|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2004:421-01 (mozilla)

From:  bugzilla@redhat.com
To:  enterprise-watch-list@redhat.com
Subject:  [RHSA-2004:421-01] Updated mozilla packages fix security issues
Date:  Wed, 4 Aug 2004 17:52 -0400

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated mozilla packages fix security issues Advisory ID: RHSA-2004:421-01 Issue date: 2004-08-04 Updated on: 2004-08-04 Product: Red Hat Enterprise Linux CVE Names: CAN-2004-0597 CAN-2004-0599 CAN-2004-0718 CAN-2004-0722 CAN-2004-0757 CAN-2004-0758 CAN-2004-0759 CAN-2004-0760 CAN-2004-0761 CAN-2004-0762 CAN-2004-0763 CAN-2004-0764 CAN-2004-0765 - --------------------------------------------------------------------- 1. Summary: Updated mozilla packages based on version 1.4.3 that fix a number of security issues for Red Hat Enterprise Linux are now available. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Problem description: Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. A number of flaws have been found in Mozilla 1.4 that have been fixed in the Mozilla 1.4.3 release: Zen Parse reported improper input validation to the SOAPParameter object constructor leading to an integer overflow and controllable heap corruption. Malicious JavaScript could be written to utilize this flaw and could allow arbitrary code execution. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0722 to this issue. During a source code audit, Chris Evans discovered a buffer overflow and integer overflows which affect the libpng code inside Mozilla. An attacker could create a carefully crafted PNG file in such a way that it would cause Mozilla to crash or execute arbitrary code when the image was viewed. (CAN-2004-0597, CAN-2004-0599) Zen Parse reported a flaw in the POP3 capability. A malicious POP3 server could send a carefully crafted response that would cause a heap overflow and potentially allow execution of arbitrary code as the user running Mozilla. (CAN-2004-0757) Marcel Boesch found a flaw that allows a CA certificate to be imported with a DN the same as that of the built-in CA root certificates, which can cause a denial of service to SSL pages, as the malicious certificate is treated as invalid. (CAN-2004-0758) Met - Martin Hassman reported a flaw in Mozilla that could allow malicious Javascript code to upload local files from a users machine without requiring confirmation. (CAN-2004-0759) Mindlock Security reported a flaw in ftp URI handling. By using a NULL character (%00) in a ftp URI, Mozilla can be confused into opening a resource as a different MIME type. (CAN-2004-0760) Mozilla does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates website spoofing and other attacks, also known as the frame injection vulnerability. (CAN-2004-0718) Tolga Tarhan reported a flaw that can allow a malicious webpage to use a redirect sequence to spoof the security lock icon that makes a webpage appear to be encrypted. (CAN-2004-0761) Jesse Ruderman reported a security issue that affects a number of browsers including Mozilla that could allow malicious websites to install arbitrary extensions by using interactive events to manipulate the XPInstall Security dialog box. (CAN-2004-0762) Emmanouel Kellinis discovered a caching flaw in Mozilla which allows malicious websites to spoof certificates of trusted websites via redirects and Javascript that uses the "onunload" method. (CAN-2004-0763) Mozilla allowed malicious websites to hijack the user interface via the "chrome" flag and XML User Interface Language (XUL) files. (CAN-2004-0764) The cert_TestHostName function in Mozilla only checks the hostname portion of a certificate when the hostname portion of the URI is not a fully qualified domain name (FQDN). This flaw could be used for spoofing if an attacker had control of machines on a default DNS search path. (CAN-2004-0765) All users are advised to update to these erratum packages which contain a snapshot of Mozilla 1.4.3 including backported fixes and are not vulnerable to these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info): 127338 - CAN-2004-0718 frame injection (spoofing) vuln in Mozilla before 1.7 127186 - CAN-2004-0758 Overriding built-in certificate leading to error -8182 (DoS), especially exploitable by email 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/g[...] 7e094aa0324b56f4fba3ede27ae1b19b galeon-1.2.13-3.2.1.src.rpm ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/m[...] 66fcc1e820208b3024de369469250df5 mozilla-1.4.3-2.1.2.src.rpm i386: d170284b6a6d01f85ee974bb6c984390 galeon-1.2.13-3.2.1.i386.rpm 57a81a30a9d79e77adec334f96e7cea9 mozilla-1.4.3-2.1.2.i386.rpm fa6d63828129887e1cc3c42df47e4190 mozilla-chat-1.4.3-2.1.2.i386.rpm b13cb1114fa16a75fd81c6cb504db17e mozilla-devel-1.4.3-2.1.2.i386.rpm 9d4714cbd6c2077efa557430b8b89b63 mozilla-dom-inspector-1.4.3-2.1.2.i386.rpm 01686edf59fa5945b8f9ae69fa4ac5c0 mozilla-js-debugger-1.4.3-2.1.2.i386.rpm 623213465b181f6fb14698e73f9a6a89 mozilla-mail-1.4.3-2.1.2.i386.rpm 68cb569585436ce430c4aee335c01d4e mozilla-nspr-1.4.3-2.1.2.i386.rpm 3c4e08b8106d4718c30fcf06e7633abc mozilla-nspr-devel-1.4.3-2.1.2.i386.rpm 494563d83a7b6a77642c73986d50092c mozilla-nss-1.4.3-2.1.2.i386.rpm fb6f0a11c5312f7822055f45c35435f2 mozilla-nss-devel-1.4.3-2.1.2.i386.rpm ia64: e13f36d06fa5714337e074fca3a7a211 galeon-1.2.13-3.2.1.ia64.rpm 7841dd11df85a69d6e03a3c4730e987c mozilla-1.4.3-2.1.2.ia64.rpm b022a33b0ad1715f363b8e2be245e704 mozilla-chat-1.4.3-2.1.2.ia64.rpm 73599c671b8d07d86a82ae4006aeb184 mozilla-devel-1.4.3-2.1.2.ia64.rpm bb57be095e37a959e8a9216820dd2fd9 mozilla-dom-inspector-1.4.3-2.1.2.ia64.rpm 0879b99da78ee8393577ca3b17c3c95c mozilla-js-debugger-1.4.3-2.1.2.ia64.rpm c018093969ef4ae1e26f203a67e74d87 mozilla-mail-1.4.3-2.1.2.ia64.rpm e1fe8f1eeff222e7d1cd35d305a20e4d mozilla-nspr-1.4.3-2.1.2.ia64.rpm 93e2cac5380515450b5201ef082fe427 mozilla-nspr-devel-1.4.3-2.1.2.ia64.rpm afe930bc2c9d6174754b79d9119bc77d mozilla-nss-1.4.3-2.1.2.ia64.rpm 1413ffceb82030a07863e79917c8d3ea mozilla-nss-devel-1.4.3-2.1.2.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/g[...] 7e094aa0324b56f4fba3ede27ae1b19b galeon-1.2.13-3.2.1.src.rpm ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/m[...] 66fcc1e820208b3024de369469250df5 mozilla-1.4.3-2.1.2.src.rpm ia64: e13f36d06fa5714337e074fca3a7a211 galeon-1.2.13-3.2.1.ia64.rpm 7841dd11df85a69d6e03a3c4730e987c mozilla-1.4.3-2.1.2.ia64.rpm b022a33b0ad1715f363b8e2be245e704 mozilla-chat-1.4.3-2.1.2.ia64.rpm 73599c671b8d07d86a82ae4006aeb184 mozilla-devel-1.4.3-2.1.2.ia64.rpm bb57be095e37a959e8a9216820dd2fd9 mozilla-dom-inspector-1.4.3-2.1.2.ia64.rpm 0879b99da78ee8393577ca3b17c3c95c mozilla-js-debugger-1.4.3-2.1.2.ia64.rpm c018093969ef4ae1e26f203a67e74d87 mozilla-mail-1.4.3-2.1.2.ia64.rpm e1fe8f1eeff222e7d1cd35d305a20e4d mozilla-nspr-1.4.3-2.1.2.ia64.rpm 93e2cac5380515450b5201ef082fe427 mozilla-nspr-devel-1.4.3-2.1.2.ia64.rpm afe930bc2c9d6174754b79d9119bc77d mozilla-nss-1.4.3-2.1.2.ia64.rpm 1413ffceb82030a07863e79917c8d3ea mozilla-nss-devel-1.4.3-2.1.2.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/g[...] 7e094aa0324b56f4fba3ede27ae1b19b galeon-1.2.13-3.2.1.src.rpm ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/m[...] 66fcc1e820208b3024de369469250df5 mozilla-1.4.3-2.1.2.src.rpm i386: d170284b6a6d01f85ee974bb6c984390 galeon-1.2.13-3.2.1.i386.rpm 57a81a30a9d79e77adec334f96e7cea9 mozilla-1.4.3-2.1.2.i386.rpm fa6d63828129887e1cc3c42df47e4190 mozilla-chat-1.4.3-2.1.2.i386.rpm b13cb1114fa16a75fd81c6cb504db17e mozilla-devel-1.4.3-2.1.2.i386.rpm 9d4714cbd6c2077efa557430b8b89b63 mozilla-dom-inspector-1.4.3-2.1.2.i386.rpm 01686edf59fa5945b8f9ae69fa4ac5c0 mozilla-js-debugger-1.4.3-2.1.2.i386.rpm 623213465b181f6fb14698e73f9a6a89 mozilla-mail-1.4.3-2.1.2.i386.rpm 68cb569585436ce430c4aee335c01d4e mozilla-nspr-1.4.3-2.1.2.i386.rpm 3c4e08b8106d4718c30fcf06e7633abc mozilla-nspr-devel-1.4.3-2.1.2.i386.rpm 494563d83a7b6a77642c73986d50092c mozilla-nss-1.4.3-2.1.2.i386.rpm fb6f0a11c5312f7822055f45c35435f2 mozilla-nss-devel-1.4.3-2.1.2.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/g[...] 7e094aa0324b56f4fba3ede27ae1b19b galeon-1.2.13-3.2.1.src.rpm ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/m[...] 66fcc1e820208b3024de369469250df5 mozilla-1.4.3-2.1.2.src.rpm i386: d170284b6a6d01f85ee974bb6c984390 galeon-1.2.13-3.2.1.i386.rpm 57a81a30a9d79e77adec334f96e7cea9 mozilla-1.4.3-2.1.2.i386.rpm fa6d63828129887e1cc3c42df47e4190 mozilla-chat-1.4.3-2.1.2.i386.rpm b13cb1114fa16a75fd81c6cb504db17e mozilla-devel-1.4.3-2.1.2.i386.rpm 9d4714cbd6c2077efa557430b8b89b63 mozilla-dom-inspector-1.4.3-2.1.2.i386.rpm 01686edf59fa5945b8f9ae69fa4ac5c0 mozilla-js-debugger-1.4.3-2.1.2.i386.rpm 623213465b181f6fb14698e73f9a6a89 mozilla-mail-1.4.3-2.1.2.i386.rpm 68cb569585436ce430c4aee335c01d4e mozilla-nspr-1.4.3-2.1.2.i386.rpm 3c4e08b8106d4718c30fcf06e7633abc mozilla-nspr-devel-1.4.3-2.1.2.i386.rpm 494563d83a7b6a77642c73986d50092c mozilla-nss-1.4.3-2.1.2.i386.rpm fb6f0a11c5312f7822055f45c35435f2 mozilla-nss-devel-1.4.3-2.1.2.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/moz[...] a8fef126836c7ea73c80ac7e2792e142 mozilla-1.4.3-3.0.2.src.rpm i386: 76e94d5ea03f131a723c97207297ee1b mozilla-1.4.3-3.0.2.i386.rpm 75c2959a065a6b6ae8c90b56165e43a6 mozilla-chat-1.4.3-3.0.2.i386.rpm 6c90c0a77bdbee2cb0d84be83fead1b1 mozilla-devel-1.4.3-3.0.2.i386.rpm 58b9cfad95dfc69d1e0d80a23f383ad4 mozilla-dom-inspector-1.4.3-3.0.2.i386.rpm 431ed1323ae5217a0b31dc1f1bcca1bd mozilla-js-debugger-1.4.3-3.0.2.i386.rpm 3a95aa702f1cc2205c10b957c3fd452e mozilla-mail-1.4.3-3.0.2.i386.rpm 2877a54a8c7a2de5fe58b39ee626d214 mozilla-nspr-1.4.3-3.0.2.i386.rpm 46ccae94f0269a2b92d2b4a5d5dcd480 mozilla-nspr-devel-1.4.3-3.0.2.i386.rpm 545d3867e6077c15f64aa5ee192c8d43 mozilla-nss-1.4.3-3.0.2.i386.rpm f3fccea16c2bed1be5038399d0c42bad mozilla-nss-devel-1.4.3-3.0.2.i386.rpm ia64: 7493acb019f4cc706b6cf952444a975a mozilla-1.4.3-3.0.2.ia64.rpm 542bb7e67ff4eba5ed228e5db5a78f25 mozilla-chat-1.4.3-3.0.2.ia64.rpm d5cbf0f7c03d71ed0c51a27430fe7f60 mozilla-devel-1.4.3-3.0.2.ia64.rpm 049bbde10a886f65d539579a311a24af mozilla-dom-inspector-1.4.3-3.0.2.ia64.rpm 1c96bbc0bbbf649e3a851b0295694847 mozilla-js-debugger-1.4.3-3.0.2.ia64.rpm cea7a67877727f4436ac554408db7832 mozilla-mail-1.4.3-3.0.2.ia64.rpm 28047d1dd3264f882f9c4f8a7b628910 mozilla-nspr-1.4.3-3.0.2.ia64.rpm a903c680602a74dd0feaeb12b6cc32ec mozilla-nspr-devel-1.4.3-3.0.2.ia64.rpm d3ff697bca53a52fe164614d77432046 mozilla-nss-1.4.3-3.0.2.ia64.rpm 7cd4e05706eb4b4b57f5eca3f1bc470f mozilla-nss-devel-1.4.3-3.0.2.ia64.rpm ppc: e2d78f6aac22bfbcb825867dbac82ebb mozilla-1.4.3-3.0.2.ppc.rpm b61167a98f8673f8f3f03ae28a50bc92 mozilla-chat-1.4.3-3.0.2.ppc.rpm d0fb8b199c689e7c8b214f3e0ec962c3 mozilla-devel-1.4.3-3.0.2.ppc.rpm 53a571868dad0c9d3672013fb406570a mozilla-dom-inspector-1.4.3-3.0.2.ppc.rpm 734e3f74f8592e2fd94e2dd257e01095 mozilla-js-debugger-1.4.3-3.0.2.ppc.rpm 82ac07ab7ef497194c65f7251cb62e33 mozilla-mail-1.4.3-3.0.2.ppc.rpm 398540c49c50030cbad5b4b9e96c783b mozilla-nspr-1.4.3-3.0.2.ppc.rpm d022b91ac348e6077625be5dc83b35dc mozilla-nspr-devel-1.4.3-3.0.2.ppc.rpm 271be6a6ba49964733a28e0dc9f07378 mozilla-nss-1.4.3-3.0.2.ppc.rpm ce1b77ddb74d136ec38330cc11b7f54d mozilla-nss-devel-1.4.3-3.0.2.ppc.rpm s390: 19ad37a2396c2776175d0e59662a7652 mozilla-1.4.3-3.0.2.s390.rpm 4baac171cf9ba457f1c3faf8f03b88cf mozilla-chat-1.4.3-3.0.2.s390.rpm 2ec9bd8e61073a3f6056e9cecc419ba3 mozilla-devel-1.4.3-3.0.2.s390.rpm 32a1d2e1c29ea3b094f35164710cfc0e mozilla-dom-inspector-1.4.3-3.0.2.s390.rpm 8e977a243825a35ee77e22ed651bd499 mozilla-js-debugger-1.4.3-3.0.2.s390.rpm e4afa3661f104caa24079761af089dbb mozilla-mail-1.4.3-3.0.2.s390.rpm 18f0e4b19190656df0eab0c98121a067 mozilla-nspr-1.4.3-3.0.2.s390.rpm cf3ac9649c38000fca54d319d546e298 mozilla-nspr-devel-1.4.3-3.0.2.s390.rpm 695903fa5cbe21f7aa7e54fca237bcc0 mozilla-nss-1.4.3-3.0.2.s390.rpm 3d50c59229138d886971374d92d2927c mozilla-nss-devel-1.4.3-3.0.2.s390.rpm s390x: d7b8a517df946cc4e1872468882eb28d mozilla-1.4.3-3.0.2.s390x.rpm 79bf2338e9d3c6e3835137ba58db84b8 mozilla-chat-1.4.3-3.0.2.s390x.rpm c88a798cf6b3143d98e7ea35d7e4c463 mozilla-devel-1.4.3-3.0.2.s390x.rpm b76f9cc6c0c17568799c06630b6b66c9 mozilla-dom-inspector-1.4.3-3.0.2.s390x.rpm ced9955739e509de217dab3e193b603d mozilla-js-debugger-1.4.3-3.0.2.s390x.rpm a360c8ef42f27b4b19cd4447833cd6a7 mozilla-mail-1.4.3-3.0.2.s390x.rpm 8bba98c72a31e16541f9a34b6cfd4f8c mozilla-nspr-1.4.3-3.0.2.s390x.rpm 0870ce645aab9d015c68921ebee5fa1a mozilla-nspr-devel-1.4.3-3.0.2.s390x.rpm 82f324eb81988b15db97cc44bcc187f8 mozilla-nss-1.4.3-3.0.2.s390x.rpm e95e7faa635d02ce0be4f3b019dc106a mozilla-nss-devel-1.4.3-3.0.2.s390x.rpm x86_64: 809d992f5b8de1d8d2929d853b01069a mozilla-1.4.3-3.0.2.x86_64.rpm 0c4b1fd1560188277950e7df67e0c1a5 mozilla-chat-1.4.3-3.0.2.x86_64.rpm 353be79ae25e35d1768f98c21fba07b0 mozilla-devel-1.4.3-3.0.2.x86_64.rpm 6f29bdc0c13bdf52db9103d979eb0a19 mozilla-dom-inspector-1.4.3-3.0.2.x86_64.rpm ea25530cfeb09b9ddb2fdcd4f270b9b4 mozilla-js-debugger-1.4.3-3.0.2.x86_64.rpm 86ed3c2207a0745275720a87520cf249 mozilla-mail-1.4.3-3.0.2.x86_64.rpm caf8df9aa11bf0eed5d3ca3ee4d4c3fe mozilla-nspr-1.4.3-3.0.2.x86_64.rpm a061fd746ad180573d640051e2cf0f92 mozilla-nspr-devel-1.4.3-3.0.2.x86_64.rpm 4139bc49b0a141edac659b62a27c7322 mozilla-nss-1.4.3-3.0.2.x86_64.rpm 9df3f9b35276f8c0bb54f3a45a994668 mozilla-nss-devel-1.4.3-3.0.2.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPM[...] a8fef126836c7ea73c80ac7e2792e142 mozilla-1.4.3-3.0.2.src.rpm i386: 76e94d5ea03f131a723c97207297ee1b mozilla-1.4.3-3.0.2.i386.rpm 75c2959a065a6b6ae8c90b56165e43a6 mozilla-chat-1.4.3-3.0.2.i386.rpm 6c90c0a77bdbee2cb0d84be83fead1b1 mozilla-devel-1.4.3-3.0.2.i386.rpm 58b9cfad95dfc69d1e0d80a23f383ad4 mozilla-dom-inspector-1.4.3-3.0.2.i386.rpm 431ed1323ae5217a0b31dc1f1bcca1bd mozilla-js-debugger-1.4.3-3.0.2.i386.rpm 3a95aa702f1cc2205c10b957c3fd452e mozilla-mail-1.4.3-3.0.2.i386.rpm 2877a54a8c7a2de5fe58b39ee626d214 mozilla-nspr-1.4.3-3.0.2.i386.rpm 46ccae94f0269a2b92d2b4a5d5dcd480 mozilla-nspr-devel-1.4.3-3.0.2.i386.rpm 545d3867e6077c15f64aa5ee192c8d43 mozilla-nss-1.4.3-3.0.2.i386.rpm f3fccea16c2bed1be5038399d0c42bad mozilla-nss-devel-1.4.3-3.0.2.i386.rpm x86_64: 809d992f5b8de1d8d2929d853b01069a mozilla-1.4.3-3.0.2.x86_64.rpm 0c4b1fd1560188277950e7df67e0c1a5 mozilla-chat-1.4.3-3.0.2.x86_64.rpm 353be79ae25e35d1768f98c21fba07b0 mozilla-devel-1.4.3-3.0.2.x86_64.rpm 6f29bdc0c13bdf52db9103d979eb0a19 mozilla-dom-inspector-1.4.3-3.0.2.x86_64.rpm ea25530cfeb09b9ddb2fdcd4f270b9b4 mozilla-js-debugger-1.4.3-3.0.2.x86_64.rpm 86ed3c2207a0745275720a87520cf249 mozilla-mail-1.4.3-3.0.2.x86_64.rpm caf8df9aa11bf0eed5d3ca3ee4d4c3fe mozilla-nspr-1.4.3-3.0.2.x86_64.rpm a061fd746ad180573d640051e2cf0f92 mozilla-nspr-devel-1.4.3-3.0.2.x86_64.rpm 4139bc49b0a141edac659b62a27c7322 mozilla-nss-1.4.3-3.0.2.x86_64.rpm 9df3f9b35276f8c0bb54f3a45a994668 mozilla-nss-devel-1.4.3-3.0.2.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/moz[...] a8fef126836c7ea73c80ac7e2792e142 mozilla-1.4.3-3.0.2.src.rpm i386: 76e94d5ea03f131a723c97207297ee1b mozilla-1.4.3-3.0.2.i386.rpm 75c2959a065a6b6ae8c90b56165e43a6 mozilla-chat-1.4.3-3.0.2.i386.rpm 6c90c0a77bdbee2cb0d84be83fead1b1 mozilla-devel-1.4.3-3.0.2.i386.rpm 58b9cfad95dfc69d1e0d80a23f383ad4 mozilla-dom-inspector-1.4.3-3.0.2.i386.rpm 431ed1323ae5217a0b31dc1f1bcca1bd mozilla-js-debugger-1.4.3-3.0.2.i386.rpm 3a95aa702f1cc2205c10b957c3fd452e mozilla-mail-1.4.3-3.0.2.i386.rpm 2877a54a8c7a2de5fe58b39ee626d214 mozilla-nspr-1.4.3-3.0.2.i386.rpm 46ccae94f0269a2b92d2b4a5d5dcd480 mozilla-nspr-devel-1.4.3-3.0.2.i386.rpm 545d3867e6077c15f64aa5ee192c8d43 mozilla-nss-1.4.3-3.0.2.i386.rpm f3fccea16c2bed1be5038399d0c42bad mozilla-nss-devel-1.4.3-3.0.2.i386.rpm ia64: 7493acb019f4cc706b6cf952444a975a mozilla-1.4.3-3.0.2.ia64.rpm 542bb7e67ff4eba5ed228e5db5a78f25 mozilla-chat-1.4.3-3.0.2.ia64.rpm d5cbf0f7c03d71ed0c51a27430fe7f60 mozilla-devel-1.4.3-3.0.2.ia64.rpm 049bbde10a886f65d539579a311a24af mozilla-dom-inspector-1.4.3-3.0.2.ia64.rpm 1c96bbc0bbbf649e3a851b0295694847 mozilla-js-debugger-1.4.3-3.0.2.ia64.rpm cea7a67877727f4436ac554408db7832 mozilla-mail-1.4.3-3.0.2.ia64.rpm 28047d1dd3264f882f9c4f8a7b628910 mozilla-nspr-1.4.3-3.0.2.ia64.rpm a903c680602a74dd0feaeb12b6cc32ec mozilla-nspr-devel-1.4.3-3.0.2.ia64.rpm d3ff697bca53a52fe164614d77432046 mozilla-nss-1.4.3-3.0.2.ia64.rpm 7cd4e05706eb4b4b57f5eca3f1bc470f mozilla-nss-devel-1.4.3-3.0.2.ia64.rpm x86_64: 809d992f5b8de1d8d2929d853b01069a mozilla-1.4.3-3.0.2.x86_64.rpm 0c4b1fd1560188277950e7df67e0c1a5 mozilla-chat-1.4.3-3.0.2.x86_64.rpm 353be79ae25e35d1768f98c21fba07b0 mozilla-devel-1.4.3-3.0.2.x86_64.rpm 6f29bdc0c13bdf52db9103d979eb0a19 mozilla-dom-inspector-1.4.3-3.0.2.x86_64.rpm ea25530cfeb09b9ddb2fdcd4f270b9b4 mozilla-js-debugger-1.4.3-3.0.2.x86_64.rpm 86ed3c2207a0745275720a87520cf249 mozilla-mail-1.4.3-3.0.2.x86_64.rpm caf8df9aa11bf0eed5d3ca3ee4d4c3fe mozilla-nspr-1.4.3-3.0.2.x86_64.rpm a061fd746ad180573d640051e2cf0f92 mozilla-nspr-devel-1.4.3-3.0.2.x86_64.rpm 4139bc49b0a141edac659b62a27c7322 mozilla-nss-1.4.3-3.0.2.x86_64.rpm 9df3f9b35276f8c0bb54f3a45a994668 mozilla-nss-devel-1.4.3-3.0.2.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/moz[...] a8fef126836c7ea73c80ac7e2792e142 mozilla-1.4.3-3.0.2.src.rpm i386: 76e94d5ea03f131a723c97207297ee1b mozilla-1.4.3-3.0.2.i386.rpm 75c2959a065a6b6ae8c90b56165e43a6 mozilla-chat-1.4.3-3.0.2.i386.rpm 6c90c0a77bdbee2cb0d84be83fead1b1 mozilla-devel-1.4.3-3.0.2.i386.rpm 58b9cfad95dfc69d1e0d80a23f383ad4 mozilla-dom-inspector-1.4.3-3.0.2.i386.rpm 431ed1323ae5217a0b31dc1f1bcca1bd mozilla-js-debugger-1.4.3-3.0.2.i386.rpm 3a95aa702f1cc2205c10b957c3fd452e mozilla-mail-1.4.3-3.0.2.i386.rpm 2877a54a8c7a2de5fe58b39ee626d214 mozilla-nspr-1.4.3-3.0.2.i386.rpm 46ccae94f0269a2b92d2b4a5d5dcd480 mozilla-nspr-devel-1.4.3-3.0.2.i386.rpm 545d3867e6077c15f64aa5ee192c8d43 mozilla-nss-1.4.3-3.0.2.i386.rpm f3fccea16c2bed1be5038399d0c42bad mozilla-nss-devel-1.4.3-3.0.2.i386.rpm ia64: 7493acb019f4cc706b6cf952444a975a mozilla-1.4.3-3.0.2.ia64.rpm 542bb7e67ff4eba5ed228e5db5a78f25 mozilla-chat-1.4.3-3.0.2.ia64.rpm d5cbf0f7c03d71ed0c51a27430fe7f60 mozilla-devel-1.4.3-3.0.2.ia64.rpm 049bbde10a886f65d539579a311a24af mozilla-dom-inspector-1.4.3-3.0.2.ia64.rpm 1c96bbc0bbbf649e3a851b0295694847 mozilla-js-debugger-1.4.3-3.0.2.ia64.rpm cea7a67877727f4436ac554408db7832 mozilla-mail-1.4.3-3.0.2.ia64.rpm 28047d1dd3264f882f9c4f8a7b628910 mozilla-nspr-1.4.3-3.0.2.ia64.rpm a903c680602a74dd0feaeb12b6cc32ec mozilla-nspr-devel-1.4.3-3.0.2.ia64.rpm d3ff697bca53a52fe164614d77432046 mozilla-nss-1.4.3-3.0.2.ia64.rpm 7cd4e05706eb4b4b57f5eca3f1bc470f mozilla-nss-devel-1.4.3-3.0.2.ia64.rpm x86_64: 809d992f5b8de1d8d2929d853b01069a mozilla-1.4.3-3.0.2.x86_64.rpm 0c4b1fd1560188277950e7df67e0c1a5 mozilla-chat-1.4.3-3.0.2.x86_64.rpm 353be79ae25e35d1768f98c21fba07b0 mozilla-devel-1.4.3-3.0.2.x86_64.rpm 6f29bdc0c13bdf52db9103d979eb0a19 mozilla-dom-inspector-1.4.3-3.0.2.x86_64.rpm ea25530cfeb09b9ddb2fdcd4f270b9b4 mozilla-js-debugger-1.4.3-3.0.2.x86_64.rpm 86ed3c2207a0745275720a87520cf249 mozilla-mail-1.4.3-3.0.2.x86_64.rpm caf8df9aa11bf0eed5d3ca3ee4d4c3fe mozilla-nspr-1.4.3-3.0.2.x86_64.rpm a061fd746ad180573d640051e2cf0f92 mozilla-nspr-devel-1.4.3-3.0.2.x86_64.rpm 4139bc49b0a141edac659b62a27c7322 mozilla-nss-1.4.3-3.0.2.x86_64.rpm 9df3f9b35276f8c0bb54f3a45a994668 mozilla-nss-devel-1.4.3-3.0.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package 7. References: http://bugzilla.mozilla.org/show_bug.cgi?id=236618 http://bugzilla.mozilla.org/show_bug.cgi?id=251381 http://bugzilla.mozilla.org/show_bug.cgi?id=229374 http://bugzilla.mozilla.org/show_bug.cgi?id=249004 http://bugzilla.mozilla.org/show_bug.cgi?id=241924 http://bugzilla.mozilla.org/show_bug.cgi?id=250906 http://bugzilla.mozilla.org/show_bug.cgi?id=246448 http://bugzilla.mozilla.org/show_bug.cgi?id=240053 http://bugzilla.mozilla.org/show_bug.cgi?id=162020 http://bugzilla.mozilla.org/show_bug.cgi?id=253121 http://bugzilla.mozilla.org/show_bug.cgi?id=244965 http://bugzilla.mozilla.org/show_bug.cgi?id=234058 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0718 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0722 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0757 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0759 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0760 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0761 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0762 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0764 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0765 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact.html Copyright 2004 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFBEVqpXlSAg2UNWIIRAkVlAJ9RLthGcfCHAkfyu+sUPQVTX3Q3sQCdGxe8 06T2QwRetPvndKsrPREuckA= =8ODv -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watc[...]


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds