From bugzilla at redhat.com Thu Feb 19 17:14:00 2004 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 19 Feb 2004 12:14 -0500 Subject: [RHSA-2004:066-01] Updated kernel packages fix security vulnerability Message-ID: <200402191714.i1JHETY26053@lacrosse.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated kernel packages fix security vulnerability Advisory ID: RHSA-2004:066-01 Issue date: 2004-02-19 Updated on: 2004-02-19 Product: Red Hat Enterprise Linux Keywords: taroon kernel update Cross references: Obsoletes: RHSA-2004:017 CVE Names: CAN-2004-0077 - --------------------------------------------------------------------- 1. Topic: Updated kernel packages that fix a security vulnerability that may allow local users to gain root privileges are now available. These packages also resolve other minor issues. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - athlon, i386, i686, ia64, ppc64, ppc64iseries, ppc64pseries, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - athlon, i386, i686 Red Hat Enterprise Linux WS version 3 - athlon, i386, i686, ia64, x86_64 3. Problem description: The Linux kernel handles the basic functions of the operating system. Paul Starzetz discovered a flaw in return value checking in mremap() in the Linux kernel versions 2.4.24 and previous that may allow a local attacker to gain root privileges. No exploit is currently available; however this issue is exploitable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0077 to this issue. All users are advised to upgrade to these errata packages, which contain backported security patches that correct these issues. Red Hat would like to thank Paul Starzetz from ISEC for reporting this issue. For the IBM S/390 and IBM eServer zSeries architectures, the upstream version of the s390utils package (which fixes a big in the zipl bootloader) is also included. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website: https://rhn.redhat.com/help/latest-up2date.pxt 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 113517 - RHEL 3.0 smp hang using prctl( PR_SET_PDEATHSIG 112891 - OOM killer strikes with lots of free swap space 115820 - CAN-2004-0077 Linux kernel do_mremap VMA limit local privilege escalation 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-9.0.1.EL.src.rpm ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/s390utils-1.2.4-3.src.rpm athlon: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.0.1.EL.athlon.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.0.1.EL.athlon.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.21-9.0.1.EL.i386.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.0.1.EL.i386.rpm Available from Red Hat Network: kernel-source-2.4.21-9.0.1.EL.i386.rpm i686: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-unsupported-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.i686.rpm ia64: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.ia64.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.0.1.EL.ia64.rpm Available from Red Hat Network: kernel-source-2.4.21-9.0.1.EL.ia64.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.ia64.rpm ppc64: Available from Red Hat Network: kernel-doc-2.4.21-9.0.1.EL.ppc64.rpm Available from Red Hat Network: kernel-source-2.4.21-9.0.1.EL.ppc64.rpm ppc64iseries: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.ppc64iseries.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.ppc64iseries.rpm ppc64pseries: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.ppc64pseries.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.ppc64pseries.rpm s390: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.s390.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.0.1.EL.s390.rpm Available from Red Hat Network: kernel-source-2.4.21-9.0.1.EL.s390.