Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Mozilla Firefox
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Mozilla Firefox
ID: MDVSA-2013:179
Distribution: Mandriva
Plattformen: Mandriva Enterprise Server 5.0
Datum: Do, 27. Juni 2013, 07:52
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1694
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697
http://www.mozilla.org/security/announce/2013/mfsa2013-49.html
http://www.mozilla.org/security/announce/2013/mfsa2013-50.html
http://www.mozilla.org/security/announce/2013/mfsa2013-51.html
http://www.mozilla.org/security/announce/2013/mfsa2013-53.html
http://www.mozilla.org/security/announce/2013/mfsa2013-54.html
http://www.mozilla.org/security/announce/2013/mfsa2013-55.html
http://www.mozilla.org/security/announce/2013/mfsa2013-56.html
http://www.mozilla.org/security/announce/2013/mfsa2013-59.html
Applikationen: Mozilla Firefox

Originalnachricht

This is a multi-part message in MIME format...

------------=_1372276448-2483-15

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:179
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : firefox
Date : June 26, 2013
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple security issues was identified and fixed in mozilla firefox:

Mozilla developers identified and fixed several memory safety
bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code (CVE-2013-1682).

Security researcher Abhishek Arya (Inferno) of the Google Chrome
Security Team used the Address Sanitizer tool to discover a series of
use-after-free problems rated critical as security issues in shipped
software. Some of these issues are potentially exploitable, allowing
for remote code execution. We would also like to thank Abhishek for
reporting additional use-after-free and buffer overflow flaws in
code introduced during Firefox development. These were fixed before
general release (CVE-2013-1684, CVE-2013-1685, CVE-2013-1686).

Security researcher Mariusz Mlynski reported that it is possible to
compile a user-defined function in the XBL scope of a specific element
and then trigger an event within this scope to run code. In some
circumstances, when this code is run, it can access content protected
by System Only Wrappers (SOW) and chrome-privileged pages. This
could potentially lead to arbitrary code execution. Additionally,
Chrome Object Wrappers (COW) can be bypassed by web content to access
privileged methods, leading to a cross-site scripting (XSS) attack
from privileged pages (CVE-2013-1687).

Security researcher Nils reported that specially crafted web content
using the onreadystatechange event and reloading of pages could
sometimes cause a crash when unmapped memory is executed. This crash
is potentially exploitable (CVE-2013-1690).

Security researcher Johnathan Kuskos reported that Firefox is sending
data in the body of XMLHttpRequest (XHR) HEAD requests, which goes
agains the XHR specification. This can potentially be used for
Cross-Site Request Forgery (CSRF) attacks against sites which do not
distinguish between HEAD and POST requests (CVE-2013-1692).

Security researcher Paul Stone of Context Information Security
discovered that timing differences in the processing of SVG format
images with filters could allow for pixel values to be read. This
could potentially allow for text values to be read across domains,
leading to information disclosure (CVE-2013-1693).

Mozilla developer Boris Zbarsky found that when PreserveWrapper was
used in cases where a wrapper is not set, the preserved-wrapper flag
on the wrapper cache is cleared. This could potentially lead to an
exploitable crash (CVE-2013-1694).

Mozilla security researcher moz_bug_r_a4 reported that XrayWrappers
can be bypassed to call content-defined toString and valueOf methods
through DefaultValue. This can lead to unexpected behavior when
privileged code acts on the incorrect values (CVE-2013-1697).

