English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 --------------------------------------------------------------------------
   Turbolinux Security Advisory TLSA-2005-49
   http://www.turbolinux.co.jp/security/
                                             security-team@turbolinux.co.jp
 --------------------------------------------------------------------------

 Original released date: 21 Apr 2005
 Last revised: 21 Apr 2005

 Package: mozilla

 Summary: Multiple vulnerabilities exist in Mozilla

 More information:
    Mozilla is an open-source web browser, designed for standards
    compliance, performance and portability.

    Multiple vulnerabilities have been discovered in Mozilla.

 Impact:
    Please refer to the "References" section.

 Affected Products:
    - Turbolinux 10 Server
    - Turbolinux Home
    - Turbolinux 10 F...
    - Turbolinux 10 Desktop

 Solution:
    Please use the turbopkg (zabom) tool to apply the update. 
 ---------------------------------------------
 # turbopkg
 or
 # zabom -u mozilla mozilla-devel
 ---------------------------------------------


 <Turbolinux 10 Server>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/mozilla-1.7.7-1.src.rpm
     32069739 fc0bf8b243f86b060694dff5044c6362

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/mozilla-1.7.7-1.i586.rpm
     14113399 9ff369184485c855ac7aaaa5c82095ac
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/mozilla-devel-1.7.7-1.i586.rpm
      3183374 503c08b1ff3e1dd2c02c9fec52380c54

 <Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/mozilla-1.7.7-1.src.rpm
     32069739 28a1f613f063c360d0422617703fd4ae

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/mozilla-1.7.7-1.i586.rpm
     14040991 b39f68125f05adbe209fcc34e9a51cac
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/mozilla-devel-1.7.7-1.i586.rpm
      3183806 5ec3eb35a761c1ca83d927e38973e58d

 References:

 www.mozilla.org
   [Known Vulnerabilities in Mozilla]
   http://www.mozilla.org/projects/security/known-vulnerabilities.html

 --------------------------------------------------------------------------
 Revision History
    21 Apr 2005 Initial release
 --------------------------------------------------------------------------

 Copyright(C) 2005 Turbolinux, Inc. All rights reserved. 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.7 (GNU/Linux)

iD8DBQFCZ2FQK0LzjOqIJMwRAvUAAJ9ULF/Skw//xEDMiNJQGuu+5f8QpACcDqrZ
1/S7lr/vbs5XuxVykiypcbw=
=okyq
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.