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.s390.rpm Available from Red Hat Network: s390utils-1.2.4-3.s390.rpm s390x: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.s390x.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.0.1.EL.s390x.rpm Available from Red Hat Network: kernel-source-2.4.21-9.0.1.EL.s390x.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.s390x.rpm Available from Red Hat Network: s390utils-1.2.4-3.s390x.rpm x86_64: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.x86_64.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.0.1.EL.x86_64.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.0.1.EL.x86_64.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.0.1.EL.x86_64.rpm Available from Red Hat Network: kernel-source-2.4.21-9.0.1.EL.x86_64.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-9.0.1.EL.src.rpm athlon: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.0.1.EL.athlon.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.0.1.EL.athlon.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.21-9.0.1.EL.i386.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.0.1.EL.i386.rpm Available from Red Hat Network: kernel-source-2.4.21-9.0.1.EL.i386.rpm i686: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-unsupported-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.i686.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-9.0.1.EL.src.rpm athlon: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.0.1.EL.athlon.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.0.1.EL.athlon.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.21-9.0.1.EL.i386.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.0.1.EL.i386.rpm Available from Red Hat Network: kernel-source-2.4.21-9.0.1.EL.i386.rpm i686: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-unsupported-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.0.1.EL.i686.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.i686.rpm ia64: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.ia64.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.0.1.EL.ia64.rpm Available from Red Hat Network: kernel-source-2.4.21-9.0.1.EL.ia64.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.ia64.rpm x86_64: Available from Red Hat Network: kernel-2.4.21-9.0.1.EL.x86_64.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.0.1.EL.x86_64.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.0.1.EL.x86_64.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.0.1.EL.x86_64.rpm Available from Red Hat Network: kernel-source-2.4.21-9.0.1.EL.x86_64.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.0.1.EL.x86_64.rpm 7. Verification: MD5 sum Package Name - -------------------------------------------------------------------------- e83988c03d2de9cbea71b3353ebabfaf 3AS/en/os/SRPMS/kernel-2.4.21-9.0.1.EL.src.rpm 0785d3c8153ac9da0e7f9c7bcf856ff0 3AS/en/os/SRPMS/s390utils-1.2.4-3.src.rpm 3682824cd3afe45ae0d1a42bdc00649f 3AS/en/os/athlon/kernel-2.4.21-9.0.1.EL.athlon.rpm 464774de50bb2233e71b148bb202cbdb 3AS/en/os/athlon/kernel-smp-2.4.21-9.0.1.EL.athlon.rpm 805edccb7aed2490bdf13b9fc712cedb 3AS/en/os/athlon/kernel-smp-unsupported-2.4.21-9.0.1.EL.athlon.rpm 07b31f675849ab2895290289510dcfb4 3AS/en/os/athlon/kernel-unsupported-2.4.21-9.0.1.EL.athlon.rpm 2a422029a324b71b91c4d8850808ec96 3AS/en/os/i386/kernel-BOOT-2.4.21-9.0.1.EL.i386.rpm fc869b3b9ffdabf4531acc08767d6d44 3AS/en/os/i386/kernel-doc-2.4.21-9.0.1.EL.i386.rpm 803e4ac1ea1e579f688183c1a5991c16 3AS/en/os/i386/kernel-source-2.4.21-9.0.1.EL.i386.rpm 21d70972866dbaebac7b49832c85b4ac 3AS/en/os/i686/kernel-2.4.21-9.0.1.EL.i686.rpm a1eb7a4a1b4aa43d047684e8aababd04 3AS/en/os/i686/kernel-hugemem-2.4.21-9.0.1.EL.i686.rpm 1cc969da0bf20b7b095518c1b60cec80 3AS/en/os/i686/kernel-hugemem-unsupported-2.4.21-9.0.1.EL.i686.rpm 7709947b2b66a2085b43eb962d8f1c85 3AS/en/os/i686/kernel-smp-2.4.21-9.0.1.EL.i686.rpm e53df49382dbca2253cee7b3e850b207 3AS/en/os/i686/kernel-smp-unsupported-2.4.21-9.0.1.EL.i686.rpm 36778138b5735e2994023bd13aa08daf 3AS/en/os/i686/kernel-unsupported-2.4.21-9.0.1.EL.i686.rpm 9b61e2264db6ba6c6b91a16286926f08 3AS/en/os/ia64/kernel-2.4.21-9.0.1.EL.ia64.rpm a09be06ad4b3d5440c52ffcf9318c177 3AS/en/os/ia64/kernel-doc-2.4.21-9.0.1.EL.ia64.rpm ea5688dd70ab2a780fe20661d82373e4 3AS/en/os/ia64/kernel-source-2.4.21-9.0.1.EL.ia64.rpm 9de00ca59530ff8e5177eafa17912e69 3AS/en/os/ia64/kernel-unsupported-2.4.21-9.0.1.EL.ia64.rpm 3a4258c1f4b8e649769d08f05729aa8f 3AS/en/os/ppc64/kernel-doc-2.4.21-9.0.1.EL.ppc64.rpm 3a4fb1debb5d572bd8f3a0e208725fbd 3AS/en/os/ppc64/kernel-source-2.4.21-9.0.1.EL.ppc64.rpm 611864738d21cc2e5a958b36de6886e6 3AS/en/os/ppc64iseries/kernel-2.4.21-9.0.1.EL.ppc64iseries.rpm 39ab89ad17b4de9fea0dea9c5aa83ef2 3AS/en/os/ppc64iseries/kernel-unsupported-2.4.21-9.0.1.EL.ppc64iseries.rpm d4dd8a1c5ec8fe932959dc8b1b29981d 3AS/en/os/ppc64pseries/kernel-2.4.21-9.0.1.EL.ppc64pseries.rpm 4fc2d6dad2d465d660bc5c2d677a18a0 3AS/en/os/ppc64pseries/kernel-unsupported-2.4.21-9.0.1.EL.ppc64pseries.rpm 10f10d26db5d74a86b112e3143caf4d2 3AS/en/os/s390/kernel-2.4.21-9.0.1.EL.s390.rpm 6412762e1d44519d2d316c7c94dbd607 3AS/en/os/s390/kernel-doc-2.4.21-9.0.1.EL.s390.rpm d49e34bab3d0265e734dca6bfe65373a 3AS/en/os/s390/kernel-source-2.4.21-9.0.1.EL.s390.rpm e03009763c68ba558c261d245cc9faa3 3AS/en/os/s390/kernel-unsupported-2.4.21-9.0.1.EL.s390.rpm 2421d9175012e807a3195221a57a5b4a 3AS/en/os/s390/s390utils-1.2.4-3.s390.rpm 6636efb0a5a213d8639326c8a65a57b3 3AS/en/os/s390x/kernel-2.4.21-9.0.1.EL.s390x.rpm ccbe194bd4f02fee8155ee65f18a0529 3AS/en/os/s390x/kernel-doc-2.4.21-9.0.1.EL.s390x.rpm 12f9627ea99c284750b6ab277b9548e2 3AS/en/os/s390x/kernel-source-2.4.21-9.0.1.EL.s390x.rpm b24e5e238052f197e29c531a4b39fa3f 3AS/en/os/s390x/kernel-unsupported-2.4.21-9.0.1.EL.s390x.rpm 427156c1eb15322da3c4887f8b6b2762 3AS/en/os/s390x/s390utils-1.2.4-3.s390x.rpm 2152dc5bb64f21d6e548c1492f054e33 3AS/en/os/x86_64/kernel-2.4.21-9.0.1.EL.x86_64.rpm 0e1ad1b6893dddab831b8882d866793b 3AS/en/os/x86_64/kernel-doc-2.4.21-9.0.1.EL.x86_64.rpm 392b5b99e396ba2c861d5ef787ef90cb 3AS/en/os/x86_64/kernel-smp-2.4.21-9.0.1.EL.x86_64.rpm af47d1725e4beb186b27bf477976b8f0 3AS/en/os/x86_64/kernel-smp-unsupported-2.4.21-9.0.1.EL.x86_64.rpm af8a5ae66bd171fb0b6e92ba944d24ec 3AS/en/os/x86_64/kernel-source-2.4.21-9.0.1.EL.x86_64.rpm 49f0b538164e79fadb3bce9871c0f6d1 3AS/en/os/x86_64/kernel-unsupported-2.4.21-9.0.1.EL.x86_64.rpm e83988c03d2de9cbea71b3353ebabfaf 3ES/en/os/SRPMS/kernel-2.4.21-9.0.1.EL.src.rpm 3682824cd3afe45ae0d1a42bdc00649f 3ES/en/os/athlon/kernel-2.4.21-9.0.1.EL.athlon.rpm 464774de50bb2233e71b148bb202cbdb 3ES/en/os/athlon/kernel-smp-2.4.21-9.0.1.EL.athlon.rpm 805edccb7aed2490bdf13b9fc712cedb 3ES/en/os/athlon/kernel-smp-unsupported-2.4.21-9.0.1.EL.athlon.rpm 07b31f675849ab2895290289510dcfb4 3ES/en/os/athlon/kernel-unsupported-2.4.21-9.0.1.EL.athlon.rpm 2a422029a324b71b91c4d8850808ec96 3ES/en/os/i386/kernel-BOOT-2.4.21-9.0.1.EL.i386.rpm fc869b3b9ffdabf4531acc08767d6d44 3ES/en/os/i386/kernel-doc-2.4.21-9.0.1.EL.i386.rpm 803e4ac1ea1e579f688183c1a5991c16 3ES/en/os/i386/kernel-source-2.4.21-9.0.1.EL.i386.rpm 21d70972866dbaebac7b49832c85b4ac 3ES/en/os/i686/kernel-2.4.21-9.0.1.EL.i686.rpm a1eb7a4a1b4aa43d047684e8aababd04 3ES/en/os/i686/kernel-hugemem-2.4.21-9.0.1.EL.i686.rpm 1cc969da0bf20b7b095518c1b60cec80 3ES/en/os/i686/kernel-hugemem-unsupported-2.4.21-9.0.1.EL.i686.rpm 7709947b2b66a2085b43eb962d8f1c85 3ES/en/os/i686/kernel-smp-2.4.21-9.0.1.EL.i686.rpm e53df49382dbca2253cee7b3e850b207 3ES/en/os/i686/kernel-smp-unsupported-2.4.21-9.0.1.EL.i686.rpm 36778138b5735e2994023bd13aa08daf 3ES/en/os/i686/kernel-unsupported-2.4.21-9.0.1.EL.i686.rpm e83988c03d2de9cbea71b3353ebabfaf 3WS/en/os/SRPMS/kernel-2.4.21-9.0.1.EL.src.rpm 3682824cd3afe45ae0d1a42bdc00649f 3WS/en/os/athlon/kernel-2.4.21-9.0.1.EL.athlon.rpm 464774de50bb2233e71b148bb202cbdb 3WS/en/os/athlon/kernel-smp-2.4.21-9.0.1.EL.athlon.rpm 805edccb7aed2490bdf13b9fc712cedb 3WS/en/os/athlon/kernel-smp-unsupported-2.4.21-9.0.1.EL.athlon.rpm 07b31f675849ab2895290289510dcfb4 3WS/en/os/athlon/kernel-unsupported-2.4.21-9.0.1.EL.athlon.rpm 2a422029a324b71b91c4d8850808ec96 3WS/en/os/i386/kernel-BOOT-2.4.21-9.0.1.EL.i386.rpm fc869b3b9ffdabf4531acc08767d6d44 3WS/en/os/i386/kernel-doc-2.4.21-9.0.1.EL.i386.rpm 803e4ac1ea1e579f688183c1a5991c16 3WS/en/os/i386/kernel-source-2.4.21-9.0.1.EL.i386.rpm 21d70972866dbaebac7b49832c85b4ac 3WS/en/os/i686/kernel-2.4.21-9.0.1.EL.i686.rpm a1eb7a4a1b4aa43d047684e8aababd04 3WS/en/os/i686/kernel-hugemem-2.4.21-9.0.1.EL.i686.rpm 1cc969da0bf20b7b095518c1b60cec80 3WS/en/os/i686/kernel-hugemem-unsupported-2.4.21-9.0.1.EL.i686.rpm 7709947b2b66a2085b43eb962d8f1c85 3WS/en/os/i686/kernel-smp-2.4.21-9.0.1.EL.i686.rpm e53df49382dbca2253cee7b3e850b207 3WS/en/os/i686/kernel-smp-unsupported-2.4.21-9.0.1.EL.i686.rpm 36778138b5735e2994023bd13aa08daf 3WS/en/os/i686/kernel-unsupported-2.4.21-9.0.1.EL.i686.rpm 9b61e2264db6ba6c6b91a16286926f08 3WS/en/os/ia64/kernel-2.4.21-9.0.1.EL.ia64.rpm a09be06ad4b3d5440c52ffcf9318c177 3WS/en/os/ia64/kernel-doc-2.4.21-9.0.1.EL.ia64.rpm ea5688dd70ab2a780fe20661d82373e4 3WS/en/os/ia64/kernel-source-2.4.21-9.0.1.EL.ia64.rpm 9de00ca59530ff8e5177eafa17912e69 3WS/en/os/ia64/kernel-unsupported-2.4.21-9.0.1.EL.ia64.rpm 2152dc5bb64f21d6e548c1492f054e33 3WS/en/os/x86_64/kernel-2.4.21-9.0.1.EL.x86_64.rpm 0e1ad1b6893dddab831b8882d866793b 3WS/en/os/x86_64/kernel-doc-2.4.21-9.0.1.EL.x86_64.rpm 392b5b99e396ba2c861d5ef787ef90cb 3WS/en/os/x86_64/kernel-smp-2.4.21-9.0.1.EL.x86_64.rpm af47d1725e4beb186b27bf477976b8f0 3WS/en/os/x86_64/kernel-smp-unsupported-2.4.21-9.0.1.EL.x86_64.rpm af8a5ae66bd171fb0b6e92ba944d24ec 3WS/en/os/x86_64/kernel-source-2.4.21-9.0.1.EL.x86_64.rpm 49f0b538164e79fadb3bce9871c0f6d1 3WS/en/os/x86_64/kernel-unsupported-2.4.21-9.0.1.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/keys.html You can verify each package with the following command: rpm --checksig -v If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum 8. References: http://www10.software.ibm.com/developerworks/opensource/linux390/s390-tools-1.2.4-june2003.shtml http://www10.software.ibm.com/developerworks/opensource/linux390/s390-tools-1.2.3-june2003.shtml http://www10.software.ibm.com/developerworks/opensource/linux390/s390-tools-1.2.2-june2003.shtml http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0077 9. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/solutions/security/news/contact.html Copyright 2003 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFANO7xXlSAg2UNWIIRAuMRAJ9I0zhBb4eiHFX8/OHsYNE1N6OuRwCgmZ3o iAVH32uUJTwp6pJkfhnRlbk= =aLIp -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Feb 26 20:37:00 2004 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 26 Feb 2004 15:37 -0500 Subject: [RHSA-2004:058-01] Updated mod_python packages fix denial of service vulnerability Message-ID: <200402262037.i1QKbTY26630@lacrosse.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated mod_python packages fix denial of service vulnerability Advisory ID: RHSA-2004:058-01 Issue date: 2004-02-26 Updated on: 2004-02-26 Product: Red Hat Enterprise Linux Keywords: mod_python DoS Cross references: Obsoletes: CVE Names: CAN-2003-0973 - --------------------------------------------------------------------- 1. Topic: Updated mod_python packages that fix a denial of service vulnerability are now available for Red Hat Enterprise Linux. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - i386 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Problem description: mod_python embeds the Python language interpreter within the Apache httpd server. A bug has been found in mod_python versions 2.7.10 and earlier that can lead to a denial of service vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0973 to this issue. Although Red Hat Enterprise Linux shipped with a version of mod_python that contains this bug, our testing was unable to trigger the denial of service vulnerability. However, mod_python users are advised to upgrade to these errata packages, which contain a backported patch that corrects this bug. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website: https://rhn.redhat.com/help/latest-up2date.pxt 5. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/mod_python-2.7.8-2.src.rpm i386: Available from Red Hat Network: mod_python-2.7.8-2.i386.rpm ia64: Available from Red Hat Network: mod_python-2.7.8-2.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/mod_python-2.7.8-2.src.rpm ia64: Available from Red Hat Network: mod_python-2.7.8-2.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/mod_python-2.7.8-2.src.rpm i386: Available from Red Hat Network: mod_python-2.7.8-2.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/mod_python-2.7.8-2.src.rpm i386: Available from Red Hat Network: mod_python-2.7.8-2.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/mod_python-3.0.3-3.ent.src.rpm i386: Available from Red Hat Network: mod_python-3.0.3-3.ent.i386.rpm ia64: Available from Red Hat Network: mod_python-3.0.3-3.ent.ia64.rpm ppc: Available from Red Hat Network: mod_python-3.0.3-3.ent.ppc.rpm s390: Available from Red Hat Network: mod_python-3.0.3-3.ent.s390.rpm s390x: Available from Red Hat Network: mod_python-3.0.3-3.ent.s390x.rpm x86_64: Available from Red Hat Network: mod_python-3.0.3-3.ent.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/mod_python-3.0.3-3.ent.src.rpm i386: Available from Red Hat Network: mod_python-3.0.3-3.ent.i386.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/mod_python-3.0.3-3.ent.src.rpm i386: Available from Red Hat Network: mod_python-3.0.3-3.ent.i386.rpm ia64: Available from Red Hat Network: mod_python-3.0.3-3.ent.ia64.rpm x86_64: Available from Red Hat Network: mod_python-3.0.3-3.ent.x86_64.rpm 6. Verification: MD5 sum Package Name - -------------------------------------------------------------------------- e06203d2306cd30015c64e453c5e00f6 2.1AS/en/os/SRPMS/mod_python-2.7.8-2.src.rpm 7b2b03557bc408221c549f299101705c 2.1AS/en/os/i386/mod_python-2.7.8-2.i386.rpm 8c7ece4e0c46d52afc5018ec8a252208 2.1AS/en/os/ia64/mod_python-2.7.8-2.ia64.rpm e06203d2306cd30015c64e453c5e00f6 2.1AW/en/os/SRPMS/mod_python-2.7.8-2.src.rpm 8c7ece4e0c46d52afc5018ec8a252208 2.1AW/en/os/ia64/mod_python-2.7.8-2.ia64.rpm e06203d2306cd30015c64e453c5e00f6 2.1ES/en/os/SRPMS/mod_python-2.7.8-2.src.rpm 7b2b03557bc408221c549f299101705c 2.1ES/en/os/i386/mod_python-2.7.8-2.i386.rpm e06203d2306cd30015c64e453c5e00f6 2.1WS/en/os/SRPMS/mod_python-2.7.8-2.src.rpm 7b2b03557bc408221c549f299101705c 2.1WS/en/os/i386/mod_python-2.7.8-2.i386.rpm 3928d331fd4d3492581e09afb5198367 3AS/en/os/SRPMS/mod_python-3.0.3-3.ent.src.rpm d83256ed6c3f759f81511d5bbbe4bd30 3AS/en/os/i386/mod_python-3.0.3-3.ent.i386.rpm f09c41ae2aff29fe7a79fcefadb21bef 3AS/en/os/ia64/mod_python-3.0.3-3.ent.ia64.rpm 261979c42795ece9537eebd75cd80070 3AS/en/os/ppc/mod_python-3.0.3-3.ent.ppc.rpm 5931e6fb80e4a04743b92438a32d3dbd 3AS/en/os/s390/mod_python-3.0.3-3.ent.s390.rpm 0731f48408089fc3374148f8af5351f4 3AS/en/os/s390x/mod_python-3.0.3-3.ent.s390x.rpm 5e1d9310db6075d08ca1346c0039593d 3AS/en/os/x86_64/mod_python-3.0.3-3.ent.x86_64.rpm 3928d331fd4d3492581e09afb5198367 3ES/en/os/SRPMS/mod_python-3.0.3-3.ent.src.rpm d83256ed6c3f759f81511d5bbbe4bd30 3ES/en/os/i386/mod_python-3.0.3-3.ent.i386.rpm 3928d331fd4d3492581e09afb5198367 3WS/en/os/SRPMS/mod_python-3.0.3-3.ent.src.rpm d83256ed6c3f759f81511d5bbbe4bd30 3WS/en/os/i386/mod_python-3.0.3-3.ent.i386.rpm f09c41ae2aff29fe7a79fcefadb21bef 3WS/en/os/ia64/mod_python-3.0.3-3.ent.ia64.rpm 5e1d9310db6075d08ca1346c0039593d 3WS/en/os/x86_64/mod_python-3.0.3-3.ent.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/keys.html You can verify each package with the following command: rpm --checksig -v If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum 7. References: http://www.modpython.org/pipermail/mod_python/2003-November/014532.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0973 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/solutions/security/news/contact.html Copyright 2003 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFAPlkGXlSAg2UNWIIRAjknAJ97E+fiuWL4Zc31avWOP9b6vI0dKACguKDc vVNwkaN79tU3Te0iO9lICHI= =rHUA -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Feb 26 20:38:00 2004 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 26 Feb 2004 15:38 -0500 Subject: [RHSA-2004:090-01] Updated libxml2 packages fix security vulnerability Message-ID: <200402262038.i1QKceY26659@lacrosse.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated libxml2 packages fix security vulnerability Advisory ID: RHSA-2004:090-01 Issue date: 2004-02-26 Updated on: 2004-02-26 Product: Red Hat Enterprise Linux Keywords: Cross references: Obsoletes: CVE Names: CAN-2004-0110 - --------------------------------------------------------------------- 1. Topic: Updated libxml2 packages that fix an overflow when parsing remote resources are now available. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - i386 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Problem description: libxml2 is a library for manipulating XML files. Yuuichi Teranishi discovered a flaw in libxml2 versions prior to 2.6.6. When fetching a remote resource via FTP or HTTP, libxml2 uses special parsing routines. These routines can overflow a buffer if passed a very long URL. If an attacker is able to find an application using libxml2 that parses remote resources and allows them to influence the URL, then this flaw could be used to execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0110 to this issue. All users are advised to upgrade to these updated packages, which contain a backported fix and are not vulnerable to this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website: https://rhn.redhat.com/help/latest-up2date.pxt 5. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/libxml2-2.4.19-5.ent.src.rpm i386: Available from Red Hat Network: libxml2-2.4.19-5.ent.i386.rpm Available from Red Hat Network: libxml2-devel-2.4.19-5.ent.i386.rpm Available from Red Hat Network: libxml2-python-2.4.19-5.ent.i386.rpm ia64: Available from Red Hat Network: libxml2-2.4.19-5.ent.ia64.rpm Available from Red Hat Network: libxml2-devel-2.4.19-5.ent.ia64.rpm Available from Red Hat Network: libxml2-python-2.4.19-5.ent.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/libxml2-2.4.19-5.ent.src.rpm ia64: Available from Red Hat Network: libxml2-2.4.19-5.ent.ia64.rpm Available from Red Hat Network: libxml2-devel-2.4.19-5.ent.ia64.rpm Available from Red Hat Network: libxml2-python-2.4.19-5.ent.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/libxml2-2.4.19-5.ent.src.rpm i386: Available from Red Hat Network: libxml2-2.4.19-5.ent.i386.rpm Available from Red Hat Network: libxml2-devel-2.4.19-5.ent.i386.rpm Available from Red Hat Network: libxml2-python-2.4.19-5.ent.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/libxml2-2.4.19-5.ent.src.rpm i386: Available from Red Hat Network: libxml2-2.4.19-5.ent.i386.rpm Available from Red Hat Network: libxml2-devel-2.4.19-5.ent.i386.rpm Available from Red Hat Network: libxml2-python-2.4.19-5.ent.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/libxml2-2.5.10-6.src.rpm i386: Available from Red Hat Network: libxml2-2.5.10-6.i386.rpm Available from Red Hat Network: libxml2-devel-2.5.10-6.i386.rpm Available from Red Hat Network: libxml2-python-2.5.10-6.i386.rpm ia64: Available from Red Hat Network: libxml2-2.5.10-6.ia64.rpm Available from Red Hat Network: libxml2-devel-2.5.10-6.ia64.rpm Available from Red Hat Network: libxml2-python-2.5.10-6.ia64.rpm ppc: Available from Red Hat Network: libxml2-2.5.10-6.ppc.rpm Available from Red Hat Network: libxml2-devel-2.5.10-6.ppc.rpm Available from Red Hat Network: libxml2-python-2.5.10-6.ppc.rpm s390: Available from Red Hat Network: libxml2-2.5.10-6.s390.rpm Available from Red Hat Network: libxml2-devel-2.5.10-6.s390.rpm Available from Red Hat Network: libxml2-python-2.5.10-6.s390.rpm s390x: Available from Red Hat Network: libxml2-2.5.10-6.s390x.rpm Available from Red Hat Network: libxml2-devel-2.5.10-6.s390x.rpm Available from Red Hat Network: libxml2-python-2.5.10-6.s390x.rpm x86_64: Available from Red Hat Network: libxml2-2.5.10-6.x86_64.rpm Available from Red Hat Network: libxml2-devel-2.5.10-6.x86_64.rpm Available from Red Hat Network: libxml2-python-2.5.10-6.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/libxml2-2.5.10-6.src.rpm i386: Available from Red Hat Network: libxml2-2.5.10-6.i386.rpm Available from Red Hat Network: libxml2-devel-2.5.10-6.i386.rpm Available from Red Hat Network: libxml2-python-2.5.10-6.i386.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/libxml2-2.5.10-6.src.rpm i386: Available from Red Hat Network: libxml2-2.5.10-6.i386.rpm Available from Red Hat Network: libxml2-devel-2.5.10-6.i386.rpm Available from Red Hat Network: libxml2-python-2.5.10-6.i386.rpm ia64: Available from Red Hat Network: libxml2-2.5.10-6.ia64.rpm Available from Red Hat Network: libxml2-devel-2.5.10-6.ia64.rpm Available from Red Hat Network: libxml2-python-2.5.10-6.ia64.rpm x86_64: Available from Red Hat Network: libxml2-2.5.10-6.x86_64.rpm Available from Red Hat Network: libxml2-devel-2.5.10-6.x86_64.rpm Available from Red Hat Network: libxml2-python-2.5.10-6.x86_64.rpm 6. Verification: MD5 sum Package Name - -------------------------------------------------------------------------- 7e1c408ae97fe6c28e8e162e9668f932 2.1AS/en/os/SRPMS/libxml2-2.4.19-5.ent.src.rpm 4a9e453a8266b7944ca3695f17e42a9d 2.1AS/en/os/i386/libxml2-2.4.19-5.ent.i386.rpm 1e735254a7252489c9d2478460022659 2.1AS/en/os/i386/libxml2-devel-2.4.19-5.ent.i386.rpm 8e96b561611eaf16ba6f44880d03ee15 2.1AS/en/os/i386/libxml2-python-2.4.19-5.ent.i386.rpm 5b7b3cc1b20d388aa7863bd8028b0a40 2.1AS/en/os/ia64/libxml2-2.4.19-5.ent.ia64.rpm 358ce25777eaa3f91ecaceb244a55ac7 2.1AS/en/os/ia64/libxml2-devel-2.4.19-5.ent.ia64.rpm f7abb73c013f1c67a1adef4511da6b22 2.1AS/en/os/ia64/libxml2-python-2.4.19-5.ent.ia64.rpm 7e1c408ae97fe6c28e8e162e9668f932 2.1AW/en/os/SRPMS/libxml2-2.4.19-5.ent.src.rpm 5b7b3cc1b20d388aa7863bd8028b0a40 2.1AW/en/os/ia64/libxml2-2.4.19-5.ent.ia64.rpm 358ce25777eaa3f91ecaceb244a55ac7 2.1AW/en/os/ia64/libxml2-devel-2.4.19-5.ent.ia64.rpm f7abb73c013f1c67a1adef4511da6b22 2.1AW/en/os/ia64/libxml2-python-2.4.19-5.ent.ia64.rpm 7e1c408ae97fe6c28e8e162e9668f932 2.1ES/en/os/SRPMS/libxml2-2.4.19-5.ent.src.rpm 4a9e453a8266b7944ca3695f17e42a9d 2.1ES/en/os/i386/libxml2-2.4.19-5.ent.i386.rpm 1e735254a7252489c9d2478460022659 2.1ES/en/os/i386/libxml2-devel-2.4.19-5.ent.i386.rpm 8e96b561611eaf16ba6f44880d03ee15 2.1ES/en/os/i386/libxml2-python-2.4.19-5.ent.i386.rpm 7e1c408ae97fe6c28e8e162e9668f932 2.1WS/en/os/SRPMS/libxml2-2.4.19-5.ent.src.rpm 4a9e453a8266b7944ca3695f17e42a9d 2.1WS/en/os/i386/libxml2-2.4.19-5.ent.i386.rpm 1e735254a7252489c9d2478460022659 2.1WS/en/os/i386/libxml2-devel-2.4.19-5.ent.i386.rpm 8e96b561611eaf16ba6f44880d03ee15 2.1WS/en/os/i386/libxml2-python-2.4.19-5.ent.i386.rpm 87a94f4cf266e922c5dec56d7d07eddf 3AS/en/os/SRPMS/libxml2-2.5.10-6.src.rpm c11396613bf20a0edb60a54147dca0f9 3AS/en/os/i386/libxml2-2.5.10-6.i386.rpm 700a8992e3f5c6ae3a283ee6fee729b0 3AS/en/os/i386/libxml2-devel-2.5.10-6.i386.rpm 8b064f385faace5e7f37b1ca527ebac0 3AS/en/os/i386/libxml2-python-2.5.10-6.i386.rpm 730e6b5ed3d4873c2869452817e8ea0e 3AS/en/os/ia64/libxml2-2.5.10-6.ia64.rpm de54778c29e885daff5a044941fb3aae 3AS/en/os/ia64/libxml2-devel-2.5.10-6.ia64.rpm 605e2d88301d95f3fb449d93eb1f9ab6 3AS/en/os/ia64/libxml2-python-2.5.10-6.ia64.rpm 329106c40bd1c0115ade5133f4ceb6b4 3AS/en/os/ppc/libxml2-2.5.10-6.ppc.rpm 70c83f532240a2589d5e87ba30144c40 3AS/en/os/ppc/libxml2-devel-2.5.10-6.ppc.rpm 7035650585477335d8cce99d4f798c2b 3AS/en/os/ppc/libxml2-python-2.5.10-6.ppc.rpm f4804fa1168118b92231f7391dd26558 3AS/en/os/s390/libxml2-2.5.10-6.s390.rpm d7ba412cd89f035239d80e0650ad31be 3AS/en/os/s390/libxml2-devel-2.5.10-6.s390.rpm 61b04a7dcd3d4e990701be2e26481fe1 3AS/en/os/s390/libxml2-python-2.5.10-6.s390.rpm 3a62985175e409fea867f736ba44962b 3AS/en/os/s390x/libxml2-2.5.10-6.s390x.rpm a4708414233e06b0c03349e878365c8c 3AS/en/os/s390x/libxml2-devel-2.5.10-6.s390x.rpm 3c71b9a6db40aa79b7b05aef1254fafc 3AS/en/os/s390x/libxml2-python-2.5.10-6.s390x.rpm b2df6ba3b63eb3bb62d4cb40300cb1e1 3AS/en/os/x86_64/libxml2-2.5.10-6.x86_64.rpm 5c39fe77819f59eb330a828304a57e25 3AS/en/os/x86_64/libxml2-devel-2.5.10-6.x86_64.rpm ad882af4862767b010c6b589bf44e1cd 3AS/en/os/x86_64/libxml2-python-2.5.10-6.x86_64.rpm 87a94f4cf266e922c5dec56d7d07eddf 3ES/en/os/SRPMS/libxml2-2.5.10-6.src.rpm c11396613bf20a0edb60a54147dca0f9 3ES/en/os/i386/libxml2-2.5.10-6.i386.rpm 700a8992e3f5c6ae3a283ee6fee729b0 3ES/en/os/i386/libxml2-devel-2.5.10-6.i386.rpm 8b064f385faace5e7f37b1ca527ebac0 3ES/en/os/i386/libxml2-python-2.5.10-6.i386.rpm 87a94f4cf266e922c5dec56d7d07eddf 3WS/en/os/SRPMS/libxml2-2.5.10-6.src.rpm c11396613bf20a0edb60a54147dca0f9 3WS/en/os/i386/libxml2-2.5.10-6.i386.rpm 700a8992e3f5c6ae3a283ee6fee729b0 3WS/en/os/i386/libxml2-devel-2.5.10-6.i386.rpm 8b064f385faace5e7f37b1ca527ebac0 3WS/en/os/i386/libxml2-python-2.5.10-6.i386.rpm 730e6b5ed3d4873c2869452817e8ea0e 3WS/en/os/ia64/libxml2-2.5.10-6.ia64.rpm de54778c29e885daff5a044941fb3aae 3WS/en/os/ia64/libxml2-devel-2.5.10-6.ia64.rpm 605e2d88301d95f3fb449d93eb1f9ab6 3WS/en/os/ia64/libxml2-python-2.5.10-6.ia64.rpm b2df6ba3b63eb3bb62d4cb40300cb1e1 3WS/en/os/x86_64/libxml2-2.5.10-6.x86_64.rpm 5c39fe77819f59eb330a828304a57e25 3WS/en/os/x86_64/libxml2-devel-2.5.10-6.x86_64.rpm ad882af4862767b010c6b589bf44e1cd 3WS/en/os/x86_64/libxml2-python-2.5.10-6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/keys.html You can verify each package with the following command: rpm --checksig -v If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum 7. References: http://mail.gnome.org/archives/xml/2004-February/msg00070.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0110 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/solutions/security/news/contact.html Copyright 2003 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFAPllKXlSAg2UNWIIRAoyWAKCq0v7XbquExEBXxeE1CH5D+2KMzACfXNvr xPxxDWUj6RUY7ZnZsqKcG/E= =EN5p -----END PGP SIGNATURE-----