The mozilla firefox packages has been upgraded to the latest ESR
version (17.0.7) which is unaffected by these security flaws.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1694
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697
http://www.mozilla.org/security/announce/2013/mfsa2013-49.html
http://www.mozilla.org/security/announce/2013/mfsa2013-50.html
http://www.mozilla.org/security/announce/2013/mfsa2013-51.html
http://www.mozilla.org/security/announce/2013/mfsa2013-53.html
http://www.mozilla.org/security/announce/2013/mfsa2013-54.html
http://www.mozilla.org/security/announce/2013/mfsa2013-55.html
http://www.mozilla.org/security/announce/2013/mfsa2013-56.html
http://www.mozilla.org/security/announce/2013/mfsa2013-59.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
f377616fa413576835d3fae079ff0aa5
mes5/i586/firefox-17.0.7-0.1mdvmes5.2.i586.rpm
652c24c5d6ff9df65178aafb7ff02e5d
mes5/i586/firefox-af-17.0.7-0.1mdvmes5.2.i586.rpm
dc87c28521fb845389a035914a22775f
mes5/i586/firefox-ar-17.0.7-0.1mdvmes5.2.i586.rpm
5c6d60f7c807485993d79601185ec3d9
mes5/i586/firefox-be-17.0.7-0.1mdvmes5.2.i586.rpm
e08a34f585b46a8cd36449eb973a71c9
mes5/i586/firefox-bg-17.0.7-0.1mdvmes5.2.i586.rpm
7779b1c57fc052aaedaccff6f20c22e5
mes5/i586/firefox-bn-17.0.7-0.1mdvmes5.2.i586.rpm
69e6dc99e24bf7436baf708a4e8a6ae6
mes5/i586/firefox-ca-17.0.7-0.1mdvmes5.2.i586.rpm
ac86ab446a7061a931f888bba532b190
mes5/i586/firefox-cs-17.0.7-0.1mdvmes5.2.i586.rpm
ebcd8fb3057ed6a2915ae7a5790dfce7
mes5/i586/firefox-cy-17.0.7-0.1mdvmes5.2.i586.rpm
2dc9dd199b1f2ef058c1a50e398ce3ef
mes5/i586/firefox-da-17.0.7-0.1mdvmes5.2.i586.rpm
5e56eeba90541a9c8bcf7611df18ac94
mes5/i586/firefox-de-17.0.7-0.1mdvmes5.2.i586.rpm
897574b2a895a91e4c360c7c88056fd4
mes5/i586/firefox-devel-17.0.7-0.1mdvmes5.2.i586.rpm
4dabf70ab2035fe7d0198df52c3cc812
mes5/i586/firefox-el-17.0.7-0.1mdvmes5.2.i586.rpm
669db7774e4cb6cbff3e7e34ae53532d
mes5/i586/firefox-en_GB-17.0.7-0.1mdvmes5.2.i586.rpm
ec659527cd1ea949fade65d7a58ad256
mes5/i586/firefox-eo-17.0.7-0.1mdvmes5.2.i586.rpm
d6df88bf6ca41c4f6e6f55bc899aaca5
mes5/i586/firefox-es_AR-17.0.7-0.1mdvmes5.2.i586.rpm
0493c53d720297be0d57a317f03298cf
mes5/i586/firefox-es_ES-17.0.7-0.1mdvmes5.2.i586.rpm
5c939e80e938a18862bb4facd7a0aead
mes5/i586/firefox-et-17.0.7-0.1mdvmes5.2.i586.rpm
57f0e260c7086ac3ee60ed382b8f503d
mes5/i586/firefox-eu-17.0.7-0.1mdvmes5.2.i586.rpm
511f45291c1cc86c61613839e5e7b24b
mes5/i586/firefox-fi-17.0.7-0.1mdvmes5.2.i586.rpm
21eb713475a749bf49af8defdd67f867
mes5/i586/firefox-fr-17.0.7-0.1mdvmes5.2.i586.rpm
162b648b9926726c9e8858fadd451723
