--vtzGhvizbBRQ85DL Content-Type: text/plain; charset=us-ascii --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: New netscape packages available Advisory ID: RHSA-1999:039-01 Issue date: 1999-10-04 Updated on: Keywords: netscape 4.7 communicator navigator Cross references: --------------------------------------------------------------------- 1. Topic: A new version of Netscape has been released. This release fixes some security problems in Javascript and form signing. 2. Bug IDs fixed (http://developer.redhat.com/bugzilla for more info): None. 3. Relevant releases/architectures: Red Hat Linux 5.x, Intel Red Hat Linux 6.x, Intel Sparc packages will be available if/when Netscape updates their Sparc releases. 4. Obsoleted by: 5. Conflicts with: 6. RPMs required: Red Hat Linux 5.x: Intel: ftp://ftp.redhat.com/pub/redhat/updates/5.2/i386/netscape-common-4.7-0.i386.rpm ftp://ftp.redhat.com/pub/redhat/updates/5.2/i386/netscape-communicator-4.7-0.i386.rpm ftp://ftp.redhat.com/pub/redhat/updates/5.2/i386/netscape-navigator-4.7-0.i386.rpm Sparc: ftp://ftp.redhat.com/pub/redhat/updates/5.2/sparc/netscape-common-4.51-0.sparc.rpm Source packages: ftp://ftp.redhat.com/pub/redhat/updates/5.2/SRPMS/netscape-4.7-0.src.rpm Red Hat Linux 6.x: Intel: ftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/netscape-common-4.7-1.i386.rpm ftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/netscape-communicator-4.7-1.i386.rpm ftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/netscape-navigator-4.7-1.i386.rpm Source packages: ftp://ftp.redhat.com/pub/redhat/updates/6.1/SRPMS/netscape-4.7-1.src.rpm 7. Problem description: A new version of Netscape has been released. This release fixes some security problems in Javascript and form signing, as well as adding some new features. For more information, please see: http://home.netscape.com/eng/mozilla/4.7/relnotes/unix-4.7.html 8. Solution: For each RPM for your particular architecture, run: rpm -Uvh <filename> where filename is the name of the RPM. 9. Verification: MD5 sum Package Name -------------------------------------------------------------------------- f604d7e8032fe13f630373e5f9ad0940 i386/netscape-common-4.7-0.i386.rpm 3fcc5fca33ba3fc647fb5a7bf6aabf41 i386/netscape-communicator-4.7-0.i386.rpm 33818607fdc893a047dbf03c4b46ce34 i386/netscape-navigator-4.7-0.i386.rpm c32b3f430a9eaf84c2c3f1e35f402229 SRPMS/netscape-4.7-0.src.rpm f01c5658d5d264bee329aa51f3b09fe5 i386/netscape-common-4.7-1.i386.rpm 59de608731eea3293b12cbe370551403 i386/netscape-communicator-4.7-1.i386.rpm 3303e827932687615c0537e116660b21 i386/netscape-navigator-4.7-1.i386.rpm aafb6d8c787771c3e2cff67bb0fff608 SRPMS/netscape-4.7-1.src.rpm These packages are signed with GnuPG by Red Hat Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html and is also attached to this annoucement. You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> Note that you need RPM >= 3.0 to check GnuPG keys. 10. References: --vtzGhvizbBRQ85DL Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename=RPM-GPG-KEY The following public key can be used to verify RPM packages built and signed by Red Hat Software using `rpm -K'' using the GNU GPG package. Questions about this key should be sent to ewt@redhat.com. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.0.0 (GNU/Linux) Comment: For info see http://www.gnupg.org mQGiBDfqVDgRBADBKr3Bl6PO8BQ0H8sJoD6p9U7Yyl7pjtZqioviPwXP+DCWd4u8 HQzcxAZ57m8ssA1LK1Fx93coJhDzM130+p5BG9mYSWShLabR3N1KXdXQYYcowTOM GxdwYRGr1Spw8QydLhjVfU1VSl4xt6bupPbWJbyjkg5Z3P7BlUOUJmrx3wCgobNV EDGaWYJcch5z5B1of/41G8kEAKii6q7Gu/vhXXnLS6m15oNnPVybyngiw/23dKjS ZVG7rKANEK2mxg1VB+vc/uUc4k49UxJJfCZg1gu1sPFV3GSa+Y/7jsiLktQvCiLP lncQt1dV+ENmHR5BdIDPWDzKBVbgWnSDnqQ6KrZ7T6AlZ74VMpjGxxkWU6vV2xsW XCLPA/9P/vtImA8CZN3jxGgtK5GGtDNJ/cMhhuv5tnfwFg4b/VGo2Jr8mhLUqoIb E6zeGAmZbUpdckDco8D5fiFmqTf5+++pCEpJLJkkzel/32N2w4qzPrcRMCiBURES PjCLd4Y5rPoU8E4kOHc/4BuHN903tiCsCPloCrWsQZ7UdxfQ5LQiUmVkIEhhdCwg SW5jIDxzZWN1cml0eUByZWRoYXQuY29tPohVBBMRAgAVBQI36lQ4AwsKAwMVAwID FgIBAheAAAoJECGRgM3bQqYOsBQAnRVtg7B25Hm11PHcpa8FpeddKiq2AJ9aO8sB XmLDmPOEFI75mpTrKYHF6rkCDQQ36lRyEAgAokgI2xJ+3bZsk8jRA8ORIX8DH05U lMH27qFYzLbT6npXwXYIOtVn0K2/iMDj+oEB1Aa2au4OnddYaLWp06v3d+XyS0t+ 5ab2ZfIQzdh7wCwxqRkzR+/H5TLYbMG+hvtTdylfqIX0WEfoOXMtWEGSVwyUsnM3 Jy3LOi48rQQSCKtCAUdV20FoIGWhwnb/gHU1BnmES6UdQujFBE6EANqPhp0coYoI hHJ2oIO8ujQItvvNaU88j/s/izQv5e7MXOgVSjKe/WX3s2JtB/tW7utpy12wh1J+ JsFdbLV/t8CozUTpJgx5mVA3RKlxjTA+On+1IEUWioB+iVfT7Ov/0kcAzwADBQf9 E4SKCWRand8K0XloMYgmipxMhJNnWDMLkokvbMNTUoNpSfRoQJ9EheXDxwMpTPwK ti/PYrrL2J11P2ed0x7zm8v3gLrY0cue1iSba+8glY+p31ZPOr5ogaJw7ZARgoS8 BwjyRymXQp+8Dete0TELKOL2/itDOPGHW07SsVWOR6cmX4VlRRcWB5KejaNvdrE5 4XFtOd04NMgWI63uqZc4zkRa+kwEZtmbz3tHSdRCCE+Y7YVP6IUf/w6YPQFQriWY FiA6fD10eB+BlIUqIw80VgjsBKmCwvKkn4jg8kibXgj4/TzQSx77uYokw1EqQ2wk OZoaEtcubsNMquuLCMWijYhGBBgRAgAGBQI36lRyAAoJECGRgM3bQqYOhyYAnj7h VDY/FJAGqmtZpwVp9IlitW5tAJ4xQApr/jNFZCTksnI+4O1765F7tA==3AHZ -----END PGP PUBLIC KEY BLOCK----- --vtzGhvizbBRQ85DL--