From bugzilla at redhat.com Wed Dec 6 18:09:34 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 6 Dec 2006 13:09:34 -0500 Subject: [RHSA-2006:0746-01] Low: mod_auth_kerb security update Message-ID: <200612061809.kB6I9ZHZ028270@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Low: mod_auth_kerb security update Advisory ID: RHSA-2006:0746-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0746.html Issue date: 2006-12-06 Updated on: 2006-12-06 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-5989 - --------------------------------------------------------------------- 1. Summary: Updated mod_auth_kerb packages that fix a security flaw and a bug in multiple realm handling are now available for Red Hat Enterprise Linux 4. This update has been rated as having low security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: mod_auth_kerb is module for the Apache HTTP Server designed to provide Kerberos authentication over HTTP. An off by one flaw was found in the way mod_auth_kerb handles certain Kerberos authentication messages. A remote client could send a specially crafted authentication request which could crash an httpd child process (CVE-2006-5989). A bug in the handling of multiple realms configured using the "KrbAuthRealms" directive has also been fixed. All users of mod_auth_kerb should upgrade to these updated packages, which contain backported patches that resolve these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 216482 - CVE-2006-5989 mod_auth_kerb segfault with FC6 client 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/mod_auth_kerb-5.0-1.3.src.rpm 24131bdecf30d669d2fb2692dbcfad27 mod_auth_kerb-5.0-1.3.src.rpm i386: 1d5e62b7225a6e2000af86b789045413 mod_auth_kerb-5.0-1.3.i386.rpm fed4a53b16b7bfd7a4a0dfaca62f5be6 mod_auth_kerb-debuginfo-5.0-1.3.i386.rpm ia64: 443b99ef514df01db87733b155f93650 mod_auth_kerb-5.0-1.3.ia64.rpm e0779dc88b1b5091cb40636b8837b530 mod_auth_kerb-debuginfo-5.0-1.3.ia64.rpm ppc: 5436a1f27cf066c1726129704acc40cd mod_auth_kerb-5.0-1.3.ppc.rpm eef5905de44e82c650de1c10e58587db mod_auth_kerb-debuginfo-5.0-1.3.ppc.rpm s390: 2fcd997ce2d9993f1cf3a934be8495c9 mod_auth_kerb-5.0-1.3.s390.rpm bf7c624895dcbad7e5e571110ed20e2a mod_auth_kerb-debuginfo-5.0-1.3.s390.rpm s390x: e689f54999dd02f97d39ac840f009ede mod_auth_kerb-5.0-1.3.s390x.rpm af70fab7de73d73652f33a8a6b74b493 mod_auth_kerb-debuginfo-5.0-1.3.s390x.rpm x86_64: f586b2f0183882e66b848020a0226b9c mod_auth_kerb-5.0-1.3.x86_64.rpm 407aa8cbe7e8feb41b3f8a567d8b5a8d mod_auth_kerb-debuginfo-5.0-1.3.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/mod_auth_kerb-5.0-1.3.src.rpm 24131bdecf30d669d2fb2692dbcfad27 mod_auth_kerb-5.0-1.3.src.rpm i386: 1d5e62b7225a6e2000af86b789045413 mod_auth_kerb-5.0-1.3.i386.rpm fed4a53b16b7bfd7a4a0dfaca62f5be6 mod_auth_kerb-debuginfo-5.0-1.3.i386.rpm x86_64: f586b2f0183882e66b848020a0226b9c mod_auth_kerb-5.0-1.3.x86_64.rpm 407aa8cbe7e8feb41b3f8a567d8b5a8d mod_auth_kerb-debuginfo-5.0-1.3.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/mod_auth_kerb-5.0-1.3.src.rpm 24131bdecf30d669d2fb2692dbcfad27 mod_auth_kerb-5.0-1.3.src.rpm i386: 1d5e62b7225a6e2000af86b789045413 mod_auth_kerb-5.0-1.3.i386.rpm fed4a53b16b7bfd7a4a0dfaca62f5be6 mod_auth_kerb-debuginfo-5.0-1.3.i386.rpm ia64: 443b99ef514df01db87733b155f93650 mod_auth_kerb-5.0-1.3.ia64.rpm e0779dc88b1b5091cb40636b8837b530 mod_auth_kerb-debuginfo-5.0-1.3.ia64.rpm x86_64: f586b2f0183882e66b848020a0226b9c mod_auth_kerb-5.0-1.3.x86_64.rpm 407aa8cbe7e8feb41b3f8a567d8b5a8d mod_auth_kerb-debuginfo-5.0-1.3.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/mod_auth_kerb-5.0-1.3.src.rpm 24131bdecf30d669d2fb2692dbcfad27 mod_auth_kerb-5.0-1.3.src.rpm i386: 1d5e62b7225a6e2000af86b789045413 mod_auth_kerb-5.0-1.3.i386.rpm fed4a53b16b7bfd7a4a0dfaca62f5be6 mod_auth_kerb-debuginfo-5.0-1.3.i386.rpm ia64: 443b99ef514df01db87733b155f93650 mod_auth_kerb-5.0-1.3.ia64.rpm e0779dc88b1b5091cb40636b8837b530 mod_auth_kerb-debuginfo-5.0-1.3.ia64.rpm x86_64: f586b2f0183882e66b848020a0226b9c mod_auth_kerb-5.0-1.3.x86_64.rpm 407aa8cbe7e8feb41b3f8a567d8b5a8d mod_auth_kerb-debuginfo-5.0-1.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5989 http://www.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFdwdIXlSAg2UNWIIRAslDAJ0ek4iwjjdQFh/LOnsw+5ocnZgHCACfWJTG 83Jagq0sAH6vMr7cgCsCOHI= =u6te -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 6 18:10:18 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 6 Dec 2006 13:10:18 -0500 Subject: [RHSA-2006:0754-01] Important: gnupg security update Message-ID: <200612061810.kB6IAJ1R028377@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: gnupg security update Advisory ID: RHSA-2006:0754-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0754.html Issue date: 2006-12-06 Updated on: 2006-12-06 Product: Red Hat Enterprise Linux Keywords: printable string decrypt heap overflow CVE Names: CVE-2006-6169 CVE-2006-6235 - --------------------------------------------------------------------- 1. Summary: Updated GnuPG packages that fix two security issues are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: GnuPG is a utility for encrypting data and creating digital signatures. Tavis Ormandy discovered a stack overwrite flaw in the way GnuPG decrypts messages. An attacker could create carefully crafted message that could cause GnuPG to execute arbitrary code if a victim attempts to decrypt the message. (CVE-2006-6235) A heap based buffer overflow flaw was found in the way GnuPG constructs messages to be written to the terminal during an interactive session. An attacker could create a carefully crafted message which with user interaction could cause GnuPG to execute arbitrary code with the permissions of the user running GnuPG. (CVE-2006-6169) All users of GnuPG are advised to upgrade to this updated package, which contains a backported patch to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 218505 - CVE-2006-6169 GnuPG heap overflow 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/gnupg-1.0.7-20.src.rpm 55f3008c00505b9ed691a1621f9f679b gnupg-1.0.7-20.src.rpm i386: 25113e54fca82c67a1adb0d14c536aa9 gnupg-1.0.7-20.i386.rpm ia64: 6a3a3c6dc0e4b65fd5eddc75a422fead gnupg-1.0.7-20.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/gnupg-1.0.7-20.src.rpm 55f3008c00505b9ed691a1621f9f679b gnupg-1.0.7-20.src.rpm ia64: 6a3a3c6dc0e4b65fd5eddc75a422fead gnupg-1.0.7-20.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/gnupg-1.0.7-20.src.rpm 55f3008c00505b9ed691a1621f9f679b gnupg-1.0.7-20.src.rpm i386: 25113e54fca82c67a1adb0d14c536aa9 gnupg-1.0.7-20.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/gnupg-1.0.7-20.src.rpm 55f3008c00505b9ed691a1621f9f679b gnupg-1.0.7-20.src.rpm i386: 25113e54fca82c67a1adb0d14c536aa9 gnupg-1.0.7-20.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/gnupg-1.2.1-19.src.rpm 2006add6d6ece17f59f4a9397d621665 gnupg-1.2.1-19.src.rpm i386: 39045347836c30667687d601a58965a9 gnupg-1.2.1-19.i386.rpm e1a346200fd6628fefcdcc721083e91f gnupg-debuginfo-1.2.1-19.i386.rpm ia64: 978ff04512ff5e7706d505e0fa46e0eb gnupg-1.2.1-19.ia64.rpm 03269279b06d98af518bd405c3313bad gnupg-debuginfo-1.2.1-19.ia64.rpm ppc: 7f21902fb2f508d735bbc430a01765f4 gnupg-1.2.1-19.ppc.rpm e8019cb279d04aa65a9faf52ab0a46c0 gnupg-debuginfo-1.2.1-19.ppc.rpm s390: d9fefbd2ef988552d9b1b3b0a890acef gnupg-1.2.1-19.s390.rpm 5efc90cef0cac23eda451e1508e09fd2 gnupg-debuginfo-1.2.1-19.s390.rpm s390x: 5fe40389e0aeb86ab0b9b1d413e899d1 gnupg-1.2.1-19.s390x.rpm 0353ea95434201e538e81809117fab33 gnupg-debuginfo-1.2.1-19.s390x.rpm x86_64: 4cd47c1ff13aecfc4fb235e98b156e06 gnupg-1.2.1-19.x86_64.rpm 1a327c028d1e44f3747c890f6c926d9a gnupg-debuginfo-1.2.1-19.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/gnupg-1.2.1-19.src.rpm 2006add6d6ece17f59f4a9397d621665 gnupg-1.2.1-19.src.rpm i386: 39045347836c30667687d601a58965a9 gnupg-1.2.1-19.i386.rpm e1a346200fd6628fefcdcc721083e91f gnupg-debuginfo-1.2.1-19.i386.rpm x86_64: 4cd47c1ff13aecfc4fb235e98b156e06 gnupg-1.2.1-19.x86_64.rpm 1a327c028d1e44f3747c890f6c926d9a gnupg-debuginfo-1.2.1-19.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/gnupg-1.2.1-19.src.rpm 2006add6d6ece17f59f4a9397d621665 gnupg-1.2.1-19.src.rpm i386: 39045347836c30667687d601a58965a9 gnupg-1.2.1-19.i386.rpm e1a346200fd6628fefcdcc721083e91f gnupg-debuginfo-1.2.1-19.i386.rpm ia64: 978ff04512ff5e7706d505e0fa46e0eb gnupg-1.2.1-19.ia64.rpm 03269279b06d98af518bd405c3313bad gnupg-debuginfo-1.2.1-19.ia64.rpm x86_64: 4cd47c1ff13aecfc4fb235e98b156e06 gnupg-1.2.1-19.x86_64.rpm 1a327c028d1e44f3747c890f6c926d9a gnupg-debuginfo-1.2.1-19.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/gnupg-1.2.1-19.src.rpm 2006add6d6ece17f59f4a9397d621665 gnupg-1.2.1-19.src.rpm i386: 39045347836c30667687d601a58965a9 gnupg-1.2.1-19.i386.rpm e1a346200fd6628fefcdcc721083e91f gnupg-debuginfo-1.2.1-19.i386.rpm ia64: 978ff04512ff5e7706d505e0fa46e0eb gnupg-1.2.1-19.ia64.rpm 03269279b06d98af518bd405c3313bad gnupg-debuginfo-1.2.1-19.ia64.rpm x86_64: 4cd47c1ff13aecfc4fb235e98b156e06 gnupg-1.2.1-19.x86_64.rpm 1a327c028d1e44f3747c890f6c926d9a gnupg-debuginfo-1.2.1-19.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gnupg-1.2.6-8.src.rpm 4d919fce07aa4051c6a8ec5f871430c8 gnupg-1.2.6-8.src.rpm i386: 640862942e412f7070f4633cef6a480e gnupg-1.2.6-8.i386.rpm b389e7abc34289a7ed4b302893c10396 gnupg-debuginfo-1.2.6-8.i386.rpm ia64: 0d1191dcf30c72a93282dfec862dbef6 gnupg-1.2.6-8.ia64.rpm 840fcfbd4a0078df5390cf206efe7c27 gnupg-debuginfo-1.2.6-8.ia64.rpm ppc: 1c64e01d7a0e6adbf2c069303f28c66b gnupg-1.2.6-8.ppc.rpm 56d59005e8c51bda61edd99e75ef692b gnupg-debuginfo-1.2.6-8.ppc.rpm s390: 6f007a82e0b769988ba97132db09053b gnupg-1.2.6-8.s390.rpm ac9c8f7fcd9313dc2ec9d53d206227de gnupg-debuginfo-1.2.6-8.s390.rpm s390x: bbf9eab34a9282fd30698bc0d27ff11f gnupg-1.2.6-8.s390x.rpm 6dd7b0cb8904abf3216de58be7bbb110 gnupg-debuginfo-1.2.6-8.s390x.rpm x86_64: 800e7c982ba81ae0651b0091fdf61a63 gnupg-1.2.6-8.x86_64.rpm fb3f183d427aea368b331b8e008122d7 gnupg-debuginfo-1.2.6-8.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gnupg-1.2.6-8.src.rpm 4d919fce07aa4051c6a8ec5f871430c8 gnupg-1.2.6-8.src.rpm i386: 640862942e412f7070f4633cef6a480e gnupg-1.2.6-8.i386.rpm b389e7abc34289a7ed4b302893c10396 gnupg-debuginfo-1.2.6-8.i386.rpm x86_64: 800e7c982ba81ae0651b0091fdf61a63 gnupg-1.2.6-8.x86_64.rpm fb3f183d427aea368b331b8e008122d7 gnupg-debuginfo-1.2.6-8.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gnupg-1.2.6-8.src.rpm 4d919fce07aa4051c6a8ec5f871430c8 gnupg-1.2.6-8.src.rpm i386: 640862942e412f7070f4633cef6a480e gnupg-1.2.6-8.i386.rpm b389e7abc34289a7ed4b302893c10396 gnupg-debuginfo-1.2.6-8.i386.rpm ia64: 0d1191dcf30c72a93282dfec862dbef6 gnupg-1.2.6-8.ia64.rpm 840fcfbd4a0078df5390cf206efe7c27 gnupg-debuginfo-1.2.6-8.ia64.rpm x86_64: 800e7c982ba81ae0651b0091fdf61a63 gnupg-1.2.6-8.x86_64.rpm fb3f183d427aea368b331b8e008122d7 gnupg-debuginfo-1.2.6-8.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gnupg-1.2.6-8.src.rpm 4d919fce07aa4051c6a8ec5f871430c8 gnupg-1.2.6-8.src.rpm i386: 640862942e412f7070f4633cef6a480e gnupg-1.2.6-8.i386.rpm b389e7abc34289a7ed4b302893c10396 gnupg-debuginfo-1.2.6-8.i386.rpm ia64: 0d1191dcf30c72a93282dfec862dbef6 gnupg-1.2.6-8.ia64.rpm 840fcfbd4a0078df5390cf206efe7c27 gnupg-debuginfo-1.2.6-8.ia64.rpm x86_64: 800e7c982ba81ae0651b0091fdf61a63 gnupg-1.2.6-8.x86_64.rpm fb3f183d427aea368b331b8e008122d7 gnupg-debuginfo-1.2.6-8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6235 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFdwd0XlSAg2UNWIIRAlygAKC3BOrJgu7cd5wpyFWuTC2UV23tKQCgtqra Gd5pkwXxWZqHubmN2e7FFFg= =MzhE -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 19 22:49:48 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 19 Dec 2006 17:49:48 -0500 Subject: [RHSA-2006:0749-01] Moderate: tar security update Message-ID: <200612192249.kBJMnn3I013449@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: tar security update Advisory ID: RHSA-2006:0749-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0749.html Issue date: 2006-12-19 Updated on: 2006-12-19 Product: Red Hat Enterprise Linux Keywords: path traversal GNUTYPE_NAMES CVE Names: CVE-2006-6097 - --------------------------------------------------------------------- 1. Summary: Updated tar packages that fix a path traversal flaw are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: The GNU tar program saves many files together in one archive and can restore individual files (or all of the files) from that archive. Teemu Salmela discovered a path traversal flaw in the way GNU tar extracted archives. A malicious user could create a tar archive that could write to arbitrary files to which the user running GNU tar has write access. (CVE-2006-6097) Users of tar should upgrade to this updated package, which contains a replacement backported patch to correct this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/): 216937 - CVE-2006-6097 GNU tar directory traversal 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/tar-1.13.25-6.AS21.1.src.rpm 9cb62366b2c0328cd799f4f1d01b4f85 tar-1.13.25-6.AS21.1.src.rpm i386: 82e737e4a7932200e3760d8bb8db96d7 tar-1.13.25-6.AS21.1.i386.rpm ia64: dbbd437b5ee88e65bf4c7731b48ea8e5 tar-1.13.25-6.AS21.1.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/tar-1.13.25-6.AS21.1.src.rpm 9cb62366b2c0328cd799f4f1d01b4f85 tar-1.13.25-6.AS21.1.src.rpm ia64: dbbd437b5ee88e65bf4c7731b48ea8e5 tar-1.13.25-6.AS21.1.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/tar-1.13.25-6.AS21.1.src.rpm 9cb62366b2c0328cd799f4f1d01b4f85 tar-1.13.25-6.AS21.1.src.rpm i386: 82e737e4a7932200e3760d8bb8db96d7 tar-1.13.25-6.AS21.1.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/tar-1.13.25-6.AS21.1.src.rpm 9cb62366b2c0328cd799f4f1d01b4f85 tar-1.13.25-6.AS21.1.src.rpm i386: 82e737e4a7932200e3760d8bb8db96d7 tar-1.13.25-6.AS21.1.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/tar-1.13.25-15.RHEL3.src.rpm 48b87b75152449ec8fac039fce6c481f tar-1.13.25-15.RHEL3.src.rpm i386: 2f78f39c91f8674ecf30ab82cc6577ad tar-1.13.25-15.RHEL3.i386.rpm c407f5bdc6767bb319ca2b6ba7079790 tar-debuginfo-1.13.25-15.RHEL3.i386.rpm ia64: e6c05756ca0754ca7470434e284a5509 tar-1.13.25-15.RHEL3.ia64.rpm 696316c2fd2aeccde4bbae0d1ebf65c7 tar-debuginfo-1.13.25-15.RHEL3.ia64.rpm ppc: ec3903c1c8424a68d66c033aee38ef3d tar-1.13.25-15.RHEL3.ppc.rpm c57a3a691487c4fc77d45c6e856443ad tar-debuginfo-1.13.25-15.RHEL3.ppc.rpm s390: d748e97d9288a1529eccff07be2ea647 tar-1.13.25-15.RHEL3.s390.rpm e9ff9bade43a8642100ac5163e3879da tar-debuginfo-1.13.25-15.RHEL3.s390.rpm s390x: 4137e79c7202881ae6c26b7220060c7b tar-1.13.25-15.RHEL3.s390x.rpm db7118e59b15e43c9fefc4857e06a467 tar-debuginfo-1.13.25-15.RHEL3.s390x.rpm x86_64: 7df94215917d5d5cb8870801fcf43bd2 tar-1.13.25-15.RHEL3.x86_64.rpm 65b80aa52e2532a74f88050830729ca3 tar-debuginfo-1.13.25-15.RHEL3.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/tar-1.13.25-15.RHEL3.src.rpm 48b87b75152449ec8fac039fce6c481f tar-1.13.25-15.RHEL3.src.rpm i386: 2f78f39c91f8674ecf30ab82cc6577ad tar-1.13.25-15.RHEL3.i386.rpm c407f5bdc6767bb319ca2b6ba7079790 tar-debuginfo-1.13.25-15.RHEL3.i386.rpm x86_64: 7df94215917d5d5cb8870801fcf43bd2 tar-1.13.25-15.RHEL3.x86_64.rpm 65b80aa52e2532a74f88050830729ca3 tar-debuginfo-1.13.25-15.RHEL3.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/tar-1.13.25-15.RHEL3.src.rpm 48b87b75152449ec8fac039fce6c481f tar-1.13.25-15.RHEL3.src.rpm i386: 2f78f39c91f8674ecf30ab82cc6577ad tar-1.13.25-15.RHEL3.i386.rpm c407f5bdc6767bb319ca2b6ba7079790 tar-debuginfo-1.13.25-15.RHEL3.i386.rpm ia64: e6c05756ca0754ca7470434e284a5509 tar-1.13.25-15.RHEL3.ia64.rpm 696316c2fd2aeccde4bbae0d1ebf65c7 tar-debuginfo-1.13.25-15.RHEL3.ia64.rpm x86_64: 7df94215917d5d5cb8870801fcf43bd2 tar-1.13.25-15.RHEL3.x86_64.rpm 65b80aa52e2532a74f88050830729ca3 tar-debuginfo-1.13.25-15.RHEL3.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/tar-1.13.25-15.RHEL3.src.rpm 48b87b75152449ec8fac039fce6c481f tar-1.13.25-15.RHEL3.src.rpm i386: 2f78f39c91f8674ecf30ab82cc6577ad tar-1.13.25-15.RHEL3.i386.rpm c407f5bdc6767bb319ca2b6ba7079790 tar-debuginfo-1.13.25-15.RHEL3.i386.rpm ia64: e6c05756ca0754ca7470434e284a5509 tar-1.13.25-15.RHEL3.ia64.rpm 696316c2fd2aeccde4bbae0d1ebf65c7 tar-debuginfo-1.13.25-15.RHEL3.ia64.rpm x86_64: 7df94215917d5d5cb8870801fcf43bd2 tar-1.13.25-15.RHEL3.x86_64.rpm 65b80aa52e2532a74f88050830729ca3 tar-debuginfo-1.13.25-15.RHEL3.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/tar-1.14-12.RHEL4.src.rpm 915d5fef3750a417683d3ad52aaf0158 tar-1.14-12.RHEL4.src.rpm i386: 94e0f0511e8357b7f4538edfa35e88e6 tar-1.14-12.RHEL4.i386.rpm f63b90bf3eb3d1c24e254c55f6ce0e86 tar-debuginfo-1.14-12.RHEL4.i386.rpm ia64: 4fdf307c4fbbb324a45f459056a9f5dc tar-1.14-12.RHEL4.ia64.rpm eda06f72c4b6a7cfe9faa02a6b8fa8d5 tar-debuginfo-1.14-12.RHEL4.ia64.rpm ppc: 7daef3e5491853a369775887103f8858 tar-1.14-12.RHEL4.ppc.rpm beb775fbc5ae5af860555a764b4f96e1 tar-debuginfo-1.14-12.RHEL4.ppc.rpm s390: 0fda5b626b7fc9eb0324dc22a4075d75 tar-1.14-12.RHEL4.s390.rpm 9420349015d1c73923a30ac7082fb123 tar-debuginfo-1.14-12.RHEL4.s390.rpm s390x: 91682d1f8c79e64a1aa5b7f3dfb514d4 tar-1.14-12.RHEL4.s390x.rpm 22c5cd9c1d7bf1d8603cbd18f4e462a1 tar-debuginfo-1.14-12.RHEL4.s390x.rpm x86_64: 817bae24d9975f961434839605c668e2 tar-1.14-12.RHEL4.x86_64.rpm de775868851463fbd286b2d2bfd16b87 tar-debuginfo-1.14-12.RHEL4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/tar-1.14-12.RHEL4.src.rpm 915d5fef3750a417683d3ad52aaf0158 tar-1.14-12.RHEL4.src.rpm i386: 94e0f0511e8357b7f4538edfa35e88e6 tar-1.14-12.RHEL4.i386.rpm f63b90bf3eb3d1c24e254c55f6ce0e86 tar-debuginfo-1.14-12.RHEL4.i386.rpm x86_64: 817bae24d9975f961434839605c668e2 tar-1.14-12.RHEL4.x86_64.rpm de775868851463fbd286b2d2bfd16b87 tar-debuginfo-1.14-12.RHEL4.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/tar-1.14-12.RHEL4.src.rpm 915d5fef3750a417683d3ad52aaf0158 tar-1.14-12.RHEL4.src.rpm i386: 94e0f0511e8357b7f4538edfa35e88e6 tar-1.14-12.RHEL4.i386.rpm f63b90bf3eb3d1c24e254c55f6ce0e86 tar-debuginfo-1.14-12.RHEL4.i386.rpm ia64: 4fdf307c4fbbb324a45f459056a9f5dc tar-1.14-12.RHEL4.ia64.rpm eda06f72c4b6a7cfe9faa02a6b8fa8d5 tar-debuginfo-1.14-12.RHEL4.ia64.rpm x86_64: 817bae24d9975f961434839605c668e2 tar-1.14-12.RHEL4.x86_64.rpm de775868851463fbd286b2d2bfd16b87 tar-debuginfo-1.14-12.RHEL4.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/tar-1.14-12.RHEL4.src.rpm 915d5fef3750a417683d3ad52aaf0158 tar-1.14-12.RHEL4.src.rpm i386: 94e0f0511e8357b7f4538edfa35e88e6 tar-1.14-12.RHEL4.i386.rpm f63b90bf3eb3d1c24e254c55f6ce0e86 tar-debuginfo-1.14-12.RHEL4.i386.rpm ia64: 4fdf307c4fbbb324a45f459056a9f5dc tar-1.14-12.RHEL4.ia64.rpm eda06f72c4b6a7cfe9faa02a6b8fa8d5 tar-debuginfo-1.14-12.RHEL4.ia64.rpm x86_64: 817bae24d9975f961434839605c668e2 tar-1.14-12.RHEL4.x86_64.rpm de775868851463fbd286b2d2bfd16b87 tar-debuginfo-1.14-12.RHEL4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFiGx9XlSAg2UNWIIRAiKxAKC2Zzay5cFas/0mroftArKKnsqEDQCeICxk bL/XplRooLVmTZA9BUxzLk8= =/L2r -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 19 22:50:24 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 19 Dec 2006 17:50:24 -0500 Subject: [RHSA-2006:0758-01] Critical: firefox security update Message-ID: <200612192250.kBJMoPKR013524@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2006:0758-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0758.html Issue date: 2006-12-19 Updated on: 2006-12-19 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-6497 CVE-2006-6498 CVE-2006-6501 CVE-2006-6502 CVE-2006-6503 CVE-2006-6504 - --------------------------------------------------------------------- 1. Summary: Updated firefox packages that fix several security bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Mozilla Firefox is an open source Web browser. Several flaws were found in the way Firefox processes certain malformed Javascript code. A malicious web page could cause the execution of Javascript code in such a way that could cause Firefox to crash or execute arbitrary code as the user running Firefox. (CVE-2006-6498, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503, CVE-2006-6504) Several flaws were found in the way Firefox renders web pages. A malicious web page could cause the browser to crash or possibly execute arbitrary code as the user running Firefox. (CVE-2006-6497) Users of Firefox are advised to upgrade to these erratum packages, which contain Firefox version 1.5.0.9 that corrects these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 219682 - CVE-2006-6497 Multiple Firefox issues (CVE-2006-6498, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503, CVE-2006-6504) 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firefox-1.5.0.9-0.1.el4.src.rpm d0eccc79ceaea24b476d34d51e70f1f0 firefox-1.5.0.9-0.1.el4.src.rpm i386: bd4f815b6c088bc97ccafcd87fc7b725 firefox-1.5.0.9-0.1.el4.i386.rpm a2ff046b764ab94ceea6a6b1cc902cc9 firefox-debuginfo-1.5.0.9-0.1.el4.i386.rpm ia64: dfa5106fa6372a30e0f64718f71cf03d firefox-1.5.0.9-0.1.el4.ia64.rpm 725d7d961be76885f6bb7128302a95be firefox-debuginfo-1.5.0.9-0.1.el4.ia64.rpm ppc: f221ad6749a595fcea26b8fc62ba1d41 firefox-1.5.0.9-0.1.el4.ppc.rpm 7c58f3d6140b2796784a0226bc78a61b firefox-debuginfo-1.5.0.9-0.1.el4.ppc.rpm s390: 226743d08765bbc50be04ed340dbe426 firefox-1.5.0.9-0.1.el4.s390.rpm 52aba5cdfd6b3db502137d9c985f8933 firefox-debuginfo-1.5.0.9-0.1.el4.s390.rpm s390x: 7bbc9e55e747edb910c55da28a369411 firefox-1.5.0.9-0.1.el4.s390x.rpm 9cf48aa3b10d1fa60f1f43470af38d21 firefox-debuginfo-1.5.0.9-0.1.el4.s390x.rpm x86_64: 6194d2a97028a49e0acb8cbfd5789776 firefox-1.5.0.9-0.1.el4.x86_64.rpm 80ac31efc107b603567506eac3ff43e9 firefox-debuginfo-1.5.0.9-0.1.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/firefox-1.5.0.9-0.1.el4.src.rpm d0eccc79ceaea24b476d34d51e70f1f0 firefox-1.5.0.9-0.1.el4.src.rpm i386: bd4f815b6c088bc97ccafcd87fc7b725 firefox-1.5.0.9-0.1.el4.i386.rpm a2ff046b764ab94ceea6a6b1cc902cc9 firefox-debuginfo-1.5.0.9-0.1.el4.i386.rpm x86_64: 6194d2a97028a49e0acb8cbfd5789776 firefox-1.5.0.9-0.1.el4.x86_64.rpm 80ac31efc107b603567506eac3ff43e9 firefox-debuginfo-1.5.0.9-0.1.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firefox-1.5.0.9-0.1.el4.src.rpm d0eccc79ceaea24b476d34d51e70f1f0 firefox-1.5.0.9-0.1.el4.src.rpm i386: bd4f815b6c088bc97ccafcd87fc7b725 firefox-1.5.0.9-0.1.el4.i386.rpm a2ff046b764ab94ceea6a6b1cc902cc9 firefox-debuginfo-1.5.0.9-0.1.el4.i386.rpm ia64: dfa5106fa6372a30e0f64718f71cf03d firefox-1.5.0.9-0.1.el4.ia64.rpm 725d7d961be76885f6bb7128302a95be firefox-debuginfo-1.5.0.9-0.1.el4.ia64.rpm x86_64: 6194d2a97028a49e0acb8cbfd5789776 firefox-1.5.0.9-0.1.el4.x86_64.rpm 80ac31efc107b603567506eac3ff43e9 firefox-debuginfo-1.5.0.9-0.1.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firefox-1.5.0.9-0.1.el4.src.rpm d0eccc79ceaea24b476d34d51e70f1f0 firefox-1.5.0.9-0.1.el4.src.rpm i386: bd4f815b6c088bc97ccafcd87fc7b725 firefox-1.5.0.9-0.1.el4.i386.rpm a2ff046b764ab94ceea6a6b1cc902cc9 firefox-debuginfo-1.5.0.9-0.1.el4.i386.rpm ia64: dfa5106fa6372a30e0f64718f71cf03d firefox-1.5.0.9-0.1.el4.ia64.rpm 725d7d961be76885f6bb7128302a95be firefox-debuginfo-1.5.0.9-0.1.el4.ia64.rpm x86_64: 6194d2a97028a49e0acb8cbfd5789776 firefox-1.5.0.9-0.1.el4.x86_64.rpm 80ac31efc107b603567506eac3ff43e9 firefox-debuginfo-1.5.0.9-0.1.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFiGyoXlSAg2UNWIIRAiQ9AKC3uCrJUEsUi1jeYDFsEZdNinucWQCfYx9l O48SwnayvUkkxRx0KY25Oz8= =aFUp -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 19 22:50:50 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 19 Dec 2006 17:50:50 -0500 Subject: [RHSA-2006:0759-01] Critical: seamonkey security update Message-ID: <200612192250.kBJMoo6K013547@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: seamonkey security update Advisory ID: RHSA-2006:0759-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0759.html Issue date: 2006-12-19 Updated on: 2006-12-19 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-6497 CVE-2006-6498 CVE-2006-6501 CVE-2006-6502 CVE-2006-6503 CVE-2006-6504 CVE-2006-6505 - --------------------------------------------------------------------- 1. Summary: Updated seamonkey packages that fix several security bugs are now available for Red Hat Enterprise Linux 2.1, 3, and 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: SeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. Several flaws were found in the way SeaMonkey processes certain malformed Javascript code. A malicious web page could cause the execution of Javascript code in such a way that could cause SeaMonkey to crash or execute arbitrary code as the user running SeaMonkey. (CVE-2006-6498, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503, CVE-2006-6504) Several flaws were found in the way SeaMonkey renders web pages. A malicious web page could cause the browser to crash or possibly execute arbitrary code as the user running SeaMonkey. (CVE-2006-6497) A heap based buffer overflow flaw was found in the way SeaMonkey Mail parses the Content-Type mail header. A malicious mail message could cause the SeaMonkey Mail client to crash or possibly execute arbitrary code as the user running SeaMonkey Mail. (CVE-2006-6505) Users of SeaMonkey are advised to upgrade to these erratum packages, which contain SeaMonkey version 1.0.7 that corrects these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 219684 - CVE-2006-6497 Multiple Seamonkey issues (CVE-2006-6498, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503, CVE-2006-6504, CVE-2006-6505) 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/seamonkey-1.0.7-0.1.el2.src.rpm 1afcb729a71f9bcab212b85bc7db8305 seamonkey-1.0.7-0.1.el2.src.rpm i386: b502c5cd15536cde00659ea15a40d3eb seamonkey-1.0.7-0.1.el2.i386.rpm 0c9953f5d87e3a9d58a494955dbf7567 seamonkey-chat-1.0.7-0.1.el2.i386.rpm c437d56c0106767288b8054ae15a1680 seamonkey-devel-1.0.7-0.1.el2.i386.rpm 9a8ea0dad224df602bca010831a4a54f seamonkey-dom-inspector-1.0.7-0.1.el2.i386.rpm 9ea244e3b5eb5f924d0e08cfc12dffa5 seamonkey-js-debugger-1.0.7-0.1.el2.i386.rpm 145b44f6df28ccdd14c35eb89bba4bc7 seamonkey-mail-1.0.7-0.1.el2.i386.rpm 8713013d56133b5bdb245e4fc352f489 seamonkey-nspr-1.0.7-0.1.el2.i386.rpm d93c6511905d05f40b77be1fa025257e seamonkey-nspr-devel-1.0.7-0.1.el2.i386.rpm da6a7ca38ade9ae5b39d3d1c9446a265 seamonkey-nss-1.0.7-0.1.el2.i386.rpm 2cba5ca2321393a1e9e67d8c76bdfa9b seamonkey-nss-devel-1.0.7-0.1.el2.i386.rpm ia64: d59117b653a527834c387d6d0fd6973a seamonkey-1.0.7-0.1.el2.ia64.rpm 9daa833c1fe9f904d12cf2fde31e16c1 seamonkey-chat-1.0.7-0.1.el2.ia64.rpm 9538ee6bdb38420619c1c3a28813946c seamonkey-devel-1.0.7-0.1.el2.ia64.rpm 7d4009999abfff868d91ee7e36410d2a seamonkey-dom-inspector-1.0.7-0.1.el2.ia64.rpm b2aa56d47bda3dfab278212f440d16f7 seamonkey-js-debugger-1.0.7-0.1.el2.ia64.rpm 48fbe7b233068b5e72370376b4f76765 seamonkey-mail-1.0.7-0.1.el2.ia64.rpm 51d67764e3c39f641724048528d76401 seamonkey-nspr-1.0.7-0.1.el2.ia64.rpm b7dbf61f701581324fe5530cab657c09 seamonkey-nspr-devel-1.0.7-0.1.el2.ia64.rpm 217dcc2e4bb67693151a71857b1e2b97 seamonkey-nss-1.0.7-0.1.el2.ia64.rpm cac606cf928a4a474965bc4519c4d4d3 seamonkey-nss-devel-1.0.7-0.1.el2.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/seamonkey-1.0.7-0.1.el2.src.rpm 1afcb729a71f9bcab212b85bc7db8305 seamonkey-1.0.7-0.1.el2.src.rpm ia64: d59117b653a527834c387d6d0fd6973a seamonkey-1.0.7-0.1.el2.ia64.rpm 9daa833c1fe9f904d12cf2fde31e16c1 seamonkey-chat-1.0.7-0.1.el2.ia64.rpm 9538ee6bdb38420619c1c3a28813946c seamonkey-devel-1.0.7-0.1.el2.ia64.rpm 7d4009999abfff868d91ee7e36410d2a seamonkey-dom-inspector-1.0.7-0.1.el2.ia64.rpm b2aa56d47bda3dfab278212f440d16f7 seamonkey-js-debugger-1.0.7-0.1.el2.ia64.rpm 48fbe7b233068b5e72370376b4f76765 seamonkey-mail-1.0.7-0.1.el2.ia64.rpm 51d67764e3c39f641724048528d76401 seamonkey-nspr-1.0.7-0.1.el2.ia64.rpm b7dbf61f701581324fe5530cab657c09 seamonkey-nspr-devel-1.0.7-0.1.el2.ia64.rpm 217dcc2e4bb67693151a71857b1e2b97 seamonkey-nss-1.0.7-0.1.el2.ia64.rpm cac606cf928a4a474965bc4519c4d4d3 seamonkey-nss-devel-1.0.7-0.1.el2.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/seamonkey-1.0.7-0.1.el2.src.rpm 1afcb729a71f9bcab212b85bc7db8305 seamonkey-1.0.7-0.1.el2.src.rpm i386: b502c5cd15536cde00659ea15a40d3eb seamonkey-1.0.7-0.1.el2.i386.rpm 0c9953f5d87e3a9d58a494955dbf7567 seamonkey-chat-1.0.7-0.1.el2.i386.rpm c437d56c0106767288b8054ae15a1680 seamonkey-devel-1.0.7-0.1.el2.i386.rpm 9a8ea0dad224df602bca010831a4a54f seamonkey-dom-inspector-1.0.7-0.1.el2.i386.rpm 9ea244e3b5eb5f924d0e08cfc12dffa5 seamonkey-js-debugger-1.0.7-0.1.el2.i386.rpm 145b44f6df28ccdd14c35eb89bba4bc7 seamonkey-mail-1.0.7-0.1.el2.i386.rpm 8713013d56133b5bdb245e4fc352f489 seamonkey-nspr-1.0.7-0.1.el2.i386.rpm d93c6511905d05f40b77be1fa025257e seamonkey-nspr-devel-1.0.7-0.1.el2.i386.rpm da6a7ca38ade9ae5b39d3d1c9446a265 seamonkey-nss-1.0.7-0.1.el2.i386.rpm 2cba5ca2321393a1e9e67d8c76bdfa9b seamonkey-nss-devel-1.0.7-0.1.el2.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/seamonkey-1.0.7-0.1.el2.src.rpm 1afcb729a71f9bcab212b85bc7db8305 seamonkey-1.0.7-0.1.el2.src.rpm i386: b502c5cd15536cde00659ea15a40d3eb seamonkey-1.0.7-0.1.el2.i386.rpm 0c9953f5d87e3a9d58a494955dbf7567 seamonkey-chat-1.0.7-0.1.el2.i386.rpm c437d56c0106767288b8054ae15a1680 seamonkey-devel-1.0.7-0.1.el2.i386.rpm 9a8ea0dad224df602bca010831a4a54f seamonkey-dom-inspector-1.0.7-0.1.el2.i386.rpm 9ea244e3b5eb5f924d0e08cfc12dffa5 seamonkey-js-debugger-1.0.7-0.1.el2.i386.rpm 145b44f6df28ccdd14c35eb89bba4bc7 seamonkey-mail-1.0.7-0.1.el2.i386.rpm 8713013d56133b5bdb245e4fc352f489 seamonkey-nspr-1.0.7-0.1.el2.i386.rpm d93c6511905d05f40b77be1fa025257e seamonkey-nspr-devel-1.0.7-0.1.el2.i386.rpm da6a7ca38ade9ae5b39d3d1c9446a265 seamonkey-nss-1.0.7-0.1.el2.i386.rpm 2cba5ca2321393a1e9e67d8c76bdfa9b seamonkey-nss-devel-1.0.7-0.1.el2.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/seamonkey-1.0.7-0.1.el3.src.rpm 5101b20c77aa9774d850853389ee9b56 seamonkey-1.0.7-0.1.el3.src.rpm i386: 977f5ef20f2481c7a1fc49725f5a3e8b seamonkey-1.0.7-0.1.el3.i386.rpm afb386abbfee2ba8fca58ffc8b8af2a2 seamonkey-chat-1.0.7-0.1.el3.i386.rpm 7f504ed55deae8c34a4dd171495cf059 seamonkey-debuginfo-1.0.7-0.1.el3.i386.rpm 3bfbf6bd57f0211ffc7a0b647fad143a seamonkey-devel-1.0.7-0.1.el3.i386.rpm 9a41fb0bcc2c4df262c719cc6f91a5cf seamonkey-dom-inspector-1.0.7-0.1.el3.i386.rpm 94a5f0d40b63d69708866881a2325771 seamonkey-js-debugger-1.0.7-0.1.el3.i386.rpm 9f5f0cb401854e700064d534217d9ee4 seamonkey-mail-1.0.7-0.1.el3.i386.rpm 9a8cfcae93fde08e83824e2d994243c2 seamonkey-nspr-1.0.7-0.1.el3.i386.rpm 8d9a2bc64e55135d7609feec7555f735 seamonkey-nspr-devel-1.0.7-0.1.el3.i386.rpm 38dc93217aefcbda8411aa7ef2bd023d seamonkey-nss-1.0.7-0.1.el3.i386.rpm 22c8036c9e14867dc81f9ebe954b7be9 seamonkey-nss-devel-1.0.7-0.1.el3.i386.rpm ia64: 5659052bc8965673a706f177b6ef9f59 seamonkey-1.0.7-0.1.el3.ia64.rpm fb702b235269d965d61866da77b43f68 seamonkey-chat-1.0.7-0.1.el3.ia64.rpm 7f504ed55deae8c34a4dd171495cf059 seamonkey-debuginfo-1.0.7-0.1.el3.i386.rpm c9548c13b7b538b493eabe67940b3e16 seamonkey-debuginfo-1.0.7-0.1.el3.ia64.rpm 478293127dfec2468b6328399e1dd374 seamonkey-devel-1.0.7-0.1.el3.ia64.rpm fd0b114d8ef554d77e54e600ccf6caa8 seamonkey-dom-inspector-1.0.7-0.1.el3.ia64.rpm 867dd4e92cbc4f343449eb0d98ba6a44 seamonkey-js-debugger-1.0.7-0.1.el3.ia64.rpm ff1b0439ce1865462f8e858c8451990a seamonkey-mail-1.0.7-0.1.el3.ia64.rpm 9a8cfcae93fde08e83824e2d994243c2 seamonkey-nspr-1.0.7-0.1.el3.i386.rpm a3bc038fbef3b584fa730b47288e1da6 seamonkey-nspr-1.0.7-0.1.el3.ia64.rpm 5c82d0083578b3c2a534c0c7acde1ea3 seamonkey-nspr-devel-1.0.7-0.1.el3.ia64.rpm 38dc93217aefcbda8411aa7ef2bd023d seamonkey-nss-1.0.7-0.1.el3.i386.rpm dad841bcb0a76bcbb87317872b269c13 seamonkey-nss-1.0.7-0.1.el3.ia64.rpm cc8103019a3f47fab626df49ccabca80 seamonkey-nss-devel-1.0.7-0.1.el3.ia64.rpm ppc: 1bee986bf568b04cdbb4e1a68c756acc seamonkey-1.0.7-0.1.el3.ppc.rpm 604e9cdcc44384ea95266c4b1a5a467a seamonkey-chat-1.0.7-0.1.el3.ppc.rpm ff1f2c7d6f7be30537aae4746ae96f4c seamonkey-debuginfo-1.0.7-0.1.el3.ppc.rpm 81d34a8a555e976ead7512b31747a632 seamonkey-devel-1.0.7-0.1.el3.ppc.rpm d1e8dbf486730049c68e0088dfa59bf0 seamonkey-dom-inspector-1.0.7-0.1.el3.ppc.rpm 42c76ae34f16c70484ea15029d25341a seamonkey-js-debugger-1.0.7-0.1.el3.ppc.rpm 3c5cae844ce2753a33b1a57704779feb seamonkey-mail-1.0.7-0.1.el3.ppc.rpm 5ac5d21d049d1ea40d0e0e5d74461f22 seamonkey-nspr-1.0.7-0.1.el3.ppc.rpm a7dff99ac3f0f583f4fce967d1c10fb6 seamonkey-nspr-devel-1.0.7-0.1.el3.ppc.rpm 19e6fe8e201c63940df8336a9caa2108 seamonkey-nss-1.0.7-0.1.el3.ppc.rpm 32a055c7cc850a1798b574f5494b0fa0 seamonkey-nss-devel-1.0.7-0.1.el3.ppc.rpm s390: 823d3fb161b591e41e4073820c0d836e seamonkey-1.0.7-0.1.el3.s390.rpm ac42d6cf7938ece0d587c3ee803f9bb5 seamonkey-chat-1.0.7-0.1.el3.s390.rpm 92f9540b972c0c0ff0e2ef0278b21dcd seamonkey-debuginfo-1.0.7-0.1.el3.s390.rpm 081d8cb9145d5aad191f9a053ec83ebd seamonkey-devel-1.0.7-0.1.el3.s390.rpm 22ff35582cef5d9c8a2f50e3c6c0cf21 seamonkey-dom-inspector-1.0.7-0.1.el3.s390.rpm 4b7c26ee8b61e6b94ce0c97c08608a33 seamonkey-js-debugger-1.0.7-0.1.el3.s390.rpm f5273d44c263cfedc1505d83aaecae6d seamonkey-mail-1.0.7-0.1.el3.s390.rpm b7892e38a156e45ff46604937707fdea seamonkey-nspr-1.0.7-0.1.el3.s390.rpm 149d33dd36ce54930d2ce50e116806af seamonkey-nspr-devel-1.0.7-0.1.el3.s390.rpm c9dc3d621be26873b925edb0aa544197 seamonkey-nss-1.0.7-0.1.el3.s390.rpm d3108767bd7583a1c1c44e3afc768aa2 seamonkey-nss-devel-1.0.7-0.1.el3.s390.rpm s390x: f41c07719064cb16215b506975e5647e seamonkey-1.0.7-0.1.el3.s390x.rpm 93a006489250d3c3e2db7c6fc991bd60 seamonkey-chat-1.0.7-0.1.el3.s390x.rpm d4a6e3e1e3bd116778e6f53b9e55a74a seamonkey-debuginfo-1.0.7-0.1.el3.s390x.rpm 0fcab8878eea6b04a9cb52dfa14bcb4b seamonkey-devel-1.0.7-0.1.el3.s390x.rpm b88399eab8c5346f0d6687db60e100dd seamonkey-dom-inspector-1.0.7-0.1.el3.s390x.rpm 756672abdfc9cfacfe21a4a8b096dc34 seamonkey-js-debugger-1.0.7-0.1.el3.s390x.rpm d6c0c30b20e7587534b68a5b53cc1ff3 seamonkey-mail-1.0.7-0.1.el3.s390x.rpm b7892e38a156e45ff46604937707fdea seamonkey-nspr-1.0.7-0.1.el3.s390.rpm 2f5b4ebad6cac27a902d193b33e1a9dc seamonkey-nspr-1.0.7-0.1.el3.s390x.rpm c6192bd49f275f965e2a1146fd49fd61 seamonkey-nspr-devel-1.0.7-0.1.el3.s390x.rpm c9dc3d621be26873b925edb0aa544197 seamonkey-nss-1.0.7-0.1.el3.s390.rpm 0f58009a1abccdb2de1dd3197c33ce0d seamonkey-nss-1.0.7-0.1.el3.s390x.rpm 7acb6fae5af2ff6e1ee2da30d42b2f74 seamonkey-nss-devel-1.0.7-0.1.el3.s390x.rpm x86_64: 977f5ef20f2481c7a1fc49725f5a3e8b seamonkey-1.0.7-0.1.el3.i386.rpm 20ff33f8df4312c39c0a53b8864306c3 seamonkey-1.0.7-0.1.el3.x86_64.rpm bb7113349dfbec0bc8497b9b211e8337 seamonkey-chat-1.0.7-0.1.el3.x86_64.rpm 7f504ed55deae8c34a4dd171495cf059 seamonkey-debuginfo-1.0.7-0.1.el3.i386.rpm 12ba868fee6c93069140952bd21ad3b9 seamonkey-debuginfo-1.0.7-0.1.el3.x86_64.rpm 4dd5df63af7ab832a28292501f8520eb seamonkey-devel-1.0.7-0.1.el3.x86_64.rpm 37e1f9eacc9036ffe047df53ada0fafc seamonkey-dom-inspector-1.0.7-0.1.el3.x86_64.rpm a5adff165d2bb6bbf5a71c370253dcdb seamonkey-js-debugger-1.0.7-0.1.el3.x86_64.rpm 6501c16965dc4fa894796e778b0e589f seamonkey-mail-1.0.7-0.1.el3.x86_64.rpm 9a8cfcae93fde08e83824e2d994243c2 seamonkey-nspr-1.0.7-0.1.el3.i386.rpm b231810078983164debf3726fa5b150f seamonkey-nspr-1.0.7-0.1.el3.x86_64.rpm fd43c17874010b2b8c3d00ddee595679 seamonkey-nspr-devel-1.0.7-0.1.el3.x86_64.rpm 38dc93217aefcbda8411aa7ef2bd023d seamonkey-nss-1.0.7-0.1.el3.i386.rpm b9c632cddeb7600bc1cfe1bf19b29772 seamonkey-nss-1.0.7-0.1.el3.x86_64.rpm bb86dcedf11b4cd10897e2169cbabd71 seamonkey-nss-devel-1.0.7-0.1.el3.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/seamonkey-1.0.7-0.1.el3.src.rpm 5101b20c77aa9774d850853389ee9b56 seamonkey-1.0.7-0.1.el3.src.rpm i386: 977f5ef20f2481c7a1fc49725f5a3e8b seamonkey-1.0.7-0.1.el3.i386.rpm afb386abbfee2ba8fca58ffc8b8af2a2 seamonkey-chat-1.0.7-0.1.el3.i386.rpm 7f504ed55deae8c34a4dd171495cf059 seamonkey-debuginfo-1.0.7-0.1.el3.i386.rpm 3bfbf6bd57f0211ffc7a0b647fad143a seamonkey-devel-1.0.7-0.1.el3.i386.rpm 9a41fb0bcc2c4df262c719cc6f91a5cf seamonkey-dom-inspector-1.0.7-0.1.el3.i386.rpm 94a5f0d40b63d69708866881a2325771 seamonkey-js-debugger-1.0.7-0.1.el3.i386.rpm 9f5f0cb401854e700064d534217d9ee4 seamonkey-mail-1.0.7-0.1.el3.i386.rpm 9a8cfcae93fde08e83824e2d994243c2 seamonkey-nspr-1.0.7-0.1.el3.i386.rpm 8d9a2bc64e55135d7609feec7555f735 seamonkey-nspr-devel-1.0.7-0.1.el3.i386.rpm 38dc93217aefcbda8411aa7ef2bd023d seamonkey-nss-1.0.7-0.1.el3.i386.rpm 22c8036c9e14867dc81f9ebe954b7be9 seamonkey-nss-devel-1.0.7-0.1.el3.i386.rpm x86_64: 977f5ef20f2481c7a1fc49725f5a3e8b seamonkey-1.0.7-0.1.el3.i386.rpm 20ff33f8df4312c39c0a53b8864306c3 seamonkey-1.0.7-0.1.el3.x86_64.rpm bb7113349dfbec0bc8497b9b211e8337 seamonkey-chat-1.0.7-0.1.el3.x86_64.rpm 7f504ed55deae8c34a4dd171495cf059 seamonkey-debuginfo-1.0.7-0.1.el3.i386.rpm 12ba868fee6c93069140952bd21ad3b9 seamonkey-debuginfo-1.0.7-0.1.el3.x86_64.rpm 4dd5df63af7ab832a28292501f8520eb seamonkey-devel-1.0.7-0.1.el3.x86_64.rpm 37e1f9eacc9036ffe047df53ada0fafc seamonkey-dom-inspector-1.0.7-0.1.el3.x86_64.rpm a5adff165d2bb6bbf5a71c370253dcdb seamonkey-js-debugger-1.0.7-0.1.el3.x86_64.rpm 6501c16965dc4fa894796e778b0e589f seamonkey-mail-1.0.7-0.1.el3.x86_64.rpm 9a8cfcae93fde08e83824e2d994243c2 seamonkey-nspr-1.0.7-0.1.el3.i386.rpm b231810078983164debf3726fa5b150f seamonkey-nspr-1.0.7-0.1.el3.x86_64.rpm fd43c17874010b2b8c3d00ddee595679 seamonkey-nspr-devel-1.0.7-0.1.el3.x86_64.rpm 38dc93217aefcbda8411aa7ef2bd023d seamonkey-nss-1.0.7-0.1.el3.i386.rpm b9c632cddeb7600bc1cfe1bf19b29772 seamonkey-nss-1.0.7-0.1.el3.x86_64.rpm bb86dcedf11b4cd10897e2169cbabd71 seamonkey-nss-devel-1.0.7-0.1.el3.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/seamonkey-1.0.7-0.1.el3.src.rpm 5101b20c77aa9774d850853389ee9b56 seamonkey-1.0.7-0.1.el3.src.rpm i386: 977f5ef20f2481c7a1fc49725f5a3e8b seamonkey-1.0.7-0.1.el3.i386.rpm afb386abbfee2ba8fca58ffc8b8af2a2 seamonkey-chat-1.0.7-0.1.el3.i386.rpm 7f504ed55deae8c34a4dd171495cf059 seamonkey-debuginfo-1.0.7-0.1.el3.i386.rpm 3bfbf6bd57f0211ffc7a0b647fad143a seamonkey-devel-1.0.7-0.1.el3.i386.rpm 9a41fb0bcc2c4df262c719cc6f91a5cf seamonkey-dom-inspector-1.0.7-0.1.el3.i386.rpm 94a5f0d40b63d69708866881a2325771 seamonkey-js-debugger-1.0.7-0.1.el3.i386.rpm 9f5f0cb401854e700064d534217d9ee4 seamonkey-mail-1.0.7-0.1.el3.i386.rpm 9a8cfcae93fde08e83824e2d994243c2 seamonkey-nspr-1.0.7-0.1.el3.i386.rpm 8d9a2bc64e55135d7609feec7555f735 seamonkey-nspr-devel-1.0.7-0.1.el3.i386.rpm 38dc93217aefcbda8411aa7ef2bd023d seamonkey-nss-1.0.7-0.1.el3.i386.rpm 22c8036c9e14867dc81f9ebe954b7be9 seamonkey-nss-devel-1.0.7-0.1.el3.i386.rpm ia64: 5659052bc8965673a706f177b6ef9f59 seamonkey-1.0.7-0.1.el3.ia64.rpm fb702b235269d965d61866da77b43f68 seamonkey-chat-1.0.7-0.1.el3.ia64.rpm 7f504ed55deae8c34a4dd171495cf059 seamonkey-debuginfo-1.0.7-0.1.el3.i386.rpm c9548c13b7b538b493eabe67940b3e16 seamonkey-debuginfo-1.0.7-0.1.el3.ia64.rpm 478293127dfec2468b6328399e1dd374 seamonkey-devel-1.0.7-0.1.el3.ia64.rpm fd0b114d8ef554d77e54e600ccf6caa8 seamonkey-dom-inspector-1.0.7-0.1.el3.ia64.rpm 867dd4e92cbc4f343449eb0d98ba6a44 seamonkey-js-debugger-1.0.7-0.1.el3.ia64.rpm ff1b0439ce1865462f8e858c8451990a seamonkey-mail-1.0.7-0.1.el3.ia64.rpm 9a8cfcae93fde08e83824e2d994243c2 seamonkey-nspr-1.0.7-0.1.el3.i386.rpm a3bc038fbef3b584fa730b47288e1da6 seamonkey-nspr-1.0.7-0.1.el3.ia64.rpm 5c82d0083578b3c2a534c0c7acde1ea3 seamonkey-nspr-devel-1.0.7-0.1.el3.ia64.rpm 38dc93217aefcbda8411aa7ef2bd023d seamonkey-nss-1.0.7-0.1.el3.i386.rpm dad841bcb0a76bcbb87317872b269c13 seamonkey-nss-1.0.7-0.1.el3.ia64.rpm cc8103019a3f47fab626df49ccabca80 seamonkey-nss-devel-1.0.7-0.1.el3.ia64.rpm x86_64: 977f5ef20f2481c7a1fc49725f5a3e8b seamonkey-1.0.7-0.1.el3.i386.rpm 20ff33f8df4312c39c0a53b8864306c3 seamonkey-1.0.7-0.1.el3.x86_64.rpm bb7113349dfbec0bc8497b9b211e8337 seamonkey-chat-1.0.7-0.1.el3.x86_64.rpm 7f504ed55deae8c34a4dd171495cf059 seamonkey-debuginfo-1.0.7-0.1.el3.i386.rpm 12ba868fee6c93069140952bd21ad3b9 seamonkey-debuginfo-1.0.7-0.1.el3.x86_64.rpm 4dd5df63af7ab832a28292501f8520eb seamonkey-devel-1.0.7-0.1.el3.x86_64.rpm 37e1f9eacc9036ffe047df53ada0fafc seamonkey-dom-inspector-1.0.7-0.1.el3.x86_64.rpm a5adff165d2bb6bbf5a71c370253dcdb seamonkey-js-debugger-1.0.7-0.1.el3.x86_64.rpm 6501c16965dc4fa894796e778b0e589f seamonkey-mail-1.0.7-0.1.el3.x86_64.rpm 9a8cfcae93fde08e83824e2d994243c2 seamonkey-nspr-1.0.7-0.1.el3.i386.rpm b231810078983164debf3726fa5b150f seamonkey-nspr-1.0.7-0.1.el3.x86_64.rpm fd43c17874010b2b8c3d00ddee595679 seamonkey-nspr-devel-1.0.7-0.1.el3.x86_64.rpm 38dc93217aefcbda8411aa7ef2bd023d seamonkey-nss-1.0.7-0.1.el3.i386.rpm b9c632cddeb7600bc1cfe1bf19b29772 seamonkey-nss-1.0.7-0.1.el3.x86_64.rpm bb86dcedf11b4cd10897e2169cbabd71 seamonkey-nss-devel-1.0.7-0.1.el3.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/seamonkey-1.0.7-0.1.el3.src.rpm 5101b20c77aa9774d850853389ee9b56 seamonkey-1.0.7-0.1.el3.src.rpm i386: 977f5ef20f2481c7a1fc49725f5a3e8b seamonkey-1.0.7-0.1.el3.i386.rpm afb386abbfee2ba8fca58ffc8b8af2a2 seamonkey-chat-1.0.7-0.1.el3.i386.rpm 7f504ed55deae8c34a4dd171495cf059 seamonkey-debuginfo-1.0.7-0.1.el3.i386.rpm 3bfbf6bd57f0211ffc7a0b647fad143a seamonkey-devel-1.0.7-0.1.el3.i386.rpm 9a41fb0bcc2c4df262c719cc6f91a5cf seamonkey-dom-inspector-1.0.7-0.1.el3.i386.rpm 94a5f0d40b63d69708866881a2325771 seamonkey-js-debugger-1.0.7-0.1.el3.i386.rpm 9f5f0cb401854e700064d534217d9ee4 seamonkey-mail-1.0.7-0.1.el3.i386.rpm 9a8cfcae93fde08e83824e2d994243c2 seamonkey-nspr-1.0.7-0.1.el3.i386.rpm 8d9a2bc64e55135d7609feec7555f735 seamonkey-nspr-devel-1.0.7-0.1.el3.i386.rpm 38dc93217aefcbda8411aa7ef2bd023d seamonkey-nss-1.0.7-0.1.el3.i386.rpm 22c8036c9e14867dc81f9ebe954b7be9 seamonkey-nss-devel-1.0.7-0.1.el3.i386.rpm ia64: 5659052bc8965673a706f177b6ef9f59 seamonkey-1.0.7-0.1.el3.ia64.rpm fb702b235269d965d61866da77b43f68 seamonkey-chat-1.0.7-0.1.el3.ia64.rpm 7f504ed55deae8c34a4dd171495cf059 seamonkey-debuginfo-1.0.7-0.1.el3.i386.rpm c9548c13b7b538b493eabe67940b3e16 seamonkey-debuginfo-1.0.7-0.1.el3.ia64.rpm 478293127dfec2468b6328399e1dd374 seamonkey-devel-1.0.7-0.1.el3.ia64.rpm fd0b114d8ef554d77e54e600ccf6caa8 seamonkey-dom-inspector-1.0.7-0.1.el3.ia64.rpm 867dd4e92cbc4f343449eb0d98ba6a44 seamonkey-js-debugger-1.0.7-0.1.el3.ia64.rpm ff1b0439ce1865462f8e858c8451990a seamonkey-mail-1.0.7-0.1.el3.ia64.rpm 9a8cfcae93fde08e83824e2d994243c2 seamonkey-nspr-1.0.7-0.1.el3.i386.rpm a3bc038fbef3b584fa730b47288e1da6 seamonkey-nspr-1.0.7-0.1.el3.ia64.rpm 5c82d0083578b3c2a534c0c7acde1ea3 seamonkey-nspr-devel-1.0.7-0.1.el3.ia64.rpm 38dc93217aefcbda8411aa7ef2bd023d seamonkey-nss-1.0.7-0.1.el3.i386.rpm dad841bcb0a76bcbb87317872b269c13 seamonkey-nss-1.0.7-0.1.el3.ia64.rpm cc8103019a3f47fab626df49ccabca80 seamonkey-nss-devel-1.0.7-0.1.el3.ia64.rpm x86_64: 977f5ef20f2481c7a1fc49725f5a3e8b seamonkey-1.0.7-0.1.el3.i386.rpm 20ff33f8df4312c39c0a53b8864306c3 seamonkey-1.0.7-0.1.el3.x86_64.rpm bb7113349dfbec0bc8497b9b211e8337 seamonkey-chat-1.0.7-0.1.el3.x86_64.rpm 7f504ed55deae8c34a4dd171495cf059 seamonkey-debuginfo-1.0.7-0.1.el3.i386.rpm 12ba868fee6c93069140952bd21ad3b9 seamonkey-debuginfo-1.0.7-0.1.el3.x86_64.rpm 4dd5df63af7ab832a28292501f8520eb seamonkey-devel-1.0.7-0.1.el3.x86_64.rpm 37e1f9eacc9036ffe047df53ada0fafc seamonkey-dom-inspector-1.0.7-0.1.el3.x86_64.rpm a5adff165d2bb6bbf5a71c370253dcdb seamonkey-js-debugger-1.0.7-0.1.el3.x86_64.rpm 6501c16965dc4fa894796e778b0e589f seamonkey-mail-1.0.7-0.1.el3.x86_64.rpm 9a8cfcae93fde08e83824e2d994243c2 seamonkey-nspr-1.0.7-0.1.el3.i386.rpm b231810078983164debf3726fa5b150f seamonkey-nspr-1.0.7-0.1.el3.x86_64.rpm fd43c17874010b2b8c3d00ddee595679 seamonkey-nspr-devel-1.0.7-0.1.el3.x86_64.rpm 38dc93217aefcbda8411aa7ef2bd023d seamonkey-nss-1.0.7-0.1.el3.i386.rpm b9c632cddeb7600bc1cfe1bf19b29772 seamonkey-nss-1.0.7-0.1.el3.x86_64.rpm bb86dcedf11b4cd10897e2169cbabd71 seamonkey-nss-devel-1.0.7-0.1.el3.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/devhelp-0.10-0.6.el4.src.rpm bde1265e30866f95bc2de5cbf6ef1e87 devhelp-0.10-0.6.el4.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/seamonkey-1.0.7-0.1.el4.src.rpm 2551b581115c543be0a2f0b79c064551 seamonkey-1.0.7-0.1.el4.src.rpm i386: c05b34ddd7d800ace39d4919bc591c71 devhelp-0.10-0.6.el4.i386.rpm a2a305afe867ffc1c8333298952d6c3f devhelp-debuginfo-0.10-0.6.el4.i386.rpm bffa4b678eddef42b48493c98b405a09 devhelp-devel-0.10-0.6.el4.i386.rpm 530e493c1c4be29c4b7b18d115da6c4c seamonkey-1.0.7-0.1.el4.i386.rpm 8b84bae592da492e594d51f71b01f98e seamonkey-chat-1.0.7-0.1.el4.i386.rpm 476a6de83d5659c893e6706494a49a22 seamonkey-debuginfo-1.0.7-0.1.el4.i386.rpm c94a5894c8a1f779e934cfc2c7fde796 seamonkey-devel-1.0.7-0.1.el4.i386.rpm 3e76fe18a7e47eb9c1c93460b6e253bb seamonkey-dom-inspector-1.0.7-0.1.el4.i386.rpm eda5f8b2b33ff4cf9d1becaf99f541fe seamonkey-js-debugger-1.0.7-0.1.el4.i386.rpm 248b46eba2ef23f25ad8d15cc9588bce seamonkey-mail-1.0.7-0.1.el4.i386.rpm b88eb04b490897f43c9ff4fecde656f4 seamonkey-nspr-1.0.7-0.1.el4.i386.rpm 9431a330318dc9f8dd0becc2d489b270 seamonkey-nspr-devel-1.0.7-0.1.el4.i386.rpm e620792a3b45abd8d34be41f9ce50e3a seamonkey-nss-1.0.7-0.1.el4.i386.rpm 5736600d0aabfadb0e3a2c8d92f257c2 seamonkey-nss-devel-1.0.7-0.1.el4.i386.rpm ia64: d636cf677730ee853a1a7a2486099bc5 seamonkey-1.0.7-0.1.el4.ia64.rpm a88ec27d574f980ff0bef6f0ccef7e17 seamonkey-chat-1.0.7-0.1.el4.ia64.rpm 476a6de83d5659c893e6706494a49a22 seamonkey-debuginfo-1.0.7-0.1.el4.i386.rpm 814cf4b4d3fbbec08d88ab5ce1d39e44 seamonkey-debuginfo-1.0.7-0.1.el4.ia64.rpm d332e4b966bf0463da6f5c66a2986103 seamonkey-devel-1.0.7-0.1.el4.ia64.rpm ece28237c8c16c2880719028b493ee6a seamonkey-dom-inspector-1.0.7-0.1.el4.ia64.rpm ab58b242400f6089dc1fc5a5e04c4442 seamonkey-js-debugger-1.0.7-0.1.el4.ia64.rpm f817108dd290803451b9aa562e3ccfb9 seamonkey-mail-1.0.7-0.1.el4.ia64.rpm b88eb04b490897f43c9ff4fecde656f4 seamonkey-nspr-1.0.7-0.1.el4.i386.rpm ef310b7335777607ca99924163ccf502 seamonkey-nspr-1.0.7-0.1.el4.ia64.rpm 4b2babb3f6177f0685f12dec8fe85b6f seamonkey-nspr-devel-1.0.7-0.1.el4.ia64.rpm e620792a3b45abd8d34be41f9ce50e3a seamonkey-nss-1.0.7-0.1.el4.i386.rpm 6b0c4aeb3e1d7b2b9f60be1153ee252e seamonkey-nss-1.0.7-0.1.el4.ia64.rpm 807e70b32828dda46fe5b06af8e6816c seamonkey-nss-devel-1.0.7-0.1.el4.ia64.rpm ppc: a60f30b0b3a2be6c941376dc1a543b1c devhelp-0.10-0.6.el4.ppc.rpm 6e5fea77640b75d9e882b8a4cab72457 devhelp-debuginfo-0.10-0.6.el4.ppc.rpm f7cc16ab800102c2171885a6bfaba25f devhelp-devel-0.10-0.6.el4.ppc.rpm 2a6d91311cb943819c3ae2332fde325c seamonkey-1.0.7-0.1.el4.ppc.rpm 95b179693d4939e448608cd2614720eb seamonkey-chat-1.0.7-0.1.el4.ppc.rpm 3617f8509c22948a4998b2090484295e seamonkey-debuginfo-1.0.7-0.1.el4.ppc.rpm b3c2eae9d6e51ccfd08c91018fb05e99 seamonkey-devel-1.0.7-0.1.el4.ppc.rpm 788b33c9fca77f4386440ea779839223 seamonkey-dom-inspector-1.0.7-0.1.el4.ppc.rpm 795168748f7a94edfdf6b99fbd956035 seamonkey-js-debugger-1.0.7-0.1.el4.ppc.rpm d56da0729f5eb76c5cd9cd08d7eb75ed seamonkey-mail-1.0.7-0.1.el4.ppc.rpm dc317e37f7a1224cee9b71a485875e13 seamonkey-nspr-1.0.7-0.1.el4.ppc.rpm 4c83a2ae1f3b64b1892b84bd62d20e6e seamonkey-nspr-devel-1.0.7-0.1.el4.ppc.rpm 6938b105e9fa6565854c947e635c67ed seamonkey-nss-1.0.7-0.1.el4.ppc.rpm e070ec01c5245d19f21b6212a2419ade seamonkey-nss-devel-1.0.7-0.1.el4.ppc.rpm s390: 061a93180019d246c6f821a9337d122a seamonkey-1.0.7-0.1.el4.s390.rpm 2bddecde7beac38c9d7616f36759c172 seamonkey-chat-1.0.7-0.1.el4.s390.rpm 1c21e981d9027c140331cc8a6547cce6 seamonkey-debuginfo-1.0.7-0.1.el4.s390.rpm c04f4deb2a314378aba7de257930fa54 seamonkey-devel-1.0.7-0.1.el4.s390.rpm dc3c9d85dd643a5c6fb5c9c1e63523f2 seamonkey-dom-inspector-1.0.7-0.1.el4.s390.rpm 53633eb3f203f8936837979ecbee7f03 seamonkey-js-debugger-1.0.7-0.1.el4.s390.rpm 11ca70c6b38f6bcc27c2815720ce9878 seamonkey-mail-1.0.7-0.1.el4.s390.rpm a26bc27d2f751ba91553567c0854f035 seamonkey-nspr-1.0.7-0.1.el4.s390.rpm fbe768652922608e8d56fec9da477541 seamonkey-nspr-devel-1.0.7-0.1.el4.s390.rpm f5bf5ea575707de28a702a2e0bc31082 seamonkey-nss-1.0.7-0.1.el4.s390.rpm c9179e93ab4cae7e7f899272a77abffc seamonkey-nss-devel-1.0.7-0.1.el4.s390.rpm s390x: 85224a34e99338f742d918fcb6a0d247 seamonkey-1.0.7-0.1.el4.s390x.rpm 6ff620b7896cb211878be8315b7d8d29 seamonkey-chat-1.0.7-0.1.el4.s390x.rpm 1c21e981d9027c140331cc8a6547cce6 seamonkey-debuginfo-1.0.7-0.1.el4.s390.rpm 92fe44b49cc916da8d3794f267d97c49 seamonkey-debuginfo-1.0.7-0.1.el4.s390x.rpm 0fa166e9a4ec40ebf4627d785892be20 seamonkey-devel-1.0.7-0.1.el4.s390x.rpm 7155a0691ee591d3c9471900396bb55d seamonkey-dom-inspector-1.0.7-0.1.el4.s390x.rpm 4f4d2ccab9f215aa84b461192ea6480f seamonkey-js-debugger-1.0.7-0.1.el4.s390x.rpm 07064b7a48be8d546926829eae3e8853 seamonkey-mail-1.0.7-0.1.el4.s390x.rpm a26bc27d2f751ba91553567c0854f035 seamonkey-nspr-1.0.7-0.1.el4.s390.rpm d29db3eac041200a3eec510308f32f12 seamonkey-nspr-1.0.7-0.1.el4.s390x.rpm b7a5ef88fdfd052eefc9b41011aa67c1 seamonkey-nspr-devel-1.0.7-0.1.el4.s390x.rpm f5bf5ea575707de28a702a2e0bc31082 seamonkey-nss-1.0.7-0.1.el4.s390.rpm 3fa280d4dca1c72bf34a27ead4207ae2 seamonkey-nss-1.0.7-0.1.el4.s390x.rpm 05f09a5aa89b95f7627979b5e5a0d52d seamonkey-nss-devel-1.0.7-0.1.el4.s390x.rpm x86_64: b063e889c4580e12fab97dd2e8b5b462 devhelp-0.10-0.6.el4.x86_64.rpm f48451aaf24dc19831d87c8829bd057a devhelp-debuginfo-0.10-0.6.el4.x86_64.rpm 055da73b5a06e81990b835c215950fa9 devhelp-devel-0.10-0.6.el4.x86_64.rpm 27ddbc888ad0e8fe980e64db30cef928 seamonkey-1.0.7-0.1.el4.x86_64.rpm b1bfa3c4af930313998ec54d0b32ee09 seamonkey-chat-1.0.7-0.1.el4.x86_64.rpm 476a6de83d5659c893e6706494a49a22 seamonkey-debuginfo-1.0.7-0.1.el4.i386.rpm 1fe7a4c9823afdab5d4c4970757385df seamonkey-debuginfo-1.0.7-0.1.el4.x86_64.rpm 56c79b35226ca42b9953e691f688a187 seamonkey-devel-1.0.7-0.1.el4.x86_64.rpm 9e433dd976a6c74e32157222230f6247 seamonkey-dom-inspector-1.0.7-0.1.el4.x86_64.rpm 1e37dcbff2b6463ff91ebac560808b1c seamonkey-js-debugger-1.0.7-0.1.el4.x86_64.rpm 7d777bdd4e9243e63a7dd4400e59bbca seamonkey-mail-1.0.7-0.1.el4.x86_64.rpm b88eb04b490897f43c9ff4fecde656f4 seamonkey-nspr-1.0.7-0.1.el4.i386.rpm 7dd2a909848d52112064852e9cbedb55 seamonkey-nspr-1.0.7-0.1.el4.x86_64.rpm bdf81a61daa3774fae560ee8e5dad1b5 seamonkey-nspr-devel-1.0.7-0.1.el4.x86_64.rpm e620792a3b45abd8d34be41f9ce50e3a seamonkey-nss-1.0.7-0.1.el4.i386.rpm cf69951f73b197e4e8bee04450bb1a0a seamonkey-nss-1.0.7-0.1.el4.x86_64.rpm 311976a4579e4544d5b8a6c0614a0323 seamonkey-nss-devel-1.0.7-0.1.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/devhelp-0.10-0.6.el4.src.rpm bde1265e30866f95bc2de5cbf6ef1e87 devhelp-0.10-0.6.el4.src.rpm ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/seamonkey-1.0.7-0.1.el4.src.rpm 2551b581115c543be0a2f0b79c064551 seamonkey-1.0.7-0.1.el4.src.rpm i386: c05b34ddd7d800ace39d4919bc591c71 devhelp-0.10-0.6.el4.i386.rpm a2a305afe867ffc1c8333298952d6c3f devhelp-debuginfo-0.10-0.6.el4.i386.rpm bffa4b678eddef42b48493c98b405a09 devhelp-devel-0.10-0.6.el4.i386.rpm 530e493c1c4be29c4b7b18d115da6c4c seamonkey-1.0.7-0.1.el4.i386.rpm 8b84bae592da492e594d51f71b01f98e seamonkey-chat-1.0.7-0.1.el4.i386.rpm 476a6de83d5659c893e6706494a49a22 seamonkey-debuginfo-1.0.7-0.1.el4.i386.rpm c94a5894c8a1f779e934cfc2c7fde796 seamonkey-devel-1.0.7-0.1.el4.i386.rpm 3e76fe18a7e47eb9c1c93460b6e253bb seamonkey-dom-inspector-1.0.7-0.1.el4.i386.rpm eda5f8b2b33ff4cf9d1becaf99f541fe seamonkey-js-debugger-1.0.7-0.1.el4.i386.rpm 248b46eba2ef23f25ad8d15cc9588bce seamonkey-mail-1.0.7-0.1.el4.i386.rpm b88eb04b490897f43c9ff4fecde656f4 seamonkey-nspr-1.0.7-0.1.el4.i386.rpm 9431a330318dc9f8dd0becc2d489b270 seamonkey-nspr-devel-1.0.7-0.1.el4.i386.rpm e620792a3b45abd8d34be41f9ce50e3a seamonkey-nss-1.0.7-0.1.el4.i386.rpm 5736600d0aabfadb0e3a2c8d92f257c2 seamonkey-nss-devel-1.0.7-0.1.el4.i386.rpm x86_64: b063e889c4580e12fab97dd2e8b5b462 devhelp-0.10-0.6.el4.x86_64.rpm f48451aaf24dc19831d87c8829bd057a devhelp-debuginfo-0.10-0.6.el4.x86_64.rpm 055da73b5a06e81990b835c215950fa9 devhelp-devel-0.10-0.6.el4.x86_64.rpm 27ddbc888ad0e8fe980e64db30cef928 seamonkey-1.0.7-0.1.el4.x86_64.rpm b1bfa3c4af930313998ec54d0b32ee09 seamonkey-chat-1.0.7-0.1.el4.x86_64.rpm 476a6de83d5659c893e6706494a49a22 seamonkey-debuginfo-1.0.7-0.1.el4.i386.rpm 1fe7a4c9823afdab5d4c4970757385df seamonkey-debuginfo-1.0.7-0.1.el4.x86_64.rpm 56c79b35226ca42b9953e691f688a187 seamonkey-devel-1.0.7-0.1.el4.x86_64.rpm 9e433dd976a6c74e32157222230f6247 seamonkey-dom-inspector-1.0.7-0.1.el4.x86_64.rpm 1e37dcbff2b6463ff91ebac560808b1c seamonkey-js-debugger-1.0.7-0.1.el4.x86_64.rpm 7d777bdd4e9243e63a7dd4400e59bbca seamonkey-mail-1.0.7-0.1.el4.x86_64.rpm b88eb04b490897f43c9ff4fecde656f4 seamonkey-nspr-1.0.7-0.1.el4.i386.rpm 7dd2a909848d52112064852e9cbedb55 seamonkey-nspr-1.0.7-0.1.el4.x86_64.rpm bdf81a61daa3774fae560ee8e5dad1b5 seamonkey-nspr-devel-1.0.7-0.1.el4.x86_64.rpm e620792a3b45abd8d34be41f9ce50e3a seamonkey-nss-1.0.7-0.1.el4.i386.rpm cf69951f73b197e4e8bee04450bb1a0a seamonkey-nss-1.0.7-0.1.el4.x86_64.rpm 311976a4579e4544d5b8a6c0614a0323 seamonkey-nss-devel-1.0.7-0.1.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/devhelp-0.10-0.6.el4.src.rpm bde1265e30866f95bc2de5cbf6ef1e87 devhelp-0.10-0.6.el4.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/seamonkey-1.0.7-0.1.el4.src.rpm 2551b581115c543be0a2f0b79c064551 seamonkey-1.0.7-0.1.el4.src.rpm i386: c05b34ddd7d800ace39d4919bc591c71 devhelp-0.10-0.6.el4.i386.rpm a2a305afe867ffc1c8333298952d6c3f devhelp-debuginfo-0.10-0.6.el4.i386.rpm bffa4b678eddef42b48493c98b405a09 devhelp-devel-0.10-0.6.el4.i386.rpm 530e493c1c4be29c4b7b18d115da6c4c seamonkey-1.0.7-0.1.el4.i386.rpm 8b84bae592da492e594d51f71b01f98e seamonkey-chat-1.0.7-0.1.el4.i386.rpm 476a6de83d5659c893e6706494a49a22 seamonkey-debuginfo-1.0.7-0.1.el4.i386.rpm c94a5894c8a1f779e934cfc2c7fde796 seamonkey-devel-1.0.7-0.1.el4.i386.rpm 3e76fe18a7e47eb9c1c93460b6e253bb seamonkey-dom-inspector-1.0.7-0.1.el4.i386.rpm eda5f8b2b33ff4cf9d1becaf99f541fe seamonkey-js-debugger-1.0.7-0.1.el4.i386.rpm 248b46eba2ef23f25ad8d15cc9588bce seamonkey-mail-1.0.7-0.1.el4.i386.rpm b88eb04b490897f43c9ff4fecde656f4 seamonkey-nspr-1.0.7-0.1.el4.i386.rpm 9431a330318dc9f8dd0becc2d489b270 seamonkey-nspr-devel-1.0.7-0.1.el4.i386.rpm e620792a3b45abd8d34be41f9ce50e3a seamonkey-nss-1.0.7-0.1.el4.i386.rpm 5736600d0aabfadb0e3a2c8d92f257c2 seamonkey-nss-devel-1.0.7-0.1.el4.i386.rpm ia64: d636cf677730ee853a1a7a2486099bc5 seamonkey-1.0.7-0.1.el4.ia64.rpm a88ec27d574f980ff0bef6f0ccef7e17 seamonkey-chat-1.0.7-0.1.el4.ia64.rpm 476a6de83d5659c893e6706494a49a22 seamonkey-debuginfo-1.0.7-0.1.el4.i386.rpm 814cf4b4d3fbbec08d88ab5ce1d39e44 seamonkey-debuginfo-1.0.7-0.1.el4.ia64.rpm d332e4b966bf0463da6f5c66a2986103 seamonkey-devel-1.0.7-0.1.el4.ia64.rpm ece28237c8c16c2880719028b493ee6a seamonkey-dom-inspector-1.0.7-0.1.el4.ia64.rpm ab58b242400f6089dc1fc5a5e04c4442 seamonkey-js-debugger-1.0.7-0.1.el4.ia64.rpm f817108dd290803451b9aa562e3ccfb9 seamonkey-mail-1.0.7-0.1.el4.ia64.rpm b88eb04b490897f43c9ff4fecde656f4 seamonkey-nspr-1.0.7-0.1.el4.i386.rpm ef310b7335777607ca99924163ccf502 seamonkey-nspr-1.0.7-0.1.el4.ia64.rpm 4b2babb3f6177f0685f12dec8fe85b6f seamonkey-nspr-devel-1.0.7-0.1.el4.ia64.rpm e620792a3b45abd8d34be41f9ce50e3a seamonkey-nss-1.0.7-0.1.el4.i386.rpm 6b0c4aeb3e1d7b2b9f60be1153ee252e seamonkey-nss-1.0.7-0.1.el4.ia64.rpm 807e70b32828dda46fe5b06af8e6816c seamonkey-nss-devel-1.0.7-0.1.el4.ia64.rpm x86_64: b063e889c4580e12fab97dd2e8b5b462 devhelp-0.10-0.6.el4.x86_64.rpm f48451aaf24dc19831d87c8829bd057a devhelp-debuginfo-0.10-0.6.el4.x86_64.rpm 055da73b5a06e81990b835c215950fa9 devhelp-devel-0.10-0.6.el4.x86_64.rpm 27ddbc888ad0e8fe980e64db30cef928 seamonkey-1.0.7-0.1.el4.x86_64.rpm b1bfa3c4af930313998ec54d0b32ee09 seamonkey-chat-1.0.7-0.1.el4.x86_64.rpm 476a6de83d5659c893e6706494a49a22 seamonkey-debuginfo-1.0.7-0.1.el4.i386.rpm 1fe7a4c9823afdab5d4c4970757385df seamonkey-debuginfo-1.0.7-0.1.el4.x86_64.rpm 56c79b35226ca42b9953e691f688a187 seamonkey-devel-1.0.7-0.1.el4.x86_64.rpm 9e433dd976a6c74e32157222230f6247 seamonkey-dom-inspector-1.0.7-0.1.el4.x86_64.rpm 1e37dcbff2b6463ff91ebac560808b1c seamonkey-js-debugger-1.0.7-0.1.el4.x86_64.rpm 7d777bdd4e9243e63a7dd4400e59bbca seamonkey-mail-1.0.7-0.1.el4.x86_64.rpm b88eb04b490897f43c9ff4fecde656f4 seamonkey-nspr-1.0.7-0.1.el4.i386.rpm 7dd2a909848d52112064852e9cbedb55 seamonkey-nspr-1.0.7-0.1.el4.x86_64.rpm bdf81a61daa3774fae560ee8e5dad1b5 seamonkey-nspr-devel-1.0.7-0.1.el4.x86_64.rpm e620792a3b45abd8d34be41f9ce50e3a seamonkey-nss-1.0.7-0.1.el4.i386.rpm cf69951f73b197e4e8bee04450bb1a0a seamonkey-nss-1.0.7-0.1.el4.x86_64.rpm 311976a4579e4544d5b8a6c0614a0323 seamonkey-nss-devel-1.0.7-0.1.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/devhelp-0.10-0.6.el4.src.rpm bde1265e30866f95bc2de5cbf6ef1e87 devhelp-0.10-0.6.el4.src.rpm ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/seamonkey-1.0.7-0.1.el4.src.rpm 2551b581115c543be0a2f0b79c064551 seamonkey-1.0.7-0.1.el4.src.rpm i386: c05b34ddd7d800ace39d4919bc591c71 devhelp-0.10-0.6.el4.i386.rpm a2a305afe867ffc1c8333298952d6c3f devhelp-debuginfo-0.10-0.6.el4.i386.rpm bffa4b678eddef42b48493c98b405a09 devhelp-devel-0.10-0.6.el4.i386.rpm 530e493c1c4be29c4b7b18d115da6c4c seamonkey-1.0.7-0.1.el4.i386.rpm 8b84bae592da492e594d51f71b01f98e seamonkey-chat-1.0.7-0.1.el4.i386.rpm 476a6de83d5659c893e6706494a49a22 seamonkey-debuginfo-1.0.7-0.1.el4.i386.rpm c94a5894c8a1f779e934cfc2c7fde796 seamonkey-devel-1.0.7-0.1.el4.i386.rpm 3e76fe18a7e47eb9c1c93460b6e253bb seamonkey-dom-inspector-1.0.7-0.1.el4.i386.rpm eda5f8b2b33ff4cf9d1becaf99f541fe seamonkey-js-debugger-1.0.7-0.1.el4.i386.rpm 248b46eba2ef23f25ad8d15cc9588bce seamonkey-mail-1.0.7-0.1.el4.i386.rpm b88eb04b490897f43c9ff4fecde656f4 seamonkey-nspr-1.0.7-0.1.el4.i386.rpm 9431a330318dc9f8dd0becc2d489b270 seamonkey-nspr-devel-1.0.7-0.1.el4.i386.rpm e620792a3b45abd8d34be41f9ce50e3a seamonkey-nss-1.0.7-0.1.el4.i386.rpm 5736600d0aabfadb0e3a2c8d92f257c2 seamonkey-nss-devel-1.0.7-0.1.el4.i386.rpm ia64: d636cf677730ee853a1a7a2486099bc5 seamonkey-1.0.7-0.1.el4.ia64.rpm a88ec27d574f980ff0bef6f0ccef7e17 seamonkey-chat-1.0.7-0.1.el4.ia64.rpm 476a6de83d5659c893e6706494a49a22 seamonkey-debuginfo-1.0.7-0.1.el4.i386.rpm 814cf4b4d3fbbec08d88ab5ce1d39e44 seamonkey-debuginfo-1.0.7-0.1.el4.ia64.rpm d332e4b966bf0463da6f5c66a2986103 seamonkey-devel-1.0.7-0.1.el4.ia64.rpm ece28237c8c16c2880719028b493ee6a seamonkey-dom-inspector-1.0.7-0.1.el4.ia64.rpm ab58b242400f6089dc1fc5a5e04c4442 seamonkey-js-debugger-1.0.7-0.1.el4.ia64.rpm f817108dd290803451b9aa562e3ccfb9 seamonkey-mail-1.0.7-0.1.el4.ia64.rpm b88eb04b490897f43c9ff4fecde656f4 seamonkey-nspr-1.0.7-0.1.el4.i386.rpm ef310b7335777607ca99924163ccf502 seamonkey-nspr-1.0.7-0.1.el4.ia64.rpm 4b2babb3f6177f0685f12dec8fe85b6f seamonkey-nspr-devel-1.0.7-0.1.el4.ia64.rpm e620792a3b45abd8d34be41f9ce50e3a seamonkey-nss-1.0.7-0.1.el4.i386.rpm 6b0c4aeb3e1d7b2b9f60be1153ee252e seamonkey-nss-1.0.7-0.1.el4.ia64.rpm 807e70b32828dda46fe5b06af8e6816c seamonkey-nss-devel-1.0.7-0.1.el4.ia64.rpm x86_64: b063e889c4580e12fab97dd2e8b5b462 devhelp-0.10-0.6.el4.x86_64.rpm f48451aaf24dc19831d87c8829bd057a devhelp-debuginfo-0.10-0.6.el4.x86_64.rpm 055da73b5a06e81990b835c215950fa9 devhelp-devel-0.10-0.6.el4.x86_64.rpm 27ddbc888ad0e8fe980e64db30cef928 seamonkey-1.0.7-0.1.el4.x86_64.rpm b1bfa3c4af930313998ec54d0b32ee09 seamonkey-chat-1.0.7-0.1.el4.x86_64.rpm 476a6de83d5659c893e6706494a49a22 seamonkey-debuginfo-1.0.7-0.1.el4.i386.rpm 1fe7a4c9823afdab5d4c4970757385df seamonkey-debuginfo-1.0.7-0.1.el4.x86_64.rpm 56c79b35226ca42b9953e691f688a187 seamonkey-devel-1.0.7-0.1.el4.x86_64.rpm 9e433dd976a6c74e32157222230f6247 seamonkey-dom-inspector-1.0.7-0.1.el4.x86_64.rpm 1e37dcbff2b6463ff91ebac560808b1c seamonkey-js-debugger-1.0.7-0.1.el4.x86_64.rpm 7d777bdd4e9243e63a7dd4400e59bbca seamonkey-mail-1.0.7-0.1.el4.x86_64.rpm b88eb04b490897f43c9ff4fecde656f4 seamonkey-nspr-1.0.7-0.1.el4.i386.rpm 7dd2a909848d52112064852e9cbedb55 seamonkey-nspr-1.0.7-0.1.el4.x86_64.rpm bdf81a61daa3774fae560ee8e5dad1b5 seamonkey-nspr-devel-1.0.7-0.1.el4.x86_64.rpm e620792a3b45abd8d34be41f9ce50e3a seamonkey-nss-1.0.7-0.1.el4.i386.rpm cf69951f73b197e4e8bee04450bb1a0a seamonkey-nss-1.0.7-0.1.el4.x86_64.rpm 311976a4579e4544d5b8a6c0614a0323 seamonkey-nss-devel-1.0.7-0.1.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFiGy8XlSAg2UNWIIRArcrAJ9O9QVO3WwcDoLdaW9EqJd15dvCKwCfYYNS uuAlNbtwxZ3tlraJPYF46G4= =cLxG -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 19 22:51:11 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 19 Dec 2006 17:51:11 -0500 Subject: [RHSA-2006:0760-01] Critical: thunderbird security update Message-ID: <200612192251.kBJMpCI5013560@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: thunderbird security update Advisory ID: RHSA-2006:0760-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0760.html Issue date: 2006-12-19 Updated on: 2006-12-19 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-6497 CVE-2006-6498 CVE-2006-6501 CVE-2006-6502 CVE-2006-6503 CVE-2006-6504 CVE-2006-6505 - --------------------------------------------------------------------- 1. Summary: Updated thunderbird packages that fix several security bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the way Thunderbird processes certain malformed Javascript code. A malicious web page could cause the execution of Javascript code in such a way that could cause Thunderbird to crash or execute arbitrary code as the user running Thunderbird. JavaScript support is disabled by default in Thunderbird; this issue is not exploitable without enabling JavaScript. (CVE-2006-6498, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503, CVE-2006-6504) Several flaws were found in the way Thunderbird renders web pages. A malicious web page could cause the browser to crash or possibly execute arbitrary code as the user running Thunderbird. (CVE-2006-6497) A heap based buffer overflow flaw was found in the way Thunderbird parses the Content-Type mail header. A malicious mail message could cause the Thunderbird client to crash or possibly execute arbitrary code as the user running Thunderbird. (CVE-2006-6505) Users of Thunderbird are advised to apply this update, which contains Thunderbird version 1.5.0.9 that corrects these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 219686 - CVE-2006-6497 Multiple Thunderbird issues (CVE-2006-6498, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503, CVE-2006-6504, CVE-2006-6505) 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/thunderbird-1.5.0.9-0.1.el4.src.rpm 72001c988050f2cee39f14e521854b51 thunderbird-1.5.0.9-0.1.el4.src.rpm i386: d10c018c8956e811c56a8717735555b1 thunderbird-1.5.0.9-0.1.el4.i386.rpm 97cb553e836624209a2d591c62373d2d thunderbird-debuginfo-1.5.0.9-0.1.el4.i386.rpm ia64: d17fd5ab431314325c0b0fe75fec5a29 thunderbird-1.5.0.9-0.1.el4.ia64.rpm 5beb4a989fcc63c0975c586a6c3d5ad2 thunderbird-debuginfo-1.5.0.9-0.1.el4.ia64.rpm ppc: e0af8987e5883eb7ec2b19be67acb1f0 thunderbird-1.5.0.9-0.1.el4.ppc.rpm cbcfc58381dab7e366474aaddd4346f9 thunderbird-debuginfo-1.5.0.9-0.1.el4.ppc.rpm s390: ae153d3848b515f2a94af4d38f98d79d thunderbird-1.5.0.9-0.1.el4.s390.rpm 148e770af0e666c4bdd4e6c13b9614fb thunderbird-debuginfo-1.5.0.9-0.1.el4.s390.rpm s390x: 29e7274253810edd4539be95b21c4c00 thunderbird-1.5.0.9-0.1.el4.s390x.rpm 3782bbe74986f175791c50bb81068fe3 thunderbird-debuginfo-1.5.0.9-0.1.el4.s390x.rpm x86_64: 94b3012459492173fb03e8f9291b2d7b thunderbird-1.5.0.9-0.1.el4.x86_64.rpm bb24e40f24bde30be2a1be60ea4ccb96 thunderbird-debuginfo-1.5.0.9-0.1.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/thunderbird-1.5.0.9-0.1.el4.src.rpm 72001c988050f2cee39f14e521854b51 thunderbird-1.5.0.9-0.1.el4.src.rpm i386: d10c018c8956e811c56a8717735555b1 thunderbird-1.5.0.9-0.1.el4.i386.rpm 97cb553e836624209a2d591c62373d2d thunderbird-debuginfo-1.5.0.9-0.1.el4.i386.rpm x86_64: 94b3012459492173fb03e8f9291b2d7b thunderbird-1.5.0.9-0.1.el4.x86_64.rpm bb24e40f24bde30be2a1be60ea4ccb96 thunderbird-debuginfo-1.5.0.9-0.1.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/thunderbird-1.5.0.9-0.1.el4.src.rpm 72001c988050f2cee39f14e521854b51 thunderbird-1.5.0.9-0.1.el4.src.rpm i386: d10c018c8956e811c56a8717735555b1 thunderbird-1.5.0.9-0.1.el4.i386.rpm 97cb553e836624209a2d591c62373d2d thunderbird-debuginfo-1.5.0.9-0.1.el4.i386.rpm ia64: d17fd5ab431314325c0b0fe75fec5a29 thunderbird-1.5.0.9-0.1.el4.ia64.rpm 5beb4a989fcc63c0975c586a6c3d5ad2 thunderbird-debuginfo-1.5.0.9-0.1.el4.ia64.rpm x86_64: 94b3012459492173fb03e8f9291b2d7b thunderbird-1.5.0.9-0.1.el4.x86_64.rpm bb24e40f24bde30be2a1be60ea4ccb96 thunderbird-debuginfo-1.5.0.9-0.1.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/thunderbird-1.5.0.9-0.1.el4.src.rpm 72001c988050f2cee39f14e521854b51 thunderbird-1.5.0.9-0.1.el4.src.rpm i386: d10c018c8956e811c56a8717735555b1 thunderbird-1.5.0.9-0.1.el4.i386.rpm 97cb553e836624209a2d591c62373d2d thunderbird-debuginfo-1.5.0.9-0.1.el4.i386.rpm ia64: d17fd5ab431314325c0b0fe75fec5a29 thunderbird-1.5.0.9-0.1.el4.ia64.rpm 5beb4a989fcc63c0975c586a6c3d5ad2 thunderbird-debuginfo-1.5.0.9-0.1.el4.ia64.rpm x86_64: 94b3012459492173fb03e8f9291b2d7b thunderbird-1.5.0.9-0.1.el4.x86_64.rpm bb24e40f24bde30be2a1be60ea4ccb96 thunderbird-debuginfo-1.5.0.9-0.1.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFiGzWXlSAg2UNWIIRAt/YAKCTEkbQL/g0UulXxSg3aFVYzfRPIgCeKlNG l4T3IJILfuUg2buMAv+dCuI= =Ajrw -----END PGP SIGNATURE-----