mes5/i586/firefox-fy-17.0.7-0.1mdvmes5.2.i586.rpm
5bcaae0b627e50bfd50d184e74f0ec30
mes5/i586/firefox-ga_IE-17.0.7-0.1mdvmes5.2.i586.rpm
e630a7ed8039f30ca93cb46ecee60b09
mes5/i586/firefox-gl-17.0.7-0.1mdvmes5.2.i586.rpm
c38375fe601fe760d9052f8e3fc477e8
mes5/i586/firefox-gu_IN-17.0.7-0.1mdvmes5.2.i586.rpm
d783f4b739f33917c7656058ee1fbd91
mes5/i586/firefox-he-17.0.7-0.1mdvmes5.2.i586.rpm
b4a8e32a432c12cdc911d3e6353e9ab8
mes5/i586/firefox-hi-17.0.7-0.1mdvmes5.2.i586.rpm
a2ce628d94042616aaa74ef97a21a832
mes5/i586/firefox-hu-17.0.7-0.1mdvmes5.2.i586.rpm
1ea3b93d68d74d8a9e8ecccd00a19db9
mes5/i586/firefox-id-17.0.7-0.1mdvmes5.2.i586.rpm
853d8ea7ae11737a33f6cd3772ca7ba2
mes5/i586/firefox-is-17.0.7-0.1mdvmes5.2.i586.rpm
775512b65dc65d7a6d4538d5012f65f1
mes5/i586/firefox-it-17.0.7-0.1mdvmes5.2.i586.rpm
e27ff622960fefcb7aadf13c2da980af
mes5/i586/firefox-ja-17.0.7-0.1mdvmes5.2.i586.rpm
d19357df6145fcc76b6b7b3c0d1ccda7
mes5/i586/firefox-kn-17.0.7-0.1mdvmes5.2.i586.rpm
4fbd717d0c0dc77ce8578776cbbce0d0
mes5/i586/firefox-ko-17.0.7-0.1mdvmes5.2.i586.rpm
cde6f4dfedad1d04122119d94fa61e6e
mes5/i586/firefox-ku-17.0.7-0.1mdvmes5.2.i586.rpm
5894a845d55b922d0235cadbf43b109b
mes5/i586/firefox-lt-17.0.7-0.1mdvmes5.2.i586.rpm
acc18a793daeb9bb670fe56ed65c05d1
mes5/i586/firefox-lv-17.0.7-0.1mdvmes5.2.i586.rpm
5c1b603de35a6f459056ed10aaa6d382
mes5/i586/firefox-mk-17.0.7-0.1mdvmes5.2.i586.rpm
b2ecb355588e5667affed1677dc763f9
mes5/i586/firefox-mr-17.0.7-0.1mdvmes5.2.i586.rpm
41777306a7a3e270742ff065159c25b9
mes5/i586/firefox-nb_NO-17.0.7-0.1mdvmes5.2.i586.rpm
f2f0189d3fd0c29fb956cbee8a7638dd
mes5/i586/firefox-nl-17.0.7-0.1mdvmes5.2.i586.rpm
f87d249ee3c475cc7efeb582feec36e4
mes5/i586/firefox-nn_NO-17.0.7-0.1mdvmes5.2.i586.rpm
f62472494f30e196c863e863b90241f3
mes5/i586/firefox-pa_IN-17.0.7-0.1mdvmes5.2.i586.rpm
db2540e8c16eac89d52d449746b3a2af
mes5/i586/firefox-pl-17.0.7-0.1mdvmes5.2.i586.rpm
84a9190b0304044bd4d2be92559b7c22
mes5/i586/firefox-pt_BR-17.0.7-0.1mdvmes5.2.i586.rpm
41453e62d9c5ece38ab4bf058a867e9c
mes5/i586/firefox-pt_PT-17.0.7-0.1mdvmes5.2.i586.rpm
36ac899dde4d279be5b0f98e5436cd07
mes5/i586/firefox-ro-17.0.7-0.1mdvmes5.2.i586.rpm
51ca08ee97df0a4da5c584e6780d563c
mes5/i586/firefox-ru-17.0.7-0.1mdvmes5.2.i586.rpm
07badcbaebc3f35337efde74d666e899
mes5/i586/firefox-si-17.0.7-0.1mdvmes5.2.i586.rpm
5a73fcd6a6ca0e9fb1ae2a00df7898a3
mes5/i586/firefox-sk-17.0.7-0.1mdvmes5.2.i586.rpm
23a0e198d005396c4fdb09e5e385fe01
mes5/i586/firefox-sl-17.0.7-0.1mdvmes5.2.i586.rpm
4a55165e6af6e0129c98278206ea0277
mes5/i586/firefox-sq-17.0.7-0.1mdvmes5.2.i586.rpm
723fb7776584aeec50b0c72a692359e1
mes5/i586/firefox-sr-17.0.7-0.1mdvmes5.2.i586.rpm
43228ac54eef2b13c272421d85ba1f69
mes5/i586/firefox-sv_SE-17.0.7-0.1mdvmes5.2.i586.rpm
79cb410c9de864e3437bedaafdf5ca25
mes5/i586/firefox-te-17.0.7-0.1mdvmes5.2.i586.rpm
e4748ffe632bf0b1b37619a17948e595
mes5/i586/firefox-th-17.0.7-0.1mdvmes5.2.i586.rpm
706bef53fed0a669bf16e1390f03dc77
mes5/i586/firefox-tr-17.0.7-0.1mdvmes5.2.i586.rpm
bb8173f2daa9fb6a75a51b218d165c99
mes5/i586/firefox-uk-17.0.7-0.1mdvmes5.2.i586.rpm
dec6bef8b017e38f9327980549a7742b
mes5/i586/firefox-zh_CN-17.0.7-0.1mdvmes5.2.i586.rpm
e0ac89138fffb33e9c19f7c7202a5cc6
mes5/i586/firefox-zh_TW-17.0.7-0.1mdvmes5.2.i586.rpm
5573bdc4a6f50d52ca821063a25994f4
mes5/i586/icedtea-web-1.3.2-0.3mdvmes5.2.i586.rpm
5dc7d93d1e83a2b88cf725c50a5aeabf
mes5/i586/icedtea-web-javadoc-1.3.2-0.3mdvmes5.2.i586.rpm
843b58cf236df5892cdd05c999b3e62b
mes5/i586/libxulrunner17.0.7-17.0.7-0.1mdvmes5.2.i586.rpm
d22da67bc7a0e20c998c813f36a5a199
mes5/i586/libxulrunner-devel-17.0.7-0.1mdvmes5.2.i586.rpm
d9168d1aee7cab500de0c5df41ad5240
mes5/i586/xulrunner-17.0.7-0.1mdvmes5.2.i586.rpm
ac0e411d475da155175442d1f34842cd
mes5/SRPMS/firefox-17.0.7-0.1mdvmes5.2.src.rpm
45c0184ab0eeca01f633245f79a03041
mes5/SRPMS/firefox-l10n-17.0.7-0.1mdvmes5.2.src.rpm
b05d6f1b4e84baad4de04d45c5dae02d
mes5/SRPMS/icedtea-web-1.3.2-0.3mdvmes5.2.src.rpm
95d1abffc5ac94ae5777dfca705ec041
mes5/SRPMS/xulrunner-17.0.7-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
f3ea43bfbd720573adec0affcc0cd536
mes5/x86_64/firefox-17.0.7-0.1mdvmes5.2.x86_64.rpm
330b94917b3f0e3f2de878a0f09caaab
mes5/x86_64/firefox-af-17.0.7-0.1mdvmes5.2.x86_64.rpm
77f418c131fe60b219e2df46faa3aa00
mes5/x86_64/firefox-ar-17.0.7-0.1mdvmes5.2.x86_64.rpm
4a8e395e5473a2bddeadd5f1ee740ad1
mes5/x86_64/firefox-be-17.0.7-0.1mdvmes5.2.x86_64.rpm
f342f9dd8f30e70bf8b2b338933cd0e5
mes5/x86_64/firefox-bg-17.0.7-0.1mdvmes5.2.x86_64.rpm
8046323f8a7300461207ca61692517c2
mes5/x86_64/firefox-bn-17.0.7-0.1mdvmes5.2.x86_64.rpm
2848426fb12a2e05cd9b605ea264669f
mes5/x86_64/firefox-ca-17.0.7-0.1mdvmes5.2.x86_64.rpm
b1c04fc023f4732adae875cb5b3786da
mes5/x86_64/firefox-cs-17.0.7-0.1mdvmes5.2.x86_64.rpm
4fa2451cd34a338b558feb4ee5b38845
mes5/x86_64/firefox-cy-17.0.7-0.1mdvmes5.2.x86_64.rpm
912fb729496dcbea1d30beefdc4775e8
mes5/x86_64/firefox-da-17.0.7-0.1mdvmes5.2.x86_64.rpm
1a3626352e622cf2c66c984085b12057
mes5/x86_64/firefox-de-17.0.7-0.1mdvmes5.2.x86_64.rpm
125c9f024699ca8bcb71decfb66ea5b6
mes5/x86_64/firefox-devel-17.0.7-0.1mdvmes5.2.x86_64.rpm
f43e4e24e8057321b09cfc3ef5298321
mes5/x86_64/firefox-el-17.0.7-0.1mdvmes5.2.x86_64.rpm
7d95b00f58af69faf7a06581bd0e2569
mes5/x86_64/firefox-en_GB-17.0.7-0.1mdvmes5.2.x86_64.rpm
3b5903be89e8ff4293c38a0896a7f44d
mes5/x86_64/firefox-eo-17.0.7-0.1mdvmes5.2.x86_64.rpm
09fdadd751d266623bcf56624d03a60f
mes5/x86_64/firefox-es_AR-17.0.7-0.1mdvmes5.2.x86_64.rpm
d0b730a135d64c72e5e88df1ddaebae9
mes5/x86_64/firefox-es_ES-17.0.7-0.1mdvmes5.2.x86_64.rpm
97ccb2076f0121381a45f5ec0896c30d
mes5/x86_64/firefox-et-17.0.7-0.1mdvmes5.2.x86_64.rpm
9ba658b2db765c3ae681ca203e165d68
mes5/x86_64/firefox-eu-17.0.7-0.1mdvmes5.2.x86_64.rpm
1d8d2ef3f08565a8ee3a0bc99f6407be
mes5/x86_64/firefox-fi-17.0.7-0.1mdvmes5.2.x86_64.rpm
05119cc9c7ebb644a7adde2fd73ce36b
mes5/x86_64/firefox-fr-17.0.7-0.1mdvmes5.2.x86_64.rpm
ae713037d5874fd714ca44b2cd1496ae
mes5/x86_64/firefox-fy-17.0.7-0.1mdvmes5.2.x86_64.rpm
fdf8b50da106b9d1024c7f39fe94fc27
mes5/x86_64/firefox-ga_IE-17.0.7-0.1mdvmes5.2.x86_64.rpm
2b34533eb481df6292cadaa207360d50
mes5/x86_64/firefox-gl-17.0.7-0.1mdvmes5.2.x86_64.rpm
071da99fae036b68760814d06ce2dbda
mes5/x86_64/firefox-gu_IN-17.0.7-0.1mdvmes5.2.x86_64.rpm
eb7979d7dff6d4c089676fed54276ed5
mes5/x86_64/firefox-he-17.0.7-0.1mdvmes5.2.x86_64.rpm
441926f1d5e3a485873070a3ba86ec3e
mes5/x86_64/firefox-hi-17.0.7-0.1mdvmes5.2.x86_64.rpm
fb9a4604927cc690ea14642b1dcca1b8
mes5/x86_64/firefox-hu-17.0.7-0.1mdvmes5.2.x86_64.rpm
c25566dd3cafab514b4699943b258921
mes5/x86_64/firefox-id-17.0.7-0.1mdvmes5.2.x86_64.rpm
e0dee96af89dc9083ddc1dadb2b0f6b0
mes5/x86_64/firefox-is-17.0.7-0.1mdvmes5.2.x86_64.rpm
10bdf0c991e6dd6f8c48db1eaf3d7f64
mes5/x86_64/firefox-it-17.0.7-0.1mdvmes5.2.x86_64.rpm
a9e9eb4406c2ef27fa0b5be69418e29e
mes5/x86_64/firefox-ja-17.0.7-0.1mdvmes5.2.x86_64.rpm
734a81663cc9c3cbfc3e6ed3d3fe050e
mes5/x86_64/firefox-kn-17.0.7-0.1mdvmes5.2.x86_64.rpm
1b2cddac22bb6462a89ea412ccec5a4a
mes5/x86_64/firefox-ko-17.0.7-0.1mdvmes5.2.x86_64.rpm
0eec7f9b43528fba48603c6270798b76
mes5/x86_64/firefox-ku-17.0.7-0.1mdvmes5.2.x86_64.rpm
72085a9fc9432f52f8a74f362531adfa
mes5/x86_64/firefox-lt-17.0.7-0.1mdvmes5.2.x86_64.rpm
fb549798d2e86a5a606f8a5752bc40ad
mes5/x86_64/firefox-lv-17.0.7-0.1mdvmes5.2.x86_64.rpm
8d2c2adc1dd54e9f7af93ad9e4a51f4b
mes5/x86_64/firefox-mk-17.0.7-0.1mdvmes5.2.x86_64.rpm
7f7f937a0e8f123597f0f5795ae219a8
mes5/x86_64/firefox-mr-17.0.7-0.1mdvmes5.2.x86_64.rpm
289ae036328cd607997a06b1a13615e4
mes5/x86_64/firefox-nb_NO-17.0.7-0.1mdvmes5.2.x86_64.rpm
02e21dd5652910673177a2d7f7677599
mes5/x86_64/firefox-nl-17.0.7-0.1mdvmes5.2.x86_64.rpm
c11653343da9ec5003b3b5b608143777
mes5/x86_64/firefox-nn_NO-17.0.7-0.1mdvmes5.2.x86_64.rpm
25a4ffd2f8eb6656557fcd69c9cb256e
mes5/x86_64/firefox-pa_IN-17.0.7-0.1mdvmes5.2.x86_64.rpm
6b94eb35e28c0d9ad4865c692a7997b8
mes5/x86_64/firefox-pl-17.0.7-0.1mdvmes5.2.x86_64.rpm
698390e28b22e07893c11ed6834a93df
mes5/x86_64/firefox-pt_BR-17.0.7-0.1mdvmes5.2.x86_64.rpm
1ef22277239594c7bfd4bb5d18595901
mes5/x86_64/firefox-pt_PT-17.0.7-0.1mdvmes5.2.x86_64.rpm
eeef7530918dd3747dcecb5c025e6582
mes5/x86_64/firefox-ro-17.0.7-0.1mdvmes5.2.x86_64.rpm
37ef6dfd7bf021de3bee528aa90444d3
mes5/x86_64/firefox-ru-17.0.7-0.1mdvmes5.2.x86_64.rpm
e04cae5fbb6171b44669cc860066f50c
mes5/x86_64/firefox-si-17.0.7-0.1mdvmes5.2.x86_64.rpm
e3900cc084080e6b695be2fcfd78b5ee
mes5/x86_64/firefox-sk-17.0.7-0.1mdvmes5.2.x86_64.rpm
de40837370db5f31df2c8639ba40f6e8
mes5/x86_64/firefox-sl-17.0.7-0.1mdvmes5.2.x86_64.rpm
43d05b37458065a02744156d5c776afa
mes5/x86_64/firefox-sq-17.0.7-0.1mdvmes5.2.x86_64.rpm
fc0a9ade1e3ad21a77435c61d3e39e4b
mes5/x86_64/firefox-sr-17.0.7-0.1mdvmes5.2.x86_64.rpm
e94670d815f013909f490d2f3460443b
mes5/x86_64/firefox-sv_SE-17.0.7-0.1mdvmes5.2.x86_64.rpm
bb6f4a2892d9ce2d194659d7b8387c10
mes5/x86_64/firefox-te-17.0.7-0.1mdvmes5.2.x86_64.rpm
973c2c229f935824009fc0fa7c1bbaf8
mes5/x86_64/firefox-th-17.0.7-0.1mdvmes5.2.x86_64.rpm
8c3cba0880f345f5b97d5c3405a7cd44
mes5/x86_64/firefox-tr-17.0.7-0.1mdvmes5.2.x86_64.rpm
9f47ee088ce3e3188173ff2feba8b457
mes5/x86_64/firefox-uk-17.0.7-0.1mdvmes5.2.x86_64.rpm
1750daf14a9a2c4820fb1f452ba8506d
mes5/x86_64/firefox-zh_CN-17.0.7-0.1mdvmes5.2.x86_64.rpm
0b3cc99143d2153ed6af2dbba40aa604
mes5/x86_64/firefox-zh_TW-17.0.7-0.1mdvmes5.2.x86_64.rpm
280ec00914f7359c9564f16aa8aa0fa1
mes5/x86_64/icedtea-web-1.3.2-0.3mdvmes5.2.x86_64.rpm
b91d94caea294ccc0ee27ea3cf52bac2
mes5/x86_64/icedtea-web-javadoc-1.3.2-0.3mdvmes5.2.x86_64.rpm
e7ff4dbbb87caf099a3f14e6711a943e
mes5/x86_64/lib64xulrunner17.0.7-17.0.7-0.1mdvmes5.2.x86_64.rpm
cf3704486448f7e60c73884c5e9b27f0
mes5/x86_64/lib64xulrunner-devel-17.0.7-0.1mdvmes5.2.x86_64.rpm
e01a9c88577edce905c578b7734c8457
mes5/x86_64/xulrunner-17.0.7-0.1mdvmes5.2.x86_64.rpm
ac0e411d475da155175442d1f34842cd
mes5/SRPMS/firefox-17.0.7-0.1mdvmes5.2.src.rpm
45c0184ab0eeca01f633245f79a03041
mes5/SRPMS/firefox-l10n-17.0.7-0.1mdvmes5.2.src.rpm
b05d6f1b4e84baad4de04d45c5dae02d
mes5/SRPMS/icedtea-web-1.3.2-0.3mdvmes5.2.src.rpm
95d1abffc5ac94ae5777dfca705ec041
mes5/SRPMS/xulrunner-17.0.7-0.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRyvf4mqjQ0CJFipgRAhncAJ4t57nfc1kBzlr51Y2L7MOvNXP2mgCfSFbI
ohEMVvKKXEcVLt4x2S3uA2I=
=mmvT
-----END PGP SIGNATURE-----


------------=_1372276448-2483-15
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1372276448-2483-15--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung