LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 26th, 2014
Linux Security Week: September 22nd, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: 2012:145: firefox Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Security issues were identified and fixed in mozilla firefox: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:145
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : firefox
 Date    : August 29, 2012
 Affected: 2011.
 _______________________________________________________________________

 Problem Description:

 Security issues were identified and fixed in mozilla firefox:
 
 Mozilla developers identified and fixed several memory safety
 bugs in the browser engine used in Firefox and other Mozilla-based
 products. Some of these bugs showed evidence of memory corruption under
 certain circumstances, and we presume that with enough effort at least
 some of these could be exploited to run arbitrary code (CVE-2012-1971).
 
 Security researcher Abhishek Arya (Inferno) of Google Chrome Security
 Team discovered a series of use-after-free issues using the Address
 Sanitizer tool. Many of these issues are potentially exploitable,
 allowing for remote code execution (CVE-2012-1972, CVE-2012-1973,
 CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956,
 CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,
 CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964).
 
 Security researcher Mariusz Mlynski reported that it is possible to
 shadow the location object using Object.defineProperty. This could
 be used to confuse the current location to plugins, allowing for
 possible cross-site scripting (XSS) attacks (CVE-2012-1956).
 
 Security researcher Mariusz Mlynski reported that when a page opens a
 new tab, a subsequent window can then be opened that can be navigated
 to about:newtab, a chrome privileged page. Once about:newtab is loaded,
 the special context can potentially be used to escalate privilege,
 allowing for arbitrary code execution on the local system in a
 maliciously crafted attack (CVE-2012-3965).
 
 Security researcher Frederic Hoguin reported two related issues with
 the decoding of bitmap (.BMP) format images embedded in icon (.ICO)
 format files. When processing a negative height header value for
 the bitmap image, a memory corruption can be induced, allowing an
 attacker to write random memory and cause a crash. This crash may be
 potentially exploitable (CVE-2012-3966).
 
 Security researcher miaubiz used the Address Sanitizer tool to
 discover two WebGL issues. The first issue is a use-after-free when
 WebGL shaders are called after being destroyed. The second issue
 exposes a problem with Mesa drivers on Linux, leading to a potentially
 exploitable crash (CVE-2012-3968, CVE-2012-3967).
 
 Security researcher Arthur Gerkis used the Address Sanitizer
 tool to find two issues involving Scalable Vector Graphics (SVG)
 files. The first issue is a buffer overflow in Gecko's SVG filter
 code when the sum of two values is too large to be stored as a
 signed 32-bit integer, causing the function to write past the end
 of an array. The second issue is a use-after-free when an element
 with a requiredFeatures attribute is moved between documents. In that
 situation, the internal representation of the requiredFeatures value
 could be freed prematurely. Both issues are potentially exploitable
 (CVE-2012-3969, CVE-2012-3970).
 
 Using the Address Sanitizer tool, Mozilla security researcher Christoph
 Diehl discovered two memory corruption issues involving the Graphite
 2 library used in Mozilla products. Both of these issues can cause
 a potentially exploitable crash. These problems were fixed in the
 Graphite 2 library, which has been updated for Mozilla products
 (CVE-2012-3971).
 
 Security research Nicolas Gregoire used the Address Sanitizer tool to
 discover an out-of-bounds read in the format-number feature of XSLT,
 which can cause inaccurate formatting of numbers and information
 leakage. This is not directly exploitable (CVE-2012-3972).
 
 Mozilla security researcher Mark Goodwin discovered an issue with the
 Firefox developer tools' debugger. If remote debugging is disabled,
 but the experimental HTTPMonitor extension has been installed and
 enabled, a remote user can connect to and use the remote debugging
 service through the port used by HTTPMonitor. A remote-enabled flag
 has been added to resolve this problem and close the port unless
 debugging is explicitly enabled (CVE-2012-3973).
 
 Security researcher Masato Kinugawa reported that if a crafted
 executable is placed in the root partition on a Windows file system,
 the Firefox and Thunderbird installer will launch this program after
 a standard installation instead of Firefox or Thunderbird, running
 this program with the user's privileges (CVE-2012-3974).
 
 Security researcher vsemozhetbyt reported that when the DOMParser is
 used to parse text/html data in a Firefox extension, linked resources
 within this HTML data will be loaded. If the data being parsed in
 the extension is untrusted, it could lead to information leakage and
 can potentially be combined with other attacks to become exploitable
 (CVE-2012-3975).
 
