LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: 2013:087: firefox Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Multiple security issues was identified and fixed in mozilla firefox: Mozilla community member Tobias Schula reported that if gfx.color_management.enablev4 preference is enabled manually in about:config, some grayscale PNG images will be rendered incorrectly [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2013:087
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : firefox
 Date    : April 9, 2013
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple security issues was identified and fixed in mozilla firefox:
 
 Mozilla community member Tobias Schula reported that if
 gfx.color_management.enablev4 preference is enabled manually in
 about:config, some grayscale PNG images will be rendered incorrectly
 and cause memory corruption during PNG decoding when certain color
 profiles are in use. A crafted PNG image could use this flaw to leak
 data through rendered images drawing from random memory. By default,
 this preference is not enabled (CVE-2013-0792).
 
 Security researcher Mariusz Mlynski reported a method to use browser
 navigations through history to load an arbitrary website with that
 page's baseURI property pointing to another site instead of the
 seemingly loaded one. The user will continue to see the incorrect
 site in the addressbar of the browser. This allows for a cross-site
 scripting (XSS) attack or the theft of data through a phishing attack
 (CVE-2013-0793).
 
 Security researcher Cody Crews reported a mechanism to use the
 cloneNode method to bypass System Only Wrappers (SOW) and clone a
 protected node. This allows violation of the browser's same origin
 policy and could also lead to privilege escalation and the execution
 of arbitrary code (CVE-2013-0795).
 
 Security researcher miaubiz used the Address Sanitizer tool to
 discover a crash in WebGL rendering when memory is freed that has
 not previously been allocated. This issue only affects Linux users
 who have Intel Mesa graphics drivers. The resulting crash could be
 potentially exploitable (CVE-2013-0796).
 
 Security researcher Abhishek Arya (Inferno) of the Google Chrome
 Security Team used the Address Sanitizer tool to discover an
 out-of-bounds write in Cairo graphics library. When certain values
 are passed to it during rendering, Cairo attempts to use negative
 boundaries or sizes for boxes, leading to a potentially exploitable
 crash in some instances (CVE-2013-0800).
 
 Mozilla developers identified and fixed several memory safety
 bugs in the browser engine used in Firefox and other Mozilla-based
 products. Some of these bugs showed evidence of memory corruption under
 certain circumstances, and we presume that with enough effort at least
 some of these could be exploited to run arbitrary code (CVE-2013-0788).
 
 The mozilla firefox packages has been upgraded to the latest ESR
 version (17.0.5) which is unaffected by these security flaws.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
 http://www.mozilla.org/security/announce/2013/mfsa2013-39.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-38.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-36.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-35.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-31.html
 http://www.mozilla.org/security/announce/2013/mfsa2013-30.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 0db2c1631a956f6147230a099f1d2d68  mes5/i586/firefox-17.0.5-0.1mdvmes5.2.i586.rpm
 b6accdf420ac5eb3dbea29d283fff049  mes5/i586/firefox-af-17.0.5-0.1mdvmes5.2.i586.rpm
 a434d7ee9d360c2b555873e8c93aac2a  mes5/i586/firefox-ar-17.0.5-0.1mdvmes5.2.i586.rpm
 3b64b73c7cb465fee179b140656a065d  mes5/i586/firefox-be-17.0.5-0.1mdvmes5.2.i586.rpm
 967b03abad307a338d0709df85e1ec1e  mes5/i586/firefox-bg-17.0.5-0.1mdvmes5.2.i586.rpm
 715fef97490152afcea942e32d9f8fae  mes5/i586/firefox-bn-17.0.5-0.1mdvmes5.2.i586.rpm
 46bac62630e189f9d6f7f2d90a5e1c4e  mes5/i586/firefox-ca-17.0.5-0.1mdvmes5.2.i586.rpm
 64143512420338cc54a073be91ccbf9d  mes5/i586/firefox-cs-17.0.5-0.1mdvmes5.2.i586.rpm
 ba627030e474fb62caf34b2280e2432f  mes5/i586/firefox-cy-17.0.5-0.1mdvmes5.2.i586.rpm
 d2ba69795c243c8aad3e56f1ba3190b4  mes5/i586/firefox-da-17.0.5-0.1mdvmes5.2.i586.rpm
 81473710741c44e227e930f512a890d7  mes5/i586/firefox-de-17.0.5-0.1mdvmes5.2.i586.rpm
 7d787c3a0eabf7b514083f267037cbdd  mes5/i586/firefox-devel-17.0.5-0.1mdvmes5.2.i586.rpm
 f279d611e9a8233cec0090439e0bbc30  mes5/i586/firefox-el-17.0.5-0.1mdvmes5.2.i586.rpm
 5ad88edccb4a8cb75d58464ed2201e2a  mes5/i586/firefox-en_GB-17.0.5-0.1mdvmes5.2.i586.rpm
 7c2bdafe6cf1219d33df634b40ca7f33  mes5/i586/firefox-eo-17.0.5-0.1mdvmes5.2.i586.rpm
 6e8e3cc43e1b5326d886780d5409ff57  mes5/i586/firefox-es_AR-17.0.5-0.1mdvmes5.2.i586.rpm
 8608ba9849ea4f56ac60475ccfc3acd7  mes5/i586/firefox-es_ES-17.0.5-0.1mdvmes5.2.i586.rpm
 b6de17fad95679a08dfc420f51d5e0fa  mes5/i586/firefox-et-17.0.5-0.1mdvmes5.2.i586.rpm
 7d5281fe391c7bcbc4f49369e00ce6f0  mes5/i586/firefox-eu-17.0.5-0.1mdvmes5.2.i586.rpm
 dfacd04856fb4529fb0ebdabbad374f9  mes5/i586/firefox-fi-17.0.5-0.1mdvmes5.2.i586.rpm
 b98f1800a67f8fec9dcbca77edd41ac4  mes5/i586/firefox-fr-17.0.5-0.1mdvmes5.2.i586.rpm
 eed03047da1e7642f207cb8821dbd95f  mes5/i586/firefox-fy-17.0.5-0.1mdvmes5.2.i586.rpm
 3f110cc8c73665a709b97bf554b835cc  mes5/i586/firefox-ga_IE-17.0.5-0.1mdvmes5.2.i586.rpm
 0ad55037b7527a452626a84dade35f56  mes5/i586/firefox-gl-17.0.5-0.1mdvmes5.2.i586.rpm
 e0272d903a0f8b1c938dded3626ac89a  mes5/i586/firefox-gu_IN-17.0.5-0.1mdvmes5.2.i586.rpm
 6bdc9c6edcc036122d131b6bf5a341ec  mes5/i586/firefox-he-17.0.5-0.1mdvmes5.2.i586.rpm
 8fd0ad163782a228e9176f1618dbae2f  mes5/i586/firefox-hi-17.0.5-0.1mdvmes5.2.i586.rpm
 cef589c92b95defd03297a43a4a65e65  mes5/i586/firefox-hu-17.0.5-0.1mdvmes5.2.i586.rpm
 6a4e24d1c59f774cab7ea341dedde5e5  mes5/i586/firefox-id-17.0.5-0.1mdvmes5.2.i586.rpm
 617d63908bfa91b171a5e40acdfbb058  mes5/i586/firefox-is-17.0.5-0.1mdvmes5.2.i586.rpm
 89d72f5231e362ffbcb74c5ebd9d2789  mes5/i586/firefox-it-17.0.5-0.1mdvmes5.2.i586.rpm
 46e283185529cf7e3b55208e928d3e21  mes5/i586/firefox-ja-17.0.5-0.1mdvmes5.2.i586.rpm
 9cb48d986cb94e843740461ccdc7e344  mes5/i586/firefox-kn-17.0.5-0.1mdvmes5.2.i586.rpm
 b4a30b6ae86cf07f9e15a5921ccf367c  mes5/i586/firefox-ko-17.0.5-0.1mdvmes5.2.i586.rpm
 447af559ce4a0a7cd0ff00ad81466966  mes5/i586/firefox-ku-17.0.5-0.1mdvmes5.2.i586.rpm
 f16fa703cc4611f42ef618a2709467ce  mes5/i586/firefox-lt-17.0.5-0.1mdvmes5.2.i586.rpm
 f2f05879c892085be5d0fa4e9c787ae7  mes5/i586/firefox-lv-17.0.5-0.1mdvmes5.2.i586.rpm
 f166cef7eeae485e939a9964df355ffe  mes5/i586/firefox-mk-17.0.5-0.1mdvmes5.2.i586.rpm
 a2d9533d98cd613ff49ace2dd3c4aaaf  mes5/i586/firefox-mr-17.0.5-0.1mdvmes5.2.i586.rpm
 04e604773ab19ad5060c53d906c7d222  mes5/i586/firefox-nb_NO-17.0.5-0.1mdvmes5.2.i586.rpm
 ea691e1ecd5cfac906a077614841100f  mes5/i586/firefox-nl-17.0.5-0.1mdvmes5.2.i586.rpm
 0b7dac86ef507b78504a6f507d2b82b6  mes5/i586/firefox-nn_NO-17.0.5-0.1mdvmes5.2.i586.rpm
 b5a1616579bd3804eb500a75aa9b040e  mes5/i586/firefox-pa_IN-17.0.5-0.1mdvmes5.2.i586.rpm
 abca5b749f468af02e0d94e2c8b00ac1  mes5/i586/firefox-pl-17.0.5-0.1mdvmes5.2.i586.rpm
 2585fe186ebb3b81ae4e3b4c4ed73442  mes5/i586/firefox-pt_BR-17.0.5-0.1mdvmes5.2.i586.rpm
 416bbd1fc256861429b3fd78f7d83ef1  mes5/i586/firefox-pt_PT-17.0.5-0.1mdvmes5.2.i586.rpm
 3d66426c2548c0ba2746c4c36a9db708  mes5/i586/firefox-ro-17.0.5-0.1mdvmes5.2.i586.rpm
 ae4fc0951b14c00d6656540e7d38e22e  mes5/i586/firefox-ru-17.0.5-0.1mdvmes5.2.i586.rpm
 d323216cc380f286ff0c990062cdbd43  mes5/i586/firefox-si-17.0.5-0.1mdvmes5.2.i586.rpm
 a0edc229b50354a66d6c6152fc082395  mes5/i586/firefox-sk-17.0.5-0.1mdvmes5.2.i586.rpm
 7d5edda5ddd9064dec3b85ecc7102f19  mes5/i586/firefox-sl-17.0.5-0.1mdvmes5.2.i586.rpm
 277d4c09d495b4b8bb0c7e715761f267  mes5/i586/firefox-sq-17.0.5-0.1mdvmes5.2.i586.rpm
 3d601400d0df895c73a5ebb064f4f016  mes5/i586/firefox-sr-17.0.5-0.1mdvmes5.2.i586.rpm
 f5f9e7bbe47f6fba7042f2bf5a61d28e  mes5/i586/firefox-sv_SE-17.0.5-0.1mdvmes5.2.i586.rpm
 ec8dc022734c08dab5183405efa6d0c1  mes5/i586/firefox-te-17.0.5-0.1mdvmes5.2.i586.rpm
 242b490062337f7f4f4b8169fb8c91d5  mes5/i586/firefox-th-17.0.5-0.1mdvmes5.2.i586.rpm
 3f2fe42cd27e1c751513a561df7fb5a7  mes5/i586/firefox-tr-17.0.5-0.1mdvmes5.2.i586.rpm
 e5a6d7e6b9981687ca062526a14c7056  mes5/i586/firefox-uk-17.0.5-0.1mdvmes5.2.i586.rpm
 8ad451f2a167af24160826bb6d054593  mes5/i586/firefox-zh_CN-17.0.5-0.1mdvmes5.2.i586.rpm
 3d1c7ee791874a416ed2bf5847fa6ad7  mes5/i586/firefox-zh_TW-17.0.5-0.1mdvmes5.2.i586.rpm
 0c338be36acdbe8c79655cfeac88627a  mes5/i586/icedtea-web-1.3.1-0.3mdvmes5.2.i586.rpm
 807123e3063f730d05282bf43f3dda6a  mes5/i586/icedtea-web-javadoc-1.3.1-0.3mdvmes5.2.i586.rpm
 7380860d463c5b198f74b592e51031f1  mes5/i586/libnspr4-4.9.6-0.1mdvmes5.2.i586.rpm
 58137e16b3eb8e9655ceef99f4ec1fc7  mes5/i586/libnspr-devel-4.9.6-0.1mdvmes5.2.i586.rpm
 6cb4ca4131bce6f48ff8d347ded8236d  mes5/i586/libxulrunner17.0.5-17.0.5-0.1mdvmes5.2.i586.rpm
 5c7ea7a5a52630606b7e71d61ac5c738  mes5/i586/libxulrunner-devel-17.0.5-0.1mdvmes5.2.i586.rpm
 41f2f6022487aabc48b573620111b6b8  mes5/i586/xulrunner-17.0.5-0.1mdvmes5.2.i586.rpm 
 2a3a774ee0094a48cf108ed120ba227a  mes5/SRPMS/firefox-17.0.5-0.1mdvmes5.2.src.rpm
 58a810253d11b6af76cf1bcce6a3e7b4  mes5/SRPMS/firefox-l10n-17.0.5-0.1mdvmes5.2.src.rpm
 5add3a80120b73f5ed97c9dd02837c58  mes5/SRPMS/icedtea-web-1.3.1-0.3mdvmes5.2.src.rpm
 6d70b7e57cc741f0b587a1effee81fb4  mes5/SRPMS/nspr-4.9.6-0.1mdvmes5.2.src.rpm
 d7f835773038004ff8995ef676f8397e  mes5/SRPMS/xulrunner-17.0.5-0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 352b4b9c3ec49226611acfff2586132d  mes5/x86_64/firefox-17.0.5-0.1mdvmes5.2.x86_64.rpm
 29388b8d4da203e932710f8b98630932  mes5/x86_64/firefox-af-17.0.5-0.1mdvmes5.2.x86_64.rpm
 35c9f59f4ce87eb7c64b89e60220ebb3  mes5/x86_64/firefox-ar-17.0.5-0.1mdvmes5.2.x86_64.rpm
 204c1013d7e6d3925a73ff3c62ce6c14  mes5/x86_64/firefox-be-17.0.5-0.1mdvmes5.2.x86_64.rpm
 43fdfdbedaf5a13fe6396775731a1835  mes5/x86_64/firefox-bg-17.0.5-0.1mdvmes5.2.x86_64.rpm
 d800fa786bef5538692c6b8fffb2f1b3  mes5/x86_64/firefox-bn-17.0.5-0.1mdvmes5.2.x86_64.rpm
 74cb34c33f9d0f070338dd49332bbdd1  mes5/x86_64/firefox-ca-17.0.5-0.1mdvmes5.2.x86_64.rpm
 fca54be2cf51319542bca20cedf9dff6  mes5/x86_64/firefox-cs-17.0.5-0.1mdvmes5.2.x86_64.rpm
 10b6de867fa24ab60c419fd9b314723c  mes5/x86_64/firefox-cy-17.0.5-0.1mdvmes5.2.x86_64.rpm
 eb67b095d7490b5bc24c85bc8652fed9  mes5/x86_64/firefox-da-17.0.5-0.1mdvmes5.2.x86_64.rpm
 7761e055af6b87172b2a05f9dc671d99  mes5/x86_64/firefox-de-17.0.5-0.1mdvmes5.2.x86_64.rpm
 b4ede22d5b768e082d47d2702fb71221  mes5/x86_64/firefox-devel-17.0.5-0.1mdvmes5.2.x86_64.rpm
 a359d0468b6217c59eb88771f2e799b2  mes5/x86_64/firefox-el-17.0.5-0.1mdvmes5.2.x86_64.rpm
 4e58ae7627f5d6d0ba4d7c215c252611  mes5/x86_64/firefox-en_GB-17.0.5-0.1mdvmes5.2.x86_64.rpm
 777062d66c8b57c59dc72c60bcade5aa  mes5/x86_64/firefox-eo-17.0.5-0.1mdvmes5.2.x86_64.rpm
 c2b069c9c0105d85c5946f542204a7c7  mes5/x86_64/firefox-es_AR-17.0.5-0.1mdvmes5.2.x86_64.rpm
 2a39a098a5b39dee19347f18c033f8c5  mes5/x86_64/firefox-es_ES-17.0.5-0.1mdvmes5.2.x86_64.rpm
 412516e1b5a4b4b8b3a7eaf8d2b7806e  mes5/x86_64/firefox-et-17.0.5-0.1mdvmes5.2.x86_64.rpm
 5225e8ac59ee14a9fe5653e8afaa96b4  mes5/x86_64/firefox-eu-17.0.5-0.1mdvmes5.2.x86_64.rpm
 e91755da5dc3a6481ef5fd87b66dc2b3  mes5/x86_64/firefox-fi-17.0.5-0.1mdvmes5.2.x86_64.rpm
 6c3c9ffddeb301345539516a2128870b  mes5/x86_64/firefox-fr-17.0.5-0.1mdvmes5.2.x86_64.rpm
 f90bff71593d02e29a6801fb30196522  mes5/x86_64/firefox-fy-17.0.5-0.1mdvmes5.2.x86_64.rpm
 e36128274f24c1e3a905c6834dbd3431  mes5/x86_64/firefox-ga_IE-17.0.5-0.1mdvmes5.2.x86_64.rpm
 c1d8d7d3060a4a63ecf56e516d704322  mes5/x86_64/firefox-gl-17.0.5-0.1mdvmes5.2.x86_64.rpm
 fce3e57a97a18461e6784f27c9b5f982  mes5/x86_64/firefox-gu_IN-17.0.5-0.1mdvmes5.2.x86_64.rpm
 d567bdbe94970ce762fbbec34566271e  mes5/x86_64/firefox-he-17.0.5-0.1mdvmes5.2.x86_64.rpm
 68a74e20c4ee64127e275d443052a0aa  mes5/x86_64/firefox-hi-17.0.5-0.1mdvmes5.2.x86_64.rpm
 65eeb5076b7e049d2212f88e8e3a5d2b  mes5/x86_64/firefox-hu-17.0.5-0.1mdvmes5.2.x86_64.rpm
 7906c9372d2db0981a0f1fc5d068781f  mes5/x86_64/firefox-id-17.0.5-0.1mdvmes5.2.x86_64.rpm
 39174043fdecada0715aae758b111931  mes5/x86_64/firefox-is-17.0.5-0.1mdvmes5.2.x86_64.rpm
 391b93959169588a74801efb2baeb048  mes5/x86_64/firefox-it-17.0.5-0.1mdvmes5.2.x86_64.rpm
 de1e0b1e3b0e2c1b91b3b9d8250b042d  mes5/x86_64/firefox-ja-17.0.5-0.1mdvmes5.2.x86_64.rpm
 c465364f97f2c2cb891ff5866f7b2048  mes5/x86_64/firefox-kn-17.0.5-0.1mdvmes5.2.x86_64.rpm
 dd25c3ffde3ac083a3bd439855ab9e66  mes5/x86_64/firefox-ko-17.0.5-0.1mdvmes5.2.x86_64.rpm
 0af917c3141a800843563b56e634e4b9  mes5/x86_64/firefox-ku-17.0.5-0.1mdvmes5.2.x86_64.rpm
 d17896516e04d7b2483c449c07018c1a  mes5/x86_64/firefox-lt-17.0.5-0.1mdvmes5.2.x86_64.rpm
 e7925f0f39dd9cc0be8e390ff5b2511a  mes5/x86_64/firefox-lv-17.0.5-0.1mdvmes5.2.x86_64.rpm
 aa7dada147bc0ee6e14de44582148245  mes5/x86_64/firefox-mk-17.0.5-0.1mdvmes5.2.x86_64.rpm
 12eeadd008b58a4c51c396a3296c6876  mes5/x86_64/firefox-mr-17.0.5-0.1mdvmes5.2.x86_64.rpm
 6043540a8e8edd39b06c8dbde4bbac6a  mes5/x86_64/firefox-nb_NO-17.0.5-0.1mdvmes5.2.x86_64.rpm
 0967142165225c2d0cde356bdf91af38  mes5/x86_64/firefox-nl-17.0.5-0.1mdvmes5.2.x86_64.rpm
 fe4d07e0a85ee4cf0a3ed65c4a24e561  mes5/x86_64/firefox-nn_NO-17.0.5-0.1mdvmes5.2.x86_64.rpm
 18c355a3a4ecbed10dd933a2c0cee658  mes5/x86_64/firefox-pa_IN-17.0.5-0.1mdvmes5.2.x86_64.rpm
 fdb47ab94213fde94caca5c0e956ad0a  mes5/x86_64/firefox-pl-17.0.5-0.1mdvmes5.2.x86_64.rpm
 26659783f49eb63504f8240af15c46ef  mes5/x86_64/firefox-pt_BR-17.0.5-0.1mdvmes5.2.x86_64.rpm
 003887926df53eea9cd2c728ce2f2613  mes5/x86_64/firefox-pt_PT-17.0.5-0.1mdvmes5.2.x86_64.rpm
 f26a734cc64f5630d5763501789af036  mes5/x86_64/firefox-ro-17.0.5-0.1mdvmes5.2.x86_64.rpm
 2055c8a4b5ab208de8bb7fc03df6f6ad  mes5/x86_64/firefox-ru-17.0.5-0.1mdvmes5.2.x86_64.rpm
 eb5a279167efdded2ec946f1174885da  mes5/x86_64/firefox-si-17.0.5-0.1mdvmes5.2.x86_64.rpm
 0884722ce24c5dc947a1693b72ab87a8  mes5/x86_64/firefox-sk-17.0.5-0.1mdvmes5.2.x86_64.rpm
 9ec578bd6111680976755026eee9736f  mes5/x86_64/firefox-sl-17.0.5-0.1mdvmes5.2.x86_64.rpm
 d3ed346a9201d1c43ec0addd91404407  mes5/x86_64/firefox-sq-17.0.5-0.1mdvmes5.2.x86_64.rpm
 7a3c688c303f03f13d370e078ef527d8  mes5/x86_64/firefox-sr-17.0.5-0.1mdvmes5.2.x86_64.rpm
 679acfed547f9ed80a7515a4ac955990  mes5/x86_64/firefox-sv_SE-17.0.5-0.1mdvmes5.2.x86_64.rpm
 94bf66782b9ffd747482d41526527b5f  mes5/x86_64/firefox-te-17.0.5-0.1mdvmes5.2.x86_64.rpm
 9b37e1edaa79527f9bb7159e39be108c  mes5/x86_64/firefox-th-17.0.5-0.1mdvmes5.2.x86_64.rpm
 2a6557c6d334dc4020f3cd2ba2235a0d  mes5/x86_64/firefox-tr-17.0.5-0.1mdvmes5.2.x86_64.rpm
 c95479524cf439150d838ecd163e7040  mes5/x86_64/firefox-uk-17.0.5-0.1mdvmes5.2.x86_64.rpm
 aa31ef1321eff4e86d98acfac020fb25  mes5/x86_64/firefox-zh_CN-17.0.5-0.1mdvmes5.2.x86_64.rpm
 d539dfb331ec70a69828f7665686d9b0  mes5/x86_64/firefox-zh_TW-17.0.5-0.1mdvmes5.2.x86_64.rpm
 2028cbbf55353a75366c9cb191efd67c  mes5/x86_64/icedtea-web-1.3.1-0.3mdvmes5.2.x86_64.rpm
 734ae27edc8c1026bca9947d70fd3fb7  mes5/x86_64/icedtea-web-javadoc-1.3.1-0.3mdvmes5.2.x86_64.rpm
 be78699f862f4a1d199248510e20ce1b  mes5/x86_64/lib64nspr4-4.9.6-0.1mdvmes5.2.x86_64.rpm
 f62ab4de8ca959c4ff3990c92ea2427b  mes5/x86_64/lib64nspr-devel-4.9.6-0.1mdvmes5.2.x86_64.rpm
 e94bbf818cfa59f67f7e5e75daf2726d  mes5/x86_64/lib64xulrunner17.0.5-17.0.5-0.1mdvmes5.2.x86_64.rpm
 aecb7c59434a3330e7cb64bb6e7d902c  mes5/x86_64/lib64xulrunner-devel-17.0.5-0.1mdvmes5.2.x86_64.rpm
 531f21b03dbffa6024943663c1ba9e64  mes5/x86_64/xulrunner-17.0.5-0.1mdvmes5.2.x86_64.rpm 
 2a3a774ee0094a48cf108ed120ba227a  mes5/SRPMS/firefox-17.0.5-0.1mdvmes5.2.src.rpm
 58a810253d11b6af76cf1bcce6a3e7b4  mes5/SRPMS/firefox-l10n-17.0.5-0.1mdvmes5.2.src.rpm
 5add3a80120b73f5ed97c9dd02837c58  mes5/SRPMS/icedtea-web-1.3.1-0.3mdvmes5.2.src.rpm
 6d70b7e57cc741f0b587a1effee81fb4  mes5/SRPMS/nspr-4.9.6-0.1mdvmes5.2.src.rpm
 d7f835773038004ff8995ef676f8397e  mes5/SRPMS/xulrunner-17.0.5-0.1mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
'Snowden effect' has changed cloud data security assumption, survey claims
Galaxy S5 fingerprint scanner hacked with glue mould
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.