Red Hat 9062 Published by

A new update is available for Red Hat Enterprise Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Critical: seamonkey security update
Advisory ID: RHSA-2006:0608-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0608.html
Issue date: 2006-07-27
Updated on: 2006-07-27
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-3801 CVE-2006-3677 CVE-2006-3113
CVE-2006-3802 CVE-2006-3803 CVE-2006-3804
CVE-2006-3805 CVE-2006-3806 CVE-2006-3807
CVE-2006-3808 CVE-2006-3809 CVE-2006-3810
CVE-2006-3811 CVE-2006-3812
- ---------------------------------------------------------------------

1. Summary:

Updated seamonkey packages that fix several security bugs are now available
for Red Hat Enterprise Linux 3.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

SeaMonkey is an open source Web browser, advanced email and newsgroup
client, IRC chat client, and HTML editor.

Several flaws were found in the way SeaMonkey processed certain javascript
actions. A malicious web page could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-3807,
CVE-2006-3809, CVE-2006-3812)

Several denial of service flaws were found in the way SeaMonkey processed
certain web content. A malicious web page could crash the browser or
possibly execute arbitrary code as the user running SeaMonkey.
(CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,
CVE-2006-3806, CVE-2006-3811)

A buffer overflow flaw was found in the way SeaMonkey Messenger displayed
malformed inline vcard attachments. If a victim viewed an email message
containing a carefully crafted vcard, it was possible to execute arbitrary
code as the user running SeaMonkey Messenger. (CVE-2006-3804)

Several flaws were found in the way SeaMonkey processed certain javascript
actions. A malicious web page could conduct a cross-site scripting attack
or steal sensitive information (such as cookies owned by other domains).
(CVE-2006-3802, CVE-2006-3810)

A flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A
malicious Proxy AutoConfig server could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-3808)

Users of SeaMonkey are advised to upgrade to this update, which contains
SeaMonkey version 1.0.3 that corrects these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

200253 - CVE-2006-3801 Multiple Seamonkey issues (CVE-2006-3677, CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3804, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812)

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/seamonkey-1.0.3-0.el3.1.src.rpm
5700fda497d3d6e09cb99bd0160cae1c seamonkey-1.0.3-0.el3.1.src.rpm

i386:
edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm
10bccb0c6f61cc913a5cee11e4525282 seamonkey-chat-1.0.3-0.el3.1.i386.rpm
6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
4e0d353982d9c7c7779b394047a1cfd9 seamonkey-devel-1.0.3-0.el3.1.i386.rpm
9b47bc7c27efe287cfa0c07792ccc01e seamonkey-dom-inspector-1.0.3-0.el3.1.i386.rpm
0ca5d34ca0b6db2c734ad126b6cb7b87 seamonkey-js-debugger-1.0.3-0.el3.1.i386.rpm
80e793f420547aa0ffc9f55a5d6c790a seamonkey-mail-1.0.3-0.el3.1.i386.rpm
dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
7b016fbdf8977d24272a6a9bf5c549eb seamonkey-nspr-devel-1.0.3-0.el3.1.i386.rpm
b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm
0b0f7b284d7a43c701b8357a0636147a seamonkey-nss-devel-1.0.3-0.el3.1.i386.rpm

ia64:
b54f3e53c45f910fa925c78a3f85a830 seamonkey-1.0.3-0.el3.1.ia64.rpm
a54b5aa4c3aca436c9dea299d6f6a084 seamonkey-chat-1.0.3-0.el3.1.ia64.rpm
6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
6f6f74fe222bdc7f46d8ac7dcd7fa39c seamonkey-debuginfo-1.0.3-0.el3.1.ia64.rpm
165d173c204d1194d809a01550477bb2 seamonkey-devel-1.0.3-0.el3.1.ia64.rpm
04c06e71a1e01ec3fb1b6d4921cf8e72 seamonkey-dom-inspector-1.0.3-0.el3.1.ia64.rpm
e7533e4ee79017f973b5efd8c263fbb8 seamonkey-js-debugger-1.0.3-0.el3.1.ia64.rpm
6934faf2b40b265306fafa09eb7e2bdb seamonkey-mail-1.0.3-0.el3.1.ia64.rpm
dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
97ffb9cdeaa8c375248d7338e081705a seamonkey-nspr-1.0.3-0.el3.1.ia64.rpm
15746c43e276091cca7b22e149968eec seamonkey-nspr-devel-1.0.3-0.el3.1.ia64.rpm
b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm
3fa583ba5193eb5022a1492207af373e seamonkey-nss-1.0.3-0.el3.1.ia64.rpm
430532e2827047ec6e95bd5fad698c98 seamonkey-nss-devel-1.0.3-0.el3.1.ia64.rpm

ppc:
3557460aa7a520cf3ae737e97a23cabf seamonkey-1.0.3-0.el3.1.ppc.rpm
5da4d6c953c2375ea944da5bbc6d65d7 seamonkey-chat-1.0.3-0.el3.1.ppc.rpm
66bcc3654a08f94f34fb68f4af2fd8b3 seamonkey-debuginfo-1.0.3-0.el3.1.ppc.rpm
4a13b4766810a93c338c6e61eb7c2878 seamonkey-devel-1.0.3-0.el3.1.ppc.rpm
43af0613aef928839f9953be9275976e seamonkey-dom-inspector-1.0.3-0.el3.1.ppc.rpm
47c3640748bb8028f99fdc8df7143726 seamonkey-js-debugger-1.0.3-0.el3.1.ppc.rpm
8b0ac20bf0eb1665c48503c1e0be2190 seamonkey-mail-1.0.3-0.el3.1.ppc.rpm
81048df18d14782470b2191138ca1d1d seamonkey-nspr-1.0.3-0.el3.1.ppc.rpm
b086f5ca564b9dc92f7cb42d05cfe152 seamonkey-nspr-devel-1.0.3-0.el3.1.ppc.rpm
9bfb86324ed33e65b75a222e4f4d594c seamonkey-nss-1.0.3-0.el3.1.ppc.rpm
8ead6a1dbcf7127d1be215be9386315f seamonkey-nss-devel-1.0.3-0.el3.1.ppc.rpm

s390:
484c596e85d071c16b60a4ff7b588cb2 seamonkey-1.0.3-0.el3.1.s390.rpm
1d19478fe278e8810d37d0e53b843bdd seamonkey-chat-1.0.3-0.el3.1.s390.rpm
1209d9652acacb8f5443477c8762f1f0 seamonkey-debuginfo-1.0.3-0.el3.1.s390.rpm
1cdd722aaf5be9fde448c5f6572af567 seamonkey-devel-1.0.3-0.el3.1.s390.rpm
1271e3bd7a31e1a61ed06ea92700316b seamonkey-dom-inspector-1.0.3-0.el3.1.s390.rpm
c48f29a1788d2724a0242b9905f4257f seamonkey-js-debugger-1.0.3-0.el3.1.s390.rpm
2cdab0ae5eac44b1ce498dd30b7bbc37 seamonkey-mail-1.0.3-0.el3.1.s390.rpm
b846008adfbdad2b17be5016674c7bae seamonkey-nspr-1.0.3-0.el3.1.s390.rpm
bd9ddc4a63442bca42902f1ba24f36af seamonkey-nspr-devel-1.0.3-0.el3.1.s390.rpm
bcb5e6d4273210272de5885cd4493df5 seamonkey-nss-1.0.3-0.el3.1.s390.rpm
4931ae4f6b847dc3e9ad4e6a7cbff616 seamonkey-nss-devel-1.0.3-0.el3.1.s390.rpm

s390x:
d575784f960eae10569f23e9b960539f seamonkey-1.0.3-0.el3.1.s390x.rpm
13515109a27470d1473382feed63ac85 seamonkey-chat-1.0.3-0.el3.1.s390x.rpm
1209d9652acacb8f5443477c8762f1f0 seamonkey-debuginfo-1.0.3-0.el3.1.s390.rpm
2b922024c20037dc4e4e70c9e93da048 seamonkey-debuginfo-1.0.3-0.el3.1.s390x.rpm
dca79815a7bf6b1abc31c3d1da3f8b7d seamonkey-devel-1.0.3-0.el3.1.s390x.rpm
69658420caf319c4a87f9d08cb1f8b63 seamonkey-dom-inspector-1.0.3-0.el3.1.s390x.rpm
b3084333c4285c43b1e7f98d121459d4 seamonkey-js-debugger-1.0.3-0.el3.1.s390x.rpm
b1c98f83174a4294e6442fd85cc54c1e seamonkey-mail-1.0.3-0.el3.1.s390x.rpm
b846008adfbdad2b17be5016674c7bae seamonkey-nspr-1.0.3-0.el3.1.s390.rpm
94825bce286f505d30157ed388ec0851 seamonkey-nspr-1.0.3-0.el3.1.s390x.rpm
bd5db4932cf91db2e1ab44543bf88b24 seamonkey-nspr-devel-1.0.3-0.el3.1.s390x.rpm
bcb5e6d4273210272de5885cd4493df5 seamonkey-nss-1.0.3-0.el3.1.s390.rpm
bd25f904c8651f3339c6fb4110209673 seamonkey-nss-1.0.3-0.el3.1.s390x.rpm
0317b5cc38abe9e5d753407e6053724f seamonkey-nss-devel-1.0.3-0.el3.1.s390x.rpm

x86_64:
edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm
d4c9f6d7193e758c20eaed2351bb2d91 seamonkey-1.0.3-0.el3.1.x86_64.rpm
f54fe75baa2c2fa5907cd0a8737efd11 seamonkey-chat-1.0.3-0.el3.1.x86_64.rpm
6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
107d17cf6eacfc8d82903a7b52722c66 seamonkey-debuginfo-1.0.3-0.el3.1.x86_64.rpm
7762f692b3d621e8c47c392bd2c8031c seamonkey-devel-1.0.3-0.el3.1.x86_64.rpm
e510b5446448432ba00053432c8a8d37 seamonkey-dom-inspector-1.0.3-0.el3.1.x86_64.rpm
299196ad7affc2b288423aaa1e92829e seamonkey-js-debugger-1.0.3-0.el3.1.x86_64.rpm
959424ae886ecf449f8cd657de5cf46a seamonkey-mail-1.0.3-0.el3.1.x86_64.rpm
dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
267086e1803aa3a62035f747cbbdb659 seamonkey-nspr-1.0.3-0.el3.1.x86_64.rpm
7c636ad447bbd128e651262084d62bee seamonkey-nspr-devel-1.0.3-0.el3.1.x86_64.rpm
b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm
03897b6821a7edfc3d9116a0b64a2845 seamonkey-nss-1.0.3-0.el3.1.x86_64.rpm
1c0a8543ac1dd50e69bf5ac03c5f1d1f seamonkey-nss-devel-1.0.3-0.el3.1.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/seamonkey-1.0.3-0.el3.1.src.rpm
5700fda497d3d6e09cb99bd0160cae1c seamonkey-1.0.3-0.el3.1.src.rpm

i386:
edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm
10bccb0c6f61cc913a5cee11e4525282 seamonkey-chat-1.0.3-0.el3.1.i386.rpm
6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
4e0d353982d9c7c7779b394047a1cfd9 seamonkey-devel-1.0.3-0.el3.1.i386.rpm
9b47bc7c27efe287cfa0c07792ccc01e seamonkey-dom-inspector-1.0.3-0.el3.1.i386.rpm
0ca5d34ca0b6db2c734ad126b6cb7b87 seamonkey-js-debugger-1.0.3-0.el3.1.i386.rpm
80e793f420547aa0ffc9f55a5d6c790a seamonkey-mail-1.0.3-0.el3.1.i386.rpm
dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
7b016fbdf8977d24272a6a9bf5c549eb seamonkey-nspr-devel-1.0.3-0.el3.1.i386.rpm
b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm
0b0f7b284d7a43c701b8357a0636147a seamonkey-nss-devel-1.0.3-0.el3.1.i386.rpm

x86_64:
edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm
d4c9f6d7193e758c20eaed2351bb2d91 seamonkey-1.0.3-0.el3.1.x86_64.rpm
f54fe75baa2c2fa5907cd0a8737efd11 seamonkey-chat-1.0.3-0.el3.1.x86_64.rpm
6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
107d17cf6eacfc8d82903a7b52722c66 seamonkey-debuginfo-1.0.3-0.el3.1.x86_64.rpm
7762f692b3d621e8c47c392bd2c8031c seamonkey-devel-1.0.3-0.el3.1.x86_64.rpm
e510b5446448432ba00053432c8a8d37 seamonkey-dom-inspector-1.0.3-0.el3.1.x86_64.rpm
299196ad7affc2b288423aaa1e92829e seamonkey-js-debugger-1.0.3-0.el3.1.x86_64.rpm
959424ae886ecf449f8cd657de5cf46a seamonkey-mail-1.0.3-0.el3.1.x86_64.rpm
dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
267086e1803aa3a62035f747cbbdb659 seamonkey-nspr-1.0.3-0.el3.1.x86_64.rpm
7c636ad447bbd128e651262084d62bee seamonkey-nspr-devel-1.0.3-0.el3.1.x86_64.rpm
b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm
03897b6821a7edfc3d9116a0b64a2845 seamonkey-nss-1.0.3-0.el3.1.x86_64.rpm
1c0a8543ac1dd50e69bf5ac03c5f1d1f seamonkey-nss-devel-1.0.3-0.el3.1.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/seamonkey-1.0.3-0.el3.1.src.rpm
5700fda497d3d6e09cb99bd0160cae1c seamonkey-1.0.3-0.el3.1.src.rpm

i386:
edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm
10bccb0c6f61cc913a5cee11e4525282 seamonkey-chat-1.0.3-0.el3.1.i386.rpm
6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
4e0d353982d9c7c7779b394047a1cfd9 seamonkey-devel-1.0.3-0.el3.1.i386.rpm
9b47bc7c27efe287cfa0c07792ccc01e seamonkey-dom-inspector-1.0.3-0.el3.1.i386.rpm
0ca5d34ca0b6db2c734ad126b6cb7b87 seamonkey-js-debugger-1.0.3-0.el3.1.i386.rpm
80e793f420547aa0ffc9f55a5d6c790a seamonkey-mail-1.0.3-0.el3.1.i386.rpm
dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
7b016fbdf8977d24272a6a9bf5c549eb seamonkey-nspr-devel-1.0.3-0.el3.1.i386.rpm
b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm
0b0f7b284d7a43c701b8357a0636147a seamonkey-nss-devel-1.0.3-0.el3.1.i386.rpm

ia64:
b54f3e53c45f910fa925c78a3f85a830 seamonkey-1.0.3-0.el3.1.ia64.rpm
a54b5aa4c3aca436c9dea299d6f6a084 seamonkey-chat-1.0.3-0.el3.1.ia64.rpm
6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
6f6f74fe222bdc7f46d8ac7dcd7fa39c seamonkey-debuginfo-1.0.3-0.el3.1.ia64.rpm
165d173c204d1194d809a01550477bb2 seamonkey-devel-1.0.3-0.el3.1.ia64.rpm
04c06e71a1e01ec3fb1b6d4921cf8e72 seamonkey-dom-inspector-1.0.3-0.el3.1.ia64.rpm
e7533e4ee79017f973b5efd8c263fbb8 seamonkey-js-debugger-1.0.3-0.el3.1.ia64.rpm
6934faf2b40b265306fafa09eb7e2bdb seamonkey-mail-1.0.3-0.el3.1.ia64.rpm
dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
97ffb9cdeaa8c375248d7338e081705a seamonkey-nspr-1.0.3-0.el3.1.ia64.rpm
15746c43e276091cca7b22e149968eec seamonkey-nspr-devel-1.0.3-0.el3.1.ia64.rpm
b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm
3fa583ba5193eb5022a1492207af373e seamonkey-nss-1.0.3-0.el3.1.ia64.rpm
430532e2827047ec6e95bd5fad698c98 seamonkey-nss-devel-1.0.3-0.el3.1.ia64.rpm

x86_64:
edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm
d4c9f6d7193e758c20eaed2351bb2d91 seamonkey-1.0.3-0.el3.1.x86_64.rpm
f54fe75baa2c2fa5907cd0a8737efd11 seamonkey-chat-1.0.3-0.el3.1.x86_64.rpm
6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
107d17cf6eacfc8d82903a7b52722c66 seamonkey-debuginfo-1.0.3-0.el3.1.x86_64.rpm
7762f692b3d621e8c47c392bd2c8031c seamonkey-devel-1.0.3-0.el3.1.x86_64.rpm
e510b5446448432ba00053432c8a8d37 seamonkey-dom-inspector-1.0.3-0.el3.1.x86_64.rpm
299196ad7affc2b288423aaa1e92829e seamonkey-js-debugger-1.0.3-0.el3.1.x86_64.rpm
959424ae886ecf449f8cd657de5cf46a seamonkey-mail-1.0.3-0.el3.1.x86_64.rpm
dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
267086e1803aa3a62035f747cbbdb659 seamonkey-nspr-1.0.3-0.el3.1.x86_64.rpm
7c636ad447bbd128e651262084d62bee seamonkey-nspr-devel-1.0.3-0.el3.1.x86_64.rpm
b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm
03897b6821a7edfc3d9116a0b64a2845 seamonkey-nss-1.0.3-0.el3.1.x86_64.rpm
1c0a8543ac1dd50e69bf5ac03c5f1d1f seamonkey-nss-devel-1.0.3-0.el3.1.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/seamonkey-1.0.3-0.el3.1.src.rpm
5700fda497d3d6e09cb99bd0160cae1c seamonkey-1.0.3-0.el3.1.src.rpm

i386:
edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm
10bccb0c6f61cc913a5cee11e4525282 seamonkey-chat-1.0.3-0.el3.1.i386.rpm
6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
4e0d353982d9c7c7779b394047a1cfd9 seamonkey-devel-1.0.3-0.el3.1.i386.rpm
9b47bc7c27efe287cfa0c07792ccc01e seamonkey-dom-inspector-1.0.3-0.el3.1.i386.rpm
0ca5d34ca0b6db2c734ad126b6cb7b87 seamonkey-js-debugger-1.0.3-0.el3.1.i386.rpm
80e793f420547aa0ffc9f55a5d6c790a seamonkey-mail-1.0.3-0.el3.1.i386.rpm
dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
7b016fbdf8977d24272a6a9bf5c549eb seamonkey-nspr-devel-1.0.3-0.el3.1.i386.rpm
b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm
0b0f7b284d7a43c701b8357a0636147a seamonkey-nss-devel-1.0.3-0.el3.1.i386.rpm

ia64:
b54f3e53c45f910fa925c78a3f85a830 seamonkey-1.0.3-0.el3.1.ia64.rpm
a54b5aa4c3aca436c9dea299d6f6a084 seamonkey-chat-1.0.3-0.el3.1.ia64.rpm
6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
6f6f74fe222bdc7f46d8ac7dcd7fa39c seamonkey-debuginfo-1.0.3-0.el3.1.ia64.rpm
165d173c204d1194d809a01550477bb2 seamonkey-devel-1.0.3-0.el3.1.ia64.rpm
04c06e71a1e01ec3fb1b6d4921cf8e72 seamonkey-dom-inspector-1.0.3-0.el3.1.ia64.rpm
e7533e4ee79017f973b5efd8c263fbb8 seamonkey-js-debugger-1.0.3-0.el3.1.ia64.rpm
6934faf2b40b265306fafa09eb7e2bdb seamonkey-mail-1.0.3-0.el3.1.ia64.rpm
dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
97ffb9cdeaa8c375248d7338e081705a seamonkey-nspr-1.0.3-0.el3.1.ia64.rpm
15746c43e276091cca7b22e149968eec seamonkey-nspr-devel-1.0.3-0.el3.1.ia64.rpm
b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm
3fa583ba5193eb5022a1492207af373e seamonkey-nss-1.0.3-0.el3.1.ia64.rpm
430532e2827047ec6e95bd5fad698c98 seamonkey-nss-devel-1.0.3-0.el3.1.ia64.rpm

x86_64:
edf47c00458eabb9a145b3a2d6211712 seamonkey-1.0.3-0.el3.1.i386.rpm
d4c9f6d7193e758c20eaed2351bb2d91 seamonkey-1.0.3-0.el3.1.x86_64.rpm
f54fe75baa2c2fa5907cd0a8737efd11 seamonkey-chat-1.0.3-0.el3.1.x86_64.rpm
6c48ebe61fd49a8049c8f7d860609006 seamonkey-debuginfo-1.0.3-0.el3.1.i386.rpm
107d17cf6eacfc8d82903a7b52722c66 seamonkey-debuginfo-1.0.3-0.el3.1.x86_64.rpm
7762f692b3d621e8c47c392bd2c8031c seamonkey-devel-1.0.3-0.el3.1.x86_64.rpm
e510b5446448432ba00053432c8a8d37 seamonkey-dom-inspector-1.0.3-0.el3.1.x86_64.rpm
299196ad7affc2b288423aaa1e92829e seamonkey-js-debugger-1.0.3-0.el3.1.x86_64.rpm
959424ae886ecf449f8cd657de5cf46a seamonkey-mail-1.0.3-0.el3.1.x86_64.rpm
dd0da039d35805b601e785791230b1b5 seamonkey-nspr-1.0.3-0.el3.1.i386.rpm
267086e1803aa3a62035f747cbbdb659 seamonkey-nspr-1.0.3-0.el3.1.x86_64.rpm
7c636ad447bbd128e651262084d62bee seamonkey-nspr-devel-1.0.3-0.el3.1.x86_64.rpm
b76d2bf3a842876e218395172a9390ee seamonkey-nss-1.0.3-0.el3.1.i386.rpm
03897b6821a7edfc3d9116a0b64a2845 seamonkey-nss-1.0.3-0.el3.1.x86_64.rpm
1c0a8543ac1dd50e69bf5ac03c5f1d1f seamonkey-nss-devel-1.0.3-0.el3.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812
http://www.redhat.com/security/updates/classification/#critical

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFEyR4zXlSAg2UNWIIRAhmfAJ9MSTmR6VPFIK6Bb9P28JHgXPHX/gCgnhfr
YPdI9mgL+kQsIAfaHIsGNno=
=Z5+F
-----END PGP SIGNATURE-----