Red Hat 8873 Published by

Updated Mozilla packages has been released for Red Hat Enterprise Linux

---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated mozilla packages fix security issues
Advisory ID: RHSA-2004:421-01
Issue date: 2004-08-04
Updated on: 2004-08-04
Product: Red Hat Enterprise Linux
CVE Names: CAN-2004-0597 CAN-2004-0599 CAN-2004-0718 CAN-2004-0722 CAN-2004-0757 CAN-2004-0758 CAN-2004-0759 CAN-2004-0760 CAN-2004-0761 CAN-2004-0762 CAN-2004-0763 CAN-2004-0764 CAN-2004-0765
----------------------------------------------------------------------

1. Summary:

Updated mozilla packages based on version 1.4.3 that fix a number of security issues for Red Hat Enterprise Linux are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64



3. Problem description:

Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor.

A number of flaws have been found in Mozilla 1.4 that have been fixed in the Mozilla 1.4.3 release:

Zen Parse reported improper input validation to the SOAPParameter object constructor leading to an integer overflow and controllable heap corruption. Malicious JavaScript could be written to utilize this flaw and could allow arbitrary code execution. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0722 to this issue.

During a source code audit, Chris Evans discovered a buffer overflow andinteger overflows which affect the libpng code inside Mozilla. An attacker could create a carefully crafted PNG file in such a way that it would cause Mozilla to crash or execute arbitrary code when the image was viewed. (CAN-2004-0597, CAN-2004-0599)

Zen Parse reported a flaw in the POP3 capability. A malicious POP3 server could send a carefully crafted response that would cause a heap overflow and potentially allow execution of arbitrary code as the user running Mozilla. (CAN-2004-0757)

Marcel Boesch found a flaw that allows a CA certificate to be imported with a DN the same as that of the built-in CA root certificates, which can cause a denial of service to SSL pages, as the malicious certificate is treated as invalid. (CAN-2004-0758)

Met - Martin Hassman reported a flaw in Mozilla that could allow malicious Javascript code to upload local files from a users machine without requiring confirmation. (CAN-2004-0759)

Mindlock Security reported a flaw in ftp URI handling. By using a NULL character (%00) in a ftp URI, Mozilla can be confused into opening a resource as a different MIME type. (CAN-2004-0760)

Mozilla does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates website spoofing and other attacks, also known as the frame injection vulnerability. (CAN-2004-0718)

Tolga Tarhan reported a flaw that can allow a malicious webpage to use a redirect sequence to spoof the security lock icon that makes a webpage appear to be encrypted. (CAN-2004-0761)

Jesse Ruderman reported a security issue that affects a number of browsers including Mozilla that could allow malicious websites to install arbitrary extensions by using interactive events to manipulate the XPInstall Security dialog box. (CAN-2004-0762)

Emmanouel Kellinis discovered a caching flaw in Mozilla which allows malicious websites to spoof certificates of trusted websites via redirects and Javascript that uses the "onunload" method. (CAN-2004-0763)

Mozilla allowed malicious websites to hijack the user interface via the "chrome" flag and XML User Interface Language (XUL) files. (CAN-2004-0764)

The cert_TestHostName function in Mozilla only checks the hostname portion of a certificate when the hostname portion of the URI is not a fully qualified domain name (FQDN). This flaw could be used for spoofing if an attacker had control of machines on a default DNS search path. (CAN-2004-0765)

All users are advised to update to these erratum packages which contain a snapshot of Mozilla 1.4.3 including backported fixes and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):

127338 - CAN-2004-0718 frame injection (spoofing) vuln in Mozilla before 1.7
127186 - CAN-2004-0758 Overriding built-in certificate leading to error -8182 (DoS), especially exploitable by email

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/galeon-1.2.13-3.2.1.src.rpm
7e094aa0324b56f4fba3ede27ae1b19b galeon-1.2.13-3.2.1.src.rpm
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/mozilla-1.4.3-2.1.2.src.rpm
66fcc1e820208b3024de369469250df5 mozilla-1.4.3-2.1.2.src.rpm

i386:
d170284b6a6d01f85ee974bb6c984390 galeon-1.2.13-3.2.1.i386.rpm
57a81a30a9d79e77adec334f96e7cea9 mozilla-1.4.3-2.1.2.i386.rpm
fa6d63828129887e1cc3c42df47e4190 mozilla-chat-1.4.3-2.1.2.i386.rpm
b13cb1114fa16a75fd81c6cb504db17e mozilla-devel-1.4.3-2.1.2.i386.rpm
9d4714cbd6c2077efa557430b8b89b63 mozilla-dom-inspector-1.4.3-2.1.2.i386.rpm
01686edf59fa5945b8f9ae69fa4ac5c0 mozilla-js-debugger-1.4.3-2.1.2.i386.rpm
623213465b181f6fb14698e73f9a6a89 mozilla-mail-1.4.3-2.1.2.i386.rpm
68cb569585436ce430c4aee335c01d4e mozilla-nspr-1.4.3-2.1.2.i386.rpm
3c4e08b8106d4718c30fcf06e7633abc mozilla-nspr-devel-1.4.3-2.1.2.i386.rpm
494563d83a7b6a77642c73986d50092c mozilla-nss-1.4.3-2.1.2.i386.rpm
fb6f0a11c5312f7822055f45c35435f2 mozilla-nss-devel-1.4.3-2.1.2.i386.rpm

ia64:
e13f36d06fa5714337e074fca3a7a211 galeon-1.2.13-3.2.1.ia64.rpm
7841dd11df85a69d6e03a3c4730e987c mozilla-1.4.3-2.1.2.ia64.rpm
b022a33b0ad1715f363b8e2be245e704 mozilla-chat-1.4.3-2.1.2.ia64.rpm
73599c671b8d07d86a82ae4006aeb184 mozilla-devel-1.4.3-2.1.2.ia64.rpm
bb57be095e37a959e8a9216820dd2fd9 mozilla-dom-inspector-1.4.3-2.1.2.ia64.rpm
0879b99da78ee8393577ca3b17c3c95c mozilla-js-debugger-1.4.3-2.1.2.ia64.rpm
c018093969ef4ae1e26f203a67e74d87 mozilla-mail-1.4.3-2.1.2.ia64.rpm
e1fe8f1eeff222e7d1cd35d305a20e4d mozilla-nspr-1.4.3-2.1.2.ia64.rpm
93e2cac5380515450b5201ef082fe427 mozilla-nspr-devel-1.4.3-2.1.2.ia64.rpm
afe930bc2c9d6174754b79d9119bc77d mozilla-nss-1.4.3-2.1.2.ia64.rpm
1413ffceb82030a07863e79917c8d3ea mozilla-nss-devel-1.4.3-2.1.2.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/galeon-1.2.13-3.2.1.src.rpm
7e094aa0324b56f4fba3ede27ae1b19b galeon-1.2.13-3.2.1.src.rpm
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/mozilla-1.4.3-2.1.2.src.rpm
66fcc1e820208b3024de369469250df5 mozilla-1.4.3-2.1.2.src.rpm

ia64:
e13f36d06fa5714337e074fca3a7a211 galeon-1.2.13-3.2.1.ia64.rpm
7841dd11df85a69d6e03a3c4730e987c mozilla-1.4.3-2.1.2.ia64.rpm
b022a33b0ad1715f363b8e2be245e704 mozilla-chat-1.4.3-2.1.2.ia64.rpm
73599c671b8d07d86a82ae4006aeb184 mozilla-devel-1.4.3-2.1.2.ia64.rpm
bb57be095e37a959e8a9216820dd2fd9 mozilla-dom-inspector-1.4.3-2.1.2.ia64.rpm
0879b99da78ee8393577ca3b17c3c95c mozilla-js-debugger-1.4.3-2.1.2.ia64.rpm
c018093969ef4ae1e26f203a67e74d87 mozilla-mail-1.4.3-2.1.2.ia64.rpm
e1fe8f1eeff222e7d1cd35d305a20e4d mozilla-nspr-1.4.3-2.1.2.ia64.rpm
93e2cac5380515450b5201ef082fe427 mozilla-nspr-devel-1.4.3-2.1.2.ia64.rpm
afe930bc2c9d6174754b79d9119bc77d mozilla-nss-1.4.3-2.1.2.ia64.rpm
1413ffceb82030a07863e79917c8d3ea mozilla-nss-devel-1.4.3-2.1.2.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/galeon-1.2.13-3.2.1.src.rpm
7e094aa0324b56f4fba3ede27ae1b19b galeon-1.2.13-3.2.1.src.rpm
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/mozilla-1.4.3-2.1.2.src.rpm
66fcc1e820208b3024de369469250df5 mozilla-1.4.3-2.1.2.src.rpm

i386:
d170284b6a6d01f85ee974bb6c984390 galeon-1.2.13-3.2.1.i386.rpm
57a81a30a9d79e77adec334f96e7cea9 mozilla-1.4.3-2.1.2.i386.rpm
fa6d63828129887e1cc3c42df47e4190 mozilla-chat-1.4.3-2.1.2.i386.rpm
b13cb1114fa16a75fd81c6cb504db17e mozilla-devel-1.4.3-2.1.2.i386.rpm
9d4714cbd6c2077efa557430b8b89b63 mozilla-dom-inspector-1.4.3-2.1.2.i386.rpm
01686edf59fa5945b8f9ae69fa4ac5c0 mozilla-js-debugger-1.4.3-2.1.2.i386.rpm
623213465b181f6fb14698e73f9a6a89 mozilla-mail-1.4.3-2.1.2.i386.rpm
68cb569585436ce430c4aee335c01d4e mozilla-nspr-1.4.3-2.1.2.i386.rpm
3c4e08b8106d4718c30fcf06e7633abc mozilla-nspr-devel-1.4.3-2.1.2.i386.rpm
494563d83a7b6a77642c73986d50092c mozilla-nss-1.4.3-2.1.2.i386.rpm
fb6f0a11c5312f7822055f45c35435f2 mozilla-nss-devel-1.4.3-2.1.2.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/galeon-1.2.13-3.2.1.src.rpm
7e094aa0324b56f4fba3ede27ae1b19b galeon-1.2.13-3.2.1.src.rpm
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/mozilla-1.4.3-2.1.2.src.rpm
66fcc1e820208b3024de369469250df5 mozilla-1.4.3-2.1.2.src.rpm

i386:
d170284b6a6d01f85ee974bb6c984390 galeon-1.2.13-3.2.1.i386.rpm
57a81a30a9d79e77adec334f96e7cea9 mozilla-1.4.3-2.1.2.i386.rpm
fa6d63828129887e1cc3c42df47e4190 mozilla-chat-1.4.3-2.1.2.i386.rpm
b13cb1114fa16a75fd81c6cb504db17e mozilla-devel-1.4.3-2.1.2.i386.rpm
9d4714cbd6c2077efa557430b8b89b63 mozilla-dom-inspector-1.4.3-2.1.2.i386.rpm
01686edf59fa5945b8f9ae69fa4ac5c0 mozilla-js-debugger-1.4.3-2.1.2.i386.rpm
623213465b181f6fb14698e73f9a6a89 mozilla-mail-1.4.3-2.1.2.i386.rpm
68cb569585436ce430c4aee335c01d4e mozilla-nspr-1.4.3-2.1.2.i386.rpm
3c4e08b8106d4718c30fcf06e7633abc mozilla-nspr-devel-1.4.3-2.1.2.i386.rpm
494563d83a7b6a77642c73986d50092c mozilla-nss-1.4.3-2.1.2.i386.rpm
fb6f0a11c5312f7822055f45c35435f2 mozilla-nss-devel-1.4.3-2.1.2.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/mozilla-1.4.3-3.0.2.src.rpm
a8fef126836c7ea73c80ac7e2792e142 mozilla-1.4.3-3.0.2.src.rpm

i386:
76e94d5ea03f131a723c97207297ee1b mozilla-1.4.3-3.0.2.i386.rpm
75c2959a065a6b6ae8c90b56165e43a6 mozilla-chat-1.4.3-3.0.2.i386.rpm
6c90c0a77bdbee2cb0d84be83fead1b1 mozilla-devel-1.4.3-3.0.2.i386.rpm
58b9cfad95dfc69d1e0d80a23f383ad4 mozilla-dom-inspector-1.4.3-3.0.2.i386.rpm
431ed1323ae5217a0b31dc1f1bcca1bd mozilla-js-debugger-1.4.3-3.0.2.i386.rpm
3a95aa702f1cc2205c10b957c3fd452e mozilla-mail-1.4.3-3.0.2.i386.rpm
2877a54a8c7a2de5fe58b39ee626d214 mozilla-nspr-1.4.3-3.0.2.i386.rpm
46ccae94f0269a2b92d2b4a5d5dcd480 mozilla-nspr-devel-1.4.3-3.0.2.i386.rpm
545d3867e6077c15f64aa5ee192c8d43 mozilla-nss-1.4.3-3.0.2.i386.rpm
f3fccea16c2bed1be5038399d0c42bad mozilla-nss-devel-1.4.3-3.0.2.i386.rpm

ia64:
7493acb019f4cc706b6cf952444a975a mozilla-1.4.3-3.0.2.ia64.rpm
542bb7e67ff4eba5ed228e5db5a78f25 mozilla-chat-1.4.3-3.0.2.ia64.rpm
d5cbf0f7c03d71ed0c51a27430fe7f60 mozilla-devel-1.4.3-3.0.2.ia64.rpm
049bbde10a886f65d539579a311a24af mozilla-dom-inspector-1.4.3-3.0.2.ia64.rpm
1c96bbc0bbbf649e3a851b0295694847 mozilla-js-debugger-1.4.3-3.0.2.ia64.rpm
cea7a67877727f4436ac554408db7832 mozilla-mail-1.4.3-3.0.2.ia64.rpm
28047d1dd3264f882f9c4f8a7b628910 mozilla-nspr-1.4.3-3.0.2.ia64.rpm
a903c680602a74dd0feaeb12b6cc32ec mozilla-nspr-devel-1.4.3-3.0.2.ia64.rpm
d3ff697bca53a52fe164614d77432046 mozilla-nss-1.4.3-3.0.2.ia64.rpm
7cd4e05706eb4b4b57f5eca3f1bc470f mozilla-nss-devel-1.4.3-3.0.2.ia64.rpm

ppc:
e2d78f6aac22bfbcb825867dbac82ebb mozilla-1.4.3-3.0.2.ppc.rpm
b61167a98f8673f8f3f03ae28a50bc92 mozilla-chat-1.4.3-3.0.2.ppc.rpm
d0fb8b199c689e7c8b214f3e0ec962c3 mozilla-devel-1.4.3-3.0.2.ppc.rpm
53a571868dad0c9d3672013fb406570a mozilla-dom-inspector-1.4.3-3.0.2.ppc.rpm
734e3f74f8592e2fd94e2dd257e01095 mozilla-js-debugger-1.4.3-3.0.2.ppc.rpm
82ac07ab7ef497194c65f7251cb62e33 mozilla-mail-1.4.3-3.0.2.ppc.rpm
398540c49c50030cbad5b4b9e96c783b mozilla-nspr-1.4.3-3.0.2.ppc.rpm
d022b91ac348e6077625be5dc83b35dc mozilla-nspr-devel-1.4.3-3.0.2.ppc.rpm
271be6a6ba49964733a28e0dc9f07378 mozilla-nss-1.4.3-3.0.2.ppc.rpm
ce1b77ddb74d136ec38330cc11b7f54d mozilla-nss-devel-1.4.3-3.0.2.ppc.rpm

s390:
19ad37a2396c2776175d0e59662a7652 mozilla-1.4.3-3.0.2.s390.rpm
4baac171cf9ba457f1c3faf8f03b88cf mozilla-chat-1.4.3-3.0.2.s390.rpm
2ec9bd8e61073a3f6056e9cecc419ba3 mozilla-devel-1.4.3-3.0.2.s390.rpm
32a1d2e1c29ea3b094f35164710cfc0e mozilla-dom-inspector-1.4.3-3.0.2.s390.rpm
8e977a243825a35ee77e22ed651bd499 mozilla-js-debugger-1.4.3-3.0.2.s390.rpm
e4afa3661f104caa24079761af089dbb mozilla-mail-1.4.3-3.0.2.s390.rpm
18f0e4b19190656df0eab0c98121a067 mozilla-nspr-1.4.3-3.0.2.s390.rpm
cf3ac9649c38000fca54d319d546e298 mozilla-nspr-devel-1.4.3-3.0.2.s390.rpm
695903fa5cbe21f7aa7e54fca237bcc0 mozilla-nss-1.4.3-3.0.2.s390.rpm
3d50c59229138d886971374d92d2927c mozilla-nss-devel-1.4.3-3.0.2.s390.rpm

s390x:
d7b8a517df946cc4e1872468882eb28d mozilla-1.4.3-3.0.2.s390x.rpm
79bf2338e9d3c6e3835137ba58db84b8 mozilla-chat-1.4.3-3.0.2.s390x.rpm
c88a798cf6b3143d98e7ea35d7e4c463 mozilla-devel-1.4.3-3.0.2.s390x.rpm
b76f9cc6c0c17568799c06630b6b66c9 mozilla-dom-inspector-1.4.3-3.0.2.s390x.rpm
ced9955739e509de217dab3e193b603d mozilla-js-debugger-1.4.3-3.0.2.s390x.rpm
a360c8ef42f27b4b19cd4447833cd6a7 mozilla-mail-1.4.3-3.0.2.s390x.rpm
8bba98c72a31e16541f9a34b6cfd4f8c mozilla-nspr-1.4.3-3.0.2.s390x.rpm
0870ce645aab9d015c68921ebee5fa1a mozilla-nspr-devel-1.4.3-3.0.2.s390x.rpm
82f324eb81988b15db97cc44bcc187f8 mozilla-nss-1.4.3-3.0.2.s390x.rpm
e95e7faa635d02ce0be4f3b019dc106a mozilla-nss-devel-1.4.3-3.0.2.s390x.rpm

x86_64:
809d992f5b8de1d8d2929d853b01069a mozilla-1.4.3-3.0.2.x86_64.rpm
0c4b1fd1560188277950e7df67e0c1a5 mozilla-chat-1.4.3-3.0.2.x86_64.rpm
353be79ae25e35d1768f98c21fba07b0 mozilla-devel-1.4.3-3.0.2.x86_64.rpm
6f29bdc0c13bdf52db9103d979eb0a19 mozilla-dom-inspector-1.4.3-3.0.2.x86_64.rpm
ea25530cfeb09b9ddb2fdcd4f270b9b4 mozilla-js-debugger-1.4.3-3.0.2.x86_64.rpm
86ed3c2207a0745275720a87520cf249 mozilla-mail-1.4.3-3.0.2.x86_64.rpm
caf8df9aa11bf0eed5d3ca3ee4d4c3fe mozilla-nspr-1.4.3-3.0.2.x86_64.rpm
a061fd746ad180573d640051e2cf0f92 mozilla-nspr-devel-1.4.3-3.0.2.x86_64.rpm
4139bc49b0a141edac659b62a27c7322 mozilla-nss-1.4.3-3.0.2.x86_64.rpm
9df3f9b35276f8c0bb54f3a45a994668 mozilla-nss-devel-1.4.3-3.0.2.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/mozilla-1.4.3-3.0.2.src.rpm
a8fef126836c7ea73c80ac7e2792e142 mozilla-1.4.3-3.0.2.src.rpm

i386:
76e94d5ea03f131a723c97207297ee1b mozilla-1.4.3-3.0.2.i386.rpm
75c2959a065a6b6ae8c90b56165e43a6 mozilla-chat-1.4.3-3.0.2.i386.rpm
6c90c0a77bdbee2cb0d84be83fead1b1 mozilla-devel-1.4.3-3.0.2.i386.rpm
58b9cfad95dfc69d1e0d80a23f383ad4 mozilla-dom-inspector-1.4.3-3.0.2.i386.rpm
431ed1323ae5217a0b31dc1f1bcca1bd mozilla-js-debugger-1.4.3-3.0.2.i386.rpm
3a95aa702f1cc2205c10b957c3fd452e mozilla-mail-1.4.3-3.0.2.i386.rpm
2877a54a8c7a2de5fe58b39ee626d214 mozilla-nspr-1.4.3-3.0.2.i386.rpm
46ccae94f0269a2b92d2b4a5d5dcd480 mozilla-nspr-devel-1.4.3-3.0.2.i386.rpm
545d3867e6077c15f64aa5ee192c8d43 mozilla-nss-1.4.3-3.0.2.i386.rpm
f3fccea16c2bed1be5038399d0c42bad mozilla-nss-devel-1.4.3-3.0.2.i386.rpm

x86_64:
809d992f5b8de1d8d2929d853b01069a mozilla-1.4.3-3.0.2.x86_64.rpm
0c4b1fd1560188277950e7df67e0c1a5 mozilla-chat-1.4.3-3.0.2.x86_64.rpm
353be79ae25e35d1768f98c21fba07b0 mozilla-devel-1.4.3-3.0.2.x86_64.rpm
6f29bdc0c13bdf52db9103d979eb0a19 mozilla-dom-inspector-1.4.3-3.0.2.x86_64.rpm
ea25530cfeb09b9ddb2fdcd4f270b9b4 mozilla-js-debugger-1.4.3-3.0.2.x86_64.rpm
86ed3c2207a0745275720a87520cf249 mozilla-mail-1.4.3-3.0.2.x86_64.rpm
caf8df9aa11bf0eed5d3ca3ee4d4c3fe mozilla-nspr-1.4.3-3.0.2.x86_64.rpm
a061fd746ad180573d640051e2cf0f92 mozilla-nspr-devel-1.4.3-3.0.2.x86_64.rpm
4139bc49b0a141edac659b62a27c7322 mozilla-nss-1.4.3-3.0.2.x86_64.rpm
9df3f9b35276f8c0bb54f3a45a994668 mozilla-nss-devel-1.4.3-3.0.2.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/mozilla-1.4.3-3.0.2.src.rpm
a8fef126836c7ea73c80ac7e2792e142 mozilla-1.4.3-3.0.2.src.rpm

i386:
76e94d5ea03f131a723c97207297ee1b mozilla-1.4.3-3.0.2.i386.rpm
75c2959a065a6b6ae8c90b56165e43a6 mozilla-chat-1.4.3-3.0.2.i386.rpm
6c90c0a77bdbee2cb0d84be83fead1b1 mozilla-devel-1.4.3-3.0.2.i386.rpm
58b9cfad95dfc69d1e0d80a23f383ad4 mozilla-dom-inspector-1.4.3-3.0.2.i386.rpm
431ed1323ae5217a0b31dc1f1bcca1bd mozilla-js-debugger-1.4.3-3.0.2.i386.rpm
3a95aa702f1cc2205c10b957c3fd452e mozilla-mail-1.4.3-3.0.2.i386.rpm
2877a54a8c7a2de5fe58b39ee626d214 mozilla-nspr-1.4.3-3.0.2.i386.rpm
46ccae94f0269a2b92d2b4a5d5dcd480 mozilla-nspr-devel-1.4.3-3.0.2.i386.rpm
545d3867e6077c15f64aa5ee192c8d43 mozilla-nss-1.4.3-3.0.2.i386.rpm
f3fccea16c2bed1be5038399d0c42bad mozilla-nss-devel-1.4.3-3.0.2.i386.rpm

ia64:
7493acb019f4cc706b6cf952444a975a mozilla-1.4.3-3.0.2.ia64.rpm
542bb7e67ff4eba5ed228e5db5a78f25 mozilla-chat-1.4.3-3.0.2.ia64.rpm
d5cbf0f7c03d71ed0c51a27430fe7f60 mozilla-devel-1.4.3-3.0.2.ia64.rpm
049bbde10a886f65d539579a311a24af mozilla-dom-inspector-1.4.3-3.0.2.ia64.rpm
1c96bbc0bbbf649e3a851b0295694847 mozilla-js-debugger-1.4.3-3.0.2.ia64.rpm
cea7a67877727f4436ac554408db7832 mozilla-mail-1.4.3-3.0.2.ia64.rpm
28047d1dd3264f882f9c4f8a7b628910 mozilla-nspr-1.4.3-3.0.2.ia64.rpm
a903c680602a74dd0feaeb12b6cc32ec mozilla-nspr-devel-1.4.3-3.0.2.ia64.rpm
d3ff697bca53a52fe164614d77432046 mozilla-nss-1.4.3-3.0.2.ia64.rpm
7cd4e05706eb4b4b57f5eca3f1bc470f mozilla-nss-devel-1.4.3-3.0.2.ia64.rpm

x86_64:
809d992f5b8de1d8d2929d853b01069a mozilla-1.4.3-3.0.2.x86_64.rpm
0c4b1fd1560188277950e7df67e0c1a5 mozilla-chat-1.4.3-3.0.2.x86_64.rpm
353be79ae25e35d1768f98c21fba07b0 mozilla-devel-1.4.3-3.0.2.x86_64.rpm
6f29bdc0c13bdf52db9103d979eb0a19 mozilla-dom-inspector-1.4.3-3.0.2.x86_64.rpm
ea25530cfeb09b9ddb2fdcd4f270b9b4 mozilla-js-debugger-1.4.3-3.0.2.x86_64.rpm
86ed3c2207a0745275720a87520cf249 mozilla-mail-1.4.3-3.0.2.x86_64.rpm
caf8df9aa11bf0eed5d3ca3ee4d4c3fe mozilla-nspr-1.4.3-3.0.2.x86_64.rpm
a061fd746ad180573d640051e2cf0f92 mozilla-nspr-devel-1.4.3-3.0.2.x86_64.rpm
4139bc49b0a141edac659b62a27c7322 mozilla-nss-1.4.3-3.0.2.x86_64.rpm
9df3f9b35276f8c0bb54f3a45a994668 mozilla-nss-devel-1.4.3-3.0.2.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/mozilla-1.4.3-3.0.2.src.rpm
a8fef126836c7ea73c80ac7e2792e142 mozilla-1.4.3-3.0.2.src.rpm

i386:
76e94d5ea03f131a723c97207297ee1b mozilla-1.4.3-3.0.2.i386.rpm
75c2959a065a6b6ae8c90b56165e43a6 mozilla-chat-1.4.3-3.0.2.i386.rpm
6c90c0a77bdbee2cb0d84be83fead1b1 mozilla-devel-1.4.3-3.0.2.i386.rpm
58b9cfad95dfc69d1e0d80a23f383ad4 mozilla-dom-inspector-1.4.3-3.0.2.i386.rpm
431ed1323ae5217a0b31dc1f1bcca1bd mozilla-js-debugger-1.4.3-3.0.2.i386.rpm
3a95aa702f1cc2205c10b957c3fd452e mozilla-mail-1.4.3-3.0.2.i386.rpm
2877a54a8c7a2de5fe58b39ee626d214 mozilla-nspr-1.4.3-3.0.2.i386.rpm
46ccae94f0269a2b92d2b4a5d5dcd480 mozilla-nspr-devel-1.4.3-3.0.2.i386.rpm
545d3867e6077c15f64aa5ee192c8d43 mozilla-nss-1.4.3-3.0.2.i386.rpm
f3fccea16c2bed1be5038399d0c42bad mozilla-nss-devel-1.4.3-3.0.2.i386.rpm

ia64:
7493acb019f4cc706b6cf952444a975a mozilla-1.4.3-3.0.2.ia64.rpm
542bb7e67ff4eba5ed228e5db5a78f25 mozilla-chat-1.4.3-3.0.2.ia64.rpm
d5cbf0f7c03d71ed0c51a27430fe7f60 mozilla-devel-1.4.3-3.0.2.ia64.rpm
049bbde10a886f65d539579a311a24af mozilla-dom-inspector-1.4.3-3.0.2.ia64.rpm
1c96bbc0bbbf649e3a851b0295694847 mozilla-js-debugger-1.4.3-3.0.2.ia64.rpm
cea7a67877727f4436ac554408db7832 mozilla-mail-1.4.3-3.0.2.ia64.rpm
28047d1dd3264f882f9c4f8a7b628910 mozilla-nspr-1.4.3-3.0.2.ia64.rpm
a903c680602a74dd0feaeb12b6cc32ec mozilla-nspr-devel-1.4.3-3.0.2.ia64.rpm
d3ff697bca53a52fe164614d77432046 mozilla-nss-1.4.3-3.0.2.ia64.rpm
7cd4e05706eb4b4b57f5eca3f1bc470f mozilla-nss-devel-1.4.3-3.0.2.ia64.rpm

x86_64:
809d992f5b8de1d8d2929d853b01069a mozilla-1.4.3-3.0.2.x86_64.rpm
0c4b1fd1560188277950e7df67e0c1a5 mozilla-chat-1.4.3-3.0.2.x86_64.rpm
353be79ae25e35d1768f98c21fba07b0 mozilla-devel-1.4.3-3.0.2.x86_64.rpm
6f29bdc0c13bdf52db9103d979eb0a19 mozilla-dom-inspector-1.4.3-3.0.2.x86_64.rpm
ea25530cfeb09b9ddb2fdcd4f270b9b4 mozilla-js-debugger-1.4.3-3.0.2.x86_64.rpm
86ed3c2207a0745275720a87520cf249 mozilla-mail-1.4.3-3.0.2.x86_64.rpm
caf8df9aa11bf0eed5d3ca3ee4d4c3fe mozilla-nspr-1.4.3-3.0.2.x86_64.rpm
a061fd746ad180573d640051e2cf0f92 mozilla-nspr-devel-1.4.3-3.0.2.x86_64.rpm
4139bc49b0a141edac659b62a27c7322 mozilla-nss-1.4.3-3.0.2.x86_64.rpm
9df3f9b35276f8c0bb54f3a45a994668 mozilla-nss-devel-1.4.3-3.0.2.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package

7. References:

http://bugzilla.mozilla.org/show_bug.cgi?id=236618
http://bugzilla.mozilla.org/show_bug.cgi?id=251381
http://bugzilla.mozilla.org/show_bug.cgi?id=229374
http://bugzilla.mozilla.org/show_bug.cgi?id=249004
http://bugzilla.mozilla.org/show_bug.cgi?id=241924
http://bugzilla.mozilla.org/show_bug.cgi?id=250906
http://bugzilla.mozilla.org/show_bug.cgi?id=246448
http://bugzilla.mozilla.org/show_bug.cgi?id=240053
http://bugzilla.mozilla.org/show_bug.cgi?id=162020
http://bugzilla.mozilla.org/show_bug.cgi?id=253121
http://bugzilla.mozilla.org/show_bug.cgi?id=244965
http://bugzilla.mozilla.org/show_bug.cgi?id=234058
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0718
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0722
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0757
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0759
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0760
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0761
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0762
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0764
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0765

8. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.