 Security researcher Mark Poticha reported an issue where incorrect SSL
 certificate information can be displayed on the addressbar, showing
 the SSL data for a previous site while another has been loaded. This
 is caused by two onLocationChange events being fired out of the
 expected order, leading to the displayed certificate data to not be
 updated. This can be used for phishing attacks by allowing the user
 to input form or other data on a newer, attacking, site while the
 credentials of an older site appear on the addressbar (CVE-2012-3976).
 
 Mozilla security researcher moz_bug_r_a4 reported that certain
 security checks in the location object can be bypassed if chrome code
 is called content in a specific manner. This allowed for the loading
 of restricted content. This can be combined with other issues to
 become potentially exploitable (CVE-2012-3978).
 
 Security researcher Colby Russell discovered that eval in the web
 console can execute injected code with chrome privileges, leading to
 the running of malicious code in a privileged context. This allows
 for arbitrary code execution through a malicious web page if the web
 console is invoked by the user (CVE-2012-3980).
 
 The mozilla firefox packages has been upgraded to the latest versions
 which is unaffected by these security flaws.
 
 Additionally the sqlite3 packages has been upgraded to the 3.7.13
 version as firefox 15.0 requires the 3.7.12.1+ version.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1956
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1971
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3965
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3971
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3973
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3974
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3975
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980
 http://www.mozilla.org/security/announce/2012/mfsa2012-57.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-59.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-60.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-61.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-62.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-63.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-64.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-65.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-66.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-67.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-68.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-69.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-70.html
 http://www.mozilla.org/security/announce/2012/mfsa2012-72.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2011:
 1f222b3e99fe8ac26b53c9cfcacfae67  2011/i586/firefox-15.0-0.1-mdv2011.0.i586.rpm
 830afbabc32e3e7f2e2e35792e189ee9  2011/i586/firefox-af-15.0-0.1-mdv2011.0.noarch.rpm
 21c1c8a7d371f6b5c82d3575fa18b7cc  2011/i586/firefox-ar-15.0-0.1-mdv2011.0.noarch.rpm
 4f9d82121d5f4b061219bac93fb9d695  2011/i586/firefox-ast-15.0-0.1-mdv2011.0.noarch.rpm
 73482d144b27c260c1ee3497683a1e8e  2011/i586/firefox-be-15.0-0.1-mdv2011.0.noarch.rpm
 ae92eabc7ea75a2e4b793b3204dda1ab  2011/i586/firefox-bg-15.0-0.1-mdv2011.0.noarch.rpm
 4b533c2dcfaf12a30c42c96cdda56ad2  2011/i586/firefox-bn_BD-15.0-0.1-mdv2011.0.noarch.rpm
 c6f7c2cb3c4a2574c2e1f3597cb81885  2011/i586/firefox-bn_IN-15.0-0.1-mdv2011.0.noarch.rpm
 22f2bdf23712a350fa75fae37a5cfad6  2011/i586/firefox-br-15.0-0.1-mdv2011.0.noarch.rpm
 4778689a922ae7937a8a2b1472f24b48  2011/i586/firefox-bs-15.0-0.1-mdv2011.0.noarch.rpm
 3f2c33f4fa565425c2c1a119081793f6  2011/i586/firefox-ca-15.0-0.1-mdv2011.0.noarch.rpm
 ebde187076855de220ebddf95ce90bfb  2011/i586/firefox-cs-15.0-0.1-mdv2011.0.noarch.rpm
 ae6933efc19d257517a2c7577052b2b2  2011/i586/firefox-cy-15.0-0.1-mdv2011.0.noarch.rpm
 84a6b6ab34f5fd1270fbef5fd129c2d9  2011/i586/firefox-da-15.0-0.1-mdv2011.0.noarch.rpm
 2632f7ef74eea38e36017dfa46763bc6  2011/i586/firefox-de-15.0-0.1-mdv2011.0.noarch.rpm
 439d6472581e13385eb3e131f91ca08f  2011/i586/firefox-devel-15.0-0.1-mdv2011.0.i586.rpm
 59ff02012cd9ec45da32bdbad4be4457  2011/i586/firefox-el-15.0-0.1-mdv2011.0.noarch.rpm
 49b5b60cbfde698001c677f4a8dd08a5  2011/i586/firefox-en_GB-15.0-0.1-mdv2011.0.noarch.rpm
 3c26aa80a987fa35af688f443b40cce8  2011/i586/firefox-en_ZA-15.0-0.1-mdv2011.0.noarch.rpm
 b00a4254dd2c1a587757c33663432c69  2011/i586/firefox-eo-15.0-0.1-mdv2011.0.noarch.rpm
 6c371889cc0decb90d20c348f1807ff7  2011/i586/firefox-es_AR-15.0-0.1-mdv2011.0.noarch.rpm
 f6884b390f3729b5ef8f64ac2aed1c1c  2011/i586/firefox-es_CL-15.0-0.1-mdv2011.0.noarch.rpm
 3ecb605e1778ad035a077bca4bfea23e  2011/i586/firefox-es_ES-15.0-0.1-mdv2011.0.noarch.rpm
 bd1ac623a9102bf438aea4832897ee15  2011/i586/firefox-es_MX-15.0-0.1-mdv2011.0.noarch.rpm
 166bf576807f4e7f1f63379cfa8727f1  2011/i586/firefox-et-15.0-0.1-mdv2011.0.noarch.rpm
 a0086739ae734b1766585d4f34ea13b0  2011/i586/firefox-eu-15.0-0.1-mdv2011.0.noarch.rpm
 c0ec3a965a4a0bf0a3d3d7439cdb87b7  2011/i586/firefox-fa-15.0-0.1-mdv2011.0.noarch.rpm
 41320e3a963433760753ca738eeb86b4  2011/i586/firefox-fi-15.0-0.1-mdv2011.0.noarch.rpm
 cebb929a6db589bfc7a0aad0b04004b3  2011/i586/firefox-fr-15.0-0.1-mdv2011.0.noarch.rpm
 cd536f9f8727b2dd7701a7908c16cdfb  2011/i586/firefox-fy-15.0-0.1-mdv2011.0.noarch.rpm
 93595c9fe1cb709a7c21c02300ac12a9  2011/i586/firefox-ga_IE-15.0-0.1-mdv2011.0.noarch.rpm
 279b9c1ce32cf4ca4c700b47493c9761  2011/i586/firefox-gd-15.0-0.1-mdv2011.0.noarch.rpm
 f7c574740a7f858c1357f0c4a26149f8  2011/i586/firefox-gl-15.0-0.1-mdv2011.0.noarch.rpm
 857773582b15d0088871a19d119bd7a6  2011/i586/firefox-gu_IN-15.0-0.1-mdv2011.0.noarch.rpm
 326c53491f6c670e97e3dc9970e89fd2  2011/i586/firefox-he-15.0-0.1-mdv2011.0.noarch.rpm
 bad57690513be43f7a45312afe48d9c9  2011/i586/firefox-hi-15.0-0.1-mdv2011.0.noarch.rpm
 729ed2290db6881e017b31a836e3c5a4  2011/i586/firefox-hr-15.0-0.1-mdv2011.0.noarch.rpm
 8460829d9985d2a74936b877f179dec9  2011/i586/firefox-hu-15.0-0.1-mdv2011.0.noarch.rpm
 548a264d2855b25f2e154aaf240399c8  2011/i586/firefox-hy-15.0-0.1-mdv2011.0.noarch.rpm
 d4a0edef33cc08ef953b0afe0a42ca22  2011/i586/firefox-id-15.0-0.1-mdv2011.0.noarch.rpm
 77df09e404f6f52340722e132578fb71  2011/i586/firefox-is-15.0-0.1-mdv2011.0.noarch.rpm
 22c6063a51892e704853e3734152689c  2011/i586/firefox-it-15.0-0.1-mdv2011.0.noarch.rpm
 2f385e87134374123a088185e1193667  2011/i586/firefox-ja-15.0-0.1-mdv2011.0.noarch.rpm
 588a71cd10e951c5be3015dfe6775e2d  2011/i586/firefox-kk-15.0-0.1-mdv2011.0.noarch.rpm
 7ba2d41b41b8836adde138249d2cd587  2011/i586/firefox-kn-15.0-0.1-mdv2011.0.noarch.rpm
 b4079f7b0ef8f3be0e37c5aa96d2221a  2011/i586/firefox-ko-15.0-0.1-mdv2011.0.noarch.rpm
 40b5c012763298a1fe3274ab969567a6  2011/i586/firefox-ku-15.0-0.1-mdv2011.0.noarch.rpm
 216e18c06df896f2b2649ba9b016923b  2011/i586/firefox-lg-15.0-0.1-mdv2011.0.noarch.rpm
 a86d4439195ff4939d04ab1998d0b7aa  2011/i586/firefox-lt-15.0-0.1-mdv2011.0.noarch.rpm
 293c14003c06d904f5605ab1ab30eec9  2011/i586/firefox-lv-15.0-0.1-mdv2011.0.noarch.rpm
 d26c88fdba82c231e368aeab323ec42a  2011/i586/firefox-mai-15.0-0.1-mdv2011.0.noarch.rpm
 dfea7441a35aa20971e792995d8c63b6  2011/i586/firefox-mk-15.0-0.1-mdv2011.0.noarch.rpm
 890c2606438b8603d7c2b74effc7a140  2011/i586/firefox-ml-15.0-0.1-mdv2011.0.noarch.rpm
 bd7202ff08d5448909760da6ba00193e  2011/i586/firefox-mr-15.0-0.1-mdv2011.0.noarch.rpm
 d5ae7737ee1e19eddf5b907b71d7ab71  2011/i586/firefox-nb_NO-15.0-0.1-mdv2011.0.noarch.rpm
 f6d86c02d2da83feb6c167e49c5ec947  2011/i586/firefox-nl-15.0-0.1-mdv2011.0.noarch.rpm
 266b961ec2cb241a20c70d394ad9510b  2011/i586/firefox-nn_NO-15.0-0.1-mdv2011.0.noarch.rpm
 805d010bb07b456436b6d7ac7104ccd0  2011/i586/firefox-nso-15.0-0.1-mdv2011.0.noarch.rpm
 fe819dce2711402c23d3dd6f4794b256  2011/i586/firefox-or-15.0-0.1-mdv2011.0.noarch.rpm
 fca8922205971ddccb34082f997ed5e2  2011/i586/firefox-pa_IN-15.0-0.1-mdv2011.0.noarch.rpm
 9d7910fb52d5054e5dead2b014417c8b  2011/i586/firefox-pl-15.0-0.1-mdv2011.0.noarch.rpm
 54de08f75456428d52733fdda3e50b12  2011/i586/firefox-pt_BR-15.0-0.1-mdv2011.0.noarch.rpm
 53e675e93a9937c31d923ab885901c70  2011/i586/firefox-pt_PT-15.0-0.1-mdv2011.0.noarch.rpm
 166a43501f37c621f734107972deaa2c  2011/i586/firefox-ro-15.0-0.1-mdv2011.0.noarch.rpm
 610313275eb89ba60144f822ce0fa237  2011/i586/firefox-ru-15.0-0.1-mdv2011.0.noarch.rpm
 56bc307c2d0876c75ef0797f0424eacb  2011/i586/firefox-si-15.0-0.1-mdv2011.0.noarch.rpm
 ca3865058f178e183c94519903e1fb61  2011/i586/firefox-sk-15.0-0.1-mdv2011.0.noarch.rpm
 07720c299be46beedc88c26b9cf89a97  2011/i586/firefox-sl-15.0-0.1-mdv2011.0.noarch.rpm
 b1bf922f975338182bbb26797579428a  2011/i586/firefox-sq-15.0-0.1-mdv2011.0.noarch.rpm
 4b6478221fed473055b404500abf2baf  2011/i586/firefox-sr-15.0-0.1-mdv2011.0.noarch.rpm
 6194dee67cfa5612aa7abbad659b7315  2011/i586/firefox-sv_SE-15.0-0.1-mdv2011.0.noarch.rpm
 a0eb93a6dfd7c28e8627c6dfa04284f4  2011/i586/firefox-ta-15.0-0.1-mdv2011.0.noarch.rpm
 b89778aafce014d88f6b934ffa21bdd7  2011/i586/firefox-ta_LK-15.0-0.1-mdv2011.0.noarch.rpm
 c9159cce5035229c80b11c50e7ab0005  2011/i586/firefox-te-15.0-0.1-mdv2011.0.noarch.rpm
 cc439a3f7b4dab59f6e0d577f3163194  2011/i586/firefox-th-15.0-0.1-mdv2011.0.noarch.rpm
 696504ef908118a49d32189c36f9eb5d  2011/i586/firefox-tr-15.0-0.1-mdv2011.0.noarch.rpm
 1fddb827215cdf82f8f1314e3a547edf  2011/i586/firefox-uk-15.0-0.1-mdv2011.0.noarch.rpm
 f418db6ba119ed0de0214480943863dd  2011/i586/firefox-vi-15.0-0.1-mdv2011.0.noarch.rpm
 2964ec621ab70e39f7635df40e5c484a  2011/i586/firefox-zh_CN-15.0-0.1-mdv2011.0.noarch.rpm
 cff8302e2a9614c44f1608ac46a421cc  2011/i586/firefox-zh_TW-15.0-0.1-mdv2011.0.noarch.rpm
 f5a5a2200c29653256e5d382f3766194  2011/i586/firefox-zu-15.0-0.1-mdv2011.0.noarch.rpm
 2274b16d1b6b60602ca54dc5eb5f68c8  2011/i586/icedtea-web-1.1.6-0.2-mdv2011.0.i586.rpm
 dddc30660fb233fb5c97c04f02ed64da  2011/i586/icedtea-web-javadoc-1.1.6-0.2-mdv2011.0.noarch.rpm
 550c5722b549c364ee147044d3590d62  2011/i586/libsqlite3_0-3.7.13-0.1-mdv2011.0.i586.rpm
 0483c7892ec4be5fbf5fb7162f664271  2011/i586/libsqlite3-devel-3.7.13-0.1-mdv2011.0.i586.rpm
 357c444fc07b299e6e96e23ecabf2375  2011/i586/libsqlite3-static-devel-3.7.13-0.1-mdv2011.0.i586.rpm
 6592326e150eab214bd23ec0e6ef484a  2011/i586/libxulrunner15.0-15.0-0.1-mdv2011.0.i586.rpm
 1b3355cd27981baeeea6d595687ecc74  2011/i586/libxulrunner-devel-15.0-0.1-mdv2011.0.i586.rpm
 9908d94443b85447e26eaa358ff442cd  2011/i586/sqlite3-tools-3.7.13-0.1-mdv2011.0.i586.rpm
 c5498a5ef9939d6b58fe744f9d5578e9  2011/i586/xulrunner-15.0-0.1-mdv2011.0.i586.rpm 
 5f4955227553eb24c3886bf6a3716b55  2011/SRPMS/firefox-15.0-0.1.src.rpm
 5cf3b047ef06dc671d3dade85543338e  2011/SRPMS/firefox-l10n-15.0-0.1.src.rpm
 7846e5d4c210787f9ed3f34a485c5531  2011/SRPMS/icedtea-web-1.1.6-0.2.src.rpm
 7cdb6e62c1f9d07f4490471d0a66b490  2011/SRPMS/sqlite3-3.7.13-0.1.src.rpm
 c36ea604ee25a8962918bb95f42884b4  2011/SRPMS/xulrunner-15.0-0.1.src.rpm

 Mandriva Linux 2011/X86_64:
 0e12e9d44ff9a8123fc7493dcb7077f8  2011/x86_64/firefox-15.0-0.1-mdv2011.0.x86_64.rpm
 1a181da8dae38cfd5591db4694ed8fbc  2011/x86_64/firefox-af-15.0-0.1-mdv2011.0.noarch.rpm
 55360547f9f98f3ced919ba6c50e579a  2011/x86_64/firefox-ar-15.0-0.1-mdv2011.0.noarch.rpm
 5e0e1961a7b1f2eb344fd1f34afa0b66  2011/x86_64/firefox-ast-15.0-0.1-mdv2011.0.noarch.rpm
 800c8a3ae03d6504dd83da97f58589de  2011/x86_64/firefox-be-15.0-0.1-mdv2011.0.noarch.rpm
 7aa80805fc41aa719927ba9630ea548f  2011/x86_64/firefox-bg-15.0-0.1-mdv2011.0.noarch.rpm
 bb751193947481a0d92066fd2bafefae  2011/x86_64/firefox-bn_BD-15.0-0.1-mdv2011.0.noarch.rpm
 fc2863e629aa015dfe3ac3f0ebaf631e  2011/x86_64/firefox-bn_IN-15.0-0.1-mdv2011.0.noarch.rpm
 aa7ba1bc7c14e5aa0cd0e0d9d4ff520f  2011/x86_64/firefox-br-15.0-0.1-mdv2011.0.noarch.rpm
 49c06957e034fa5d5c183b2c4da1aa35  2011/x86_64/firefox-bs-15.0-0.1-mdv2011.0.noarch.rpm
 8932ea8e47e5822db4efb414617f1aca  2011/x86_64/firefox-ca-15.0-0.1-mdv2011.0.noarch.rpm
 12cc2f67e45e9c936b0df757929c30c1  2011/x86_64/firefox-cs-15.0-0.1-mdv2011.0.noarch.rpm
 8c35b25848d1fc92e6ab20db07e07702  2011/x86_64/firefox-cy-15.0-0.1-mdv2011.0.noarch.rpm
 78ca9cf1e222208de2aa05891999b978  2011/x86_64/firefox-da-15.0-0.1-mdv2011.0.noarch.rpm
 8dff4be2f33606862b004e4033598a65  2011/x86_64/firefox-de-15.0-0.1-mdv2011.0.noarch.rpm
 6e3f21c934da448622f78c98d14e51be  2011/x86_64/firefox-devel-15.0-0.1-mdv2011.0.x86_64.rpm
 b91951fb96c66144c5b660b06385653a  2011/x86_64/firefox-el-15.0-0.1-mdv2011.0.noarch.rpm
 932dad756f240fbf225dceeef30fca76  2011/x86_64/firefox-en_GB-15.0-0.1-mdv2011.0.noarch.rpm
 6973da6f9fafd57c219cf44701ee3c2f  2011/x86_64/firefox-en_ZA-15.0-0.1-mdv2011.0.noarch.rpm
 53b8f28aabfef241ba1b29345eb6b8f6  2011/x86_64/firefox-eo-15.0-0.1-mdv2011.0.noarch.rpm
 433bde29ecc2dd65ee80a344482a6e21  2011/x86_64/firefox-es_AR-15.0-0.1-mdv2011.0.noarch.rpm
 d3e1dea3f71c9e01164d7c44d729e6ab  2011/x86_64/firefox-es_CL-15.0-0.1-mdv2011.0.noarch.rpm
 108b9ee83ce20174919f1f2b9989d539  2011/x86_64/firefox-es_ES-15.0-0.1-mdv2011.0.noarch.rpm
 a09908b98b81d5141eaccb573f282780  2011/x86_64/firefox-es_MX-15.0-0.1-mdv2011.0.noarch.rpm
 bca684c84cf0c67ab987611758132207  2011/x86_64/firefox-et-15.0-0.1-mdv2011.0.noarch.rpm
 ee18e1f0855974fcd631dab8a7fdff3c  2011/x86_64/firefox-eu-15.0-0.1-mdv2011.0.noarch.rpm
 727f24a1fa0d01c000050ba668710c71  2011/x86_64/firefox-fa-15.0-0.1-mdv2011.0.noarch.rpm
 c14f3f7d08e1af11a21bb78cebb9e0a4  2011/x86_64/firefox-fi-15.0-0.1-mdv2011.0.noarch.rpm
 c9bf3a1d7db2d326f44f4afbfb56f80f  2011/x86_64/firefox-fr-15.0-0.1-mdv2011.0.noarch.rpm
 3c742d582d03dbb67a23c3b2b6a7c628  2011/x86_64/firefox-fy-15.0-0.1-mdv2011.0.noarch.rpm
 83294ffb20ac9204b360afd35c4f926e  2011/x86_64/firefox-ga_IE-15.0-0.1-mdv2011.0.noarch.rpm
 55fc357d551a3cf96533a0e8513b3191  2011/x86_64/firefox-gd-15.0-0.1-mdv2011.0.noarch.rpm
 82f35973cab220ee73e699f078041e8d  2011/x86_64/firefox-gl-15.0-0.1-mdv2011.0.noarch.rpm
 c74bd9183a85b1f70f93ae7857dbf4f1  2011/x86_64/firefox-gu_IN-15.0-0.1-mdv2011.0.noarch.rpm
 76ed674fcc83ce4f9ffcb2426c68edd2  2011/x86_64/firefox-he-15.0-0.1-mdv2011.0.noarch.rpm
 787844a81abc2381fc6d507c4635e617  2011/x86_64/firefox-hi-15.0-0.1-mdv2011.0.noarch.rpm
 e624dd22d0d4393004b426565ce5ed2e  2011/x86_64/firefox-hr-15.0-0.1-mdv2011.0.noarch.rpm
 9b96cda724241294456d1a7034f39ccb  2011/x86_64/firefox-hu-15.0-0.1-mdv2011.0.noarch.rpm
 477907a657672818409beae06be8aff5  2011/x86_64/firefox-hy-15.0-0.1-mdv2011.0.noarch.rpm
 c00476196d5fb8bbc9be437fc59971b8  2011/x86_64/firefox-id-15.0-0.1-mdv2011.0.noarch.rpm
 6b074fa2d96d8f81af2f0823cbf9672c  2011/x86_64/firefox-is-15.0-0.1-mdv2011.0.noarch.rpm
 2ce12cb5145efc398bbc0484a4b50838  2011/x86_64/firefox-it-15.0-0.1-mdv2011.0.noarch.rpm
 f32e3bc9386dec60704de908e83dcbba  2011/x86_64/firefox-ja-15.0-0.1-mdv2011.0.noarch.rpm
 71fbffb05956075768546aeb2fd84939  2011/x86_64/firefox-kk-15.0-0.1-mdv2011.0.noarch.rpm
 d9cebef0570d2d09c0ba617c2cdf8525  2011/x86_64/firefox-kn-15.0-0.1-mdv2011.0.noarch.rpm
 51584b7f863a78c0dea9dd6b7b3bd7c2  2011/x86_64/firefox-ko-15.0-0.1-mdv2011.0.noarch.rpm
 f455e7aa94b96a12751359fa109c5d00  2011/x86_64/firefox-ku-15.0-0.1-mdv2011.0.noarch.rpm
 436e157f25b477cf0adaddac02d8268a  2011/x86_64/firefox-lg-15.0-0.1-mdv2011.0.noarch.rpm
 098d1b1c8d93eafafc857aa69d2745ea  2011/x86_64/firefox-lt-15.0-0.1-mdv2011.0.noarch.rpm
 645a634ef43975f67039828dbbab56cf  2011/x86_64/firefox-lv-15.0-0.1-mdv2011.0.noarch.rpm
 dc80bf890f4fe7db4e9d0bfc2266ad15  2011/x86_64/firefox-mai-15.0-0.1-mdv2011.0.noarch.rpm
 10e45ce2b835a6a81b481653dab78880  2011/x86_64/firefox-mk-15.0-0.1-mdv2011.0.noarch.rpm
 10c055dd5d49c5562e2c590661309518  2011/x86_64/firefox-ml-15.0-0.1-mdv2011.0.noarch.rpm
 525dd0b30d68e43dd8e56b6b25a7b149  2011/x86_64/firefox-mr-15.0-0.1-mdv2011.0.noarch.rpm
 c2c68003b652349c48b812d381c00248  2011/x86_64/firefox-nb_NO-15.0-0.1-mdv2011.0.noarch.rpm
 3a1651ec18d3aef0da7234cc01d3de67  2011/x86_64/firefox-nl-15.0-0.1-mdv2011.0.noarch.rpm
 d7f8797d04abcd86471bad8f05c541f0  2011/x86_64/firefox-nn_NO-15.0-0.1-mdv2011.0.noarch.rpm
 f7bc6278e0a54b3cdbe855764f4457eb  2011/x86_64/firefox-nso-15.0-0.1-mdv2011.0.noarch.rpm
 1ae275c8c3bdf83d7cde2be3feb3d1de  2011/x86_64/firefox-or-15.0-0.1-mdv2011.0.noarch.rpm
 66b6127a9a0c658608668514c5c78884  2011/x86_64/firefox-pa_IN-15.0-0.1-mdv2011.0.noarch.rpm
 2d486eabca55712bc8cc3a3252c7adcc  2011/x86_64/firefox-pl-15.0-0.1-mdv2011.0.noarch.rpm
 fca74bdac00db9fae52fdac14e1c5b48  2011/x86_64/firefox-pt_BR-15.0-0.1-mdv2011.0.noarch.rpm
 0c332cea72e001c903d5d82c9627efd5  2011/x86_64/firefox-pt_PT-15.0-0.1-mdv2011.0.noarch.rpm
 3162e3ec2676a92f926cd31af88aa53e  2011/x86_64/firefox-ro-15.0-0.1-mdv2011.0.noarch.rpm
 4cd1d49b0eaec676aa64e50f5796bbcc  2011/x86_64/firefox-ru-15.0-0.1-mdv2011.0.noarch.rpm
 a5d6939ae79a981f2ccab6bc83cbd326  2011/x86_64/firefox-si-15.0-0.1-mdv2011.0.noarch.rpm
 3385479540d49e9f47bb7b6da3af61d5  2011/x86_64/firefox-sk-15.0-0.1-mdv2011.0.noarch.rpm
 24a3140b69a25734b5877422eead8fd7  2011/x86_64/firefox-sl-15.0-0.1-mdv2011.0.noarch.rpm
 63a3c429e6c935ea1c67a1a2928b99e5  2011/x86_64/firefox-sq-15.0-0.1-mdv2011.0.noarch.rpm
 41c9c59322de076f495352b6d05efdb5  2011/x86_64/firefox-sr-15.0-0.1-mdv2011.0.noarch.rpm
 a23a5d5a39a1677b9f06db9b8e16478b  2011/x86_64/firefox-sv_SE-15.0-0.1-mdv2011.0.noarch.rpm
 926fb2b0302ced70674ed8b3518558ee  2011/x86_64/firefox-ta-15.0-0.1-mdv2011.0.noarch.rpm
 f7472be3b81befdcc3653cb9e71b46cf  2011/x86_64/firefox-ta_LK-15.0-0.1-mdv2011.0.noarch.rpm
 4e88af6834cc8f590f260e13ca2f39bb  2011/x86_64/firefox-te-15.0-0.1-mdv2011.0.noarch.rpm
 dac0f7e88abd24bee5a5c7695de442ed  2011/x86_64/firefox-th-15.0-0.1-mdv2011.0.noarch.rpm
 0c3c48ce57c8f54e95a162a2a5f32f49  2011/x86_64/firefox-tr-15.0-0.1-mdv2011.0.noarch.rpm
 86ab0a7d77f74a1822355574580efc38  2011/x86_64/firefox-uk-15.0-0.1-mdv2011.0.noarch.rpm
 65188e896935cb4cabc3207b8da029cb  2011/x86_64/firefox-vi-15.0-0.1-mdv2011.0.noarch.rpm
 f183fa37318efda5d033ecbf8e69aafc  2011/x86_64/firefox-zh_CN-15.0-0.1-mdv2011.0.noarch.rpm
 1085b1aaf753421006716514b2dd4d51  2011/x86_64/firefox-zh_TW-15.0-0.1-mdv2011.0.noarch.rpm
 61e9a3a0eb460cd4f4fdd4bae6d77502  2011/x86_64/firefox-zu-15.0-0.1-mdv2011.0.noarch.rpm
 e21e61bc2a9a00d61632b671ec1a7c56  2011/x86_64/icedtea-web-1.1.6-0.2-mdv2011.0.x86_64.rpm
 d25f4584600c089a687f7dee70e5cbd2  2011/x86_64/icedtea-web-javadoc-1.1.6-0.2-mdv2011.0.noarch.rpm
 264d06ed466aa86874fb72bcb58b606b  2011/x86_64/lib64sqlite3_0-3.7.13-0.1-mdv2011.0.x86_64.rpm
 0183919f566dd640cb4f050f568b3112  2011/x86_64/lib64sqlite3-devel-3.7.13-0.1-mdv2011.0.x86_64.rpm
 f1368b8324e0031c8505a3e8f944eba0  2011/x86_64/lib64sqlite3-static-devel-3.7.13-0.1-mdv2011.0.x86_64.rpm
 27154cd06e180c264d478037c5b189d5  2011/x86_64/lib64xulrunner15.0-15.0-0.1-mdv2011.0.x86_64.rpm
 37023d7d5b9e3c135cdc21ce7e68a73c  2011/x86_64/lib64xulrunner-devel-15.0-0.1-mdv2011.0.x86_64.rpm
 de18d6a57d7c417717f86a983d0faa5b  2011/x86_64/sqlite3-tools-3.7.13-0.1-mdv2011.0.x86_64.rpm
 f4b5a15a168d314f542bab81ca67d339  2011/x86_64/xulrunner-15.0-0.1-mdv2011.0.x86_64.rpm 
 5f4955227553eb24c3886bf6a3716b55  2011/SRPMS/firefox-15.0-0.1.src.rpm
 5cf3b047ef06dc671d3dade85543338e  2011/SRPMS/firefox-l10n-15.0-0.1.src.rpm
 7846e5d4c210787f9ed3f34a485c5531  2011/SRPMS/icedtea-web-1.1.6-0.2.src.rpm
 7cdb6e62c1f9d07f4490471d0a66b490  2011/SRPMS/sqlite3-3.7.13-0.1.src.rpm
 c36ea604ee25a8962918bb95f42884b4  2011/SRPMS/xulrunner-15.0-0.1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Honeypot Snares Two Bots Exploiting Bash Vulnerability
CloudFlare Rolls Out Free SSL
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.