Date: Tue, 5 Oct 1999 11:44:19 -0400
From: Bill Nottingham <[email protected]>
To: [email protected]Subject: [linux-security] [RHSA-1999:039-01] New netscape packages available
Cc: [email protected]
--vtzGhvizbBRQ85DL
Content-Type: text/plain; charset=us-ascii
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New netscape packages available
Advisory ID: RHSA-1999:039-01
Issue date: 1999-10-04
Updated on:
Ключевые слова:, netscape, 4.7, communicator, navigator, (найти похожие документы)
Cross references:
---------------------------------------------------------------------
1. Topic:
A new version of Netscape has been released. This release
fixes some security problems in Javascript and form signing.
2. Bug IDs fixed (http://developer.redhat.com/bugzilla for more info):
None.
3. Relevant releases/architectures:
Red Hat Linux 5.x, Intel
Red Hat Linux 6.x, Intel
Sparc packages will be available if/when Netscape updates
their Sparc releases.
4. Obsoleted by:
5. Conflicts with:
6. RPMs required:
Red Hat Linux 5.x:
Intel:
ftp://ftp.redhat.com/pub/redhat/updates/5.2/i386/netscape-common-4.7-0.i386.rpmftp://ftp.redhat.com/pub/redhat/updates/5.2/i386/netscape-communicator-4.7-0.i386.rpmftp://ftp.redhat.com/pub/redhat/updates/5.2/i386/netscape-navigator-4.7-0.i386.rpm
Sparc:
ftp://ftp.redhat.com/pub/redhat/updates/5.2/sparc/netscape-common-4.51-0.sparc.rpm
Source packages:
ftp://ftp.redhat.com/pub/redhat/updates/5.2/SRPMS/netscape-4.7-0.src.rpm
Red Hat Linux 6.x:
Intel:
ftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/netscape-common-4.7-1.i386.rpmftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/netscape-communicator-4.7-1.i386.rpmftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/netscape-navigator-4.7-1.i386.rpm
Source packages:
ftp://ftp.redhat.com/pub/redhat/updates/6.1/SRPMS/netscape-4.7-1.src.rpm
7. Problem description:
A new version of Netscape has been released. This release
fixes some security problems in Javascript and form signing,
as well as adding some new features. For more information,
please see:
http://home.netscape.com/eng/mozilla/4.7/relnotes/unix-4.7.html
8. Solution:
For each RPM for your particular architecture, run:
rpm -Uvh <filename>
where filename is the name of the RPM.
9. Verification:
MD5 sum Package Name
--------------------------------------------------------------------------
f604d7e8032fe13f630373e5f9ad0940 i386/netscape-common-4.7-0.i386.rpm
3fcc5fca33ba3fc647fb5a7bf6aabf41 i386/netscape-communicator-4.7-0.i386.rpm
33818607fdc893a047dbf03c4b46ce34 i386/netscape-navigator-4.7-0.i386.rpm
c32b3f430a9eaf84c2c3f1e35f402229 SRPMS/netscape-4.7-0.src.rpm
f01c5658d5d264bee329aa51f3b09fe5 i386/netscape-common-4.7-1.i386.rpm
59de608731eea3293b12cbe370551403 i386/netscape-communicator-4.7-1.i386.rpm
3303e827932687615c0537e116660b21 i386/netscape-navigator-4.7-1.i386.rpm
aafb6d8c787771c3e2cff67bb0fff608 SRPMS/netscape-4.7-1.src.rpm
These packages are signed with GnuPG by Red Hat Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html
and is also attached to this annoucement.
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
Note that you need RPM >= 3.0 to check GnuPG keys.
10. References:
--vtzGhvizbBRQ85DL
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename=RPM-GPG-KEY
The following public key can be used to verify RPM packages built and
signed by Red Hat Software using `rpm -K' using the GNU GPG package.
Questions about this key should be sent to [email protected].
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.0 (GNU/Linux)
Comment: For info see http://www.gnupg.org
mQGiBDfqVDgRBADBKr3Bl6PO8BQ0H8sJoD6p9U7Yyl7pjtZqioviPwXP+DCWd4u8
HQzcxAZ57m8ssA1LK1Fx93coJhDzM130+p5BG9mYSWShLabR3N1KXdXQYYcowTOM
GxdwYRGr1Spw8QydLhjVfU1VSl4xt6bupPbWJbyjkg5Z3P7BlUOUJmrx3wCgobNV
EDGaWYJcch5z5B1of/41G8kEAKii6q7Gu/vhXXnLS6m15oNnPVybyngiw/23dKjS
ZVG7rKANEK2mxg1VB+vc/uUc4k49UxJJfCZg1gu1sPFV3GSa+Y/7jsiLktQvCiLP
lncQt1dV+ENmHR5BdIDPWDzKBVbgWnSDnqQ6KrZ7T6AlZ74VMpjGxxkWU6vV2xsW
XCLPA/9P/vtImA8CZN3jxGgtK5GGtDNJ/cMhhuv5tnfwFg4b/VGo2Jr8mhLUqoIb
E6zeGAmZbUpdckDco8D5fiFmqTf5+++pCEpJLJkkzel/32N2w4qzPrcRMCiBURES
PjCLd4Y5rPoU8E4kOHc/4BuHN903tiCsCPloCrWsQZ7UdxfQ5LQiUmVkIEhhdCwg
SW5jIDxzZWN1cml0eUByZWRoYXQuY29tPohVBBMRAgAVBQI36lQ4AwsKAwMVAwID
FgIBAheAAAoJECGRgM3bQqYOsBQAnRVtg7B25Hm11PHcpa8FpeddKiq2AJ9aO8sB
XmLDmPOEFI75mpTrKYHF6rkCDQQ36lRyEAgAokgI2xJ+3bZsk8jRA8ORIX8DH05U
lMH27qFYzLbT6npXwXYIOtVn0K2/iMDj+oEB1Aa2au4OnddYaLWp06v3d+XyS0t+
5ab2ZfIQzdh7wCwxqRkzR+/H5TLYbMG+hvtTdylfqIX0WEfoOXMtWEGSVwyUsnM3
Jy3LOi48rQQSCKtCAUdV20FoIGWhwnb/gHU1BnmES6UdQujFBE6EANqPhp0coYoI
hHJ2oIO8ujQItvvNaU88j/s/izQv5e7MXOgVSjKe/WX3s2JtB/tW7utpy12wh1J+
JsFdbLV/t8CozUTpJgx5mVA3RKlxjTA+On+1IEUWioB+iVfT7Ov/0kcAzwADBQf9
E4SKCWRand8K0XloMYgmipxMhJNnWDMLkokvbMNTUoNpSfRoQJ9EheXDxwMpTPwK
ti/PYrrL2J11P2ed0x7zm8v3gLrY0cue1iSba+8glY+p31ZPOr5ogaJw7ZARgoS8
BwjyRymXQp+8Dete0TELKOL2/itDOPGHW07SsVWOR6cmX4VlRRcWB5KejaNvdrE5
4XFtOd04NMgWI63uqZc4zkRa+kwEZtmbz3tHSdRCCE+Y7YVP6IUf/w6YPQFQriWY
FiA6fD10eB+BlIUqIw80VgjsBKmCwvKkn4jg8kibXgj4/TzQSx77uYokw1EqQ2wk
OZoaEtcubsNMquuLCMWijYhGBBgRAgAGBQI36lRyAAoJECGRgM3bQqYOhyYAnj7h
VDY/FJAGqmtZpwVp9IlitW5tAJ4xQApr/jNFZCTksnI+4O1765F7tA==
=3AHZ
-----END PGP PUBLIC KEY BLOCK-----
--vtzGhvizbBRQ85DL--
--
----------------------------------------------------------------------
Please refer to the information about this list as well as general
information about Linux security at http://www.aoy.com/Linux/Security.
----------------------------------------------------------------------
To unsubscribe:
mail -s unsubscribe [email protected] < /dev/null