ELSA-2006-0676

ELSA-2006-0676 - Critical seamonkey security update

Type:SECURITY
Impact:CRITICAL
Release Date:2006-12-07

Description


[1.0.6-0.1.1.el4]
- Replace bookmarks and prefs

[1.0.6-0.1.el4]
- Update to 1.0.6 (RC)

[1.0.5-0.1.el4]
- Update to 1.0.5


Related CVEs


CVE-2006-4565
CVE-2006-4253
CVE-2006-4570
CVE-2006-4566
CVE-2006-4571
CVE-2006-4340
CVE-2006-4568

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 4 (i386) devhelp-0.10-0.5.el4.src.rpm5b676c3f77f77acd959e098f446ce480c91a2e37dd3f19790a9f1ede80062d22ELSA-2008-0882el4_i386_latest
devhelp-0.10-0.5.el4.src.rpm5b676c3f77f77acd959e098f446ce480c91a2e37dd3f19790a9f1ede80062d22ELSA-2008-0882el4_u4_i386_patch
devhelp-0.10-0.5.el4.i386.rpm4069b79663c13ac1abf74c39e8d10fd1f4cdfd96afc9b71899fa301d408e5a0eELSA-2008-0882el4_i386_latest
devhelp-0.10-0.5.el4.i386.rpm4069b79663c13ac1abf74c39e8d10fd1f4cdfd96afc9b71899fa301d408e5a0eELSA-2008-0882el4_u4_i386_patch
devhelp-devel-0.10-0.5.el4.i386.rpma3d8897b5a95b64009d1b02db964e3caa75da9c171da7e4e49b1cee8b8104119ELSA-2008-0882el4_i386_latest
devhelp-devel-0.10-0.5.el4.i386.rpma3d8897b5a95b64009d1b02db964e3caa75da9c171da7e4e49b1cee8b8104119ELSA-2008-0882el4_u4_i386_patch
seamonkey-1.0.6-0.1.1.el4.i386.rpmb0118d1d24a96059ea800fc49b44770056f78f2f549c553b05e4593bdc97a376ELSA-2012-0141el4_i386_latest
seamonkey-1.0.6-0.1.1.el4.i386.rpmb0118d1d24a96059ea800fc49b44770056f78f2f549c553b05e4593bdc97a376ELSA-2012-0141el4_u4_i386_patch
seamonkey-chat-1.0.6-0.1.1.el4.i386.rpm69e5b62628e9d553c254787e45ab823cd0be3ee98751afb14b9051521bd7864eELSA-2012-0141el4_i386_latest
seamonkey-chat-1.0.6-0.1.1.el4.i386.rpm69e5b62628e9d553c254787e45ab823cd0be3ee98751afb14b9051521bd7864eELSA-2012-0141el4_u4_i386_patch
seamonkey-devel-1.0.6-0.1.1.el4.i386.rpm589ce12c8cdf9d072e2160603e760c861192d5ae2b3e3c6433cbc8109eb568caELSA-2012-0141el4_i386_latest
seamonkey-devel-1.0.6-0.1.1.el4.i386.rpm589ce12c8cdf9d072e2160603e760c861192d5ae2b3e3c6433cbc8109eb568caELSA-2012-0141el4_u4_i386_patch
seamonkey-dom-inspector-1.0.6-0.1.1.el4.i386.rpm8fc78af8bdaed5dffeef79951806fccdca42631cc925da9a83fe714a6ef1abd3ELSA-2012-0141el4_i386_latest
seamonkey-dom-inspector-1.0.6-0.1.1.el4.i386.rpm8fc78af8bdaed5dffeef79951806fccdca42631cc925da9a83fe714a6ef1abd3ELSA-2012-0141el4_u4_i386_patch
seamonkey-js-debugger-1.0.6-0.1.1.el4.i386.rpm1341c34ca9938ff1443eaa6d73aaa46a7a87427c8c169da002b298b91f024ebfELSA-2012-0141el4_i386_latest
seamonkey-js-debugger-1.0.6-0.1.1.el4.i386.rpm1341c34ca9938ff1443eaa6d73aaa46a7a87427c8c169da002b298b91f024ebfELSA-2012-0141el4_u4_i386_patch
seamonkey-mail-1.0.6-0.1.1.el4.i386.rpmc8f54ac99726fe5aafaf2c6cea8dcf998d077327d0d82fc36025949316ddc521ELSA-2012-0141el4_i386_latest
seamonkey-mail-1.0.6-0.1.1.el4.i386.rpmc8f54ac99726fe5aafaf2c6cea8dcf998d077327d0d82fc36025949316ddc521ELSA-2012-0141el4_u4_i386_patch
seamonkey-nspr-1.0.6-0.1.1.el4.i386.rpm7554ebca008031310fe3eb3fa92c62555a1b4a23877dd3ccdb44656ff3886bb0ELSA-2008-0547el4_i386_latest
seamonkey-nspr-1.0.6-0.1.1.el4.i386.rpm7554ebca008031310fe3eb3fa92c62555a1b4a23877dd3ccdb44656ff3886bb0ELSA-2008-0547el4_u4_i386_patch
seamonkey-nspr-devel-1.0.6-0.1.1.el4.i386.rpm5c06872c930143eb3098383e077cc21870528d83a4d8bdaf1a80cb8eeccdbfa3ELSA-2008-0547el4_i386_latest
seamonkey-nspr-devel-1.0.6-0.1.1.el4.i386.rpm5c06872c930143eb3098383e077cc21870528d83a4d8bdaf1a80cb8eeccdbfa3ELSA-2008-0547el4_u4_i386_patch
seamonkey-nss-1.0.6-0.1.1.el4.i386.rpm1c49d91b7f645c7251bab110b030eddf5b72ff58dad22693cbe951259ff1491fELSA-2008-0547el4_i386_latest
seamonkey-nss-1.0.6-0.1.1.el4.i386.rpm1c49d91b7f645c7251bab110b030eddf5b72ff58dad22693cbe951259ff1491fELSA-2008-0547el4_u4_i386_patch
seamonkey-nss-devel-1.0.6-0.1.1.el4.i386.rpmd16d47e7b2756f061e00d49e297102a7956ecd989e3d214f0b656886b3ac9a71ELSA-2008-0547el4_i386_latest
seamonkey-nss-devel-1.0.6-0.1.1.el4.i386.rpmd16d47e7b2756f061e00d49e297102a7956ecd989e3d214f0b656886b3ac9a71ELSA-2008-0547el4_u4_i386_patch
Oracle Linux 4 (x86_64) devhelp-0.10-0.5.el4.src.rpm5b676c3f77f77acd959e098f446ce480c91a2e37dd3f19790a9f1ede80062d22ELSA-2008-0882el4_u4_x86_64_patch
devhelp-0.10-0.5.el4.src.rpm5b676c3f77f77acd959e098f446ce480c91a2e37dd3f19790a9f1ede80062d22ELSA-2008-0882el4_x86_64_latest
devhelp-0.10-0.5.el4.x86_64.rpm40fcde43c2bc9406648140c5abf0cee4634d5c55e3f12498d8361d7bd6e71c5eELSA-2008-0882el4_u4_x86_64_patch
devhelp-0.10-0.5.el4.x86_64.rpm40fcde43c2bc9406648140c5abf0cee4634d5c55e3f12498d8361d7bd6e71c5eELSA-2008-0882el4_x86_64_latest
devhelp-devel-0.10-0.5.el4.x86_64.rpma6680dec607311c26f70a29c000c8dd9df863d3ce329627d1bd451449e5ccbb8ELSA-2008-0882el4_u4_x86_64_patch
devhelp-devel-0.10-0.5.el4.x86_64.rpma6680dec607311c26f70a29c000c8dd9df863d3ce329627d1bd451449e5ccbb8ELSA-2008-0882el4_x86_64_latest
seamonkey-1.0.6-0.1.1.el4.x86_64.rpm02a425db065cdc5b05f9fc14498fe63962d0b4bf71a66c704982f70ab5d9039eELSA-2012-0141el4_u4_x86_64_patch
seamonkey-1.0.6-0.1.1.el4.x86_64.rpm02a425db065cdc5b05f9fc14498fe63962d0b4bf71a66c704982f70ab5d9039eELSA-2012-0141el4_x86_64_latest
seamonkey-chat-1.0.6-0.1.1.el4.x86_64.rpm54f78976e459589b3a28b4b28e00851c07ee9aff6f29ae88dae478872f08db47ELSA-2012-0141el4_u4_x86_64_patch
seamonkey-chat-1.0.6-0.1.1.el4.x86_64.rpm54f78976e459589b3a28b4b28e00851c07ee9aff6f29ae88dae478872f08db47ELSA-2012-0141el4_x86_64_latest
seamonkey-devel-1.0.6-0.1.1.el4.x86_64.rpm17bf9a4baee1001a70abda9012ae9b73c643cab4dac8f719d4f2f653ed663eeeELSA-2012-0141el4_u4_x86_64_patch
seamonkey-devel-1.0.6-0.1.1.el4.x86_64.rpm17bf9a4baee1001a70abda9012ae9b73c643cab4dac8f719d4f2f653ed663eeeELSA-2012-0141el4_x86_64_latest
seamonkey-dom-inspector-1.0.6-0.1.1.el4.x86_64.rpmc84672a6df4cd51f5956fd22db56e687ac6664a62ded058b5fa85e1c1761a4a5ELSA-2012-0141el4_u4_x86_64_patch
seamonkey-dom-inspector-1.0.6-0.1.1.el4.x86_64.rpmc84672a6df4cd51f5956fd22db56e687ac6664a62ded058b5fa85e1c1761a4a5ELSA-2012-0141el4_x86_64_latest
seamonkey-js-debugger-1.0.6-0.1.1.el4.x86_64.rpma17f5635b7ac9bbcb4fc3e74004f58540b8fa8cc18d46b985869d93737644fc6ELSA-2012-0141el4_u4_x86_64_patch
seamonkey-js-debugger-1.0.6-0.1.1.el4.x86_64.rpma17f5635b7ac9bbcb4fc3e74004f58540b8fa8cc18d46b985869d93737644fc6ELSA-2012-0141el4_x86_64_latest
seamonkey-mail-1.0.6-0.1.1.el4.x86_64.rpm45647120261baeb786b7b70aff61dfe727c21d017d34807a768699741f3500c0ELSA-2012-0141el4_u4_x86_64_patch
seamonkey-mail-1.0.6-0.1.1.el4.x86_64.rpm45647120261baeb786b7b70aff61dfe727c21d017d34807a768699741f3500c0ELSA-2012-0141el4_x86_64_latest
seamonkey-nspr-1.0.6-0.1.1.el4.i386.rpm7554ebca008031310fe3eb3fa92c62555a1b4a23877dd3ccdb44656ff3886bb0ELSA-2008-0547el4_u4_x86_64_patch
seamonkey-nspr-1.0.6-0.1.1.el4.i386.rpm7554ebca008031310fe3eb3fa92c62555a1b4a23877dd3ccdb44656ff3886bb0ELSA-2008-0547el4_x86_64_latest
seamonkey-nspr-1.0.6-0.1.1.el4.x86_64.rpm22286ec8e685ef78f41f5a0f04593f51ba9cda9f56ca4e21b7017e4a5dacda63ELSA-2008-0547el4_u4_x86_64_patch
seamonkey-nspr-1.0.6-0.1.1.el4.x86_64.rpm22286ec8e685ef78f41f5a0f04593f51ba9cda9f56ca4e21b7017e4a5dacda63ELSA-2008-0547el4_x86_64_latest
seamonkey-nspr-devel-1.0.6-0.1.1.el4.x86_64.rpm26bbaacc0e0e2830acfb69fa7d9cfd2661c2137a1fe22fa87c8437d970933f88ELSA-2008-0547el4_u4_x86_64_patch
seamonkey-nspr-devel-1.0.6-0.1.1.el4.x86_64.rpm26bbaacc0e0e2830acfb69fa7d9cfd2661c2137a1fe22fa87c8437d970933f88ELSA-2008-0547el4_x86_64_latest
seamonkey-nss-1.0.6-0.1.1.el4.i386.rpm1c49d91b7f645c7251bab110b030eddf5b72ff58dad22693cbe951259ff1491fELSA-2008-0547el4_u4_x86_64_patch
seamonkey-nss-1.0.6-0.1.1.el4.i386.rpm1c49d91b7f645c7251bab110b030eddf5b72ff58dad22693cbe951259ff1491fELSA-2008-0547el4_x86_64_latest
seamonkey-nss-1.0.6-0.1.1.el4.x86_64.rpm7882ff4acb1c75de3362477b230b9af1a2676fc3385319b9881c6ea9e05c9a06ELSA-2008-0547el4_u4_x86_64_patch
seamonkey-nss-1.0.6-0.1.1.el4.x86_64.rpm7882ff4acb1c75de3362477b230b9af1a2676fc3385319b9881c6ea9e05c9a06ELSA-2008-0547el4_x86_64_latest
seamonkey-nss-devel-1.0.6-0.1.1.el4.x86_64.rpmc0078059a6e2a904b719f00bab0d6d2eb3f0c0b1384a3679ae1d401838815a14ELSA-2008-0547el4_u4_x86_64_patch
seamonkey-nss-devel-1.0.6-0.1.1.el4.x86_64.rpmc0078059a6e2a904b719f00bab0d6d2eb3f0c0b1384a3679ae1d401838815a14ELSA-2008-0547el4_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete