475c9e4841cc3b
mes5/x86_64/firefox-ga_IE-10.0.12-0.1mdvmes5.2.x86_64.rpm
e7ac24f6b43839b1195b9a4021c60400
mes5/x86_64/firefox-gl-10.0.12-0.1mdvmes5.2.x86_64.rpm
03714c3d430ce0588df44335809b1497
mes5/x86_64/firefox-gu_IN-10.0.12-0.1mdvmes5.2.x86_64.rpm
0aab4f6aed0e40ae4d9bc792baf46f77
mes5/x86_64/firefox-he-10.0.12-0.1mdvmes5.2.x86_64.rpm
1a3bbd79e3ed3ad58c2c05de1bdfb345
mes5/x86_64/firefox-hi-10.0.12-0.1mdvmes5.2.x86_64.rpm
4bd0dd2359a4956c9a10d812f4558a2d
mes5/x86_64/firefox-hu-10.0.12-0.1mdvmes5.2.x86_64.rpm
1c200ee911d9bcb57667bc171e5e34bd
mes5/x86_64/firefox-id-10.0.12-0.1mdvmes5.2.x86_64.rpm
d1a20db5877533297aa37cfa61a643ad
mes5/x86_64/firefox-is-10.0.12-0.1mdvmes5.2.x86_64.rpm
fa88e6be3877b527ca57f3c70f5f0b48
mes5/x86_64/firefox-it-10.0.12-0.1mdvmes5.2.x86_64.rpm
252a3ae2c4b3583d1e9466052eec0430
mes5/x86_64/firefox-ja-10.0.12-0.1mdvmes5.2.x86_64.rpm
524c2d72c0e62fddfc5bc66c257ea20b
mes5/x86_64/firefox-ka-10.0.12-0.1mdvmes5.2.x86_64.rpm
1935cab2d2a52159f031982e2ce823de
mes5/x86_64/firefox-kn-10.0.12-0.1mdvmes5.2.x86_64.rpm
ec2434a00ac1d07070a35b992f162f67
mes5/x86_64/firefox-ko-10.0.12-0.1mdvmes5.2.x86_64.rpm
7709a131d2652966fc83dd9008fd2a1d
mes5/x86_64/firefox-ku-10.0.12-0.1mdvmes5.2.x86_64.rpm
cbdb15c811f783d9f948ac82c343d473
mes5/x86_64/firefox-lt-10.0.12-0.1mdvmes5.2.x86_64.rpm
2f85d25b00245770e27b897da34efc09
mes5/x86_64/firefox-lv-10.0.12-0.1mdvmes5.2.x86_64.rpm
279cd222db83b5404bd4a65745e5bedc
mes5/x86_64/firefox-mk-10.0.12-0.1mdvmes5.2.x86_64.rpm
8692038a08c4e80257c3449a47ef3d10
mes5/x86_64/firefox-mr-10.0.12-0.1mdvmes5.2.x86_64.rpm
5b55c11f1c5e3e88054dae45cf5f02f1
mes5/x86_64/firefox-nb_NO-10.0.12-0.1mdvmes5.2.x86_64.rpm
fe93c427b7555bb02c30114305251890
mes5/x86_64/firefox-nl-10.0.12-0.1mdvmes5.2.x86_64.rpm
be2487874444cf17f0ed99096cbe1fc6
mes5/x86_64/firefox-nn_NO-10.0.12-0.1mdvmes5.2.x86_64.rpm
48ea3a91e056d7d6dcb33f14c1117655
mes5/x86_64/firefox-oc-10.0.12-0.1mdvmes5.2.x86_64.rpm
1a11efbd275ebcd3d758bfbba02a0992
mes5/x86_64/firefox-pa_IN-10.0.12-0.1mdvmes5.2.x86_64.rpm
98aa0847b946f7342b31e4fd8e6b5535
mes5/x86_64/firefox-pl-10.0.12-0.1mdvmes5.2.x86_64.rpm
3df14cce3a10e9e4bff3aa7a41d76125
mes5/x86_64/firefox-pt_BR-10.0.12-0.1mdvmes5.2.x86_64.rpm
f18fe2bd2c293ee9b3ba123e67866ec7
mes5/x86_64/firefox-pt_PT-10.0.12-0.1mdvmes5.2.x86_64.rpm
61070062992c0b712c58c92271907243
mes5/x86_64/firefox-ro-10.0.12-0.1mdvmes5.2.x86_64.rpm
ed4a8fc4378462e55606478e1d92ef5a
mes5/x86_64/firefox-ru-10.0.12-0.1mdvmes5.2.x86_64.rpm
00d839e039bb614ba50cabb88103755d
mes5/x86_64/firefox-si-10.0.12-0.1mdvmes5.2.x86_64.rpm
93d25e236dbea61bf7593d0463dd8643
mes5/x86_64/firefox-sk-10.0.12-0.1mdvmes5.2.x86_64.rpm
17eb20f40351fd5e0e5a9077eafd716c
mes5/x86_64/firefox-sl-10.0.12-0.1mdvmes5.2.x86_64.rpm
4bda3c464b1b1e628b5650a302b39524
mes5/x86_64/firefox-sq-10.0.12-0.1mdvmes5.2.x86_64.rpm
ccd95f763630b8484b5fd117eeddc197
mes5/x86_64/firefox-sr-10.0.12-0.1mdvmes5.2.x86_64.rpm
2ea10348ff1177ddf59d62153e1ddc71
mes5/x86_64/firefox-sv_SE-10.0.12-0.1mdvmes5.2.x86_64.rpm
df4ab9036f0bff7d9a7ce0c50748db3e
mes5/x86_64/firefox-te-10.0.12-0.1mdvmes5.2.x86_64.rpm
b8ff0defe1b3b30ab0033471d5be7855
mes5/x86_64/firefox-th-10.0.12-0.1mdvmes5.2.x86_64.rpm
9cbbe714668283a7fd7a0bbb27568df9
mes5/x86_64/firefox-tr-10.0.12-0.1mdvmes5.2.x86_64.rpm
54ce6885a983b683cc8aedb1af764ae1
mes5/x86_64/firefox-uk-10.0.12-0.1mdvmes5.2.x86_64.rpm
ab2921983540572d129979470a9a7c7c
mes5/x86_64/firefox-zh_CN-10.0.12-0.1mdvmes5.2.x86_64.rpm
f57ea6e4ab935376f5ae7ae6836ec029
mes5/x86_64/firefox-zh_TW-10.0.12-0.1mdvmes5.2.x86_64.rpm
999fc06a1f990adf5ea007f9dbc0487c
mes5/x86_64/lib64nss3-3.14.1-0.1mdvmes5.2.x86_64.rpm
b34a6f2b1dc929f1d172fe4583edf21d
mes5/x86_64/lib64nss-devel-3.14.1-0.1mdvmes5.2.x86_64.rpm
b8d0b295fba8cc9ce19cdef9597de9e7
mes5/x86_64/lib64nss-static-devel-3.14.1-0.1mdvmes5.2.x86_64.rpm
002686d95013a49ad1a6b28945213a9d
mes5/x86_64/lib64xulrunner10.0.12-10.0.12-0.1mdvmes5.2.x86_64.rpm
46c09addafd24a61662ad49ac52df5f7
mes5/x86_64/lib64xulrunner-devel-10.0.12-0.1mdvmes5.2.x86_64.rpm
c1c86f04afc39d1ac6c2705b9d6a4d42
mes5/x86_64/nss-3.14.1-0.1mdvmes5.2.x86_64.rpm
95bffee2ac111d0ec9effa96f7841ecc
mes5/x86_64/rootcerts-20121229.00-1mdvmes5.2.x86_64.rpm
54c2119efa4bc067f6ea786139ef6aac
mes5/x86_64/rootcerts-java-20121229.00-1mdvmes5.2.x86_64.rpm
c0b8c0b055c3279b1aca88c549a613e8
mes5/x86_64/xulrunner-10.0.12-0.1mdvmes5.2.x86_64.rpm
e8e89ae09156de53165df7e1be0be753
mes5/SRPMS/firefox-10.0.12-0.1mdvmes5.2.src.rpm
ae626ca038b1b222c80b8df684604519
mes5/SRPMS/firefox-l10n-10.0.12-0.1mdvmes5.2.src.rpm
8bb7847fd80ec7c831f442ec6153600f mes5/SRPMS/nss-3.14.1-0.1mdvmes5.2.src.rpm
677882e23b0d751aab5992de12ee58c8
mes5/SRPMS/rootcerts-20121229.00-1mdvmes5.2.src.rpm
8fafd87dca1aa4d1ea665292e00f7d98
mes5/SRPMS/xulrunner-10.0.12-0.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQ7XsJmqjQ0CJFipgRAlIiAJ0aJSsM/+wyE3VStjRsWTn/gnC0SwCg0t94
d0D4tqI+UfwJ8Pa8VJHqEr4=
=fZ5j
-----END PGP SIGNATURE-----


------------=_1357752069-3376-80
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1357752069-3376-80--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung