From bugzilla at redhat.com Tue Apr 4 09:01:20 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 4 Apr 2006 05:01:20 -0400 Subject: [RHSA-2006:0271-01] Important: freeradius security update Message-ID: <200604040901.k3491LMX029903@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: freeradius security update Advisory ID: RHSA-2006:0271-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0271.html Issue date: 2006-04-04 Updated on: 2006-04-04 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-1354 CVE-2005-4744 - --------------------------------------------------------------------- 1. Summary: Updated freeradius packages that fix an authentication weakness are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 3. Problem description: FreeRADIUS is a high-performance and highly configurable free RADIUS server designed to allow centralized authentication and authorization for a network. A bug was found in the way FreeRADIUS authenticates users via the MSCHAP V2 protocol. It is possible for a remote attacker to authenticate as a victim by sending a malformed MSCHAP V2 login request to the FreeRADIUS server. (CVE-2006-1354) Please note that FreeRADIUS installations not using the MSCHAP V2 protocol for authentication are not vulnerable to this issue. A bug was also found in the way FreeRADIUS logs SQL errors from the sql_unixodbc module. It may be possible for an attacker to cause FreeRADIUS to crash or execute arbitrary code if they are able to manipulate the SQL database FreeRADIUS is connecting to. (CVE-2006-4744) Users of FreeRADIUS should update to these erratum packages, which contain backported patches and are not vulnerable to these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 167676 - CVE-2005-4744 Multiple freeradius security issues 186083 - CVE-2006-1354 FreeRADIUS authentication bypass 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/freeradius-1.0.1-2.RHEL3.2.src.rpm bfc9e019ba3dd3ee67a4156ff37f467c freeradius-1.0.1-2.RHEL3.2.src.rpm i386: b4969ec213ec03c6fc693a1d84f2029c freeradius-1.0.1-2.RHEL3.2.i386.rpm a3b76846db699edcd0a00ce5723e3bfd freeradius-debuginfo-1.0.1-2.RHEL3.2.i386.rpm ia64: 734b8d8314d7bcd9fa122053bf1d495d freeradius-1.0.1-2.RHEL3.2.ia64.rpm 072278ec4c02c3994d318f24908d5694 freeradius-debuginfo-1.0.1-2.RHEL3.2.ia64.rpm ppc: 21188abdd2a98f81d806a29a77fea928 freeradius-1.0.1-2.RHEL3.2.ppc.rpm ca378b1cacd1fb47ceaff217a3625dad freeradius-debuginfo-1.0.1-2.RHEL3.2.ppc.rpm s390: 8429b0806d6e2baadca6ac94312dad8b freeradius-1.0.1-2.RHEL3.2.s390.rpm fed9502492f13e76f59d6c14d53fa315 freeradius-debuginfo-1.0.1-2.RHEL3.2.s390.rpm s390x: 0ac7a21d7bedba7d6b1cf63861a02e31 freeradius-1.0.1-2.RHEL3.2.s390x.rpm 28565d24dd125bc6accd5be4e3f37085 freeradius-debuginfo-1.0.1-2.RHEL3.2.s390x.rpm x86_64: 7eaf8db1f720773cf28479dd6f57fdb0 freeradius-1.0.1-2.RHEL3.2.x86_64.rpm c5159f20497806db6ec077c101487991 freeradius-debuginfo-1.0.1-2.RHEL3.2.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/freeradius-1.0.1-2.RHEL3.2.src.rpm bfc9e019ba3dd3ee67a4156ff37f467c freeradius-1.0.1-2.RHEL3.2.src.rpm i386: b4969ec213ec03c6fc693a1d84f2029c freeradius-1.0.1-2.RHEL3.2.i386.rpm a3b76846db699edcd0a00ce5723e3bfd freeradius-debuginfo-1.0.1-2.RHEL3.2.i386.rpm ia64: 734b8d8314d7bcd9fa122053bf1d495d freeradius-1.0.1-2.RHEL3.2.ia64.rpm 072278ec4c02c3994d318f24908d5694 freeradius-debuginfo-1.0.1-2.RHEL3.2.ia64.rpm x86_64: 7eaf8db1f720773cf28479dd6f57fdb0 freeradius-1.0.1-2.RHEL3.2.x86_64.rpm c5159f20497806db6ec077c101487991 freeradius-debuginfo-1.0.1-2.RHEL3.2.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/freeradius-1.0.1-3.RHEL4.3.src.rpm c6917a0d98ac04e34db4294217a389fb freeradius-1.0.1-3.RHEL4.3.src.rpm i386: 1121b8e53033f5580889eaab5fbd822e freeradius-1.0.1-3.RHEL4.3.i386.rpm f81fc257899d8ed95396af67215ffbe3 freeradius-debuginfo-1.0.1-3.RHEL4.3.i386.rpm 6b1ed7b9c10178db478963f9b4b5986a freeradius-mysql-1.0.1-3.RHEL4.3.i386.rpm 791f052034f7a13f2b07f384e83795f2 freeradius-postgresql-1.0.1-3.RHEL4.3.i386.rpm 046fb51db100364dbe3dc856e7dca02c freeradius-unixODBC-1.0.1-3.RHEL4.3.i386.rpm ia64: 15db5d25efd4ecf030615ccf2552b04d freeradius-1.0.1-3.RHEL4.3.ia64.rpm b207735018793465ac84da5f47129835 freeradius-debuginfo-1.0.1-3.RHEL4.3.ia64.rpm 9fd7df598cffcfdc21012296d3e5eca9 freeradius-mysql-1.0.1-3.RHEL4.3.ia64.rpm 6e813082c69c2c494daa435767e54dbd freeradius-postgresql-1.0.1-3.RHEL4.3.ia64.rpm 8d1bcdc20817ac37be901cd2c7fe7088 freeradius-unixODBC-1.0.1-3.RHEL4.3.ia64.rpm ppc: 0a3d9b8f2d09b1b13259ea99acff91b7 freeradius-1.0.1-3.RHEL4.3.ppc.rpm bd962301995130ca480ce2a237704d47 freeradius-debuginfo-1.0.1-3.RHEL4.3.ppc.rpm e4a7578d745c69f656d8d840307c139f freeradius-mysql-1.0.1-3.RHEL4.3.ppc.rpm e45ba7af692792d8bc52db7e0f6e0deb freeradius-postgresql-1.0.1-3.RHEL4.3.ppc.rpm 9d693f9e452fd06d73aed9a1d5740ddf freeradius-unixODBC-1.0.1-3.RHEL4.3.ppc.rpm s390: cc607bb4dfb35128ed7bef2a74e40aa8 freeradius-1.0.1-3.RHEL4.3.s390.rpm da8f3b3085092c5b33a392247274b44f freeradius-debuginfo-1.0.1-3.RHEL4.3.s390.rpm 42b226f640a1a4224ef0c27bc7bf5527 freeradius-mysql-1.0.1-3.RHEL4.3.s390.rpm ebefbb200863e9bfeb775c7b104934cb freeradius-postgresql-1.0.1-3.RHEL4.3.s390.rpm 4b43bb86ba1d6dc6953bb6dc3d67a147 freeradius-unixODBC-1.0.1-3.RHEL4.3.s390.rpm s390x: 74d462262538062aad16e9d8cea6eb18 freeradius-1.0.1-3.RHEL4.3.s390x.rpm 6e8cba4d1d60d307987b742bc1cb194a freeradius-debuginfo-1.0.1-3.RHEL4.3.s390x.rpm a722d74a53facc3b431ec2ed55481b61 freeradius-mysql-1.0.1-3.RHEL4.3.s390x.rpm 53088f0fbfd0e9b9c1ccd7db0bcff0ad freeradius-postgresql-1.0.1-3.RHEL4.3.s390x.rpm 8b6856b542505d85320bf176beb623c9 freeradius-unixODBC-1.0.1-3.RHEL4.3.s390x.rpm x86_64: d04afcde9543c934bbb44b3a8cf1ad53 freeradius-1.0.1-3.RHEL4.3.x86_64.rpm c7013e94ad0e12263c8d7d97d0441fa6 freeradius-debuginfo-1.0.1-3.RHEL4.3.x86_64.rpm 9734492926441eddcd2740f1d19b537c freeradius-mysql-1.0.1-3.RHEL4.3.x86_64.rpm ab8051bbcb05c66af19e5a89a2349deb freeradius-postgresql-1.0.1-3.RHEL4.3.x86_64.rpm 400250cfddddc9e095d581e2ae87b789 freeradius-unixODBC-1.0.1-3.RHEL4.3.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/freeradius-1.0.1-3.RHEL4.3.src.rpm c6917a0d98ac04e34db4294217a389fb freeradius-1.0.1-3.RHEL4.3.src.rpm i386: 1121b8e53033f5580889eaab5fbd822e freeradius-1.0.1-3.RHEL4.3.i386.rpm f81fc257899d8ed95396af67215ffbe3 freeradius-debuginfo-1.0.1-3.RHEL4.3.i386.rpm 6b1ed7b9c10178db478963f9b4b5986a freeradius-mysql-1.0.1-3.RHEL4.3.i386.rpm 791f052034f7a13f2b07f384e83795f2 freeradius-postgresql-1.0.1-3.RHEL4.3.i386.rpm 046fb51db100364dbe3dc856e7dca02c freeradius-unixODBC-1.0.1-3.RHEL4.3.i386.rpm ia64: 15db5d25efd4ecf030615ccf2552b04d freeradius-1.0.1-3.RHEL4.3.ia64.rpm b207735018793465ac84da5f47129835 freeradius-debuginfo-1.0.1-3.RHEL4.3.ia64.rpm 9fd7df598cffcfdc21012296d3e5eca9 freeradius-mysql-1.0.1-3.RHEL4.3.ia64.rpm 6e813082c69c2c494daa435767e54dbd freeradius-postgresql-1.0.1-3.RHEL4.3.ia64.rpm 8d1bcdc20817ac37be901cd2c7fe7088 freeradius-unixODBC-1.0.1-3.RHEL4.3.ia64.rpm x86_64: d04afcde9543c934bbb44b3a8cf1ad53 freeradius-1.0.1-3.RHEL4.3.x86_64.rpm c7013e94ad0e12263c8d7d97d0441fa6 freeradius-debuginfo-1.0.1-3.RHEL4.3.x86_64.rpm 9734492926441eddcd2740f1d19b537c freeradius-mysql-1.0.1-3.RHEL4.3.x86_64.rpm ab8051bbcb05c66af19e5a89a2349deb freeradius-postgresql-1.0.1-3.RHEL4.3.x86_64.rpm 400250cfddddc9e095d581e2ae87b789 freeradius-unixODBC-1.0.1-3.RHEL4.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1354 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4744 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFEMjWzXlSAg2UNWIIRAgq6AJ9FOi1hITtqYCncgTcOMEi7pqlQTgCdGST3 Hz5FKSw7qDHTOySNiTCdlok= =lukq -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 4 09:06:02 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 4 Apr 2006 05:06:02 -0400 Subject: [RHSA-2006:0272-01] Moderate: openmotif security update Message-ID: <200604040906.k34962pj031493@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: openmotif security update Advisory ID: RHSA-2006:0272-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0272.html Issue date: 2006-04-04 Updated on: 2006-04-04 Product: Red Hat Enterprise Linux CVE Names: CVE-2005-3964 - --------------------------------------------------------------------- 1. Summary: Updated openmotif packages that fix a security issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: OpenMotif provides libraries which implement the Motif industry standard graphical user interface. A number of buffer overflow flaws were discovered in OpenMotif's libUil library. It is possible for an attacker to execute arbitrary code as a victim who has been tricked into executing a program linked against OpenMotif, which then loads a malicious User Interface Language (UIL) file. (CVE-2005-3964) Users of OpenMotif are advised to upgrade to these erratum packages, which contain a backported security patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 174815 - CVE-2005-3964 openmotif libUil buffer overflows 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/openmotif-2.1.30-13.21AS.6.src.rpm 884b1cca74f804893d5027980a461be3 openmotif-2.1.30-13.21AS.6.src.rpm i386: 89a59f1a01341a063419d6e6a10a5571 openmotif-2.1.30-13.21AS.6.i386.rpm 32c4f941f0647276c88cbdc0290a8956 openmotif-devel-2.1.30-13.21AS.6.i386.rpm ia64: c28a586e93f9594565274d28543a54b4 openmotif-2.1.30-13.21AS.6.ia64.rpm fcf9343a57557253408b91e56413052a openmotif-devel-2.1.30-13.21AS.6.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/openmotif-2.1.30-13.21AS.6.src.rpm 884b1cca74f804893d5027980a461be3 openmotif-2.1.30-13.21AS.6.src.rpm ia64: c28a586e93f9594565274d28543a54b4 openmotif-2.1.30-13.21AS.6.ia64.rpm fcf9343a57557253408b91e56413052a openmotif-devel-2.1.30-13.21AS.6.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/openmotif-2.1.30-13.21AS.6.src.rpm 884b1cca74f804893d5027980a461be3 openmotif-2.1.30-13.21AS.6.src.rpm i386: 89a59f1a01341a063419d6e6a10a5571 openmotif-2.1.30-13.21AS.6.i386.rpm 32c4f941f0647276c88cbdc0290a8956 openmotif-devel-2.1.30-13.21AS.6.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/openmotif-2.1.30-13.21AS.6.src.rpm 884b1cca74f804893d5027980a461be3 openmotif-2.1.30-13.21AS.6.src.rpm i386: 89a59f1a01341a063419d6e6a10a5571 openmotif-2.1.30-13.21AS.6.i386.rpm 32c4f941f0647276c88cbdc0290a8956 openmotif-devel-2.1.30-13.21AS.6.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/openmotif-2.2.3-5.RHEL3.3.src.rpm 144110c8cb399eb4138443b425945d27 openmotif-2.2.3-5.RHEL3.3.src.rpm ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/openmotif21-2.1.30-9.RHEL3.7.src.rpm af0cf50727d1cc00d5b59899aec769c7 openmotif21-2.1.30-9.RHEL3.7.src.rpm i386: 52cce6e8ace8f422850517c5f97b414c openmotif-2.2.3-5.RHEL3.3.i386.rpm bf3a3cc6c3a0811d4417b61b8a6dc4f4 openmotif-debuginfo-2.2.3-5.RHEL3.3.i386.rpm 297d39ba8d24eb2cec962df58fed833f openmotif-devel-2.2.3-5.RHEL3.3.i386.rpm bfa0355420d4a1a7be8b1d7339924302 openmotif21-2.1.30-9.RHEL3.7.i386.rpm a4fd845818180574778f50417d6d79b3 openmotif21-debuginfo-2.1.30-9.RHEL3.7.i386.rpm ia64: 52cce6e8ace8f422850517c5f97b414c openmotif-2.2.3-5.RHEL3.3.i386.rpm 6f98cdb8e1aca4ce8ca88d9a203c05de openmotif-2.2.3-5.RHEL3.3.ia64.rpm bf3a3cc6c3a0811d4417b61b8a6dc4f4 openmotif-debuginfo-2.2.3-5.RHEL3.3.i386.rpm de7584314d38361ea185f28b2b1325bd openmotif-debuginfo-2.2.3-5.RHEL3.3.ia64.rpm 6bf9b4c36b4d2be829c4eac053e9806a openmotif-devel-2.2.3-5.RHEL3.3.ia64.rpm bfa0355420d4a1a7be8b1d7339924302 openmotif21-2.1.30-9.RHEL3.7.i386.rpm b4f44cd1b43d575777857b6441931e79 openmotif21-2.1.30-9.RHEL3.7.ia64.rpm a4fd845818180574778f50417d6d79b3 openmotif21-debuginfo-2.1.30-9.RHEL3.7.i386.rpm 85e25af31c1eb84972606c312dfcb869 openmotif21-debuginfo-2.1.30-9.RHEL3.7.ia64.rpm ppc: 037c3e2885bc1ac1cda6227a2e75dbce openmotif-2.2.3-5.RHEL3.3.ppc.rpm ddd4de52e65dec48f8bd1059eef5f937 openmotif-2.2.3-5.RHEL3.3.ppc64.rpm 1bb36bad667bf98c91d58659585cdf86 openmotif-debuginfo-2.2.3-5.RHEL3.3.ppc.rpm 0825b6cec7ed232a9760dca8bf852d47 openmotif-debuginfo-2.2.3-5.RHEL3.3.ppc64.rpm 7633fc88054a49301e0a303a7f630bd3 openmotif-devel-2.2.3-5.RHEL3.3.ppc.rpm s390: c8aa92a7acb242b8b290b92de44e86ae openmotif-2.2.3-5.RHEL3.3.s390.rpm e36d5121b379ebea0752e85478debc58 openmotif-debuginfo-2.2.3-5.RHEL3.3.s390.rpm 01651246d9a1fec03a27e8d9f2c319cf openmotif-devel-2.2.3-5.RHEL3.3.s390.rpm s390x: c8aa92a7acb242b8b290b92de44e86ae openmotif-2.2.3-5.RHEL3.3.s390.rpm ff0f337a3093ff8c0ef783d55790e7fc openmotif-2.2.3-5.RHEL3.3.s390x.rpm e36d5121b379ebea0752e85478debc58 openmotif-debuginfo-2.2.3-5.RHEL3.3.s390.rpm b2d4db810a00c65d50cb738436abaa6f openmotif-debuginfo-2.2.3-5.RHEL3.3.s390x.rpm 4ce3a4aabb1384256a994a626dd7efc7 openmotif-devel-2.2.3-5.RHEL3.3.s390x.rpm x86_64: 52cce6e8ace8f422850517c5f97b414c openmotif-2.2.3-5.RHEL3.3.i386.rpm 017ed20c6812207ba0e7e890f3957644 openmotif-2.2.3-5.RHEL3.3.x86_64.rpm bf3a3cc6c3a0811d4417b61b8a6dc4f4 openmotif-debuginfo-2.2.3-5.RHEL3.3.i386.rpm 3c30c2ba85f10ff0bad0b019ade3529e openmotif-debuginfo-2.2.3-5.RHEL3.3.x86_64.rpm b0a9fe03eb2fabd57b4f157b824f5dd6 openmotif-devel-2.2.3-5.RHEL3.3.x86_64.rpm bfa0355420d4a1a7be8b1d7339924302 openmotif21-2.1.30-9.RHEL3.7.i386.rpm a4fd845818180574778f50417d6d79b3 openmotif21-debuginfo-2.1.30-9.RHEL3.7.i386.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/openmotif-2.2.3-5.RHEL3.3.src.rpm 144110c8cb399eb4138443b425945d27 openmotif-2.2.3-5.RHEL3.3.src.rpm ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/openmotif21-2.1.30-9.RHEL3.7.src.rpm af0cf50727d1cc00d5b59899aec769c7 openmotif21-2.1.30-9.RHEL3.7.src.rpm i386: 52cce6e8ace8f422850517c5f97b414c openmotif-2.2.3-5.RHEL3.3.i386.rpm bf3a3cc6c3a0811d4417b61b8a6dc4f4 openmotif-debuginfo-2.2.3-5.RHEL3.3.i386.rpm 297d39ba8d24eb2cec962df58fed833f openmotif-devel-2.2.3-5.RHEL3.3.i386.rpm bfa0355420d4a1a7be8b1d7339924302 openmotif21-2.1.30-9.RHEL3.7.i386.rpm a4fd845818180574778f50417d6d79b3 openmotif21-debuginfo-2.1.30-9.RHEL3.7.i386.rpm x86_64: 52cce6e8ace8f422850517c5f97b414c openmotif-2.2.3-5.RHEL3.3.i386.rpm 017ed20c6812207ba0e7e890f3957644 openmotif-2.2.3-5.RHEL3.3.x86_64.rpm bf3a3cc6c3a0811d4417b61b8a6dc4f4 openmotif-debuginfo-2.2.3-5.RHEL3.3.i386.rpm 3c30c2ba85f10ff0bad0b019ade3529e openmotif-debuginfo-2.2.3-5.RHEL3.3.x86_64.rpm b0a9fe03eb2fabd57b4f157b824f5dd6 openmotif-devel-2.2.3-5.RHEL3.3.x86_64.rpm bfa0355420d4a1a7be8b1d7339924302 openmotif21-2.1.30-9.RHEL3.7.i386.rpm a4fd845818180574778f50417d6d79b3 openmotif21-debuginfo-2.1.30-9.RHEL3.7.i386.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/openmotif-2.2.3-5.RHEL3.3.src.rpm 144110c8cb399eb4138443b425945d27 openmotif-2.2.3-5.RHEL3.3.src.rpm ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/openmotif21-2.1.30-9.RHEL3.7.src.rpm af0cf50727d1cc00d5b59899aec769c7 openmotif21-2.1.30-9.RHEL3.7.src.rpm i386: 52cce6e8ace8f422850517c5f97b414c openmotif-2.2.3-5.RHEL3.3.i386.rpm bf3a3cc6c3a0811d4417b61b8a6dc4f4 openmotif-debuginfo-2.2.3-5.RHEL3.3.i386.rpm 297d39ba8d24eb2cec962df58fed833f openmotif-devel-2.2.3-5.RHEL3.3.i386.rpm bfa0355420d4a1a7be8b1d7339924302 openmotif21-2.1.30-9.RHEL3.7.i386.rpm a4fd845818180574778f50417d6d79b3 openmotif21-debuginfo-2.1.30-9.RHEL3.7.i386.rpm ia64: 52cce6e8ace8f422850517c5f97b414c openmotif-2.2.3-5.RHEL3.3.i386.rpm 6f98cdb8e1aca4ce8ca88d9a203c05de openmotif-2.2.3-5.RHEL3.3.ia64.rpm bf3a3cc6c3a0811d4417b61b8a6dc4f4 openmotif-debuginfo-2.2.3-5.RHEL3.3.i386.rpm de7584314d38361ea185f28b2b1325bd openmotif-debuginfo-2.2.3-5.RHEL3.3.ia64.rpm 6bf9b4c36b4d2be829c4eac053e9806a openmotif-devel-2.2.3-5.RHEL3.3.ia64.rpm bfa0355420d4a1a7be8b1d7339924302 openmotif21-2.1.30-9.RHEL3.7.i386.rpm b4f44cd1b43d575777857b6441931e79 openmotif21-2.1.30-9.RHEL3.7.ia64.rpm a4fd845818180574778f50417d6d79b3 openmotif21-debuginfo-2.1.30-9.RHEL3.7.i386.rpm 85e25af31c1eb84972606c312dfcb869 openmotif21-debuginfo-2.1.30-9.RHEL3.7.ia64.rpm x86_64: 52cce6e8ace8f422850517c5f97b414c openmotif-2.2.3-5.RHEL3.3.i386.rpm 017ed20c6812207ba0e7e890f3957644 openmotif-2.2.3-5.RHEL3.3.x86_64.rpm bf3a3cc6c3a0811d4417b61b8a6dc4f4 openmotif-debuginfo-2.2.3-5.RHEL3.3.i386.rpm 3c30c2ba85f10ff0bad0b019ade3529e openmotif-debuginfo-2.2.3-5.RHEL3.3.x86_64.rpm b0a9fe03eb2fabd57b4f157b824f5dd6 openmotif-devel-2.2.3-5.RHEL3.3.x86_64.rpm bfa0355420d4a1a7be8b1d7339924302 openmotif21-2.1.30-9.RHEL3.7.i386.rpm a4fd845818180574778f50417d6d79b3 openmotif21-debuginfo-2.1.30-9.RHEL3.7.i386.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/openmotif-2.2.3-5.RHEL3.3.src.rpm 144110c8cb399eb4138443b425945d27 openmotif-2.2.3-5.RHEL3.3.src.rpm ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/openmotif21-2.1.30-9.RHEL3.7.src.rpm af0cf50727d1cc00d5b59899aec769c7 openmotif21-2.1.30-9.RHEL3.7.src.rpm i386: 52cce6e8ace8f422850517c5f97b414c openmotif-2.2.3-5.RHEL3.3.i386.rpm bf3a3cc6c3a0811d4417b61b8a6dc4f4 openmotif-debuginfo-2.2.3-5.RHEL3.3.i386.rpm 297d39ba8d24eb2cec962df58fed833f openmotif-devel-2.2.3-5.RHEL3.3.i386.rpm bfa0355420d4a1a7be8b1d7339924302 openmotif21-2.1.30-9.RHEL3.7.i386.rpm a4fd845818180574778f50417d6d79b3 openmotif21-debuginfo-2.1.30-9.RHEL3.7.i386.rpm ia64: 52cce6e8ace8f422850517c5f97b414c openmotif-2.2.3-5.RHEL3.3.i386.rpm 6f98cdb8e1aca4ce8ca88d9a203c05de openmotif-2.2.3-5.RHEL3.3.ia64.rpm bf3a3cc6c3a0811d4417b61b8a6dc4f4 openmotif-debuginfo-2.2.3-5.RHEL3.3.i386.rpm de7584314d38361ea185f28b2b1325bd openmotif-debuginfo-2.2.3-5.RHEL3.3.ia64.rpm 6bf9b4c36b4d2be829c4eac053e9806a openmotif-devel-2.2.3-5.RHEL3.3.ia64.rpm bfa0355420d4a1a7be8b1d7339924302 openmotif21-2.1.30-9.RHEL3.7.i386.rpm b4f44cd1b43d575777857b6441931e79 openmotif21-2.1.30-9.RHEL3.7.ia64.rpm a4fd845818180574778f50417d6d79b3 openmotif21-debuginfo-2.1.30-9.RHEL3.7.i386.rpm 85e25af31c1eb84972606c312dfcb869 openmotif21-debuginfo-2.1.30-9.RHEL3.7.ia64.rpm x86_64: 52cce6e8ace8f422850517c5f97b414c openmotif-2.2.3-5.RHEL3.3.i386.rpm 017ed20c6812207ba0e7e890f3957644 openmotif-2.2.3-5.RHEL3.3.x86_64.rpm bf3a3cc6c3a0811d4417b61b8a6dc4f4 openmotif-debuginfo-2.2.3-5.RHEL3.3.i386.rpm 3c30c2ba85f10ff0bad0b019ade3529e openmotif-debuginfo-2.2.3-5.RHEL3.3.x86_64.rpm b0a9fe03eb2fabd57b4f157b824f5dd6 openmotif-devel-2.2.3-5.RHEL3.3.x86_64.rpm bfa0355420d4a1a7be8b1d7339924302 openmotif21-2.1.30-9.RHEL3.7.i386.rpm a4fd845818180574778f50417d6d79b3 openmotif21-debuginfo-2.1.30-9.RHEL3.7.i386.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/openmotif-2.2.3-10.RHEL4.1.src.rpm 0284fa35747dba529b57736e32bbf68a openmotif-2.2.3-10.RHEL4.1.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/openmotif21-2.1.30-11.RHEL4.5.src.rpm f3c64872dea8b51ec059a73048c79c96 openmotif21-2.1.30-11.RHEL4.5.src.rpm i386: 87753b0f9eec54919746b6b4e8b667d7 openmotif-2.2.3-10.RHEL4.1.i386.rpm 044e9ae4c332c17b5506d5f661a7bd43 openmotif-debuginfo-2.2.3-10.RHEL4.1.i386.rpm 2bb9ea68eff358ffbbbf4a0c5086adf0 openmotif-devel-2.2.3-10.RHEL4.1.i386.rpm 849b16315200a4bed0db9a0b470e8c77 openmotif21-2.1.30-11.RHEL4.5.i386.rpm a2173a35ae84b75f87c1c970f15ecf5f openmotif21-debuginfo-2.1.30-11.RHEL4.5.i386.rpm ia64: 87753b0f9eec54919746b6b4e8b667d7 openmotif-2.2.3-10.RHEL4.1.i386.rpm 1fe076f54cde9c1c021ffd8948001fbf openmotif-2.2.3-10.RHEL4.1.ia64.rpm 044e9ae4c332c17b5506d5f661a7bd43 openmotif-debuginfo-2.2.3-10.RHEL4.1.i386.rpm e93e0a5ab9e07c4d7975313f5201baaa openmotif-debuginfo-2.2.3-10.RHEL4.1.ia64.rpm a8fe3cee855c17e255e43ca665b93b14 openmotif-devel-2.2.3-10.RHEL4.1.ia64.rpm 849b16315200a4bed0db9a0b470e8c77 openmotif21-2.1.30-11.RHEL4.5.i386.rpm 6e5c77d1c99ef29203711d75a36c49cc openmotif21-2.1.30-11.RHEL4.5.ia64.rpm a2173a35ae84b75f87c1c970f15ecf5f openmotif21-debuginfo-2.1.30-11.RHEL4.5.i386.rpm 6202af3bae36ff2e2a2a3af60f020ee2 openmotif21-debuginfo-2.1.30-11.RHEL4.5.ia64.rpm ppc: d8c4fcafaf1944725806b8a0fb83a2bc openmotif-2.2.3-10.RHEL4.1.ppc.rpm 91c55d61065efd65b8641495ef7cbd74 openmotif-2.2.3-10.RHEL4.1.ppc64.rpm abf17525d0125475d3250e3af45c4bf5 openmotif-debuginfo-2.2.3-10.RHEL4.1.ppc.rpm 202d1de659a763211a169a7e701e28f9 openmotif-debuginfo-2.2.3-10.RHEL4.1.ppc64.rpm f89e1c3bcb7569e343656688942a15b7 openmotif-devel-2.2.3-10.RHEL4.1.ppc.rpm s390: 965356e7b073c521ddae1f469dc8d7bc openmotif-2.2.3-10.RHEL4.1.s390.rpm 75d27be42172c82c816b34870b6c5d07 openmotif-debuginfo-2.2.3-10.RHEL4.1.s390.rpm f0b79d86892c3b22a265d51ce68188ed openmotif-devel-2.2.3-10.RHEL4.1.s390.rpm s390x: 965356e7b073c521ddae1f469dc8d7bc openmotif-2.2.3-10.RHEL4.1.s390.rpm fe06d178c35da8a54505b5f273df372a openmotif-2.2.3-10.RHEL4.1.s390x.rpm 75d27be42172c82c816b34870b6c5d07 openmotif-debuginfo-2.2.3-10.RHEL4.1.s390.rpm 1f2704ae02a51f601203fd2f2386c2fa openmotif-debuginfo-2.2.3-10.RHEL4.1.s390x.rpm 64a2a2978908a278680c2d2b8d58bcd9 openmotif-devel-2.2.3-10.RHEL4.1.s390x.rpm x86_64: 87753b0f9eec54919746b6b4e8b667d7 openmotif-2.2.3-10.RHEL4.1.i386.rpm 075b0a610d11b3d2a8ceb0c823dfb1f9 openmotif-2.2.3-10.RHEL4.1.x86_64.rpm 044e9ae4c332c17b5506d5f661a7bd43 openmotif-debuginfo-2.2.3-10.RHEL4.1.i386.rpm ec92fae07c34afc65988c53ea69b000b openmotif-debuginfo-2.2.3-10.RHEL4.1.x86_64.rpm 371dad405a180d7847c14af6fdd1ffd8 openmotif-devel-2.2.3-10.RHEL4.1.x86_64.rpm 849b16315200a4bed0db9a0b470e8c77 openmotif21-2.1.30-11.RHEL4.5.i386.rpm a2173a35ae84b75f87c1c970f15ecf5f openmotif21-debuginfo-2.1.30-11.RHEL4.5.i386.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/openmotif-2.2.3-10.RHEL4.1.src.rpm 0284fa35747dba529b57736e32bbf68a openmotif-2.2.3-10.RHEL4.1.src.rpm ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/openmotif21-2.1.30-11.RHEL4.5.src.rpm f3c64872dea8b51ec059a73048c79c96 openmotif21-2.1.30-11.RHEL4.5.src.rpm i386: 87753b0f9eec54919746b6b4e8b667d7 openmotif-2.2.3-10.RHEL4.1.i386.rpm 044e9ae4c332c17b5506d5f661a7bd43 openmotif-debuginfo-2.2.3-10.RHEL4.1.i386.rpm 2bb9ea68eff358ffbbbf4a0c5086adf0 openmotif-devel-2.2.3-10.RHEL4.1.i386.rpm 849b16315200a4bed0db9a0b470e8c77 openmotif21-2.1.30-11.RHEL4.5.i386.rpm a2173a35ae84b75f87c1c970f15ecf5f openmotif21-debuginfo-2.1.30-11.RHEL4.5.i386.rpm x86_64: 87753b0f9eec54919746b6b4e8b667d7 openmotif-2.2.3-10.RHEL4.1.i386.rpm 075b0a610d11b3d2a8ceb0c823dfb1f9 openmotif-2.2.3-10.RHEL4.1.x86_64.rpm 044e9ae4c332c17b5506d5f661a7bd43 openmotif-debuginfo-2.2.3-10.RHEL4.1.i386.rpm ec92fae07c34afc65988c53ea69b000b openmotif-debuginfo-2.2.3-10.RHEL4.1.x86_64.rpm 371dad405a180d7847c14af6fdd1ffd8 openmotif-devel-2.2.3-10.RHEL4.1.x86_64.rpm 849b16315200a4bed0db9a0b470e8c77 openmotif21-2.1.30-11.RHEL4.5.i386.rpm a2173a35ae84b75f87c1c970f15ecf5f openmotif21-debuginfo-2.1.30-11.RHEL4.5.i386.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/openmotif-2.2.3-10.RHEL4.1.src.rpm 0284fa35747dba529b57736e32bbf68a openmotif-2.2.3-10.RHEL4.1.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/openmotif21-2.1.30-11.RHEL4.5.src.rpm f3c64872dea8b51ec059a73048c79c96 openmotif21-2.1.30-11.RHEL4.5.src.rpm i386: 87753b0f9eec54919746b6b4e8b667d7 openmotif-2.2.3-10.RHEL4.1.i386.rpm 044e9ae4c332c17b5506d5f661a7bd43 openmotif-debuginfo-2.2.3-10.RHEL4.1.i386.rpm 2bb9ea68eff358ffbbbf4a0c5086adf0 openmotif-devel-2.2.3-10.RHEL4.1.i386.rpm 849b16315200a4bed0db9a0b470e8c77 openmotif21-2.1.30-11.RHEL4.5.i386.rpm a2173a35ae84b75f87c1c970f15ecf5f openmotif21-debuginfo-2.1.30-11.RHEL4.5.i386.rpm ia64: 87753b0f9eec54919746b6b4e8b667d7 openmotif-2.2.3-10.RHEL4.1.i386.rpm 1fe076f54cde9c1c021ffd8948001fbf openmotif-2.2.3-10.RHEL4.1.ia64.rpm 044e9ae4c332c17b5506d5f661a7bd43 openmotif-debuginfo-2.2.3-10.RHEL4.1.i386.rpm e93e0a5ab9e07c4d7975313f5201baaa openmotif-debuginfo-2.2.3-10.RHEL4.1.ia64.rpm a8fe3cee855c17e255e43ca665b93b14 openmotif-devel-2.2.3-10.RHEL4.1.ia64.rpm 849b16315200a4bed0db9a0b470e8c77 openmotif21-2.1.30-11.RHEL4.5.i386.rpm 6e5c77d1c99ef29203711d75a36c49cc openmotif21-2.1.30-11.RHEL4.5.ia64.rpm a2173a35ae84b75f87c1c970f15ecf5f openmotif21-debuginfo-2.1.30-11.RHEL4.5.i386.rpm 6202af3bae36ff2e2a2a3af60f020ee2 openmotif21-debuginfo-2.1.30-11.RHEL4.5.ia64.rpm x86_64: 87753b0f9eec54919746b6b4e8b667d7 openmotif-2.2.3-10.RHEL4.1.i386.rpm 075b0a610d11b3d2a8ceb0c823dfb1f9 openmotif-2.2.3-10.RHEL4.1.x86_64.rpm 044e9ae4c332c17b5506d5f661a7bd43 openmotif-debuginfo-2.2.3-10.RHEL4.1.i386.rpm ec92fae07c34afc65988c53ea69b000b openmotif-debuginfo-2.2.3-10.RHEL4.1.x86_64.rpm 371dad405a180d7847c14af6fdd1ffd8 openmotif-devel-2.2.3-10.RHEL4.1.x86_64.rpm 849b16315200a4bed0db9a0b470e8c77 openmotif21-2.1.30-11.RHEL4.5.i386.rpm a2173a35ae84b75f87c1c970f15ecf5f openmotif21-debuginfo-2.1.30-11.RHEL4.5.i386.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/openmotif-2.2.3-10.RHEL4.1.src.rpm 0284fa35747dba529b57736e32bbf68a openmotif-2.2.3-10.RHEL4.1.src.rpm ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/openmotif21-2.1.30-11.RHEL4.5.src.rpm f3c64872dea8b51ec059a73048c79c96 openmotif21-2.1.30-11.RHEL4.5.src.rpm i386: 87753b0f9eec54919746b6b4e8b667d7 openmotif-2.2.3-10.RHEL4.1.i386.rpm 044e9ae4c332c17b5506d5f661a7bd43 openmotif-debuginfo-2.2.3-10.RHEL4.1.i386.rpm 2bb9ea68eff358ffbbbf4a0c5086adf0 openmotif-devel-2.2.3-10.RHEL4.1.i386.rpm 849b16315200a4bed0db9a0b470e8c77 openmotif21-2.1.30-11.RHEL4.5.i386.rpm a2173a35ae84b75f87c1c970f15ecf5f openmotif21-debuginfo-2.1.30-11.RHEL4.5.i386.rpm ia64: 87753b0f9eec54919746b6b4e8b667d7 openmotif-2.2.3-10.RHEL4.1.i386.rpm 1fe076f54cde9c1c021ffd8948001fbf openmotif-2.2.3-10.RHEL4.1.ia64.rpm 044e9ae4c332c17b5506d5f661a7bd43 openmotif-debuginfo-2.2.3-10.RHEL4.1.i386.rpm e93e0a5ab9e07c4d7975313f5201baaa openmotif-debuginfo-2.2.3-10.RHEL4.1.ia64.rpm a8fe3cee855c17e255e43ca665b93b14 openmotif-devel-2.2.3-10.RHEL4.1.ia64.rpm 849b16315200a4bed0db9a0b470e8c77 openmotif21-2.1.30-11.RHEL4.5.i386.rpm 6e5c77d1c99ef29203711d75a36c49cc openmotif21-2.1.30-11.RHEL4.5.ia64.rpm a2173a35ae84b75f87c1c970f15ecf5f openmotif21-debuginfo-2.1.30-11.RHEL4.5.i386.rpm 6202af3bae36ff2e2a2a3af60f020ee2 openmotif21-debuginfo-2.1.30-11.RHEL4.5.ia64.rpm x86_64: 87753b0f9eec54919746b6b4e8b667d7 openmotif-2.2.3-10.RHEL4.1.i386.rpm 075b0a610d11b3d2a8ceb0c823dfb1f9 openmotif-2.2.3-10.RHEL4.1.x86_64.rpm 044e9ae4c332c17b5506d5f661a7bd43 openmotif-debuginfo-2.2.3-10.RHEL4.1.i386.rpm ec92fae07c34afc65988c53ea69b000b openmotif-debuginfo-2.2.3-10.RHEL4.1.x86_64.rpm 371dad405a180d7847c14af6fdd1ffd8 openmotif-devel-2.2.3-10.RHEL4.1.x86_64.rpm 849b16315200a4bed0db9a0b470e8c77 openmotif21-2.1.30-11.RHEL4.5.i386.rpm a2173a35ae84b75f87c1c970f15ecf5f openmotif21-debuginfo-2.1.30-11.RHEL4.5.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3964 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFEMjbrXlSAg2UNWIIRAv5PAJ4xYHt5D9iJiLPbkinBY9Vry0JORACaA8pw gMGtvPM7INhxFVPBeX5T/IY= =25SZ -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Apr 14 16:16:46 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Fri, 14 Apr 2006 12:16:46 -0400 Subject: [RHSA-2006:0328-01] Critical: Firefox security update Message-ID: <200604141616.k3EGGkMG018455@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: Firefox security update Advisory ID: RHSA-2006:0328-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0328.html Issue date: 2006-04-14 Updated on: 2006-04-14 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-0749 CVE-2006-1724 CVE-2006-1727 CVE-2006-1728 CVE-2006-1729 CVE-2006-1730 CVE-2006-1731 CVE-2006-1732 CVE-2006-1733 CVE-2006-1734 CVE-2006-1735 CVE-2006-1737 CVE-2006-1738 CVE-2006-1739 CVE-2006-1740 CVE-2006-1741 CVE-2006-1742 - --------------------------------------------------------------------- 1. Summary: Updated firefox packages that fix several security bugs are now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Mozilla Firefox is an open source Web browser. Several bugs were found in the way Firefox processes malformed javascript. A malicious web page could modify the content of a different open web page, possibly stealing sensitive information or conducting a cross-site scripting attack. (CVE-2006-1731, CVE-2006-1732, CVE-2006-1741) Several bugs were found in the way Firefox processes certain javascript actions. A malicious web page could execute arbitrary javascript instructions with the permissions of "chrome", allowing the page to steal sensitive information or install browser malware. (CVE-2006-1727, CVE-2006-1728, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1742) Several bugs were found in the way Firefox processes malformed web pages. A carefully crafted malicious web page could cause the execution of arbitrary code as the user running Firefox. (CVE-2006-0749, CVE-2006-1724, CVE-2006-1730, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739) A bug was found in the way Firefox displays the secure site icon. If a browser is configured to display the non-default secure site modal warning dialog, it may be possible to trick a user into believing they are viewing a secure site. (CVE-2006-1740) A bug was found in the way Firefox allows javascript mutation events on "input" form elements. A malicious web page could be created in such a way that when a user submits a form, an arbitrary file could be uploaded to the attacker. (CVE-2006-1729) Users of Firefox are advised to upgrade to these updated packages containing Firefox version 1.0.8 which corrects these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 183537 - CVE-2006-0749 Firefox Tag Order Vulnerability 188814 - CVE-2006-1741 Cross-site JavaScript injection using event handlers 188816 - CVE-2006-1742 JavaScript garbage-collection hazard audit 188818 - CVE-2006-1737 Crashes with evidence of memory corruption (CVE-2006-1738, CVE-2006-1739) 188820 - CVE-2006-1740 Secure-site spoof (requires security warning dialog) 188822 - CVE-2006-1735 Privilege escalation via XBL.method.eval 188824 - CVE-2006-1734 Privilege escalation using a JavaScript function's cloned parent 188826 - CVE-2006-1733 Accessing XBL compilation scope via valueOf.call() 188828 - CVE-2006-1732 cross-site scripting through window.controllers 188830 - CVE-2006-0749 Mozilla Firefox Tag Order Vulnerability 188832 - CVE-2006-1731 Cross-site scripting using .valueOf.call() 188834 - CVE-2006-1724 Crashes with evidence of memory corruption (1.5.0.2) 188836 - CVE-2006-1730 CSS Letter-Spacing Heap Overflow Vulnerability 188838 - CVE-2006-1729 File stealing by changing input type 188840 - CVE-2006-1728 Privilege escalation using crypto.generateCRMFRequest 188842 - CVE-2006-1727 Privilege escalation through Print Preview 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firefox-1.0.8-1.4.1.src.rpm 56b5c27ea2ddbd0867f8ee87eda96cd9 firefox-1.0.8-1.4.1.src.rpm i386: d092a0e383f0d171a515cf3c1b50a310 firefox-1.0.8-1.4.1.i386.rpm 4f66c3525cd7904e42d1477e806a583c firefox-debuginfo-1.0.8-1.4.1.i386.rpm ia64: 826bc0089706ec833a75c82dd4c16555 firefox-1.0.8-1.4.1.ia64.rpm fdb7a7c2a79ddfa19a890104abca06f4 firefox-debuginfo-1.0.8-1.4.1.ia64.rpm ppc: 8c201529a81f5b75c23adc15dca47f9e firefox-1.0.8-1.4.1.ppc.rpm 443c4fbffe45dd4b400c4f226b3c7d42 firefox-debuginfo-1.0.8-1.4.1.ppc.rpm s390: 577c0d3f56cca04343d77eadf5b1680f firefox-1.0.8-1.4.1.s390.rpm 3e9ff99420d652af75538e2ea99b3ce0 firefox-debuginfo-1.0.8-1.4.1.s390.rpm s390x: 1e31976de69cb4eef9171bbfb1fb7621 firefox-1.0.8-1.4.1.s390x.rpm 977147cba3f966482f561d93c881a8d3 firefox-debuginfo-1.0.8-1.4.1.s390x.rpm x86_64: 2cc4c552d8942f0b7e44457069fbaa67 firefox-1.0.8-1.4.1.x86_64.rpm db96f3e2d520ef51ed5ebbd4e99d52a6 firefox-debuginfo-1.0.8-1.4.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/firefox-1.0.8-1.4.1.src.rpm 56b5c27ea2ddbd0867f8ee87eda96cd9 firefox-1.0.8-1.4.1.src.rpm i386: d092a0e383f0d171a515cf3c1b50a310 firefox-1.0.8-1.4.1.i386.rpm 4f66c3525cd7904e42d1477e806a583c firefox-debuginfo-1.0.8-1.4.1.i386.rpm x86_64: 2cc4c552d8942f0b7e44457069fbaa67 firefox-1.0.8-1.4.1.x86_64.rpm db96f3e2d520ef51ed5ebbd4e99d52a6 firefox-debuginfo-1.0.8-1.4.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firefox-1.0.8-1.4.1.src.rpm 56b5c27ea2ddbd0867f8ee87eda96cd9 firefox-1.0.8-1.4.1.src.rpm i386: d092a0e383f0d171a515cf3c1b50a310 firefox-1.0.8-1.4.1.i386.rpm 4f66c3525cd7904e42d1477e806a583c firefox-debuginfo-1.0.8-1.4.1.i386.rpm ia64: 826bc0089706ec833a75c82dd4c16555 firefox-1.0.8-1.4.1.ia64.rpm fdb7a7c2a79ddfa19a890104abca06f4 firefox-debuginfo-1.0.8-1.4.1.ia64.rpm x86_64: 2cc4c552d8942f0b7e44457069fbaa67 firefox-1.0.8-1.4.1.x86_64.rpm db96f3e2d520ef51ed5ebbd4e99d52a6 firefox-debuginfo-1.0.8-1.4.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firefox-1.0.8-1.4.1.src.rpm 56b5c27ea2ddbd0867f8ee87eda96cd9 firefox-1.0.8-1.4.1.src.rpm i386: d092a0e383f0d171a515cf3c1b50a310 firefox-1.0.8-1.4.1.i386.rpm 4f66c3525cd7904e42d1477e806a583c firefox-debuginfo-1.0.8-1.4.1.i386.rpm ia64: 826bc0089706ec833a75c82dd4c16555 firefox-1.0.8-1.4.1.ia64.rpm fdb7a7c2a79ddfa19a890104abca06f4 firefox-debuginfo-1.0.8-1.4.1.ia64.rpm x86_64: 2cc4c552d8942f0b7e44457069fbaa67 firefox-1.0.8-1.4.1.x86_64.rpm db96f3e2d520ef51ed5ebbd4e99d52a6 firefox-debuginfo-1.0.8-1.4.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1724 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742 http://www.mozilla.com/firefox/releases/1.0.8.html http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFEP8rlXlSAg2UNWIIRAtgXAJ0YJM3htFesCERmo9wsi5XIBpXRygCgwUBo kD88jTIFZ10EdQ30AxWaqbE= =wZAu -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 18 11:14:59 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 18 Apr 2006 07:14:59 -0400 Subject: [RHSA-2006:0329-01] Critical: Mozilla security update Message-ID: <200604181114.k3IBExgu009656@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: Mozilla security update Advisory ID: RHSA-2006:0329-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0329.html Issue date: 2006-04-18 Updated on: 2006-04-18 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-1727 CVE-2006-1728 CVE-2006-1729 CVE-2006-1730 CVE-2006-1731 CVE-2006-1732 CVE-2006-1733 CVE-2006-1734 CVE-2006-1735 CVE-2006-1737 CVE-2006-1738 CVE-2006-1739 CVE-2006-1740 CVE-2006-1741 CVE-2006-1742 CVE-2006-0749 CVE-2006-1790 - --------------------------------------------------------------------- 1. Summary: Updated mozilla packages that fix several security bugs are now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. Several bugs were found in the way Mozilla processes malformed javascript. A malicious web page could modify the content of a different open web page, possibly stealing sensitive information or conducting a cross-site scripting attack. (CVE-2006-1731, CVE-2006-1732, CVE-2006-1741) Several bugs were found in the way Mozilla processes certain javascript actions. A malicious web page could execute arbitrary javascript instructions with the permissions of "chrome", allowing the page to steal sensitive information or install browser malware. (CVE-2006-1727, CVE-2006-1728, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1742) Several bugs were found in the way Mozilla processes malformed web pages. A carefully crafted malicious web page could cause the execution of arbitrary code as the user running Mozilla. (CVE-2006-1730, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739, CVE-2006-0749, CVE-2006-1790) A bug was found in the way Mozilla displays the secure site icon. If a browser is configured to display the non-default secure site modal warning dialog, it may be possible to trick a user into believing they are viewing a secure site. (CVE-2006-1740) A bug was found in the way Mozilla allows javascript mutation events on "input" form elements. A malicious web page could be created in such a way that when a user submits a form, an arbitrary file could be uploaded to the attacker. (CVE-2006-1729) Users of Mozilla are advised to upgrade to these updated packages containing Mozilla version 1.7.13 which corrects these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 188776 - CVE-2006-1741 Cross-site JavaScript injection using event handlers 188778 - CVE-2006-1742 JavaScript garbage-collection hazard audit 188780 - CVE-2006-1737 Crashes with evidence of memory corruption (CVE-2006-1738, CVE-2006-1739, CVE-2006-1790) 188782 - CVE-2006-1740 Secure-site spoof (requires security warning dialog) 188784 - CVE-2006-1735 Privilege escalation via XBL.method.eval 188787 - CVE-2006-1734 Privilege escalation using a JavaScript function's cloned parent 188789 - CVE-2006-1733 Accessing XBL compilation scope via valueOf.call() 188791 - CVE-2006-1732 cross-site scripting through window.controllers 188793 - CVE-2006-0749 Mozilla Firefox Tag Order Vulnerability 188795 - CVE-2006-1731 Cross-site scripting using .valueOf.call() 188801 - CVE-2006-1730 CSS Letter-Spacing Heap Overflow Vulnerability 188803 - CVE-2006-1729 File stealing by changing input type 188805 - CVE-2006-1728 Privilege escalation using crypto.generateCRMFRequest 188807 - CVE-2006-1727 Privilege escalation through Print Preview 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/galeon-1.2.14-1.2.8.src.rpm a1b934a952efdc765b89da339f76eb57 galeon-1.2.14-1.2.8.src.rpm ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/mozilla-1.7.13-1.1.2.2.src.rpm dbd935f766702f3e384186313c9ce873 mozilla-1.7.13-1.1.2.2.src.rpm i386: 7c6c88595b85da340742036eea611f03 galeon-1.2.14-1.2.8.i386.rpm e267c90b6740b89ec39c2ca4446b0049 mozilla-1.7.13-1.1.2.2.i386.rpm a064ef71a89d72c091c93f1a4dc3f581 mozilla-chat-1.7.13-1.1.2.2.i386.rpm a4fd326d11b15463157746bd3599d2c4 mozilla-devel-1.7.13-1.1.2.2.i386.rpm 57b0bbd603fe67f3dea8ce81fb78f1ea mozilla-dom-inspector-1.7.13-1.1.2.2.i386.rpm 63295a605e01f944f63bc0e214777ae7 mozilla-js-debugger-1.7.13-1.1.2.2.i386.rpm 61384ad4524a85be26a6cd2493049f8b mozilla-mail-1.7.13-1.1.2.2.i386.rpm 8a40f8b464d12d3ef5705dbf4b2f99cf mozilla-nspr-1.7.13-1.1.2.2.i386.rpm 1847cfd12ba696970094b14cbc2ed6bd mozilla-nspr-devel-1.7.13-1.1.2.2.i386.rpm b7cc4ba986b052fb1991ded9860d906b mozilla-nss-1.7.13-1.1.2.2.i386.rpm ece11c75d9a06c7f48fcd3c1b5780f17 mozilla-nss-devel-1.7.13-1.1.2.2.i386.rpm ia64: 71dc7978a39a00b204a351eeded64140 galeon-1.2.14-1.2.8.ia64.rpm 66507b981d7fb5463df0cd8d17debc58 mozilla-1.7.13-1.1.2.2.ia64.rpm e688bd36cc829b1c6ac24d542f2fd874 mozilla-chat-1.7.13-1.1.2.2.ia64.rpm 9641d4bc6c68c28e65895b6171331389 mozilla-devel-1.7.13-1.1.2.2.ia64.rpm 2e9b8deda74661b38149d8de1f9424d3 mozilla-dom-inspector-1.7.13-1.1.2.2.ia64.rpm c5adc188d16e7137be0545a429714e41 mozilla-js-debugger-1.7.13-1.1.2.2.ia64.rpm ced55c4afe2e4586fb50624a19741f42 mozilla-mail-1.7.13-1.1.2.2.ia64.rpm 02c1169c794792040f4c1955963e281f mozilla-nspr-1.7.13-1.1.2.2.ia64.rpm 7486d77760ab07b5b9bc5f5ce11a2850 mozilla-nspr-devel-1.7.13-1.1.2.2.ia64.rpm 87fe61eced4ebee1d032010845b59182 mozilla-nss-1.7.13-1.1.2.2.ia64.rpm 98265778cec73664198284378c6f41c6 mozilla-nss-devel-1.7.13-1.1.2.2.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/galeon-1.2.14-1.2.8.src.rpm a1b934a952efdc765b89da339f76eb57 galeon-1.2.14-1.2.8.src.rpm ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/mozilla-1.7.13-1.1.2.2.src.rpm dbd935f766702f3e384186313c9ce873 mozilla-1.7.13-1.1.2.2.src.rpm ia64: 71dc7978a39a00b204a351eeded64140 galeon-1.2.14-1.2.8.ia64.rpm 66507b981d7fb5463df0cd8d17debc58 mozilla-1.7.13-1.1.2.2.ia64.rpm e688bd36cc829b1c6ac24d542f2fd874 mozilla-chat-1.7.13-1.1.2.2.ia64.rpm 9641d4bc6c68c28e65895b6171331389 mozilla-devel-1.7.13-1.1.2.2.ia64.rpm 2e9b8deda74661b38149d8de1f9424d3 mozilla-dom-inspector-1.7.13-1.1.2.2.ia64.rpm c5adc188d16e7137be0545a429714e41 mozilla-js-debugger-1.7.13-1.1.2.2.ia64.rpm ced55c4afe2e4586fb50624a19741f42 mozilla-mail-1.7.13-1.1.2.2.ia64.rpm 02c1169c794792040f4c1955963e281f mozilla-nspr-1.7.13-1.1.2.2.ia64.rpm 7486d77760ab07b5b9bc5f5ce11a2850 mozilla-nspr-devel-1.7.13-1.1.2.2.ia64.rpm 87fe61eced4ebee1d032010845b59182 mozilla-nss-1.7.13-1.1.2.2.ia64.rpm 98265778cec73664198284378c6f41c6 mozilla-nss-devel-1.7.13-1.1.2.2.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/galeon-1.2.14-1.2.8.src.rpm a1b934a952efdc765b89da339f76eb57 galeon-1.2.14-1.2.8.src.rpm ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/mozilla-1.7.13-1.1.2.2.src.rpm dbd935f766702f3e384186313c9ce873 mozilla-1.7.13-1.1.2.2.src.rpm i386: 7c6c88595b85da340742036eea611f03 galeon-1.2.14-1.2.8.i386.rpm e267c90b6740b89ec39c2ca4446b0049 mozilla-1.7.13-1.1.2.2.i386.rpm a064ef71a89d72c091c93f1a4dc3f581 mozilla-chat-1.7.13-1.1.2.2.i386.rpm a4fd326d11b15463157746bd3599d2c4 mozilla-devel-1.7.13-1.1.2.2.i386.rpm 57b0bbd603fe67f3dea8ce81fb78f1ea mozilla-dom-inspector-1.7.13-1.1.2.2.i386.rpm 63295a605e01f944f63bc0e214777ae7 mozilla-js-debugger-1.7.13-1.1.2.2.i386.rpm 61384ad4524a85be26a6cd2493049f8b mozilla-mail-1.7.13-1.1.2.2.i386.rpm 8a40f8b464d12d3ef5705dbf4b2f99cf mozilla-nspr-1.7.13-1.1.2.2.i386.rpm 1847cfd12ba696970094b14cbc2ed6bd mozilla-nspr-devel-1.7.13-1.1.2.2.i386.rpm b7cc4ba986b052fb1991ded9860d906b mozilla-nss-1.7.13-1.1.2.2.i386.rpm ece11c75d9a06c7f48fcd3c1b5780f17 mozilla-nss-devel-1.7.13-1.1.2.2.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/galeon-1.2.14-1.2.8.src.rpm a1b934a952efdc765b89da339f76eb57 galeon-1.2.14-1.2.8.src.rpm ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/mozilla-1.7.13-1.1.2.2.src.rpm dbd935f766702f3e384186313c9ce873 mozilla-1.7.13-1.1.2.2.src.rpm i386: 7c6c88595b85da340742036eea611f03 galeon-1.2.14-1.2.8.i386.rpm e267c90b6740b89ec39c2ca4446b0049 mozilla-1.7.13-1.1.2.2.i386.rpm a064ef71a89d72c091c93f1a4dc3f581 mozilla-chat-1.7.13-1.1.2.2.i386.rpm a4fd326d11b15463157746bd3599d2c4 mozilla-devel-1.7.13-1.1.2.2.i386.rpm 57b0bbd603fe67f3dea8ce81fb78f1ea mozilla-dom-inspector-1.7.13-1.1.2.2.i386.rpm 63295a605e01f944f63bc0e214777ae7 mozilla-js-debugger-1.7.13-1.1.2.2.i386.rpm 61384ad4524a85be26a6cd2493049f8b mozilla-mail-1.7.13-1.1.2.2.i386.rpm 8a40f8b464d12d3ef5705dbf4b2f99cf mozilla-nspr-1.7.13-1.1.2.2.i386.rpm 1847cfd12ba696970094b14cbc2ed6bd mozilla-nspr-devel-1.7.13-1.1.2.2.i386.rpm b7cc4ba986b052fb1991ded9860d906b mozilla-nss-1.7.13-1.1.2.2.i386.rpm ece11c75d9a06c7f48fcd3c1b5780f17 mozilla-nss-devel-1.7.13-1.1.2.2.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/mozilla-1.7.13-1.1.3.1.src.rpm ada9ad75adaafc2dc64f01945d0abbf6 mozilla-1.7.13-1.1.3.1.src.rpm i386: 8dc644b3e806d6ae01a6b62cd583ce6f mozilla-1.7.13-1.1.3.1.i386.rpm 552f4b7dc1bc41349a7d7eb10059d9b7 mozilla-chat-1.7.13-1.1.3.1.i386.rpm 3446b2bb4b24e3e250487c280284158c mozilla-debuginfo-1.7.13-1.1.3.1.i386.rpm 738298f6bd501c6612c321318c927484 mozilla-devel-1.7.13-1.1.3.1.i386.rpm 91fd4ef291f830b9f981b6612685c48b mozilla-dom-inspector-1.7.13-1.1.3.1.i386.rpm 89ba667a1b10f86ed299da136b3d53f7 mozilla-js-debugger-1.7.13-1.1.3.1.i386.rpm b794a61dd8dc7280c36fec095978f0fd mozilla-mail-1.7.13-1.1.3.1.i386.rpm a5dfbd5b6d0515a9f863d8d624b938b4 mozilla-nspr-1.7.13-1.1.3.1.i386.rpm 59bae0813caf908149df7e14533b2d8e mozilla-nspr-devel-1.7.13-1.1.3.1.i386.rpm b15e9a9160bf4baac2ecde3a1863d42a mozilla-nss-1.7.13-1.1.3.1.i386.rpm 2eafa7f3b74c9b3b09d6d7cac83e2293 mozilla-nss-devel-1.7.13-1.1.3.1.i386.rpm ia64: d21e5f2bfda33416c3674cdf6a526b33 mozilla-1.7.13-1.1.3.1.ia64.rpm c6fc9f59cabb1f383798bbe809b3e813 mozilla-chat-1.7.13-1.1.3.1.ia64.rpm 3446b2bb4b24e3e250487c280284158c mozilla-debuginfo-1.7.13-1.1.3.1.i386.rpm 2ace58853a4983440561ab6ee7f456f5 mozilla-debuginfo-1.7.13-1.1.3.1.ia64.rpm 970462f30fbbfc0790eb107eaa52bf37 mozilla-devel-1.7.13-1.1.3.1.ia64.rpm 42995c0bd387caf40f0268842fec4d5d mozilla-dom-inspector-1.7.13-1.1.3.1.ia64.rpm 9a174adef987098a380aaa8a74887513 mozilla-js-debugger-1.7.13-1.1.3.1.ia64.rpm 11cb099fb7c83724b469bd8723dd3580 mozilla-mail-1.7.13-1.1.3.1.ia64.rpm a5dfbd5b6d0515a9f863d8d624b938b4 mozilla-nspr-1.7.13-1.1.3.1.i386.rpm cb7950a8c123d7626968ac4bd76ab798 mozilla-nspr-1.7.13-1.1.3.1.ia64.rpm 32ac9a0111e186618de6b5d67e981cbc mozilla-nspr-devel-1.7.13-1.1.3.1.ia64.rpm b15e9a9160bf4baac2ecde3a1863d42a mozilla-nss-1.7.13-1.1.3.1.i386.rpm 0fe4e8e5079fdeb3a7c27e5b6e5429d5 mozilla-nss-1.7.13-1.1.3.1.ia64.rpm 6c261b2462b46f39ba385ac82138fead mozilla-nss-devel-1.7.13-1.1.3.1.ia64.rpm ppc: 8b4ddb1d7f3847333d95bab7f9d326c2 mozilla-1.7.13-1.1.3.1.ppc.rpm 51205b433e8ab4f48365514fe0bddac3 mozilla-chat-1.7.13-1.1.3.1.ppc.rpm 815c49778ce9b21b3b3883996d8a7d34 mozilla-debuginfo-1.7.13-1.1.3.1.ppc.rpm 55c48e975ab12189bf88a0493d15f9a4 mozilla-devel-1.7.13-1.1.3.1.ppc.rpm a24334c77244c18628824f7736e391e4 mozilla-dom-inspector-1.7.13-1.1.3.1.ppc.rpm 09cac0eb282b0148bdd2350af91ba9e6 mozilla-js-debugger-1.7.13-1.1.3.1.ppc.rpm fcc4df63a85abf27bc71c2dca10c5c73 mozilla-mail-1.7.13-1.1.3.1.ppc.rpm d797b9262194126ca60d3e098815b5ec mozilla-nspr-1.7.13-1.1.3.1.ppc.rpm 8eced2d2526b63a63a46fd3e033e6b6f mozilla-nspr-devel-1.7.13-1.1.3.1.ppc.rpm 881775a96946d314cd20c1db506ce51b mozilla-nss-1.7.13-1.1.3.1.ppc.rpm f7e87314d4198100738cd6f186a82a28 mozilla-nss-devel-1.7.13-1.1.3.1.ppc.rpm s390: a1e3b94658aac421f1d1ff267a426950 mozilla-1.7.13-1.1.3.1.s390.rpm ceb03c53f40061bf65b3143ca3b2048a mozilla-chat-1.7.13-1.1.3.1.s390.rpm e9e2a1d01c5a83f61f9f17845ecc5971 mozilla-debuginfo-1.7.13-1.1.3.1.s390.rpm c98f79c6096e55fafa5ddd7583d151dc mozilla-devel-1.7.13-1.1.3.1.s390.rpm 0d0920488b0dc53a52d43dc65ed155f5 mozilla-dom-inspector-1.7.13-1.1.3.1.s390.rpm 5e56940108227bb4dcdc16d4a0af34b3 mozilla-js-debugger-1.7.13-1.1.3.1.s390.rpm 9837a1a70a44eddeda0c4ec65a495774 mozilla-mail-1.7.13-1.1.3.1.s390.rpm 0a429bf57b358e4c1abb5aa9cd84cb9d mozilla-nspr-1.7.13-1.1.3.1.s390.rpm 8f8c9189973ee9e2d0c23ef802c3c5a9 mozilla-nspr-devel-1.7.13-1.1.3.1.s390.rpm a86a1eba83939ad566518ebe9a9c357b mozilla-nss-1.7.13-1.1.3.1.s390.rpm 6d890d7c3d2184577ab8664acfe474ad mozilla-nss-devel-1.7.13-1.1.3.1.s390.rpm s390x: cb87bc6be8905f7a760274f13ef35420 mozilla-1.7.13-1.1.3.1.s390x.rpm e5aac5edd88c8f5973f2f6ba618dbb1e mozilla-chat-1.7.13-1.1.3.1.s390x.rpm e9e2a1d01c5a83f61f9f17845ecc5971 mozilla-debuginfo-1.7.13-1.1.3.1.s390.rpm d638e07f1c8908d54873a25c4bdfc6af mozilla-debuginfo-1.7.13-1.1.3.1.s390x.rpm 0d736d22d01a177ccb6915ea4086ce3d mozilla-devel-1.7.13-1.1.3.1.s390x.rpm e7b5850ef96eb838bacf845fb20b71b1 mozilla-dom-inspector-1.7.13-1.1.3.1.s390x.rpm 08fee969e2298960ef98d2ff67d31eb4 mozilla-js-debugger-1.7.13-1.1.3.1.s390x.rpm 6eb8ae43eb914f5c5eb7cc2c0f250ac9 mozilla-mail-1.7.13-1.1.3.1.s390x.rpm 0a429bf57b358e4c1abb5aa9cd84cb9d mozilla-nspr-1.7.13-1.1.3.1.s390.rpm 31986ef820a4806f39e393836c5c8b6b mozilla-nspr-1.7.13-1.1.3.1.s390x.rpm c9e60be8adff4c8c0e1bbfb9d1732e62 mozilla-nspr-devel-1.7.13-1.1.3.1.s390x.rpm a86a1eba83939ad566518ebe9a9c357b mozilla-nss-1.7.13-1.1.3.1.s390.rpm 3cddf2ff770795e239e589a9d7a2c76a mozilla-nss-1.7.13-1.1.3.1.s390x.rpm 5a392e1e86e6a3f9ac7fa54220c3a8b2 mozilla-nss-devel-1.7.13-1.1.3.1.s390x.rpm x86_64: 8dc644b3e806d6ae01a6b62cd583ce6f mozilla-1.7.13-1.1.3.1.i386.rpm e7354f0dd6b2d552ea09f09fd96593c4 mozilla-1.7.13-1.1.3.1.x86_64.rpm a05437c52675210fd64393f8e3756cc5 mozilla-chat-1.7.13-1.1.3.1.x86_64.rpm 3446b2bb4b24e3e250487c280284158c mozilla-debuginfo-1.7.13-1.1.3.1.i386.rpm b93fc63ec776c7ec5819c3f6da173de4 mozilla-debuginfo-1.7.13-1.1.3.1.x86_64.rpm 4f4af03387bff15bab23c83cb353216e mozilla-devel-1.7.13-1.1.3.1.x86_64.rpm eba9dcc06685e7b103f701c502ffdf04 mozilla-dom-inspector-1.7.13-1.1.3.1.x86_64.rpm 3e5fea60d215df3bbcc7a960b023a8b1 mozilla-js-debugger-1.7.13-1.1.3.1.x86_64.rpm 2ff338bf5521b8eb7ceda9fc9bc0605e mozilla-mail-1.7.13-1.1.3.1.x86_64.rpm a5dfbd5b6d0515a9f863d8d624b938b4 mozilla-nspr-1.7.13-1.1.3.1.i386.rpm 3230a2b4b0009d1ff021ba2c99b534fd mozilla-nspr-1.7.13-1.1.3.1.x86_64.rpm 929f9166a15721fafbd913043a82a9ee mozilla-nspr-devel-1.7.13-1.1.3.1.x86_64.rpm b15e9a9160bf4baac2ecde3a1863d42a mozilla-nss-1.7.13-1.1.3.1.i386.rpm 84f645430dafe0d02cb6d9a84c526ec7 mozilla-nss-1.7.13-1.1.3.1.x86_64.rpm c5da21fabb4b52c4ba830cac83c031cd mozilla-nss-devel-1.7.13-1.1.3.1.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/mozilla-1.7.13-1.1.3.1.src.rpm ada9ad75adaafc2dc64f01945d0abbf6 mozilla-1.7.13-1.1.3.1.src.rpm i386: 8dc644b3e806d6ae01a6b62cd583ce6f mozilla-1.7.13-1.1.3.1.i386.rpm 552f4b7dc1bc41349a7d7eb10059d9b7 mozilla-chat-1.7.13-1.1.3.1.i386.rpm 3446b2bb4b24e3e250487c280284158c mozilla-debuginfo-1.7.13-1.1.3.1.i386.rpm 738298f6bd501c6612c321318c927484 mozilla-devel-1.7.13-1.1.3.1.i386.rpm 91fd4ef291f830b9f981b6612685c48b mozilla-dom-inspector-1.7.13-1.1.3.1.i386.rpm 89ba667a1b10f86ed299da136b3d53f7 mozilla-js-debugger-1.7.13-1.1.3.1.i386.rpm b794a61dd8dc7280c36fec095978f0fd mozilla-mail-1.7.13-1.1.3.1.i386.rpm a5dfbd5b6d0515a9f863d8d624b938b4 mozilla-nspr-1.7.13-1.1.3.1.i386.rpm 59bae0813caf908149df7e14533b2d8e mozilla-nspr-devel-1.7.13-1.1.3.1.i386.rpm b15e9a9160bf4baac2ecde3a1863d42a mozilla-nss-1.7.13-1.1.3.1.i386.rpm 2eafa7f3b74c9b3b09d6d7cac83e2293 mozilla-nss-devel-1.7.13-1.1.3.1.i386.rpm x86_64: 8dc644b3e806d6ae01a6b62cd583ce6f mozilla-1.7.13-1.1.3.1.i386.rpm e7354f0dd6b2d552ea09f09fd96593c4 mozilla-1.7.13-1.1.3.1.x86_64.rpm a05437c52675210fd64393f8e3756cc5 mozilla-chat-1.7.13-1.1.3.1.x86_64.rpm 3446b2bb4b24e3e250487c280284158c mozilla-debuginfo-1.7.13-1.1.3.1.i386.rpm b93fc63ec776c7ec5819c3f6da173de4 mozilla-debuginfo-1.7.13-1.1.3.1.x86_64.rpm 4f4af03387bff15bab23c83cb353216e mozilla-devel-1.7.13-1.1.3.1.x86_64.rpm eba9dcc06685e7b103f701c502ffdf04 mozilla-dom-inspector-1.7.13-1.1.3.1.x86_64.rpm 3e5fea60d215df3bbcc7a960b023a8b1 mozilla-js-debugger-1.7.13-1.1.3.1.x86_64.rpm 2ff338bf5521b8eb7ceda9fc9bc0605e mozilla-mail-1.7.13-1.1.3.1.x86_64.rpm a5dfbd5b6d0515a9f863d8d624b938b4 mozilla-nspr-1.7.13-1.1.3.1.i386.rpm 3230a2b4b0009d1ff021ba2c99b534fd mozilla-nspr-1.7.13-1.1.3.1.x86_64.rpm 929f9166a15721fafbd913043a82a9ee mozilla-nspr-devel-1.7.13-1.1.3.1.x86_64.rpm b15e9a9160bf4baac2ecde3a1863d42a mozilla-nss-1.7.13-1.1.3.1.i386.rpm 84f645430dafe0d02cb6d9a84c526ec7 mozilla-nss-1.7.13-1.1.3.1.x86_64.rpm c5da21fabb4b52c4ba830cac83c031cd mozilla-nss-devel-1.7.13-1.1.3.1.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/mozilla-1.7.13-1.1.3.1.src.rpm ada9ad75adaafc2dc64f01945d0abbf6 mozilla-1.7.13-1.1.3.1.src.rpm i386: 8dc644b3e806d6ae01a6b62cd583ce6f mozilla-1.7.13-1.1.3.1.i386.rpm 552f4b7dc1bc41349a7d7eb10059d9b7 mozilla-chat-1.7.13-1.1.3.1.i386.rpm 3446b2bb4b24e3e250487c280284158c mozilla-debuginfo-1.7.13-1.1.3.1.i386.rpm 738298f6bd501c6612c321318c927484 mozilla-devel-1.7.13-1.1.3.1.i386.rpm 91fd4ef291f830b9f981b6612685c48b mozilla-dom-inspector-1.7.13-1.1.3.1.i386.rpm 89ba667a1b10f86ed299da136b3d53f7 mozilla-js-debugger-1.7.13-1.1.3.1.i386.rpm b794a61dd8dc7280c36fec095978f0fd mozilla-mail-1.7.13-1.1.3.1.i386.rpm a5dfbd5b6d0515a9f863d8d624b938b4 mozilla-nspr-1.7.13-1.1.3.1.i386.rpm 59bae0813caf908149df7e14533b2d8e mozilla-nspr-devel-1.7.13-1.1.3.1.i386.rpm b15e9a9160bf4baac2ecde3a1863d42a mozilla-nss-1.7.13-1.1.3.1.i386.rpm 2eafa7f3b74c9b3b09d6d7cac83e2293 mozilla-nss-devel-1.7.13-1.1.3.1.i386.rpm ia64: d21e5f2bfda33416c3674cdf6a526b33 mozilla-1.7.13-1.1.3.1.ia64.rpm c6fc9f59cabb1f383798bbe809b3e813 mozilla-chat-1.7.13-1.1.3.1.ia64.rpm 3446b2bb4b24e3e250487c280284158c mozilla-debuginfo-1.7.13-1.1.3.1.i386.rpm 2ace58853a4983440561ab6ee7f456f5 mozilla-debuginfo-1.7.13-1.1.3.1.ia64.rpm 970462f30fbbfc0790eb107eaa52bf37 mozilla-devel-1.7.13-1.1.3.1.ia64.rpm 42995c0bd387caf40f0268842fec4d5d mozilla-dom-inspector-1.7.13-1.1.3.1.ia64.rpm 9a174adef987098a380aaa8a74887513 mozilla-js-debugger-1.7.13-1.1.3.1.ia64.rpm 11cb099fb7c83724b469bd8723dd3580 mozilla-mail-1.7.13-1.1.3.1.ia64.rpm a5dfbd5b6d0515a9f863d8d624b938b4 mozilla-nspr-1.7.13-1.1.3.1.i386.rpm cb7950a8c123d7626968ac4bd76ab798 mozilla-nspr-1.7.13-1.1.3.1.ia64.rpm 32ac9a0111e186618de6b5d67e981cbc mozilla-nspr-devel-1.7.13-1.1.3.1.ia64.rpm b15e9a9160bf4baac2ecde3a1863d42a mozilla-nss-1.7.13-1.1.3.1.i386.rpm 0fe4e8e5079fdeb3a7c27e5b6e5429d5 mozilla-nss-1.7.13-1.1.3.1.ia64.rpm 6c261b2462b46f39ba385ac82138fead mozilla-nss-devel-1.7.13-1.1.3.1.ia64.rpm x86_64: 8dc644b3e806d6ae01a6b62cd583ce6f mozilla-1.7.13-1.1.3.1.i386.rpm e7354f0dd6b2d552ea09f09fd96593c4 mozilla-1.7.13-1.1.3.1.x86_64.rpm a05437c52675210fd64393f8e3756cc5 mozilla-chat-1.7.13-1.1.3.1.x86_64.rpm 3446b2bb4b24e3e250487c280284158c mozilla-debuginfo-1.7.13-1.1.3.1.i386.rpm b93fc63ec776c7ec5819c3f6da173de4 mozilla-debuginfo-1.7.13-1.1.3.1.x86_64.rpm 4f4af03387bff15bab23c83cb353216e mozilla-devel-1.7.13-1.1.3.1.x86_64.rpm eba9dcc06685e7b103f701c502ffdf04 mozilla-dom-inspector-1.7.13-1.1.3.1.x86_64.rpm 3e5fea60d215df3bbcc7a960b023a8b1 mozilla-js-debugger-1.7.13-1.1.3.1.x86_64.rpm 2ff338bf5521b8eb7ceda9fc9bc0605e mozilla-mail-1.7.13-1.1.3.1.x86_64.rpm a5dfbd5b6d0515a9f863d8d624b938b4 mozilla-nspr-1.7.13-1.1.3.1.i386.rpm 3230a2b4b0009d1ff021ba2c99b534fd mozilla-nspr-1.7.13-1.1.3.1.x86_64.rpm 929f9166a15721fafbd913043a82a9ee mozilla-nspr-devel-1.7.13-1.1.3.1.x86_64.rpm b15e9a9160bf4baac2ecde3a1863d42a mozilla-nss-1.7.13-1.1.3.1.i386.rpm 84f645430dafe0d02cb6d9a84c526ec7 mozilla-nss-1.7.13-1.1.3.1.x86_64.rpm c5da21fabb4b52c4ba830cac83c031cd mozilla-nss-devel-1.7.13-1.1.3.1.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/mozilla-1.7.13-1.1.3.1.src.rpm ada9ad75adaafc2dc64f01945d0abbf6 mozilla-1.7.13-1.1.3.1.src.rpm i386: 8dc644b3e806d6ae01a6b62cd583ce6f mozilla-1.7.13-1.1.3.1.i386.rpm 552f4b7dc1bc41349a7d7eb10059d9b7 mozilla-chat-1.7.13-1.1.3.1.i386.rpm 3446b2bb4b24e3e250487c280284158c mozilla-debuginfo-1.7.13-1.1.3.1.i386.rpm 738298f6bd501c6612c321318c927484 mozilla-devel-1.7.13-1.1.3.1.i386.rpm 91fd4ef291f830b9f981b6612685c48b mozilla-dom-inspector-1.7.13-1.1.3.1.i386.rpm 89ba667a1b10f86ed299da136b3d53f7 mozilla-js-debugger-1.7.13-1.1.3.1.i386.rpm b794a61dd8dc7280c36fec095978f0fd mozilla-mail-1.7.13-1.1.3.1.i386.rpm a5dfbd5b6d0515a9f863d8d624b938b4 mozilla-nspr-1.7.13-1.1.3.1.i386.rpm 59bae0813caf908149df7e14533b2d8e mozilla-nspr-devel-1.7.13-1.1.3.1.i386.rpm b15e9a9160bf4baac2ecde3a1863d42a mozilla-nss-1.7.13-1.1.3.1.i386.rpm 2eafa7f3b74c9b3b09d6d7cac83e2293 mozilla-nss-devel-1.7.13-1.1.3.1.i386.rpm ia64: d21e5f2bfda33416c3674cdf6a526b33 mozilla-1.7.13-1.1.3.1.ia64.rpm c6fc9f59cabb1f383798bbe809b3e813 mozilla-chat-1.7.13-1.1.3.1.ia64.rpm 3446b2bb4b24e3e250487c280284158c mozilla-debuginfo-1.7.13-1.1.3.1.i386.rpm 2ace58853a4983440561ab6ee7f456f5 mozilla-debuginfo-1.7.13-1.1.3.1.ia64.rpm 970462f30fbbfc0790eb107eaa52bf37 mozilla-devel-1.7.13-1.1.3.1.ia64.rpm 42995c0bd387caf40f0268842fec4d5d mozilla-dom-inspector-1.7.13-1.1.3.1.ia64.rpm 9a174adef987098a380aaa8a74887513 mozilla-js-debugger-1.7.13-1.1.3.1.ia64.rpm 11cb099fb7c83724b469bd8723dd3580 mozilla-mail-1.7.13-1.1.3.1.ia64.rpm a5dfbd5b6d0515a9f863d8d624b938b4 mozilla-nspr-1.7.13-1.1.3.1.i386.rpm cb7950a8c123d7626968ac4bd76ab798 mozilla-nspr-1.7.13-1.1.3.1.ia64.rpm 32ac9a0111e186618de6b5d67e981cbc mozilla-nspr-devel-1.7.13-1.1.3.1.ia64.rpm b15e9a9160bf4baac2ecde3a1863d42a mozilla-nss-1.7.13-1.1.3.1.i386.rpm 0fe4e8e5079fdeb3a7c27e5b6e5429d5 mozilla-nss-1.7.13-1.1.3.1.ia64.rpm 6c261b2462b46f39ba385ac82138fead mozilla-nss-devel-1.7.13-1.1.3.1.ia64.rpm x86_64: 8dc644b3e806d6ae01a6b62cd583ce6f mozilla-1.7.13-1.1.3.1.i386.rpm e7354f0dd6b2d552ea09f09fd96593c4 mozilla-1.7.13-1.1.3.1.x86_64.rpm a05437c52675210fd64393f8e3756cc5 mozilla-chat-1.7.13-1.1.3.1.x86_64.rpm 3446b2bb4b24e3e250487c280284158c mozilla-debuginfo-1.7.13-1.1.3.1.i386.rpm b93fc63ec776c7ec5819c3f6da173de4 mozilla-debuginfo-1.7.13-1.1.3.1.x86_64.rpm 4f4af03387bff15bab23c83cb353216e mozilla-devel-1.7.13-1.1.3.1.x86_64.rpm eba9dcc06685e7b103f701c502ffdf04 mozilla-dom-inspector-1.7.13-1.1.3.1.x86_64.rpm 3e5fea60d215df3bbcc7a960b023a8b1 mozilla-js-debugger-1.7.13-1.1.3.1.x86_64.rpm 2ff338bf5521b8eb7ceda9fc9bc0605e mozilla-mail-1.7.13-1.1.3.1.x86_64.rpm a5dfbd5b6d0515a9f863d8d624b938b4 mozilla-nspr-1.7.13-1.1.3.1.i386.rpm 3230a2b4b0009d1ff021ba2c99b534fd mozilla-nspr-1.7.13-1.1.3.1.x86_64.rpm 929f9166a15721fafbd913043a82a9ee mozilla-nspr-devel-1.7.13-1.1.3.1.x86_64.rpm b15e9a9160bf4baac2ecde3a1863d42a mozilla-nss-1.7.13-1.1.3.1.i386.rpm 84f645430dafe0d02cb6d9a84c526ec7 mozilla-nss-1.7.13-1.1.3.1.x86_64.rpm c5da21fabb4b52c4ba830cac83c031cd mozilla-nss-devel-1.7.13-1.1.3.1.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/devhelp-0.9.2-2.4.8.src.rpm 8a45e76dd9a54acc2ef43889898f1aa2 devhelp-0.9.2-2.4.8.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/mozilla-1.7.13-1.4.1.src.rpm 78f62cc32e262495aa8a1c4f8f2be78b mozilla-1.7.13-1.4.1.src.rpm i386: 169542005d406c0a94bdf6289c89da8d devhelp-0.9.2-2.4.8.i386.rpm 6a587667913c87849e1fe8f0fc6bfe13 devhelp-debuginfo-0.9.2-2.4.8.i386.rpm a304e403ac7e17aebddde70a124c4ac0 devhelp-devel-0.9.2-2.4.8.i386.rpm c7ea8b9bbb2d9ad0af97761e23ff0498 mozilla-1.7.13-1.4.1.i386.rpm 567bab9f5abd07d8b6f84d7d9e2eb70c mozilla-chat-1.7.13-1.4.1.i386.rpm cd2272d1460d1a1510d7fd78ad8398f5 mozilla-debuginfo-1.7.13-1.4.1.i386.rpm a3b8397f87dd9805b0b75d62e15bc2d1 mozilla-devel-1.7.13-1.4.1.i386.rpm 7a30f81dd7443613c57035675adfb312 mozilla-dom-inspector-1.7.13-1.4.1.i386.rpm 7ba3d19407f80180b96c8b34c5c5ba30 mozilla-js-debugger-1.7.13-1.4.1.i386.rpm 9fc1b9e752b179325bb178910c197076 mozilla-mail-1.7.13-1.4.1.i386.rpm 8af4bc8eac2632cbc26d8c1d1c859341 mozilla-nspr-1.7.13-1.4.1.i386.rpm ed46848b8d26e9f24bd4d7e096e9673e mozilla-nspr-devel-1.7.13-1.4.1.i386.rpm 3da30b6d64fdd2343bc44d93483762a2 mozilla-nss-1.7.13-1.4.1.i386.rpm 598687f7519fd15fa73d095f7584a55a mozilla-nss-devel-1.7.13-1.4.1.i386.rpm ia64: 194d30eccf1c8e2f105457e385be5615 mozilla-1.7.13-1.4.1.ia64.rpm 34132fd56ec3cf49525eccbc0e53b769 mozilla-chat-1.7.13-1.4.1.ia64.rpm cd2272d1460d1a1510d7fd78ad8398f5 mozilla-debuginfo-1.7.13-1.4.1.i386.rpm ab05c22d0781ce853e93a995dd0bbc5b mozilla-debuginfo-1.7.13-1.4.1.ia64.rpm 0b6a06839fd36ce4c4300d869c942bc4 mozilla-devel-1.7.13-1.4.1.ia64.rpm 52215d8f86afd6659e24c411879f6cbe mozilla-dom-inspector-1.7.13-1.4.1.ia64.rpm 8eb09cdfceda623b82a714eaadbd4145 mozilla-js-debugger-1.7.13-1.4.1.ia64.rpm 117cc2f9faa50b59b09c318ec9892d70 mozilla-mail-1.7.13-1.4.1.ia64.rpm 8af4bc8eac2632cbc26d8c1d1c859341 mozilla-nspr-1.7.13-1.4.1.i386.rpm 21b564259c346e250cf6ad35ca1abebe mozilla-nspr-1.7.13-1.4.1.ia64.rpm 9099c2e0c400ac93a19bef937db86b22 mozilla-nspr-devel-1.7.13-1.4.1.ia64.rpm 3da30b6d64fdd2343bc44d93483762a2 mozilla-nss-1.7.13-1.4.1.i386.rpm 9a5ea305b014dcda172ac4faeae865ac mozilla-nss-1.7.13-1.4.1.ia64.rpm b10045a431ba7f73199cac95e1bfd218 mozilla-nss-devel-1.7.13-1.4.1.ia64.rpm ppc: 06bc1e586f3455eb252f3870a8173dce devhelp-0.9.2-2.4.8.ppc.rpm 53a01b1de5a9834fccc7a8256fcb48cc devhelp-debuginfo-0.9.2-2.4.8.ppc.rpm c6bb08246bbe95938c0eb24c809da67b devhelp-devel-0.9.2-2.4.8.ppc.rpm 6542fe1727d91fa274ffea1183829560 mozilla-1.7.13-1.4.1.ppc.rpm 73d88d85652da3d69e9a0ad24b4844a8 mozilla-chat-1.7.13-1.4.1.ppc.rpm cfa6860e914275b713582e881d604912 mozilla-debuginfo-1.7.13-1.4.1.ppc.rpm dae162fc76e04be32793cd5e14234a3b mozilla-devel-1.7.13-1.4.1.ppc.rpm 22252c3709edc5d9b1b6c6f4c6609bff mozilla-dom-inspector-1.7.13-1.4.1.ppc.rpm d469594076fca215e045508c3cad929d mozilla-js-debugger-1.7.13-1.4.1.ppc.rpm bba15733ddb56ee234412d7d085df9e6 mozilla-mail-1.7.13-1.4.1.ppc.rpm 86ab0d394d227fe9409ffc9693ab35f1 mozilla-nspr-1.7.13-1.4.1.ppc.rpm 61a9b38b6e760552ca704a4e111fedd0 mozilla-nspr-devel-1.7.13-1.4.1.ppc.rpm e95f99a9b14c1b3048a5e6e9a8e91002 mozilla-nss-1.7.13-1.4.1.ppc.rpm 049154925686d15d4c8596de08923590 mozilla-nss-devel-1.7.13-1.4.1.ppc.rpm s390: e419905d50c7c2246c940ff87d5ce480 mozilla-1.7.13-1.4.1.s390.rpm 55ce027551a8e9b8a88bc7f8851b2ac3 mozilla-chat-1.7.13-1.4.1.s390.rpm 6ca18be209ed529defd1fff1b4ab454b mozilla-debuginfo-1.7.13-1.4.1.s390.rpm 09f1b90d0db13c0c82bc440fc816bc12 mozilla-devel-1.7.13-1.4.1.s390.rpm dd4ca3a47ee2f71af5cc04da0d80cba1 mozilla-dom-inspector-1.7.13-1.4.1.s390.rpm f88e6c42156a0638ae9d4b59f5160001 mozilla-js-debugger-1.7.13-1.4.1.s390.rpm 8fdf3b9a52034012fbd83826b5c82f88 mozilla-mail-1.7.13-1.4.1.s390.rpm da6843b0b3cc962bfa391b25b8f427d9 mozilla-nspr-1.7.13-1.4.1.s390.rpm 8ab0349e1dbbbd2f683bc7d7dc42c911 mozilla-nspr-devel-1.7.13-1.4.1.s390.rpm 314a1cc2329aa5d3cf712fe9497839b9 mozilla-nss-1.7.13-1.4.1.s390.rpm 94d389364e19d9dfd06d9c76dcde8f71 mozilla-nss-devel-1.7.13-1.4.1.s390.rpm s390x: 7135436ce0f2ae04f775c3a08207191f mozilla-1.7.13-1.4.1.s390x.rpm 8ef28d11c17e046202631a827060094d mozilla-chat-1.7.13-1.4.1.s390x.rpm 6ca18be209ed529defd1fff1b4ab454b mozilla-debuginfo-1.7.13-1.4.1.s390.rpm c7d2dde2f48a06eceb772ff5b6e15307 mozilla-debuginfo-1.7.13-1.4.1.s390x.rpm ec747a7b973aaba53a99e5060909c96d mozilla-devel-1.7.13-1.4.1.s390x.rpm a09cffd358dbad6911d2d374237147f7 mozilla-dom-inspector-1.7.13-1.4.1.s390x.rpm 0378cbf293ce25608a8da3dcb4fd1fce mozilla-js-debugger-1.7.13-1.4.1.s390x.rpm a816822ec5ff7c13491776313a7c3943 mozilla-mail-1.7.13-1.4.1.s390x.rpm da6843b0b3cc962bfa391b25b8f427d9 mozilla-nspr-1.7.13-1.4.1.s390.rpm eb28541aac9f409de60207a3ff6c65fe mozilla-nspr-1.7.13-1.4.1.s390x.rpm 9dfb1c5221b16fa7bee94dfe3824e52d mozilla-nspr-devel-1.7.13-1.4.1.s390x.rpm 314a1cc2329aa5d3cf712fe9497839b9 mozilla-nss-1.7.13-1.4.1.s390.rpm bfaca6f72c0316e7af4268b3d77152d1 mozilla-nss-1.7.13-1.4.1.s390x.rpm b6906f4a44a64a957a53d093296aa783 mozilla-nss-devel-1.7.13-1.4.1.s390x.rpm x86_64: b7b12ea5ddc71fb40164cc90c7dd48f2 devhelp-0.9.2-2.4.8.x86_64.rpm 67ad9e060a713e5d40e436f9dbf20a3f devhelp-debuginfo-0.9.2-2.4.8.x86_64.rpm dde3723459fa48ed5b4db0a803b8cb1d devhelp-devel-0.9.2-2.4.8.x86_64.rpm 11d60127eccb8b128d5436d6d1109ab6 mozilla-1.7.13-1.4.1.x86_64.rpm a6a50d81f13425ef825706cefd8486c6 mozilla-chat-1.7.13-1.4.1.x86_64.rpm cd2272d1460d1a1510d7fd78ad8398f5 mozilla-debuginfo-1.7.13-1.4.1.i386.rpm 3535e6f823e4994dabf9440d6e19def7 mozilla-debuginfo-1.7.13-1.4.1.x86_64.rpm f17bfb39cfea67e2b49c897d48ef4328 mozilla-devel-1.7.13-1.4.1.x86_64.rpm c4c19889a64a96946801d7efd2d45bc2 mozilla-dom-inspector-1.7.13-1.4.1.x86_64.rpm 767a1b443bf47e56153a16d591306e2a mozilla-js-debugger-1.7.13-1.4.1.x86_64.rpm e0fe2bf10f17b1697ac9b3b772a5628b mozilla-mail-1.7.13-1.4.1.x86_64.rpm 8af4bc8eac2632cbc26d8c1d1c859341 mozilla-nspr-1.7.13-1.4.1.i386.rpm af4b0327d4a1c0e578e86030b29a5a9c mozilla-nspr-1.7.13-1.4.1.x86_64.rpm 22ab29c72de3ccc907f1b1990444c468 mozilla-nspr-devel-1.7.13-1.4.1.x86_64.rpm 3da30b6d64fdd2343bc44d93483762a2 mozilla-nss-1.7.13-1.4.1.i386.rpm d57aab44828618485d3498457e6b419a mozilla-nss-1.7.13-1.4.1.x86_64.rpm 9c458e5da28816d4bc34ed3440a5e3d6 mozilla-nss-devel-1.7.13-1.4.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/devhelp-0.9.2-2.4.8.src.rpm 8a45e76dd9a54acc2ef43889898f1aa2 devhelp-0.9.2-2.4.8.src.rpm ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/mozilla-1.7.13-1.4.1.src.rpm 78f62cc32e262495aa8a1c4f8f2be78b mozilla-1.7.13-1.4.1.src.rpm i386: 169542005d406c0a94bdf6289c89da8d devhelp-0.9.2-2.4.8.i386.rpm 6a587667913c87849e1fe8f0fc6bfe13 devhelp-debuginfo-0.9.2-2.4.8.i386.rpm a304e403ac7e17aebddde70a124c4ac0 devhelp-devel-0.9.2-2.4.8.i386.rpm c7ea8b9bbb2d9ad0af97761e23ff0498 mozilla-1.7.13-1.4.1.i386.rpm 567bab9f5abd07d8b6f84d7d9e2eb70c mozilla-chat-1.7.13-1.4.1.i386.rpm cd2272d1460d1a1510d7fd78ad8398f5 mozilla-debuginfo-1.7.13-1.4.1.i386.rpm a3b8397f87dd9805b0b75d62e15bc2d1 mozilla-devel-1.7.13-1.4.1.i386.rpm 7a30f81dd7443613c57035675adfb312 mozilla-dom-inspector-1.7.13-1.4.1.i386.rpm 7ba3d19407f80180b96c8b34c5c5ba30 mozilla-js-debugger-1.7.13-1.4.1.i386.rpm 9fc1b9e752b179325bb178910c197076 mozilla-mail-1.7.13-1.4.1.i386.rpm 8af4bc8eac2632cbc26d8c1d1c859341 mozilla-nspr-1.7.13-1.4.1.i386.rpm ed46848b8d26e9f24bd4d7e096e9673e mozilla-nspr-devel-1.7.13-1.4.1.i386.rpm 3da30b6d64fdd2343bc44d93483762a2 mozilla-nss-1.7.13-1.4.1.i386.rpm 598687f7519fd15fa73d095f7584a55a mozilla-nss-devel-1.7.13-1.4.1.i386.rpm x86_64: b7b12ea5ddc71fb40164cc90c7dd48f2 devhelp-0.9.2-2.4.8.x86_64.rpm 67ad9e060a713e5d40e436f9dbf20a3f devhelp-debuginfo-0.9.2-2.4.8.x86_64.rpm dde3723459fa48ed5b4db0a803b8cb1d devhelp-devel-0.9.2-2.4.8.x86_64.rpm 11d60127eccb8b128d5436d6d1109ab6 mozilla-1.7.13-1.4.1.x86_64.rpm a6a50d81f13425ef825706cefd8486c6 mozilla-chat-1.7.13-1.4.1.x86_64.rpm cd2272d1460d1a1510d7fd78ad8398f5 mozilla-debuginfo-1.7.13-1.4.1.i386.rpm 3535e6f823e4994dabf9440d6e19def7 mozilla-debuginfo-1.7.13-1.4.1.x86_64.rpm f17bfb39cfea67e2b49c897d48ef4328 mozilla-devel-1.7.13-1.4.1.x86_64.rpm c4c19889a64a96946801d7efd2d45bc2 mozilla-dom-inspector-1.7.13-1.4.1.x86_64.rpm 767a1b443bf47e56153a16d591306e2a mozilla-js-debugger-1.7.13-1.4.1.x86_64.rpm e0fe2bf10f17b1697ac9b3b772a5628b mozilla-mail-1.7.13-1.4.1.x86_64.rpm 8af4bc8eac2632cbc26d8c1d1c859341 mozilla-nspr-1.7.13-1.4.1.i386.rpm af4b0327d4a1c0e578e86030b29a5a9c mozilla-nspr-1.7.13-1.4.1.x86_64.rpm 22ab29c72de3ccc907f1b1990444c468 mozilla-nspr-devel-1.7.13-1.4.1.x86_64.rpm 3da30b6d64fdd2343bc44d93483762a2 mozilla-nss-1.7.13-1.4.1.i386.rpm d57aab44828618485d3498457e6b419a mozilla-nss-1.7.13-1.4.1.x86_64.rpm 9c458e5da28816d4bc34ed3440a5e3d6 mozilla-nss-devel-1.7.13-1.4.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/devhelp-0.9.2-2.4.8.src.rpm 8a45e76dd9a54acc2ef43889898f1aa2 devhelp-0.9.2-2.4.8.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/mozilla-1.7.13-1.4.1.src.rpm 78f62cc32e262495aa8a1c4f8f2be78b mozilla-1.7.13-1.4.1.src.rpm i386: 169542005d406c0a94bdf6289c89da8d devhelp-0.9.2-2.4.8.i386.rpm 6a587667913c87849e1fe8f0fc6bfe13 devhelp-debuginfo-0.9.2-2.4.8.i386.rpm a304e403ac7e17aebddde70a124c4ac0 devhelp-devel-0.9.2-2.4.8.i386.rpm c7ea8b9bbb2d9ad0af97761e23ff0498 mozilla-1.7.13-1.4.1.i386.rpm 567bab9f5abd07d8b6f84d7d9e2eb70c mozilla-chat-1.7.13-1.4.1.i386.rpm cd2272d1460d1a1510d7fd78ad8398f5 mozilla-debuginfo-1.7.13-1.4.1.i386.rpm a3b8397f87dd9805b0b75d62e15bc2d1 mozilla-devel-1.7.13-1.4.1.i386.rpm 7a30f81dd7443613c57035675adfb312 mozilla-dom-inspector-1.7.13-1.4.1.i386.rpm 7ba3d19407f80180b96c8b34c5c5ba30 mozilla-js-debugger-1.7.13-1.4.1.i386.rpm 9fc1b9e752b179325bb178910c197076 mozilla-mail-1.7.13-1.4.1.i386.rpm 8af4bc8eac2632cbc26d8c1d1c859341 mozilla-nspr-1.7.13-1.4.1.i386.rpm ed46848b8d26e9f24bd4d7e096e9673e mozilla-nspr-devel-1.7.13-1.4.1.i386.rpm 3da30b6d64fdd2343bc44d93483762a2 mozilla-nss-1.7.13-1.4.1.i386.rpm 598687f7519fd15fa73d095f7584a55a mozilla-nss-devel-1.7.13-1.4.1.i386.rpm ia64: 194d30eccf1c8e2f105457e385be5615 mozilla-1.7.13-1.4.1.ia64.rpm 34132fd56ec3cf49525eccbc0e53b769 mozilla-chat-1.7.13-1.4.1.ia64.rpm cd2272d1460d1a1510d7fd78ad8398f5 mozilla-debuginfo-1.7.13-1.4.1.i386.rpm ab05c22d0781ce853e93a995dd0bbc5b mozilla-debuginfo-1.7.13-1.4.1.ia64.rpm 0b6a06839fd36ce4c4300d869c942bc4 mozilla-devel-1.7.13-1.4.1.ia64.rpm 52215d8f86afd6659e24c411879f6cbe mozilla-dom-inspector-1.7.13-1.4.1.ia64.rpm 8eb09cdfceda623b82a714eaadbd4145 mozilla-js-debugger-1.7.13-1.4.1.ia64.rpm 117cc2f9faa50b59b09c318ec9892d70 mozilla-mail-1.7.13-1.4.1.ia64.rpm 8af4bc8eac2632cbc26d8c1d1c859341 mozilla-nspr-1.7.13-1.4.1.i386.rpm 21b564259c346e250cf6ad35ca1abebe mozilla-nspr-1.7.13-1.4.1.ia64.rpm 9099c2e0c400ac93a19bef937db86b22 mozilla-nspr-devel-1.7.13-1.4.1.ia64.rpm 3da30b6d64fdd2343bc44d93483762a2 mozilla-nss-1.7.13-1.4.1.i386.rpm 9a5ea305b014dcda172ac4faeae865ac mozilla-nss-1.7.13-1.4.1.ia64.rpm b10045a431ba7f73199cac95e1bfd218 mozilla-nss-devel-1.7.13-1.4.1.ia64.rpm x86_64: b7b12ea5ddc71fb40164cc90c7dd48f2 devhelp-0.9.2-2.4.8.x86_64.rpm 67ad9e060a713e5d40e436f9dbf20a3f devhelp-debuginfo-0.9.2-2.4.8.x86_64.rpm dde3723459fa48ed5b4db0a803b8cb1d devhelp-devel-0.9.2-2.4.8.x86_64.rpm 11d60127eccb8b128d5436d6d1109ab6 mozilla-1.7.13-1.4.1.x86_64.rpm a6a50d81f13425ef825706cefd8486c6 mozilla-chat-1.7.13-1.4.1.x86_64.rpm cd2272d1460d1a1510d7fd78ad8398f5 mozilla-debuginfo-1.7.13-1.4.1.i386.rpm 3535e6f823e4994dabf9440d6e19def7 mozilla-debuginfo-1.7.13-1.4.1.x86_64.rpm f17bfb39cfea67e2b49c897d48ef4328 mozilla-devel-1.7.13-1.4.1.x86_64.rpm c4c19889a64a96946801d7efd2d45bc2 mozilla-dom-inspector-1.7.13-1.4.1.x86_64.rpm 767a1b443bf47e56153a16d591306e2a mozilla-js-debugger-1.7.13-1.4.1.x86_64.rpm e0fe2bf10f17b1697ac9b3b772a5628b mozilla-mail-1.7.13-1.4.1.x86_64.rpm 8af4bc8eac2632cbc26d8c1d1c859341 mozilla-nspr-1.7.13-1.4.1.i386.rpm af4b0327d4a1c0e578e86030b29a5a9c mozilla-nspr-1.7.13-1.4.1.x86_64.rpm 22ab29c72de3ccc907f1b1990444c468 mozilla-nspr-devel-1.7.13-1.4.1.x86_64.rpm 3da30b6d64fdd2343bc44d93483762a2 mozilla-nss-1.7.13-1.4.1.i386.rpm d57aab44828618485d3498457e6b419a mozilla-nss-1.7.13-1.4.1.x86_64.rpm 9c458e5da28816d4bc34ed3440a5e3d6 mozilla-nss-devel-1.7.13-1.4.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/devhelp-0.9.2-2.4.8.src.rpm 8a45e76dd9a54acc2ef43889898f1aa2 devhelp-0.9.2-2.4.8.src.rpm ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/mozilla-1.7.13-1.4.1.src.rpm 78f62cc32e262495aa8a1c4f8f2be78b mozilla-1.7.13-1.4.1.src.rpm i386: 169542005d406c0a94bdf6289c89da8d devhelp-0.9.2-2.4.8.i386.rpm 6a587667913c87849e1fe8f0fc6bfe13 devhelp-debuginfo-0.9.2-2.4.8.i386.rpm a304e403ac7e17aebddde70a124c4ac0 devhelp-devel-0.9.2-2.4.8.i386.rpm c7ea8b9bbb2d9ad0af97761e23ff0498 mozilla-1.7.13-1.4.1.i386.rpm 567bab9f5abd07d8b6f84d7d9e2eb70c mozilla-chat-1.7.13-1.4.1.i386.rpm cd2272d1460d1a1510d7fd78ad8398f5 mozilla-debuginfo-1.7.13-1.4.1.i386.rpm a3b8397f87dd9805b0b75d62e15bc2d1 mozilla-devel-1.7.13-1.4.1.i386.rpm 7a30f81dd7443613c57035675adfb312 mozilla-dom-inspector-1.7.13-1.4.1.i386.rpm 7ba3d19407f80180b96c8b34c5c5ba30 mozilla-js-debugger-1.7.13-1.4.1.i386.rpm 9fc1b9e752b179325bb178910c197076 mozilla-mail-1.7.13-1.4.1.i386.rpm 8af4bc8eac2632cbc26d8c1d1c859341 mozilla-nspr-1.7.13-1.4.1.i386.rpm ed46848b8d26e9f24bd4d7e096e9673e mozilla-nspr-devel-1.7.13-1.4.1.i386.rpm 3da30b6d64fdd2343bc44d93483762a2 mozilla-nss-1.7.13-1.4.1.i386.rpm 598687f7519fd15fa73d095f7584a55a mozilla-nss-devel-1.7.13-1.4.1.i386.rpm ia64: 194d30eccf1c8e2f105457e385be5615 mozilla-1.7.13-1.4.1.ia64.rpm 34132fd56ec3cf49525eccbc0e53b769 mozilla-chat-1.7.13-1.4.1.ia64.rpm cd2272d1460d1a1510d7fd78ad8398f5 mozilla-debuginfo-1.7.13-1.4.1.i386.rpm ab05c22d0781ce853e93a995dd0bbc5b mozilla-debuginfo-1.7.13-1.4.1.ia64.rpm 0b6a06839fd36ce4c4300d869c942bc4 mozilla-devel-1.7.13-1.4.1.ia64.rpm 52215d8f86afd6659e24c411879f6cbe mozilla-dom-inspector-1.7.13-1.4.1.ia64.rpm 8eb09cdfceda623b82a714eaadbd4145 mozilla-js-debugger-1.7.13-1.4.1.ia64.rpm 117cc2f9faa50b59b09c318ec9892d70 mozilla-mail-1.7.13-1.4.1.ia64.rpm 8af4bc8eac2632cbc26d8c1d1c859341 mozilla-nspr-1.7.13-1.4.1.i386.rpm 21b564259c346e250cf6ad35ca1abebe mozilla-nspr-1.7.13-1.4.1.ia64.rpm 9099c2e0c400ac93a19bef937db86b22 mozilla-nspr-devel-1.7.13-1.4.1.ia64.rpm 3da30b6d64fdd2343bc44d93483762a2 mozilla-nss-1.7.13-1.4.1.i386.rpm 9a5ea305b014dcda172ac4faeae865ac mozilla-nss-1.7.13-1.4.1.ia64.rpm b10045a431ba7f73199cac95e1bfd218 mozilla-nss-devel-1.7.13-1.4.1.ia64.rpm x86_64: b7b12ea5ddc71fb40164cc90c7dd48f2 devhelp-0.9.2-2.4.8.x86_64.rpm 67ad9e060a713e5d40e436f9dbf20a3f devhelp-debuginfo-0.9.2-2.4.8.x86_64.rpm dde3723459fa48ed5b4db0a803b8cb1d devhelp-devel-0.9.2-2.4.8.x86_64.rpm 11d60127eccb8b128d5436d6d1109ab6 mozilla-1.7.13-1.4.1.x86_64.rpm a6a50d81f13425ef825706cefd8486c6 mozilla-chat-1.7.13-1.4.1.x86_64.rpm cd2272d1460d1a1510d7fd78ad8398f5 mozilla-debuginfo-1.7.13-1.4.1.i386.rpm 3535e6f823e4994dabf9440d6e19def7 mozilla-debuginfo-1.7.13-1.4.1.x86_64.rpm f17bfb39cfea67e2b49c897d48ef4328 mozilla-devel-1.7.13-1.4.1.x86_64.rpm c4c19889a64a96946801d7efd2d45bc2 mozilla-dom-inspector-1.7.13-1.4.1.x86_64.rpm 767a1b443bf47e56153a16d591306e2a mozilla-js-debugger-1.7.13-1.4.1.x86_64.rpm e0fe2bf10f17b1697ac9b3b772a5628b mozilla-mail-1.7.13-1.4.1.x86_64.rpm 8af4bc8eac2632cbc26d8c1d1c859341 mozilla-nspr-1.7.13-1.4.1.i386.rpm af4b0327d4a1c0e578e86030b29a5a9c mozilla-nspr-1.7.13-1.4.1.x86_64.rpm 22ab29c72de3ccc907f1b1990444c468 mozilla-nspr-devel-1.7.13-1.4.1.x86_64.rpm 3da30b6d64fdd2343bc44d93483762a2 mozilla-nss-1.7.13-1.4.1.i386.rpm d57aab44828618485d3498457e6b419a mozilla-nss-1.7.13-1.4.1.x86_64.rpm 9c458e5da28816d4bc34ed3440a5e3d6 mozilla-nss-devel-1.7.13-1.4.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFERMoOXlSAg2UNWIIRAoa4AJ9yl8AaAQee/4dseRsKtv+Q6P0zNQCghFOU rlIItuRBkhsnRCeTajbE4OA= =xrZ4 -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Apr 21 15:45:57 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Fri, 21 Apr 2006 11:45:57 -0400 Subject: [RHSA-2006:0330-01] Critical: thunderbird security update Message-ID: <200604211545.k3LFjwc9012571@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: thunderbird security update Advisory ID: RHSA-2006:0330-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0330.html Issue date: 2006-04-21 Updated on: 2006-04-21 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-0292 CVE-2006-0296 CVE-2006-0749 CVE-2006-1045 CVE-2006-1724 CVE-2006-1727 CVE-2006-1728 CVE-2006-1730 CVE-2006-1731 CVE-2006-1732 CVE-2006-1733 CVE-2006-1734 CVE-2006-1735 CVE-2006-1737 CVE-2006-1738 CVE-2006-1739 CVE-2006-1741 CVE-2006-1742 CVE-2006-1790 - --------------------------------------------------------------------- 1. Summary: An updated thunderbird package that fixes various bugs is now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Mozilla Thunderbird is a standalone mail and newsgroup client. Several bugs were found in the way Thunderbird processes malformed javascript. A malicious HTML mail message could modify the content of a different open HTML mail message, possibly stealing sensitive information or conducting a cross-site scripting attack. Please note that JavaScript support is disabled by default in Thunderbird. (CVE-2006-1731, CVE-2006-1732, CVE-2006-1741) Several bugs were found in the way Thunderbird processes certain javascript actions. A malicious HTML mail message could execute arbitrary javascript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware. Please note that JavaScript support is disabled by default in Thunderbird. (CVE-2006-0292, CVE-2006-0296, CVE-2006-1727, CVE-2006-1728, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1742) Several bugs were found in the way Thunderbird processes malformed HTML mail messages. A carefully crafted malicious HTML mail message could cause the execution of arbitrary code as the user running Thunderbird. (CVE-2006-0749, CVE-2006-1724, CVE-2006-1730, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739, CVE-2006-1790) A bug was found in the way Thunderbird processes certain inline content in HTML mail messages. It may be possible for a remote attacker to send a carefully crafted mail message to the victim, which will fetch remote content, even if Thunderbird is configured not to fetch remote content. (CVE-2006-1045) Users of Thunderbird are advised to upgrade to this updated package containing Thunderbird version 1.0.8, which is not vulnerable to these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 188848 - CVE-2006-1741 Cross-site JavaScript injection using event handlers 188850 - CVE-2006-1742 JavaScript garbage-collection hazard audit 188852 - CVE-2006-1737 Crashes with evidence of memory corruption (CVE-2006-1738, CVE-2006-1739, CVE-2006-1790) 188855 - CVE-2006-1735 Privilege escalation via XBL.method.eval 188857 - CVE-2006-1734 Privilege escalation using a JavaScript function's cloned parent 188859 - CVE-2006-1733 Accessing XBL compilation scope via valueOf.call() 188861 - CVE-2006-1732 cross-site scripting through window.controllers 188863 - CVE-2006-0749 Mozilla Firefox Tag Order Vulnerability 188865 - CVE-2006-1731 Cross-site scripting using .valueOf.call() 188867 - CVE-2006-1724 Crashes with evidence of memory corruption (1.5.0.2) 188871 - CVE-2006-1730 CSS Letter-Spacing Heap Overflow Vulnerability 188873 - CVE-2006-1728 Privilege escalation using crypto.generateCRMFRequest 188875 - CVE-2006-1727 Privilege escalation through Print Preview 188877 - CVE-2006-1045 Mail Multiple Information Disclosure 189180 - CVE-2006-0292 javascript unrooted access 189181 - CVE-2006-0296 XULDocument.persist() RDF data injection 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/thunderbird-1.0.8-1.4.1.src.rpm c8305acb3d2dedacf40a58f56e448f41 thunderbird-1.0.8-1.4.1.src.rpm i386: 02ed6ce066e985a656c653deb060a0bd thunderbird-1.0.8-1.4.1.i386.rpm d5dc52769b9e62ad67fc2089706c3aea thunderbird-debuginfo-1.0.8-1.4.1.i386.rpm ia64: b2ff6e3b2eb9b50e4b0b1c90f9a9b431 thunderbird-1.0.8-1.4.1.ia64.rpm 45d0598f33b90de2eb6bac64e90e070b thunderbird-debuginfo-1.0.8-1.4.1.ia64.rpm ppc: dc58090fa480cff7f44ff7fb4e1ad3b3 thunderbird-1.0.8-1.4.1.ppc.rpm ce2a278a172bb89a574e2ddb5f938b0e thunderbird-debuginfo-1.0.8-1.4.1.ppc.rpm s390: 9edcfee0fa0f8b382d5093b53484f091 thunderbird-1.0.8-1.4.1.s390.rpm c5647159643d7599866c519fa622daa2 thunderbird-debuginfo-1.0.8-1.4.1.s390.rpm s390x: 703a6290f8025d58e5d9b39410b9d2f5 thunderbird-1.0.8-1.4.1.s390x.rpm 21c101500f58d5e1db7017a5d726a677 thunderbird-debuginfo-1.0.8-1.4.1.s390x.rpm x86_64: acf9ac0262007fea4805c4bbfa49f228 thunderbird-1.0.8-1.4.1.x86_64.rpm 1fc5ff66ee06fa583f3fc6591ef5990f thunderbird-debuginfo-1.0.8-1.4.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/thunderbird-1.0.8-1.4.1.src.rpm c8305acb3d2dedacf40a58f56e448f41 thunderbird-1.0.8-1.4.1.src.rpm i386: 02ed6ce066e985a656c653deb060a0bd thunderbird-1.0.8-1.4.1.i386.rpm d5dc52769b9e62ad67fc2089706c3aea thunderbird-debuginfo-1.0.8-1.4.1.i386.rpm x86_64: acf9ac0262007fea4805c4bbfa49f228 thunderbird-1.0.8-1.4.1.x86_64.rpm 1fc5ff66ee06fa583f3fc6591ef5990f thunderbird-debuginfo-1.0.8-1.4.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/thunderbird-1.0.8-1.4.1.src.rpm c8305acb3d2dedacf40a58f56e448f41 thunderbird-1.0.8-1.4.1.src.rpm i386: 02ed6ce066e985a656c653deb060a0bd thunderbird-1.0.8-1.4.1.i386.rpm d5dc52769b9e62ad67fc2089706c3aea thunderbird-debuginfo-1.0.8-1.4.1.i386.rpm ia64: b2ff6e3b2eb9b50e4b0b1c90f9a9b431 thunderbird-1.0.8-1.4.1.ia64.rpm 45d0598f33b90de2eb6bac64e90e070b thunderbird-debuginfo-1.0.8-1.4.1.ia64.rpm x86_64: acf9ac0262007fea4805c4bbfa49f228 thunderbird-1.0.8-1.4.1.x86_64.rpm 1fc5ff66ee06fa583f3fc6591ef5990f thunderbird-debuginfo-1.0.8-1.4.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/thunderbird-1.0.8-1.4.1.src.rpm c8305acb3d2dedacf40a58f56e448f41 thunderbird-1.0.8-1.4.1.src.rpm i386: 02ed6ce066e985a656c653deb060a0bd thunderbird-1.0.8-1.4.1.i386.rpm d5dc52769b9e62ad67fc2089706c3aea thunderbird-debuginfo-1.0.8-1.4.1.i386.rpm ia64: b2ff6e3b2eb9b50e4b0b1c90f9a9b431 thunderbird-1.0.8-1.4.1.ia64.rpm 45d0598f33b90de2eb6bac64e90e070b thunderbird-debuginfo-1.0.8-1.4.1.ia64.rpm x86_64: acf9ac0262007fea4805c4bbfa49f228 thunderbird-1.0.8-1.4.1.x86_64.rpm 1fc5ff66ee06fa583f3fc6591ef5990f thunderbird-debuginfo-1.0.8-1.4.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1045 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1724 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFESP4mXlSAg2UNWIIRAqQXAKDCvfyTUxphb/QzSjKhDAOS9jEWGQCfbJVo DUBlbTPqEVkzszD777QMRpg= =TgHc -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 25 14:52:08 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 25 Apr 2006 10:52:08 -0400 Subject: [RHSA-2006:0267-01] Moderate: ipsec-tools security update Message-ID: <200604251452.k3PEq8L3018060@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: ipsec-tools security update Advisory ID: RHSA-2006:0267-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0267.html Issue date: 2006-04-25 Updated on: 2006-04-25 Product: Red Hat Enterprise Linux CVE Names: CVE-2005-3732 - --------------------------------------------------------------------- 1. Summary: Updated ipsec-tools packages that fix a bug in racoon are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: The ipsec-tools package is used in conjunction with the IPsec functionality in the linux kernel and includes racoon, an IKEv1 keying daemon. A denial of service flaw was found in the ipsec-tools racoon daemon. If a victim's machine has racoon configured in a non-recommended insecure manner, it is possible for a remote attacker to crash the racoon daemon. (CVE-2005-3732) Users of ipsec-tools should upgrade to these updated packages, which contain backported patches, and are not vulnerable to these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/): 173841 - CVE-2005-3732 ipsec-tools IKE DoS 181605 - CVE-2005-3732 ipsec-tools IKE DoS 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm 947910c457600879145e041862e0bcb0 ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm i386: dbbb9bcc93832b082f98f9a1964ac0a3 ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm ed7064025214d5de74c387b288720f92 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm ia64: 6c97ef7c2dfea1f077c37d3065645495 ipsec-tools-0.2.5-0.7.rhel3.3.ia64.rpm 10c71e7b356cc56b70091ca8a92e4cc2 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ia64.rpm ppc: eb22e79ec0ccb8e546b612749963f5ee ipsec-tools-0.2.5-0.7.rhel3.3.ppc.rpm 64f2341c9e12c8656597d4725b4412ab ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ppc.rpm s390: 7e20191320ddf9d230b75a8f63fe315e ipsec-tools-0.2.5-0.7.rhel3.3.s390.rpm aba15779dc0e46dc06346f7981fd2c20 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.s390.rpm s390x: 93892dbdb5c9d0d85ca65c6651655b19 ipsec-tools-0.2.5-0.7.rhel3.3.s390x.rpm 420c85900139807b487e65ccbd706979 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.s390x.rpm x86_64: fb8b6c328d33ff990a016cd93f5b5c2e ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm 8a342679a07240c4d8536cb5a24f3aee ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm 947910c457600879145e041862e0bcb0 ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm i386: dbbb9bcc93832b082f98f9a1964ac0a3 ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm ed7064025214d5de74c387b288720f92 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm x86_64: fb8b6c328d33ff990a016cd93f5b5c2e ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm 8a342679a07240c4d8536cb5a24f3aee ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm 947910c457600879145e041862e0bcb0 ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm i386: dbbb9bcc93832b082f98f9a1964ac0a3 ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm ed7064025214d5de74c387b288720f92 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm ia64: 6c97ef7c2dfea1f077c37d3065645495 ipsec-tools-0.2.5-0.7.rhel3.3.ia64.rpm 10c71e7b356cc56b70091ca8a92e4cc2 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ia64.rpm x86_64: fb8b6c328d33ff990a016cd93f5b5c2e ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm 8a342679a07240c4d8536cb5a24f3aee ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm 947910c457600879145e041862e0bcb0 ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm i386: dbbb9bcc93832b082f98f9a1964ac0a3 ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm ed7064025214d5de74c387b288720f92 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm ia64: 6c97ef7c2dfea1f077c37d3065645495 ipsec-tools-0.2.5-0.7.rhel3.3.ia64.rpm 10c71e7b356cc56b70091ca8a92e4cc2 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ia64.rpm x86_64: fb8b6c328d33ff990a016cd93f5b5c2e ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm 8a342679a07240c4d8536cb5a24f3aee ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/ipsec-tools-0.3.3-6.rhel4.1.src.rpm aed36ce0deb098bda284977fa2f9af04 ipsec-tools-0.3.3-6.rhel4.1.src.rpm i386: af514b3e19ce362c30f42c072751ca7c ipsec-tools-0.3.3-6.rhel4.1.i386.rpm 5c38272ecadfdb30d398f5261888d358 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm ia64: 2f9fbde3de938d4f1ec7c437fb6c91e7 ipsec-tools-0.3.3-6.rhel4.1.ia64.rpm d2d09077ed0ab1823eb5e1c511b530e5 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ia64.rpm ppc: fb37df4b25abdda16d46e9ba78bf916c ipsec-tools-0.3.3-6.rhel4.1.ppc.rpm 3e902ab84f03bcac0ee430bc26da46df ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ppc.rpm s390: 3bf00b8901eeb2a04f75d532ca3f4650 ipsec-tools-0.3.3-6.rhel4.1.s390.rpm 11b52a9258966efc8680382b2dc7c95b ipsec-tools-debuginfo-0.3.3-6.rhel4.1.s390.rpm s390x: 09de8693ab709c025a4cbf5d5b7acde3 ipsec-tools-0.3.3-6.rhel4.1.s390x.rpm ad6c1dfc0a80088c2b469942bc8e7413 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.s390x.rpm x86_64: 7db930f40bb68f77de42997f4b43cff6 ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm d43078b66bfb23feb80355b99568b2c2 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/ipsec-tools-0.3.3-6.rhel4.1.src.rpm aed36ce0deb098bda284977fa2f9af04 ipsec-tools-0.3.3-6.rhel4.1.src.rpm i386: af514b3e19ce362c30f42c072751ca7c ipsec-tools-0.3.3-6.rhel4.1.i386.rpm 5c38272ecadfdb30d398f5261888d358 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm x86_64: 7db930f40bb68f77de42997f4b43cff6 ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm d43078b66bfb23feb80355b99568b2c2 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/ipsec-tools-0.3.3-6.rhel4.1.src.rpm aed36ce0deb098bda284977fa2f9af04 ipsec-tools-0.3.3-6.rhel4.1.src.rpm i386: af514b3e19ce362c30f42c072751ca7c ipsec-tools-0.3.3-6.rhel4.1.i386.rpm 5c38272ecadfdb30d398f5261888d358 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm ia64: 2f9fbde3de938d4f1ec7c437fb6c91e7 ipsec-tools-0.3.3-6.rhel4.1.ia64.rpm d2d09077ed0ab1823eb5e1c511b530e5 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ia64.rpm x86_64: 7db930f40bb68f77de42997f4b43cff6 ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm d43078b66bfb23feb80355b99568b2c2 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/ipsec-tools-0.3.3-6.rhel4.1.src.rpm aed36ce0deb098bda284977fa2f9af04 ipsec-tools-0.3.3-6.rhel4.1.src.rpm i386: af514b3e19ce362c30f42c072751ca7c ipsec-tools-0.3.3-6.rhel4.1.i386.rpm 5c38272ecadfdb30d398f5261888d358 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm ia64: 2f9fbde3de938d4f1ec7c437fb6c91e7 ipsec-tools-0.3.3-6.rhel4.1.ia64.rpm d2d09077ed0ab1823eb5e1c511b530e5 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ia64.rpm x86_64: 7db930f40bb68f77de42997f4b43cff6 ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm d43078b66bfb23feb80355b99568b2c2 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3732 http://sourceforge.net/mailarchive/forum.php?thread_id=9017454&forum_id=32000 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFETjeIXlSAg2UNWIIRAooXAKCqNSdkBBYzZEMkO4HXZjlLwqMLDwCeNEY4 vpG91XKClEQ5ZH9vTtUmOnQ= =OeOO -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 25 14:52:34 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 25 Apr 2006 10:52:34 -0400 Subject: [RHSA-2006:0276-01] Moderate: php security update Message-ID: <200604251452.k3PEqiA7018222@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: php security update Advisory ID: RHSA-2006:0276-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0276.html Issue date: 2006-04-25 Updated on: 2006-04-25 Product: Red Hat Enterprise Linux CVE Names: CVE-2005-2933 CVE-2005-3883 CVE-2006-0208 CVE-2006-0996 CVE-2006-1490 - --------------------------------------------------------------------- 1. Summary: Updated PHP packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server. The phpinfo() PHP function did not properly sanitize long strings. An attacker could use this to perform cross-site scripting attacks against sites that have publicly-available PHP scripts that call phpinfo(). (CVE-2006-0996) The html_entity_decode() PHP function was found to not be binary safe. An attacker could use this flaw to disclose a certain part of the memory. In order for this issue to be exploitable the target site would need to have a PHP script which called the "html_entity_decode()" function with untrusted input from the user and displayed the result. (CVE-2006-1490) The error handling output was found to not properly escape HTML output in certain cases. An attacker could use this flaw to perform cross-site scripting attacks against sites where both display_errors and html_errors are enabled. (CVE-2006-0208) An input validation error was found in the "mb_send_mail()" function. An attacker could use this flaw to inject arbitrary headers in a mail sent via a script calling the "mb_send_mail()" function where the "To" parameter can be controlled by the attacker. (CVE-2005-3883) A buffer overflow flaw was discovered in uw-imap, the University of Washington's IMAP Server. php-imap is compiled against the static c-client libraries from imap and therefore needed to be recompiled against the fixed version. This issue only affected Red Hat Enterprise Linux 3. (CVE-2005-2933). Users of PHP should upgrade to these updated packages, which contain backported patches that resolve these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 163490 - PEAR::DB autoExecute function does not work when updating with WHERE clause 174463 - CVE-2005-3883 PHP mb_send_mail() header parsing issue 174528 - CVE-2005-2933 imap buffer overflow 178028 - CVE-2006-0208 PHP Cross Site Scripting (XSS) flaw 182719 - ImageCreateFromGif does not clean up its temporary file 187230 - CVE-2006-1490 PHP memory disclosure issue 187510 - CVE-2006-0996 phpinfo() XSS issue 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/php-4.3.2-30.ent.src.rpm 460ed4c3f1f6330ecef844fcfabda531 php-4.3.2-30.ent.src.rpm i386: 796091ea216f651fda39b3f3dbda8b03 php-4.3.2-30.ent.i386.rpm d897ceb666bfd9f78a6284386ca494b6 php-debuginfo-4.3.2-30.ent.i386.rpm c085f07a201c0eb6371a3db7122e44ab php-devel-4.3.2-30.ent.i386.rpm b1b3b15f480777f51b4abe7d153dcc1c php-imap-4.3.2-30.ent.i386.rpm c985901e74a592d4b09073996134ea01 php-ldap-4.3.2-30.ent.i386.rpm a8722c1e7194bc274c38a5b7d3c454b5 php-mysql-4.3.2-30.ent.i386.rpm 54bdd8613038a57efa7f5ebd8751613e php-odbc-4.3.2-30.ent.i386.rpm 151554ff8e17b21ebaa56bcf1b65851a php-pgsql-4.3.2-30.ent.i386.rpm ia64: fd908f56c849d52ada82cc0399513920 php-4.3.2-30.ent.ia64.rpm 48c7dc207d1db672ec66135519ebb59d php-debuginfo-4.3.2-30.ent.ia64.rpm 7ac805acf6f1af4e4fdcce49f20ffe6f php-devel-4.3.2-30.ent.ia64.rpm 59497b00d7feb65640ad6d7646d10c7e php-imap-4.3.2-30.ent.ia64.rpm 4c9d6759b82f99929289ad608534275c php-ldap-4.3.2-30.ent.ia64.rpm 02846c28fc88fbca7dcdaedcfd13a8da php-mysql-4.3.2-30.ent.ia64.rpm 31e2faabc1cef6301e0c938b34457c6c php-odbc-4.3.2-30.ent.ia64.rpm c0ce59db5e46fa9598b852f9d56d1b10 php-pgsql-4.3.2-30.ent.ia64.rpm ppc: 5c82e086bb0116f9573a89639cc5c5ef php-4.3.2-30.ent.ppc.rpm e2b922433ca1dbc831d3b4edb4c2915f php-debuginfo-4.3.2-30.ent.ppc.rpm 555bc38be622b40e3bcb0d0000c5d1db php-devel-4.3.2-30.ent.ppc.rpm f16c80e05b6b26328630b8c89aa0cae7 php-imap-4.3.2-30.ent.ppc.rpm 9d39caf8ae47809d36e163f5db234bee php-ldap-4.3.2-30.ent.ppc.rpm 9b362f1f7e84809f8ccaf7d36df4ac38 php-mysql-4.3.2-30.ent.ppc.rpm aa73627e58c2b769e36ba6ca11db0451 php-odbc-4.3.2-30.ent.ppc.rpm b0e0c8b813a59cee20b10df4e375ace0 php-pgsql-4.3.2-30.ent.ppc.rpm s390: 7ade9ee2756435a08bfdb292d6250465 php-4.3.2-30.ent.s390.rpm 761149abcba719aee16d48ce9509bd09 php-debuginfo-4.3.2-30.ent.s390.rpm 113a2f052b7bec8fbf85bfc5f51ebf18 php-devel-4.3.2-30.ent.s390.rpm dfb326b3e69b11a27038489e53855974 php-imap-4.3.2-30.ent.s390.rpm 4aa6a372dc1b820e1274a20eba5d82a2 php-ldap-4.3.2-30.ent.s390.rpm deb14a4e2da686414bc014ace3e9e94c php-mysql-4.3.2-30.ent.s390.rpm a3a7b7d7d4f838432e4b0467b940b220 php-odbc-4.3.2-30.ent.s390.rpm 9ad7a0002a1abe0c219f2e80beb705c2 php-pgsql-4.3.2-30.ent.s390.rpm s390x: 40cffdc67add9c1fb527b3aa7cb4e449 php-4.3.2-30.ent.s390x.rpm 719689edecd1e4df897572d79484fbb3 php-debuginfo-4.3.2-30.ent.s390x.rpm da12cab5f471ddd1f3aaf3b64cb5d74b php-devel-4.3.2-30.ent.s390x.rpm 8d95f5623e37f251942df27ff155e645 php-imap-4.3.2-30.ent.s390x.rpm 05f45da8178fb7f8a241bbd4408fa395 php-ldap-4.3.2-30.ent.s390x.rpm 243c56673537f7fb69dc8714a4e50bec php-mysql-4.3.2-30.ent.s390x.rpm 940531674c946b274e0405c983bb8d9d php-odbc-4.3.2-30.ent.s390x.rpm 870da8a4b0b243f3848666c69b06ec8c php-pgsql-4.3.2-30.ent.s390x.rpm x86_64: 6c2a884d7fae38a410d827e7f4aa8570 php-4.3.2-30.ent.x86_64.rpm d42d0f51be85b2da1adc406bf3649c84 php-debuginfo-4.3.2-30.ent.x86_64.rpm 95bafd82cba9c87393d798a4f8d7335a php-devel-4.3.2-30.ent.x86_64.rpm 9b4ec8ddb9138403e38aba68afa8aef0 php-imap-4.3.2-30.ent.x86_64.rpm 56371e679761c2c5e13c405b02e484f4 php-ldap-4.3.2-30.ent.x86_64.rpm 4a3803d30636186f1c7a40872c9c74e3 php-mysql-4.3.2-30.ent.x86_64.rpm 70b39963d9d4f0dfa2441a7f96df69ad php-odbc-4.3.2-30.ent.x86_64.rpm e15bcb927e4d6e3d076cf8336865d547 php-pgsql-4.3.2-30.ent.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/php-4.3.2-30.ent.src.rpm 460ed4c3f1f6330ecef844fcfabda531 php-4.3.2-30.ent.src.rpm i386: 796091ea216f651fda39b3f3dbda8b03 php-4.3.2-30.ent.i386.rpm d897ceb666bfd9f78a6284386ca494b6 php-debuginfo-4.3.2-30.ent.i386.rpm c085f07a201c0eb6371a3db7122e44ab php-devel-4.3.2-30.ent.i386.rpm b1b3b15f480777f51b4abe7d153dcc1c php-imap-4.3.2-30.ent.i386.rpm c985901e74a592d4b09073996134ea01 php-ldap-4.3.2-30.ent.i386.rpm a8722c1e7194bc274c38a5b7d3c454b5 php-mysql-4.3.2-30.ent.i386.rpm 54bdd8613038a57efa7f5ebd8751613e php-odbc-4.3.2-30.ent.i386.rpm 151554ff8e17b21ebaa56bcf1b65851a php-pgsql-4.3.2-30.ent.i386.rpm x86_64: 6c2a884d7fae38a410d827e7f4aa8570 php-4.3.2-30.ent.x86_64.rpm d42d0f51be85b2da1adc406bf3649c84 php-debuginfo-4.3.2-30.ent.x86_64.rpm 95bafd82cba9c87393d798a4f8d7335a php-devel-4.3.2-30.ent.x86_64.rpm 9b4ec8ddb9138403e38aba68afa8aef0 php-imap-4.3.2-30.ent.x86_64.rpm 56371e679761c2c5e13c405b02e484f4 php-ldap-4.3.2-30.ent.x86_64.rpm 4a3803d30636186f1c7a40872c9c74e3 php-mysql-4.3.2-30.ent.x86_64.rpm 70b39963d9d4f0dfa2441a7f96df69ad php-odbc-4.3.2-30.ent.x86_64.rpm e15bcb927e4d6e3d076cf8336865d547 php-pgsql-4.3.2-30.ent.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/php-4.3.2-30.ent.src.rpm 460ed4c3f1f6330ecef844fcfabda531 php-4.3.2-30.ent.src.rpm i386: 796091ea216f651fda39b3f3dbda8b03 php-4.3.2-30.ent.i386.rpm d897ceb666bfd9f78a6284386ca494b6 php-debuginfo-4.3.2-30.ent.i386.rpm c085f07a201c0eb6371a3db7122e44ab php-devel-4.3.2-30.ent.i386.rpm b1b3b15f480777f51b4abe7d153dcc1c php-imap-4.3.2-30.ent.i386.rpm c985901e74a592d4b09073996134ea01 php-ldap-4.3.2-30.ent.i386.rpm a8722c1e7194bc274c38a5b7d3c454b5 php-mysql-4.3.2-30.ent.i386.rpm 54bdd8613038a57efa7f5ebd8751613e php-odbc-4.3.2-30.ent.i386.rpm 151554ff8e17b21ebaa56bcf1b65851a php-pgsql-4.3.2-30.ent.i386.rpm ia64: fd908f56c849d52ada82cc0399513920 php-4.3.2-30.ent.ia64.rpm 48c7dc207d1db672ec66135519ebb59d php-debuginfo-4.3.2-30.ent.ia64.rpm 7ac805acf6f1af4e4fdcce49f20ffe6f php-devel-4.3.2-30.ent.ia64.rpm 59497b00d7feb65640ad6d7646d10c7e php-imap-4.3.2-30.ent.ia64.rpm 4c9d6759b82f99929289ad608534275c php-ldap-4.3.2-30.ent.ia64.rpm 02846c28fc88fbca7dcdaedcfd13a8da php-mysql-4.3.2-30.ent.ia64.rpm 31e2faabc1cef6301e0c938b34457c6c php-odbc-4.3.2-30.ent.ia64.rpm c0ce59db5e46fa9598b852f9d56d1b10 php-pgsql-4.3.2-30.ent.ia64.rpm x86_64: 6c2a884d7fae38a410d827e7f4aa8570 php-4.3.2-30.ent.x86_64.rpm d42d0f51be85b2da1adc406bf3649c84 php-debuginfo-4.3.2-30.ent.x86_64.rpm 95bafd82cba9c87393d798a4f8d7335a php-devel-4.3.2-30.ent.x86_64.rpm 9b4ec8ddb9138403e38aba68afa8aef0 php-imap-4.3.2-30.ent.x86_64.rpm 56371e679761c2c5e13c405b02e484f4 php-ldap-4.3.2-30.ent.x86_64.rpm 4a3803d30636186f1c7a40872c9c74e3 php-mysql-4.3.2-30.ent.x86_64.rpm 70b39963d9d4f0dfa2441a7f96df69ad php-odbc-4.3.2-30.ent.x86_64.rpm e15bcb927e4d6e3d076cf8336865d547 php-pgsql-4.3.2-30.ent.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/php-4.3.2-30.ent.src.rpm 460ed4c3f1f6330ecef844fcfabda531 php-4.3.2-30.ent.src.rpm i386: 796091ea216f651fda39b3f3dbda8b03 php-4.3.2-30.ent.i386.rpm d897ceb666bfd9f78a6284386ca494b6 php-debuginfo-4.3.2-30.ent.i386.rpm c085f07a201c0eb6371a3db7122e44ab php-devel-4.3.2-30.ent.i386.rpm b1b3b15f480777f51b4abe7d153dcc1c php-imap-4.3.2-30.ent.i386.rpm c985901e74a592d4b09073996134ea01 php-ldap-4.3.2-30.ent.i386.rpm a8722c1e7194bc274c38a5b7d3c454b5 php-mysql-4.3.2-30.ent.i386.rpm 54bdd8613038a57efa7f5ebd8751613e php-odbc-4.3.2-30.ent.i386.rpm 151554ff8e17b21ebaa56bcf1b65851a php-pgsql-4.3.2-30.ent.i386.rpm ia64: fd908f56c849d52ada82cc0399513920 php-4.3.2-30.ent.ia64.rpm 48c7dc207d1db672ec66135519ebb59d php-debuginfo-4.3.2-30.ent.ia64.rpm 7ac805acf6f1af4e4fdcce49f20ffe6f php-devel-4.3.2-30.ent.ia64.rpm 59497b00d7feb65640ad6d7646d10c7e php-imap-4.3.2-30.ent.ia64.rpm 4c9d6759b82f99929289ad608534275c php-ldap-4.3.2-30.ent.ia64.rpm 02846c28fc88fbca7dcdaedcfd13a8da php-mysql-4.3.2-30.ent.ia64.rpm 31e2faabc1cef6301e0c938b34457c6c php-odbc-4.3.2-30.ent.ia64.rpm c0ce59db5e46fa9598b852f9d56d1b10 php-pgsql-4.3.2-30.ent.ia64.rpm x86_64: 6c2a884d7fae38a410d827e7f4aa8570 php-4.3.2-30.ent.x86_64.rpm d42d0f51be85b2da1adc406bf3649c84 php-debuginfo-4.3.2-30.ent.x86_64.rpm 95bafd82cba9c87393d798a4f8d7335a php-devel-4.3.2-30.ent.x86_64.rpm 9b4ec8ddb9138403e38aba68afa8aef0 php-imap-4.3.2-30.ent.x86_64.rpm 56371e679761c2c5e13c405b02e484f4 php-ldap-4.3.2-30.ent.x86_64.rpm 4a3803d30636186f1c7a40872c9c74e3 php-mysql-4.3.2-30.ent.x86_64.rpm 70b39963d9d4f0dfa2441a7f96df69ad php-odbc-4.3.2-30.ent.x86_64.rpm e15bcb927e4d6e3d076cf8336865d547 php-pgsql-4.3.2-30.ent.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/php-4.3.9-3.12.src.rpm 1f42883047b66e28a779a5604636b3da php-4.3.9-3.12.src.rpm i386: daa465aebd0f11e8175ed67453687e32 php-4.3.9-3.12.i386.rpm 97641e11e21ec8e4675069c5b3a388cd php-debuginfo-4.3.9-3.12.i386.rpm ed2efc56a5705982709bb32f621aaa22 php-devel-4.3.9-3.12.i386.rpm 0dd882b0034dbc4cf8375148ace6949d php-domxml-4.3.9-3.12.i386.rpm 610aec94208d58ea42d168daf0ca5eaa php-gd-4.3.9-3.12.i386.rpm c3f1001cbfa35ad31784fc72323e4856 php-imap-4.3.9-3.12.i386.rpm 0b4e877a90c7a139c3e30d74c7787ee8 php-ldap-4.3.9-3.12.i386.rpm 83d9de2ecda74ad0ed86c0525028c76b php-mbstring-4.3.9-3.12.i386.rpm 1b96b8190956420be92ff2350ef207a7 php-mysql-4.3.9-3.12.i386.rpm 44c9448f4db1b83f836f786fc7c28b75 php-ncurses-4.3.9-3.12.i386.rpm 1f2265aa85bd444003d9871c52a529d5 php-odbc-4.3.9-3.12.i386.rpm 0bd92272d4967bde1ab4c98b1ba10934 php-pear-4.3.9-3.12.i386.rpm e5712e82c9e043493d2a0e3d87a3c9b3 php-pgsql-4.3.9-3.12.i386.rpm 5d73441291aef40ac2ce035e09c2b150 php-snmp-4.3.9-3.12.i386.rpm 2c12e81e2bcaa950b62f4cb25cac13a7 php-xmlrpc-4.3.9-3.12.i386.rpm ia64: 5c701479c6c22559dbead737a8cbe8fa php-4.3.9-3.12.ia64.rpm 4bc286315168e0118749fd78e837f0de php-debuginfo-4.3.9-3.12.ia64.rpm 7d76b25499946fd409720f4bdbccd35e php-devel-4.3.9-3.12.ia64.rpm fe8f62fe3b7ddb164f1bb0fa77348ae1 php-domxml-4.3.9-3.12.ia64.rpm 45be07bf97f0f5838d5b7362afa305e3 php-gd-4.3.9-3.12.ia64.rpm 658223efb8b941ddad14e4c54ec7a40a php-imap-4.3.9-3.12.ia64.rpm a89c5d0b1878276ee63afd971051b2bf php-ldap-4.3.9-3.12.ia64.rpm 85c32ff621275878dafe5500438bcd18 php-mbstring-4.3.9-3.12.ia64.rpm b5382f0539b43f22e632efb0b4b714a1 php-mysql-4.3.9-3.12.ia64.rpm d434c93ebf9240d9e71d4c7b2f83d1ab php-ncurses-4.3.9-3.12.ia64.rpm 05f787718fb14fb6aad100617ad66545 php-odbc-4.3.9-3.12.ia64.rpm 9df262fa2228a4137f78f2c4c24bea34 php-pear-4.3.9-3.12.ia64.rpm e7e5d04a2363779f95d243fcf175e6e8 php-pgsql-4.3.9-3.12.ia64.rpm aae6a8a3fb253e32dac53fd9425ef014 php-snmp-4.3.9-3.12.ia64.rpm 4417151624641bffd0c95935c20b9d9c php-xmlrpc-4.3.9-3.12.ia64.rpm ppc: 41457a9257d66621181cc806842e557d php-4.3.9-3.12.ppc.rpm 281825ad04864e92c5cee0066eaa850f php-debuginfo-4.3.9-3.12.ppc.rpm bf16b2fc2ceac8ac02e8a63cc5fa9cb3 php-devel-4.3.9-3.12.ppc.rpm 9205471bea067554679e981eb97855d9 php-domxml-4.3.9-3.12.ppc.rpm eea436536d52235fbba6442b65af6fc5 php-gd-4.3.9-3.12.ppc.rpm bac6c82172923fb14ef7a0d2ab3da8ec php-imap-4.3.9-3.12.ppc.rpm e29531cea45bf14c72b7726429714b90 php-ldap-4.3.9-3.12.ppc.rpm 9cf4706d6afdfdc179d422910bc78fe9 php-mbstring-4.3.9-3.12.ppc.rpm 940092af7f18663c1ae7af48684cced2 php-mysql-4.3.9-3.12.ppc.rpm 923fb90f6be392be5f8d8de08aba6691 php-ncurses-4.3.9-3.12.ppc.rpm c2c474923d61748007efb4e95d576e1d php-odbc-4.3.9-3.12.ppc.rpm 6b3636cdaf5c409967da8bcc2c2f6715 php-pear-4.3.9-3.12.ppc.rpm ff6bd0fb05e641973e60f99c19e8ba5c php-pgsql-4.3.9-3.12.ppc.rpm 76f86b05e3f50df633195dc58bff864a php-snmp-4.3.9-3.12.ppc.rpm b7b959439de5c171a8fdb15d0773897f php-xmlrpc-4.3.9-3.12.ppc.rpm s390: 7333d72f68ab880c2d8c31311f20482f php-4.3.9-3.12.s390.rpm 59ca0325cff527c88aaa45fd1f88ebbb php-debuginfo-4.3.9-3.12.s390.rpm 42295dd2a94a32b3cb25069f34d2efaf php-devel-4.3.9-3.12.s390.rpm 9c088cc73a94e27f0bd4261352061a4d php-domxml-4.3.9-3.12.s390.rpm 11b871f635340bba80ea666d428e10d7 php-gd-4.3.9-3.12.s390.rpm 031bad414e828ae5a91bfb6db9f19f90 php-imap-4.3.9-3.12.s390.rpm ae86d751a267b235cdb19856e8fdb9bc php-ldap-4.3.9-3.12.s390.rpm d864864e422af04c47695a97697ee9e0 php-mbstring-4.3.9-3.12.s390.rpm 8e3da991d676c731712f0dd0bf23f708 php-mysql-4.3.9-3.12.s390.rpm 1e8a711713fd7bfe695e8c875cd162ba php-ncurses-4.3.9-3.12.s390.rpm 57d457768917ed2928dbe79a56259eaa php-odbc-4.3.9-3.12.s390.rpm 7a1814470f946013767f425a10e9e794 php-pear-4.3.9-3.12.s390.rpm 5ec8c91ff4dc6d133a578dda36fb3f74 php-pgsql-4.3.9-3.12.s390.rpm 34ceeea62b4ece2557ebadeab8cce6ee php-snmp-4.3.9-3.12.s390.rpm 033dd905f4a5abae0ee6f91926acc3e7 php-xmlrpc-4.3.9-3.12.s390.rpm s390x: be60cd19d4ed1e4f56f6dedcf4864cef php-4.3.9-3.12.s390x.rpm af6ad53fc3d78fe30a3b4fcc91a9af1d php-debuginfo-4.3.9-3.12.s390x.rpm 14ebc189816c678f054035949cb18960 php-devel-4.3.9-3.12.s390x.rpm b71b88c5834269b13986b75e171b4d48 php-domxml-4.3.9-3.12.s390x.rpm 5c398acd42d0e28ee571d197aba1b7c6 php-gd-4.3.9-3.12.s390x.rpm 810775b9d4e5c0859554ebc8fe2a344e php-imap-4.3.9-3.12.s390x.rpm a988c594f30bf1d8b845f9adeefbba52 php-ldap-4.3.9-3.12.s390x.rpm 2a7f0ba4c81c26f681a35187e94d5ee7 php-mbstring-4.3.9-3.12.s390x.rpm 06201a5ecff9b5cfab90cc04296abd54 php-mysql-4.3.9-3.12.s390x.rpm f04b17c4a2df1f2d4add315193dd9ae9 php-ncurses-4.3.9-3.12.s390x.rpm 9b1b9e6503687c3ae05904ea98aee976 php-odbc-4.3.9-3.12.s390x.rpm 2ead93be0392519a6f6ff06a3eab5746 php-pear-4.3.9-3.12.s390x.rpm 8a53aaf77dd2db234883851306c3282c php-pgsql-4.3.9-3.12.s390x.rpm 9b16971eac5f40462a7e57b54e2c67c2 php-snmp-4.3.9-3.12.s390x.rpm 1a9625459c617553f333609203288c3f php-xmlrpc-4.3.9-3.12.s390x.rpm x86_64: 3b601cc9b736a52b4586d65f02364139 php-4.3.9-3.12.x86_64.rpm 5c02056734b976e99d1dce4b84a9f3eb php-debuginfo-4.3.9-3.12.x86_64.rpm 2338dfedb3182566084ab3cfb133a47f php-devel-4.3.9-3.12.x86_64.rpm f7aa9882eb8fa33aa38bedefcd8eae10 php-domxml-4.3.9-3.12.x86_64.rpm e4bc0212dbe3a1068956512ec7d3c117 php-gd-4.3.9-3.12.x86_64.rpm cf416adc0a5c9427c8ad7ae645630516 php-imap-4.3.9-3.12.x86_64.rpm d8218f64086a09f9678caf8d8b4d0805 php-ldap-4.3.9-3.12.x86_64.rpm 89e6234ea1abe06111354f9387e01fe2 php-mbstring-4.3.9-3.12.x86_64.rpm 065af91f39d7a16194933a02c14b682e php-mysql-4.3.9-3.12.x86_64.rpm 1de5bedd278d8ad28f3047f50d50c0b4 php-ncurses-4.3.9-3.12.x86_64.rpm 9b188d7675aa3842ab37044c3528bfe3 php-odbc-4.3.9-3.12.x86_64.rpm 645ef167eb306e3f6620ba3e0b7f8c08 php-pear-4.3.9-3.12.x86_64.rpm f43cbd9188abffe823ef0cee0df30b4b php-pgsql-4.3.9-3.12.x86_64.rpm c1ad4d0e5c0fb8f3aa8d524d7f097ebe php-snmp-4.3.9-3.12.x86_64.rpm b7ed8fb03f9e84206a7dd60317ea0641 php-xmlrpc-4.3.9-3.12.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/php-4.3.9-3.12.src.rpm 1f42883047b66e28a779a5604636b3da php-4.3.9-3.12.src.rpm i386: daa465aebd0f11e8175ed67453687e32 php-4.3.9-3.12.i386.rpm 97641e11e21ec8e4675069c5b3a388cd php-debuginfo-4.3.9-3.12.i386.rpm ed2efc56a5705982709bb32f621aaa22 php-devel-4.3.9-3.12.i386.rpm 0dd882b0034dbc4cf8375148ace6949d php-domxml-4.3.9-3.12.i386.rpm 610aec94208d58ea42d168daf0ca5eaa php-gd-4.3.9-3.12.i386.rpm c3f1001cbfa35ad31784fc72323e4856 php-imap-4.3.9-3.12.i386.rpm 0b4e877a90c7a139c3e30d74c7787ee8 php-ldap-4.3.9-3.12.i386.rpm 83d9de2ecda74ad0ed86c0525028c76b php-mbstring-4.3.9-3.12.i386.rpm 1b96b8190956420be92ff2350ef207a7 php-mysql-4.3.9-3.12.i386.rpm 44c9448f4db1b83f836f786fc7c28b75 php-ncurses-4.3.9-3.12.i386.rpm 1f2265aa85bd444003d9871c52a529d5 php-odbc-4.3.9-3.12.i386.rpm 0bd92272d4967bde1ab4c98b1ba10934 php-pear-4.3.9-3.12.i386.rpm e5712e82c9e043493d2a0e3d87a3c9b3 php-pgsql-4.3.9-3.12.i386.rpm 5d73441291aef40ac2ce035e09c2b150 php-snmp-4.3.9-3.12.i386.rpm 2c12e81e2bcaa950b62f4cb25cac13a7 php-xmlrpc-4.3.9-3.12.i386.rpm x86_64: 3b601cc9b736a52b4586d65f02364139 php-4.3.9-3.12.x86_64.rpm 5c02056734b976e99d1dce4b84a9f3eb php-debuginfo-4.3.9-3.12.x86_64.rpm 2338dfedb3182566084ab3cfb133a47f php-devel-4.3.9-3.12.x86_64.rpm f7aa9882eb8fa33aa38bedefcd8eae10 php-domxml-4.3.9-3.12.x86_64.rpm e4bc0212dbe3a1068956512ec7d3c117 php-gd-4.3.9-3.12.x86_64.rpm cf416adc0a5c9427c8ad7ae645630516 php-imap-4.3.9-3.12.x86_64.rpm d8218f64086a09f9678caf8d8b4d0805 php-ldap-4.3.9-3.12.x86_64.rpm 89e6234ea1abe06111354f9387e01fe2 php-mbstring-4.3.9-3.12.x86_64.rpm 065af91f39d7a16194933a02c14b682e php-mysql-4.3.9-3.12.x86_64.rpm 1de5bedd278d8ad28f3047f50d50c0b4 php-ncurses-4.3.9-3.12.x86_64.rpm 9b188d7675aa3842ab37044c3528bfe3 php-odbc-4.3.9-3.12.x86_64.rpm 645ef167eb306e3f6620ba3e0b7f8c08 php-pear-4.3.9-3.12.x86_64.rpm f43cbd9188abffe823ef0cee0df30b4b php-pgsql-4.3.9-3.12.x86_64.rpm c1ad4d0e5c0fb8f3aa8d524d7f097ebe php-snmp-4.3.9-3.12.x86_64.rpm b7ed8fb03f9e84206a7dd60317ea0641 php-xmlrpc-4.3.9-3.12.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/php-4.3.9-3.12.src.rpm 1f42883047b66e28a779a5604636b3da php-4.3.9-3.12.src.rpm i386: daa465aebd0f11e8175ed67453687e32 php-4.3.9-3.12.i386.rpm 97641e11e21ec8e4675069c5b3a388cd php-debuginfo-4.3.9-3.12.i386.rpm ed2efc56a5705982709bb32f621aaa22 php-devel-4.3.9-3.12.i386.rpm 0dd882b0034dbc4cf8375148ace6949d php-domxml-4.3.9-3.12.i386.rpm 610aec94208d58ea42d168daf0ca5eaa php-gd-4.3.9-3.12.i386.rpm c3f1001cbfa35ad31784fc72323e4856 php-imap-4.3.9-3.12.i386.rpm 0b4e877a90c7a139c3e30d74c7787ee8 php-ldap-4.3.9-3.12.i386.rpm 83d9de2ecda74ad0ed86c0525028c76b php-mbstring-4.3.9-3.12.i386.rpm 1b96b8190956420be92ff2350ef207a7 php-mysql-4.3.9-3.12.i386.rpm 44c9448f4db1b83f836f786fc7c28b75 php-ncurses-4.3.9-3.12.i386.rpm 1f2265aa85bd444003d9871c52a529d5 php-odbc-4.3.9-3.12.i386.rpm 0bd92272d4967bde1ab4c98b1ba10934 php-pear-4.3.9-3.12.i386.rpm e5712e82c9e043493d2a0e3d87a3c9b3 php-pgsql-4.3.9-3.12.i386.rpm 5d73441291aef40ac2ce035e09c2b150 php-snmp-4.3.9-3.12.i386.rpm 2c12e81e2bcaa950b62f4cb25cac13a7 php-xmlrpc-4.3.9-3.12.i386.rpm ia64: 5c701479c6c22559dbead737a8cbe8fa php-4.3.9-3.12.ia64.rpm 4bc286315168e0118749fd78e837f0de php-debuginfo-4.3.9-3.12.ia64.rpm 7d76b25499946fd409720f4bdbccd35e php-devel-4.3.9-3.12.ia64.rpm fe8f62fe3b7ddb164f1bb0fa77348ae1 php-domxml-4.3.9-3.12.ia64.rpm 45be07bf97f0f5838d5b7362afa305e3 php-gd-4.3.9-3.12.ia64.rpm 658223efb8b941ddad14e4c54ec7a40a php-imap-4.3.9-3.12.ia64.rpm a89c5d0b1878276ee63afd971051b2bf php-ldap-4.3.9-3.12.ia64.rpm 85c32ff621275878dafe5500438bcd18 php-mbstring-4.3.9-3.12.ia64.rpm b5382f0539b43f22e632efb0b4b714a1 php-mysql-4.3.9-3.12.ia64.rpm d434c93ebf9240d9e71d4c7b2f83d1ab php-ncurses-4.3.9-3.12.ia64.rpm 05f787718fb14fb6aad100617ad66545 php-odbc-4.3.9-3.12.ia64.rpm 9df262fa2228a4137f78f2c4c24bea34 php-pear-4.3.9-3.12.ia64.rpm e7e5d04a2363779f95d243fcf175e6e8 php-pgsql-4.3.9-3.12.ia64.rpm aae6a8a3fb253e32dac53fd9425ef014 php-snmp-4.3.9-3.12.ia64.rpm 4417151624641bffd0c95935c20b9d9c php-xmlrpc-4.3.9-3.12.ia64.rpm x86_64: 3b601cc9b736a52b4586d65f02364139 php-4.3.9-3.12.x86_64.rpm 5c02056734b976e99d1dce4b84a9f3eb php-debuginfo-4.3.9-3.12.x86_64.rpm 2338dfedb3182566084ab3cfb133a47f php-devel-4.3.9-3.12.x86_64.rpm f7aa9882eb8fa33aa38bedefcd8eae10 php-domxml-4.3.9-3.12.x86_64.rpm e4bc0212dbe3a1068956512ec7d3c117 php-gd-4.3.9-3.12.x86_64.rpm cf416adc0a5c9427c8ad7ae645630516 php-imap-4.3.9-3.12.x86_64.rpm d8218f64086a09f9678caf8d8b4d0805 php-ldap-4.3.9-3.12.x86_64.rpm 89e6234ea1abe06111354f9387e01fe2 php-mbstring-4.3.9-3.12.x86_64.rpm 065af91f39d7a16194933a02c14b682e php-mysql-4.3.9-3.12.x86_64.rpm 1de5bedd278d8ad28f3047f50d50c0b4 php-ncurses-4.3.9-3.12.x86_64.rpm 9b188d7675aa3842ab37044c3528bfe3 php-odbc-4.3.9-3.12.x86_64.rpm 645ef167eb306e3f6620ba3e0b7f8c08 php-pear-4.3.9-3.12.x86_64.rpm f43cbd9188abffe823ef0cee0df30b4b php-pgsql-4.3.9-3.12.x86_64.rpm c1ad4d0e5c0fb8f3aa8d524d7f097ebe php-snmp-4.3.9-3.12.x86_64.rpm b7ed8fb03f9e84206a7dd60317ea0641 php-xmlrpc-4.3.9-3.12.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/php-4.3.9-3.12.src.rpm 1f42883047b66e28a779a5604636b3da php-4.3.9-3.12.src.rpm i386: daa465aebd0f11e8175ed67453687e32 php-4.3.9-3.12.i386.rpm 97641e11e21ec8e4675069c5b3a388cd php-debuginfo-4.3.9-3.12.i386.rpm ed2efc56a5705982709bb32f621aaa22 php-devel-4.3.9-3.12.i386.rpm 0dd882b0034dbc4cf8375148ace6949d php-domxml-4.3.9-3.12.i386.rpm 610aec94208d58ea42d168daf0ca5eaa php-gd-4.3.9-3.12.i386.rpm c3f1001cbfa35ad31784fc72323e4856 php-imap-4.3.9-3.12.i386.rpm 0b4e877a90c7a139c3e30d74c7787ee8 php-ldap-4.3.9-3.12.i386.rpm 83d9de2ecda74ad0ed86c0525028c76b php-mbstring-4.3.9-3.12.i386.rpm 1b96b8190956420be92ff2350ef207a7 php-mysql-4.3.9-3.12.i386.rpm 44c9448f4db1b83f836f786fc7c28b75 php-ncurses-4.3.9-3.12.i386.rpm 1f2265aa85bd444003d9871c52a529d5 php-odbc-4.3.9-3.12.i386.rpm 0bd92272d4967bde1ab4c98b1ba10934 php-pear-4.3.9-3.12.i386.rpm e5712e82c9e043493d2a0e3d87a3c9b3 php-pgsql-4.3.9-3.12.i386.rpm 5d73441291aef40ac2ce035e09c2b150 php-snmp-4.3.9-3.12.i386.rpm 2c12e81e2bcaa950b62f4cb25cac13a7 php-xmlrpc-4.3.9-3.12.i386.rpm ia64: 5c701479c6c22559dbead737a8cbe8fa php-4.3.9-3.12.ia64.rpm 4bc286315168e0118749fd78e837f0de php-debuginfo-4.3.9-3.12.ia64.rpm 7d76b25499946fd409720f4bdbccd35e php-devel-4.3.9-3.12.ia64.rpm fe8f62fe3b7ddb164f1bb0fa77348ae1 php-domxml-4.3.9-3.12.ia64.rpm 45be07bf97f0f5838d5b7362afa305e3 php-gd-4.3.9-3.12.ia64.rpm 658223efb8b941ddad14e4c54ec7a40a php-imap-4.3.9-3.12.ia64.rpm a89c5d0b1878276ee63afd971051b2bf php-ldap-4.3.9-3.12.ia64.rpm 85c32ff621275878dafe5500438bcd18 php-mbstring-4.3.9-3.12.ia64.rpm b5382f0539b43f22e632efb0b4b714a1 php-mysql-4.3.9-3.12.ia64.rpm d434c93ebf9240d9e71d4c7b2f83d1ab php-ncurses-4.3.9-3.12.ia64.rpm 05f787718fb14fb6aad100617ad66545 php-odbc-4.3.9-3.12.ia64.rpm 9df262fa2228a4137f78f2c4c24bea34 php-pear-4.3.9-3.12.ia64.rpm e7e5d04a2363779f95d243fcf175e6e8 php-pgsql-4.3.9-3.12.ia64.rpm aae6a8a3fb253e32dac53fd9425ef014 php-snmp-4.3.9-3.12.ia64.rpm 4417151624641bffd0c95935c20b9d9c php-xmlrpc-4.3.9-3.12.ia64.rpm x86_64: 3b601cc9b736a52b4586d65f02364139 php-4.3.9-3.12.x86_64.rpm 5c02056734b976e99d1dce4b84a9f3eb php-debuginfo-4.3.9-3.12.x86_64.rpm 2338dfedb3182566084ab3cfb133a47f php-devel-4.3.9-3.12.x86_64.rpm f7aa9882eb8fa33aa38bedefcd8eae10 php-domxml-4.3.9-3.12.x86_64.rpm e4bc0212dbe3a1068956512ec7d3c117 php-gd-4.3.9-3.12.x86_64.rpm cf416adc0a5c9427c8ad7ae645630516 php-imap-4.3.9-3.12.x86_64.rpm d8218f64086a09f9678caf8d8b4d0805 php-ldap-4.3.9-3.12.x86_64.rpm 89e6234ea1abe06111354f9387e01fe2 php-mbstring-4.3.9-3.12.x86_64.rpm 065af91f39d7a16194933a02c14b682e php-mysql-4.3.9-3.12.x86_64.rpm 1de5bedd278d8ad28f3047f50d50c0b4 php-ncurses-4.3.9-3.12.x86_64.rpm 9b188d7675aa3842ab37044c3528bfe3 php-odbc-4.3.9-3.12.x86_64.rpm 645ef167eb306e3f6620ba3e0b7f8c08 php-pear-4.3.9-3.12.x86_64.rpm f43cbd9188abffe823ef0cee0df30b4b php-pgsql-4.3.9-3.12.x86_64.rpm c1ad4d0e5c0fb8f3aa8d524d7f097ebe php-snmp-4.3.9-3.12.x86_64.rpm b7ed8fb03f9e84206a7dd60317ea0641 php-xmlrpc-4.3.9-3.12.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2933 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3883 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0208 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0996 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1490 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFETjenXlSAg2UNWIIRAvSqAJsEBBRlS0XME3ChoKV5Bcc4ELW/uACdHs2A UxS84cdvUiYv22k6C1e0ssg= =m7CY -----END PGP SIGNATURE-----