Linux-Mandrake Security Update Advisory: netscape update
Dec 15, 2000, 00:12 (1 Talkback[s] )
Date: Thu, 14 Dec 2000 15:28:00 -0700
From: Linux Mandrake Security Team security@linux-mandrake.com
To: Linux Mandrake Security Announcements
security-announce@linux-mandrake.com
Subject: [Security Announce] MDKSA-2000:080 - netscape update
Linux-Mandrake Security Update Advisory
Package name: netscape
Date: December 14th, 2000
Advisory ID: MDKSA-2000:080
Affected versions: 6.0, 6.1, 7.0, 7.1, 7.2
Problem Description:
A buffer overflow exists in the HTML parser code of the Netscape
web browser in all versions prior to and including 4.75. This
buffer overflow can be exploited by a remote attacker or web
site.
Please verify the update prior to upgrading to ensure the
integrity of the downloaded package. You can do this with the
command:
rpm --checksig package.rpm
You can get the GPG public key of the Linux-Mandrake Security Team
at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS
If you use MandrakeUpdate, the verification of md5 checksum and
GPG signature is performed automatically for you.
Linux-Mandrake 6.0:
7a765a240a72e62e948fefecfdcbc5a1
6.0/RPMS/netscape-common-4.76-3.1mdk.i586.rpm
9317d66e4942793282cd1ff35f389849
6.0/RPMS/netscape-communicator-4.76-3.1mdk.i586.rpm
0738e861f38cccbb2a1d0acc7ccb3d37
6.0/RPMS/netscape-navigator-4.76-3.1mdk.i586.rpm
b5916860839dff94b63da356b27ff67c
6.0/SRPMS/netscape-4.76-3.1mdk.src.rpm
Linux-Mandrake 6.1:
7a765a240a72e62e948fefecfdcbc5a1
6.1/RPMS/netscape-common-4.76-3.1mdk.i586.rpm
9317d66e4942793282cd1ff35f389849
6.1/RPMS/netscape-communicator-4.76-3.1mdk.i586.rpm
0738e861f38cccbb2a1d0acc7ccb3d37
6.1/RPMS/netscape-navigator-4.76-3.1mdk.i586.rpm
b5916860839dff94b63da356b27ff67c
6.1/SRPMS/netscape-4.76-3.1mdk.src.rpm
Linux-Mandrake 7.0:
b566dcd5d6d1d4deebbfd75283d5febb
7.0/RPMS/netscape-castellano-4.76-2mdk.noarch.rpm
7a765a240a72e62e948fefecfdcbc5a1
7.0/RPMS/netscape-common-4.76-3.1mdk.i586.rpm
9317d66e4942793282cd1ff35f389849
7.0/RPMS/netscape-communicator-4.76-3.1mdk.i586.rpm
41f7595b53bddf2ed77f931d24b61e49
7.0/RPMS/netscape-francais-4.76-1mdk.noarch.rpm
0738e861f38cccbb2a1d0acc7ccb3d37
7.0/RPMS/netscape-navigator-4.76-3.1mdk.i586.rpm
6703445b94cba32592496bf011975a58
7.0/RPMS/netscape-walon-4.76-1mdk.noarch.rpm
b5916860839dff94b63da356b27ff67c
7.0/SRPMS/netscape-4.76-3.1mdk.src.rpm
e4e64765b0eb8828391b32dbfc7733fb
7.0/SRPMS/netscape-castellano-4.76-2mdk.src.rpm
68de739c1f08f07da85db47310d3d846
7.0/SRPMS/netscape-francais-4.76-1mdk.src.rpm
73db5ba30c10246d0c6bdcf341210653
7.0/SRPMS/netscape-walon-4.76-1mdk.src.rpm
Linux-Mandrake 7.1:
b566dcd5d6d1d4deebbfd75283d5febb
7.1/RPMS/netscape-castellano-4.76-2mdk.noarch.rpm
f221c1eff944f285d3c61cf6d06d77d2
7.1/RPMS/netscape-catalan-4.76-1mdk.noarch.rpm
440fdbf3c5f75f71ac11d065af780e95
7.1/RPMS/netscape-common-4.76-3.2mdk.i586.rpm
6508064e69862730fbf58d27d229688a
7.1/RPMS/netscape-communicator-4.76-3.2mdk.i586.rpm
8c15123428be8e01694390de2a54c741
7.1/RPMS/netscape-euskara-4.76-1mdk.noarch.rpm
41f7595b53bddf2ed77f931d24b61e49
7.1/RPMS/netscape-francais-4.76-1mdk.noarch.rpm
6f1265f1eb3320bb49765122d91f36a1
7.1/RPMS/netscape-navigator-4.76-3.2mdk.i586.rpm
973727c14a5aedf692fbe7bd34021393
7.1/RPMS/netscape-russian-4.76-1mdk.noarch.rpm
6703445b94cba32592496bf011975a58
7.1/RPMS/netscape-walon-4.76-1mdk.noarch.rpm
b021e45a6e7a15b967bf0ac6d7607c54
7.1/SRPMS/netscape-4.76-3.2mdk.src.rpm
e4e64765b0eb8828391b32dbfc7733fb
7.1/SRPMS/netscape-castellano-4.76-2mdk.src.rpm
998bed6307674e67e80f43b19bf6c51e
7.1/SRPMS/netscape-catalan-4.76-1mdk.src.rpm
99cd80ff338f95ccedf4d9fe68b188a0
7.1/SRPMS/netscape-euskara-4.76-1mdk.src.rpm
68de739c1f08f07da85db47310d3d846
7.1/SRPMS/netscape-francais-4.76-1mdk.src.rpm
966cf47246ed028a4a52ee0c0bad6d61
7.1/SRPMS/netscape-russian-4.76-1mdk.src.rpm
73db5ba30c10246d0c6bdcf341210653
7.1/SRPMS/netscape-walon-4.76-1mdk.src.rpm
Linux-Mandrake 7.2:
b566dcd5d6d1d4deebbfd75283d5febb
7.2/RPMS/netscape-castellano-4.76-2mdk.noarch.rpm
f221c1eff944f285d3c61cf6d06d77d2
7.2/RPMS/netscape-catalan-4.76-1mdk.noarch.rpm
e5423e05cf603032b0f2f15722f9f435
7.2/RPMS/netscape-common-4.76-3.3mdk.i586.rpm
a51f2cfaf43e67e67838983b2c15e644
7.2/RPMS/netscape-communicator-4.76-3.3mdk.i586.rpm
8c15123428be8e01694390de2a54c741
7.2/RPMS/netscape-euskara-4.76-1mdk.noarch.rpm
41f7595b53bddf2ed77f931d24b61e49
7.2/RPMS/netscape-francais-4.76-1mdk.noarch.rpm
01486d1b7c56867243637e33bde41daf
7.2/RPMS/netscape-german-4.76-1mdk.noarch.rpm
217e4f8f677de4450ac081936d69d3d8
7.2/RPMS/netscape-japanese-4.76-1mdk.noarch.rpm
5e406d757236d2d0f6795a851ca9980f
7.2/RPMS/netscape-navigator-4.76-3.3mdk.i586.rpm
a9cc0c280a2e4eccc3d313e92f88d9e6
7.2/RPMS/netscape-polish-4.76-1mdk.noarch.rpm
973727c14a5aedf692fbe7bd34021393
7.2/RPMS/netscape-russian-4.76-1mdk.noarch.rpm
fb6a6390ed8ac49edb3fa71d17b1490e
7.2/RPMS/netscape-spanish-4.76-1mdk.noarch.rpm
6703445b94cba32592496bf011975a58
7.2/RPMS/netscape-walon-4.76-1mdk.noarch.rpm
2fbfdc8f07784f79a37906f1ba7f0cb1
7.2/SRPMS/netscape-4.76-3.3mdk.src.rpm
e4e64765b0eb8828391b32dbfc7733fb
7.2/SRPMS/netscape-castellano-4.76-2mdk.src.rpm
998bed6307674e67e80f43b19bf6c51e
7.2/SRPMS/netscape-catalan-4.76-1mdk.src.rpm
99cd80ff338f95ccedf4d9fe68b188a0
7.2/SRPMS/netscape-euskara-4.76-1mdk.src.rpm
68de739c1f08f07da85db47310d3d846
7.2/SRPMS/netscape-francais-4.76-1mdk.src.rpm
5c7eee581703938c86b4ef27c541a40d
7.2/SRPMS/netscape-german-4.76-1mdk.src.rpm
f149babeb319de208376c086331551b8
7.2/SRPMS/netscape-japanese-4.76-1mdk.src.rpm
6895eb8e26597d77a109fd4c535ae1c1
7.2/SRPMS/netscape-polish-4.76-1mdk.src.rpm
966cf47246ed028a4a52ee0c0bad6d61
7.2/SRPMS/netscape-russian-4.76-1mdk.src.rpm
25a6b4438fcaf952c4d3b1f2ed5f1173
7.2/SRPMS/netscape-spanish-4.76-1mdk.src.rpm
73db5ba30c10246d0c6bdcf341210653
7.2/SRPMS/netscape-walon-4.76-1mdk.src.rpm
To upgrade automatically, use
<<MandrakeUpdate>>.
If you want to upgrade manually, download the updated package
from one of our FTP server mirrors and uprade with "rpm -Uvh
package_name".
You can download the updates directly from:
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates
ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates
Or try one of the other mirrors listed at:
http://www.linux-mandrake.com/en/ftp.php3.
Updated packages are available in the "updates/[ver]/RPMS/"
directory. For example, if you are looking for an updated RPM
package for Linux-Mandrake 7.1, look for it in "updates/7.1/RPMS/".
Updated source RPMs are available as well, but you generally do not
need to download them.
Please be aware that sometimes it takes the mirrors a few hours
to update, so if you want an immediate upgrade, please use one of
the two above-listed mirrors.
You can view other security advisories for Linux-Mandrake
at:
http://www.linux-mandrake.com/en/security/
If you want to report vulnerabilities, please contact
security@linux-mandrake.com
Linux-Mandrake has two security-related mailing list services
that anyone can subscribe to:
security-announce@linux-mandrake.com
Linux-Mandrake's security announcements mailing list. Only
announcements are sent to this list and it is read-only.
security-discuss@linux-mandrake.com
Linux-Mandrake's security discussion mailing list. This list is
open to anyone to discuss Linux-Mandrake security specifically and
Linux security in general.
To subscribe to either list, send a message to sympa@linux-mandrake.com with
"subscribe [listname]" in the body of the message.
To remove yourself from either list, send a message to sympa@linux-mandrake.com with
"unsubscribe [listname]" in the body of the message.
To get more information on either list, send a message to
sympa@linux-mandrake.com with
"info [listname]" in the body of the message.
Optionally, you can use the web interface to subscribe to or
unsubscribe from either list:
http://www.linux-mandrake.com/en/flists.php3#security