RHSA-2006:0578-01 Critical: seamonkey security update (was mozilla)
Posted on: 07/20/2006 05:12 PM

A new update is available for Red Hat Enterprise Linux. Here the announcement:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Critical: seamonkey security update (was mozilla)
Advisory ID: RHSA-2006:0578-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0578.html
Issue date: 2006-07-20
Updated on: 2006-07-20
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-2779 CVE-2006-2780 CVE-2006-2781
CVE-2006-2783 CVE-2006-2782 CVE-2006-2778
CVE-2006-2776 CVE-2006-2784 CVE-2006-2785
CVE-2006-2786 CVE-2006-2787 CVE-2006-2788
- ---------------------------------------------------------------------

1. Summary:

Updated seamonkey packages that fix several security bugs in the mozilla
package are now available for Red Hat Enterprise Linux 3.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

SeaMonkey is an open source Web browser, advanced email and newsgroup
client, IRC chat client, and HTML editor.

The Mozilla Foundation has discontinued support for the Mozilla Suite. This
update deprecates the Mozilla Suite in Red Hat Enterprise Linux 3 in favor
of the supported SeaMonkey Suite.

This update also resolves a number of outstanding Mozilla security issues:

Several flaws were found in the way Mozilla processed certain javascript
actions. A malicious web page could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-2776,
CVE-2006-2784, CVE-2006-2785, CVE-2006-2787)

Several denial of service flaws were found in the way Mozilla processed
certain web content. A malicious web page could crash firefox or possibly
execute arbitrary code. These issues to date were not proven to be
exploitable, but do show evidence of memory corruption. (CVE-2006-2779,
CVE-2006-2780)

A double-free flaw was found in the way Mozilla-mail displayed malformed
inline vcard attachments. If a victim viewed an email message containing
a carefully crafted vcard it could execute arbitrary code as the user
running Mozilla-mail. (CVE-2006-2781)

A cross site scripting flaw was found in the way Mozilla processed Unicode
Byte-order-Mark (BOM) markers in UTF-8 web pages. A malicious web page
could execute a script within the browser that a web input sanitizer could
miss due to a malformed "script" tag. (CVE-2006-2783)

A form file upload flaw was found in the way Mozilla handled javascript
input object mutation. A malicious web page could upload an arbitrary local
file at form submission time without user interaction. (CVE-2006-2782)

A denial of service flaw was found in the way Mozilla called the
crypto.signText() javascript function. A malicious web page could crash the
browser if the victim had a client certificate loaded. (CVE-2006-2778)

Two HTTP response smuggling flaws were found in the way Mozilla processed
certain invalid HTTP response headers. A malicious web site could return
specially crafted HTTP response headers which may bypass HTTP proxy
restrictions. (CVE-2006-2786)

A double free flaw was found in the way the nsIX509::getRawDER method was
called. If a victim visited a carefully crafted web page it could execute
arbitrary code as the user running Mozilla. (CVE-2006-2788)

Users of Mozilla are advised to upgrade to this update, which contains
SeaMonkey version 1.0.2 that is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

196971 - CVE-2006-2783 multiple Seamonkey issues (CVE-2006-2782,CVE-2006-2778,CVE-2006-2776,CVE-2006-2784,CVE-2006-2785,CVE-2006-2786,CVE-2006-2787,CVE-2006-2788)
198683 - CVE-2006-2779 Multiple Mozilla issues (CVE-2006-2780, CVE-2006-2781)

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/seamonkey-1.0.2-0.1.0.EL3.src.rpm
e7f42fee596ad457febe242c64bd5787 seamonkey-1.0.2-0.1.0.EL3.src.rpm

i386:
cd2ed103ee013ca0b41987baf48dc6be seamonkey-1.0.2-0.1.0.EL3.i386.rpm
0107a05bf5bf3cd9e5b871aa52e94f02 seamonkey-chat-1.0.2-0.1.0.EL3.i386.rpm
ffc055bae0d9db603a20b24a57f543c4 seamonkey-debuginfo-1.0.2-0.1.0.EL3.i386.rpm
cb8e2e0b35f45625fec39d28af1cb6d1 seamonkey-devel-1.0.2-0.1.0.EL3.i386.rpm
d8bf06ddf59a8c26fe176c98b249cf52 seamonkey-dom-inspector-1.0.2-0.1.0.EL3.i386.rpm
84ec6859df530a8ea6c1a71b5e9c5369 seamonkey-js-debugger-1.0.2-0.1.0.EL3.i386.rpm
546ce0126786d8dad69cd3d682301556 seamonkey-mail-1.0.2-0.1.0.EL3.i386.rpm
db283c25140cc695d782bae05e30ae87 seamonkey-nspr-1.0.2-0.1.0.EL3.i386.rpm
ad831a228128e9e7681b3447aa20ef52 seamonkey-nspr-devel-1.0.2-0.1.0.EL3.i386.rpm
ed2537362625184a74b04614f93c6c3c seamonkey-nss-1.0.2-0.1.0.EL3.i386.rpm
4ddfa278b3a2ce52f4ec4c13ae8e7d10 seamonkey-nss-devel-1.0.2-0.1.0.EL3.i386.rpm

ia64:
3a53ec8fa9d4de0c1520f646842533be seamonkey-1.0.2-0.1.0.EL3.ia64.rpm
5248d87146f0e76cd2ec0e618b6cb928 seamonkey-chat-1.0.2-0.1.0.EL3.ia64.rpm
ffc055bae0d9db603a20b24a57f543c4 seamonkey-debuginfo-1.0.2-0.1.0.EL3.i386.rpm
5d7c4bdc79c057f18d5403102a801cdb seamonkey-debuginfo-1.0.2-0.1.0.EL3.ia64.rpm
d2eaa475714186132a69acc3f30bee43 seamonkey-devel-1.0.2-0.1.0.EL3.ia64.rpm
9f1024744a669ff06aabf64db507430a seamonkey-dom-inspector-1.0.2-0.1.0.EL3.ia64.rpm
af2c3b36524f43659f1cba3c7d76a917 seamonkey-js-debugger-1.0.2-0.1.0.EL3.ia64.rpm
c5ada6f5c1f0cb073e64b3cd638972a5 seamonkey-mail-1.0.2-0.1.0.EL3.ia64.rpm
db283c25140cc695d782bae05e30ae87 seamonkey-nspr-1.0.2-0.1.0.EL3.i386.rpm
604575dd5d1819600a7c84c1755f103c seamonkey-nspr-1.0.2-0.1.0.EL3.ia64.rpm
e7093e53153651f2c501f68f6466618e seamonkey-nspr-devel-1.0.2-0.1.0.EL3.ia64.rpm
ed2537362625184a74b04614f93c6c3c seamonkey-nss-1.0.2-0.1.0.EL3.i386.rpm
9bed60cdd1e3d2a1dc5817f7b4f6070e seamonkey-nss-1.0.2-0.1.0.EL3.ia64.rpm
c9308271dd16088fd21a191782ef2758 seamonkey-nss-devel-1.0.2-0.1.0.EL3.ia64.rpm

ppc:
b4cf123d709d46d5150962eb67abf700 seamonkey-1.0.2-0.1.0.EL3.ppc.rpm
14da09eb186efccd8ca3c23cb66f316d seamonkey-chat-1.0.2-0.1.0.EL3.ppc.rpm
6331f517155a5bb4d572c90f0f975f2a seamonkey-debuginfo-1.0.2-0.1.0.EL3.ppc.rpm
58596cc9f5ca02f71f33e3e10f8fd906 seamonkey-devel-1.0.2-0.1.0.EL3.ppc.rpm
ea7e430989d0d435b1ec7467f3fb80d1 seamonkey-dom-inspector-1.0.2-0.1.0.EL3.ppc.rpm
6c48be8159be70eb982148152db0a2a6 seamonkey-js-debugger-1.0.2-0.1.0.EL3.ppc.rpm
dd40c7d1cbd8c965b4d1122e38ee0bc2 seamonkey-mail-1.0.2-0.1.0.EL3.ppc.rpm
7b189d2e7d5565c0374b80d0d918a635 seamonkey-nspr-1.0.2-0.1.0.EL3.ppc.rpm
cacda140b54ee4fb9e36bf210825184a seamonkey-nspr-devel-1.0.2-0.1.0.EL3.ppc.rpm
719ee516e9138f3bbca0e62bf7358985 seamonkey-nss-1.0.2-0.1.0.EL3.ppc.rpm
16a0da76d3eeabf94153afcdd5f7fdf9 seamonkey-nss-devel-1.0.2-0.1.0.EL3.ppc.rpm

s390:
9f9830f66e95027a8196f3814716e1cb seamonkey-1.0.2-0.1.0.EL3.s390.rpm
a3f0a08bc16e9c3fd092ca14b0cd3122 seamonkey-chat-1.0.2-0.1.0.EL3.s390.rpm
6532490c2c144f9ded0d023f14d23461 seamonkey-debuginfo-1.0.2-0.1.0.EL3.s390.rpm
686e30e1d7f9e2da1104e16bf3919d12 seamonkey-devel-1.0.2-0.1.0.EL3.s390.rpm
5fadb2060f2a62af9c8f912c82433c37 seamonkey-dom-inspector-1.0.2-0.1.0.EL3.s390.rpm
6545d7e7b0a360a3b08807c17f12ebe4 seamonkey-js-debugger-1.0.2-0.1.0.EL3.s390.rpm
6d7915768b31523e3c764e646e53d4d4 seamonkey-mail-1.0.2-0.1.0.EL3.s390.rpm
19549dc1b8c168d96d71d23f795abe29 seamonkey-nspr-1.0.2-0.1.0.EL3.s390.rpm
623e11a754c9618806bf75c37f043853 seamonkey-nspr-devel-1.0.2-0.1.0.EL3.s390.rpm
7f50c7aa247209118565883e755c1a6c seamonkey-nss-1.0.2-0.1.0.EL3.s390.rpm
107e118d82f58c5e67d85c586689fdc5 seamonkey-nss-devel-1.0.2-0.1.0.EL3.s390.rpm

s390x:
8f15d08911c6f86d2053a25f5551c2e0 seamonkey-1.0.2-0.1.0.EL3.s390x.rpm
267406f1e669245d0865a3c99711defb seamonkey-chat-1.0.2-0.1.0.EL3.s390x.rpm
6532490c2c144f9ded0d023f14d23461 seamonkey-debuginfo-1.0.2-0.1.0.EL3.s390.rpm
f11aabe13123313135c35f286ff4191a seamonkey-debuginfo-1.0.2-0.1.0.EL3.s390x.rpm
532931ca70eeb234c8ff94f27513af82 seamonkey-devel-1.0.2-0.1.0.EL3.s390x.rpm
1b8a357a1373ca0b95dd239e2c3919af seamonkey-dom-inspector-1.0.2-0.1.0.EL3.s390x.rpm
487ac1817390bc95a070cc463f3844eb seamonkey-js-debugger-1.0.2-0.1.0.EL3.s390x.rpm
5e06808fb3dff165f686ba26ef4835be seamonkey-mail-1.0.2-0.1.0.EL3.s390x.rpm
19549dc1b8c168d96d71d23f795abe29 seamonkey-nspr-1.0.2-0.1.0.EL3.s390.rpm
5de0519382b91c731a33e32fd4cf0393 seamonkey-nspr-1.0.2-0.1.0.EL3.s390x.rpm
b8c7b29d8ba439cb826cad8d624b4db4 seamonkey-nspr-devel-1.0.2-0.1.0.EL3.s390x.rpm
7f50c7aa247209118565883e755c1a6c seamonkey-nss-1.0.2-0.1.0.EL3.s390.rpm
af5c707597318d62e4236c5bedfcd4ee seamonkey-nss-1.0.2-0.1.0.EL3.s390x.rpm
9f13fc39e28a8c2e3ef43b52e6f3f89d seamonkey-nss-devel-1.0.2-0.1.0.EL3.s390x.rpm

x86_64:
cd2ed103ee013ca0b41987baf48dc6be seamonkey-1.0.2-0.1.0.EL3.i386.rpm
2e860fe38f090f5c68b9f04ac0d4357d seamonkey-1.0.2-0.1.0.EL3.x86_64.rpm
2a108e026bf9266162279d183954c4e2 seamonkey-chat-1.0.2-0.1.0.EL3.x86_64.rpm
ffc055bae0d9db603a20b24a57f543c4 seamonkey-debuginfo-1.0.2-0.1.0.EL3.i386.rpm
dec96a2e7cdacb8cc9c900f40d86635a seamonkey-debuginfo-1.0.2-0.1.0.EL3.x86_64.rpm
df2a0566ad96e13620e9d6c3d4114150 seamonkey-devel-1.0.2-0.1.0.EL3.x86_64.rpm
1f55d411d82759ce71ef1bee4c1a4f61 seamonkey-dom-inspector-1.0.2-0.1.0.EL3.x86_64.rpm
b4f0dd224f293363a1bc41e34d8a1c23 seamonkey-js-debugger-1.0.2-0.1.0.EL3.x86_64.rpm
c8ef05e371be6ac1ca3338ac9ade1c64 seamonkey-mail-1.0.2-0.1.0.EL3.x86_64.rpm
db283c25140cc695d782bae05e30ae87 seamonkey-nspr-1.0.2-0.1.0.EL3.i386.rpm
da40e1ac22751c1df8368d313618bea6 seamonkey-nspr-1.0.2-0.1.0.EL3.x86_64.rpm
b0ae6e9b45458a80eeee64722912af59 seamonkey-nspr-devel-1.0.2-0.1.0.EL3.x86_64.rpm
ed2537362625184a74b04614f93c6c3c seamonkey-nss-1.0.2-0.1.0.EL3.i386.rpm
c070487b616f51572d978bc7cd1c3673 seamonkey-nss-1.0.2-0.1.0.EL3.x86_64.rpm
45072a8cf4a7630f4ab39b45fde85608 seamonkey-nss-devel-1.0.2-0.1.0.EL3.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/seamonkey-1.0.2-0.1.0.EL3.src.rpm
e7f42fee596ad457febe242c64bd5787 seamonkey-1.0.2-0.1.0.EL3.src.rpm

i386:
cd2ed103ee013ca0b41987baf48dc6be seamonkey-1.0.2-0.1.0.EL3.i386.rpm
0107a05bf5bf3cd9e5b871aa52e94f02 seamonkey-chat-1.0.2-0.1.0.EL3.i386.rpm
ffc055bae0d9db603a20b24a57f543c4 seamonkey-debuginfo-1.0.2-0.1.0.EL3.i386.rpm
cb8e2e0b35f45625fec39d28af1cb6d1 seamonkey-devel-1.0.2-0.1.0.EL3.i386.rpm
d8bf06ddf59a8c26fe176c98b249cf52 seamonkey-dom-inspector-1.0.2-0.1.0.EL3.i386.rpm
84ec6859df530a8ea6c1a71b5e9c5369 seamonkey-js-debugger-1.0.2-0.1.0.EL3.i386.rpm
546ce0126786d8dad69cd3d682301556 seamonkey-mail-1.0.2-0.1.0.EL3.i386.rpm
db283c25140cc695d782bae05e30ae87 seamonkey-nspr-1.0.2-0.1.0.EL3.i386.rpm
ad831a228128e9e7681b3447aa20ef52 seamonkey-nspr-devel-1.0.2-0.1.0.EL3.i386.rpm
ed2537362625184a74b04614f93c6c3c seamonkey-nss-1.0.2-0.1.0.EL3.i386.rpm
4ddfa278b3a2ce52f4ec4c13ae8e7d10 seamonkey-nss-devel-1.0.2-0.1.0.EL3.i386.rpm

x86_64:
cd2ed103ee013ca0b41987baf48dc6be seamonkey-1.0.2-0.1.0.EL3.i386.rpm
2e860fe38f090f5c68b9f04ac0d4357d seamonkey-1.0.2-0.1.0.EL3.x86_64.rpm
2a108e026bf9266162279d183954c4e2 seamonkey-chat-1.0.2-0.1.0.EL3.x86_64.rpm
ffc055bae0d9db603a20b24a57f543c4 seamonkey-debuginfo-1.0.2-0.1.0.EL3.i386.rpm
dec96a2e7cdacb8cc9c900f40d86635a seamonkey-debuginfo-1.0.2-0.1.0.EL3.x86_64.rpm
df2a0566ad96e13620e9d6c3d4114150 seamonkey-devel-1.0.2-0.1.0.EL3.x86_64.rpm
1f55d411d82759ce71ef1bee4c1a4f61 seamonkey-dom-inspector-1.0.2-0.1.0.EL3.x86_64.rpm
b4f0dd224f293363a1bc41e34d8a1c23 seamonkey-js-debugger-1.0.2-0.1.0.EL3.x86_64.rpm
c8ef05e371be6ac1ca3338ac9ade1c64 seamonkey-mail-1.0.2-0.1.0.EL3.x86_64.rpm
db283c25140cc695d782bae05e30ae87 seamonkey-nspr-1.0.2-0.1.0.EL3.i386.rpm
da40e1ac22751c1df8368d313618bea6 seamonkey-nspr-1.0.2-0.1.0.EL3.x86_64.rpm
b0ae6e9b45458a80eeee64722912af59 seamonkey-nspr-devel-1.0.2-0.1.0.EL3.x86_64.rpm
ed2537362625184a74b04614f93c6c3c seamonkey-nss-1.0.2-0.1.0.EL3.i386.rpm
c070487b616f51572d978bc7cd1c3673 seamonkey-nss-1.0.2-0.1.0.EL3.x86_64.rpm
45072a8cf4a7630f4ab39b45fde85608 seamonkey-nss-devel-1.0.2-0.1.0.EL3.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/seamonkey-1.0.2-0.1.0.EL3.src.rpm
e7f42fee596ad457febe242c64bd5787 seamonkey-1.0.2-0.1.0.EL3.src.rpm

i386:
cd2ed103ee013ca0b41987baf48dc6be seamonkey-1.0.2-0.1.0.EL3.i386.rpm
0107a05bf5bf3cd9e5b871aa52e94f02 seamonkey-chat-1.0.2-0.1.0.EL3.i386.rpm
ffc055bae0d9db603a20b24a57f543c4 seamonkey-debuginfo-1.0.2-0.1.0.EL3.i386.rpm
cb8e2e0b35f45625fec39d28af1cb6d1 seamonkey-devel-1.0.2-0.1.0.EL3.i386.rpm
d8bf06ddf59a8c26fe176c98b249cf52 seamonkey-dom-inspector-1.0.2-0.1.0.EL3.i386.rpm
84ec6859df530a8ea6c1a71b5e9c5369 seamonkey-js-debugger-1.0.2-0.1.0.EL3.i386.rpm
546ce0126786d8dad69cd3d682301556 seamonkey-mail-1.0.2-0.1.0.EL3.i386.rpm
db283c25140cc695d782bae05e30ae87 seamonkey-nspr-1.0.2-0.1.0.EL3.i386.rpm
ad831a228128e9e7681b3447aa20ef52 seamonkey-nspr-devel-1.0.2-0.1.0.EL3.i386.rpm
ed2537362625184a74b04614f93c6c3c seamonkey-nss-1.0.2-0.1.0.EL3.i386.rpm
4ddfa278b3a2ce52f4ec4c13ae8e7d10 seamonkey-nss-devel-1.0.2-0.1.0.EL3.i386.rpm

ia64:
3a53ec8fa9d4de0c1520f646842533be seamonkey-1.0.2-0.1.0.EL3.ia64.rpm
5248d87146f0e76cd2ec0e618b6cb928 seamonkey-chat-1.0.2-0.1.0.EL3.ia64.rpm
ffc055bae0d9db603a20b24a57f543c4 seamonkey-debuginfo-1.0.2-0.1.0.EL3.i386.rpm
5d7c4bdc79c057f18d5403102a801cdb seamonkey-debuginfo-1.0.2-0.1.0.EL3.ia64.rpm
d2eaa475714186132a69acc3f30bee43 seamonkey-devel-1.0.2-0.1.0.EL3.ia64.rpm
9f1024744a669ff06aabf64db507430a seamonkey-dom-inspector-1.0.2-0.1.0.EL3.ia64.rpm
af2c3b36524f43659f1cba3c7d76a917 seamonkey-js-debugger-1.0.2-0.1.0.EL3.ia64.rpm
c5ada6f5c1f0cb073e64b3cd638972a5 seamonkey-mail-1.0.2-0.1.0.EL3.ia64.rpm
db283c25140cc695d782bae05e30ae87 seamonkey-nspr-1.0.2-0.1.0.EL3.i386.rpm
604575dd5d1819600a7c84c1755f103c seamonkey-nspr-1.0.2-0.1.0.EL3.ia64.rpm
e7093e53153651f2c501f68f6466618e seamonkey-nspr-devel-1.0.2-0.1.0.EL3.ia64.rpm
ed2537362625184a74b04614f93c6c3c seamonkey-nss-1.0.2-0.1.0.EL3.i386.rpm
9bed60cdd1e3d2a1dc5817f7b4f6070e seamonkey-nss-1.0.2-0.1.0.EL3.ia64.rpm
c9308271dd16088fd21a191782ef2758 seamonkey-nss-devel-1.0.2-0.1.0.EL3.ia64.rpm

x86_64:
cd2ed103ee013ca0b41987baf48dc6be seamonkey-1.0.2-0.1.0.EL3.i386.rpm
2e860fe38f090f5c68b9f04ac0d4357d seamonkey-1.0.2-0.1.0.EL3.x86_64.rpm
2a108e026bf9266162279d183954c4e2 seamonkey-chat-1.0.2-0.1.0.EL3.x86_64.rpm
ffc055bae0d9db603a20b24a57f543c4 seamonkey-debuginfo-1.0.2-0.1.0.EL3.i386.rpm
dec96a2e7cdacb8cc9c900f40d86635a seamonkey-debuginfo-1.0.2-0.1.0.EL3.x86_64.rpm
df2a0566ad96e13620e9d6c3d4114150 seamonkey-devel-1.0.2-0.1.0.EL3.x86_64.rpm
1f55d411d82759ce71ef1bee4c1a4f61 seamonkey-dom-inspector-1.0.2-0.1.0.EL3.x86_64.rpm
b4f0dd224f293363a1bc41e34d8a1c23 seamonkey-js-debugger-1.0.2-0.1.0.EL3.x86_64.rpm
c8ef05e371be6ac1ca3338ac9ade1c64 seamonkey-mail-1.0.2-0.1.0.EL3.x86_64.rpm
db283c25140cc695d782bae05e30ae87 seamonkey-nspr-1.0.2-0.1.0.EL3.i386.rpm
da40e1ac22751c1df8368d313618bea6 seamonkey-nspr-1.0.2-0.1.0.EL3.x86_64.rpm
b0ae6e9b45458a80eeee64722912af59 seamonkey-nspr-devel-1.0.2-0.1.0.EL3.x86_64.rpm
ed2537362625184a74b04614f93c6c3c seamonkey-nss-1.0.2-0.1.0.EL3.i386.rpm
c070487b616f51572d978bc7cd1c3673 seamonkey-nss-1.0.2-0.1.0.EL3.x86_64.rpm
45072a8cf4a7630f4ab39b45fde85608 seamonkey-nss-devel-1.0.2-0.1.0.EL3.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/seamonkey-1.0.2-0.1.0.EL3.src.rpm
e7f42fee596ad457febe242c64bd5787 seamonkey-1.0.2-0.1.0.EL3.src.rpm

i386:
cd2ed103ee013ca0b41987baf48dc6be seamonkey-1.0.2-0.1.0.EL3.i386.rpm
0107a05bf5bf3cd9e5b871aa52e94f02 seamonkey-chat-1.0.2-0.1.0.EL3.i386.rpm
ffc055bae0d9db603a20b24a57f543c4 seamonkey-debuginfo-1.0.2-0.1.0.EL3.i386.rpm
cb8e2e0b35f45625fec39d28af1cb6d1 seamonkey-devel-1.0.2-0.1.0.EL3.i386.rpm
d8bf06ddf59a8c26fe176c98b249cf52 seamonkey-dom-inspector-1.0.2-0.1.0.EL3.i386.rpm
84ec6859df530a8ea6c1a71b5e9c5369 seamonkey-js-debugger-1.0.2-0.1.0.EL3.i386.rpm
546ce0126786d8dad69cd3d682301556 seamonkey-mail-1.0.2-0.1.0.EL3.i386.rpm
db283c25140cc695d782bae05e30ae87 seamonkey-nspr-1.0.2-0.1.0.EL3.i386.rpm
ad831a228128e9e7681b3447aa20ef52 seamonkey-nspr-devel-1.0.2-0.1.0.EL3.i386.rpm
ed2537362625184a74b04614f93c6c3c seamonkey-nss-1.0.2-0.1.0.EL3.i386.rpm
4ddfa278b3a2ce52f4ec4c13ae8e7d10 seamonkey-nss-devel-1.0.2-0.1.0.EL3.i386.rpm

ia64:
3a53ec8fa9d4de0c1520f646842533be seamonkey-1.0.2-0.1.0.EL3.ia64.rpm
5248d87146f0e76cd2ec0e618b6cb928 seamonkey-chat-1.0.2-0.1.0.EL3.ia64.rpm
ffc055bae0d9db603a20b24a57f543c4 seamonkey-debuginfo-1.0.2-0.1.0.EL3.i386.rpm
5d7c4bdc79c057f18d5403102a801cdb seamonkey-debuginfo-1.0.2-0.1.0.EL3.ia64.rpm
d2eaa475714186132a69acc3f30bee43 seamonkey-devel-1.0.2-0.1.0.EL3.ia64.rpm
9f1024744a669ff06aabf64db507430a seamonkey-dom-inspector-1.0.2-0.1.0.EL3.ia64.rpm
af2c3b36524f43659f1cba3c7d76a917 seamonkey-js-debugger-1.0.2-0.1.0.EL3.ia64.rpm
c5ada6f5c1f0cb073e64b3cd638972a5 seamonkey-mail-1.0.2-0.1.0.EL3.ia64.rpm
db283c25140cc695d782bae05e30ae87 seamonkey-nspr-1.0.2-0.1.0.EL3.i386.rpm
604575dd5d1819600a7c84c1755f103c seamonkey-nspr-1.0.2-0.1.0.EL3.ia64.rpm
e7093e53153651f2c501f68f6466618e seamonkey-nspr-devel-1.0.2-0.1.0.EL3.ia64.rpm
ed2537362625184a74b04614f93c6c3c seamonkey-nss-1.0.2-0.1.0.EL3.i386.rpm
9bed60cdd1e3d2a1dc5817f7b4f6070e seamonkey-nss-1.0.2-0.1.0.EL3.ia64.rpm
c9308271dd16088fd21a191782ef2758 seamonkey-nss-devel-1.0.2-0.1.0.EL3.ia64.rpm

x86_64:
cd2ed103ee013ca0b41987baf48dc6be seamonkey-1.0.2-0.1.0.EL3.i386.rpm
2e860fe38f090f5c68b9f04ac0d4357d seamonkey-1.0.2-0.1.0.EL3.x86_64.rpm
2a108e026bf9266162279d183954c4e2 seamonkey-chat-1.0.2-0.1.0.EL3.x86_64.rpm
ffc055bae0d9db603a20b24a57f543c4 seamonkey-debuginfo-1.0.2-0.1.0.EL3.i386.rpm
dec96a2e7cdacb8cc9c900f40d86635a seamonkey-debuginfo-1.0.2-0.1.0.EL3.x86_64.rpm
df2a0566ad96e13620e9d6c3d4114150 seamonkey-devel-1.0.2-0.1.0.EL3.x86_64.rpm
1f55d411d82759ce71ef1bee4c1a4f61 seamonkey-dom-inspector-1.0.2-0.1.0.EL3.x86_64.rpm
b4f0dd224f293363a1bc41e34d8a1c23 seamonkey-js-debugger-1.0.2-0.1.0.EL3.x86_64.rpm
c8ef05e371be6ac1ca3338ac9ade1c64 seamonkey-mail-1.0.2-0.1.0.EL3.x86_64.rpm
db283c25140cc695d782bae05e30ae87 seamonkey-nspr-1.0.2-0.1.0.EL3.i386.rpm
da40e1ac22751c1df8368d313618bea6 seamonkey-nspr-1.0.2-0.1.0.EL3.x86_64.rpm
b0ae6e9b45458a80eeee64722912af59 seamonkey-nspr-devel-1.0.2-0.1.0.EL3.x86_64.rpm
ed2537362625184a74b04614f93c6c3c seamonkey-nss-1.0.2-0.1.0.EL3.i386.rpm
c070487b616f51572d978bc7cd1c3673 seamonkey-nss-1.0.2-0.1.0.EL3.x86_64.rpm
45072a8cf4a7630f4ab39b45fde85608 seamonkey-nss-devel-1.0.2-0.1.0.EL3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2788
http://www.redhat.com/security/updates/classification/#critical

8. Contact:

The Red Hat security contact is lt;secalert@redhat.comgt;. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFEv4pQXlSAg2UNWIIRAn/PAKCKtIn2+3WIa8v20D3hhIYxYC3hbACePmBV
LKRJI+9klxRMhG8FBbgHPaM=
=EQcr
-----END PGP SIGNATURE-----



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/rhsa_20060578_01_critical_seamonkey_security_update_was_mozilla.html)