[RHSA-2006:0608-01] Critical: seamonkey security update

bugzilla at redhat.com bugzilla at redhat.com
Thu Jul 27 20:12:55 UTC 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Critical: seamonkey security update
Advisory ID:       RHSA-2006:0608-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2006-0608.html
Issue date:        2006-07-27
Updated on:        2006-07-27
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-3801 CVE-2006-3677 CVE-2006-3113 
                   CVE-2006-3802 CVE-2006-3803 CVE-2006-3804 
                   CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 
                   CVE-2006-3808 CVE-2006-3809 CVE-2006-3810 
                   CVE-2006-3811 CVE-2006-3812 
- ---------------------------------------------------------------------

1. Summary:

Updated seamonkey packages that fix several security bugs are now available
for Red Hat Enterprise Linux 3.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

SeaMonkey is an open source Web browser, advanced email and newsgroup
client, IRC chat client, and HTML editor.

Several flaws were found in the way SeaMonkey processed certain javascript
actions. A malicious web page could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-3807,
CVE-2006-3809, CVE-2006-3812)

Several denial of service flaws were found in the way SeaMonkey processed
certain web content. A malicious web page could crash the browser or
possibly execute arbitrary code as the user running SeaMonkey.
(CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,
CVE-2006-3806, CVE-2006-3811)

A buffer overflow flaw was found in the way SeaMonkey Messenger displayed
malformed inline vcard attachments. If a victim viewed an email message
containing a carefully crafted vcard, it was possible to execute arbitrary
code as the user running SeaMonkey Messenger. (CVE-2006-3804)

Several flaws were found in the way SeaMonkey processed certain javascript
actions. A malicious web page could conduct a cross-site scripting attack
or steal sensitive information (such as cookies owned by other domains).
(CVE-2006-3802, CVE-2006-3810)

A flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A
malicious Proxy AutoConfig server could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-3808)

Users of SeaMonkey are advised to upgrade to this update, which contains
SeaMonkey version 1.0.3 that corrects these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

200253 - CVE-2006-3801 Multiple Seamonkey issues (CVE-2006-3677, CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3804, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812)

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/seamonkey-1.0.3-0.el3.1.src.rpm
5700fda497d3d6e09cb99bd0160cae1c  seamonkey-1.0.3-0.el3.1.src.rpm

i386:
edf47c00458eabb9a145b3a2d6211712  seamonkey-1.0.3-0.el3.1.i386.rpm
10bccb0c6f61cc913a5cee11e4525282  seamonkey-chat-1.0.3-0.el3.1.i386.rpm
6c48ebe61fd49a8049c8f7d860609006  seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
4e0d353982d9c7c7779b394047a1cfd9  seamonkey-devel-1.0.3-0.el3.1.i386.rpm
9b47bc7c27efe287cfa0c07792ccc01e  seamonkey-dom-inspector-1.0.3-0.el3.1.i386.rpm
0ca5d34ca0b6db2c734ad126b6cb7b87  seamonkey-js-debugger-1.0.3-0.el3.1.i386.rpm
80e793f420547aa0ffc9f55a5d6c790a  seamonkey-mail-1.0.3-0.el3.1.i386.rpm
dd0da039d35805b601e785791230b1b5  seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
7b016fbdf8977d24272a6a9bf5c549eb  seamonkey-nspr-devel-1.0.3-0.el3.1.i386.rpm
b76d2bf3a842876e218395172a9390ee  seamonkey-nss-1.0.3-0.el3.1.i386.rpm
0b0f7b284d7a43c701b8357a0636147a  seamonkey-nss-devel-1.0.3-0.el3.1.i386.rpm

ia64:
b54f3e53c45f910fa925c78a3f85a830  seamonkey-1.0.3-0.el3.1.ia64.rpm
a54b5aa4c3aca436c9dea299d6f6a084  seamonkey-chat-1.0.3-0.el3.1.ia64.rpm
6c48ebe61fd49a8049c8f7d860609006  seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
6f6f74fe222bdc7f46d8ac7dcd7fa39c  seamonkey-debuginfo-1.0.3-0.el3.1.ia64.rpm
165d173c204d1194d809a01550477bb2  seamonkey-devel-1.0.3-0.el3.1.ia64.rpm
04c06e71a1e01ec3fb1b6d4921cf8e72  seamonkey-dom-inspector-1.0.3-0.el3.1.ia64.rpm
e7533e4ee79017f973b5efd8c263fbb8  seamonkey-js-debugger-1.0.3-0.el3.1.ia64.rpm
6934faf2b40b265306fafa09eb7e2bdb  seamonkey-mail-1.0.3-0.el3.1.ia64.rpm
dd0da039d35805b601e785791230b1b5  seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
97ffb9cdeaa8c375248d7338e081705a  seamonkey-nspr-1.0.3-0.el3.1.ia64.rpm
15746c43e276091cca7b22e149968eec  seamonkey-nspr-devel-1.0.3-0.el3.1.ia64.rpm
b76d2bf3a842876e218395172a9390ee  seamonkey-nss-1.0.3-0.el3.1.i386.rpm
3fa583ba5193eb5022a1492207af373e  seamonkey-nss-1.0.3-0.el3.1.ia64.rpm
430532e2827047ec6e95bd5fad698c98  seamonkey-nss-devel-1.0.3-0.el3.1.ia64.rpm

ppc:
3557460aa7a520cf3ae737e97a23cabf  seamonkey-1.0.3-0.el3.1.ppc.rpm
5da4d6c953c2375ea944da5bbc6d65d7  seamonkey-chat-1.0.3-0.el3.1.ppc.rpm
66bcc3654a08f94f34fb68f4af2fd8b3  seamonkey-debuginfo-1.0.3-0.el3.1.ppc.rpm
4a13b4766810a93c338c6e61eb7c2878  seamonkey-devel-1.0.3-0.el3.1.ppc.rpm
43af0613aef928839f9953be9275976e  seamonkey-dom-inspector-1.0.3-0.el3.1.ppc.rpm
47c3640748bb8028f99fdc8df7143726  seamonkey-js-debugger-1.0.3-0.el3.1.ppc.rpm
8b0ac20bf0eb1665c48503c1e0be2190  seamonkey-mail-1.0.3-0.el3.1.ppc.rpm
81048df18d14782470b2191138ca1d1d  seamonkey-nspr-1.0.3-0.el3.1.ppc.rpm
b086f5ca564b9dc92f7cb42d05cfe152  seamonkey-nspr-devel-1.0.3-0.el3.1.ppc.rpm
9bfb86324ed33e65b75a222e4f4d594c  seamonkey-nss-1.0.3-0.el3.1.ppc.rpm
8ead6a1dbcf7127d1be215be9386315f  seamonkey-nss-devel-1.0.3-0.el3.1.ppc.rpm

s390:
484c596e85d071c16b60a4ff7b588cb2  seamonkey-1.0.3-0.el3.1.s390.rpm
1d19478fe278e8810d37d0e53b843bdd  seamonkey-chat-1.0.3-0.el3.1.s390.rpm
1209d9652acacb8f5443477c8762f1f0  seamonkey-debuginfo-1.0.3-0.el3.1.s390.rpm
1cdd722aaf5be9fde448c5f6572af567  seamonkey-devel-1.0.3-0.el3.1.s390.rpm
1271e3bd7a31e1a61ed06ea92700316b  seamonkey-dom-inspector-1.0.3-0.el3.1.s390.rpm
c48f29a1788d2724a0242b9905f4257f  seamonkey-js-debugger-1.0.3-0.el3.1.s390.rpm
2cdab0ae5eac44b1ce498dd30b7bbc37  seamonkey-mail-1.0.3-0.el3.1.s390.rpm
b846008adfbdad2b17be5016674c7bae  seamonkey-nspr-1.0.3-0.el3.1.s390.rpm
bd9ddc4a63442bca42902f1ba24f36af  seamonkey-nspr-devel-1.0.3-0.el3.1.s390.rpm
bcb5e6d4273210272de5885cd4493df5  seamonkey-nss-1.0.3-0.el3.1.s390.rpm
4931ae4f6b847dc3e9ad4e6a7cbff616  seamonkey-nss-devel-1.0.3-0.el3.1.s390.rpm

s390x:
d575784f960eae10569f23e9b960539f  seamonkey-1.0.3-0.el3.1.s390x.rpm
13515109a27470d1473382feed63ac85  seamonkey-chat-1.0.3-0.el3.1.s390x.rpm
1209d9652acacb8f5443477c8762f1f0  seamonkey-debuginfo-1.0.3-0.el3.1.s390.rpm
2b922024c20037dc4e4e70c9e93da048  seamonkey-debuginfo-1.0.3-0.el3.1.s390x.rpm
dca79815a7bf6b1abc31c3d1da3f8b7d  seamonkey-devel-1.0.3-0.el3.1.s390x.rpm
69658420caf319c4a87f9d08cb1f8b63  seamonkey-dom-inspector-1.0.3-0.el3.1.s390x.rpm
b3084333c4285c43b1e7f98d121459d4  seamonkey-js-debugger-1.0.3-0.el3.1.s390x.rpm
b1c98f83174a4294e6442fd85cc54c1e  seamonkey-mail-1.0.3-0.el3.1.s390x.rpm
b846008adfbdad2b17be5016674c7bae  seamonkey-nspr-1.0.3-0.el3.1.s390.rpm
94825bce286f505d30157ed388ec0851  seamonkey-nspr-1.0.3-0.el3.1.s390x.rpm
bd5db4932cf91db2e1ab44543bf88b24  seamonkey-nspr-devel-1.0.3-0.el3.1.s390x.rpm
bcb5e6d4273210272de5885cd4493df5  seamonkey-nss-1.0.3-0.el3.1.s390.rpm
bd25f904c8651f3339c6fb4110209673  seamonkey-nss-1.0.3-0.el3.1.s390x.rpm
0317b5cc38abe9e5d753407e6053724f  seamonkey-nss-devel-1.0.3-0.el3.1.s390x.rpm

x86_64:
edf47c00458eabb9a145b3a2d6211712  seamonkey-1.0.3-0.el3.1.i386.rpm
d4c9f6d7193e758c20eaed2351bb2d91  seamonkey-1.0.3-0.el3.1.x86_64.rpm
f54fe75baa2c2fa5907cd0a8737efd11  seamonkey-chat-1.0.3-0.el3.1.x86_64.rpm
6c48ebe61fd49a8049c8f7d860609006  seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
107d17cf6eacfc8d82903a7b52722c66  seamonkey-debuginfo-1.0.3-0.el3.1.x86_64.rpm
7762f692b3d621e8c47c392bd2c8031c  seamonkey-devel-1.0.3-0.el3.1.x86_64.rpm
e510b5446448432ba00053432c8a8d37  seamonkey-dom-inspector-1.0.3-0.el3.1.x86_64.rpm
299196ad7affc2b288423aaa1e92829e  seamonkey-js-debugger-1.0.3-0.el3.1.x86_64.rpm
959424ae886ecf449f8cd657de5cf46a  seamonkey-mail-1.0.3-0.el3.1.x86_64.rpm
dd0da039d35805b601e785791230b1b5  seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
267086e1803aa3a62035f747cbbdb659  seamonkey-nspr-1.0.3-0.el3.1.x86_64.rpm
7c636ad447bbd128e651262084d62bee  seamonkey-nspr-devel-1.0.3-0.el3.1.x86_64.rpm
b76d2bf3a842876e218395172a9390ee  seamonkey-nss-1.0.3-0.el3.1.i386.rpm
03897b6821a7edfc3d9116a0b64a2845  seamonkey-nss-1.0.3-0.el3.1.x86_64.rpm
1c0a8543ac1dd50e69bf5ac03c5f1d1f  seamonkey-nss-devel-1.0.3-0.el3.1.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/seamonkey-1.0.3-0.el3.1.src.rpm
5700fda497d3d6e09cb99bd0160cae1c  seamonkey-1.0.3-0.el3.1.src.rpm

i386:
edf47c00458eabb9a145b3a2d6211712  seamonkey-1.0.3-0.el3.1.i386.rpm
10bccb0c6f61cc913a5cee11e4525282  seamonkey-chat-1.0.3-0.el3.1.i386.rpm
6c48ebe61fd49a8049c8f7d860609006  seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
4e0d353982d9c7c7779b394047a1cfd9  seamonkey-devel-1.0.3-0.el3.1.i386.rpm
9b47bc7c27efe287cfa0c07792ccc01e  seamonkey-dom-inspector-1.0.3-0.el3.1.i386.rpm
0ca5d34ca0b6db2c734ad126b6cb7b87  seamonkey-js-debugger-1.0.3-0.el3.1.i386.rpm
80e793f420547aa0ffc9f55a5d6c790a  seamonkey-mail-1.0.3-0.el3.1.i386.rpm
dd0da039d35805b601e785791230b1b5  seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
7b016fbdf8977d24272a6a9bf5c549eb  seamonkey-nspr-devel-1.0.3-0.el3.1.i386.rpm
b76d2bf3a842876e218395172a9390ee  seamonkey-nss-1.0.3-0.el3.1.i386.rpm
0b0f7b284d7a43c701b8357a0636147a  seamonkey-nss-devel-1.0.3-0.el3.1.i386.rpm

x86_64:
edf47c00458eabb9a145b3a2d6211712  seamonkey-1.0.3-0.el3.1.i386.rpm
d4c9f6d7193e758c20eaed2351bb2d91  seamonkey-1.0.3-0.el3.1.x86_64.rpm
f54fe75baa2c2fa5907cd0a8737efd11  seamonkey-chat-1.0.3-0.el3.1.x86_64.rpm
6c48ebe61fd49a8049c8f7d860609006  seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
107d17cf6eacfc8d82903a7b52722c66  seamonkey-debuginfo-1.0.3-0.el3.1.x86_64.rpm
7762f692b3d621e8c47c392bd2c8031c  seamonkey-devel-1.0.3-0.el3.1.x86_64.rpm
e510b5446448432ba00053432c8a8d37  seamonkey-dom-inspector-1.0.3-0.el3.1.x86_64.rpm
299196ad7affc2b288423aaa1e92829e  seamonkey-js-debugger-1.0.3-0.el3.1.x86_64.rpm
959424ae886ecf449f8cd657de5cf46a  seamonkey-mail-1.0.3-0.el3.1.x86_64.rpm
dd0da039d35805b601e785791230b1b5  seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
267086e1803aa3a62035f747cbbdb659  seamonkey-nspr-1.0.3-0.el3.1.x86_64.rpm
7c636ad447bbd128e651262084d62bee  seamonkey-nspr-devel-1.0.3-0.el3.1.x86_64.rpm
b76d2bf3a842876e218395172a9390ee  seamonkey-nss-1.0.3-0.el3.1.i386.rpm
03897b6821a7edfc3d9116a0b64a2845  seamonkey-nss-1.0.3-0.el3.1.x86_64.rpm
1c0a8543ac1dd50e69bf5ac03c5f1d1f  seamonkey-nss-devel-1.0.3-0.el3.1.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/seamonkey-1.0.3-0.el3.1.src.rpm
5700fda497d3d6e09cb99bd0160cae1c  seamonkey-1.0.3-0.el3.1.src.rpm

i386:
edf47c00458eabb9a145b3a2d6211712  seamonkey-1.0.3-0.el3.1.i386.rpm
10bccb0c6f61cc913a5cee11e4525282  seamonkey-chat-1.0.3-0.el3.1.i386.rpm
6c48ebe61fd49a8049c8f7d860609006  seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
4e0d353982d9c7c7779b394047a1cfd9  seamonkey-devel-1.0.3-0.el3.1.i386.rpm
9b47bc7c27efe287cfa0c07792ccc01e  seamonkey-dom-inspector-1.0.3-0.el3.1.i386.rpm
0ca5d34ca0b6db2c734ad126b6cb7b87  seamonkey-js-debugger-1.0.3-0.el3.1.i386.rpm
80e793f420547aa0ffc9f55a5d6c790a  seamonkey-mail-1.0.3-0.el3.1.i386.rpm
dd0da039d35805b601e785791230b1b5  seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
7b016fbdf8977d24272a6a9bf5c549eb  seamonkey-nspr-devel-1.0.3-0.el3.1.i386.rpm
b76d2bf3a842876e218395172a9390ee  seamonkey-nss-1.0.3-0.el3.1.i386.rpm
0b0f7b284d7a43c701b8357a0636147a  seamonkey-nss-devel-1.0.3-0.el3.1.i386.rpm

ia64:
b54f3e53c45f910fa925c78a3f85a830  seamonkey-1.0.3-0.el3.1.ia64.rpm
a54b5aa4c3aca436c9dea299d6f6a084  seamonkey-chat-1.0.3-0.el3.1.ia64.rpm
6c48ebe61fd49a8049c8f7d860609006  seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
6f6f74fe222bdc7f46d8ac7dcd7fa39c  seamonkey-debuginfo-1.0.3-0.el3.1.ia64.rpm
165d173c204d1194d809a01550477bb2  seamonkey-devel-1.0.3-0.el3.1.ia64.rpm
04c06e71a1e01ec3fb1b6d4921cf8e72  seamonkey-dom-inspector-1.0.3-0.el3.1.ia64.rpm
e7533e4ee79017f973b5efd8c263fbb8  seamonkey-js-debugger-1.0.3-0.el3.1.ia64.rpm
6934faf2b40b265306fafa09eb7e2bdb  seamonkey-mail-1.0.3-0.el3.1.ia64.rpm
dd0da039d35805b601e785791230b1b5  seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
97ffb9cdeaa8c375248d7338e081705a  seamonkey-nspr-1.0.3-0.el3.1.ia64.rpm
15746c43e276091cca7b22e149968eec  seamonkey-nspr-devel-1.0.3-0.el3.1.ia64.rpm
b76d2bf3a842876e218395172a9390ee  seamonkey-nss-1.0.3-0.el3.1.i386.rpm
3fa583ba5193eb5022a1492207af373e  seamonkey-nss-1.0.3-0.el3.1.ia64.rpm
430532e2827047ec6e95bd5fad698c98  seamonkey-nss-devel-1.0.3-0.el3.1.ia64.rpm

x86_64:
edf47c00458eabb9a145b3a2d6211712  seamonkey-1.0.3-0.el3.1.i386.rpm
d4c9f6d7193e758c20eaed2351bb2d91  seamonkey-1.0.3-0.el3.1.x86_64.rpm
f54fe75baa2c2fa5907cd0a8737efd11  seamonkey-chat-1.0.3-0.el3.1.x86_64.rpm
6c48ebe61fd49a8049c8f7d860609006  seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
107d17cf6eacfc8d82903a7b52722c66  seamonkey-debuginfo-1.0.3-0.el3.1.x86_64.rpm
7762f692b3d621e8c47c392bd2c8031c  seamonkey-devel-1.0.3-0.el3.1.x86_64.rpm
e510b5446448432ba00053432c8a8d37  seamonkey-dom-inspector-1.0.3-0.el3.1.x86_64.rpm
299196ad7affc2b288423aaa1e92829e  seamonkey-js-debugger-1.0.3-0.el3.1.x86_64.rpm
959424ae886ecf449f8cd657de5cf46a  seamonkey-mail-1.0.3-0.el3.1.x86_64.rpm
dd0da039d35805b601e785791230b1b5  seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
267086e1803aa3a62035f747cbbdb659  seamonkey-nspr-1.0.3-0.el3.1.x86_64.rpm
7c636ad447bbd128e651262084d62bee  seamonkey-nspr-devel-1.0.3-0.el3.1.x86_64.rpm
b76d2bf3a842876e218395172a9390ee  seamonkey-nss-1.0.3-0.el3.1.i386.rpm
03897b6821a7edfc3d9116a0b64a2845  seamonkey-nss-1.0.3-0.el3.1.x86_64.rpm
1c0a8543ac1dd50e69bf5ac03c5f1d1f  seamonkey-nss-devel-1.0.3-0.el3.1.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/seamonkey-1.0.3-0.el3.1.src.rpm
5700fda497d3d6e09cb99bd0160cae1c  seamonkey-1.0.3-0.el3.1.src.rpm

i386:
edf47c00458eabb9a145b3a2d6211712  seamonkey-1.0.3-0.el3.1.i386.rpm
10bccb0c6f61cc913a5cee11e4525282  seamonkey-chat-1.0.3-0.el3.1.i386.rpm
6c48ebe61fd49a8049c8f7d860609006  seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
4e0d353982d9c7c7779b394047a1cfd9  seamonkey-devel-1.0.3-0.el3.1.i386.rpm
9b47bc7c27efe287cfa0c07792ccc01e  seamonkey-dom-inspector-1.0.3-0.el3.1.i386.rpm
0ca5d34ca0b6db2c734ad126b6cb7b87  seamonkey-js-debugger-1.0.3-0.el3.1.i386.rpm
80e793f420547aa0ffc9f55a5d6c790a  seamonkey-mail-1.0.3-0.el3.1.i386.rpm
dd0da039d35805b601e785791230b1b5  seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
7b016fbdf8977d24272a6a9bf5c549eb  seamonkey-nspr-devel-1.0.3-0.el3.1.i386.rpm
b76d2bf3a842876e218395172a9390ee  seamonkey-nss-1.0.3-0.el3.1.i386.rpm
0b0f7b284d7a43c701b8357a0636147a  seamonkey-nss-devel-1.0.3-0.el3.1.i386.rpm

ia64:
b54f3e53c45f910fa925c78a3f85a830  seamonkey-1.0.3-0.el3.1.ia64.rpm
a54b5aa4c3aca436c9dea299d6f6a084  seamonkey-chat-1.0.3-0.el3.1.ia64.rpm
6c48ebe61fd49a8049c8f7d860609006  seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
6f6f74fe222bdc7f46d8ac7dcd7fa39c  seamonkey-debuginfo-1.0.3-0.el3.1.ia64.rpm
165d173c204d1194d809a01550477bb2  seamonkey-devel-1.0.3-0.el3.1.ia64.rpm
04c06e71a1e01ec3fb1b6d4921cf8e72  seamonkey-dom-inspector-1.0.3-0.el3.1.ia64.rpm
e7533e4ee79017f973b5efd8c263fbb8  seamonkey-js-debugger-1.0.3-0.el3.1.ia64.rpm
6934faf2b40b265306fafa09eb7e2bdb  seamonkey-mail-1.0.3-0.el3.1.ia64.rpm
dd0da039d35805b601e785791230b1b5  seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
97ffb9cdeaa8c375248d7338e081705a  seamonkey-nspr-1.0.3-0.el3.1.ia64.rpm
15746c43e276091cca7b22e149968eec  seamonkey-nspr-devel-1.0.3-0.el3.1.ia64.rpm
b76d2bf3a842876e218395172a9390ee  seamonkey-nss-1.0.3-0.el3.1.i386.rpm
3fa583ba5193eb5022a1492207af373e  seamonkey-nss-1.0.3-0.el3.1.ia64.rpm
430532e2827047ec6e95bd5fad698c98  seamonkey-nss-devel-1.0.3-0.el3.1.ia64.rpm

x86_64:
edf47c00458eabb9a145b3a2d6211712  seamonkey-1.0.3-0.el3.1.i386.rpm
d4c9f6d7193e758c20eaed2351bb2d91  seamonkey-1.0.3-0.el3.1.x86_64.rpm
f54fe75baa2c2fa5907cd0a8737efd11  seamonkey-chat-1.0.3-0.el3.1.x86_64.rpm
6c48ebe61fd49a8049c8f7d860609006  seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
107d17cf6eacfc8d82903a7b52722c66  seamonkey-debuginfo-1.0.3-0.el3.1.x86_64.rpm
7762f692b3d621e8c47c392bd2c8031c  seamonkey-devel-1.0.3-0.el3.1.x86_64.rpm
e510b5446448432ba00053432c8a8d37  seamonkey-dom-inspector-1.0.3-0.el3.1.x86_64.rpm
299196ad7affc2b288423aaa1e92829e  seamonkey-js-debugger-1.0.3-0.el3.1.x86_64.rpm
959424ae886ecf449f8cd657de5cf46a  seamonkey-mail-1.0.3-0.el3.1.x86_64.rpm
dd0da039d35805b601e785791230b1b5  seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
267086e1803aa3a62035f747cbbdb659  seamonkey-nspr-1.0.3-0.el3.1.x86_64.rpm
7c636ad447bbd128e651262084d62bee  seamonkey-nspr-devel-1.0.3-0.el3.1.x86_64.rpm
b76d2bf3a842876e218395172a9390ee  seamonkey-nss-1.0.3-0.el3.1.i386.rpm
03897b6821a7edfc3d9116a0b64a2845  seamonkey-nss-1.0.3-0.el3.1.x86_64.rpm
1c0a8543ac1dd50e69bf5ac03c5f1d1f  seamonkey-nss-devel-1.0.3-0.el3.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812
http://www.redhat.com/security/updates/classification/#critical

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFEyR4zXlSAg2UNWIIRAhmfAJ9MSTmR6VPFIK6Bb9P28JHgXPHX/gCgnhfr
YPdI9mgL+kQsIAfaHIsGNno=
=Z5+F
-----END PGP SIGNATURE-----





More information about the Enterprise-watch-list mailing list