User: Password:
|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2006:0608-01 (seamonkey)

From:  bugzilla@redhat.com
To:  enterprise-watch-list@redhat.com
Subject:  [RHSA-2006:0608-01] Critical: seamonkey security update
Date:  Thu, 27 Jul 2006 16:12:55 -0400

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: seamonkey security update Advisory ID: RHSA-2006:0608-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0608.html Issue date: 2006-07-27 Updated on: 2006-07-27 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-3801 CVE-2006-3677 CVE-2006-3113 CVE-2006-3802 CVE-2006-3803 CVE-2006-3804 CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 CVE-2006-3808 CVE-2006-3809 CVE-2006-3810 CVE-2006-3811 CVE-2006-3812 - --------------------------------------------------------------------- 1. Summary: Updated seamonkey packages that fix several security bugs are now available for Red Hat Enterprise Linux 3. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Problem description: SeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. Several flaws were found in the way SeaMonkey processed certain javascript actions. A malicious web page could execute arbitrary javascript instructions with the permissions of "chrome", allowing the page to steal sensitive information or install browser malware. (CVE-2006-3807, CVE-2006-3809, CVE-2006-3812) Several denial of service flaws were found in the way SeaMonkey processed certain web content. A malicious web page could crash the browser or possibly execute arbitrary code as the user running SeaMonkey. (CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811) A buffer overflow flaw was found in the way SeaMonkey Messenger displayed malformed inline vcard attachments. If a victim viewed an email message containing a carefully crafted vcard, it was possible to execute arbitrary code as the user running SeaMonkey Messenger. (CVE-2006-3804) Several flaws were found in the way SeaMonkey processed certain javascript actions. A malicious web page could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810) A flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary javascript instructions with the permissions of "chrome", allowing the page to steal sensitive information or install browser malware. (CVE-2006-3808) Users of SeaMonkey are advised to upgrade to this update, which contains SeaMonkey version 1.0.3 that corrects these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 200253 - CVE-2006-3801 Multiple Seamonkey issues (CVE-2006-3677, CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3804, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812) 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/seamo... 5700fda497d3d6e09cb99bd0160cae1c seamonkey-1.0.3-0.el3.1.src.rpm i386: edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm 10bccb0c6f61cc913a5cee11e4525282 seamonkey-chat-1.0.3-0.el3.1.i386.rpm 6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm 4e0d353982d9c7c7779b394047a1cfd9 seamonkey-devel-1.0.3-0.el3.1.i386.rpm 9b47bc7c27efe287cfa0c07792ccc01e seamonkey-dom-inspector-1.0.3-0.el3.1.i386.rpm 0ca5d34ca0b6db2c734ad126b6cb7b87 seamonkey-js-debugger-1.0.3-0.el3.1.i386.rpm 80e793f420547aa0ffc9f55a5d6c790a seamonkey-mail-1.0.3-0.el3.1.i386.rpm dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm 7b016fbdf8977d24272a6a9bf5c549eb seamonkey-nspr-devel-1.0.3-0.el3.1.i386.rpm b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm 0b0f7b284d7a43c701b8357a0636147a seamonkey-nss-devel-1.0.3-0.el3.1.i386.rpm ia64: b54f3e53c45f910fa925c78a3f85a830 seamonkey-1.0.3-0.el3.1.ia64.rpm a54b5aa4c3aca436c9dea299d6f6a084 seamonkey-chat-1.0.3-0.el3.1.ia64.rpm 6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm 6f6f74fe222bdc7f46d8ac7dcd7fa39c seamonkey-debuginfo-1.0.3-0.el3.1.ia64.rpm 165d173c204d1194d809a01550477bb2 seamonkey-devel-1.0.3-0.el3.1.ia64.rpm 04c06e71a1e01ec3fb1b6d4921cf8e72 seamonkey-dom-inspector-1.0.3-0.el3.1.ia64.rpm e7533e4ee79017f973b5efd8c263fbb8 seamonkey-js-debugger-1.0.3-0.el3.1.ia64.rpm 6934faf2b40b265306fafa09eb7e2bdb seamonkey-mail-1.0.3-0.el3.1.ia64.rpm dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm 97ffb9cdeaa8c375248d7338e081705a seamonkey-nspr-1.0.3-0.el3.1.ia64.rpm 15746c43e276091cca7b22e149968eec seamonkey-nspr-devel-1.0.3-0.el3.1.ia64.rpm b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm 3fa583ba5193eb5022a1492207af373e seamonkey-nss-1.0.3-0.el3.1.ia64.rpm 430532e2827047ec6e95bd5fad698c98 seamonkey-nss-devel-1.0.3-0.el3.1.ia64.rpm ppc: 3557460aa7a520cf3ae737e97a23cabf seamonkey-1.0.3-0.el3.1.ppc.rpm 5da4d6c953c2375ea944da5bbc6d65d7 seamonkey-chat-1.0.3-0.el3.1.ppc.rpm 66bcc3654a08f94f34fb68f4af2fd8b3 seamonkey-debuginfo-1.0.3-0.el3.1.ppc.rpm 4a13b4766810a93c338c6e61eb7c2878 seamonkey-devel-1.0.3-0.el3.1.ppc.rpm 43af0613aef928839f9953be9275976e seamonkey-dom-inspector-1.0.3-0.el3.1.ppc.rpm 47c3640748bb8028f99fdc8df7143726 seamonkey-js-debugger-1.0.3-0.el3.1.ppc.rpm 8b0ac20bf0eb1665c48503c1e0be2190 seamonkey-mail-1.0.3-0.el3.1.ppc.rpm 81048df18d14782470b2191138ca1d1d seamonkey-nspr-1.0.3-0.el3.1.ppc.rpm b086f5ca564b9dc92f7cb42d05cfe152 seamonkey-nspr-devel-1.0.3-0.el3.1.ppc.rpm 9bfb86324ed33e65b75a222e4f4d594c seamonkey-nss-1.0.3-0.el3.1.ppc.rpm 8ead6a1dbcf7127d1be215be9386315f seamonkey-nss-devel-1.0.3-0.el3.1.ppc.rpm s390: 484c596e85d071c16b60a4ff7b588cb2 seamonkey-1.0.3-0.el3.1.s390.rpm 1d19478fe278e8810d37d0e53b843bdd seamonkey-chat-1.0.3-0.el3.1.s390.rpm 1209d9652acacb8f5443477c8762f1f0 seamonkey-debuginfo-1.0.3-0.el3.1.s390.rpm 1cdd722aaf5be9fde448c5f6572af567 seamonkey-devel-1.0.3-0.el3.1.s390.rpm 1271e3bd7a31e1a61ed06ea92700316b seamonkey-dom-inspector-1.0.3-0.el3.1.s390.rpm c48f29a1788d2724a0242b9905f4257f seamonkey-js-debugger-1.0.3-0.el3.1.s390.rpm 2cdab0ae5eac44b1ce498dd30b7bbc37 seamonkey-mail-1.0.3-0.el3.1.s390.rpm b846008adfbdad2b17be5016674c7bae seamonkey-nspr-1.0.3-0.el3.1.s390.rpm bd9ddc4a63442bca42902f1ba24f36af seamonkey-nspr-devel-1.0.3-0.el3.1.s390.rpm bcb5e6d4273210272de5885cd4493df5 seamonkey-nss-1.0.3-0.el3.1.s390.rpm 4931ae4f6b847dc3e9ad4e6a7cbff616 seamonkey-nss-devel-1.0.3-0.el3.1.s390.rpm s390x: d575784f960eae10569f23e9b960539f seamonkey-1.0.3-0.el3.1.s390x.rpm 13515109a27470d1473382feed63ac85 seamonkey-chat-1.0.3-0.el3.1.s390x.rpm 1209d9652acacb8f5443477c8762f1f0 seamonkey-debuginfo-1.0.3-0.el3.1.s390.rpm 2b922024c20037dc4e4e70c9e93da048 seamonkey-debuginfo-1.0.3-0.el3.1.s390x.rpm dca79815a7bf6b1abc31c3d1da3f8b7d seamonkey-devel-1.0.3-0.el3.1.s390x.rpm 69658420caf319c4a87f9d08cb1f8b63 seamonkey-dom-inspector-1.0.3-0.el3.1.s390x.rpm b3084333c4285c43b1e7f98d121459d4 seamonkey-js-debugger-1.0.3-0.el3.1.s390x.rpm b1c98f83174a4294e6442fd85cc54c1e seamonkey-mail-1.0.3-0.el3.1.s390x.rpm b846008adfbdad2b17be5016674c7bae seamonkey-nspr-1.0.3-0.el3.1.s390.rpm 94825bce286f505d30157ed388ec0851 seamonkey-nspr-1.0.3-0.el3.1.s390x.rpm bd5db4932cf91db2e1ab44543bf88b24 seamonkey-nspr-devel-1.0.3-0.el3.1.s390x.rpm bcb5e6d4273210272de5885cd4493df5 seamonkey-nss-1.0.3-0.el3.1.s390.rpm bd25f904c8651f3339c6fb4110209673 seamonkey-nss-1.0.3-0.el3.1.s390x.rpm 0317b5cc38abe9e5d753407e6053724f seamonkey-nss-devel-1.0.3-0.el3.1.s390x.rpm x86_64: edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm d4c9f6d7193e758c20eaed2351bb2d91 seamonkey-1.0.3-0.el3.1.x86_64.rpm f54fe75baa2c2fa5907cd0a8737efd11 seamonkey-chat-1.0.3-0.el3.1.x86_64.rpm 6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm 107d17cf6eacfc8d82903a7b52722c66 seamonkey-debuginfo-1.0.3-0.el3.1.x86_64.rpm 7762f692b3d621e8c47c392bd2c8031c seamonkey-devel-1.0.3-0.el3.1.x86_64.rpm e510b5446448432ba00053432c8a8d37 seamonkey-dom-inspector-1.0.3-0.el3.1.x86_64.rpm 299196ad7affc2b288423aaa1e92829e seamonkey-js-debugger-1.0.3-0.el3.1.x86_64.rpm 959424ae886ecf449f8cd657de5cf46a seamonkey-mail-1.0.3-0.el3.1.x86_64.rpm dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm 267086e1803aa3a62035f747cbbdb659 seamonkey-nspr-1.0.3-0.el3.1.x86_64.rpm 7c636ad447bbd128e651262084d62bee seamonkey-nspr-devel-1.0.3-0.el3.1.x86_64.rpm b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm 03897b6821a7edfc3d9116a0b64a2845 seamonkey-nss-1.0.3-0.el3.1.x86_64.rpm 1c0a8543ac1dd50e69bf5ac03c5f1d1f seamonkey-nss-devel-1.0.3-0.el3.1.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/... 5700fda497d3d6e09cb99bd0160cae1c seamonkey-1.0.3-0.el3.1.src.rpm i386: edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm 10bccb0c6f61cc913a5cee11e4525282 seamonkey-chat-1.0.3-0.el3.1.i386.rpm 6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm 4e0d353982d9c7c7779b394047a1cfd9 seamonkey-devel-1.0.3-0.el3.1.i386.rpm 9b47bc7c27efe287cfa0c07792ccc01e seamonkey-dom-inspector-1.0.3-0.el3.1.i386.rpm 0ca5d34ca0b6db2c734ad126b6cb7b87 seamonkey-js-debugger-1.0.3-0.el3.1.i386.rpm 80e793f420547aa0ffc9f55a5d6c790a seamonkey-mail-1.0.3-0.el3.1.i386.rpm dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm 7b016fbdf8977d24272a6a9bf5c549eb seamonkey-nspr-devel-1.0.3-0.el3.1.i386.rpm b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm 0b0f7b284d7a43c701b8357a0636147a seamonkey-nss-devel-1.0.3-0.el3.1.i386.rpm x86_64: edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm d4c9f6d7193e758c20eaed2351bb2d91 seamonkey-1.0.3-0.el3.1.x86_64.rpm f54fe75baa2c2fa5907cd0a8737efd11 seamonkey-chat-1.0.3-0.el3.1.x86_64.rpm 6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm 107d17cf6eacfc8d82903a7b52722c66 seamonkey-debuginfo-1.0.3-0.el3.1.x86_64.rpm 7762f692b3d621e8c47c392bd2c8031c seamonkey-devel-1.0.3-0.el3.1.x86_64.rpm e510b5446448432ba00053432c8a8d37 seamonkey-dom-inspector-1.0.3-0.el3.1.x86_64.rpm 299196ad7affc2b288423aaa1e92829e seamonkey-js-debugger-1.0.3-0.el3.1.x86_64.rpm 959424ae886ecf449f8cd657de5cf46a seamonkey-mail-1.0.3-0.el3.1.x86_64.rpm dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm 267086e1803aa3a62035f747cbbdb659 seamonkey-nspr-1.0.3-0.el3.1.x86_64.rpm 7c636ad447bbd128e651262084d62bee seamonkey-nspr-devel-1.0.3-0.el3.1.x86_64.rpm b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm 03897b6821a7edfc3d9116a0b64a2845 seamonkey-nss-1.0.3-0.el3.1.x86_64.rpm 1c0a8543ac1dd50e69bf5ac03c5f1d1f seamonkey-nss-devel-1.0.3-0.el3.1.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/seamo... 5700fda497d3d6e09cb99bd0160cae1c seamonkey-1.0.3-0.el3.1.src.rpm i386: edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm 10bccb0c6f61cc913a5cee11e4525282 seamonkey-chat-1.0.3-0.el3.1.i386.rpm 6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm 4e0d353982d9c7c7779b394047a1cfd9 seamonkey-devel-1.0.3-0.el3.1.i386.rpm 9b47bc7c27efe287cfa0c07792ccc01e seamonkey-dom-inspector-1.0.3-0.el3.1.i386.rpm 0ca5d34ca0b6db2c734ad126b6cb7b87 seamonkey-js-debugger-1.0.3-0.el3.1.i386.rpm 80e793f420547aa0ffc9f55a5d6c790a seamonkey-mail-1.0.3-0.el3.1.i386.rpm dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm 7b016fbdf8977d24272a6a9bf5c549eb seamonkey-nspr-devel-1.0.3-0.el3.1.i386.rpm b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm 0b0f7b284d7a43c701b8357a0636147a seamonkey-nss-devel-1.0.3-0.el3.1.i386.rpm ia64: b54f3e53c45f910fa925c78a3f85a830 seamonkey-1.0.3-0.el3.1.ia64.rpm a54b5aa4c3aca436c9dea299d6f6a084 seamonkey-chat-1.0.3-0.el3.1.ia64.rpm 6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm 6f6f74fe222bdc7f46d8ac7dcd7fa39c seamonkey-debuginfo-1.0.3-0.el3.1.ia64.rpm 165d173c204d1194d809a01550477bb2 seamonkey-devel-1.0.3-0.el3.1.ia64.rpm 04c06e71a1e01ec3fb1b6d4921cf8e72 seamonkey-dom-inspector-1.0.3-0.el3.1.ia64.rpm e7533e4ee79017f973b5efd8c263fbb8 seamonkey-js-debugger-1.0.3-0.el3.1.ia64.rpm 6934faf2b40b265306fafa09eb7e2bdb seamonkey-mail-1.0.3-0.el3.1.ia64.rpm dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm 97ffb9cdeaa8c375248d7338e081705a seamonkey-nspr-1.0.3-0.el3.1.ia64.rpm 15746c43e276091cca7b22e149968eec seamonkey-nspr-devel-1.0.3-0.el3.1.ia64.rpm b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm 3fa583ba5193eb5022a1492207af373e seamonkey-nss-1.0.3-0.el3.1.ia64.rpm 430532e2827047ec6e95bd5fad698c98 seamonkey-nss-devel-1.0.3-0.el3.1.ia64.rpm x86_64: edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm d4c9f6d7193e758c20eaed2351bb2d91 seamonkey-1.0.3-0.el3.1.x86_64.rpm f54fe75baa2c2fa5907cd0a8737efd11 seamonkey-chat-1.0.3-0.el3.1.x86_64.rpm 6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm 107d17cf6eacfc8d82903a7b52722c66 seamonkey-debuginfo-1.0.3-0.el3.1.x86_64.rpm 7762f692b3d621e8c47c392bd2c8031c seamonkey-devel-1.0.3-0.el3.1.x86_64.rpm e510b5446448432ba00053432c8a8d37 seamonkey-dom-inspector-1.0.3-0.el3.1.x86_64.rpm 299196ad7affc2b288423aaa1e92829e seamonkey-js-debugger-1.0.3-0.el3.1.x86_64.rpm 959424ae886ecf449f8cd657de5cf46a seamonkey-mail-1.0.3-0.el3.1.x86_64.rpm dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm 267086e1803aa3a62035f747cbbdb659 seamonkey-nspr-1.0.3-0.el3.1.x86_64.rpm 7c636ad447bbd128e651262084d62bee seamonkey-nspr-devel-1.0.3-0.el3.1.x86_64.rpm b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm 03897b6821a7edfc3d9116a0b64a2845 seamonkey-nss-1.0.3-0.el3.1.x86_64.rpm 1c0a8543ac1dd50e69bf5ac03c5f1d1f seamonkey-nss-devel-1.0.3-0.el3.1.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/seamo... 5700fda497d3d6e09cb99bd0160cae1c seamonkey-1.0.3-0.el3.1.src.rpm i386: edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm 10bccb0c6f61cc913a5cee11e4525282 seamonkey-chat-1.0.3-0.el3.1.i386.rpm 6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm 4e0d353982d9c7c7779b394047a1cfd9 seamonkey-devel-1.0.3-0.el3.1.i386.rpm 9b47bc7c27efe287cfa0c07792ccc01e seamonkey-dom-inspector-1.0.3-0.el3.1.i386.rpm 0ca5d34ca0b6db2c734ad126b6cb7b87 seamonkey-js-debugger-1.0.3-0.el3.1.i386.rpm 80e793f420547aa0ffc9f55a5d6c790a seamonkey-mail-1.0.3-0.el3.1.i386.rpm dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm 7b016fbdf8977d24272a6a9bf5c549eb seamonkey-nspr-devel-1.0.3-0.el3.1.i386.rpm b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm 0b0f7b284d7a43c701b8357a0636147a seamonkey-nss-devel-1.0.3-0.el3.1.i386.rpm ia64: b54f3e53c45f910fa925c78a3f85a830 seamonkey-1.0.3-0.el3.1.ia64.rpm a54b5aa4c3aca436c9dea299d6f6a084 seamonkey-chat-1.0.3-0.el3.1.ia64.rpm 6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm 6f6f74fe222bdc7f46d8ac7dcd7fa39c seamonkey-debuginfo-1.0.3-0.el3.1.ia64.rpm 165d173c204d1194d809a01550477bb2 seamonkey-devel-1.0.3-0.el3.1.ia64.rpm 04c06e71a1e01ec3fb1b6d4921cf8e72 seamonkey-dom-inspector-1.0.3-0.el3.1.ia64.rpm e7533e4ee79017f973b5efd8c263fbb8 seamonkey-js-debugger-1.0.3-0.el3.1.ia64.rpm 6934faf2b40b265306fafa09eb7e2bdb seamonkey-mail-1.0.3-0.el3.1.ia64.rpm dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm 97ffb9cdeaa8c375248d7338e081705a seamonkey-nspr-1.0.3-0.el3.1.ia64.rpm 15746c43e276091cca7b22e149968eec seamonkey-nspr-devel-1.0.3-0.el3.1.ia64.rpm b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm 3fa583ba5193eb5022a1492207af373e seamonkey-nss-1.0.3-0.el3.1.ia64.rpm 430532e2827047ec6e95bd5fad698c98 seamonkey-nss-devel-1.0.3-0.el3.1.ia64.rpm x86_64: edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm d4c9f6d7193e758c20eaed2351bb2d91 seamonkey-1.0.3-0.el3.1.x86_64.rpm f54fe75baa2c2fa5907cd0a8737efd11 seamonkey-chat-1.0.3-0.el3.1.x86_64.rpm 6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm 107d17cf6eacfc8d82903a7b52722c66 seamonkey-debuginfo-1.0.3-0.el3.1.x86_64.rpm 7762f692b3d621e8c47c392bd2c8031c seamonkey-devel-1.0.3-0.el3.1.x86_64.rpm e510b5446448432ba00053432c8a8d37 seamonkey-dom-inspector-1.0.3-0.el3.1.x86_64.rpm 299196ad7affc2b288423aaa1e92829e seamonkey-js-debugger-1.0.3-0.el3.1.x86_64.rpm 959424ae886ecf449f8cd657de5cf46a seamonkey-mail-1.0.3-0.el3.1.x86_64.rpm dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm 267086e1803aa3a62035f747cbbdb659 seamonkey-nspr-1.0.3-0.el3.1.x86_64.rpm 7c636ad447bbd128e651262084d62bee seamonkey-nspr-devel-1.0.3-0.el3.1.x86_64.rpm b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm 03897b6821a7edfc3d9116a0b64a2845 seamonkey-nss-1.0.3-0.el3.1.x86_64.rpm 1c0a8543ac1dd50e69bf5ac03c5f1d1f seamonkey-nss-devel-1.0.3-0.el3.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812 http://www.redhat.com/security/updates/classification/#cr... 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFEyR4zXlSAg2UNWIIRAhmfAJ9MSTmR6VPFIK6Bb9P28JHgXPHX/gCgnhfr YPdI9mgL+kQsIAfaHIsGNno= =Z5+F -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds